SlideShare a Scribd company logo
1 of 41
V I N I S H A L I K K A L
A S S I S T A N T P R O F E S S O R
M E A E N G I N E E R I N G C O L L E G E
Wireless Application Protocol
(WAP)
Introduction
 Wireless Application Protocol commonly known as WAP is used to enable the
access of internet in the mobile phones or PDAs.
 An open, global specification that empowers mobile users with wireless
devices to easily access and interact with internet information and services
instantly.
 WAP is an application communication protocol
 WAP is used to access services and information
 WAP is for handheld devices such as mobile phones
 WAP enables the creating of web applications for mobile devices.
 WAP uses the mark-up language WML (not HTML) WML is defined as
an XML 1.0 application
GOALS
 The basic AIM of WAP is to provide a web-likeexperience on
small portable devices - like mobile phones and PDAs
WAP ARCHITECTURE
WAP Gateway
WAP ARCHITECTURE
REQUIREMENTS
 Leverage existing standards whenever possible
 Define a layered and extensible architecture
 Support as many wireless networks as possible
 Provide support for secure applications and communication
 Optimize for efficient use of device resources
All solutions must be:
 ● interoperable, i.e., allowing terminals and software from different
vendors to communicate with networks from different providers;
 ● scalable, i.e., protocols and services should scale with customer
needs and number of customers;
 ● efficient, i.e., provision of QoS suited to the characteristics of the
wireless and mobile networks;
 ● reliable, i.e., provision of a consistent and predictable platform for
deploying services; and
 ● secure, i.e., preservation of the integrity of user data, protection of
devices and services from security problems.
Components and interface of the WAP
architecture
Architecture
 The transport layer service access point (T-SAP) is the common
interface to be used by higher layers independent of the underlying
network
 The security layer with its wireless transport layer security protocol
WTLS offers its service at the security SAP (SEC-SAP).
 The WAP transaction layer with its wireless transaction
protocol (WTP) offers a lightweight transaction service at the
transaction SAP (TR-SAP)
 The session layer with the wireless session protocol (WSP)
currently offers two services at the session-SAP (S-SAP)
 the application layer with the wireless application environment (WAE)
offers a framework for the integration of different www and mobile
telephony applications
Examples for the
integration of WAPcomponents
Wireless datagram protocol
 The wireless datagram protocol (WDP) operates on top of many
different bearer services capable of carrying data.
 The T-SAP WDP offers a consistent datagram transport service
independent of the underlying bearer (WAP Forum, 2000b). To offer
this consistent service
 WDP offers more or less the same services as UDP.
 WDP offers source and destination port numbers used for multiplexing
and demultiplexing of data respectively
 The service primitive to send a datagram is TDUnitdata. req with the
destination address (DA), destination port (DP), Source address (SA),
source port (SP), and user data (UD) as mandatory parameters
 Destination and source address are unique addresses for the receiver
and sender of the user data.
WDP service primitives
Wireless Transport layer security
( WTLS)
 WTLS can provide different levels of security
 Data Integrity
Privacy
Authentication
 WTLS takes into account the low processing power and very limited memory
capacity of the mobile devices for cryptographic algorithms
 WTLS supports datagram and connection-oriented transport layer
protocols.
WTLS establishing a secure session
Cont…
The first step is to initiate the session with the SEC-Create primitive.
o The first step of the secure session creation, the negotiation of the security
parameters and suites, is indicated on the originator’s side, followed by the
request for a certificate. The originator answers with its certificate and issues a
SEC-Commit.req primitive
o This primitive indicates that the handshake is completed for the originator’s
side and that the originator now wants to switch into the newly negotiated
connection state. The certificate is delivered to the peer side and the SEC-
Commit is indicated
o The WTLS layer of the peer sends back a confirmation to the originator. This
concludes the full handshake for secure session setup.
o After setting up a secure connection between two peers, user data can be
