mobile computing unit-8

77
UNIT-VIII Mobile Wireless Short Range Networks AND Mobile Internet

Upload: ramesh-babu

Post on 02-Jul-2015

289 views

Category:

Education


4 download

DESCRIPTION

JNTU, Kakinada IV B.Tech I semester Mobile computing Unit-8 total slides

TRANSCRIPT

Page 1: Mobile Computing UNIT-8

UNIT-VIIIMobile Wireless Short Range Networks

ANDMobile Internet

Page 2: Mobile Computing UNIT-8

Wireless Networking & Wireless LAN:• We know that Local Area Network (LAN) means a set of interconnected computers with in a specific area which may include some other computing systems.• To form a LAN, we use the protocol suit IEEE 802.x or 802.1y.• All the units in local area network, has an address, and with the help of address (IP) they can communicate with each other.• Now we discuss about wireless LANs, in which each system may consists of smart sensors, RFID labels, and have short range communication capabilities.

Page 3: Mobile Computing UNIT-8

•We know that the wireless LAN devices or computers are using the IEEE 802.11 communication protocol.• The implementation of IEEE802.11 leads to WiFi – Wireless Fidelity. The WiFi is a trademark of WiFi alliance, that certify the products whose functions are based on 802.11 and used in WLANs. Thus interfaces, devices, system and systems which are used in wireless communication are WiFi enabled.• Today a new technology in the market known as “WiFi direct”, which is able to connect with the existing WiFi networks and

Page 4: Mobile Computing UNIT-8

gain the transmission speed up to 250Mbps.• The WiFi direct devices may able to advertise their presence and able to discover another WiFi direct device.• Generally establishment of wireless LANs are a bit complex, the following diagram shows an example for WLAN.

Page 5: Mobile Computing UNIT-8

•The following are the some standards recommended for WLAN in mobile communication and for establishing communication between mobile devices, internet or other networks. •2G: It enables digital encoding of voice and enables mobile phone and SMS. It is based on circuit switching.•2.5G: It enables packet switching, Internet and E-mail.•3G: It enables wideband wireless communication, video conferencing, video calls and mobile TV.

Page 6: Mobile Computing UNIT-8

• It supports data communication at 384kbps and 3 x 1.2288Mbps when using three carriers of 1.2288Mbps each.• 3.5G: It is a High speed Packet Access Enhanced (HSPA) data communication at 28Mbps uplink and 56Mbps downlink.•Pre-4G: It enables mobile WiMax using IEEE 802.16e standard and very high data rates using Long Term Evolution (LTE).•4G: It enables multimedia news paper, mobile TV of high resolution, IP telephony, and 100Mbps data rates. It also uses mobile WiMax IEEE 802.16m standard and advanced LTE.

Page 7: Mobile Computing UNIT-8

WLAN Configuration: Generally WLAN is a peer-to-peer independent network. It connects a set of computing systems, each of which has a wireless interface (adaptors).• Naturally two or more wireless interfaces within the range of each other at an instant.• The WLAN is formed on-demand, it should not require administration and pre-configuration.• There is another kind of configuration in WLANs, which may known as a fixed infrastructure network.

Page 8: Mobile Computing UNIT-8

• In fixed infrastructure network, there are multiple access points provide wireless connectivity to the mobile computing systems and also linked with wired networks.• The access point may form a micro cell or PAN, which may have number of wireless computing systems. The computing system’s wireless interface (adaptor) sufficient capabilities to establish connection with the access point within a micro cell.• Generally WLAN follows two types of communication establishment techniques;

Page 9: Mobile Computing UNIT-8

a) Spread spectrum.

b) Infrared WLAN.

The following are some important point that should follow during configuration of WLAN.

