ASN.1 lecture v.0.2. Abstract Syntax Notation One. Máté J. Csorba

Size: px
Start display at page:

Download "ASN.1 lecture v.0.2. Abstract Syntax Notation One. Máté J. Csorba"

Transcription

1 ASN.1 lecture v.0.2 Abstract Syntax Notation One Máté J. Csorba 1

2 Contents Past, present and future of ASN.1 Why ASN.1? Tools and integration Training material Basic conventions, built-in types Tagging, extensions Subtyping, constraints, etc... Introduction to BER (PER skipped) Short examples 2

3 Credits Some of the material includes intellectual property from: Dr. Andreas Steffen, Zürcher Hochschule Winterthur Prof. John Larmouth, Salford University, UK Dr. György Réthy, János Zoltán Szabó, Test Competence Center, Ericsson Hungary 3

4 The stone-age Diagrams of bits and bytes - e.g. IPv4 (The earliest approach, simple and clear, but focusing totally on the bits-on-the-line.) Tool support not possible Extensibility support crude - based on reserved fields. 4

5 The stone-age Simple command lines in ASCII, e.g. Telnet Simple character mnemonics and error codes (e.g. 200 OK ) Simple comma-separated parameters Good for simple dialogues Extensibility by adding commands in V2, with unknown commands ignored by V1 systems 5

6 The bronze-age TLV and Tabular Notation Each PDU and each parameter has an ID (or Tag), a Length, and a Value Nested TLVs in TLVs? Tables list each parameter: Tabular Notation 6

7 And finally: ASN.1 ASN.1 was borne around 1982 First ASN.1 Standard (CCITT X.409) in 1984 International Standard : ITU-T X.680 to X.683 ISO/IEC to 4 There was a need for A means of syntax (data structure) specification Procedure (sequence) specification Test suite specification Validation And tools to support rapid implementation! 7

8 ASN.1: What is it? Describes the data exchanged between two communicating applications Supported by efficient encodings of the data Supports a diversity of operating systems and programming languages 8

9 ASN.1: What is it? Formal notation, supported by tools, means: no ambiguity validation is easier, at lower cost reduced time-to-market Translates easily, with tool support, into any programming language (C, C++, Java, Cobol, Pascal, and many others) Integration also with SDL 9

10 Abstract vs. Transfer Syntax *Taken from: Dr. Andreas Steffen, Zürcher Hochschule Winterthur 10

11 So. ASN.1 offers today. Wide use in a large range of industries: Keeping the lights burning Portable phones we need them Birthday presents on time Traffic lights Aircraft fly safely Multimedia standards Many other industrial sectors 11

12 So thanks to ASN.1 Without ASN.1: The lights go out! Portable phones don t work! Parcels get lost! X Traffic lights fail! X Aircraft fall from the sky! Your impending marriage suffers as Net Meeting fails! X X X X 12

13 The near future Recognition of: Separation of "abstract syntax" (content) from encoding Encoding rules Work continues on the full integration of ASN.1 with XML Use of ASN.1 in web services 13

14 Tool Vendors Adrenta Technologies ATOS Origin France Telecom R&D Nikolaus Computertechnik Objective Systems OSS Nokalva Talura Aps unigone * (according to ASN.1 consortium, ITU-T) 14

15 Ericsson s TITAN TTCN-3 test executor => Data definition language for protocol testing - Conformance - Interoperability - Load/stress - Regression In my time 15

16 And now for something completely different Next => Training material, prepare some coffee in the break! Recommended bookmark: 16

17 Abstract Syntax introduction *Taken from: Dr. György Réthy, TCC Ericsson 17

18 Structure of ASN.1 18

19 Recommended reading John Larmouth, ASN.1 Complete, Elsevier-Morgan Kaufmann, 1999 Downloadable PDF version: Olivier Dubuisson, ASN.1 - Communication between heterogeneous systems, Elsevier-Morgan Kaufmann, 2000 Downloadable PDF version: 19

