ASN.1 lecture v.0.2. Abstract Syntax Notation One. Máté J. Csorba
|
|
- Oswald Marshall
- 7 years ago
- Views:
Transcription
1 ASN.1 lecture v.0.2 Abstract Syntax Notation One Máté J. Csorba 1
2 Contents Past, present and future of ASN.1 Why ASN.1? Tools and integration Training material Basic conventions, built-in types Tagging, extensions Subtyping, constraints, etc... Introduction to BER (PER skipped) Short examples 2
3 Credits Some of the material includes intellectual property from: Dr. Andreas Steffen, Zürcher Hochschule Winterthur Prof. John Larmouth, Salford University, UK Dr. György Réthy, János Zoltán Szabó, Test Competence Center, Ericsson Hungary 3
4 The stone-age Diagrams of bits and bytes - e.g. IPv4 (The earliest approach, simple and clear, but focusing totally on the bits-on-the-line.) Tool support not possible Extensibility support crude - based on reserved fields. 4
5 The stone-age Simple command lines in ASCII, e.g. Telnet Simple character mnemonics and error codes (e.g. 200 OK ) Simple comma-separated parameters Good for simple dialogues Extensibility by adding commands in V2, with unknown commands ignored by V1 systems 5
6 The bronze-age TLV and Tabular Notation Each PDU and each parameter has an ID (or Tag), a Length, and a Value Nested TLVs in TLVs? Tables list each parameter: Tabular Notation 6
7 And finally: ASN.1 ASN.1 was borne around 1982 First ASN.1 Standard (CCITT X.409) in 1984 International Standard : ITU-T X.680 to X.683 ISO/IEC to 4 There was a need for A means of syntax (data structure) specification Procedure (sequence) specification Test suite specification Validation And tools to support rapid implementation! 7
8 ASN.1: What is it? Describes the data exchanged between two communicating applications Supported by efficient encodings of the data Supports a diversity of operating systems and programming languages 8
9 ASN.1: What is it? Formal notation, supported by tools, means: no ambiguity validation is easier, at lower cost reduced time-to-market Translates easily, with tool support, into any programming language (C, C++, Java, Cobol, Pascal, and many others) Integration also with SDL 9
10 Abstract vs. Transfer Syntax *Taken from: Dr. Andreas Steffen, Zürcher Hochschule Winterthur 10
11 So. ASN.1 offers today. Wide use in a large range of industries: Keeping the lights burning Portable phones we need them Birthday presents on time Traffic lights Aircraft fly safely Multimedia standards Many other industrial sectors 11
12 So thanks to ASN.1 Without ASN.1: The lights go out! Portable phones don t work! Parcels get lost! X Traffic lights fail! X Aircraft fall from the sky! Your impending marriage suffers as Net Meeting fails! X X X X 12
13 The near future Recognition of: Separation of "abstract syntax" (content) from encoding Encoding rules Work continues on the full integration of ASN.1 with XML Use of ASN.1 in web services 13
14 Tool Vendors Adrenta Technologies ATOS Origin France Telecom R&D Nikolaus Computertechnik Objective Systems OSS Nokalva Talura Aps unigone * (according to ASN.1 consortium, ITU-T) 14
15 Ericsson s TITAN TTCN-3 test executor => Data definition language for protocol testing - Conformance - Interoperability - Load/stress - Regression In my time 15
16 And now for something completely different Next => Training material, prepare some coffee in the break! Recommended bookmark: 16
17 Abstract Syntax introduction *Taken from: Dr. György Réthy, TCC Ericsson 17
18 Structure of ASN.1 18
19 Recommended reading John Larmouth, ASN.1 Complete, Elsevier-Morgan Kaufmann, 1999 Downloadable PDF version: Olivier Dubuisson, ASN.1 - Communication between heterogeneous systems, Elsevier-Morgan Kaufmann, 2000 Downloadable PDF version: 19
20 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 20
21 Naming conventions -1 21
22 Naming conventions -2 22
23 Module definition 23
24 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 24
25 NULL, BOOLEAN 25
26 Integer 26
27 Bitstring 27
28 Octetstring 28
29 Enumerated 29
30 Enumerated, extension 30
31 Rules to extension 31
32 Sequence 32
33 Tagging example -1 33
34 When tags shall be distinct 34
35 Sequence additions 35