1. The range or coverage of WLAN may vary from 30m to 125m.

2. A typical data transmission rate (throughput) varies 1Mbps to 50Mbps.

3. It has interoperability with other wireless infrastructure.

4. It also has interoperability with wired infrastructure.

Page 10: Mobile Computing UNIT-8

5. The WLAN has interference and coexistence.

6. It should have the scalability.

7. Generally it is a ad-hoc network.

8. The WLAN should support security, integrity and reliability.

9. It should have simplicity and ease of use.

10. It must be cost effective.

Advantages of WLANs:

1.Installation speed of wireless LANs are so speed.

2.It is simple to install WLAN hardware.

Page 11: Mobile Computing UNIT-8

3. WLANs has installation flexibility – The WLANs are installed at anywhere, because there is no need of wires and hubs and the dynamic environment of network is extendable.

4. WLANs provide improved services – The WLAN user can interact with the network at any time and able to access the real time information through WiFi enabled handsets.• The WLAN users can access internet instead of expensive cellular services.• Making secure phone call through VoIP service.

Page 12: Mobile Computing UNIT-8

• They are able to access local files of an enterprise.

5. WLANs reduce the cost of ownership – The initial investment of WLAN are higher compared to wired LAN, but the cost of maintaining over the whole life is low.

6. WLANs are scalable – We know that, WLAN network is independent or Fixed infrastructure or peer-to-peer network. The WLANs are configured in various topologies depending on need of specific applications.

Page 13: Mobile Computing UNIT-8

WLAN Architecture:• An addressable node in WLAN is called a station. The following diagram shows a Basic Service Set (BSS) of a particular station in WLAN architecture.

Page 14: Mobile Computing UNIT-8

• The BSS can have number of computing systems and those are interconnected with access point by using 802.11.• The devices in a station of WLAN may use same frequencies and interconnection of stations done only through access point.• Each node of a station use same frequency band if it is at a tolerable distance from another station or a node may use different frequency bands if its distance not enough from other stations.•

Page 15: Mobile Computing UNIT-8

•So a particular node at a station can communicate directly to the access point and to the other node at another station through the access point.• The nodes of a station can communicate among themselves by forming an ad-hoc or any other type of network, using same frequency band by each node.•Independent Basic Service Set (IBSS): An IBSS having no access point for the connectivity of distributed systems. The IBSS has set of nodes those can communicate among themselves within its boundary.

Page 16: Mobile Computing UNIT-8

The following diagram shows an IBSS;

• There are several devices at a station, which are networked by using 802.11 protocol.• In the diagram an IBSS has three stations, STAB, STAC, and STAD, the stations in IBSS

Page 17: Mobile Computing UNIT-8

does not connected to any access point. Here the devices are communicate directly with one another or communicate among themselves after forming a ad-hoc network.• All the nodes in a particular station can considered as a single addressable unit. The nodes among them are interact through peer-to-peer communication manner.• Here 802.11 protocol does not specify any protocols for communication among the nodes, for data routing, exchanging and support for exchange of network topology information.

Page 18: Mobile Computing UNIT-8

• So in IBSS, the exchange of information among the node can use Bluetooth and these are ZigBee devices.

Distributed System: The wireless BSS may or may not provide sufficient service over the specified coverage area. So IEEE 802.11 provides the facility to integrate multiple BSSs which have number of distributed systems.

The following diagram shows distributed systems interconnected by wireless access points;

Page 19: Mobile Computing UNIT-8

• The distributed systems provides flexible functionality to the WLAN architecture component. Here the wireless medium 802.11 is logically separates from the distributed system medium (DSM).

Page 20: Mobile Computing UNIT-8

• The following are the main functions of the Distributed systems in WLAN.

1.Perform address-to-destination mapping.

2.Seamless integration of multiple mobile devices in the BSS.•An access point in WALN support the following services

1.It physically connects the distributed systems with access point and access those systems.

2.The access point can provide distributed system services.

