0% found this document useful (0 votes)
16 views

MC unit-II

Uploaded by

Rahil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

MC unit-II

Uploaded by

Rahil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

MOBILE COMPUTING

Unit - iI

[email protected]
Wireless Networks
 Computer networks that are not connected by cables are called wireless
networks. They generally use radio waves for communication between the
network nodes. They allow devices to be connected to the network while
roaming around within the network coverage.

[email protected]
Types of Wireless Networks
 Wireless LANs − Connects two or more network devices using wireless
distribution techniques.
 Wireless MANs − Connects two or more wireless LANs spreading over a
metropolitan area.
 Wireless WANs − Connects large areas comprising LANs, MANs and
personal networks.
Advantages of Wireless Networks
 It increases the mobility of network devices connected to the system since the
devices need not be connected to each other.
 Accessing network devices from any location within the network coverage or
Wi-Fi hotspot becomes convenient since laying out cables is not needed.
 Installation and setup of wireless networks are easier.
 New devices can be easily connected to the existing setup since they needn’t
be wired to the present equipment. Also, the number of equipment that can be
added or removed to the system can vary considerably since they are not
limited by the cable capacity. This makes wireless networks very scalable.
 Wireless networks require very limited or no wires. Thus, it reduces the
equipment and setup costs.
[email protected]
Introduction to Wireless LAN
 Wireless LAN stands for Wireless Local Area
Network. It is also called LAWN (Local Area Wireless
Network). WLAN is one in which a mobile user can
connect to a Local Area Network (LAN) through a
wireless connection.
 Wireless LANs provide high speed data communication
in small areas such as building or an office. WLANs
allow users to move around in a confined area while
they are still connected to the network.
 In some instance wireless LAN technology is used to
save costs and avoid laying cable, while in other cases, it
is the only option for providing high-speed internet
access to the public. Whatever the reason, wireless
solutions are popping up everywhere.
[email protected]
Advantages of WLANs
 Flexibility: Within radio coverage, nodes can communicate without further
restriction. Radio waves can penetrate walls, senders and receivers can be placed
anywhere (also non-visible, e.g., within devices, in walls etc.).
 Planning: Only wireless ad-hoc networks allow for communication without
previous planning, any wired network needs wiring plans.
 Design: Wireless networks allow for the design of independent, small devices
which can for example be put into a pocket. Cables not only restrict users but also
designers of small notepads, PDAs, etc.
 Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc.
whereas, networks requiring a wired infrastructure will usually break down
completely in disasters.
 Cost: The cost of installing and maintaining a wireless LAN is on average lower
than the cost of installing and maintaining a traditional wired LAN, for two reasons.
First, after providing wireless access to the wireless network via an access point for
the first user, adding additional users to a network will not increase the cost. And
second, wireless LAN eliminates the direct costs of cabling and the labor associated
with installing and repairing it.
 Ease of Use: Wireless LAN is easy to use and the users need very little new
information to take advantage of WLANs.
[email protected]
Disadvantages of WLANs
 Quality of Services: Quality of wireless LAN is typically lower than wired networks. The
main reason for this is the lower bandwidth due to limitations is radio transmission, higher
error rates due to interference and higher delay/delay variation due to extensive error
correction and detection mechanisms.
 Proprietary Solutions: Due to slow standardization procedures, many companies have come
up with proprietary solutions offering standardization functionality plus many enhanced
features. Most components today adhere to the basic standards IEEE 802.11a or 802.11b.
 Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation and
restrict frequencies to minimize interference.
 Global operation: Wireless LAN products are sold in all countries so, national and
international frequency regulations have to be considered.
 Low Power: Devices communicating via a wireless LAN are typically power consuming, also
wireless devices running on battery power. Whereas the LAN design should take this into
account and implement special power saving modes and power management functions.
 License free operation: LAN operators don't want to apply for a special license to be able to
use the product. The equipment must operate in a license free band, such as the 2.4 GHz ISM
band.
 Robust transmission technology: If wireless LAN uses radio transmission, many other
electrical devices can interfere with them (such as vacuum cleaner, train engines, hair dryers,
etc.).Wireless LAN transceivers cannot be adjusted for perfect transmission is a standard office
or production environment.
[email protected]
What is the MAC?
 MAC stands for media access control that is an address, called
hardware address and physical address. It is a type of address,
which is given to all computers individually or network devices,
and it is exclusively arranged in hexadecimal format. It is not
related to Apple Macintosh computers and is manufactured into
every network card like a Wi-Fi card or an Ethernet card. Usually,
it is assigned by a hardware manufacturer. MAC addresses are
implemented in most network types, but they cannot be changed.
 There are more than thousands of networkable devices available,
and all devices need a unique MAC address and a wide range of
possible addresses. Therefore, the six two-digit hexadecimal
numbers are used to make the MAC addresses, and they are
separated by colons. The given address is an example of a MAC
address:
 E4-CE-D9-5D-46-11A
[email protected]
The Hidden Terminal Problem
 In wireless LANs ( wireless local area networks), the hidden terminal problem is a
transmission problem that arises when two or more stations who are out of range of each other
transmit simultaneously to a common recipient. This is prevalent in decentralised systems
where there aren’t any entity for controlling transmissions. This occurs when a station is visible
from a wireless access point (AP), but is hidden from other stations that communicate with the
AP.
Problem Illustration
 Suppose that there are three stations labelled STA, STB, and STC, where STA and STC are
transmitting while STB is receiving. The stations are in a configuration such that the two
transmitters STA and STC are not in the radio range of each other. This is shown in the
following figure −

