Explain the wap stack in brief, Computer Engineering

Discuss the WAP stack in brief.

The protocol stacks part implemented by WAP Stack for the WAP development and research platform. The protocol stack will be exploited into many WAP exact system components as WAP proxy servers and gateways

1003_WAP Architecture.png

WAP Stack: WAP Architecture

WAP STACK has developed software for:

API (interface to applications/Wireless Application Environment)

WAP Forum stack layers (WTP/Transaction, WSP/Session, WTLS/Transport Layer Security, WCMP/Control Message, WDP/Datagram)

Simulation layer (the behaviour simulates of an air interface and underlying communication layer protocols of a wireless data channel)

Posted Date: 5/13/2013 6:15:50 AM | Location : United States

Related Discussions:- Explain the wap stack in brief, Assignment Help, Ask Question on Explain the wap stack in brief, Get Answer, Expert's Help, Explain the wap stack in brief Discussions

Write discussion on Explain the wap stack in brief
Your posts are moderated
Related Questions
I need to write a 32 bit adder in MIPS without using the Add command and a divider as well.

Magnify a triangle with vertices A = (0,0), B = (3,3) and C = (6,4) to twice its size in such a way that A remains in its original position.

Q. Convert the following from octal to binary, decimal, hexadecimal and BCD. a) 7.7 b) 4037 c) 23.34

What are the different sections of a report? A report is categorized into many sections: The Report header: In this you place a control which must appear only at the startin

Classify Scheduler. Scheduler is a kernel function decide which method  be  thought to be implemented by the processor: the scheduler scans the list of processes in the ready s

Selective set The selective-set operation sets to 1 bits in register A where there can corresponding 1's  in  register  B.  It  does  not  affect  bit  positions  which  have

Question: (a) What are the main challenges for Mobile Computing? (b) What is the ISM band and what is particular about this frequency band? Name two wireless technologies

A router is used to Distributes information among networks.

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Give LOAD-STORE optimization based on expression trees for the expression (A+B)/(C-D). LOAD-STORE optimization based on expression trees for the expression (A+B)/(C-D) is given