Page 21: Mobile Computing UNIT-8

3. The access point functions as a station within BSS.

4. The access point bridge and extends the services of the network.

5. It provide address for the connectivity.

Extended service set (ESS): The distributed system can create a wireless network of arbitrary size and complexity. It also from a network which defines an extended service set (ESS).

Page 22: Mobile Computing UNIT-8

The following diagram shows WLAN access points of distributed systems networked using ESS.

Page 23: Mobile Computing UNIT-8

• Here the access points A, B, C, D, E, F and G networked together and form an ESS. Generally an ESS have an ID known as ESSID.• Suppose to gent the internet I at each WLAN DS, then establish a connection between internet I and ESS.• The ESS access point may exist or implemented at a base station or gateway and the access point may have multi point relay node.•The ESS can able to interconnect with a cellular network.

Page 24: Mobile Computing UNIT-8

•At this stage the 802.11 can facilitate only the ESSID, but it not define or provide any protocols that support distributed system.• The protocols used in ESS may or may not be TCP/IT or IPv6, these usage of protocols may depend upon the how the BSS is interoperate in a service provider servicing setup.

Page 25: Mobile Computing UNIT-8

IEEE802.11 Protocol Layers:• 802.11 protocol layers means those are the physical and data link layers.• We know that there is a need of multiple layers each of which may consists of various protocols are for establishing communication network.• Generally these protocols can send the bits to the above and bellow layers and some of the layers may communicate with neighboring node layers.

Page 26: Mobile Computing UNIT-8

• In open system interconnectivity the order of the layers are, Physical (L1), Data link (L), Network (L3), Transport (L4), Session (L5), Presentation (L6) and Application (L7) layers.• Suppose the transceiver send the signals then the order of the layers are L7 to L1, when it receiving signals, the order is L1 to L7.• But during the communication, the transceiver may not use the services of seven layers and the functions of the layers are also divide among the sub layers.

Page 27: Mobile Computing UNIT-8

• Generally the physical layer, does the sequencing and formatting of data bits, it also do multiplexing, modulating and demodulating. Addition and deletion of some control bits are also takes place at physical layer.• The data link layer does the control functions of addressing, access coordination, frame sequencing and logical links.

Page 28: Mobile Computing UNIT-8

The following is the description of 802.11 protocol layers

IEEE 802.x: The IEEE 802.x is a set of protocols defined for networking of computers. Here x=1 specifies the bridge between LLC (Logical Link Control) and MAC (Medium Access Control) sub layers and 802.1 also have some management function of layer 1 and 2. If X=2 especially specifies the LLC at the layer 2.• The 802.1 and 802.2 specifications are common for all 802.x standard.

Page 29: Mobile Computing UNIT-8

• 802.3 specifies the functionalities of MAC at the layer 2 and physical layer functionalities in wired networks.• In 802.x all upper layers have some common protocols up to 802.10, specifies security mechanisms.

IEEE 802.1y: IEEE 802.1y when y=1 means 802.11 series protocols, which are the specifications for WLANs.• Here each station in WLAN has a logical architecture as per the 802.11 standard and consists of a single MAC and one multiple physical sub layers.

Page 30: Mobile Computing UNIT-8

• The 802.11 may include the previous specifications of 802.x (x= 1-10). So the nodes using 802.11 may access the network either wired or through wireless, because the higher layers of 802.11 are identical to 802.x.

The following diagram shows the physical and MAC functions in 802.11

Page 31: Mobile Computing UNIT-8

• Here the physical layer, which transmit or receives the signals through wireless communication or through wire, fiber or microwave after formatting, multiplexing, modulating, the following three options of physical layer is called Physical Media Data (PMD).•1The physical layer in 802.11 using Frequency Hopping Spread Spectrum (FHSS) or Direct Sequence Spread Spectrum (DSSS) or using Diffused Infra Red for the signaling.

Page 32: Mobile Computing UNIT-8

2. It also using Orthogonal Frequency Division Multiple Access (OFDM), which is capable of multiplexing 6Mbps to 54Mbps.

3. The physical layer may also includes, Physical Layer Convergence Protocol (PLCP) and Complementary Code Keying (CCK) sub layers.