exchanged. This is done using the simple SEC-Unit data primitive as shown in
Figure
WTLS datagram transfer
WTP - Wireless Transaction Protocol
WTP has been designed to run on very thin clients, such as mobile phones. WTP
offers several advantages to higher layers, including an improved reliability over
datagram services, improved efficiency over connection-oriented services, and
support for transaction-oriented services such as web browsing.
Three classes of transaction service:
 Class 0 provides unreliable message transfer without any result message
 Classes 1 and 2 provide reliable message transfer, class 1 without, class 2 with,
exactly one reliable result message (the typical request/response case)
 WTP achieves reliability using duplicate removal, retransmission, acknowledgements
and unique transaction identifiers.
 No WTP-class requires any connection set-up or tear-down phase. This avoids
unnecessary overhead on the communication link
 WTP allows for asynchronous transactions, abort of transactions, concatenation of
messages, and can report success or failure of reliable messages (e.g., a server cannot
handle the request).
WTP - Wireless Transaction Protocol
• Goals
– different transaction services, offloads applications
• application can select reliability, efficiency
– support of different communication scenarios
• class 0: unreliable message transfer
• class 1: reliable message transfer without result message
• class 2: reliable message transfer with exactly one reliable result
message
– supports peer-to-peer, client/server and multicast applications
– low memory requirements, suited to simple devices (< 10kbyte )
– efficient for wireless transmission
• segmentation/reassembly
• selective retransmission
• header compression
• optimized connection setup (setup with data transfer)
Details of WTP I
• Support of different communication scenarios
– Class 0: unreliable message transfer
• Example: push service
– Class 1: reliable request
• An invoke message is not followed by a result message
• Example: reliable push service
– Class 2: reliable request/response
• An invoke message is followed by exactly one result message
• With and without ACK
• Example: typical web browsing
• No explicit connection setup or release is available
• Services for higher layers are called events
Details of WTP II
• Used Mechanisms
– Reliability
• Unique transaction identifiers (TID)
• Acknowledgements
• Selective retransmission
• Duplicate removal
– Optional: concatenation & separation of messages
– Optional: segmentation & reassembly of messages
– Asynchronous transactions
– Transaction abort, error handling
– Optimized connection setup (includes data transmission)
WTP Class 0 transaction
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=0, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=0, H‘)
initiator
TR-SAP
responder
TR-SAP
WTP Class 1 transaction, no user ack & user ack
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=1, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=1, H‘)
initiator
TR-SAP
responder
TR-SAP
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=1, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=1, H‘)
initiator
TR-SAP
responder
TR-SAP
TR-Invoke.res
(H‘)
TR-Invoke.cnf
(H)
TR-Invoke.cnf
(H)
WTP Class 2 transaction, no user ack, no hold on
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=2, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=2, H‘)
initiator
TR-SAP
responder
TR-SAP
TR-Result.req
(UD*, H‘)
TR-Result.ind
(UD*, H)
TR-Invoke.cnf
(H)
TR-Result.res
(H)
TR-Result.cnf
(H‘)
WTP Class 2 transaction, user ack
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=2, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=2, H‘)
initiator
TR-SAP
responder
TR-SAP
TR-Result.ind
(UD*, H)
TR-Invoke.res
(H‘)
TR-Invoke.cnf
(H) TR-Result.req
(UD*, H‘)
TR-Result.res
(H)
TR-Result.cnf
(H‘)
WTP Class 2 transaction, hold on, no user ack
TR-Invoke.req
(SA, SP, DA, DP, A, UD, C=2, H) TR-Invoke.ind
(SA, SP, DA, DP, A, UD, C=2, H‘)
initiator
TR-SAP
responder
TR-SAP
TR-Result.req
(UD*, H‘)
TR-Result.ind
(UD*, H)
TR-Invoke.cnf
(H)
TR-Result.res
(H)
TR-Result.cnf
(H‘)
WSP - Wireless Session Protocol
• Goals
– HTTP 1.1 functionality (WSP/B supports the functions HTTP/1.1)
• Request/reply, content type negotiation, ...
– support of client/server, transactions, push technology
– key management, authentication, Internet security services
– session management (interruption, resume,...)
• Open topics
– QoS support
– group communication
