WAP 2.x architecture Features, services and functions
|
|
|
- Hubert Edwards
- 9 years ago
- Views:
Transcription
1 2.x architecture Features, services and functions Peter Arnby, Johan Hjelm and Peter Stark Web services adapted to the wireless environment have been a tremendous success, especially in Japan, where more than 25 million people use i-mode. However, the architecture of i-mode has some limitations. These will be overcome with 2.x. In this article, the authors describe 2.x, the universal wireless application environment. They explain the similarities and differences between the 1.x and 2.x architectures, and depict conceptual components and features of the second-generation architecture. These components the application environment, protocol framework, security services, and service discovery are key to successful application and service development. Modularity, an important feature of the secondgeneration architecture, enables developers to select modules from different components and to create user services that fulfill market demands. BOX A, TERMS AND ABBREVIATIONS CC/PP Composite capabilities/ preferences profile CSD Circuit-switched data CSS Cascading style sheet DNS Domain name ECMAscript Formerly Javascript EFI Extended functionality interface HTML Hypertext markup language Hypertext transfer protocol ical Calendar interoperability standard established by the Internet Mail Consortium IETF Internet Engineering Task Force IP Internet protocol IPv4 IP version 4 IPv6 IP version 6 MMS Multimedia messaging service OSI Open systems interconnection OTA Over the air PKI Public key infrastructure RDF Resource description framework RSVP Resource reservation protocol RTP Real-time transport protocol SMTP Simple mail transfer protocol Introduction SyncML TCP TLS UAPROF UDP vcal vcard W3C WAE WIM WML WSP WTA WTLS WTP XHTML XML Synchronization markup language Transport control protocol Transport layer security (formerly secure socket layer) User agent profile User datagram protocol Calendar interoperability standard by the Internet Mail Consortium, superseded by ical Business card interoperability standard by the Internet Mail consortium World Wide Web Consortium application environment Wireless application protocol Wireless identity module Wireless markup language Wireless session protocol Wireless telephony application Wireless TLS Wireless transaction protocol Extensible HTML Extensible markup language Most Web services cannot be used directly in a mobile terminal since they have been designed for larger screens and for use that is incompatible with the mobile terminal. Despite these limitations, mobile terminals are positioned to become devices of ubiquitous information access. In Japan, for example, NTT DoCoMo s i-mode service is used by some 25 million subscribers. And this number is growing by approximately 70,000 users per day. Similarly, in Europe, the wireless application protocol () has been a huge success among developers. Indeed, in some countries, it is becoming difficult to find major websites that do not contain pages in the wireless markup language (WML), and new services are being launched daily. Until now, and i-mode have not been compatible. The markup in i-mode is based on an older version of HTML, whereas is based on the new XML data format. The protocols used are totally different for instance, i-mode uses optimized versions of the protocols used on the Web, and that does not fulfill the design constraints for. To make life easier for developers, NTT DoCoMo has been working with the Forum to develop the new version of, which will contain the best features from i-mode and, while maintaining compatibility with future standards and the installed base, and exploit features from the next generation of the World Wide Web (WWW). The result, which NTT DoCoMo claims they will use in coming versions of i-mode, is 2.x ( Release 2001). A goal of 2.x initiatives has been to use the wireless application protocol to fully enable the mobile Internet while avoiding problems such as the worldwide wait. The Forum has become the most important source for collecting feedback on specifications for the mobile Internet and their implementation. As one of the founders, and chairing several important working groups, Ericsson is also playing a key role in the Forum. Note: Ericsson Review previously discussed hypertext transfer protocol () and transport services in the 1.x architecture. However, because the Internet Engineering Task Force (IETF) is still working with the wireless optimization of existing transport protocols, these topics are not discussed in this article. 2.x The 1.x architecture consisted of the origin, gateway, and user-terminal environment. The could be a or ; the gateway translated the protocol layer and application information. By contrast, the 2.x architecture consists of four conceptual components, namely the application environment; protocol framework; security services; and service discovery. 178 Ericsson Review No. 4, 2001
