Wireless Application Protocol
Last Updated :
28 Aug, 2023
The Wireless Application Protocol (WAP) is a set of communication protocols and an application programming model based on the World Wide Web (WWW). Its hierarchical structure is quite similar to the TCP/IP protocol stack design.
What is Wireless Application Protocol (WAP)?
WAP stands for Wireless Application Protocol. It is a protocol designed for micro-browsers and it enables access to the internet in mobile devices. It uses the markup language WML (Wireless Markup Language and not HTML), WML is defined as an XML 1.0 application. It enables the creation of web applications for mobile devices. In 1998,
WAP Forum was founded by Ericson, Motorola, Nokia and Unwired Planet whose aim was to standardize the various wireless technologies via protocols. WAP protocol resulted from the joint efforts of the various members of WAP Forum. In 2002, WAP forum was merged with various other forums in the industry resulting in the formation of
Open Mobile Alliance (OMA)

WAP Model
The user opens the mini-browser in a mobile device. He selects a website that he wants to view. The mobile device sends the URL encoded request via network to a WAP gateway using WAP protocol.

The WAP gateway translates this WAP request into a conventional HTTP URL request and sends it over the internet. The request reaches to a specified web server and it processes the request just as it would have processed any other request and sends the response back to the mobile device through WAP gateway in WML file which can be seen in the micro-browser.
WAP Protocol stack

- Application Layer: This layer contains the Wireless Application Environment (WAE). It contains mobile device specifications and content development programming languages like WML.
- Session Layer: This layer contains Wireless Session Protocol (WSP). It provides fast connection suspension and reconnection.
- Transaction Layer: This layer contains Wireless Transaction Protocol (WTP). It runs on top of UDP (User Datagram Protocol) and is a part of TCP/IP and offers transaction support.
- Security Layer: This layer contains Wireless Transport Layer Security (WTLS). It offers data integrity, privacy and authentication.
- Transport Layer: This layer contains Wireless Datagram Protocol. It presents consistent data format to higher layers of WAP protocol stack.
Why Use WAP?
The following advantages for wireless network operators, content producers, and end users were put out by WAP when it was first introduced in 1999:
Operators of wireless networks and mobile phones: WAP was created with the intention of enhancing already-existing wireless data services, such as voicemail, and facilitating the creation of new mobile applications. Without making any further infrastructure adjustments or phone modifications, these applications might be created.
Content Provider: For third-party application developers, WAP opened up a market for extra applications and mobile phone features. It was suggested that developers use the WML programming language to write applications for mobile devices.
End users: Access to online services like banking, entertainment, messaging, and other information on mobile devices should be simple and safe for users of mobile phones. WAP could also permit access.
Advantages of Wireless Application Protocol
The benefits of Wireless Application Protocol, or WAP, are listed below:
- WAP is a rapidly evolving technology.
- Wireless Application Protocol is an open source that is totally free of cost.
- WAP can be used over multiple platforms.
- Neither it nor network standards are affected.
- Higher controlling possibilities are offered.
- It follows a model that is similar to the Internet.
- You can send and receive real-time data with WAP.
- WAP is supported by the majority of current mobile phones and devices.
Disadvantages of Wireless Application Protocol
The following is a list of various Wireless Application Protocol, or WAP, drawbacks:
- WAP connection speed is slow and number of connections are less.
- At some places it is very difficult to access the Internet, and also at some places it is totally impossible.
- Less secure.
- WAP provides a small User interface (UI).
Similar Reads
Wireless Principles in CCNA Wireless communication takes place over free space over RF (Radio Frequency), where one device (transmitter) sends a signal to another device (receiver). Two devices (transmitter and receiver) must use the same frequency (or channel) to communicate with each other. Radio frequencies can cause interf
4 min read
Generations of wireless communication We have made very huge improvements in wireless communication and have expanded the capabilities of our wireless communication system. We all have seen various generations in our life. Let's discuss them one by one. 0th Generation: Pre-cell phone mobile telephony technology, such as radio telephones
2 min read
Wireless Communication | Set 1 Before talking about wireless medium, we need to talk about the wired medium. Wired network is a bounded medium where data travels over a path that a wire or cable takes. In modern era of advanced and enormous no of devices, wired medium of communication imposes a restriction on fluent communication
3 min read
Wireless Communication | Set 3 Prerequisite - Wireless Communication | Set 2 Earlier, we talked about various Authentication methods. Now we talked about another aspect of wireless security, The Integrity. Integrity means the correctness of messages sent over the wireless network or the internet. Original 802.11 standard defined
2 min read
Wireless Communication | Set 2 Prerequisite - Wireless Communication | Set 1 Basic Service Set : We know that wireless communication takes place over the Air. To regulate connection to devices, we need to make every wireless service area a closed group of mobile devices that form around a fixed device. Before mobile devices start
3 min read
Wireless Local Loop Local loop is a circuit line from a subscriber's phone to the local central office (LCO). But the implementation of local loop of wires is risky for the operators, especially in rural and remote areas due to less number of users and increased cost of installation. Hence, the solution for it is the u
3 min read
Constrained Application Protocol (CoAP) The Constrained Application Protocol (CoAP) is a special web transfer protocol that operates with constrained nodes and networks. These networks are commonly used for applications such as the Internet of Things (IoT), where devices may have limited processor, memory, and power resources. CoAP is int
7 min read
Classification of MAC protocols The Media Access Control (MAC) is the first protocol layer above the Physical Layer in ad hoc. The primary task of any MAC protocol is to control the access of the nodes to a shared medium. It plays an important role in coordinating access to the shared communication medium. To achieve this phase va
5 min read
MAC Protocol Used in Wireless Sensor Networks Pre-requisites: Classification of MAC Protocols In Wireless Sensor Networks (WSNs), the Medium Access Control (MAC) protocol is a set of guidelines that dictate how each node should transmit data over the shared wireless medium. The primary objective of the MAC protocol is to minimize the occurrence
6 min read
Wireless Network Roaming and Handover Protocols Wireless network roaming and handover protocols does play a significant role in for mobile devices by ensuring seamless connectivity by switching between access point within WLAN(wireless local area network) and provided uninterrupted internet access to it's user regardless of the location. In this
7 min read