Home / Networking / Architecture For Communication Over Mobile Devices / Profiles And Device Management

Architecture For Communication Over Mobile Devices / Profiles And Device Management

The Mobile Device Communication Architecture includes the following wireless data communication capabilities.

• Web Protocol Stack

• Wireless Markup Language (WML)

• Wireless Application Protocol (WAP)

Web Protocol Stack (HTTP/TCP/IP) :-

Web Protocol Stack consists of TCP/IP and HTTP. Its purpose is to allow two computers to Communicate With each other Over the Internet.

When a message is sent over Internet, it is translated from text form to electronic signals at the Source Computer and then translated back to text form at the destination Computer. Every computer needs protocol Stack to communicate Over the Internet and it is usually built in the operating system such as Windows. The protocol stack used for the Internet is known as TCP/IP protocol stack. Fig. 6.8 shows how message is sent over Internet from source to destination computer over Internet.

Web Protocol Stack

 

Wireless Markup Language (WML) :-

Wireless Markup Language is based on HTML and XML and it delivers internet contents to small wireless devices, such as browser-equipped mobile phones and other handheld devices. These devices have very small displays, slow CPUs, limited memory capacity, low bandwidth and restricted user-input capabilities. WML demands less memory and processing power from browsers than HTML. WML also includes features that support relatively small display sizes of today’s wireless devices.

Wireless Application Protocol (WAP) :-

WAP consists of multiple protocols that provides internet access to mobile users of wireless phones and other wireless devices such as pagers and personal digital assistants (PDAs). Today, it has become the standard for providing data and voice services to wireless hand-held devices.

About Muhammad Nouman Sheikh

Check Also

What is Man in the Middle (MITM) Attack/How To Be Safe

What is a Man-in-the-Middle (MITM) Attack? A MITM assault happens when a correspondence between two …

Leave a Reply

Your email address will not be published. Required fields are marked *