WAP clients communicate with application servers through a number of different proxies or directly. WAP clientssupport the proxy selection mechanism that allows them to utilise the most appropriate proxy for a given service or toconnect directly to that service as necessary. Proxies can be used to augment a request. They translate between WAPand WWW protocols (HTTP, TCP), thereby allowing the WAP client to submit requests to the origin server.
The architecture for WAP devices is shown in Figure 6. The Application Framework provides the device executionenvironment for WAP applications. WAP applications are comprised of markup, script, style sheets and multimediacontent, all of which are rendered on the device. The WAP Application Environment (WAE) processing model definesthe structure in which these various forms of executable and non-executable content interact.
The network protocols on the WAP client are shared between client and server. They are described in further detailbelow. Content renderers interpret specific forms of content and present them to the end user for perusal or interaction.Common functions are defined to be utilised by the application framework, including persistence and data synchronisation.
The Wireless Identity Module (WIM), as specified in [WIM], contains the identity of the device and the cryptographicmeans to mutually authenticate WAP devices and servers.
The architecture also provides a mechanism to access external functions that are embedded or attached to the devicesvia the External Functionality Interface (EFI).
Security Model
WAP enables a flexible security infrastructure that focuses on providing connection security between a WAP client andserver.
WAP can provide end-to-end security between protocol endpoints. If a browser and origin server desire end-to-endsecurity, they can communicate directly using the security protocols. Moreover, the WAP specifications includesupport for application-level security, such as signed text.

No comments:
Post a Comment