20 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 20

21 Naming conventions -1 21

22 Naming conventions -2 22

23 Module definition 23

24 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 24

25 NULL, BOOLEAN 25

26 Integer 26

27 Bitstring 27

28 Octetstring 28

29 Enumerated 29

30 Enumerated, extension 30

31 Rules to extension 31

32 Sequence 32

33 Tagging example -1 33

34 When tags shall be distinct 34

35 Sequence additions 35

36 Extension of a Sequence 36

37 Rules for extension 37

38 Rules for extension 38

39 Rules for extension 39

40 Set 40

41 Set 41

42 Choice 42

43 Tagging example 2 43

44 When tags shall be distinct 44

45 Choice 45

46 Version brackets 46

47 Selection type 47

48 Sequence of and Set of 48

49 Object identifiers 49

50 Real 50

51 Restricted charstring types 51

52 Time types 52

53 Embedded PDV 53

54 External 54

55 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 55

56 Tagging example 3 56

57 Tagging 57

58 Tagging 58

59 Universal class tags 59

60 Module definition again 60

61 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 61

62 Subtyping 62

63 Subtyping 63

64 Subtyping 64

65 Subtyping 65

66 Subtyping 66

67 Subtyping 67

68 Contents 1. Basic conventions 2. Built-in ASN.1 types (basics of tagging and extensibility) NULL, BOOLEAN, INTEGER, BIT STRING, OCTET STRING, ENUMERATED, SEQUENCE (OF), SET (OF), CHOICE, Character string types, time types, REAL, ANY & other hole types: EMBEDDED PDV, EXTERNAL, Unrestricted character string 3. Tagging - additions Types of tags, IMPLICIT, EXPLICIT, AUTOMATIC tagging, tagging rules 4. Subtyping & constraints Single value, value range, size constraint, type constraint, permitted alphabet, contained subtype, inner subtyping 5. Extensibility - further rules ASN.1 model of extensions, extension marker, exception identifier, extensibility rules, version brackets 68

69 Exeption handling 69

70 Extension examples 70

71 Parameterization 71

72 Parameterization 72

73 Parameterization 73

74 Jump to the topic of coding BER Tagging Tag of ASN.1 types Encoding of different types 74

75 Basics of coding 75

76 Coding of tag values higher then 30 76

77 Coding of the length field 77

78 Coding of the length field 78

79 When the length is null 79

80 Encoding of tags 80

81 Null, Boolean and Enumerated 81

82 Integer 82

83 Choice 83

84 Octetstring 84

85 Bitstring 85

86 Sequence (of), Set (of) 86

87 Obj. ID. 87

88 Real, base 10 88

89 Real, base 2 89

90 Ellipsis 90

91 Time for some practice 91

92 Example 1 Given the definition Company ::= SET { name [0] IA5String, zipcode [1] IA5String, CitationType INTEGER, other ANY DEFINED BY CitationType } where the INTEGER value of CitationType can be 0 = INTEGER, 1 = REAL, or 2 BOOLEAN, which of the following values are valid? Assume tagging has been done accurately. 1. CyberReal, , 1, TRUE , Villaland, 0, , 450, HomeNet 4. SitCom, 1,

93 Example 2 A base-ball card value in XML syntax: <BBCard> <name>jorge Posada</name> <team>new York Yankees</team> <age>29</age> <position>c</position> <handedness>right-handed</handedness> <batting-average>0.277</batting-average> </BBCard> Definition in ASN.1 (type and value)? 93

94 Solution 2 ASN.1 notation: BBCard ::= SEQUENCE { name IA5String, team IA5String, age INTEGER, position IA5String, handedness ENUMERATED { left-handed, right-handed, ambidextrous }, batting-average REAL } 94

95 ASN.1 value: Solution 2 cont d player1 BBCard ::= { name Jorge Posada, team New York Yankees, age 29, position C, handedness right-handed, batting-average } 95

96 Example 3 The C data-structure for the base-ball card: typedef struct BBCard { char name [61] ; char team [61] ; short age ; char position [61] ; enum { left_handed = 0, right_handed = 1, ambidextrous = 2, } handedness ; float batting_average ; } BBCard ; Define in ASN.1 using subtyping/constraints! 96

