Examples of important protocols in the WAP protocol stack

Source: Internet
Author: User

We have introduced some content about the WAP protocol stack in the above article. For details, refer to the application environment and main protocols of the WAP protocol stack. Next, based on the content of the above article, Let's explain other related knowledge in depth.

Wireless Transaction Protocol

WTP (Wireless Transaction Protocol) runs on the datagram service. It is a lightweight Transaction-oriented Protocol and is suitable for thin clients (mobile devices). WTP can run efficiently on secure or non-secure Wireless Datagram networks. It is responsible for controlling sending and receiving information, providing reliable communication routes, and ensuring that data is not repeatedly received, it also needs to resend the lost data. It has the following features:

① It has three levels of transaction services: unreliable one-way request, reliable one-way request, reliable two-way request and response transaction;

② The WTP user confirms each received message;

③ Optional include confirmed out-of-band data;

④ Cascade and delay validation of protocol data units (PDUS) to reduce the number of messages sent:

⑤ Asynchronous transaction processing 。

Wireless Transmission Layer Security

Wireless Transport Layer Security (WTLS, Wireless Transport Laver Security) the Protocol is a Transport Layer Security Protocol Based on industrial standards. It aims to provide Transport Layer Security between the WAP client and the WAP Gateway/proxy, it also optimizes narrowband communication channels. WTLS provides the following features:

A. Data integrity;

B. Confidentiality:

C. Authentication:

D. DoS protection 。

Wireless Datagram Protocol

The Wireless Datagram Protocol (WDP, Wireless: ipvrmprotocal) is the basis of the WAP protocol stack. It provides consistent interfaces for the previous layer of protocols, it works on various types of networks with data carrying capacity. As a common transmission service, WDP provides unified services through the WAP protocol at the upper layer, it also provides transparent communication capabilities to carry services 。

Bearer

The WAP protocol can work on various bearer services, including SMS, CSD, and GPRS. It has different requirements on throughput, error rate, and latency, the Service has different levels of service quality. WAP protocol can adapt to different quality services 。

Other services and applications

The WAP protocol uses a layered structure to allow other services and applications to use the WAP protocol stack through a set of defined interfaces, external applications can be directly connected to the Session Layer, Transaction layer, security layer, and transmission layer, even if not specified by the 'wap protocol, the WAP protocol stack can be used as long as it is regarded as a service and application valuable to the wireless market 。

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.