36 Extension of a Sequence 36
37 Rules for extension 37
38 Rules for extension 38
39 Rules for extension 39
40 Set 40
41 Set 41
42 Choice 42
43 Tagging example 2 43
44 When tags shall be distinct 44
45 Choice 45
46 Version brackets 46
47 Selection type 47
48 Sequence of and Set of 48
49 Object identifiers 49
50 Real 50
51 Restricted charstring types 51
52 Time types 52
53 Embedded PDV 53
54 External 54
55 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 55
56 Tagging example 3 56
57 Tagging 57
58 Tagging 58
59 Universal class tags 59
60 Module definition again 60
61 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 61
62 Subtyping 62
63 Subtyping 63
64 Subtyping 64
65 Subtyping 65
66 Subtyping 66
67 Subtyping 67
68 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 68
69 Exeption handling 69
70 Extension examples 70
71 Parameterization 71
72 Parameterization 72
73 Parameterization 73
74 Jump to the topic of coding BER Tagging Tag of ASN.1 types Encoding of different types 74
75 Basics of coding 75
76 Coding of tag values higher then 30 76
77 Coding of the length field 77
78 Coding of the length field 78
79 When the length is null 79
80 Encoding of tags 80
81 Null, Boolean and Enumerated 81
82 Integer 82
83 Choice 83
84 Octetstring 84
85 Bitstring 85
86 Sequence (of), Set (of) 86
87 Obj. ID. 87
88 Real, base 10 88
89 Real, base 2 89
90 Ellipsis 90
91 Time for some practice 91
92 Example 1 Given the definition Company ::= SET { name [0] IA5String, zipcode [1] IA5String, CitationType INTEGER, other ANY DEFINED BY CitationType } where the INTEGER value of CitationType can be 0 = INTEGER, 1 = REAL, or 2 BOOLEAN, which of the following values are valid? Assume tagging has been done accurately. 1. CyberReal, , 1, TRUE , Villaland, 0, , 450, HomeNet 4. SitCom, 1,
93 Example 2 A base-ball card value in XML syntax: <BBCard> <name>jorge Posada</name> <team>new York Yankees</team> <age>29</age> <position>c</position> <handedness>right-handed</handedness> <batting-average>0.277</batting-average> </BBCard> Definition in ASN.1 (type and value)? 93
94 Solution 2 ASN.1 notation: BBCard ::= SEQUENCE { name IA5String, team IA5String, age INTEGER, position IA5String, handedness ENUMERATED { left-handed, right-handed, ambidextrous }, batting-average REAL } 94
95 ASN.1 value: Solution 2 cont d player1 BBCard ::= { name Jorge Posada, team New York Yankees, age 29, position C, handedness right-handed, batting-average } 95
96 Example 3 The C data-structure for the base-ball card: typedef struct BBCard { char name [61] ; char team [61] ; short age ; char position [61] ; enum { left_handed = 0, right_handed = 1, ambidextrous = 2, } handedness ; float batting_average ; } BBCard ; Define in ASN.1 using subtyping/constraints! 96
97 Solution 3 BBCard ::= SEQUENCE { name IA5String (SIZE (1..60)), team IA5String (SIZE (1..60)), age INTEGER (1..100), position IA5String (SIZE (1..60)), handedness ENUMERATED { left-handed, right-handed, ambidextrous }, batting-average REAL } 97
98 Example 4 FooProtocol defined using ASN.1: FooProtocol DEFINITIONS ::= BEGIN FooQuestion ::= SEQUENCE { trackingnumber INTEGER, question VisibleString } FooAnswer ::= SEQUENCE { questionnumber INTEGER, answer BOOLEAN } END Example message (PDU): myquestion FooQuestion ::= { trackingnumber 5, question "Anybody there?" } Cookbook: Tags of a SEQUENCE : 30 an INTEGER: 02 a VisibleString: 1a "Anybody there?" in ASCII: 41 6e f f Encode using simple TLV triplets and XER! 98
99 Solution 4 TLV, 21 octets: a 0e 41 6e f f XER, 108 octets but more readable: <FooQuestion> <trackingnumber>5</trackingnumber> <question>anybody there?</question> </FooQuestion> 99
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.690 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.691 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
More informationAbstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One
Kommunikationssysteme (KSy) - Block 7 Abstract Syntax Notation One ASN.1 Dr. Andreas Steffen 2000-2002 A. Steffen, 22.01.2002, KSy_ASN1.ppt 1 ASN.1 Abstract Syntax Notation One Standards and applications
More informationSNMP....Simple Network Management Protocol...
SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP
More informationPrepared By: P0209337 Lichen. P0209259 Xulu
Local Certificate Authority Prepared By: P0209337 Lichen P0209259 Xulu 1 2 Abstract Today, security of information is most important in the Internet; for example, electronic commerce and electronic government
More informationRaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL
RaneNote : SIMPLE? NETWORK MANAGEMENT PROTOCOL : Simple? Network Management Protocol Overview The Message Format The Actual Bytes Douglas Bruey Rane Corporation RaneNote 161 2005 Rane Corporation Introduction
More informationSimple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science
Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science 1 Outline Background SNMP Basics SNMP Version 1 SNMP Version 2 SNMP Management,
More informationSNMP and Network Management
SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Contents Network Management MIB naming
More informationNetwork Management. What is network management?
Network Management Introduction to network management motivation major components Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for
More informationChapter 9 Network Management
Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationSystem and Network Management
- System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!
More information8 Tutorial: Using ASN.1
8 Tutorial: Using ASN.1 Data Types This tutorial describes how to use ASN.1 types and values in the SDL suite. You will learn how to import and use ASN.1 modules in your SDL diagrams, how to generate code
More informationChapter 9 Network Management
Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationChapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management
Chapter 8 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in powerpoint form so you can add, modify, and
More informationLink Layer Discovery Protocol and MIB
Link Layer Discovery Protocol and MIB v0.0 Paul Congdon 3/7/02 Acknowledgements This document is heavily leveraged from an Internet-Draft developed for the IETF PTOPO working group. The original draft,
More informationHigh-Level Programming Languages. Nell Dale & John Lewis (adaptation by Michael Goldwasser)
High-Level Programming Languages Nell Dale & John Lewis (adaptation by Michael Goldwasser) Low-Level Languages What are disadvantages of low-level languages? (e.g., machine code or assembly code) Programming
More informationDistributed Network Management Using SNMP, Java, WWW and CORBA
Distributed Network Management Using SNMP, Java, WWW and CORBA André Marcheto Augusto Hack Augusto Pacheco Augusto Verzbickas ADMINISTRATION AND MANAGEMENT OF COMPUTER NETWORKS - INE5619 Federal University
More informationAdvanced TTCN-3 Test Suite validation with Titan
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 273 281 doi: 10.14794/ICAI.9.2014.2.273 Advanced TTCN-3 Test Suite validation
More informationdominique <dot> toupin <at> ericsson <dot> com GYORGY <dot> RETHY <at> ericsson <dot> com
dominique toupin ericsson com GYORGY RETHY ericsson com About me Tool Manager at Ericsson, helping Ericsson sites to develop better software efficiently Telecommunication
More informationJava Types and Enums. Nathaniel Osgood MIT 15.879. April 25, 2012
Java Types and Enums Nathaniel Osgood MIT 15.879 April 25, 2012 Types in Java Types tell you the class of values from which a variable is drawn In Java we specify types for Parameters Variables Return
More informationSimple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
More informationLexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016
Master s Degree Course in Computer Engineering Formal Languages FORMAL LANGUAGES AND COMPILERS Lexical analysis Floriano Scioscia 1 Introductive terminological distinction Lexical string or lexeme = meaningful
More informationETSI EN 301 002-1 V1.3.1 (2001-06)
EN 301 002-1 V1.3.1 (2001-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Security tools (SET) procedures; Digital Subscriber Signalling System No. one (DSS1)
More informationProgramming Languages CIS 443
Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception
More informationITU-T Z.100. Specification and description language (SDL)
INTERNATIONAL TELECOMMUNICATION UNION ITU-T Z.100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/99) SERIES Z: LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS Formal description
More informationBachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
More informationSecurity Issues of the Digital Certificates within Public Key Infrastructures
16 Security Issues of the Digital Certificates within Public Key Infrastructures Cristian TOMA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania cristian.toma@ie.ase.ro The