– isochronous media objects
– management
WSP protocols
WSP
Connection mode
(uses WTP)
Connectionless mode
(uses WDP or WTLS)
• Session Management (class 0, 2)
• Method Invocation (Kl. 2)
• Error Report
• Push (class 0)
• Confirmed Push (class 1)
• Session suspend/resume (class 0, 2)
• Method Invocation
• Push
(in general unreliable)
WSP/B session establishment
S-Connect.req
(SA, CA, CH, RC) S-Connect.ind
(SA, CA, CH, RC)
client
S-SAP
server
S-SAP
S-Connect.res
(SH, NC)
S-Connect.cnf
(SH, NC)
WTP Class 2
transaction
WSP/B session suspend/resume
S-Suspend.req S-Suspend.ind
(R)
client
S-SAP
server
S-SAP
S-Resume.res
WTP Class 2
transaction
S-Suspend.ind
(R)
~ ~
S-Resume.req
(SA, CA) S-Resume.ind
(SA, CA)
S-Resume.cnf
WTP Class 0
transaction
WSP/B session termination
S-Disconnect.ind
(R)
client
S-SAP
server
S-SAP
S-Disconnect.ind
(R) WTP Class 0
transaction
S-Disconnect.req
(R)
WSP/B method invoke
S-MethodInvoke.req
(CTID, M, RU) S-MethodInvoke.ind
(STID, M, RU)
client
S-SAP
server
S-SAP
S-MethodInvoke.res
(STID)
S-MethodInvoke.cnf
(CTID)
WTP Class 2
transaction
S-MethodResult.req
(STID, S, RH, RB)
S-MethodResult.ind
(CTID, S, RH, RB)
S-MethodResult.res
(CTID) S-MethodResult.cnf
(STID)
WSP/B over WTP - method invocation
S-MethodInvoke.req
S-MethodInvoke.ind
client
S-SAP
server
S-SAP
S-MethodInvoke.res
S-MethodInvoke.cnf
S-MethodResult.req
S-MethodResult.ind
S-MethodResult.res
S-MethodResult.cnf
TR-Invoke.req
initiator
TR-SAP
TR-Result.ind
TR-Invoke.cnf
TR-Result.res
TR-Invoke.ind
responder
TR-SAP
TR-Invoke.res
TR-Result.req
TR-Result.cnf
WSP/B over WTP - asynchronous, unordered
requests
S-MethodInvoke_1.req
S-MethodInvoke_1.ind
client
S-SAP
server
S-SAP
S-MethodInvoke_2.req
S-MethodInvoke_3.req
S-MethodResult_1.ind
S-MethodInvoke_4.req
S-MethodResult_3.ind
S-MethodResult_4.ind
S-MethodResult_2.ind
S-MethodInvoke_3.ind
S-MethodInvoke_2.ind
S-MethodResult_1.req
S-MethodResult_2.req
S-MethodResult_3.req
S-MethodResult_4.req
S-MethodInvoke_4.ind
WSP/B - confirmend/non-confirmed push
S-Push.req
(PH, PB)
client
S-SAP
server
S-SAP
WTP Class 1
transaction
S-Push.ind
(PH, PB)
S-ConfirmedPush.res
(CPID)
S-ConfirmedPush.ind
(CPID, PH, PB)
WTP Class 0
transaction
S-ConfirmedPush.req
(SPID, PH, PB)
client
S-SAP
server
S-SAP
S-ConfirmedPush.cnf
(SPID)
WAE - Wireless Application Environment
 Goals
 network independent application environment for low-bandwidth, wireless
devices
 integrated Internet/WWW programming model with high interoperability
 Requirements
 device and network independent, international support
 manufacturers can determine look-and-feel, user interface
 considerations of slow links, limited memory, low computing power, small
display, simple user interface (compared to desktop computers)
 Components
 architecture: application model, browser, gateway, server
 WML: XML-Syntax, based on card stacks, variables, ...
 WMLScript: procedural, loops, conditions, ... (similar to JavaScript)
 WTA: telephone services, such as call control, text messages, phone book, ...
(accessible from WML/WMLScript)
 content formats: vCard, vCalendar, Wireless Bitmap, WML, ...
WAE logical model
Origin Servers
web
server
other content
server
Gateway Client
other
WAE
user agents
WML
user agent
WTA
user agent
encoders
&
decoders
encoded
request
request
encoded
response
with
content
response
with
content
push
content
encoded
push
content
Wireless Markup Language (WML)
 WML follows deck and card metaphor
 WML document consists of many cards, cards are grouped to decks
 a deck is similar to an HTML page, unit of content transmission
 WML describes only intent of interaction in an abstract manner
 presentation depends on device capabilities
 Features
 text and images
 user interaction
 navigation
 context management
WML – example I
<?xml version="1.0"?>
<!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN"
"http://www.wapforum.org/DTD/wml_1.1.xml">
<wml>
<card id="card_one" title="simple example">
<do type="accept">
<go href="#card_two"/>
</do>
<p>
This is a simple first card!
<br/>
On the next one you can choose ...
</p>
</card>
WML – example II
<card id="card_two" title="Pizza selection">
<do type="accept" label="cont">
<go href="#card_three"/>
</do>
<p>
... your favorite pizza!
<select value="Mar" name="PIZZA">
<option value="Mar">Margherita</option>
<option value="Fun">Funghi</option>
<option value="Vul">Vulcano</option>
</select>
</p>
</card>
<card id="card_three" title="Your Pizza!">
<p>
Your personal pizza parameter is <b>$(PIZZA)</b>!
</p>
</card>
</wml>
WAP