2 device Proxy Application micro- browser (w/wta) Encoded request (URL) Encoded content proxy Feature enhancement Request (URL) Figure 1 The 2.x architecture supports the use of proxies which enhance the capabilities of the. The 2.x architecture does not have strict divisions between the, gateway, and user-terminal environment. And there is no longer any intermingling between transport and service. Instead, functions which are accessed via the Internet can be outsourced to capability s in a network that implements support for, say, a wireless telephony application (WTA); public-key infrastructure (PKI) portal; provisioning ; and user-agent profile (UAPROF) repository. Communication from clients can take place directly with the, but it will most likely take place through a proxy. Proxies are being established as one of the main points of control (for example, through firewalls) and as central points for resource interconnection. clients support a proxy-selection mechanism that allows them to choose the most appropriate proxy for a specific task. This extends the current Internet proxy model. The 2.x protocol is compatible with 1.x, but it relies more extensively on standard Web protocols (such as ) and formats (such as XHTML). 2.x also clearly separates the bearer (CSD, GPRS, IMT-2000); transport (WDP, TCP); session layer (cookies, CC/PP); and applications. Most protocol services in the 1.x suite are also available in new Web protocols. But the push service cannot be realized through existing Web protocols without significant changes to the current Web architecture. Both the 1.x stack and Internet protocols (such as hypertext and multimedia transfer services) can provide some services, but only is capable of providing others, such as the push service. From the start, has been based on the browsing paradigm made popular by the Web: it adapts technologies from the Web, making them work better in wireless networks. In the 2.x architecture, more of the Web technologies are adopted directly (as they are) rather than adapted, and then extended with -specific functions. These functions enable service Figure 2 The 2.x architecture also allows for supporting s which can provide additional functions for example, public key infrastructure. Supporting PKI portal device micro- browser Request (URL) Application Supporting UAProf Ericsson Review No. 4,
3 Service discovery EFI Provisioning Navigation discovery Service lookup Security services Crypto. libraries Authorization Identity PKI Secure transport Secure bearer Network protocols Protocol framework Session services Transfer services Transport services Nearer networks Application framework (WAE, push dispatcher, messaging client) renderers Capability negotiation Cookies Hypermedia transfer Datagrams Common functions Streaming Sync Push-OTA Message transfer Connections IPv6 SMS GHOST FLEX SDS IPv4 USSD GUTS ReFLEX MPAK Figure 3 The 2.x architecture is a layered architecture that includes different functions within its framework. WIM EFI providers and developers of systems, content providers, and devices to provide users with greater added value. Modularity is one of the main features of the second-generation architecture (modules interact through well-defined interfaces). The security-service and servicediscovery components of the architecture span every layer of the open systems interconnection (OSI) model. The application environment component resides on top of OSI layer 7; the protocol framework comprises everything from OSI layer 2 to 7. The architecture allows components to interact. Developers can thus select modules from different components and create new user services. Conceivably, a minimal device can be developed by selecting components with the smallest footprints. In practice, devices and proxies will most likely implement either a dual stack or only the Internet stack. Backward compatibility is achieved by providing continued support for WML 1 in the client. The conformance profiles (Box B) determine the configuration of the devices as well as how they work together. The application environment component The application-environment component enables the following services: application environment (WAE) that is, the browser, calendar agent, and other user agents; user-agent profile; multimedia messaging and other data formats; and push service. The application environment provides the user interface and other functions that display content. Because it is a flexible environment, modules can be added on an ad hoc basis (optional) or through the Forum s specification development process. BOX B, THE USER-AGENT PROFILE The Forum defined the term user-agent profile (UAPROF) for use within the composite capabilities and preferences profile (CC/PP), which is used to describe the capabilities of the user terminal application environment. The user-agent profile is a data format. A specific set of properties and values describes each terminal. The Forum standardized the property names and values as part of the UAPROF vocabulary. The CC/PP is defined in an XML framework called the resource description framework (RDF) which enables users to connect a property to an object (the CC/PP is an application of the RDF). The resource description framework can be used for annotations, metadata, and profiles that describe users or their terminals. By knowing the information display capabilities of a terminal, the can create a display that is optimized for that terminal. Including profile information with the request minimizes the number of transactions needed to optimize the information, and it can be cached in a proxy or retrieved from a repository that the device manufacturer maintains. This minimizes the amount of information transmitted over the air and speeds up information access. Designers can create pages or page templates to be used with database s (such as the Ericsson application ), displaying them in formats that are adapted to user devices. 180 Ericsson Review No. 4, 2001