More informationChapter 9 Network Management. ISO network management. What is network management? Chapter 9: Network Management. Network Management standards
Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More informationNumber Representation
Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data
More informationSNMP SMI Structure of Management Information
SNMP SMI Structure of Management Information Network Mgmt/Sec. 1 Outline ASN.1 short intro BER grammar/types SMI types and application types MACROs tables/examples 2 jrb comment: this will seem like much
More informationTechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
More informationJava (12 Weeks) Introduction to Java Programming Language
Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short
More informationSpecification of the Broadcast Wave Format (BWF)
EBU TECH 3285 Specification of the Broadcast Wave Format (BWF) A format for audio data files in broadcasting Version 2.0 Geneva May 2011 1 * Page intentionally left blank. This document is paginated for
More informationSimple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
More informationNetwork Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
More informationEN 300 185-1 V1.2.4 (1998-06)
European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Conference call, add-on (CONF) supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol;
More informationR07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology)
Set No. 1 1. a) Discus about network management goals and functions in detail. b) Explain in detail about current status and future of network management. 2. a) Explain the SNMP network management architecture.
More informationPacket Structure and Encoding
Packet Structure and Encoding Network Layer details Application Layer details Abstract Syntax Notation One (ASN.1) Encoding Application Services and Properties Context Specific and Application Tags Primitive
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationFast Infoset & Fast Web Services. Paul Sandoz Staff Engineer Sun Microsystems
Fast Infoset & Fast Web Services Paul Sandoz Staff Engineer Sun Microsystems New standards on the way Two new specifications will go for Consent to Last Call in Moscow Fast Infoset ITU-T Rec. X.891 ISO/IEC
More informationNetwork Management (NETW-1001)
Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management
More informationAdvanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version
More informationTopics. Parts of a Java Program. Topics (2) CS 146. Introduction To Computers And Java Chapter Objectives To understand:
Introduction to Programming and Algorithms Module 2 CS 146 Sam Houston State University Dr. Tim McGuire Introduction To Computers And Java Chapter Objectives To understand: the meaning and placement of
More information[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension
[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
More informationIntroduction to Python
Caltech/LEAD Summer 2012 Computer Science Lecture 2: July 10, 2012 Introduction to Python The Python shell Outline Python as a calculator Arithmetic expressions Operator precedence Variables and assignment
More information1 The Java Virtual Machine
1 The Java Virtual Machine About the Spec Format This document describes the Java virtual machine and the instruction set. In this introduction, each component of the machine is briefly described. This
More informationAQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
More informationEmbedded Web Services: Making Sense out of Diverse Sensors
Embedded Web Services: Making Sense out of Diverse Sensors Introduction David E. Culler Gilman Tolle Arch Rock Corporation How many times have you heard, I just want to connect a collection of different
More informationAN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
More informationEnsemble X12 Development Guide
Ensemble X12 Development Guide Version 2013.1 24 April 2013 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Ensemble X12 Development Guide Ensemble Version 2013.1 24 April
More informationThe programming language C. sws1 1
The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan
More informationSQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
More informationObject-Oriented Design Lecture 4 CSU 370 Fall 2007 (Pucella) Tuesday, Sep 18, 2007
Object-Oriented Design Lecture 4 CSU 370 Fall 2007 (Pucella) Tuesday, Sep 18, 2007 The Java Type System By now, you have seen a fair amount of Java. Time to study in more depth the foundations of the language,
More informationIntroduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
More informationPrinciples of Database Management Systems. Overview. Principles of Data Layout. Topic for today. "Executive Summary": here.
