SlideShare a Scribd company logo
Wireless Markup Language By:Hitesh Piprotar
Flow Introduction  Flow of presentation WML-HTML differences WML advantages WML limitations How wap works? WML elements/tags Basic WML deck structure WML decks and cards
Introduction Wireless markup language is based on XML derived from xhtml, is a markup language intended for WAP devices such as mobile phones. It provides navigational support, data input, hyperlinks, text and image presentation, and forms, much like  HTML. It is a part of WAP(Wireless Application Protocol).  The role of WML in mobile Internet applications is the same as that of HTML in web applications. WAP sites are written in WML, while web sites are written in HTML.WAP sites can also be opened in pc just we have to install plugins for our browser.  WML files have the extension “.wml”.
Difference between WML and HTML
Wml advantages  very easy to use and understand. Transmission of  WML  documents requires less bandwidth than HTML documents because WML documents are simpler and WML is compressed before it is sent to the WAP device.  Compared to HTML documents, displaying WML documents requires less processing power and memory.  WML provides support for limited graphics with a limited gray scale
WML limitations Like HTML, WML does specify how the content is to be displayed. Thus micro browsers on different WAP devices display the WML content differently.  WAP devices such as WAP phones will not accept large decks. There are many variations between WAP phones, for example Screen sizes, keypads, and soft keys can be different .This variation is similar to the variation found with Web browsers and their platforms .The problem is harder in case of WML because there are many more WAP devices than Web browsers and their platforms.
How wap works?
Introduction to WML tags/elements 1)deck and card elements
2)text elements 3)anchor elements
4)text formatting tags 5)variable elements
6)event elements 7)image elements
8)task elements 9)input elements
WML decks and cards A WAP site is composed of WML files. Each WML file is also called as deck. Each deck is made up of cards. Each card contains content that you want to display on the screen. Only one card is displayed at time. First card is displayed  first  by default.
WML document structure Prolog: Every WML document starts with the prolog.  The first line is the XML declaration and the second line is the DOCTYPE declaration. The DOCTYPE declaration specifies the name of the DTD (Document Type Definition) and the URL to the DTD. The DTD contains information about the syntax of the markup language. It defines what elements and attributes can be used in the markup and the rules that they should be used.  For example, the DTD of WML specifies that the <card> element should be enclosed in the <wml></wml> tag pair.  If we do not follow this rule, your WML document is said to be invalid. WAP browsers will complain if you try to view an invalid WML document.
Basic WML deck structure <?xml version="1.0"?><!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.3//EN" "http://www.wapforum.org/DTD/wml13.dtd/wml_1.1.xml">   <wml> <card id=”card1”> …. </card>   <card id=”card2”>…. </card> </wml>
Example <?xml version="1.0"?><!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.2//EN""http://www.wapforum.org/DTD/wml12.dt>  <wml>  <card id="one" title="First Card"> <p>This is the first card in the deck </p></card>  <card id="two" title="Second Card"> <p>This is the second card in the deck</p> </card>  </wml>
Output of above example When  we press right button then second card will be visible as follows:
Thank you

More Related Content

What's hot

Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
amardeepsingh1902
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
BharathiKrishna6
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Soumen Santra
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
Unit 1
Unit 1Unit 1
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
Alok Tripathi
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
Ahmad Khalid Nasrat
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Flow Control
Flow ControlFlow Control
Flow Control
selvakumar_b1985
 

What's hot (20)

Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Tcp
TcpTcp
Tcp
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
Carrier Sense Multiple Access With Collision Detection (CSMA/CD) Details : Me...
 
Email security
Email securityEmail security
Email security
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Unit 1
Unit 1Unit 1
Unit 1
 
Kerberos
KerberosKerberos
Kerberos
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Flow Control
Flow ControlFlow Control
Flow Control
 

Viewers also liked

Wireless Markup Language
Wireless Markup LanguageWireless Markup Language
Wireless Markup Language
Hitesh Piprotar
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
Kathirvel Ayyaswamy
 
Wireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingWireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computing
Subhashini Sundaram
 
ITFT_Wireless markup language
ITFT_Wireless markup languageITFT_Wireless markup language
ITFT_Wireless markup language
Shilpa Sharma
 
Wap & WML
Wap & WMLWap & WML
Bt0087 wml and wap programing2
Bt0087 wml and wap programing2Bt0087 wml and wap programing2
Bt0087 wml and wap programing2
Techglyphs
 
