Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views14 pages

MC - Unit 4

WAP is a protocol suite that enables access to Internet content and advanced data services on mobile phones and other wireless devices. It comprises Wireless Markup Language (WML), Wireless Session Protocol (WSP), Wireless Transaction Protocol (WTP), Wireless Transport Layer Security (WTLS), and Wireless Datagram Protocol (WDP). WDP provides connectionless datagram service for WAP applications.

Uploaded by

Loki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views14 pages

MC - Unit 4

WAP is a protocol suite that enables access to Internet content and advanced data services on mobile phones and other wireless devices. It comprises Wireless Markup Language (WML), Wireless Session Protocol (WSP), Wireless Transaction Protocol (WTP), Wireless Transport Layer Security (WTLS), and Wireless Datagram Protocol (WDP). WDP provides connectionless datagram service for WAP applications.

Uploaded by

Loki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Exam point of view (Part A&B)

UNIT-4
1. Define WAP
WAP is Wireless Application Protocol. It is the basic Objective of the WAP forum
are to bring diverse Internet content and others data service to digital cellular phones
and other wireless, mobile terminals. More ever a protocol suite should enable global
wireless communication across different wireless network technologies. All WAP forum
solution must be interoperable, scalable, efficient, and reliable.
2. What is the role of WML?
Wireless markup language (WML) is designed to handle issues like small display
size, limited user input capabilities, narrowband network connection with high latency,
limited memory and computational processing power.
WML has to ensure maximum efficiency in fetching requested Web pages from the
server.
3. Mention any two salient features of WAP.
WAP is a new technology, but it reuses the concepts found on the Internet. This
reuse enables a quick introduction of WAP-based services, since both service
developers and manufacturers are familiar with these concepts are,
 Wireless Markup Language (WML)
 WML Script
 Wireless Telephony Application Interface (WTAI)
 Optimized protocol stack
4. What are the different security levels offered by WTLS?
The primary job of WTLS is to provide privacy, data integrity and
authentication between applications communicating using WAP. WTLS is based on
and provides similar functionality to the Transport Layer Security (TLS) protocol but
is optimized for low bandwidth mobile devices.
5. Mention the primary goals of WAP.
Wireless Application Protocol (WAP) is a technical standard for accessing
information over a mobile wireless network. A WAP browser is a web browser for
mobile devices such as mobile phones that uses the protocol.
6. What is the role of WTA server?
Wireless Telephony Application (WTA) framework and the WTA user-agent. The
WTA framework supports Wireless Telephony Applications that interface with the in-
device telephony related functions and the network telephony infrastructure.
7. What are the primitives of WTP?
 TR-Invoke
 TR-Result
 TR-Abort
8. Name some of the advantages of WTP.
 improved reliability over datagram services
 improved efficiency over connection-oriented services
 support for transaction -oriented services
9. what are the priitives used for full way handshake in WTLS?
 SEC-create
 SEC-Exchange
 SEC_commit
10. Define WSP.
This protocol has been designed to operate on top of datagram service WDP or
transaction service WTP, if security is needed WTLS can also be inserted. it provides a
shared state between a client and server to optimize content transfer.
11. what is the purpose of WCMP for WDP?
if any error happen when WDP datagram's are sent from one entity to another, the
wireless control message protocol(WCMP) provides error handling mechanisms for
WDP
WCMP messages are:
 Destination unreachable
 parameter problem
 Message too big
 reassembly failure
 eco request/reply
12. Mention the features of WML script.
 Validity check of user input
 Access to device facilities
 Local user interaction
 Extensions to the device software
Part-B
1. Write short notes on Mobile TCP.
 This protocol was proposed by Kevin Brown et al.

 In mobile wireless networks, users would badly suffer from the problems of
unacceptable delays in TCP communications and frequent disconnections
caused by events such as signal fades, lack of bandwidth, hand-off, unless
these are explicitly handled by the protocol.
 The M-TCP protocol tries to avoid the sender window from shrinking or
reverting to slow-start when bit errors cause a packet loss, as is attempted in
I-TCP and snooping TCP.

 M-TCP splits the TCP connections into:

1. Wired Part:
 Unmodified TCP is used.
 Connection between the Fixed Host (FH) and the Supervisory
Host (SH).
2. Wireless Part:
 M-TCP is used.
 Connection between the SH and MH.

 Many MHs are connected to SH through several base stations.

 Supervisory Host (SH) supervises all the packets transmitted to MH and the
acknowledgements sent by MH. It also serves as an interface between FH to
MH.
 When a packet is sent to MH by FH using SH, the wired part uses the
normal unmodified TCP and the wireless part uses modified version of
TCP known as M-TCP to deliver data to MH.
 This packet is acknowledged only when the MH receives the packet.
Thus it maintains the TCP semantics.
 If the acknowledgement is not received by FH, SH decides that MH is
disconnected and sets the sender FH window size to zero. This prevents
re- transmission.

 When SH notices that the MH is connected, it sets the full window size
of the sender FH.
 When MH moves from its current SH region to a new SH region, a state
transfer take places, so that the new SH can maintain TCP connection
between FH and MH.
 Advantages:

1. Maintains end-to-end TCP semantic

2. Lowers the delay

3. Supports disconnection

4. No buffer forwarding

 Disadvantages:

1. Loss on wireless link propagated into fixed network.


2. State the requirements of WAP. Explain its architectural components.
 The wireless application protocol forum (WAP Forum) was founded in June
1997 by Ericsson, Motorola, Nokia, and Unwired Planet.
Objectives of the WAP Forum:
 The objectives of the WAP Forum and now of the OMA(open mobile alliance) are,
 To bring diverse internet content (e.g., web pages, push services) and other data
services (e.g., stock quotes) to digital cellular phones and other wireless,
mobile terminals (e.g., PDAs, laptops).
 Protocol suite should enable global wireless communication across different
wireless network technologies, e.g., GSM, CDPD, UMTS etc.
 All solution must be,
 Interoperable
 Saleable
 Efficient
 reliable
 secure
WAP-ARCHITECTURE
An overview of the WAP architecture is given as,
Fig: Components and Interface of WAP Architecture
Bearer services:
 The basis for transmission of data is formed by different bearer services.
 WAP does not specify bearer services, but uses existing data services and will
integrate further services.
 Examples are,
1) Message services: short message service (SMS) of GSM,
2) Circuit-switched data: High-speed circuit switched data (HSCSD) in GSM,
3) Packet switched data: General packet radio service (GPRS) in GSM.
4) Many other bearers are supported, such as CDPD, IS-136, PHS.
5) No special interface has been specified between the bearer service and the
next higher layer,
Transport layer:
 This layer has its wireless datagram protocol (WDP) and the additional wireless
control message protocol (WCMP), because the adaptation of these protocols are
bearer-specific.
 The transport layer offers a bearer independent, consistent datagram-oriented
service to the higher layers of the WAP architecture.
 (T-SAP) transport layer service access point is the common interface to be used
by higher layers independent of the underlying network.
Security layer:
 It is the next higher layer, with its wireless transport layer security protocol
(WTLS) offers its service at the security SAP (SEC-SAP).
 WTLS can offer data integrity, privacy, authentication, and denial-of-service
protection.
Transaction layer:
 It is the higher layer next to security layer with its wireless transaction protocol
(WTP) offers a lightweight transaction service at the transaction SAP (TR-SAP).
 This layer provides reliable or unreliable requests and asynchronous transactions.
Session layer
 The next higher layer, the session layer with the wireless session protocol (WSP)
currently offers two services at the session-SAP (S-SAP), one connection-oriented
and one connectionless if used directly on top of WDP.
 It provides a special service for browsing the web (WSP/B).
Application layer
 It is the uppermost layer with the wireless application environment (WAE)
offers a framework for the integration of different www and mobile telephony
applications.
 Its interface is A-SAP(application service access point)
 It offers many protocols and services with special service access points.
 The relation of WAP architecture with the traditional internet architecture for
WWW applications.
 It is given as
1) The transport layer and compare to TCP or UDP over IP bearer services
2) Security layer compared with services offered by TLS/SSL
3) Transaction and session layers compared with HTTP
4) Application layer offers same services as HTML, Java.
Integration of WAP Components:
The integration of WAP components into existing wireless and fixed networks is
shown as,

Examples of Integration of WAP Components


3. Discuss in detail about the Wireless Datagram Protocol (WDP).
 The Wireless Datagram Protocol (WDP) operates on top of many different bearer
services capable of carrying data.
 At the T-SAP WDP offers a consistent datagram transport service independent of
the underlying bearer.
 WDP offers more or less the same services as UDP.
 WDP offers source and destination port numbers used for multiplexing and de-
multiplexing of data respectively.
The service primitive used by WDP are,
 To send a datagram is T-DUnitdata.req with the destination address (DA),
destination port (DP), Source address (SA), source port (SP), and user data (UD) as
mandatory parameters.
 The reception of data is indicates T-DUnitdata.ind with SP, SA, UD here DA and
DP are optional.
 If WDP cannot fulfil request from higher layer, it will send the error message as T-
DError.ind with an EC (error code).
These are shown as,

Fig : WAP Service Primitives


 An error code (EC) is returned indicating the reason for the error to the higher
layer.
 WDP is not allowed to use this primitive to indicate problems with the bearer
service.
 It is only allowed to use the primitive to indicate local problems, such as a user
data size that is too large. (e.g. the destination is unreachable, no application is
listening to the specified destination port etc.),
WCMP:
If any errors happen when WDP datagram‘s are sent from one WDP entity to
another. The wireless control message protocol (WCMP) provides error handling
mechanisms for WDP.
WCMP messages are.
 Destination unreachable
 Parameter problem
 Message too big
 Reassembly failure
 Echo request/reply
WDP management entity:
It supports WDP and provides information about changes in the environment,
which may influence the correct operation of WDP.
4. Explain in detail about Wireless Transport Layer Security (WTLS).
 WTLS provide different levels of security (for privacy, data integrity, and
authentication) and has been optimized for low bandwidth, high-delay bearer
networks.
 It always takes into account the low processing power and very limited memory
capacity of the mobile devices for cryptographic algorithms.
Secure Session establishment:
 Before data can be exchanged via WTLS, a secure session has to be established.
It is shown in the fig.

Fig: WTLS establishing a Secure Session

 The service primitives for “full way handshake “are,


(i) SEC-Create-to initiate the session,
 SEC-create.req and SEC-Create ind has source address (SA), source port
(SP) of the originator, destination address (DA), destination port (DP) of the
peer.
 The originator proposes a key exchange suite (KES) (e.g., RSA, DH, ECC, a
cipher suite (CS) (e.g., DES, IDEA) and a compression method (CM).
 SEC-create.res and SEC-create.cnf has the peer answers with parameters for
the sequence number mode (SNM), the key refresh cycle (KR),the session
identifier (SID) and the selected key exchange suite (KES‘), cipher suite
(CS‘), compression method (CM‘).
(ii) SEC-Exchange:
 The peer also issues a SEC-Exchange primitive, which requests a client
certificate (CC) from the originator.

(iii) SEC-Commit
 The originator answers with its certificate and issues a SEC-Commit.req
primitive.
 The peer responds with SEC-Commit primitive.
Data transfer:
 After setting up a secure connection between two peers, user data can be
exchanged. Using primitive SEC-Unit data which is shown as.

Fig: WTLS Datagram Transfer


It has the parameters as,
 source address (SA),
 source port (SP),
 destination address (DA),
 destination port (DP), and
 user data (UD).
Although WTLS allows for different encryption mechanisms with different key
lengths.
5. Explain WSP and WAE with a neat diagram.
 The wireless session protocol (WSP) has been designed to operate on top of the
datagram service WDP or the transaction service WTP, For both types, if
security is needed WTLS can also be inserted.
 WSP provides a shared state between a client and a server to optimize content
transfer.
features:
WSP offers the following general features needed for content exchange between
cooperating clients and servers:
Session management:
 WSP introduces sessions that can be established from a client to a
server, it can be released in an orderly manner, capabilities of
suspending and resuming session are important to mobile applications.
Capability negotiation:
 Clients and servers can agree upon a common level of protocol functionality
during session establishment.
 Example: maximum client SDU size,
maximum outstanding requests, and
server SDU size.
Content encoding:
 WSP also defines the efficient binary encoding for the content it transfers.
WSP/B :
 the protocols and services suited for browsing-type applications are Wireless
session protocol/browsing(WSP/B) specified by WAP for WSP.
 Features offered by WSP/B are,
 HTTP/1.1 functionality: are extensible request/reply methods, composite
objects, and content type negotiation.
 Exchange of session headers: Client and server can exchange
request/reply headers that remain constant over the lifetime of the session.
 Push and pull data transfer: pulling data fro a server is the traditional
mechanism of the web; this is supported by WSP/B using request/response
mechanism from HTTP/1.1 WSP/B supports three push mechanisms for
data transfer:
 confirmed data push within an existing session context,
 non-confirmed data push within an existing session context,
 non-confirmed data push without an existing session context.
 Asynchronous requests: WSP/B supports a client that can send multiple
requests to a server simultaneously.
Wireless Application Environment
 Wireless application environment (WAE) is mainly used to create a general-
purpose application environment based mainly on existing technologies and
philosophies of the World Wide Web.
 WAE has already integrated the following technologies and adapted them for use
in a wireless environment with low power handheld devices.
 HTML, JavaScript, and the handheld device mark-up language(HDML) form the
basis of the wireless mark-up language (WML) and the scripting language WML
script.
Goal of WAE:
 Goal of the WAE is to minimize over-the-air traffic and resource consumption on
the handheld device.
 This goal is also reflected in the logical model underlying WAE as,
 WAE adopts a model that closely follows the www model, but assumes additional
gateways that can enhance transmission efficiency.

Fig :WAE Logical Model


client:
 client: issues an encoded request for an operation on a remote server.
 Decoders: it will translate this encoded request into a standard request as
understood by the origin servers.
 This could be a request to get a web page.
 Gateway: it transfers this request to the appropriate origin server as if it came
from a standard client.
Server:
 Origin servers: it will respond to the request.
 Gateway: it now encodes the response and its content and transfers the encoded
response with the content to the client.
WAE model also includes Push services.
 Origin server: pushes content to the gateway.
 The gateway encodes the pushed content and transmits the encoded push
content to the client.
Several user agents can reside within a client are,
 WML user agent: that supports WML, WML script, or both.
 WTA user agent: handles access to and interaction with, mobile telephone
features.
 User Agent profile (UAProf):which describes the capabilities of a user agent.

6. Explain the architecture of WTA.


 WTA is a collection of telephony specific extensions for call and feature control
mechanisms, merging data networks and voice networks.
 WTA extends the basic WAE application model in several ways:
Content push: A WTA origin server can push content.
Access to telephony functions: the WTAI (wireless telephony application
interface)provides many functions to handle telephony events. (call accept, call setup,
change of phone book entries etc.).
Repository for event handlers: The repository represents a persistent storage
on the client for content required to offer WTA services.
Security model:it is a Mandatory model many frauds happen with wrong
phone numbers or faked services.
WTA logical architecture:
 The client is connected via a mobile network with a WTA server, other telephone
networks (e.g., fixed PSTN), and a WAP gateway.
 A minimal configuration could be a single server from a network operator serving
all clients.
 The client may have voice and data connections over the mobile network.
 The overview of the WTA logical architecture is given as,
 Other origin servers within the trusted domain may be connected via the WAP
gateway.
 A firewall is useful to connect third-party origin servers outside the trusted
domain.
Fig :WTA Architecture

Figure shows below an exemplary interaction between a WTA client, a WTA


gateway, a WTA server, the mobile network (with probably many more servers) and a
voice box server.
Someone might leave a message on a voice box server as indicated
In a WAP scenario, the voice box can induce the WTA server to generate new
content for pushing to the client.
Exemplary Interaction between A WTA Client, A WTA Gateway, A WTA Server,
The Mobile\Network
WML deck containing a list of callers plus length and priority of the calls. The
server does not push this deck immediately to the client, but sends a push message
containing a single URL to the client.
The WTA gateway translates the push URL into a service indication and codes it
into a more compact binary format.
The WTA user agent then indicates that new messages are stored. If the user
wants to listen to the stored messages, he or she can request a list of the messages.
This is done with the help of the URL. A WSP get requests the content the URL
points to. The gateway translates this WSP get into an HTTP get and the server responds
with the prepared list of callers.
After displaying the content, the user can select a voice message from the list.
Each voice message in this example has an associated URL, which can request a certain
WML card from the server.
The purpose of this card is to prepare the client for an incoming call. As soon as
the client receives the card, it waits for the incoming call. The call is then automatically
accepted. The WTA server also signals the voice box system to set up a (traditional) voice
connection to play the selected voice message. Setting up the call and accepting the call
is shown using dashed lines, as these are standard interactions from the mobile phone
network, which are not controlled by WAP.

**********************

You might also like