wireless transfer layer protection and term paper

Category: Various other,
Words: 537 | Published: 04.30.20 | Views: 582 | Download now

Transport

Wireless, Wireless Network, Wireless Technology, Ericsson

Excerpt from Term Paper:

The wi-fi application versions closely stick to the internet unit. “WAP identifies two necessary elements of wi-fi communication: a great end-to-end software protocol and an application environment based on a browser. The application form protocol can be described as layered conversation protocol that is certainly embedded in each WAP user agent. The network side features a server aspect implementing the other end in the protocol that is certainly capable of communicating with any kind of WAP user agents. The role with the server component is also to behave as a gateway to path the obtain of a consumer agent to a application storage space. ” (Paukkunen, 1999) the server builds a connection between the networks. This normal defines a browser, and an interpreter. It knows the WML Script. The WML or perhaps wireless indicate up dialect is designed to be employed in the wireless network and many protocols utilize the WML server scripting procedures. (Paukkunen, 1999)

Realization

Wireless band use to get communication features revolutionized the internet, interaction, and ecommerce and features enhanced ease of access. Following this the need arose to keep intrusion out of these devices and it absolutely was proved that internet and LANS had been vulnerable to thieves. The wireless systems had been found to be more vulnerable to attacks. Because of this many security features of WAP servers, browsers, internet hosts and web commerce follow protection protocols designed for wireless applications. The wi-fi LAN technology is varied with the form of need. Today the 802. 11 pair of standards and protocols like the Wireless Transport Layer protection – WTLS is frequent.

References

Andress, Amanda. (2003) “Surviving Protection: How to Combine People, Procedure, and Technology” Auerbach Journals. Boca Raton, FL.

Gast, Matthew. (2005) “802. 14 Wireless Networks: The Defined Guide”

O’Reilly.

International Engineering Consortium. (n. d. ) “Wireless Application Protocol (WAP)”

Retrieved 23 February, 08 at http://www.iec.org/online/tutorials/wap/topic01.html

Laneman, M. N.; Tse, D. N. C.; Wornell, G. W. (2004, Dec) “Cooperative variety in wi-fi networks: Effective protocols and outage patterns, ” IEEE Transactions about Information Theory, vol. 50, no . doze, pp: 3062-3080.

Macphee, Allan. (2001, Jan) “Understanding Digital Certificates and Wireless Transfer

Layer Protection (WTLS)” http://www.entrust.net/ssl-resources/pdf/understanding_wtls.pdf

Nichols, Randall K; Lekkas, Panos C. (2002) “Wireless Security: Designs, Threats, and Solutions” McGraw-Hill Professional.

Paukkunen, Mintunkukka. (1999) “Wireless Program Protocol” http://www.tml.tkk.fi/Studies/Tik-110.300/1998/Essays/wap_2.html

Searchmobilecomputing. com (2007, Aug) “Mobile and Wireless Protocols http://searchmobilecomputing.techtarget.com/news/article/0,289142,sid40_gci929575,00.html

Searchmobilecomputing. com (n. d. ) “Wireless Travel Layer Security” http://searchmobilecomputing.techtarget.com/sDefinition/0,sid40_gci549100,00.html

Sklavos, N; Kitsos, P; Papadopoulos, K; Koufopavlou, O. (2006, Apr) “Design, Architecture and Performance Evaluation from the Wireless Transfer Layer Security” the Journal of Supercomputing, vol. 36, no . 1, pp: 33-50.

WIRELESS”

< Prev post Next post >