4 application environment The application environment is in the mobile terminal. It contains a subset of XHTML (for display formatting) and a subset of the cascading style sheet (CSS) language (for content formatting). It also contains user agents for WTA and programming interfaces for use in mobile devices. WML and WMLscript execute in the application environment. Cascading style sheets The 2.x architecture contains a subset of the cascading style sheet language, which is the most widely used display language on the Web. Using cascading style sheets, an author can define how each element in a document is to be displayed. This gives authors greater control compared to when the display is specified inside the markup. A style sheet need only be downloaded once from the network. After that it can be retrieved from a local cache. Cascading style sheets can adapt automatically to the capabilities declared by a device s user-agent profile. This is particularly important because display capabilities vary significantly among devices. A format that looks good on one device might be displayed differently on another. The useragent profile ensures that the device gets the most appropriate style sheet. And because style sheets separate display from content, authors can use the same WML document for many different devices with significantly different display capabilities. Contact and calendar information 1.x versions contained the vcal and vcard data types, which are not part of the browsing environment. The Internet Mail Consortium standardized vcal and vcard as structured data types for displaying contact and calendar information. ical, which was developed from vcal, is used in products such as Microsoft Outlook and Lotus Organizer. It is also used in Ericsson s AirCalendar, which allows users to synchronize the electronic calendars they use in the fixed environment with the calendars on their mobile terminals. also accommodates other data types, such as audio and video. Multimedia messaging Many of the functions of the new environment are available in existing Internet architectures, but the 2.x application environment contains two modules that were developed in 1.x. These two modules contain functions that are not available in other systems: multimedia messaging service (MMS) was one of the highlights of this year s GSM-UMTS Forum, and push services are not possible on the Web using standard. MMS is an -like mechanism for the transmission of multimedia messages (electronic postcards with sound), which are expected to become very popular applications, especially in thirdgeneration mobile systems. Push services Service providers use push services to send information to users (who need not initiate any action). As simple as it might sound, the push-service architecture has been a major item on the Forum agenda. In the 2.x architecture, the push service has been divided into the user-agent module and the session-layer module. The protocol framework component The application environment relies on a protocol framework component that enables the functions needed to provide the services described above. The protocol framework consists of four modular layers, which can be combined: the session service layer; the transfer service layer; the transport service layer; and the bearer service layer. In traditional Internet environments, the protocol framework solely provides transport services for applications, such as hypermedia transport (), streaming device micro- browser (w/wta) Request (URL) Response (content) Push (content) Application Push initiator BOX C, XHTML XHTML is HTML reformulated as an XML application, defined by the W3C. For 2.0, the Forum has defined a strict subset of XHTML called the XHTML mobile profile. The profile is in turn a superset of the W3C XHTML basic profile, a W3C recommendation (December 2000) for XHTML in small devices. An XHTML page, written in XHTML mobile profile or XHTML basic, can be viewed in a 2.0 browser or any standard Web browser. All basic XHTML features are supported, including text, images, links, checkboxes, radio buttons, headings, horizontal rules, and lists. Figure 4 The 2.x architecture allows the application and the client to connect directly for push and content responses. Ericsson Review No. 4,
