In the era of communication and network integration, we should have some knowledge about the WAP protocol stack. In communication networks, the WAP protocol is used for Internet connections. The WAP structure provides a flexible development environment for mobile communication device applications and uses a layered structure similar to the ISO model. Each protocol layer provides interfaces for its upper-layer protocols, other business applications can also access the WAP protocol stack at various levels 。
1. Wireless Application Environment
The Wireless Application Environment (WAE) is the highest protocol of the WAP protocol stack, it is a general application development environment that integrates WWW and mobile phone technology. Its main purpose is to establish a compatible environment for interoperability, so that carriers and service providers can effectively carry out applications and services on different wireless platforms 。
WAE includes a micro-browser environment with the following functions 。
① WML -- is a lightweight Markup Language similar to HTMI. It is designed based on XML and is a subset of HTML2.0 。
② WMLScript is a simplified script language and a subset extension of JavaScript 。
③ Wireless telephone application (WTA)-supports the telephone service structure and programming interface. It provides a method to create a telephone service using WAP 。
④ Content format-a set of defined data formats, including images, phone book records, and calendar information 。
2. Wireless Session Protocol
In the WAP protocol stack, WSP and Wireless Session Protocoll provide consistent interfaces for the two Session services 。
The first session service is a connection-oriented service, which works on the Transaction Layer Protocol wTP 。
The second type of session service is a connectionless service, which works on a secure or non-secure datagram service 。
WSP provides the following functions:
① The HTTP/1.1 compression function and semantics are performed on the air interface;
② Persistent sessions;
③ Session suspension, recovery, and migration;
④ Support reliable or unreliable data push operations;
⑤ Protocol feature negotiation 。
Source: (http://blog.sina.com.cn/s/blog_63be85fc0100g5d5.html)