[email protected]
The Exposed Terminal Problem
 In wireless LANs (wireless local area networks), the exposed terminal
problem is a transmission problem that arises when a transmitting station is
prevented from sending frames due to interference with another
transmitting station. This is prevalent in decentralized systems where there
aren’t any entity for controlling transmissions. This occurs when a station is
visible from a wireless access point (AP), but not from other stations that
communicate with the AP.

[email protected]
Solution

 The exposed terminal problem is solved by the MAC (medium access


control) layer protocol IEEE 802.11 RTS/CTS, with the condition that the
stations are synchronized and frame sizes and data speed are the same. RTS
stands for Request to Send and CTS stands for Clear to Send.
 A transmitting station sends a RTS frame to the receiving station. The
receiving station replies by sending a CTS frame. On receipt of CTS frame,
the transmitting station begins transmission.
 Any station hearing the RTS is close to the transmitting station and remains
silent long enough for the CTS. Any station hearing the CTS is close to the
receiving station and remains silent during the data transmission.
 In the above example, station STC hears does not hear RTS from station
STA, but hears CTS frame from station STB. So, it understands that STB is
busy defers its transmission thus avoiding collision.

[email protected]
Bluetooth Technology
 Bluetooth technology is a high speed and low powered wireless technology
designed to connect phones or other portable equipment for communication or file
transmissions Bluetooth is also known as IEEE 802.15 standard or specification that
uses low power radio communications to link phones, computers and other network
devices over a short distance without using any type of connecting wires.
 As Bluetooth is an open wireless technology standard so, it is used to send or
receive data to connected devices present across a certain distance using a band of
2.4 to 2.485 GHz.
 In Bluetooth technology, the wireless signals transmit data and files over a short
distance, typically up to 30 feet or 10 meters.
 Bluetooth technology was developed by a group of 5 companies known as Special
Interest Group formed in 1998. The companies are Ericsson, Intel, Nokia, IBM, and
Toshiba.
 The range of Bluetooth technology for data exchange was up to 10 meters in older
versions of devices, but the latest version of Bluetooth technology i.e., Bluetooth
5.0, can exchange data in the range of about 40-400 meters.
 The average speed of data transmission in Bluetooth technology was around 1 Mbps
in the very first version. The second version was 2.0+ EDR, which provided the
data rate speed of 3Mbps. The third was 3.0+HS, which provided the speed of 24
Mbps. The latest version of this technology is 5.0.
[email protected]
History of Bluetooth
 There is an amazing story behind the history of Bluetooth technology.
The Bluetooth wireless technology was named after a Danish King
named Harald Blatand. His last name means "Bluetooth" in English.
The name "Bluetooth" was awarded to this technology because the
Danish King named Harald Blatand was united the Denmark and
Norway, same as Bluetooth wireless technology is used to unite two
disparate devices for communication or data transmission.
 Ericsson Mobile Communications started the development of
Bluetooth technology in 1994. The main motive behind the
development of this amazing technology was to find an alternative to
the use of cables for communication between mobile phones and
other devices. In 1998, 4 big companies of that time named Ericsson,
IBM, Nokia and Toshiba formed the Bluetooth Special Interest Group
(SIG), which published the 1st version of Bluetooth technology in
1999. After that, four versions have been released. The latest version
of this technology is Bluetooth 5.0.
[email protected]
The Architecture of Bluetooth Technology