Wap
WapWap
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
Ramesh Babu
 
Lect4
Lect4Lect4
XML Programming WML by Dickson K.W. Chiu PhD, SMIEEE
XML Programming WML by Dickson K.W. Chiu PhD, SMIEEEXML Programming WML by Dickson K.W. Chiu PhD, SMIEEE
XML Programming WML by Dickson K.W. Chiu PhD, SMIEEE
Senthil Kanth
 
Wap wml
Wap wmlWap wml
Wap wml
ishmecse13
 
WML-Tutorial
WML-TutorialWML-Tutorial
WML-TutorialOPENLANE
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
Ankur Kumar
 
WML BOX
WML BOXWML BOX
Wap
WapWap
Hiperlan
HiperlanHiperlan

Viewers also liked (20)

Wireless Markup Language
Wireless Markup LanguageWireless Markup Language
Wireless Markup Language
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Wireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computingWireless Markup Language,wml,mobile computing
Wireless Markup Language,wml,mobile computing
 
ITFT_Wireless markup language
ITFT_Wireless markup languageITFT_Wireless markup language
ITFT_Wireless markup language
 
Wap & WML
Wap & WMLWap & WML
Wap & WML
 
Bt0087 wml and wap programing2
Bt0087 wml and wap programing2Bt0087 wml and wap programing2
Bt0087 wml and wap programing2
 
Wap
WapWap
Wap
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Lect4
Lect4Lect4
Lect4
 
WAP
WAPWAP
WAP
 
XML Programming WML by Dickson K.W. Chiu PhD, SMIEEE
XML Programming WML by Dickson K.W. Chiu PhD, SMIEEEXML Programming WML by Dickson K.W. Chiu PhD, SMIEEE
XML Programming WML by Dickson K.W. Chiu PhD, SMIEEE
 
Wap wml
Wap wmlWap wml
Wap wml
 
WML-Tutorial
WML-TutorialWML-Tutorial
WML-Tutorial
 
Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
WML BOX
WML BOXWML BOX
WML BOX
 
Wap
WapWap
Wap
 
Web Services
Web ServicesWeb Services
Web Services
 
Web service introduction
Web service introductionWeb service introduction
Web service introduction
 
Hiperlan
HiperlanHiperlan
Hiperlan
 

Similar to Wml

Wireless Application Protocol
Wireless Application ProtocolWireless Application Protocol
Wireless Application Protocol
Nyi Tun
 
Wireless languages and content generation technologies
Wireless languages and content generation technologiesWireless languages and content generation technologies
Wireless languages and content generation technologies
Suveeksha
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
ishmecse13
 
Web Services Part 1
Web Services Part 1Web Services Part 1
Web Services Part 1patinijava
 
Bt0087 wml and wap programing1
Bt0087 wml and wap programing1Bt0087 wml and wap programing1
Bt0087 wml and wap programing1
Techglyphs
 
Xml For Dummies Chapter 20 Ten Top Xml Applications
Xml For Dummies   Chapter 20 Ten Top Xml ApplicationsXml For Dummies   Chapter 20 Ten Top Xml Applications
Xml For Dummies Chapter 20 Ten Top Xml Applicationsphanleson
 
transcoding.ppt
transcoding.ppttranscoding.ppt
transcoding.pptVideoguy
 
01 Xml Begin
01 Xml Begin01 Xml Begin
01 Xml Begin
Dennis Pipper
 
Xml applications
Xml applicationsXml applications
Xml applications
Nabahat Tahir
 
Web services Overview in depth
Web services Overview in depthWeb services Overview in depth
Web services Overview in depth
AbdulImrankhan7
 
Survey of WML
Survey of  WMLSurvey of  WML
Survey of WML
tawi123
 
Xml
XmlXml
Wireless Application Protocol ppt
Wireless Application Protocol pptWireless Application Protocol ppt
Wireless Application Protocol ppt
go2project
 
UNIT-1 Web services
UNIT-1 Web servicesUNIT-1 Web services
UNIT-1 Web services
madhusrinivasan9
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
Editor IJCATR
 

Similar to Wml (20)

Wireless Application Protocol
Wireless Application ProtocolWireless Application Protocol
Wireless Application Protocol
 
Wireless languages and content generation technologies
Wireless languages and content generation technologiesWireless languages and content generation technologies
Wireless languages and content generation technologies
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
 
WAP Technology
WAP TechnologyWAP Technology
WAP Technology
 
Web Services Part 1
Web Services Part 1Web Services Part 1
Web Services Part 1
 
XML-talk
XML-talkXML-talk
XML-talk
 
Bt0087 wml and wap programing1
Bt0087 wml and wap programing1Bt0087 wml and wap programing1
Bt0087 wml and wap programing1
 