5 BOX D, ACQUIRING CERTIFICATION While some modules are mandatory, a device designer can select and implement desired modules and still satisfy prerequisites for certification. A set of conformance profiles for 2.x determines what a device is, and which components it should make use of. This also helps users to make their choice of devices, since they can easily match the conformance profile with the functions they need. certification will be increasingly important, since many implementations of technologies developed in the IETF or W3C do not follow the specification, and in practice, implement only a minimal set of functions. This will not happen in a environment whose rigorous certification process determines conformity standards. (RSVP and RTP Internet protocols), and message transport (standard Internet protocols, such as SMTP). In the architecture, a logical layer has been added: the session service layer. Session service layer In the 2.x architecture, the session service layer, which resides between the transport layer and the application environment, brings several new services to applications. Sessions do not exist in, but cookies can provide sessions. Cookies, which are database markers included in the request and looked up on the side to identify the user, are part of the 2.x architecture. They enable the reuse of mechanisms that already exist in the Internet and solely give an indication about the relationship between a single and the user agent. Cookies cannot be used as a general source of information. The session service layer also includes a technology for reporting to the. The reports contain information on terminal capabilities and on the terminal application environment. This information is used to optimize the display format. Data synchronization Synchronization is another new service in. The Forum has been working with SyncML (another industry consortium) to create a language for data synchronization. Synchronization of data that has been updated in mobile and fixed environments can be a thorny issue. Users retrieve data from the network and store it on a mobile device, which they use to access and manipulate the local copy of the data. Periodically, users reconnect to the network to send changes to the networked data repository. Users also have the opportunity to learn about updates made to the networked data while their terminal was offline. Occasionally, users need to resolve conflicts between their local updates and the networked data. This reconciliation operation (during which updates are exchanged and conflicts are resolved) is known as data synchronization. The data synchronization protocol synchronizes networked data with that on many different devices, including handheld computers, mobile phones, automotive computers, and desktop PCs. Push sessions The push solution also contains a session component. The push over-the-air (OTA) session service enables the establishment of push sessions across communication links that might not be persistent; and in instances when addresses are dynamically assigned. There is no binding between the transport of data and the session on the Web. The data transport is transparent to the session. Once a hypertext transport transaction is finished, the state it created disappears. In the 1.x stack, the wireless session protocol (WSP) and wireless transaction protocol (WTP) can be used in combination to create and maintain a state, and through it, sessions. This has several advantages (for example, to enable push). By including as a transport method, the Forum now enables both stateful and stateless transport. Session services provide a memory of previous transactions (this feature does not exist in, since it is a stateless protocol) that enable the retention of terminal characteristics and make for faster initialization of complex transports (such as data streaming). Apart from the transport of text documents, the architecture has also been prepared for the next generation of messaging. It contains a multimedia transport mechanism for asynchronous message transport (messages are encapsulated for transmission between multimedia and s in a -specific protocol). The data-transport mechanisms also include IETF data-streaming formats. Transport service layer The transport services in 2.x are either datagrams (connectionless service) or connections. Datagrams are more efficient for services that are not dependent on a persistent connection. The datagrams comply with either the user datagram protocol 182 Ericsson Review No. 4, 2001
6 (UDP), which is used on the Internet, or the wireless datagram protocol, which was defined for the 1.x architecture. The connection-oriented aspects of the new architecture are handled by the transmission control protocol (TCP). TCP, however, does not work well over mobile networks, so the Forum is discussing an optimized mobile profile, to enable the mobile terminal to function optimally over the mobile network with its special characteristics. Bearer service layer In 2.x, the bearer services have been extended considerably. They now include the mobile radio bearers used to transport (such as SMS, FLEX, USSD, and GUTS), as well as IP version 4 (IPv4) and IP version 6 (IPv6). can be transported over different networks, and mapping can be handled directly from the stack to several bearer services. 