WAP Protocol Layers Lesson 04 - Devi Ahilya … · WAP transmission physical layer • Can be HSCSD...

40
© Oxford University Press 2007. All rights reserved. 1 Wireless LAN, Mobile Internet Connectivity, and Personal Area Network Lesson 04 WAP Protocol Layers

Transcript of WAP Protocol Layers Lesson 04 - Devi Ahilya … · WAP transmission physical layer • Can be HSCSD...

© Oxford University Press 2007. All rights reserved. 1

Wireless LAN, Mobile Internet Connectivity, and Personal Area Network

Lesson 04WAP Protocol Layers

© Oxford University Press 2007. All rights reserved. 2

WAP 1.1 and WAP 2.0 Protocol Layers

© Oxford University Press 2007. All rights reserved. 3

WAP transmission physical layer

• Can be HSCSD• SMS• GPRS in GSM• CDPD• 3G bearer (SMS, MMS, …) services

© Oxford University Press 2007. All rights reserved. 4

Networking Layer Protocol WDP (wireless datagram protocol)

• A datagram gives independent information and is stateless

• The data of a datagram is sent by a connectionless protocol

• WDP (wireless datagram protocol) a connectionless information

• Similar to UDP in TCP/IP suite• Used for multicasting a datagram on the

network

© Oxford University Press 2007. All rights reserved. 5

Networking Layer Protocol─ WCMP (wireless control message protocol)

• Similar to ICMP • WCMP employs a datagram with a

WCMP header when sending the messages for querying to find information, reporting errors, making route address advertisement, and for a router seeking (soliciting) messages

© Oxford University Press 2007. All rights reserved. 6

Networking Layer Transmitted WDP datagram

• A header and then user data which is received from upper layers at the device

• Consists of a source port, a destination port (optional), source address (an identifier IP address or telephone number), destination address (optional), length of data, and checksum bytes for the header (to check erroneous receipt of header)

© Oxford University Press 2007. All rights reserved. 7

Networking Layer

• An error-code as per the error is also reported to the upper layer, for example, in case the datagram could not reach its destination

© Oxford University Press 2007. All rights reserved. 8

Networking Layer header

© Oxford University Press 2007. All rights reserved. 9

Secure session establishment

• Must before the data from upper layers (WAE, WSP, and WTP) that are above the WTLS layer is transmitted through gateway or proxy to other end peer and received through gateway or proxy to the upper layers (WTP, WSP, and WAE)

© Oxford University Press 2007. All rights reserved. 10

Wireless Transport Layer Security (WTLS) protocol

• Data transaction occurs between client device and gateway

• Assures integrity and privacy in transactions and device authentication

© Oxford University Press 2007. All rights reserved. 11

Wireless Transport Layer Security

• WTLS layer maps to SSL (secure socket layer) in HTTPS

• SSL is also called TLS (transport layer security)

• WTLS supports TCP (transport layer protocols), WDP, and WCMP

© Oxford University Press 2007. All rights reserved. 12

WTLS protocol header over the upper layer data in requests and WTLS protocol header in responses

© Oxford University Press 2007. All rights reserved. 13

WTLS specifications for establishment of the secure session

• Source device messages create process:

(i) source address and port(ii) destination address and port(iii) RSA or ECC (a proposed suite of

algorithms for key exchange

© Oxford University Press 2007. All rights reserved. 14

WTLS specifications for establishment of the secure session

(iv) IDEA or DES (a proposed suite of algorithms for ciphering the data)

(v) Compression method for data compression

© Oxford University Press 2007. All rights reserved. 15

WTLS specifications for establishment of the secure session

• Other end messages for secure channel exchange for confirmation of createprocess as follows:

(i) sequence number mode(ii) how many times key is refreshed and

exchanged again(iii) identification of session after

establishment of the session

© Oxford University Press 2007. All rights reserved. 16

WTLS specifications for establishment of the secure session

(iv) RSA or ECC (a chosen suite of algorithms for key exchange)

(v) IDEA or DES (a chosen suite of algorithms for ciphering the data)

(vi) chosen compression method for data compression

© Oxford University Press 2007. All rights reserved. 17

WTLS specifications for establishment of the secure session

• On request from the other end, source device messages for secure channel public key authentication by a client certificate

• Source device messages to commit request

• Other end peer messages for commit confirmation request

© Oxford University Press 2007. All rights reserved. 18

Wireless Transaction Protocol (WTP)

• Transmits data to WTLS in case of secure transactions and directly to WDP or WCMP