 In Bluetooth technology, the network of Bluetooth consists of a Personal


Area Network or a
 Bluetooth's architecture is also called a "Piconet" because it is made of
multiple networks.
 It contains a minimum of 2 to a maximum of 8 Bluetooth peer devices.
 It usually contains a single master and up to 7 slaves.
 Piconet provides the technology which facilitates data transmission based
on its nodes, i.e., Master node and Slave Nodes.
 The master node is responsible for sending the data while the slave nodes
are used to receive the data.
 In Bluetooth technology, data transmission occurs through Ultra-High
frequency and short-wavelength radio waves.
 The Piconet uses the concept of multiplexing and spread spectrum. It is a
combination of code division multiple access (CDMA) and frequency
hopping spread spectrum (FHSS) technique.

[email protected]
How does Bluetooth work?
 As we stated that there is one master and up to 7 slaves may exist for a Bluetooth
connection. The master is the device that initiates communication with other
devices. The master device handles the communications link and traffic between
itself and the slave devices associated with it. The slave devices have to respond to
the master device and synchronize their transmit/receive timing with the master
device's specified time.
 Maximum number of Master Node - 1
 Maximum number of Slave Nodes - 7
 Maximum number of Nodes in a Piconet - 8
 Maximum number of devices that can be paired - 2 8 - 1 = 255
 Number of devices that can be parked → Infinite (∞)

[email protected]
Wireless Communication - Multiple Access
 in wireless communication systems, it is often desirable to allow the
subscriber to send information simultaneously from the mobile
station to the base station while receiving information from the base
station to the mobile station.
 A cellular system divides any given area into cells where a mobile
unit in each cell communicates with a base station. The main aim in
the cellular system design is to be able to increase the capacity of
the channel, i.e., to handle as many calls as possible in a given
bandwidth with a sufficient level of quality of service.
 There are several different ways to allow access to the channel. These
includes mainly the following −

 Frequency division multiple-access (FDMA)


 Time division multiple-access (TDMA)
 Code division multiple-access (CDMA)
 Space division multiple access (SDMA)
[email protected]
Frequency Division Multiple Access (FDMA)

 FDMA is the basic technology for advanced mobile phone services. The
features of FDMA are as follows.
 FDMA allots a different sub-band of frequency to each different user to
access the network.
 If FDMA is not in use, the channel is left idle instead of allotting to the
other users.
 The base station BS and mobile station MS, transmit and receive
simultaneously and continuously in FDMA.
Time Division Multiple Access (TDMA)
 In the cases where continuous transmission is not required, there TDMA is
used instead of FDMA. The features of TDMA include the following.
 TDMA shares a single carrier frequency with several users where each
users makes use of non-overlapping time slots.
 Data transmission in TDMA is not continuous, but occurs in bursts. Hence
handoff process is simpler.
 TDMA has an advantage that is possible to allocate different numbers of
time slots per frame to different users.

[email protected]
Code Division Multiple Access (CDMA)
 Code division multiple access technique is an example of multiple access where
several transmitters use a single channel to send information simultaneously. Its
features are as follows.
 In CDMA every user uses the full available spectrum instead of getting allotted
by separate frequency.
 CDMA is much recommended for voice and data communications.
 While multiple codes occupy the same channel in CDMA, the users having same
code can communicate with each other..
 The hands-off between base stations is very well handled by CDMA.

Space Division Multiple Access (SDMA)


 Space division multiple access or spatial division multiple access is a technique
which is MIMO (multiple-input multiple-output) architecture and used mostly in
wireless and satellite communication. It has the following features.
 All users can communicate at the same time using the same channel.
 A single satellite can communicate with more satellites receivers of the same
frequency.
 The directional spot-beam antennas are used and hence the base station in
SDMA, can track a moving user.
 Controls the radiated energy for each user in space.
[email protected]
TCP
 TCP stands for Transmission Control Protocol. It is a transport
layer protocol that facilitates the transmission of packets from source
to destination. It is a connection-oriented protocol that means it
establishes the connection prior to the communication that occurs
between the computing devices in a network. This protocol is used
with an IP.
 protocol, so together, they are referred to as a TCP/IP

 The main functionality of the TCP is to take the data from the
application layer. Then it divides the data into a several packets,
provides numbering to these packets, and finally transmits these
packets to the destination. The TCP, on the other side, will
reassemble the packets and transmits them to the application layer.
As we know that TCP is a connection-oriented protocol, so the
connection will remain established until the communication is not
completed between the sender and the receiver.
[email protected]
Features of TCP protocol
Transport Layer Protocol
 TCP is a transport layer protocol as it is used in transmitting the data from the sender to the
receiver.
Reliable
 TCP is a reliable protocol as it follows the flow and error control mechanism. It also supports
the acknowledgment mechanism, which checks the state and sound arrival of the data. In the
acknowledgment mechanism, the receiver sends either positive or negative acknowledgment to
the sender so that the sender can get to know whether the data packet has been received or
needs to resend.
Order of the data is maintained
 This protocol ensures that the data reaches the intended receiver in the same order in which it
is sent. It orders and numbers each segment so that the TCP layer on the destination side can
reassemble them based on their ordering.
Connection-oriented
 It is a connection-oriented service that means the data exchange occurs only after the
connection establishment. When the data transfer is completed, then the connection will get
terminated.
Full duplex
 It is a full-duplex means that the data can transfer in both directions at the same time.
Stream-oriented
 TCP is a stream-oriented protocol as it allows the sender to send the data in the form of a
stream of bytes and also allows the receiver to accept the data in the form of a stream of bytes.
TCP creates an environment in which both the sender and receiver are connected by an
imaginary tube known as a virtual circuit. This virtual circuit carries the stream of bytes across
the internet. [email protected]
Advantages of TCP
 It provides a connection-oriented reliable service, which means
that it guarantees the delivery of data packets. If the data packet
is lost across the network, then the TCP will resend the lost
packets.
 It provides a flow control mechanism using a sliding window
protocol.
 It provides error detection by using checksum and error control
by using Go Back or ARP protocol.
 It eliminates the congestion by using a network congestion
avoidance algorithm that includes various schemes such as
additive increase/multiplicative decrease (AIMD), slow start,
and congestion window.
Disadvantage of TCP
 It increases a large amount of overhead as each segment gets its
own TCP header, so fragmentation by the router increases the
overhead. [email protected]
Applications of Wireless Communication
Vehicles

 Many wireless communication systems and mobility aware applications are used
for following purpose:
 Transmission of music, news, road conditions, weather reports, and
other broadcast information are received via digital audio broadcasting (DAB)
with 1.5Mbit/s.
 For personal communication, a universal mobile telecommunications system
(UMTS) phone might be available offering voice and data connectivity with
384kbit/s.
 For remote areas, satellite communication can be used, while the current position
of the car is determined via the GPS (Global Positioning System).
 A local ad-hoc network for the fast exchange of information (information such as
distance between two vehicles, traffic information, road conditions) in emergency
situations or to help each other keep a safe distance. Local ad-hoc network with
vehicles close by to prevent guidance system, accidents, redundancy.
 Vehicle data from buses, trucks, trains and high speed train can be transmitted in
advance for maintenance.
 In ad-hoc network, car can comprise personal digital assistants (PDA), laptops, or
mobile phones connected with each other using the Bluetooth technology.
[email protected]
[email protected]
Emergency
 Video communication: Responders often need to share vital information. The transmission of
real time situations of video could be necessary. A typical scenario includes the transmission
of live video footage from a disaster area to the nearest fire department, to the police station or
to the near NGOs etc.
 Push To Talk (PTT): PTT is a technology which allows half duplex communication between
two users where switching from voice reception mode to the transmit mode takes place with
the use of a dedicated momentary button. It is similar to walkie-talkie.
 Audio/Voice Communication: This communication service provides full duplex audio
channels unlike PTT. Public safety communication requires novel full duplex speech
transmission services for emergency response.
 Real Time Text Messaging (RTT): Text messaging (RTT) is an effective and quick solution
for sending alerts in case of emergencies. Types of text messaging can be email, SMS and
instant message.
Business
 Travelling Salesman
 Directly access to customer files stored in a central location.
 Consistent databases for all agents
 Mobile office
 To enable the company to keep track of all the activities of their travelling employees.
In Office
 Wi-Fi wireless technology saves businesses or companies a considerable amount of money on
installations costs.
 There is no need to physically setup wires throughout an office building, warehouse or store.
 Bluetooth is also a wireless technology especially used for short range that acts as a
complement to Wi-Fi. It is used to transfer data between computers or cellphones.
[email protected]
Mobile IP
 This is an IETF (Internet Engineering Task Force) standard communications protocol
designed to allow mobile devices' (such as laptop, PDA, mobile phone, etc.) users to
move from one network to another while maintaining their permanent IP (Internet
Protocol) address.
 Defined in RFC (Request for Comments) 2002, mobile IP is an enhancement of the
internet protocol (IP) that adds mechanisms for forwarding internet traffic to mobile
devices (known as mobile nodes) when they are connecting through other than their
home network.

[email protected]
 The following case shows how a datagram moves from one point
to another within the Mobile IP framework.

 First of all, the internet host sends a datagram to the mobile node
using the mobile node's home address (normal IP routing process).
 If the mobile node (MN) is on its home network, the datagram is
delivered through the normal IP (Internet Protocol) process to the
mobile node. Otherwise the home agent picks up the datagram.
 If the mobile node (MN) is on foreign network, the home agent
(HA) forwards the datagram to the foreign agent.
 The foreign agent (FA) delivers the datagram to the mobile node.
 Datagrams from the MN to the Internet host are sent using normal
IP routing procedures. If the mobile node is on a foreign network,
the packets are delivered to the foreign agent. The FA forwards the
datagram to the Internet host.

[email protected]
Components of Mobile IP
1. Mobile Node (MN)

 The mobile node is an end system or device such as a cell phone, PDA
(Personal Digital assistant), or laptop whose software enables network roaming
capabilities.
2. Home Agent (HA)
 The home agent provides several services for the mobile node and is located in
the home network. The tunnel for packets towards the mobile node starts at
home agent. The home agent maintains a location registry, i.e. it is informed of
the mobile node's location by the current COA (care of address). Following
alternatives for the implementation of an HA exist.
 Home agent can be implemented on a router that is responsible for the home
network. This is obviously the best position, because without optimization to
mobile IP, all packets for the MN have to go through the router anyway.
 If changing the router's software is not possible, the home agent could also be
implemented on an arbitrary node in the subset. One biggest disadvantage of
this solution is the double crossing of the router by the packet if the MN is in a
foreign network. A packet for the mobile node comes in via the router; the HA
sends it through the tunnel which again crosses the router.
[email protected]
3. Foreign Agent (FA)
 The foreign agent can provide several services to the mobile node during its visit to the
foreign network. The FA can have the COA (care or address) acting as a tunnel endpoint and
forwarding packets to the MN. The foreign agent can be the default router for the MN.
 Foreign agent can also provide security services because they belong to the foreign network
as opposed to the MN which is only visiting.
 In short, FA is a router that may function as the point of attachment for the mobile node
when it roams to a foreign network delivers packets from the home agent to the mobile
node.
4. Care of Address (COA)
 The Care- of- address defines the current location of the mobile node from an IP point of
view. All IP packets sent to the MN are delivered to the COA, not directly to the IP address
of the MN. Packet delivery toward the mobile node is done using a tunnel. To be more
precise, the COA marks the endpoint of the tunnel, i.e. the address where packets exit the
tunnel.
 There are two different possibilities for the location of the care of address:
 Foreign Agent COA: The COA could be located at the foreign agent, i.e. the COA is an IP
address of the foreign agent. The foreign agent is the tunnel endpoint and forwards packets
to the MN. Many MN using the FA can share this COA as common COA.
 Co-located COA: The COA is co-located if the MN temporarily acquired an additional IP
address which acts as a COA. This address is now topologically correct, and the tunnel
endpoint is at the mobile node. Co-located address can be acquired using services such as
DHCP. One problem associated with this approach is need for additional addresses if MNs
request a COA. This is not always a good idea considering the scarcity of IPv4 addresses.
[email protected]
5. Correspondent Node (CN)
 At least one partner is needed for
communication. The correspondent node
represents this partner for the MN. The
correspondent node can be a fixed or mobile
node.
6. Home Network
 The home network is the subset the MN belongs
to with respect to its IP address. No mobile IP
support is needed within this network.
7. Foreign network
 The foreign network is the current subset the
MN visits and which is not the home network.
[email protected]
Process of Mobile IP
 The mobile IP process has following three main phases, which are:

1. Agent Discovery
 During the agent discovery phase the HA and FA advertise their services
on the network by using the ICMP router discovery protocol (IROP).
 Mobile IP defines two methods: agent advertisement and agent solicitation
which are in fact router discovery methods plus extensions.
 Agent advertisement: For the first method, FA and HA advertise their
presence periodically using special agent advertisement messages. These
messages advertisement can be seen as a beacon broadcast into the subnet.
For this advertisement internet control message protocol (ICMP) messages
according to RFC 1256, are used with some mobility extensions.
 Agent solicitation: If no agent advertisements are present or the inter
arrival time is too high, and an MN has not received a COA, the mobile
node must send agent solicitations. These solicitations are again bases on
RFC 1256 for router solicitations.

[email protected]
2. Registration
 The main purpose of the registration is to inform the home agent of the current location for
correct forwarding of packets.
Registration can be done in two ways depending on the location of the COA.
 If the COA is at the FA, the MN sends its registration request containing the COA to the
FA which is forwarding the request to the HA. The HA now set up a mobility
binding containing the mobile node's home IP address and the current COA.
 Additionally, the mobility biding contains the lifetime of the registration which is negotiated
during the registration process. Registration expires automatically after the lifetime and is
deleted; so a mobile node should register before expiration. After setting up the mobility
binding, the HA send a reply message back to the FA which forwards it to the MN.
 If the COA is co-located, registration can be very simpler. The mobile node may send the
request directly to the HA and vice versa. This by the way is also the registration procedure
for MNs returning to their home network.

[email protected]
3. Tunneling

 A tunnel is used to establish a virtual pipe for data packets


between a tunnel entry and a tunnel endpoint. Packets which
are entering in a tunnel are forwarded inside the tunnel and
leave the tunnel unchanged. Tunneling, i.e., sending a
packet through a tunnel is achieved with the help of
encapsulation.

 Tunneling is also known as "port forwarding" is the


transmission and data intended for use only within a private,
usually corporate network through a public network.

[email protected]
What is WAP?
 WAP is a protocol that is introduced in 1999, which stands for Wireless application
protocol. It offers Internet communications over wireless devices, such as mobile
phones. In the early 2000s, it accomplished some popularity and was mainly
superseded by more recent standards by the 2010s. Also, it offers a way of creating
web applications for mobile devices, and it is designed for micro-browsers.
 Most of the wireless networks are supported by WAP, as well as TDMA, CDMA,
and GSM. Also, all operating systems can support a wireless application protocol. It
enables access to the internet in mobile devices and uses the mark-up language like
WML, which stands for Wireless Markup Language that is referred to as XML 1.0
application. WAP offers the facility to connect interactive wireless devices (like
mobile phones) to the internet and enhances wireless specification interoperability.

[email protected]
 WAP may be created on any kind of operating system, and it acts in
an open application environment. It is more beneficial for mobile
users as it has the ability to deliver electronic information efficiently.
In 1998, Nokia, Motorola, Ericson, and Unwired Planet founded the
WAP Forum, whose objective was to standardize several wireless
technologies with the help of protocols.
 The WAP CSS (cascading style sheet) makes capable of developers
to format screen sizes in order to mobile device adaptability. When
the WAP CSS content is used, then reformatting is not required. It
controls page layout compatibility with different mobile device's
display screens.
 The transport layer handles the physical network issues, by which
wireless gateways can be easily accessed by global wireless
operations. A WAP gateway is a server, which provides the facility to
access the wireless network. The WAP Forum offers specification
development, WAP tool testing and also provides support for all
mobile services. Now, the WAP Forum is referred to as the Open
Mobile Alliance. [email protected]
WAP Model
 In the mobile device, the user opens the web browser and access the
website and visit webpages accordingly. The mobile device forwards the
URL request to a WAP gateway through the network using the WAP
protocol. Then, the WAP gateway refers to this request over the internet
after translating it into a conventional HTTP URL request. The specified
Web server accepts the request and processes the request. Then, it returns
the response to the mobile device in the WML file through the WAP
gateway that will be displayed in the web browser on the device.

[email protected]
WAP Protocol stack

[email protected]
1. Application Layer (WAE)

 The Wireless Application Environment contains content development


programming languages like WML and mobile device specifications. It
functions much like a JavaScript and holds the tools that wireless Internet
content developers use. It includes scripting languages such as WML and
WMLScript that are used in conjunction with WML.

2. Session Layer (WSP)

 It determines the session will be connection-oriented or connectionless


between the device and the network and offers a reconnection and fast
connection suspension. The data is passed both ways between the network
and the device in the connection-oriented session. Then, WSP forwards the
packet to the next layer WTP (Wireless Transaction Protocol). When the
information is being streamed or broadcast from the network to the device,
commonly, the connectionless session is used. Then, WSP forwards the
packet to the WDP (Wireless Datagram Protocol) layer.

[email protected]
3. Transaction Layer (WTP)

 The Wireless Transaction Protocol offers transaction support. It is a


part of TCP/IP and runs on top of UDP, which stands for User
Datagram Protocol.

4. Security Layer (WTLS)

 The Wireless Transport Layer Security provides security in terms of


data integrity, privacy and authentication that help to save your data.
It also has the ability to work like Transport Layer Security. Also, it
contains security features that have Transport Layer Security.

5. Transport Layer (WDP)

 With the network carrier layer, the Wireless Datagram Protocol


functions in conjunction and presents a constant data format to
higher layers of WAP protocol stack.
[email protected]
Components of WAP
There are three major components of the WAP, which are as follows:

1. Protocol Support
 IP networks: Protocols supported contains the HTTP (known as WP-HTTP), TLS, and the
wireless "profiled" versions of TCP (known as WP-TCP).
 Non-IP networks: It includes four layers: Wireless Transport Layer Security, Wireless
Datagram Protocol, Wireless Session Protocol, and Wireless Transaction Protocol.

2. Application Environment
 WML Specification: WML stands for Wireless Markup Language, based on XML and
XHTML.
 WML Script Specification: A scripting language that is used for running code on clients.
 WAP Micro Browser: Especially, it is designed to control the WAP device. WAP devices
make capable of operating in a limited resource environment with the help of a WAP micro-
browser.

3. Services and Capabilities


 Customization of User Profile: On the basis of client device capabilities and user
preferences, WAP enables servers to customize content delivered to users.
 Telephony Support: Wireless application protocol allows telephone services to be operated
from within a data environment. As a result, WAP phones can function as web devices and
integrated voice.
[email protected]
Applications for WAP

 Corporate Applications: The WAP has used incorporation applications where salespeople
want to use their WAP for allowing direct access to the latest pricing, handsets to get instant,
competitive information any time, latest news.
 Mobile Banking: It is used in the banking sector for different purposes, such as provide
details of user account balance, last four transactions, overdraft limits and so on. The
elements such as WAP, private information services, security and various different other
elements are included in it. Additionally, it has numerous ways to provide Users' information.
On the other hand, the user can get information by sending a request via message, or the
service can be push-based, which means it can be automatically generated on the basis of
events or set intervals.
 All mobile phones are able to run mobile banking services, or services can be tailored for a
protocol-compliant phone or particular branded phone, e.g., WAP. Furthermore, the WAP is
not only beneficial for information provision, but it can also secure electronic commerce and
mobile transactions.
 Games: Games are a huge service that is most widely used by people in terms of applications
or software in mobile devices. Similarly, as music distribution will increase electronically,
games will also increase. You can download games or videos from an internet site rather than
go to a video store to rent a game or video.
 Mobile Commerce: It is required to use a mobile phone for transactions in mobile commerce
applications. Usually, it means transferring funds electronically or making a payment for
goods. Electronic commerce applications offer services for transferring money between
accounts and paying the amount for purchasing something.
[email protected]
Advantages of WAP
 Portability
 The primary use of WAP is to write applications using proprietary protocols. When you are porting
applications to a different kind of network, it will need substantial code rewriting. For example, a different
type of networks like GSM and CDMA, and bearer protocol like CSD (circuit-switched data) or SMS (short
message service).
 User Experience
 The devices with limited processing power, small screens, limited memory, and limited battery.
 Provide a narrow bandwidth connection.
 Cost and Application Development Time Reduction
 WAP helps to add new services at a lower cost and quickly. It could be done by the WAP tools and platforms
like WAP devices, WAP gateways, and WAP software development tool kits.
 Some of the other advantages of WAP are:
 No hardware obsolescence
 Real-time send/receive data
 Most modern mobile telephone devices support WAP
 Implementation near to the Internet model
 Time-saving
 Increased sales for devices, infrastructure & gateway manufacturer.
 Personalized
Disadvantages of WAP

 Not very familiar to the users


 The third party is included
 The business model is expensive
 Low speeds, security, and very small user interface
 Small display screens
 Limited bandwidth
 Speed of access and limited availability
[email protected]

You might also like