What protocol is used under a Socket in J2ME?

Posted on 2006-05-26
Last Modified: 2008-03-03

Hello, I am trying to understand various wireless communication protocols.

On J2SE, when I use a socket to communicate, the underlying protocol is TCP/IP.

On J2ME, when I use a socket to communicate, what is the underlying protocol?  Specifically, which layers of the WAP protocol stack are used?

Now, if I open an IMPS J2ME client on my wireless phone to chat with a friend on his PC, what happens?  I thought IMPS is supposed to replace the WAP protocol stack.  Is that correct?  Where does IMPS stand relative to WAP?

What if I open a native IMPS client on my wireless phone?  Does it behave exactly the same way as the J2ME client?


Question by:anonp
    LVL 13

    Accepted Solution

    The Open Mobile Alliance page is a great resource to facilitate further understanding of these protocols.

    When you open a socket in J2ME, you use the same protocol as J2SE, TCP/IP.

    With IMPS (Instant Messaging and Presence Service) uses CSP (Client server protocol), but it is using a push mechanism rather than polling. All of this wonderful stuff is built on top of TCP/IP.

    WAP is different. Similar to IMPS, WAP is capable of presence services and can do push with a proxy. WAP 2.0 does away with the proxy (built on HTTP1.1). WAP is built on top of HTTP, which - at it's root - is TCP/IP.
    Specs:  <-- this paper has the WAP stack at the bottom of the page and is very useful in understanding

    More about TCP/IP:

    Hope this info helps!

    Author Comment


    WAP is not built on top of HTTP.  WAP is built to parallel HTTP.  WAP for wireless and HTTP for wired.  HTTP is not used for the wireless half of a web access from a cell phone.

    Is TCP/IP available when I am using my cell phone?  Can you link to the article that claims that?  I thought TCP/IP is only for the wired half of a cell phone web access.

    The information that you provide seems to be inaccurate...


    Author Comment


    Actually, I was wrong. Thx

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Suggested Solutions

    Today sees the launch of a new case study, focusing on BYOD technologies we have been working with for some time now.  But with the advent of 802.11ac wireless technologies and the story behind our landmark developments, we would like to share this …
    DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now