More Related Content

What's hot

Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Swapnali Pawar
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and networkNirajan Silwal
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesSwapnali Pawar
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Vivek Kumar
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARISivaSankari36
 

What's hot (20)

IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1IT6601 MOBILE COMPUTING UNIT1
IT6601 MOBILE COMPUTING UNIT1
 
Unit 7
Unit 7Unit 7
Unit 7
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and network
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
M commerce
M commerceM commerce
M commerce
 
It2402 mobile communication unit5
It2402 mobile communication unit5It2402 mobile communication unit5
It2402 mobile communication unit5
 
Design computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile TechnologiesDesign computing architecture ~ Mobile Technologies
Design computing architecture ~ Mobile Technologies
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Cellular charles
Cellular charlesCellular charles
Cellular charles
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
 

Similar to WAP

112321 112333 wirless application protocol
112321 112333 wirless application protocol112321 112333 wirless application protocol
112321 112333 wirless application protocolJAINIK PATEL
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol Smriti Agrawal
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocolgit tech
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V pkaviya
 
Web technology and commerce unit 5
Web technology and commerce unit 5Web technology and commerce unit 5
Web technology and commerce unit 5arun0501
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application ProtocolSenthil Kanth
 
Wireless Application Protocol ppt
Wireless Application Protocol pptWireless Application Protocol ppt
Wireless Application Protocol pptgo2project
 
Wireless application prorocol
Wireless application prorocolWireless application prorocol
Wireless application prorocol9535814851
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocolPrachi Sasankar
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessOliver Pfaff
 
Telecommunication network2222
Telecommunication  network2222Telecommunication  network2222
Telecommunication network2222Chirag_pahuja
 

Similar to WAP (20)

112321 112333 wirless application protocol
112321 112333 wirless application protocol112321 112333 wirless application protocol
112321 112333 wirless application protocol
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
Wap model
Wap modelWap model
Wap model
 