In the diagram, the goal of MAC is to provide access control functions. These functions may be addressing, access coordination, and Frame sequence checking for shared medium in support of LLC layer.

Page 33: Mobile Computing UNIT-8

•The following diagram shows the basic protocol layers at the transmitter and receiver in 802.11

Page 34: Mobile Computing UNIT-8

• Here MAC service Data Units (MSDUs) are sent between two entities on the network. The 802.11 also specifies the services that required by the LLC.• The following are the general MAC functions supported by 802.11 at layer 2.

1.Station services – which include MSDU delivery, Privacy, Authentication, and de-authentication.

2.Distribution system services – Distribution, Integration, association, disassociation and re-association.

Page 35: Mobile Computing UNIT-8

Wireless Application Protocol: We know that wired environment has HTTP for accessing the websites.• The HTTP browser is installed at the client side. The client sends a request to the web server and server responds to the client through the internet.• The following diagram shows web access architecture based on HTTP

Page 36: Mobile Computing UNIT-8

• Coming to the wireless environment, packet losses and disconnections has the major problem, so wireless environment require new web access architecture.• WAP is an open international standard, which defines industry oriented specifications for developing the service applications.• Now a days WAP is used in smart phones and in mobile devices for web browsing and supporting innovative applications. So WAP is a powerful framework to support such an applications.

Page 37: Mobile Computing UNIT-8

• There are several services are accessed through WAP such as, email, downloading music, sending MMS, receiving news, and other web services.• The WAP transmission physical layer contains, High Speed Circuit Switched Data (HSCSD), SMS, General Packet Radio Service (GPRS), GSM, Cellular Digital Packet Data (CDPD) and 3G bearer services.• The main objective of WAP is to facilitate browsing and used of wired internet, in protocol independent environment.

Page 38: Mobile Computing UNIT-8

WAP 1.1 Architecture: We know that WAP defines a set of protocols. There are mainly three protocol layers in WAP which facilitates the wireless data transmission and reception.• These three protocol layers are, Transport, Transaction and Session layers. Here Wireless Datagram Protocol (WDP) is used for transmitting and receiving the datagram over the network.

The following diagram shows functions of Wireless Application Environment (WAE)

Page 39: Mobile Computing UNIT-8
Page 40: Mobile Computing UNIT-8

• Here WAE at the layer-7, which supports the web services, and Wireless Markup Language (WML). The following are WAE functions at the (client) Mobile computing system.

1.WAP supports WML (Wireless Markup Language) and WML script.

2.It also support WAP binary XML (WBXML).

3.It support Wireless Telephony Applications (WTA).

4.It is able to maintain user agent profiles.

Page 41: Mobile Computing UNIT-8

5. It supports the data formats vCard2.1, vCalender1.0, address book, pictogram, and other picture formats (jpg, gif, etc..).

6. It is able to pre configuring the remote service provider.

WAP 1.1 Gateway:• A WAP1.1 gateway is required for protocol conversions between the mobile client and HTTP server.• The gateway converts WAE1.1, WSP, WTP, WTLS and UDP layers encoded data packets into HTTP and Transport Layer Security (TLS) formats.

Page 42: Mobile Computing UNIT-8

• The gateway also getting the data from the clients and encoded in UDP format, when device transmit the data to the server. It also decoding in the reverse path that the server sends the data to the client through the gateway.• The WAP gateway is able to access the both wired and wireless networks. Over the wireless networks it builds the cashes to procure the data due frequent disconnections. It also ensures the security in wired and wireless environment.

Page 43: Mobile Computing UNIT-8

• We know that the HTTP environment can only provide the PULL mode of services – the client sends the request and pull the data from the server as a response.• The WAP gateway support both PUSH and PULL mode of services.• The WAP gateway also has WML encoder-decoder, so that the application written in WML is converted into HTML, when the client who using WAE, sends a request to HTTP server and response from the server to the client is also decoded into WML formats.

