Preview

Compare and Contrast Wap/Wml and J2Me Architectures

Good Essays
Open Document
Open Document
1100 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Compare and Contrast Wap/Wml and J2Me Architectures
Compare and Contrast WAP/WML and J2ME Architectures

WAP is designed in a layered fashion so that it can be extensible, flexible, and scalable. As a result, the WAP protocol stack is divided into five layers: 1) Application Layer - Wireless Application Environment (WAE). This layer is of most interest to content developers because it contains, among other things, device specifications and the content development programming languages, WML and WMLScript. (http://www.tutorialspoint.com/wap/wap_wml_script.htm)
Session Layer Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP Forum to provide fast connection suspension and reconnection. Transaction Layer Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth wireless stations. Security Layer Wireless Transport Layer Security (WTLS). WTLS incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks, privacy, service denial, and authentication services. (http://www.tutorialspoint.com/wap/wap_wml_script.htm)
WML scripting language is used to design applications that are sent over wireless devices such as mobile phones. This language takes care of the small screen and the low bandwidth of transmission. WML is an application of XML, which is defined in a document-type definition. WML pages are called decks. They are constructed as a set of cards, related to each other with links. When a WML page is accessed from a mobile phone, all the cards in the page are downloaded from the WAP server to mobile phone showing the content. WML commands and syntaxes are used to show content and to navigate between the cards. Developers can use these commands to declare variables, format text, and show images on the mobile phone.

You May Also Find These Documents Helpful

  • Best Essays

    IEEE 802.11 – Wireless LAN • http://www2.rad.com/networks/2005/wirelesslan/main.htm • Up-to-date information on Wireless LANs. Technical/Magazines Articles…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Prepare a 3-4 page paper comparing and contrasting Wireless Application Protocol/ Wireless Markup Language (WAP/WML) and Java 2 Platform, Micro Edition (J2ME) architectures.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Infrastructure deployment scenario will allow for wireless access points (WAPs) to be connected to the existing wired network allowing employees with wireless devices the ability to access the company’s network. This is a commonly used method of enhancing an existing wired network while adding the benefit of mobility to employees and is a cost-effective way to upgrade to a wireless local area network (WLAN). On-the-go employees can potentially improve job productivity while in the Conference Center by having the ability to wirelessly access company printers, file servers, and Internet and/or Intranet without the need to plug into the company network.…

    • 2305 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    AES-An encryption standard used by WPA2 and is currently the strongest encryption standard used by Wi-Fi.…

    • 1630 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Week 8 It-242

    • 685 Words
    • 3 Pages

    For a while in the past, we refer the wireless technology as cellular phones. But now, the term "wireless" refers to more varied devices & technologies, like smartphones, computers, printers, headphones and even speakers that connects together in different ways. Today’s wireless phones for example, may include data packets like 3G & 4G cellular radio signals, Wi-Fi and even Bluetooth technologies, these technologies have advance in a fast pace that investing in equipment like 4G phone and/or 802.11x wireless routers can offer you & your business a variety of speed improvements for your money. Now I shall describe the characteristics of every type of wireless signal types so we can learn to use every signal type.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 L3 BTEC IT P2

    • 339 Words
    • 2 Pages

    A protocol is the set of rules used when computers communicate. In this report I am going to explain the importance of protocols and standards.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 6 assignments

    • 519 Words
    • 3 Pages

    Wired Equivalent Privacy (WEP) is the most widely used Wi-Fi security algorithm in the world. Wi-Fi Protected Access(WPA) was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent vulnerabilities of the WEP standard. It was formally adopted in 2003, a year before WEP was officially retired. The most common WPA configuration is WPA-PSK (Pre-Shared Key). The keys used by WPA are 256-bit, a significant increase over the 64-bit and 128-bit keys used in the WEP system. WPA has, as of 2006, been officially superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol) as a replacement for TKIP (still preserved in WPA2 as a fallback system and for interoperability with WPA).Unfortunately, the same vulnerability that is the biggest hole in the WPA armor, the attack vector through the Wi-Fi Protected Setup (WPS),…

    • 519 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What Is Xml

    • 488 Words
    • 2 Pages

    XML, or Extensible Markup Language, is an internet language used to represent text and data that can be used without much human or machine intelligence. XML is a lot like HTML except for two major differences. The first is separation of form and content. HTML mostly consists of tags defining the appearance of text. In XML the tags generally define the structure and content of the data, with actual appearance specified by a specific application or an associated stylesheet. The second is XML is extensible. Tags can be defined by individuals or organizations for some specific application, whereas the HTML standard tagset is defined by the World Wide Web Consortium.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Answer: The protocol must be built at the application layer. For example, an application may…

    • 955 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cs 2205 Unit 6 Assignment

    • 533 Words
    • 3 Pages

    This is unit 6 personal reflections that basically depends on the unit given reading materials and that is related to. This week my journal activity basically very focused specifically on the weekly unit topic of basic syntax of XML, transporting and storing with XML.…

    • 533 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The session initiation protocol has elements that incorporate user agents that can function in two ways. First, the user agent client can produce requests and transmit them to the servers. Secondly, the user agent server receives the request, handles them and produces the responses. So in…

    • 2044 Words
    • 6 Pages
    Powerful Essays