• Supports joining (fusion) of the messages and enables asynchronous transactions

• Supports abortion of the transactions and provides the information about the success or failure of a transaction to the sender

© Oxford University Press 2007. All rights reserved. 19

WTP interface to ensure reliability of transactions─ Class 0

• Three WTP service classes0, 1, and 2• Class 0— a source sends the messages

with no response from the other end

© Oxford University Press 2007. All rights reserved. 20

WTP interface to ensure reliability of transactions─ class 1

• Source first invokes a transaction along with the request

• Device then obtains the confirmation of invocation

• Followed by the transaction for the resulting response

• The device sends the acknowledgement

© Oxford University Press 2007. All rights reserved. 21

WTP interface to ensure reliability of transactions ─ Class 1

• The transaction removes duplicate data, provides retransmission as well as a transaction identifier

• Provides push services in which there is no acknowledgement of data by user, except that there is confirmation of invocation

© Oxford University Press 2007. All rights reserved. 22

WTP interface to ensure reliability of transactions─ class 2

• Source first invokes a transaction along with the request

• Device then obtains the acknowledgement of data (through gateway or proxy) from user

• Followed by a transaction for the resulting response

• The device sends the acknowledgement

© Oxford University Press 2007. All rights reserved. 23

WTP interface to ensure reliability of transactions─ Class 2

• The transaction removes duplicate data, provides retransmission as well as a transaction identifier

• Provides acknowledgement of two types user acknowledgement and automatic acknowledgement

© Oxford University Press 2007. All rights reserved. 24

WTP headers when sending WTP invocation and request for results, confirmation of WTP

invocation

© Oxford University Press 2007. All rights reserved. 25

Wireless session protocol (WSP)

• Transmits data to WTP in case of thin client transactions or directly to WDP or WCMP

• WTLS serves as a layer above WDP when a secure transfer is required for a datagram

© Oxford University Press 2007. All rights reserved. 26

Wireless session protocol (WSP)

• Like HTTP, supports stateless data transfers

• Enables a browser to get the packets from the server in any sequence

© Oxford University Press 2007. All rights reserved. 27

WSP protocol session connection

establishment and resulting response headers

© Oxford University Press 2007. All rights reserved. 28

WSP

• Also supports asynchronous exchanges• Multiple requests• Push and pull mechanisms of data

dissemination• Capability negotiation• Content encoding

© Oxford University Press 2007. All rights reserved. 29

WSP

• Content type definitions• WBXML (WAP binary XML)• Possesses HTTP functionality

© Oxford University Press 2007. All rights reserved. 30

WSP session

• Session is first established─ use the functions of agreed common protocol

• An established session can be suspended and then resumed from the point at which it was suspended.

• A session can be terminated (released)

© Oxford University Press 2007. All rights reserved. 31

WSP headers when sending WSP invocation and request

© Oxford University Press 2007. All rights reserved. 32

Three WSP service classes

• Class 0—This class is for a source sending the unconfirmed push

• Supports session suspension, resumption, and management

• The messages sent from the source do not get any response from the other end

© Oxford University Press 2007. All rights reserved. 33

WSP service classes 1 and 2

• Class 1—for a source sending the confirmed push

• Class 2—for a source supporting session invocation, suspension, and resumption

© Oxford University Press 2007. All rights reserved. 34

WSP header for the method invocation and request to server

© Oxford University Press 2007. All rights reserved. 35

WSP header for server response

© Oxford University Press 2007. All rights reserved. 36

WSP header when WSP Push

© Oxford University Press 2007. All rights reserved. 37

WAP Push

• The constraints of mobile devices are low computing capability and narrow bandwidth network connection with intermittent loss of connectivity

• WSP in WAE used for WAP user agent push service

• WTA events used to push the data to the device

© Oxford University Press 2007. All rights reserved. 38

WAP Push OTA (over the air)

• A simple protocol sub-layer in WSP• Provides authentication of the push

initiator (server) and also helps in selection of the pushed contents

• The protocol handles push-session-request, connect, suspend, resume, and disconnect functions

• Handles push, server-confirmed push, abort, and unit-push functions

© Oxford University Press 2007. All rights reserved. 39

Summary

• Physical layer─ HSCSD, GPRS, CDPD and 3G Bearer service

• WDP datagram layer• WTLS transport layer security protocol

layer• WTP transaction protocol layer• WSP session layer• WTA Push and WTA Push OTA

© Oxford University Press 2007. All rights reserved. 40

Lesson 04WAP Protocol Layers