Xml For Dummies Chapter 20 Ten Top Xml Applications
Xml For Dummies   Chapter 20 Ten Top Xml ApplicationsXml For Dummies   Chapter 20 Ten Top Xml Applications
Xml For Dummies Chapter 20 Ten Top Xml Applications
 
transcoding.ppt
transcoding.ppttranscoding.ppt
transcoding.ppt
 
Wsdl1
Wsdl1Wsdl1
Wsdl1
 
01 Xml Begin
01 Xml Begin01 Xml Begin
01 Xml Begin
 
Xml applications
Xml applicationsXml applications
Xml applications
 
Web services Overview in depth
Web services Overview in depthWeb services Overview in depth
Web services Overview in depth
 
Survey of WML
Survey of  WMLSurvey of  WML
Survey of WML
 
Xml
XmlXml
Xml
 
xhtml-documentation
xhtml-documentationxhtml-documentation
xhtml-documentation
 
xhtml-documentation
xhtml-documentationxhtml-documentation
xhtml-documentation
 
Wireless Application Protocol ppt
Wireless Application Protocol pptWireless Application Protocol ppt
Wireless Application Protocol ppt
 
UNIT-1 Web services
UNIT-1 Web servicesUNIT-1 Web services
UNIT-1 Web services
 
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
WAP, HTTP and HTML5 Web Socket Architecture Analysis in Contemporary Mobile A...
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

Wml

  • 1. Wireless Markup Language By:Hitesh Piprotar
  • 2. Flow Introduction Flow of presentation WML-HTML differences WML advantages WML limitations How wap works? WML elements/tags Basic WML deck structure WML decks and cards
  • 3. Introduction Wireless markup language is based on XML derived from xhtml, is a markup language intended for WAP devices such as mobile phones. It provides navigational support, data input, hyperlinks, text and image presentation, and forms, much like HTML. It is a part of WAP(Wireless Application Protocol).  The role of WML in mobile Internet applications is the same as that of HTML in web applications. WAP sites are written in WML, while web sites are written in HTML.WAP sites can also be opened in pc just we have to install plugins for our browser.  WML files have the extension “.wml”.
  • 5. Wml advantages very easy to use and understand. Transmission of WML documents requires less bandwidth than HTML documents because WML documents are simpler and WML is compressed before it is sent to the WAP device. Compared to HTML documents, displaying WML documents requires less processing power and memory. WML provides support for limited graphics with a limited gray scale
  • 6. WML limitations Like HTML, WML does specify how the content is to be displayed. Thus micro browsers on different WAP devices display the WML content differently. WAP devices such as WAP phones will not accept large decks. There are many variations between WAP phones, for example Screen sizes, keypads, and soft keys can be different .This variation is similar to the variation found with Web browsers and their platforms .The problem is harder in case of WML because there are many more WAP devices than Web browsers and their platforms.
  • 8. Introduction to WML tags/elements 1)deck and card elements
  • 10. 4)text formatting tags 5)variable elements
  • 13. WML decks and cards A WAP site is composed of WML files. Each WML file is also called as deck. Each deck is made up of cards. Each card contains content that you want to display on the screen. Only one card is displayed at time. First card is displayed first by default.
  • 14. WML document structure Prolog: Every WML document starts with the prolog. The first line is the XML declaration and the second line is the DOCTYPE declaration. The DOCTYPE declaration specifies the name of the DTD (Document Type Definition) and the URL to the DTD. The DTD contains information about the syntax of the markup language. It defines what elements and attributes can be used in the markup and the rules that they should be used. For example, the DTD of WML specifies that the <card> element should be enclosed in the <wml></wml> tag pair. If we do not follow this rule, your WML document is said to be invalid. WAP browsers will complain if you try to view an invalid WML document.
  • 15. Basic WML deck structure <?xml version="1.0"?><!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.3//EN" "http://www.wapforum.org/DTD/wml13.dtd/wml_1.1.xml">   <wml> <card id=”card1”> …. </card>   <card id=”card2”>…. </card> </wml>
  • 16. Example <?xml version="1.0"?><!DOCTYPE wml PUBLIC "-//WAPFORUM//DTD WML 1.2//EN""http://www.wapforum.org/DTD/wml12.dt>  <wml>  <card id="one" title="First Card"> <p>This is the first card in the deck </p></card>  <card id="two" title="Second Card"> <p>This is the second card in the deck</p> </card>  </wml>
  • 17. Output of above example When we press right button then second card will be visible as follows: