M.SARAVANA KARTHIKEYAN

Size: px
Start display at page:

Download "M.SARAVANA KARTHIKEYAN"

Transcription

1 PERVASIVE COMPUTING Unit II Part A 1. What is XML? XML stands for EXtensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not predefined. You must define your own tags XML is designed to be self-descriptive XML is a W3C Recommendation 2. Compare XML and HTML XML and HTML were designed with different goals: XML was designed to transport and store data, with focus on what data is HTML was designed to format and display data, with focus on how data looks XML is Not a Replacement for HTML XML is a complement to HTML. 3. Write short notes on Your Own Tags The tags used in HTML are predefined. HTML documents can only use tags defined in the HTML standard (like <p>, <h1>, etc.). The tags like <to> and <from> are not defined in any XML standard. These tags are "invented" by the author of the XML document. That is because the XML language has no predefined tags. XML allows the author to define his/her own tags and his/her own document structure. 4. How XML brings interoperability between heterogeneous devices? XML is a W3C Recommendation XML is a software- and hardware-independent tool for carrying information. XML is the most common tool for data transmissions between all sorts of applications. XML is used in many aspects of web development, often to simplify data storage and sharing. 5. What is the role of XML in Pervasive computing? In Pervasive computing, XML provides portable and structured information types for display on pervasive (wireless) computing devices such as PDAs, cellular phones, and others. XML is a software- and hardware-independent tool for carrying information. For example, WML (Wireless Markup Language) and VoiceXML are currently evolving standards for describing visual and speech-driven wireless device interfaces. 6. What is WAP? WAP is Wireless Application Protocol that extends internet technology for mobile devices. WAP is used to access services and information WAP is inherited from Internet standards WAP is a protocol designed for micro browsers(wap phones) WAP enables the creating of web applications for mobile devices. 1

2 7. In what aspects the mobile user interfaces are typically limited? Small display Restricted input capability Limited memory and processing power Low speed network connections with high latency 8. How a HTML page is display in WAP phone? WAP uses WML instead of HTML. The replacement of HTML pages with highly condensed WML pages called cards, reduces the overhead of content representation and reflects the limited display capabilities of mobile devices. 9. List the two main tasks of WAP gateway. Protocol conversion: WAP gateway is the intermediary between client and the server. Communication between server and gateway is made using HTTP protocols, and between gateway, client-phone is made using WAP protocol. Content encoding: Data transferred between the client and the WAP gateway are binary encoded in order to minimize data transfer. 10. List out the WAP Profile Elements. Homepage Connection type & security Bearer Dial up number IP address Authentication type Data call type& speed User name& password 11. Briefly explain OTP OTP stands for Over The air Provisioning, settings profiles via SMS. The user requests a profile by sending a specific SMS message to the service provider. Then the profile is sent in a response message and must be activated by the user. 12. What are all the security issues identified in current WAP Architecture? End-end security Missing secure authentication Unauthenticated OTP Missing public key Infrastructure 13. Write short notes on WAP Micro Browsers To fit into a small wireless terminal, WAP uses a Micro Browser. A Micro Browser is a small piece of software that makes minimal demands on hardware, memory and CPU. It can display information written in a restricted mark-up language called WML. The Micro Browser can also interpret a reduced version of JavaScript called WMLScript. 2

3 14. What is WML? Who defined it? WML stands for Wireless Markup Language. It is a mark-up language inherited from HTML, but WML is based on XML, so it is much stricter than HTML.It is defined by WAP forum. 15. Define Decks & Cards. WML is used to create pages that can be displayed in a WAP browser. Pages in WML are called DECKS. Decks are constructed as a set of CARDS. 16. List the Standard Libraries available in WML. Lang library Float library String library URL library WML Browser library Dialogs Library 17. What are the functions provided by WML Browser Library? The WML browser provides functions for manipulating the associated WML context, such as loading a new page or updating the display. Another function setvar is used to set value of a WML variable. 18. What is WMLScript? WML uses WML Script to run simple code on the client. WMLScript is a light JavaScript language. However, WML scripts are not embedded in the WML pages. WML pages only contains references to script URLs. WML scripts need to be compiled into byte code on a server before they can run in a WAP browser. 19. Why WML decks & scripts are encoded? The messages exchanged between the WAP gateway and the mobile devices are binary encoded to reduce the number of bytes transferred. Thereby both WML decks and WML Scripts are encoded. 20. Define Pagination? Pagination is also referred to as deck fragmentation.in case of news applications sending large amount of text to mobile device is common, in that case the data is paginated the decks are fragmented. 21. Brief notes on WAP Push. The message which does not requires any form of answer from receiver side use the WAP push service. Example: sports updates, stock quotes. Push operation is triggered from a push initiator by sending a push message to push proxy gateway (PPG) using the Push Access Protocol. Then the PPG deliver the message to mobile device using push over the air protocol (OTA). 3

4 22. Sketch out the WAP gateway protocol stack. PART B 1. Describe the components of WAP architecture. WAP is designed in a layered fashion so that it can be extensible, flexible, and scalable. As a result, there are five layers: Application Layer Wireless Application Environment (WAE). This layer is of most interest to content developers because it contains, among other things, device specifications and the content development programming languages, WML and WMLScript. Session Layer Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP Forum to provide fast connection suspension and reconnection. It supports HTTP 1.1 functionality and semantics in a binary-encoded format to minimize data transfer to the mobile phone. Transaction Layer Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth wireless stations. It offers three classes of transaction services Class0:provides unreliable one-way messages without confirmation Class1:provide reliable one way message without result Class2: provides reliable two way request-response messages. Security Layer Wireless Transport Layer Security (WTLS). WTLS incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks, privacy, service denial, and authentication services. 4

5 WTLS give several options for key exchange including RSA, Diffie-Hellman, ECC-Elliptic Curve Cryptography. Privacy can be secured using DES-Data Encryption Standard and IDEA-International Data Encryption Algorithm. Transport Layer Wireless Datagram Protocol (WDP). The WDP allows WAP to be bearer-independent by adapting the transport layer of the underlying bearer. The WDP presents a consistent data format to the higher layers of the WAP protocol stack, thereby offering the advantage of bearer independence to application developers. Error during transmission is communicated via WCMP-Wireless Control Message Protocol Each of these layers provides a well-defined interface to the layer above it. This means that the internal workings of any layer are transparent or invisible to the layers above it. The layered architecture allows other applications and services to utilize the features provided by the WAP-stack as well. This makes it possible to use the WAP-stack for services and applications that currently are not specified by WAP. The WAP protocol architecture is shown below alongside a typical Internet Protocol stack. Note that the mobile network bearers in the lower part of the figure above are not part of the WAP protocol stack. 5

6 2. Explain a. WWW programming model b. WAP programming model In www programming model, the browser at user PC supports HTML and the request as well as response is going to follow the HTTP protocol. The request from HTML browser is send as an HTTP request and the response from server is replies HTTP response. There is no protocol conversion, since the client side has sufficient hardware capabilities and user interfaces such a way to support typical HTML pages. WAP gateway, which is responsible for protocol conversion and data formatting. It acts as the interface between the wired and wireless worlds. Since mobile nodes, WAP phones have 6

7 limited capabilities they cannot support typical HTML pages.so that protocol conversion and formatting-encoding are carried out to minimize data transfer. 1. The user selects an option on their mobile device that has a URL with WML content assigned to it. 2. The phone sends the URL request via the phone network to a WAP gateway, using the binary encoded WAP protocol. 3. The gateway translates this WAP request into a conventional HTTP request for the specified URL, and sends it on to the Internet. 4. The appropriate Web server picks up the HTTP request. 5. The server processes the request, just as it would be any other request. If the URL refers to a static WML file, the server delivers it. If a CGI script is requested, it is processed and the content returned as usual. 6. The Web server adds the HTTP header to the WML content and returns it to the gateway. 7. The WAP gateway compiles the WML into binary form. 8. The gateway then sends the WML response back to the phone. 9. The phone receives the WML via the WAP protocol. 10. The micro-browser processes the WML and displays the content on the screen. 3. List the WAP profile elements and describe it, and sketch out the sample WAP infrastructure a. Homepage: URL address of the internet start page. b. Connection type: defines communication protocol between WAP phone and dial in router,either continuous-switched or temporary-packet c. Connection security: ON or OFF to bring up or down WTLS session d. Bearer: define the bearer service used for data transfer e. Dial up number: extension of dial in server to which WAP gateway is attached. f. IP address: address of WAP gateway g. Authentication type: defines whether a security certificate is used for client authentication. h. Data call type: defines signaling between mobile phone and dial in server i. Data speed: communication speed between phone and the network, usually 9.6 to 14.4 baud j. User name: generic user name for access k. Password: secret password corresponding to that user <WAP infrastructure diagram is available in book as well as course notes for reference> 7

8 4. Explain the security issues in WAP architecture and provide the recommended solutions. <List the issues> End-end security Missing secure authentication Unauthenticated OTP Missing public key Infrastructure < Brief notes on each issues- refer course notes> Solutions: Transport layer security Redirect third party gateway <With essential diagram explain it is resolved: refer course notes> 5. Write short notes on a. Wireless Transaction Protocol M.SARAVANA KARTHIKEYAN Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth wireless stations. It offers three classes of transaction services Class0:provides unreliable one-way messages without confirmation Class1:provide reliable one way message without result Class2: provides reliable two way request-response messages. b. Push Access Protocol The message which does not requires any form of answer from receiver side use the WAP push service. Example: sports updates, stock quotes. Push operation is triggered from a push initiator by sending a push message to push proxy gateway (PPG) using the Push Access Protocol. Then the PPG deliver the message to mobile device using push over the air protocol (OTA). c. Micro browsers To fit into a small wireless terminal, WAP uses a Micro Browser. A Micro Browser is a small piece of software that makes minimal demands on hardware, memory and CPU. It can display information written in a restricted mark-up language called WML. The Micro Browser can also interpret a reduced version of JavaScript called WMLScript. 8

9 6. Write a simple program in WML for Temperature Converter. Temperature converter WML deck: 9

10 Scree shots: 10

Wireless Access Protocol(WAP) architecture

Wireless Access Protocol(WAP) architecture Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to

More information

Wireless Internet: layers 3,4,5. Wireless Internet: Layers 3,4,5 Case Study: WAP. WAP: Wireless Application Protocol

Wireless Internet: layers 3,4,5. Wireless Internet: Layers 3,4,5 Case Study: WAP. WAP: Wireless Application Protocol W.int.3-2 Wireless Internet: layers 3,4,5 Wireless Internet: Layers 3,4,5 Case Study: WAP Module W.int.3.WAP Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico

More information

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A

UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION PERVASIVE COMPUTING PART A UNIVERSITY EXAMINATIONS: NOV/DEC 2011 REGULATION 2008 080250049-PERVASIVE COMPUTING PART A 1. Mention the characteristics of pervasive computing. Minimal user distraction Collaborative interaction User

More information

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol)

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol) Developing web applications for PDAs and Cellphones Mobile Station Execution Environment (MExE( MExE) MExE is a standard for defining various levels of wireless communication These levels are called classmarks

More information

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web.

Outline. CS5984 Mobile Computing HTTP. HTTP (especially 1.0) Problems 1/2. Dr. Ayman Abdel-Hamid, CS5984. Wireless Web. CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline HTTP HTTP 1.0 problems Approaches to help wireless access HTTP 1.1 enhancements System Architecture for Web

More information

Chapter 3. Technology Adopted. 3.1 Introduction

Chapter 3. Technology Adopted. 3.1 Introduction Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,

More information

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert.

WAP via ORBCOMM. Andrew R Cardoza, Sias Mostert. SSC00-X-7 WAP via ORBCOMM Andrew R Cardoza, Sias Mostert E-mail: acardoza@ing.sun.ac.za, mostert@eng.sun.ac.za Electronic Systems Laboratory, Department of Electrical and Electronic Engineering, University

More information

Mobile Applications - 1 Vehicles transmission of news, road condition etc ad-hoc network with near vehicles to prevent accidents

Mobile Applications - 1 Vehicles transmission of news, road condition etc ad-hoc network with near vehicles to prevent accidents WAP- Wireless Application Protocol Mobile Applications - 1 Vehicles transmission of news, road condition etc ad-hoc network with near vehicles to prevent accidents Emergencies early transmission of patient

More information

WAP. Bringing the internet to you. Cynthia Luk Marianne Morris Harvey Wong. 4 April, 2002 CMPUT 499

WAP. Bringing the internet to you. Cynthia Luk Marianne Morris Harvey Wong. 4 April, 2002 CMPUT 499 WAP Bringing the internet to you Cynthia Luk Marianne Morris Harvey Wong 4 April, 2002 CMPUT 499 Table of Contents Summary 3 Introduction... 4 What is (WAP)? WAP 2.0 Motivation for WAP WAP Architecture..

More information

Glossary. ADO.NET ActiveX Data Objects for.net. A set of data access technologies included in the.net Framework class libraries.

Glossary. ADO.NET ActiveX Data Objects for.net. A set of data access technologies included in the.net Framework class libraries. 308 Glossary Glossary 1G Developed in the 70s and 80s, the first generation (1G) wireless communications technology refers to the analog cellular technology. Popular 1G technology includes AMPS. 2G The

More information

Page 1. WAP Overview. An overview of the. Wireless Application Protocol to the IAB. Copyright IBM 2000

Page 1. WAP Overview. An overview of the. Wireless Application Protocol to the IAB. Copyright IBM 2000 Page 1 An overview of the Wireless Application Protocol to the IAB. Page 2 Introduction Request for Information WAP enabled GSM Phone Response Application Server WAP enabled PDAs Mobile device with wireless

More information

A Survey Paper on Wireless Access Protocol

A Survey Paper on Wireless Access Protocol A Survey Paper on Wireless Access Protocol Vikash Yadav 1, Monika Verma 2, Nisha 3 1,2 Department Of Computer Science & Engg., Harcourt Butler Technological Institute Kanpur, India, 3 Department Of Information

More information

POSTER SESSION. Wireless Cardiology Decision Support System. Proceedings Paper. Slide Presentation. Dr. Saji Salam SSI Technologies Chennai, India

POSTER SESSION. Wireless Cardiology Decision Support System. Proceedings Paper. Slide Presentation. Dr. Saji Salam SSI Technologies Chennai, India Proceedings Paper Slide Presentation Handouts Case Study POSTER SESSION Wireless Cardiology Decision Support System 16 Dr. Saji Salam SSI Technologies Chennai, India Anand Subramanian Software Solutions

More information

WAP Push Message Version 16-August-1999

WAP Push Message Version 16-August-1999 WAP Push Message Version 16-August-1999 Wireless Application Protocol Push Message Specification Notice: Wireless Application Protocol Forum, Ltd. 1999. Terms and conditions of use are available from the

More information

WAP Overview. Ric Howell, Chief Technology Officer, Concise Group Ltd.

WAP Overview. Ric Howell, Chief Technology Officer, Concise Group Ltd. WAP Overview Ric Howell, Chief Technology Officer, Concise Group Ltd. WAP (the Wireless Application Protocol) is a protocol for accessing information and services from wireless devices. WAP is defined

More information

Potential Threats to Mobile Network Security

Potential Threats to Mobile Network Security Potential Threats to Mobile Network Security (Can WAP virus infect the mobile phones?) BY K.NAGA MOHINI and P.RAMYA IV Btech (CSE) mohini.cse521@gmail.com IV Btech (CSE) ramya_pragada@yahoo.com COMPUTER

More information

EFFECTS OF COMPRESSION ON SYSTEM THROUGHPUT IN WIRELESS APPLICATION PROTOCOL (WAP) 2.0 ARCHITECTURE. KASHIF KHAN. Masters of Computer Science

EFFECTS OF COMPRESSION ON SYSTEM THROUGHPUT IN WIRELESS APPLICATION PROTOCOL (WAP) 2.0 ARCHITECTURE. KASHIF KHAN. Masters of Computer Science EFFECTS OF COMPRESSION ON SYSTEM THROUGHPUT IN WIRELESS APPLICATION PROTOCOL (WAP) 2.0 ARCHITECTURE. By KASHIF KHAN Masters of Computer Science Oklahoma State University Stillwater, Oklahoma 2005 Submitted

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

GRAPHICAL SIMULATION OF WIRELESS APPLICATION PROTOCOL

GRAPHICAL SIMULATION OF WIRELESS APPLICATION PROTOCOL International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) Vol.1, Issue 2 Dec 2011 42-58 TJPRC Pvt. Ltd., GRAPHICAL SIMULATION OF WIRELESS APPLICATION PROTOCOL Asst. Prof.

More information

Developing Mobile Applications

Developing Mobile Applications Developing Mobile Applications WAP 1 Organizations 3GPP (3G Partnership Program) IETF (Internet Enginering Task Force) W3C (World Wide Web Consortium) OMA (Open Mobile Aliance) IANA (Internet Assigned

More information

Overview. M-commerce vs. E-commerce

Overview. M-commerce vs. E-commerce M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

MOBILE IP AND WIRELESS APPLICATION PROTOCOL

MOBILE IP AND WIRELESS APPLICATION PROTOCOL MOBILE IP AND WIRELESS APPLICATION PROTOCOL In this chapter, we look at two standards that provide application-level support for wireless networking: Mobile IP and Wireless Application Protocol (WAP).

More information

The Wireless Application Protocol

The Wireless Application Protocol International Journal of Network Security, Vol.1, No.3, PP.161 165, Nov. 2005 (http://isrc.nchu.edu.tw/ijns/) 161 The Wireless Application Protocol Dave Singelée and Bart Preneel (Corresponding author:

More information

WAP Provisioning Architecture Overview

WAP Provisioning Architecture Overview WAP Provisioning Architecture Overview WAP-182-PROVARCH Proposed Version 19-February-2000 Wireless Application Protocol WAP Provisioning Architecture Overview Wireless Application Protocol Forum Ltd.2000.

More information

Performance Evaluation on WAP and Internet Protocol over 3G Wireless Networks

Performance Evaluation on WAP and Internet Protocol over 3G Wireless Networks Performance Evaluation on WAP and Internet Protocol over 3G Wireless Networks Hidetoshi Ueno, Norihiro Ishikawa, Hideharu Suzuki, Hiromitsu Sumino, and Osamu Takahashi NTT DoCoMo, Multimedia Laboratories

More information

Enabling the Wireless Internet

Enabling the Wireless Internet Enabling the Wireless Internet Presented to IEEE CVT-Dallas February 15, 2000 Barry Herbert barry.herbert herbert@nortelnetworks.com Operator Market Dynamics Price/Min in U.S. Cents 16 14 12 10 8 6 4 2

More information

WIRELESS APPLICATION PROTOCOL (WAP)

WIRELESS APPLICATION PROTOCOL (WAP) WIRELESS APPLICATION PROTOCOL (WAP) PRESENTED BY: D.R.Esesve III/IV B.Tech ECE. VITAM COLLEGE OF ENGINEERING. DRESESVE@YAHOO.COM VITAM COLLEGE OF ENGG. PARVATHIPURAM. URL: members.rediff.com/dresesve/wap.html

More information

Location Protocols. Version 12-Sept Wireless Application Protocol WAP-257-LOCPROT a

Location Protocols. Version 12-Sept Wireless Application Protocol WAP-257-LOCPROT a Location Protocols Version 12-Sept-2001 Wireless Application Protocol WAP-257-LOCPROT-20010912-a A list of errata and updates to this document is available from the WAP Forum Web site, http://www.wapforum.org/,

More information

WAP TM Architecture WAP-210-WAPArch Proposed Version 17-October-2000

WAP TM Architecture WAP-210-WAPArch Proposed Version 17-October-2000 WAP TM Architecture WAP-210-WAPArch Proposed Version 17-October-2000 Wireless Application Protocol Architecture Specification Disclaimer: This document is a work in progress and is not an approved WAP

More information

Introduction to LAN/WAN. Application Layer (Part III)

Introduction to LAN/WAN. Application Layer (Part III) Introduction to LAN/WAN Application Layer (Part III) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (E-mail) (7.2) World Wide Web (7.3) Performance Enhancements Wireless Web Web

More information

in Wireless Application Protocol World

in Wireless Application Protocol World WWW.HR in Wireless Application Protocol World Abstract Hrvoje Komericki, Mario Kušek University of Zagreb Department of Telecommunications Faculty of Electrical Engineering and Computing Unska 3, HR 10000

More information

WIRELESS APPLICATION PROTOCOL

WIRELESS APPLICATION PROTOCOL A Seminar report On WIRELESS APPLICATION PROTOCOL Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science SUBMITTED TO: www.studymafia.org

More information

WAP WINA Process Document WAP-212-WINAProcess Version 04-Feb-2002

WAP WINA Process Document WAP-212-WINAProcess Version 04-Feb-2002 WAP WINA Process Document WAP-212-WINAProcess Version 04-Feb-2002 Wireless Application Protocol WAP Interim Naming Authority Process Document Disclaimer: The document is subject to change without notice.

More information

Wireless Profiled HTTP

Wireless Profiled HTTP WAP-229-HTTP-20010329-a, Version 29-Mar-2001 Page 1 (16) Wireless Profiled HTTP Version 29-Mar-2001 Wireless Application Protocol WAP-229-HTTP-20010329-a A list of errata and updates to this document is

More information

Wireless Application Protocol WAP. F. Ricci 2008/2009

Wireless Application Protocol WAP. F. Ricci 2008/2009 Wireless Application Protocol WAP F. Ricci 2008/2009 Content Web and mobility Problems of HTML in the mobile context Wap 1.x Motivations Features Architecture Examples of WML (Wireless Markup Language)

More information

The WAP Roadmap. Short Term Goals for WAP

The WAP Roadmap. Short Term Goals for WAP The WAP Roadmap Authors: Alastair Angwin, WAP Specification Committee / IBM UK Laboratories (alastair_angwin@uk.ibm.com) Bill Coan, WAP Specification Committee / AT&T Wireless Services / Global Operators

More information

SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL

SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL 826 SECURE SMART GRID DEVICE for HOME AREA NETWORKS Using WIRELESS APPLICATION PROTOCOL S. RAM KANNAN B.E, CSE Chennai, TN India ramkannan1991@gmail.com R. SABARISH B.E, CSE Chennai, TN India sabarish.raghu@gmail.com

More information

Table of Contents. WAP Process. WAP Architecture. Wireless Transport Protocol Overview. Wireless Session Protocol Overview

Table of Contents. WAP Process. WAP Architecture. Wireless Transport Protocol Overview. Wireless Session Protocol Overview Table of Contents WAP Process WAP Architecture Wireless Transport Protocol Overview Wireless Session Protocol Overview Wireless Application environment Overview WAP Process Objectives of WAP Membership

More information

INTEGRATION OF SECURITY PROTOCOL IN BETWEEN THE NETWORK GATEWAY

INTEGRATION OF SECURITY PROTOCOL IN BETWEEN THE NETWORK GATEWAY INTEGRATION OF SECURITY PROTOCOL IN BETWEEN THE NETWORK GATEWAY 1 Kamini, 2 Rajiv Mahajan, 1 Rachit Garg 1 Lovely Professional University, School of Computer Applications, Phagwara (Punjab) 2 Global Institute

More information

Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network

Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network 1 Application Application: A software (S/W) for an application, such as, creating and sending an SMS, measuring and sending

More information

WAP/ WML : Wireless Protocol wireless protocol

WAP/ WML : Wireless Protocol wireless protocol Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity

More information

Page 1. File systems Motivation EEC173B/ECS152C. File systems for limited connectivity (1) File systems consistency problems

Page 1. File systems Motivation EEC173B/ECS152C. File systems for limited connectivity (1) File systems consistency problems EEC173B/ECS152C Support for Mobility File systems & data bases WWW & mobility WAP (Wireless Application Protocol) i-mode & J2ME Acknowledgment: Selected slides from Jochen Schiller File systems Motivation

More information

4. B2C,B2E Systems: Concepts and Architectures

4. B2C,B2E Systems: Concepts and Architectures 4. B2C,B2E Systems: Concepts and Architectures 4.1 Business-to-Consumer Systems Architectures and Components Shop Functionalities, Selected Components 4.2 Electronic Fulfillment & Payment Secure Communication,

More information

Internet protocol stack

Internet protocol stack Mobile Protocols David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh dtipper@mail.sis.pitt.edu http://www.sis.pitt.edu/~dtipper/2727.html

More information

Protocol Compliance Statements for the CSG2

Protocol Compliance Statements for the CSG2 APPENDIXC This appendix provides protocol compliance statements for the CSG2. Any RFCs that are not explicitly listed are not supported. Layer 4 Inspection (parse protocol=other) The Cisco Content Services

More information

Wireless Application Protocol (WAP)

Wireless Application Protocol (WAP) Wireless Application Protocol (WAP) 1 Motivation and Overview Mobile radio networks and cellular phones possess special properties and requirements Display: limited sizes and presented colors, numerical

More information

CS Mobile and Pervasive Computing

CS Mobile and Pervasive Computing CS2402 - Mobile and Pervasive Computing UNIT 1 TWO MARK QUESTIONS IN UNIT-1 1. Define SAMA. 2. Define CDMA. 3..What are the several versions in CSMA? 4.What is meant by non-persistent CSMA? 5.What is meant

More information

Protocol Compliance Statements for the CSG2

Protocol Compliance Statements for the CSG2 APPENDIXJ This appendix provides protocol compliance statements for the CSG2. Any RFCs that are not explicitly listed are not supported. Layer 4 Inspection (parse protocol=other) The Cisco Content Services

More information

WAP Access to SCADA-Typed Database System

WAP Access to SCADA-Typed Database System WAP Access to SCADA-Typed Database System WAI-LEUNG CHEUNG, YONG YU, YU-FAI FUNG Department of Electrical Engineering, The Hong Kong Polytechnic University HONG KONG Abstract: - This paper discusses the

More information

Cache Operation. Version 31-Jul Wireless Application Protocol WAP-175-CacheOp a

Cache Operation. Version 31-Jul Wireless Application Protocol WAP-175-CacheOp a Cache Operation Version 31-Jul-2001 Wireless Application Protocol WAP-175-CacheOp-20010731-a A list of errata and updates to this document is available from the WAP Forum Web site, http://www.wapforum.org/,

More information

CS2402-MOBILE AND PERVASIVE COMPUTING

CS2402-MOBILE AND PERVASIVE COMPUTING CS2402-MOBILE AND PERVASIVE COMPUTING UNIT 1 TWO MARK QUESTIONS IN UNIT-1 1. Define SAMA. 2. Define CDMA. 3..What are the several versions in CSMA? 4.What is meant by non-persistent CSMA? 5.What is meant

More information

M Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay

M Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay M Commerce: Mobile Applications Sridhar Iyer K R School of Information Technology IIT Bombay sri@it.iitb.ernet.in http://www.it.iitb.ernet.in/~sri Outline Mobile applications Wireless networking Routing

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

Web as a Distributed System

Web as a Distributed System Web as a Distributed System The World Wide Web is a large distributed system. In 1998 comprises 70-75% of Internet traffic. With large transfers of streaming media and p2p, no longer a majority of bytes,

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security

An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security An Internet Framework to Bring Coherence between and HTTP Ensuring Better Mobile Internet Security Al-Mukaddim Khan Pathan, Md. Abdul Mottalib and Minhaz Fahim Zibran* Department of Computer Science and

More information

Kannel Architecture and Design

Kannel Architecture and Design Kannel Architecture and Design $Revision: 1.19 $ Lars Wirzenius Gateway architect Wapit Ltd liw@wapit.com Kannel Architecture and Design: $Revision: 1.19 $ by Lars Wirzenius This document examines the

More information

Mobile Application Protocols

Mobile Application Protocols Mobile Application Protocols David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh dtipper@mail.sis.pitt.edu Slides 18 Mobile Protocols Consider existing

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur

ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur ROEVER COLLEGE OF ENGINEERING AND TECHNOLOGY Elambalur, Perambalur - 621220 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : IV/ VII Subject Code : CS2402 Subject Name : MOBILE AND PERVASIVE

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Copyright Copyright (c) G LAB Limited. ALL RIGHTS RESERVED. Revision History Revision svn-r

Copyright Copyright (c) G LAB Limited. ALL RIGHTS RESERVED. Revision History Revision svn-r Copyright Copyright Copyright (c) 2001 3G LAB Limited. ALL RIGHTS RESERVED. The 3G LAB logo and Alligata logo are copyright of 3G LAB Limited in the US and other countries. In addition no part of any documentation

More information

Wireless Medium Access Control and CDMA-based Communication Lesson 15 i-mode

Wireless Medium Access Control and CDMA-based Communication Lesson 15 i-mode Wireless Medium Access Control and CDMA-based Communication Lesson 15 i-mode 1 i-mode i-mode Internet services WCDMA based NTT DoCoMo in Japan 2 i-mode Uses adaptive multi-rate encoding A cost-effective

More information

Chapter - 6 WIRELESS NETWORK SECURITY

Chapter - 6 WIRELESS NETWORK SECURITY Chapter - 6 WIRELESS NETWORK SECURITY Bhargavi H Goswami Assistant Professor Sunshine Group of Institutes Rajkot, Gujarat, India. Mob: 9426669020 Email: bhargavigoswami@gmail.com Topic List 1. IEEE 802.11

More information

UNIT V MOBILE TRANSPORT LAYER AND SUPPORT FOR MOBILITY

UNIT V MOBILE TRANSPORT LAYER AND SUPPORT FOR MOBILITY UNIT V MOBILE TRANSPORT LAYER AND SUPPORT FOR MOBILITY Mobile transport layer Traditional TCP-Indirect Snooping-Mobile TCP -Support for Mobility-WWW-Wireless Application Protocol. TRADITIONAL TCP Mechanisms

More information

13. Databases on the Web

13. Databases on the Web 13. Databases on the Web Requirements for Web-DBMS Integration The ability to access valuable corporate data in a secure manner Support for session and application-based authentication The ability to interface

More information

Jawaharlal Nehru Engineering College

Jawaharlal Nehru Engineering College Jawaharlal Nehru Engineering College Laboratory Manual Mobile Computing For Final Year Students Lab Manual Made By Ms. A. R. Salunke Author JNEC, Aurangabad FOREWORD It is my great pleasure to present

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8] Code No: RR410402 Set No. 1 1. (a) List two advantages and two disadvantages of having international standards for network, Protocols? (b) With a neat diagram, explain the functionality of layers, protocols

More information

Foundations of Python

Foundations of Python Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the

More information

Foreword by Katie Moussouris... Acknowledgments... xvii. Introduction...xix. Chapter 1: The Basics of Networking... 1

Foreword by Katie Moussouris... Acknowledgments... xvii. Introduction...xix. Chapter 1: The Basics of Networking... 1 Brief Contents Foreword by Katie Moussouris.... xv Acknowledgments... xvii Introduction...xix Chapter 1: The Basics of Networking... 1 Chapter 2: Capturing Application Traffic... 11 Chapter 3: Network

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Thin Client Content Options

Thin Client Content Options Content Adaptation and Provisioning David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh tipper@tele.pitt.edu http://www.sis.pitt.edu/~dtipper/2727.html

More information

Service Indication. Version 31-July Wireless Application Protocol WAP-167-ServiceInd a

Service Indication. Version 31-July Wireless Application Protocol WAP-167-ServiceInd a Service Indication Version 31-July-2001 Wireless Application Protocol WAP-167-ServiceInd-20010731-a A list of errata and updates to this document is available from the WAP Forum Web site, http://www.wapforum.org/,

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Week #1 (January 4-8) Current Generation Networks: From 2G to 25G Week #2 (January 11-15) Value added Services in Current Generation Networks Week #3 (January 18-22) Next Generation Network Vision Session

More information

UNDERGRADUATE PROJECT REVIEW REPORT

UNDERGRADUATE PROJECT REVIEW REPORT NAPIER UNIVERSITY SCHOOL OF COMPUTING UNDERGRADUATE PROJECT REVIEW REPORT 1. Student details Name: COLAS Bertrand Matriculation no: 00279226 Programme: Beng CNDS Email Address: bertrand_colas@hotmail.com