1.x contains several modules for bearer networks, some of which (broadcast networks, for example) could not be handled using TCP transport. In 2.x, bearers can be managed by the IP stack or directly by the datagram or connection service, which uses the Internet s transmission control protocol. Security services component The security services component is positioned orthogonally to data-transfer and data-use services within the protocol framework component. Security on the Internet is currently a hot issue, and the 1.x architecture has received a lot of criticism. The telecommunications industry has been a leader in the security area for a long time, and this experience has been transferred into the 2.x architecture. security services span all layers of the 2.x architecture, thus creating opportunities for users to set up extremely secure environments (in fact, much more so than what is currently possible on the Web). How? By combining application-layer, transfer-layer, transport-layer, and bearerlayer security the possibilities are endless. Security services include mechanisms for signing and encrypting data as a WMLScript crypto library; authentication services; an identification service that uses the wireless identity module (WIM); a PKI system; transport layer security (TLS, previously called SSL); and WTLS, the 1.x-adapted version of TLS. Service discovery component The service discovery component is another orthogonal component in the 2.x architecture that embraces what is available on the Internet and extends it by adding mobile-specific components. One example, the service lookup protocol, uses the existing domain name (DNS) from the Internet. Terminal functionality is extended through the extended functionality interface (EFI), which enables a device to have external entities attached to it (thermometers, pressure gauges, and so on). Provisioning, which is another telecommunications-specific protocol, is translated into. Devices can thus be provided with all the parameters they need to function through the network. Navigation discovery allows a client to discover services in the network for example, a client might need to find a proxy in order to download data. Conclusion The environment is a consistent architecture composed of standard components taken from the Internet where available, or constructed separately. They enable a consistent application environment for the mobile system. Thanks to the certification process of the Forum, interoperability is also ensured for all the different functions of the 2.x architecture. Using, the developer gets a well-known development environment, and does not have to create several different versions of the application for mutually incompatible environments. TRADEMARKS Microsoft and Microsoft Outlook are registered trademarks of Microsoft Corporation. Lotus Organizer is a registered trademark of Lotus Development Corporation. Ericsson Review No. 4,
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS Chapter
Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
Wireless Application Protocol (WAP)
Wireless Application Protocol (WAP) Definition Wireless application protocol (WAP) is an application environment and set of communication protocols for wireless devices designed to enable manufacturer-,
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Web Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
HTTP State Management
HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms
Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
PushTalk Service System
PushTalk Service System Naomasa Yoshida, Masaharu Nakagawa, Makoto Nakayama, Youhei Ikai, Miya Matsuda and Masanobu Yamagiwa We have developed a system for providing the PushTalk service, which allows
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).
1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).
Chapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
Basic Internet programming Formalities. Hands-on tools for internet programming
Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl [email protected] DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23
Voice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Virtual Team Collaboration Glossary
Virtual Team Collaboration Glossary Steve Prahst, Rhonda Arterberrie, and Dennis Kay Knowledge Management and Collaborative Technologies Branch NASA Glenn Research Center Introduction Most NASA projects
Application-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
How To Design The Web And The Internet
1 The Environment and the Tools Web Design, 4 th Edition Chapter Objectives Describe the Internet and the World Wide Web Discuss ways to access the Internet and the Web Categorize types of Web sites Identify
Mobile IP and Wireless Application Protocol
Mobile IP and Wireless Application Protocol Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile user's point of attachment
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier
Software Engineering 4C03 VoIP: The Next Telecommunication Frontier Rudy Muslim 0057347 McMaster University Computing and Software Department Hamilton, Ontario Canada Introduction Voice over Internet Protocol
Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background
GSMA Overview of GSMA Profile It was agreed in the GSMA in February 2010 that voice services over LTE () shall use the platform standardized by the 3GPP with a view to maximizing international interoperability.
Lesson Overview. Getting Started. The Internet WWW
Lesson Overview Getting Started Learning Web Design: Chapter 1 and Chapter 2 What is the Internet? History of the Internet Anatomy of a Web Page What is the Web Made Of? Careers in Web Development Web-Related
AJAX: Highly Interactive Web Applications. Jason Giglio. [email protected]
AJAX 1 Running head: AJAX AJAX: Highly Interactive Web Applications Jason Giglio [email protected] AJAX 2 Abstract AJAX stands for Asynchronous JavaScript and XML. AJAX has recently been gaining attention
*1 sp-mode TM : sp-mode and sp-mode logo are trademarks or registered trademarks of. of NTT DOCOMO, INC.