Page 44: Mobile Computing UNIT-8

• One more important function of gateway is iWML Script compilation. The script written in Common Gateway Interface (CGI) runs at the HTTP server and then the server generates the HTML responses to the client.

Wireless Datagram Protocol (WDP):• The WDP (wireless datagram protocol) a connectionless protocol over the wireless environment, so the data transmitted by using WDP in connection less way like UDP in wired environment.• The WDP datagram's provide independent and stateless information. That is the data

Page 45: Mobile Computing UNIT-8

in one datagram is no way to related to data in another datagram.• WDP supports the multicasting of the datagram's over the network. It also uses the Wireless Control Message Protocol (WCMP) which functions like an ICMP in wired environment.• The WCMP is a connectionless protocol, it is used when sending the messages, to know the queuing information, reporting errors, and for route address advertisement. It also used for route seeking (soliciting) messages.

Page 46: Mobile Computing UNIT-8

• The following diagram shows the WDP header

Page 47: Mobile Computing UNIT-8

• The WDP can enable the adaptation of datagram's over the wireless environment. The WDP datagram header is received from the upper layers at the client device.• The WDP header consists of source port, destination port, source IP address, destination IP address (it is optional), length of data, and checksum fields.• The WDP datagram may also has error code to report errors to the upper layers at client.

Page 48: Mobile Computing UNIT-8

Wireless Transport Layer Security (WTLS):• We know that the Transport Layer Security is used in wired internet for secure networking of transport layer data.• In wired networks the TLS is an optional one and also TLS maps to Secure Socket Layer (SSL) in HTTPS (HTTP with SSL).• In wireless networks also the WTLS is an optional one, which provide security to the networked data getting from the transport layer.

Page 49: Mobile Computing UNIT-8

• The following diagrams shows data exchanges by using WTLS

Page 50: Mobile Computing UNIT-8

The following are the WTLS services;

1.It assures integrity when data transactions occurs between client and gateway.

2.It ensures the privacy of transactions.

3.It maps SSL to HTTPS.

4.It supports TCP, WDP, and WCMP.

5.It serves as a layer, above the WDP and provide security to datagram's when required.

Page 51: Mobile Computing UNIT-8

• Before transmission of the data over the wireless network, a secure session is established between the nodes by using the upper layer protocols, such as WTP, WSP, WAE.• The following specifications can takes place during WTLS establishing secure session;

1.Source device generate a message to create a secure channel consists the following information;

a.Source address and source port number.

b.Destination address and destination port number.

Page 52: Mobile Computing UNIT-8

c. Either RSA or ECC algorithms for key exchange.

d. IDEA or DES algorithms for ciphering the data.

e. Compression method used for data compression.

2. The destination side messages for secure channel establishment conformation consists the following information.

a.Sequence number.

b.How many times the key is refreshed and exchanged again

Page 53: Mobile Computing UNIT-8

C. Identification of session after establishment of session.

d. RSA or ECC algorithm for key exchange.

e. IDEA or DES algorithm for ciphering of text.

f. A compression method for data compression.

3. After getting the request from the destination the source generates the secure channel public key authentication by a client certificate.

4. Source device generate message to commit the request.

Page 54: Mobile Computing UNIT-8

5. The destination generate the message for commit conformation request.

Wireless Transaction & Session Layers:

Introduction:• We know that the TCP getting the problem of loss of packets in wireless environment, so we need Wireless Transaction Protocol (WTP) for sending and receiving of information in wireless environment.• In wired networks, first we establish session (connection) and then transmit the data as per the TCP segment numbers (here the maximum segment number is 232 ),

Page 55: Mobile Computing UNIT-8

but the wireless environment has frequent loss of connectivity, so the wireless environment require compressed codes and suitable encoding mechanism. • Here encoding means adding additional bits for error detection and correction.• The Wireless Session Protocol (WSP) can also used compressed binary codes for establishing wireless sessions.