Mcpp113,16,33,41
Mcpp113,16,33,41Mcpp113,16,33,41
Mcpp113,16,33,41
 
IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V IT8602 Mobile Communication - Unit V
IT8602 Mobile Communication - Unit V
 
Web technology and commerce unit 5
Web technology and commerce unit 5Web technology and commerce unit 5
Web technology and commerce unit 5
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application Protocol
 
wireless mobile
wireless mobilewireless mobile
wireless mobile
 
Introduction to WAP
Introduction to WAPIntroduction to WAP
Introduction to WAP
 
Wireless Application Protocol ppt
Wireless Application Protocol pptWireless Application Protocol ppt
Wireless Application Protocol ppt
 
Wireless application prorocol
Wireless application prorocolWireless application prorocol
Wireless application prorocol
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Wap
WapWap
Wap
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
Identifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusinessIdentifying How WAP Can Be Used For Secure mBusiness
Identifying How WAP Can Be Used For Secure mBusiness
 
Telecommunication network2222
Telecommunication  network2222Telecommunication  network2222
Telecommunication network2222
 
Unit 5
Unit 5Unit 5
Unit 5
 
WAP
WAPWAP
WAP
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

WAP

  • 1. V I N I S H A L I K K A L A S S I S T A N T P R O F E S S O R M E A E N G I N E E R I N G C O L L E G E Wireless Application Protocol (WAP)
  • 2. Introduction  Wireless Application Protocol commonly known as WAP is used to enable the access of internet in the mobile phones or PDAs.  An open, global specification that empowers mobile users with wireless devices to easily access and interact with internet information and services instantly.  WAP is an application communication protocol  WAP is used to access services and information  WAP is for handheld devices such as mobile phones  WAP enables the creating of web applications for mobile devices.  WAP uses the mark-up language WML (not HTML) WML is defined as an XML 1.0 application
  • 3. GOALS  The basic AIM of WAP is to provide a web-likeexperience on small portable devices - like mobile phones and PDAs
  • 6.
  • 7. WAP ARCHITECTURE REQUIREMENTS  Leverage existing standards whenever possible  Define a layered and extensible architecture  Support as many wireless networks as possible  Provide support for secure applications and communication  Optimize for efficient use of device resources
  • 8. All solutions must be:  ● interoperable, i.e., allowing terminals and software from different vendors to communicate with networks from different providers;  ● scalable, i.e., protocols and services should scale with customer needs and number of customers;  ● efficient, i.e., provision of QoS suited to the characteristics of the wireless and mobile networks;  ● reliable, i.e., provision of a consistent and predictable platform for deploying services; and  ● secure, i.e., preservation of the integrity of user data, protection of devices and services from security problems.
  • 9. Components and interface of the WAP architecture
  • 10. Architecture  The transport layer service access point (T-SAP) is the common interface to be used by higher layers independent of the underlying network  The security layer with its wireless transport layer security protocol WTLS offers its service at the security SAP (SEC-SAP).  The WAP transaction layer with its wireless transaction protocol (WTP) offers a lightweight transaction service at the transaction SAP (TR-SAP)  The session layer with the wireless session protocol (WSP) currently offers two services at the session-SAP (S-SAP)  the application layer with the wireless application environment (WAE) offers a framework for the integration of different www and mobile telephony applications
  • 11. Examples for the integration of WAPcomponents
