BER ENCODING Basic Encoding Rules. Basic Encoding Rules What is it?  BER is the original rules laid out by the ASN.1 standard for encoding information.

Slides:



Advertisements
Similar presentations
By: Matthew Ng. AND, XOR, OR, Complement, Circular Left shift, and Addition Modulo Circular Left Shift is done with s positions (0 ≤ s ≤ 31) – Denoted.
Advertisements

Character and String definitions, algorithms, library functions Characters and Strings.
Translator Architecture Code Generator ParserTokenizer string of characters (source code) string of tokens abstract program string of integers (object.
1 Pertemuan 05 Model Informasi - SMI Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
Using the Semantic Web to Construct an Ontology- Based Repository for Software Patterns Scott Henninger Computer Science and Engineering University of.
1 Introduction to Computability Theory Lecture12: Decidable Languages Prof. Amos Israeli.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
TCSS 371A Machine Organization. Getting Started Get acquainted Review syllabus Understand purpose, scope, and expectations of the course Discuss personal.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
CSCI 3 Introduction to Computer Science. CSCI 3 Course Description: –An overview of the fundamentals of computer science. Topics covered include number.
Fall 2004COMP 3351 A Universal Turing Machine. Fall 2004COMP 3352 Turing Machines are “hardwired” they execute only one program A limitation of Turing.
CSTA is a kind of standard communication protocol used between PBX and computer that is famous in Europe. What is CSTA ? Control Requests Event Notifications.
Copyright © Cengage Learning. All rights reserved.
Jump to first page PKI2001 (TIFR, Mumbai) ASN.1 Abstract Syntax Notation One ASN.1 is a standard way to describe a message(a unit application data) that.
9-Aug-15 Vocabulary. Programming Vocabulary Watch closely, you might even want to take some notes. There’s a short quiz at the end of this presentation!
Data Structures 1- Course Syllabus. 2- Introduction about Data Structures.
Questions for Chapter 6,9 Ying Zhang.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
SNMP: Simple Network Management Protocol
Computer Architecture The Concept Ola Flygt V ä xj ö University
Abstract Syntax Notation One ASN.1
ASN.1 CNS 4650 Fall 2004 Rev. 2.
Abstract Syntax Notation Computer Networks courses Villanova University.
T Network Application Frameworks and XML Web Services and WSDL Sasu Tarkoma Based on slides by Pekka Nikander.
Network Management Computer Networks Natawut Nupairoj, Ph.D.
Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
Presentation Services  need for a presentation services  ASN.1  declaring data type  encoding data types  implementation issues  reading: text, section.
TIA/EIA-124 (DMH) Background Network Reference Model Record Structure Data Types ASN.1.
Abstract Syntax Notation ASN.1 Week-5 Ref: “SNMP…” by Stallings (Appendix B)
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
Abstract Syntax Notation One ASN.1. Abstract Syntax Notation One  Both the information and communications models need to be specified syntactically and.
An Introduction to Abstract Syntax Notation 1 (ASN.1)
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Logical view –show classes and objects Process view –models the executables Implementation view –Files, configuration and versions Deployment view –Physical.
Different types of data Hamish gully. Different types Machine data types All data in computers based on digital electronics is represented as bits (alternatives.
Modul 4 Struktur Informasi Mata Kuliah Preservasi Informasi Digital.
Why Standardize Metadata?. Why Have a Standard? Think for a moment how hard it would be to… … bake a cake without standard units of measurement. … put.
1 Chapter 38 RPC and Middleware. 2 Middleware  Tools to help programmers  Makes client-server programming  Easier  Faster  Makes resulting software.
C H A P T E R T W O Linking Syntax And Semantics Programming Languages – Principles and Paradigms by Allen Tucker, Robert Noonan.
Application support functions Chapter Introduction ASN.1 Security Data encryption Nonrepudiation Authentication Public key certification authorities.
Web services. The SOAP Data Model, Schema Validation, and Introduction to WSDL. February 16, 2006.
Distributed Computing, M. L. Liu 1 Interprocess Communications Mei-Ling L. Liu.
CGA-MIBCSI, IETF-72 1 CGA-MIB draft-garcia-martinez-cgamib-00 Alberto Garcia-Martinez
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Understanding the Value and Importance of Proper Data Documentation 5-1 At the conclusion of this module the participant will be able to List the seven.
1 A Universal Turing Machine. 2 Turing Machines are “hardwired” they execute only one program A limitation of Turing Machines: Real Computers are re-programmable.
9/21/2016 Presentation layer Abstract Syntax Notation #1 Basic Encoding Rules.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
Presentation Services
The ITU-T X.500 series and X.509 in a changing world
ASN.1: Introduction Zdeněk Říha.
Network Management Information model
Dept. of Computer Science and Engineering
ASN.1 소개 건아정보기술 SW개발팀 김강민 주임연구원.
System and Network Management
Chapter 9 TURING MACHINES.
XML Data Introduction, Well-formed XML.
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
7. End-to-end data Rocky K. C. Chang Department of Computing
SNMP Examples.
A Universal Turing Machine
Tutorial 2.
Copyright © Cengage Learning. All rights reserved.
The University of Adelaide, School of Computer Science
CS334: MIPS language _Mars simulator Lab 2_1
ASN.1 Compiler for text-based protocols!
Simple Network Management Protocol
Standards, Models and Language
Presentation transcript:

BER ENCODING Basic Encoding Rules

Basic Encoding Rules What is it?  BER is the original rules laid out by the ASN.1 standard for encoding information into octet string.

Basic Encoding Rules What it does?  Facilitates the exchange of structured data especially between application programs over networks by describing data structures in a way that is independent of machine architecture and implementation language.  To send data through the network one needs to encode it to a string of bits. ASN.1 defines various algorithms to accomplish that task, called Encoding rules. There are plenty of them; the standard is the Basic Encoding Rules (BER).

Basically, BER is used for Encoding abstract information into concrete data stream independent to the machine architecture and implementation language.

Basic Encoding Rules How it works?  BER uses a form of encoding commonly known as Tag-Length-Value or Type-Length-Value. Each item is encoded as a tag, indicating what type it is, a length indicating the size of the object, and a value, which contains the actual contents of the object.  There are three methods to encode an ASN.1 value under BER, the choice of which depends on the type of value and whether the length of the value is known.

BER encoding methods:  Primitive, definite-length encoding  Constructed, definite- length encoding  Constructed, indefinite-length encoding Every method has 3-4 parts:  Identifier octets - These identify the class and tag number of the ASN.1 value, and indicate whether the method is primitive or constructed.  Length octets. - For the definite-length methods, these give the number of contents octets. For the constructed, indefinite-length method, these indicate that the length is indefinite.  Contents octets. - For the primitive, definite-length method, these give a concrete representation of the value. For the constructed methods, these give the concatenation of the BER encodings of the components of the value  End-of-contents octets. - For the constructed, indefinite- length method, these denote the end of the contents. For the other methods, these are absent.

Example encoding the instance “CPE”,51,”A” 1A5String sampleString1= “CPE” 1A5String sampleString2= “A”,” INTEGER sampleInt = 51 I L CI L CI L C CPE51A Identifier octets 16(hex) = (binary) Identifier octets Type Length octets Length Contents octets Value 8bit7bit6bit5bit4bit3bit2bit1bit Class 0 0 P/C 0 Tag Number

Classbit 8bit 7description Universal00 The type is native to ASN.1 Application01 valid for one specific application Context- specific 10 depends on the context Private11 Defined in private specifications P/Cbit 6 Primitive0 Constructed1 8bit7bit6bit5bit4bit3bit2bit1bit Class 0 0 P/C 0 Tag Number