Wireless Transaction Protocol (WTP): • Wireless Transaction Protocol (WTP) is an upper layer of Wireless Transaction Layer Security (WTLS), so it transmits the data to

Page 56: Mobile Computing UNIT-8

WTLS for secure transmission. •The WTP has also able to directly transmit the data to Wireless Datagram Protocol (WDP) or to Wireless Control Message Protocol (WCMP) without transmit the information to WTLS.• WTP supports the joining of messages and enables asynchronous data transmissions.• Suppose the transmission is aborted in the middle of transmission, then the WTP facilitates set back the whole transaction to the initial state.• WTP also indicate the success or failure of transactions.

Page 57: Mobile Computing UNIT-8

• The WTP act as an interface for reliable transmission and it has three WTP services classes such as 0, 1 and 2.

1.Class-0: Here the source send the messages to destination and it should not expect any response from the destination.

2.Class-1: This class represents reliable data transfer. Here source start the transaction with a request.•Now the destination device obtain the request then generate the conformation of invocation.

Page 58: Mobile Computing UNIT-8

• After getting the invocation from the destination, the source responds with data transmission.• Finally the device sends the acknowledgement to the source.• Here the source takes the responsibility to remove the duplicate data, provide retransmission and transaction identifier.• The total process comes under the PUSH service, in which there is no acknowledgement for user’s data except conformation invocation.

Page 59: Mobile Computing UNIT-8

3. Class-2: This class also represents the reliable data transmission. Here also the source start the transaction with a request.• Now the destination device gets this request and send back the acknowledgement to the source.• Now the source responds by transmitting the information to the destination. Again the device send the acknowledgement to source.• Here also the source takes the responsibility of removing the duplicate data, retransmission and transmitting transaction ID.

Page 60: Mobile Computing UNIT-8

• Here two acknowledgements, one is acknowledgement generated by the user and another is automatic acknowledgement.• The following diagram shows WTP header and WTP invocation

Page 61: Mobile Computing UNIT-8

Wireless Session Protocol:• The Wireless Session Protocol support stateless data transfers, so the client browser get the packets in any sequence from the server.• Here Synchronization Markup Language (Sync ML) in WSP is used to connect the particular node to the internet (server). Here the synchronizations can also takes place between the client and server by using Sync ML at WAP application layer.•The WSP transmit the data to the WTP for reliable data transmissions other wise the WSP is also able to transmit the data directly to the WDP or WCMP.

Page 62: Mobile Computing UNIT-8

The following diagram shows WSP protocol session, it has establishing connection, receiving and response headers.

Page 63: Mobile Computing UNIT-8

• WSP can considered as a compressed binary encoded version and as a extended version HTTP.• The WSP also supports, asynchronous exchange of data, multiple requests from clients, push and pull mechanism of data dissemination, capability negotiation and content encoding.• The following is the session management of WSP.

1. First the session is established by using the functions of agreed common protocols.

Page 64: Mobile Computing UNIT-8

2. In WSP, an established session can be suspended and then resumed from the point at which it was suspended.

3. A session can be terminated.• The WSP having the three service classes such as 0,1 and 2.

Class-0: This class indicating the source sending unconfirmed push. It support session suspension, resumption, and management. The messages sent from the source do not get any response from destination.

Page 65: Mobile Computing UNIT-8

Class-1: This class represents the source sending the confirmation push.

Class-2: This class represents source support for session invocation, suspension, and resumption.

The following diagram shows WSP invocation and request for results;

Page 66: Mobile Computing UNIT-8

Wireless Application Environment:• The Wireless Application Environment consists of the following components;

1.WML

2. WML Script.

3. WBXML – Wireless Binary XML.

4. WTA - Wireless Telephony Application.

5. Data formats.

Page 67: Mobile Computing UNIT-8

• The WML is also a XML based language which takes the following mobile devices constraints into account while programming an application for running on the device.• These are the constraints of mobile devices;

1.Narrow band network connection with intermittent loss of connectivity.