  • 12. Wireless datagram protocol  The wireless datagram protocol (WDP) operates on top of many different bearer services capable of carrying data.  The T-SAP WDP offers a consistent datagram transport service independent of the underlying bearer (WAP Forum, 2000b). To offer this consistent service  WDP offers more or less the same services as UDP.  WDP offers source and destination port numbers used for multiplexing and demultiplexing of data respectively  The service primitive to send a datagram is TDUnitdata. req with the destination address (DA), destination port (DP), Source address (SA), source port (SP), and user data (UD) as mandatory parameters  Destination and source address are unique addresses for the receiver and sender of the user data.
  • 14. Wireless Transport layer security ( WTLS)  WTLS can provide different levels of security  Data Integrity Privacy Authentication  WTLS takes into account the low processing power and very limited memory capacity of the mobile devices for cryptographic algorithms  WTLS supports datagram and connection-oriented transport layer protocols.
  • 15. WTLS establishing a secure session
  • 16. Cont… The first step is to initiate the session with the SEC-Create primitive. o The first step of the secure session creation, the negotiation of the security parameters and suites, is indicated on the originator’s side, followed by the request for a certificate. The originator answers with its certificate and issues a SEC-Commit.req primitive o This primitive indicates that the handshake is completed for the originator’s side and that the originator now wants to switch into the newly negotiated connection state. The certificate is delivered to the peer side and the SEC- Commit is indicated o The WTLS layer of the peer sends back a confirmation to the originator. This concludes the full handshake for secure session setup. o After setting up a secure connection between two peers, user data can be exchanged. This is done using the simple SEC-Unit data primitive as shown in Figure
  • 18. WTP - Wireless Transaction Protocol WTP has been designed to run on very thin clients, such as mobile phones. WTP offers several advantages to higher layers, including an improved reliability over datagram services, improved efficiency over connection-oriented services, and support for transaction-oriented services such as web browsing. Three classes of transaction service:  Class 0 provides unreliable message transfer without any result message  Classes 1 and 2 provide reliable message transfer, class 1 without, class 2 with, exactly one reliable result message (the typical request/response case)  WTP achieves reliability using duplicate removal, retransmission, acknowledgements and unique transaction identifiers.  No WTP-class requires any connection set-up or tear-down phase. This avoids unnecessary overhead on the communication link  WTP allows for asynchronous transactions, abort of transactions, concatenation of messages, and can report success or failure of reliable messages (e.g., a server cannot handle the request).
  • 19. WTP - Wireless Transaction Protocol • Goals – different transaction services, offloads applications • application can select reliability, efficiency – support of different communication scenarios • class 0: unreliable message transfer • class 1: reliable message transfer without result message • class 2: reliable message transfer with exactly one reliable result message – supports peer-to-peer, client/server and multicast applications – low memory requirements, suited to simple devices (< 10kbyte ) – efficient for wireless transmission • segmentation/reassembly • selective retransmission • header compression • optimized connection setup (setup with data transfer)
