Wireless Transport Layer Security and Term Paper

Total Length: 1919 words ( 6 double-spaced pages)

Total Sources: 1+

Page 1 of 6

The wireless application models closely follow the internet model. "WAP specifies two essential elements of wireless communication: an end-to-end application protocol and an application environment based on a browser. The application protocol is a layered communication protocol that is embedded in each WAP user agent. The network side includes a server component implementing the other end of the protocol that is capable of communicating with any WAP user agents. The role of the server component is also to act as a gateway to route the request of a user agent to an application server." (Paukkunen, 1999) the server builds a bridge between the networks. This standard defines a browser, and an interpreter. It understands the WML Script. The WML or wireless mark up language is designed to be used in the wireless network and most protocols use the WML scripting procedures.

Stuck Writing Your "Wireless Transport Layer Security And" Term Paper?

(Paukkunen, 1999)

Conclusion

Wireless band use for communication has revolutionized the use of the internet, communication, and e-commerce and has enhanced accessibility. Following this the need arose to keep intrusion out of these systems and it was proved that internet and LANS were vulnerable to intruders. The wireless systems were found to be more vulnerable to attacks. As a result many security features of WAP servers, browsers, internet hosts and e-commerce follow security protocols designed for wireless applications. The wireless LAN technology is varied with the type of need. Today the 802.11 set of standards and protocols like the Wireless Transport Layer security -- WTLS is prevalent......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Wireless Transport Layer Security And" (2008, February 25) Retrieved May 9, 2024, from
https://www.aceyourpaper.com/essays/wireless-transport-layer-security-31963

Latest MLA Format (8th edition)

Copy Reference
"Wireless Transport Layer Security And" 25 February 2008. Web.9 May. 2024. <
https://www.aceyourpaper.com/essays/wireless-transport-layer-security-31963>

Latest Chicago Format (16th edition)

Copy Reference
"Wireless Transport Layer Security And", 25 February 2008, Accessed.9 May. 2024,
https://www.aceyourpaper.com/essays/wireless-transport-layer-security-31963