2.String parameterization and state management.

3.Limited user input and output facility.

4.Limited computational resources and memory.

Page 68: Mobile Computing UNIT-8

WML: We know that XML and how to create applications in XML based languages. Here tags are used to markup the code.• The WML is a webpage markup language for wireless environment internet. There are two versions of WML those are WML2.x and WML1.x . The WML2.x may also include Extensible Hyper Text Markup Language Mobile Profile( XHTML-MP). • Generally, the WAP also has the functions and WML methods at the server for pre configuration of mobile device.

Page 69: Mobile Computing UNIT-8

WML Card:• WML is used to create the cards for mobile applications. Here a card represents an interaction between the user and the deck contains the cards.• In WML all the information collected and managed in the form of deck and cards. The WML deck is save with file extension .wml.• Let us consider the deck is a WML file and cards are records with in the file.•In WML a scaled down set of procedural elements are used to control navigation between the cards and WML parser parses the information within deck of cards.

Page 70: Mobile Computing UNIT-8

• A WML card has the following features;

1.It provide content – programs, data, commands, strings, or images.

2.It support wide variety of formatting commands and layout commands.

3.It provides user interface for mobile devices with constraints as mentioned in the WML code.

4.Organizing similar deck of cards.• A WML card is first validated against its declared document type by using Document Type definition (DTD) before parsing.

Page 71: Mobile Computing UNIT-8

WML Script: • WML script is a scripting language is used in wireless environment. It is similar to CGI script in HTML at server side.• The WML script is used to retrieving the application required data from the server and enables the server response for clients request.• In WML script each line of code is loaded into computer and executed at run time only

Page 72: Mobile Computing UNIT-8

• At the client side the WML script is similar to JavaScript and it does not require to communicate with the server by sending a request and waiting for the response.• WML script is embedded markups within WML, WAP browser displays the page having WML script.• The WML script does not require any pre compilation, so it is executed very fast and it is compiled at gateway, only byte code is sent to the client.

Page 73: Mobile Computing UNIT-8

WBXML: • The Wireless application protocol provides communication between the client and the gate way by using the WBXML.• General XML and WML data formats are not compact to establish communication between the client and gateway.• WBXML represents any information in binary format, so the data is transmitted to the gateway in compact format.• In WBXML we use a binary number instead to represent a tag.

Page 74: Mobile Computing UNIT-8

• The binary codes causes the compact transmission, but there is no change in contents, code functionality, and semantic information.• WBXML also support and keep the structure of elements which are used in XML intact. But metadata information, document type definitions, conditional sections are removed when the XML document is converted into binary format.• The WBXML browser does not take unknown elements or attributes from the gateway.

Page 75: Mobile Computing UNIT-8

WTA: • The specific telephonic features are defined by the WAT interface (WATI) by using the WML browser.• A WTA server can push the script and WTA event handler can handle the events, persistent storage can help to data storage on device.• WTA can also provide security interface, only authorized gateway can access the data at the server.

Page 76: Mobile Computing UNIT-8

User agent Profile: • User agent is a software used by the user to give inputs using Voice User Interface (VUI) or Graphic User Interface (GUI) and also interact with mini browser.• User agent executes the WMLscript at the client and displays the result. It also displays the responses from the server.• User agent support the small screen device characteristics and profile enhances, such as font, display capabilities, touch characteristics etc.

Page 77: Mobile Computing UNIT-8

Data Formats:• The data displayed on mobile devices is in special data format.• vCard2.1 is format for visiting card, vCalendar 1.0 is the format for calendar. The mobile devices also support pictogram, which display small pictures of low resolution.

END OF UNIT VIII