  • 20. Details of WTP I • Support of different communication scenarios – Class 0: unreliable message transfer • Example: push service – Class 1: reliable request • An invoke message is not followed by a result message • Example: reliable push service – Class 2: reliable request/response • An invoke message is followed by exactly one result message • With and without ACK • Example: typical web browsing • No explicit connection setup or release is available • Services for higher layers are called events
  • 21. Details of WTP II • Used Mechanisms – Reliability • Unique transaction identifiers (TID) • Acknowledgements • Selective retransmission • Duplicate removal – Optional: concatenation & separation of messages – Optional: segmentation & reassembly of messages – Asynchronous transactions – Transaction abort, error handling – Optimized connection setup (includes data transmission)
  • 22. WTP Class 0 transaction TR-Invoke.req (SA, SP, DA, DP, A, UD, C=0, H) TR-Invoke.ind (SA, SP, DA, DP, A, UD, C=0, H‘) initiator TR-SAP responder TR-SAP
  • 23. WTP Class 1 transaction, no user ack & user ack TR-Invoke.req (SA, SP, DA, DP, A, UD, C=1, H) TR-Invoke.ind (SA, SP, DA, DP, A, UD, C=1, H‘) initiator TR-SAP responder TR-SAP TR-Invoke.req (SA, SP, DA, DP, A, UD, C=1, H) TR-Invoke.ind (SA, SP, DA, DP, A, UD, C=1, H‘) initiator TR-SAP responder TR-SAP TR-Invoke.res (H‘) TR-Invoke.cnf (H) TR-Invoke.cnf (H)
  • 24. WTP Class 2 transaction, no user ack, no hold on TR-Invoke.req (SA, SP, DA, DP, A, UD, C=2, H) TR-Invoke.ind (SA, SP, DA, DP, A, UD, C=2, H‘) initiator TR-SAP responder TR-SAP TR-Result.req (UD*, H‘) TR-Result.ind (UD*, H) TR-Invoke.cnf (H) TR-Result.res (H) TR-Result.cnf (H‘)
  • 25. WTP Class 2 transaction, user ack TR-Invoke.req (SA, SP, DA, DP, A, UD, C=2, H) TR-Invoke.ind (SA, SP, DA, DP, A, UD, C=2, H‘) initiator TR-SAP responder TR-SAP TR-Result.ind (UD*, H) TR-Invoke.res (H‘) TR-Invoke.cnf (H) TR-Result.req (UD*, H‘) TR-Result.res (H) TR-Result.cnf (H‘)
  • 26. WTP Class 2 transaction, hold on, no user ack TR-Invoke.req (SA, SP, DA, DP, A, UD, C=2, H) TR-Invoke.ind (SA, SP, DA, DP, A, UD, C=2, H‘) initiator TR-SAP responder TR-SAP TR-Result.req (UD*, H‘) TR-Result.ind (UD*, H) TR-Invoke.cnf (H) TR-Result.res (H) TR-Result.cnf (H‘)
  • 27. WSP - Wireless Session Protocol • Goals – HTTP 1.1 functionality (WSP/B supports the functions HTTP/1.1) • Request/reply, content type negotiation, ... – support of client/server, transactions, push technology – key management, authentication, Internet security services – session management (interruption, resume,...) • Open topics – QoS support – group communication – isochronous media objects – management
  • 28. WSP protocols WSP Connection mode (uses WTP) Connectionless mode (uses WDP or WTLS) • Session Management (class 0, 2) • Method Invocation (Kl. 2) • Error Report • Push (class 0) • Confirmed Push (class 1) • Session suspend/resume (class 0, 2) • Method Invocation • Push (in general unreliable)
  • 29. WSP/B session establishment S-Connect.req (SA, CA, CH, RC) S-Connect.ind (SA, CA, CH, RC) client S-SAP server S-SAP S-Connect.res (SH, NC) S-Connect.cnf (SH, NC) WTP Class 2 transaction
  • 30. WSP/B session suspend/resume S-Suspend.req S-Suspend.ind (R) client S-SAP server S-SAP S-Resume.res WTP Class 2 transaction S-Suspend.ind (R) ~ ~ S-Resume.req (SA, CA) S-Resume.ind (SA, CA) S-Resume.cnf WTP Class 0 transaction
  • 32. WSP/B method invoke S-MethodInvoke.req (CTID, M, RU) S-MethodInvoke.ind (STID, M, RU) client S-SAP server S-SAP S-MethodInvoke.res (STID) S-MethodInvoke.cnf (CTID) WTP Class 2 transaction S-MethodResult.req (STID, S, RH, RB) S-MethodResult.ind (CTID, S, RH, RB) S-MethodResult.res (CTID) S-MethodResult.cnf (STID)
  • 33. WSP/B over WTP - method invocation S-MethodInvoke.req S-MethodInvoke.ind client S-SAP server S-SAP S-MethodInvoke.res S-MethodInvoke.cnf S-MethodResult.req S-MethodResult.ind S-MethodResult.res S-MethodResult.cnf TR-Invoke.req initiator TR-SAP TR-Result.ind TR-Invoke.cnf TR-Result.res TR-Invoke.ind responder TR-SAP TR-Invoke.res TR-Result.req TR-Result.cnf