97 Solution 3 BBCard ::= SEQUENCE { name IA5String (SIZE (1..60)), team IA5String (SIZE (1..60)), age INTEGER (1..100), position IA5String (SIZE (1..60)), handedness ENUMERATED { left-handed, right-handed, ambidextrous }, batting-average REAL } 97

98 Example 4 FooProtocol defined using ASN.1: FooProtocol DEFINITIONS ::= BEGIN FooQuestion ::= SEQUENCE { trackingnumber INTEGER, question VisibleString } FooAnswer ::= SEQUENCE { questionnumber INTEGER, answer BOOLEAN } END Example message (PDU): myquestion FooQuestion ::= { trackingnumber 5, question "Anybody there?" } Cookbook: Tags of a SEQUENCE : 30 an INTEGER: 02 a VisibleString: 1a "Anybody there?" in ASCII: 41 6e f f Encode using simple TLV triplets and XER! 98

99 Solution 4 TLV, 21 octets: a 0e 41 6e f f XER, 108 octets but more readable: <FooQuestion> <trackingnumber>5</trackingnumber> <question>anybody there?</question> </FooQuestion> 99

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.690 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.691 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract

More information

Abstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One

Abstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One Kommunikationssysteme (KSy) - Block 7 Abstract Syntax Notation One ASN.1 Dr. Andreas Steffen 2000-2002 A. Steffen, 22.01.2002, KSy_ASN1.ppt 1 ASN.1 Abstract Syntax Notation One Standards and applications

More information

SNMP....Simple Network Management Protocol...

SNMP....Simple Network Management Protocol... SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP

More information

Prepared By: P0209337 Lichen. P0209259 Xulu

Prepared By: P0209337 Lichen. P0209259 Xulu Local Certificate Authority Prepared By: P0209337 Lichen P0209259 Xulu 1 2 Abstract Today, security of information is most important in the Internet; for example, electronic commerce and electronic government

More information

RaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL

RaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL RaneNote : SIMPLE? NETWORK MANAGEMENT PROTOCOL : Simple? Network Management Protocol Overview The Message Format The Actual Bytes Douglas Bruey Rane Corporation RaneNote 161 2005 Rane Corporation Introduction

More information

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science 1 Outline Background SNMP Basics SNMP Version 1 SNMP Version 2 SNMP Management,

More information

SNMP and Network Management

SNMP and Network Management SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Contents Network Management MIB naming

More information

Network Management. What is network management?

Network Management. What is network management? Network Management Introduction to network management motivation major components Internet network management framework MIB: management information base SMI: data definition language SNMP: protocol for

More information

Chapter 9 Network Management

Chapter 9 Network Management Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

System and Network Management

System and Network Management - System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!

More information

8 Tutorial: Using ASN.1

8 Tutorial: Using ASN.1 8 Tutorial: Using ASN.1 Data Types This tutorial describes how to use ASN.1 types and values in the SDL suite. You will learn how to import and use ASN.1 modules in your SDL diagrams, how to generate code

More information

Chapter 9 Network Management

Chapter 9 Network Management Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Chapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management

Chapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management Chapter 8 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in powerpoint form so you can add, modify, and

More information

Link Layer Discovery Protocol and MIB

Link Layer Discovery Protocol and MIB Link Layer Discovery Protocol and MIB v0.0 Paul Congdon 3/7/02 Acknowledgements This document is heavily leveraged from an Internet-Draft developed for the IETF PTOPO working group. The original draft,

More information

High-Level Programming Languages. Nell Dale & John Lewis (adaptation by Michael Goldwasser)

High-Level Programming Languages. Nell Dale & John Lewis (adaptation by Michael Goldwasser) High-Level Programming Languages Nell Dale & John Lewis (adaptation by Michael Goldwasser) Low-Level Languages What are disadvantages of low-level languages? (e.g., machine code or assembly code) Programming

More information

Distributed Network Management Using SNMP, Java, WWW and CORBA

Distributed Network Management Using SNMP, Java, WWW and CORBA Distributed Network Management Using SNMP, Java, WWW and CORBA André Marcheto Augusto Hack Augusto Pacheco Augusto Verzbickas ADMINISTRATION AND MANAGEMENT OF COMPUTER NETWORKS - INE5619 Federal University