Topic for today Principles of Database Management Systems Pekka Kilpeläinen (after Stanford CS245 slide originals by Hector Garcia-Molina, Jeff Ullman and Jennifer Widom) How to represent data on disk
More informationChapter 4: Computer Codes
Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data
More informationGetting Started with the Internet Communications Engine
Getting Started with the Internet Communications Engine David Vriezen April 7, 2014 Contents 1 Introduction 2 2 About Ice 2 2.1 Proxies................................. 2 3 Setting Up ICE 2 4 Slices 2
More informationDatabase Design and Database Programming with SQL - 5 Day In Class Event Day 1 Activity Start Time Length
Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Welcome & Introductions 9:00 AM 20 Lecture 9:20 AM 40 Practice 10:00 AM 20 Lecture 10:20 AM 40 Practice 11:15 AM 30 Lecture
More informationType 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31
Type 2 Tag Operation Specification Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31 RESTRICTIONS ON USE This specification is copyright 2005-2011 by the NFC Forum, and
More informationThis section describes how LabVIEW stores data in memory for controls, indicators, wires, and other objects.
Application Note 154 LabVIEW Data Storage Introduction This Application Note describes the formats in which you can save data. This information is most useful to advanced users, such as those using shared
More informationWhat is COM/DCOM. Distributed Object Systems 4 COM/DCOM. COM vs Corba 1. COM vs. Corba 2. Multiple inheritance vs multiple interfaces
Distributed Object Systems 4 COM/DCOM Piet van Oostrum Sept 18, 2008 What is COM/DCOM Component Object Model Components (distributed objects) à la Microsoft Mainly on Windows platforms Is used in large
More informationIntroduction to TTCN-3
Introduction to TTCN-3 Colin Willcock Nokia Research Center 1 NOKIA TTCN-3 Intro.ppt/ 07.11.2002 /C. Willcock Overview Introduction TTCN Testing Background Future Testing Challenges The TTCN-3 Language
More informationRTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos
Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright
More informationC H A P T E R Condition Handling
ch05.fm Page 75 Wednesday, November 13, 2002 7:16 AM 5 C H A P T E R Condition Handling In this chapter, you will learn: what SQLCODE and SQLSTATE are, and the difference between them. what a condition
More informationMolecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct
Dr. Martin O. Steinhauser University of Basel Graduate Lecture Spring Semester 2014 Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct Friday, 7 th March
More informationPA160: Net-Centric Computing II. Network Management
PA160: Net-Centric Computing II. Network Management Luděk Matyska Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Spring 2015 Luděk Matyska (FI MU) 3. Network Management Spring 2015 1
More informationInfrastructure that supports (distributed) componentbased application development
Middleware Technologies 1 What is Middleware? Infrastructure that supports (distributed) componentbased application development a.k.a. distributed component platforms mechanisms to enable component communication
More informationMy First TTCN-3 Project with TTworkbench
My First TTCN-3 Project with TTworkbench A first steps guide including instructions for download and installation, detailed description of functionalities, test case behavior, test case execution, and
More informationMySQL for Beginners Ed 3
Oracle University Contact Us: 1.800.529.0165 MySQL for Beginners Ed 3 Duration: 4 Days What you will learn The MySQL for Beginners course helps you learn about the world's most popular open source database.