  • 34. WSP/B over WTP - asynchronous, unordered requests S-MethodInvoke_1.req S-MethodInvoke_1.ind client S-SAP server S-SAP S-MethodInvoke_2.req S-MethodInvoke_3.req S-MethodResult_1.ind S-MethodInvoke_4.req S-MethodResult_3.ind S-MethodResult_4.ind S-MethodResult_2.ind S-MethodInvoke_3.ind S-MethodInvoke_2.ind S-MethodResult_1.req S-MethodResult_2.req S-MethodResult_3.req S-MethodResult_4.req S-MethodInvoke_4.ind
  • 35. WSP/B - confirmend/non-confirmed push S-Push.req (PH, PB) client S-SAP server S-SAP WTP Class 1 transaction S-Push.ind (PH, PB) S-ConfirmedPush.res (CPID) S-ConfirmedPush.ind (CPID, PH, PB) WTP Class 0 transaction S-ConfirmedPush.req (SPID, PH, PB) client S-SAP server S-SAP S-ConfirmedPush.cnf (SPID)
  • 36. WAE - Wireless Application Environment  Goals  network independent application environment for low-bandwidth, wireless devices  integrated Internet/WWW programming model with high interoperability  Requirements  device and network independent, international support  manufacturers can determine look-and-feel, user interface  considerations of slow links, limited memory, low computing power, small display, simple user interface (compared to desktop computers)  Components  architecture: application model, browser, gateway, server  WML: XML-Syntax, based on card stacks, variables, ...  WMLScript: procedural, loops, conditions, ... (similar to JavaScript)  WTA: telephone services, such as call control, text messages, phone book, ... (accessible from WML/WMLScript)  content formats: vCard, vCalendar, Wireless Bitmap, WML, ...
  • 37. WAE logical model Origin Servers web server other content server Gateway Client other WAE user agents WML user agent WTA user agent encoders & decoders encoded request request encoded response with content response with content push content encoded push content
  • 38. Wireless Markup Language (WML)  WML follows deck and card metaphor  WML document consists of many cards, cards are grouped to decks  a deck is similar to an HTML page, unit of content transmission  WML describes only intent of interaction in an abstract manner  presentation depends on device capabilities  Features  text and images  user interaction  navigation  context management
  • 39. WML – example I <?xml version="1.0"?> <!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.1//EN" "http://www.wapforum.org/DTD/wml_1.1.xml"> <wml> <card id="card_one" title="simple example"> <do type="accept"> <go href="#card_two"/> </do> <p> This is a simple first card! <br/> On the next one you can choose ... </p> </card>
  • 40. WML – example II <card id="card_two" title="Pizza selection"> <do type="accept" label="cont"> <go href="#card_three"/> </do> <p> ... your favorite pizza! <select value="Mar" name="PIZZA"> <option value="Mar">Margherita</option> <option value="Fun">Funghi</option> <option value="Vul">Vulcano</option> </select> </p> </card> <card id="card_three" title="Your Pizza!"> <p> Your personal pizza parameter is <b>$(PIZZA)</b>! </p> </card> </wml>

Editor's Notes

  1. Mobilkommunikation SS 1998
  2. Mobilkommunikation SS 1998
  3. Mobilkommunikation SS 1998
  4. Mobilkommunikation SS 1998
  5. Mobilkommunikation SS 1998
  6. Mobilkommunikation SS 1998
  7. Mobilkommunikation SS 1998
  8. Mobilkommunikation SS 1998
  9. Mobilkommunikation SS 1998
  10. Mobilkommunikation SS 1998
  11. Mobilkommunikation SS 1998
  12. Mobilkommunikation SS 1998
  13. Mobilkommunikation SS 1998
  14. Mobilkommunikation SS 1998
  15. Mobilkommunikation SS 1998
  16. Mobilkommunikation SS 1998
  17. Mobilkommunikation SS 1998
  18. Mobilkommunikation SS 1998
  19. Mobilkommunikation SS 1998
  20. Mobilkommunikation SS 1998
  21. Mobilkommunikation SS 1998
  22. Mobilkommunikation SS 1998