More information

Advanced TTCN-3 Test Suite validation with Titan

Advanced TTCN-3 Test Suite validation with Titan Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 273 281 doi: 10.14794/ICAI.9.2014.2.273 Advanced TTCN-3 Test Suite validation

More information

dominique <dot> toupin <at> ericsson <dot> com GYORGY <dot> RETHY <at> ericsson <dot> com

dominique <dot> toupin <at> ericsson <dot> com GYORGY <dot> RETHY <at> ericsson <dot> com dominique toupin ericsson com GYORGY RETHY ericsson com About me Tool Manager at Ericsson, helping Ericsson sites to develop better software efficiently Telecommunication

More information

Java Types and Enums. Nathaniel Osgood MIT 15.879. April 25, 2012

Java Types and Enums. Nathaniel Osgood MIT 15.879. April 25, 2012 Java Types and Enums Nathaniel Osgood MIT 15.879 April 25, 2012 Types in Java Types tell you the class of values from which a variable is drawn In Java we specify types for Parameters Variables Return

More information

Simple Network Management Protocol

Simple Network Management Protocol 56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange

More information

Lexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016

Lexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016 Master s Degree Course in Computer Engineering Formal Languages FORMAL LANGUAGES AND COMPILERS Lexical analysis Floriano Scioscia 1 Introductive terminological distinction Lexical string or lexeme = meaningful

More information

ETSI EN 301 002-1 V1.3.1 (2001-06)

ETSI EN 301 002-1 V1.3.1 (2001-06) EN 301 002-1 V1.3.1 (2001-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Security tools (SET) procedures; Digital Subscriber Signalling System No. one (DSS1)

More information

Programming Languages CIS 443

Programming Languages CIS 443 Course Objectives Programming Languages CIS 443 0.1 Lexical analysis Syntax Semantics Functional programming Variable lifetime and scoping Parameter passing Object-oriented programming Continuations Exception

More information

ITU-T Z.100. Specification and description language (SDL)

ITU-T Z.100. Specification and description language (SDL) INTERNATIONAL TELECOMMUNICATION UNION ITU-T Z.100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/99) SERIES Z: LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS Formal description

More information

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)

Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T) Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating

More information

Security Issues of the Digital Certificates within Public Key Infrastructures

Security Issues of the Digital Certificates within Public Key Infrastructures 16 Security Issues of the Digital Certificates within Public Key Infrastructures Cristian TOMA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania cristian.toma@ie.ase.ro The

More information

Chapter 9 Network Management. ISO network management. What is network management? Chapter 9: Network Management. Network Management standards

Chapter 9 Network Management. ISO network management. What is network management? Chapter 9: Network Management. Network Management standards Chapter 9 Network Management A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and

More information

Number Representation

Number Representation Number Representation CS10001: Programming & Data Structures Pallab Dasgupta Professor, Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Topics to be Discussed How are numeric data

More information

SNMP SMI Structure of Management Information

SNMP SMI Structure of Management Information SNMP SMI Structure of Management Information Network Mgmt/Sec. 1 Outline ASN.1 short intro BER grammar/types SMI types and application types MACROs tables/examples 2 jrb comment: this will seem like much

More information

TechNote 0006: Digital Signatures in PDF/A-1

TechNote 0006: Digital Signatures in PDF/A-1 TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity

More information

Java (12 Weeks) Introduction to Java Programming Language

Java (12 Weeks) Introduction to Java Programming Language Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short

More information

Specification of the Broadcast Wave Format (BWF)

Specification of the Broadcast Wave Format (BWF) EBU TECH 3285 Specification of the Broadcast Wave Format (BWF) A format for audio data files in broadcasting Version 2.0 Geneva May 2011 1 * Page intentionally left blank. This document is paginated for

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between

More information

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016 Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula

More information

EN 300 185-1 V1.2.4 (1998-06)

EN 300 185-1 V1.2.4 (1998-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Conference call, add-on (CONF) supplementary service; Digital Subscriber Signalling System No. one (DSS1) protocol;

More information

R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology)

R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology) Set No. 1 1. a) Discus about network management goals and functions in detail. b) Explain in detail about current status and future of network management. 2. a) Explain the SNMP network management architecture.