More informationCharacter Code Structure and Extension Techniques
Standard ECMA-35 6th Edition - December 1994 Standardizing Information and Communication Systems Character Code Structure and Extension Techniques Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - X.400:
More informationWhat Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison
What Your Mother Didn't Tell You About PEM, DER, PKCS Eric Norman University of Wisconsin-Madison 1 Audience I'm nuts Some of you might want to bolt Who needs to know? Developers Support personnel diagnose
More informationSNMP Traffic Measurements
SNMP Traffic Measurements Jürgen Schönwälder j.schoenwaelder@iu-bremen.de International University Bremen Campus Ring 1 28725 Bremen, Germany http://www.ibr.cs.tu-bs.de/projects/nmrg/ slides.tex SNMP Traffic
More informationPemrograman Dasar. Basic Elements Of Java
Pemrograman Dasar Basic Elements Of Java Compiling and Running a Java Application 2 Portable Java Application 3 Java Platform Platform: hardware or software environment in which a program runs. Oracle
More informationName: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
More informationSNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
More informationWindows 7 Security Event Log Format
Windows 7 ecurity vent Log Format Todd Heberlein 23 ep 2010 Windows security event log provides a rich source of information to detect and analyze a wide range of threats against computer systems. Unfortunately
More informationInformation Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14
Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,
More informationPL/SQL MOCK TEST PL/SQL MOCK TEST I
http://www.tutorialspoint.com PL/SQL MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to PL/SQL. You can download these sample mock tests at your local
More informationCPU Organization and Assembly Language
COS 140 Foundations of Computer Science School of Computing and Information Science University of Maine October 2, 2015 Outline 1 2 3 4 5 6 7 8 Homework and announcements Reading: Chapter 12 Homework:
More informationPreservation Handbook
Preservation Handbook [Binary Text / Word Processor Documents] Author Rowan Wilson and Martin Wynne Version Draft V3 Date 22 / 08 / 05 Change History Revised by MW 22.8.05; 2.12.05; 7.3.06 Page 1 of 7
More informationSection 1.4 Place Value Systems of Numeration in Other Bases
Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason
More informationAn XML Alternative for Performance and Security: ASN.1
Web Services An XML Alternative for Performance and Security: ASN.1 Darren Mundy and David W. Chadwick Performance tests of XML and ASN.1 found that signed complex XML messages can be up to 1,000-percent
More informationCompiler Construction
Compiler Construction Regular expressions Scanning Görel Hedin Reviderad 2013 01 23.a 2013 Compiler Construction 2013 F02-1 Compiler overview source code lexical analysis tokens intermediate code generation
More informationLab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
More informationOpen Mobile API Test Specification for Transport API
Open Mobile Test Specification for Transport V1 Copyright 2014 SIMalliance ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization
More informationSupport and Compatibility
Version 1.0 Frequently Asked Questions General What is Voiyager? Voiyager is a productivity platform for VoiceXML applications with Version 1.0 of Voiyager focusing on the complete development and testing
More informationChapter 1: Introduction
Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases
More informationSignalling Control System Serial Train Information Interface
Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for
More informationDNA Data and Program Representation. Alexandre David 1.2.05 adavid@cs.aau.dk
DNA Data and Program Representation Alexandre David 1.2.05 adavid@cs.aau.dk Introduction Very important to understand how data is represented. operations limits precision Digital logic built on 2-valued
More informationEmail, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
More information4D Plugin SDK v11. Another minor change, real values on 10 bytes is no longer supported.
4D Plugin SDK v11 4D Plugin API 4D Plugin API v11 is a major upgrade of 4D Plugin API. The two major modifications are that it is now fully Unicode compliant, and that it gives support to the new 4D pictures.
More informationEcma/TC39/2013/NN. 4 th Draft ECMA-XXX. 1 st Edition / July 2013. The JSON Data Interchange Format. Reference number ECMA-123:2009
Ecma/TC39/2013/NN 4 th Draft ECMA-XXX 1 st Edition / July 2013 The JSON Data Interchange Format Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2013
More informationDigital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange
Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn,
More informationObject Oriented Software Design
Object Oriented Software Design Introduction to Java - II Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 28, 2010 G. Lipari (Scuola Superiore Sant Anna) Introduction
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009
UNIVERSITY OF BOLTON [CRT09] CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009 Date: Friday 29 th May 2015 Time: 14:00 16:00 Instructions to Candidates:
More informationData Modeling Basics
Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy
More informationDatabase System Concepts
s Design Chapter 1: Introduction Departamento de Engenharia Informática Instituto Superior Técnico 1 st Semester 2008/2009 Slides (fortemente) baseados nos slides oficiais do livro c Silberschatz, Korth
More informationCore Components Data Type Catalogue Version 3.1 17 October 2011
Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 Page 1 of 121 Abstract CCTS 3.0 defines the rules for developing Core Data Types and Business
More information