More information

OMA-ETS-DL-OTA-v1_ a Page 1 (24)

OMA-ETS-DL-OTA-v1_ a Page 1 (24) OMA-ETS-DL-OTA-v1_0-20040317-a Page 1 (24) Enabler Test Specification for Download 1.0 Version 1.0, 17-Mar-2004 Open Mobile Alliance OMA-ETS-DL-OTA-v1_0-20040317-a OMA-ETS-DL-OTA-v1_0-20040317-a Page 2

More information

Black Hat Europe 2009

Black Hat Europe 2009 Black Hat Europe 2009 Mobile Security Lab Hijacking Mobile Data Connections 1 Provisioning & WAP primer Forging Messages Demo: Remote provisioning Provisioning: Process and Issues Attack scenario and exploiting

More information

WWW, REST, and Web Services

WWW, REST, and Web Services WWW, REST, and Web Services Instructor: Yongjie Zheng Aprile 18, 2017 CS 5553: Software Architecture and Design World Wide Web (WWW) What is the Web? What challenges does the Web have to address? 2 What

More information

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture Pervasive Web Application Architecture History Scalability Availability Development Application Architecture It support multiple devices, such as PCs, WAP phones, PDAs and voice-only phones enables to

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 20 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Class Conformance Requirements

Class Conformance Requirements Class Conformance Requirements Version 17-May-2002 Wireless Application Protocol WAP-262-ClassConform-20020517-a A list of errata and updates to this document is available from the WAP Forum Web site,

More information

Push Security Requirements

Push Security Requirements Push Security Requirements Candidate Version 1.0 25 Jan 2005 Open Mobile Alliance OMA-RD-PushSecurity-V1_0-20050125-C OMA-RD-PushSecurity-V1_0-20050125-C Page 2 (22) Use of this document is subject to

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

COMP327 Mobile Computing Session:

COMP327 Mobile Computing Session: COMP327 Mobile Computing Session: 2018-2019 Lecture Set 7 - The Mobile Internet [ last updated: 12 November 2018 ] 1 In this Lecture Set Challenges of Mobile access to the Internet Early Wireless Internet

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Multimedia Messaging Service Architecture Overview

Multimedia Messaging Service Architecture Overview Multimedia Messaging Service Architecture Overview Approved Version 1.1 15 Jul 2004 Open Mobile Alliance OMA-WAP-MMS-ARCH-V1_1-20040715-A Continues the Technical Activities Originated in the WAP Forum

More information

III/IV B.Tech (Regular/Supplementary) DEGREE EXAMINATION Wireless Networks (14IT602) Scheme of Evaluation

III/IV B.Tech (Regular/Supplementary) DEGREE EXAMINATION Wireless Networks (14IT602) Scheme of Evaluation III/IV B.Tech (Regular/Supplementary) DEGREE EXAMINATION Wireless Networks (14IT602) Scheme of Evaluation Time: Three Hours Answer Question No.1 compulsorily. (1X12 = 12 Marks) Answer ONE question from

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Data Communication & Computer Networks MCQ S

Data Communication & Computer Networks MCQ S Data Communication & Computer Networks MCQ S 1. The translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay

More information

WAP - QUICK GUIDE WAP - INTRODUCTION

WAP - QUICK GUIDE WAP - INTRODUCTION WAP - QUICK GUIDE http://www.tutorialspoint.com/wap/wap_quick_guide.htm Copyright tutorialspoint.com WAP - INTRODUCTION [WAP is] the de facto worldwide standard for providing Internet communications and

More information

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

More information

Implementation of a WAP model to evaluate Capacity in 3G radio access networks. Henrik Fållby

Implementation of a WAP model to evaluate Capacity in 3G radio access networks. Henrik Fållby Implementation of a WAP model to evaluate Capacity in 3G radio access networks Henrik Fållby Outline Scoop of this thesis Packet switched vs. circuit switched networks Packet Data in GSM radio networks

More information

Cisco Mobile Pilot. Colin Seward - MCOE April 11 th 2002

Cisco Mobile Pilot. Colin Seward - MCOE April 11 th 2002 Cisco Mobile Pilot Colin Seward - MCOE April 11 th 2002 2001, Cisco Systems, Inc. All 2001, rights Cisco reserved. Systems, Inc. All rights reserved. 1 Productivity Gains from Internet Business Solutions

More information

Enabling Embedded Systems to access Internet Resources

Enabling Embedded Systems to access Internet Resources Enabling Embedded Systems to access Internet Resources Embedded Internet Book www.embeddedinternet.org 2 Agenda : RATIONALE Web Services: INTRODUCTION HTTP Protocol: REVIEW HTTP Protocol Bindings Testing

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information