More information

Packet Structure and Encoding

Packet Structure and Encoding Packet Structure and Encoding Network Layer details Application Layer details Abstract Syntax Notation One (ASN.1) Encoding Application Services and Properties Context Specific and Application Tags Primitive

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Fast Infoset & Fast Web Services. Paul Sandoz Staff Engineer Sun Microsystems

Fast Infoset & Fast Web Services. Paul Sandoz Staff Engineer Sun Microsystems Fast Infoset & Fast Web Services Paul Sandoz Staff Engineer Sun Microsystems New standards on the way Two new specifications will go for Consent to Last Call in Moscow Fast Infoset ITU-T Rec. X.891 ISO/IEC

More information

Network Management (NETW-1001)

Network Management (NETW-1001) Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management

More information

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version

More information

Topics. Parts of a Java Program. Topics (2) CS 146. Introduction To Computers And Java Chapter Objectives To understand:

Topics. Parts of a Java Program. Topics (2) CS 146. Introduction To Computers And Java Chapter Objectives To understand: Introduction to Programming and Algorithms Module 2 CS 146 Sam Houston State University Dr. Tim McGuire Introduction To Computers And Java Chapter Objectives To understand: the meaning and placement of

More information

[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension

[MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension [MS-RDPESC]: Remote Desktop Protocol: Smart Card Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications

More information

Introduction to Python

Introduction to Python Caltech/LEAD Summer 2012 Computer Science Lecture 2: July 10, 2012 Introduction to Python The Python shell Outline Python as a calculator Arithmetic expressions Operator precedence Variables and assignment

More information

1 The Java Virtual Machine

1 The Java Virtual Machine 1 The Java Virtual Machine About the Spec Format This document describes the Java virtual machine and the instruction set. In this introduction, each component of the machine is briefly described. This

More information

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference

More information

Embedded Web Services: Making Sense out of Diverse Sensors

Embedded Web Services: Making Sense out of Diverse Sensors Embedded Web Services: Making Sense out of Diverse Sensors Introduction David E. Culler Gilman Tolle Arch Rock Corporation How many times have you heard, I just want to connect a collection of different

More information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus

More information

Ensemble X12 Development Guide

Ensemble X12 Development Guide Ensemble X12 Development Guide Version 2013.1 24 April 2013 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Ensemble X12 Development Guide Ensemble Version 2013.1 24 April

More information

The programming language C. sws1 1

The programming language C. sws1 1 The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan

More information

SQL Server An Overview

SQL Server An Overview SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system

More information

Object-Oriented Design Lecture 4 CSU 370 Fall 2007 (Pucella) Tuesday, Sep 18, 2007

Object-Oriented Design Lecture 4 CSU 370 Fall 2007 (Pucella) Tuesday, Sep 18, 2007 Object-Oriented Design Lecture 4 CSU 370 Fall 2007 (Pucella) Tuesday, Sep 18, 2007 The Java Type System By now, you have seen a fair amount of Java. Time to study in more depth the foundations of the language,

More information

Introduction to Simple Network Management Protocol (SNMP)

Introduction to Simple Network Management Protocol (SNMP) Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part

More information

Principles of Database Management Systems. Overview. Principles of Data Layout. Topic for today. "Executive Summary": here.

Principles of Database Management Systems. Overview. Principles of Data Layout. Topic for today. Executive Summary: here. Topic for today Principles of Database Management Systems Pekka Kilpeläinen (after Stanford CS245 slide originals by Hector Garcia-Molina, Jeff Ullman and Jennifer Widom) How to represent data on disk

More information

Chapter 4: Computer Codes

Chapter 4: Computer Codes Slide 1/30 Learning Objectives In this chapter you will learn about: Computer data Computer codes: representation of data in binary Most commonly used computer codes Collating sequence 36 Slide 2/30 Data

More information

Getting Started with the Internet Communications Engine

Getting Started with the Internet Communications Engine Getting Started with the Internet Communications Engine David Vriezen April 7, 2014 Contents 1 Introduction 2 2 About Ice 2 2.1 Proxies................................. 2 3 Setting Up ICE 2 4 Slices 2