Smartphone e-mail Service New Services and Functions for Smartphones in 2010 e-mail Service for The market for smartphones has been expanding rapidly in recent years. It has been possible to freely download
Step into the Future: HTML5 and its Impact on SSL VPNs
Step into the Future: HTML5 and its Impact on SSL VPNs Aidan Gogarty HOB, Inc. Session ID: SPO - 302 Session Classification: General Interest What this is all about. All about HTML5 3 useful components
UPnP Control Point for Mobile Phones in Residential Networks
1 UPnP Control Point for Mobile Phones in Residential Networks Andreas Häber 1, Frank Reichert 2, and Andreas Fasbender 3 Abstract Together, Ericsson and HiA are studying the role of WiFi-enabled mobile
The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
Wireless Java Programming for Enterprise Applications
Wireless Java Programming for Enterprise Applications Mobile Devices Go Corporate Dan Harkey Shan Appajodu Mike Urkin WILEY PUBLISHING, INC. Jl. ^E^.^l.^ Contents Foreword Preface v vii Part 1. Technologies
Connecting with Computer Science, 2e. Chapter 5 The Internet
Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
If your organization is not already
Before you build your Web site, you need a solid design. Eden Watt At a Glance When you develop your first e-commerce site, you will discover that there are a few new things to learn about application
ARIB STD-T63-27.103 V3.1.0. Wide area network synchronisation standard
ARIB STD-T63-27.103 V3.1.0 Wide area network synchronisation standard Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T63 for Related Industrial Property Rights. Refer to "Notice"
Smartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Technical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Integrate VoIP with your existing network
Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
BlackBerry Desktop Software User Guide
BlackBerry Desktop Software User Guide Version: 2.4 SWD-1905381-0426093716-001 Contents Basics... 3 About the BlackBerry Desktop Software... 3 Set up your smartphone with the BlackBerry Desktop Software...
Sage Accpac CRM 5.8. Self Service Guide
Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE
1.1 Introduction 01 1.2 The Checklist 02 1.3 Business Mail Requirements 03 1.4 Downloading & Installing Outlook 2003 04 BEFORE YOU START 1.1 INTRODUCTION 1.1.1 Who this Guide is For 1.1.2 What s in this
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Applications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
Library Requirements
The Open Group Future Airborne Capability Environment (FACE ) Library Requirements Version 2.2 April 2015 Prepared by The Open Group FACE Consortium Business Working Group Library Subcommittee AMRDEC PR1201
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Advanced Configuration Administration Guide
Advanced Configuration Administration Guide Active Learning Platform October 2015 Table of Contents Configuring Authentication... 1 PingOne... 1 LMS... 2 Configuring PingOne Authentication... 3 Before
Development of a Learning Content Management Systems
Development of a Learning Content Management Systems Lejla Abazi-Bexheti Abstract Change appears to be the only constant in the field of ICT and what was treated as advanced feature few years ago is today
Detailed Table of Contents
Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
estos SIP Proxy 5.1.30.33611
estos SIP Proxy 5.1.30.33611 1 Welcome to estos SIP Proxy... 4 1.1 WAN Settings... 4 1.2 Network interfaces... 5 1.3 Network Interface Configuration... 6 1.4 SSL/TLS Communications Certificate... 6 1.5
Systems for Personal Data Storage Services
NTT DoCoMo Technical Journal Vol. 8 No.2 Systems for Personal Data Storage Services Makoto Hamatsu, Tetsuo Sato and Eiji Yano As part of DoCoMo s efforts toward secure and safe mobile terminals, we developed
Standards and Guidelines for. Information Technology. Infrastructure, Architecture, and Ongoing Operations
Standards and Guidelines for Information Technology Infrastructure, Architecture, and Ongoing Operations This document describes applicable standards and guidelines for the university's policy on Information
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation
Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation Credit-By-Assessment (CBA) Competency List Written Assessment Competency List Introduction to the Internet
[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-MDM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
VIDEOCONFERENCING. Video class
VIDEOCONFERENCING Video class Introduction What is videoconferencing? Real time voice and video communications among multiple participants The past Channelized, Expensive H.320 suite and earlier schemes
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Bluetooth Protocol Architecture
Bluetooth WHITE PAPER DATE Aug 25th 99 N.B. DOCUMENT NO. 1.C.120/1.0 RESPONSIBLE Riku Mettala E-MAIL ADDRESS [email protected] STATUS Bluetooth Protocol Architecture Version 1.0 This white paper
The TCP/IP Reference Model
The TCP/IP Reference Model The TCP/IP Model Comparison to OSI Model Example Networks The TCP/IP Model Origins from ARPANET, DoD research network ARPA - Advanced Research Projects Agency Reliability was
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
ITU-T Y.2001. General overview of NGN
INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2001 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2004) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