More information

Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Activity Start Time Length

Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Activity Start Time Length Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Welcome & Introductions 9:00 AM 20 Lecture 9:20 AM 40 Practice 10:00 AM 20 Lecture 10:20 AM 40 Practice 11:15 AM 30 Lecture

More information

Type 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31

Type 2 Tag Operation Specification. Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31 Type 2 Tag Operation Specification Technical Specification T2TOP 1.1 NFC Forum TM NFCForum-TS-Type-2-Tag_1.1 2011-05-31 RESTRICTIONS ON USE This specification is copyright 2005-2011 by the NFC Forum, and

More information

This section describes how LabVIEW stores data in memory for controls, indicators, wires, and other objects.

This section describes how LabVIEW stores data in memory for controls, indicators, wires, and other objects. Application Note 154 LabVIEW Data Storage Introduction This Application Note describes the formats in which you can save data. This information is most useful to advanced users, such as those using shared

More information

What is COM/DCOM. Distributed Object Systems 4 COM/DCOM. COM vs Corba 1. COM vs. Corba 2. Multiple inheritance vs multiple interfaces

What is COM/DCOM. Distributed Object Systems 4 COM/DCOM. COM vs Corba 1. COM vs. Corba 2. Multiple inheritance vs multiple interfaces Distributed Object Systems 4 COM/DCOM Piet van Oostrum Sept 18, 2008 What is COM/DCOM Component Object Model Components (distributed objects) à la Microsoft Mainly on Windows platforms Is used in large

More information

Introduction to TTCN-3

Introduction to TTCN-3 Introduction to TTCN-3 Colin Willcock Nokia Research Center 1 NOKIA TTCN-3 Intro.ppt/ 07.11.2002 /C. Willcock Overview Introduction TTCN Testing Background Future Testing Challenges The TTCN-3 Language

More information

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos Announcements I. Final Exam study guide online RTP / RTCP Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University II. III. Signup for project demos Teaching evaluations at end today copyright

More information

C H A P T E R Condition Handling

C H A P T E R Condition Handling ch05.fm Page 75 Wednesday, November 13, 2002 7:16 AM 5 C H A P T E R Condition Handling In this chapter, you will learn: what SQLCODE and SQLSTATE are, and the difference between them. what a condition

More information

Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct

Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct Dr. Martin O. Steinhauser University of Basel Graduate Lecture Spring Semester 2014 Molecular Dynamics Simulations with Applications in Soft Matter Handout 7 Memory Diagram of a Struct Friday, 7 th March

More information

PA160: Net-Centric Computing II. Network Management

PA160: Net-Centric Computing II. Network Management PA160: Net-Centric Computing II. Network Management Luděk Matyska Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Spring 2015 Luděk Matyska (FI MU) 3. Network Management Spring 2015 1

More information

Infrastructure that supports (distributed) componentbased application development

Infrastructure that supports (distributed) componentbased application development Middleware Technologies 1 What is Middleware? Infrastructure that supports (distributed) componentbased application development a.k.a. distributed component platforms mechanisms to enable component communication

More information

My First TTCN-3 Project with TTworkbench

My First TTCN-3 Project with TTworkbench My First TTCN-3 Project with TTworkbench A first steps guide including instructions for download and installation, detailed description of functionalities, test case behavior, test case execution, and

More information

MySQL for Beginners Ed 3

MySQL for Beginners Ed 3 Oracle University Contact Us: 1.800.529.0165 MySQL for Beginners Ed 3 Duration: 4 Days What you will learn The MySQL for Beginners course helps you learn about the world's most popular open source database.

More information

Character Code Structure and Extension Techniques

Character Code Structure and Extension Techniques Standard ECMA-35 6th Edition - December 1994 Standardizing Information and Communication Systems Character Code Structure and Extension Techniques Phone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - X.400:

More information

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison What Your Mother Didn't Tell You About PEM, DER, PKCS Eric Norman University of Wisconsin-Madison 1 Audience I'm nuts Some of you might want to bolt Who needs to know? Developers Support personnel diagnose

More information

SNMP Traffic Measurements

SNMP Traffic Measurements SNMP Traffic Measurements Jürgen Schönwälder j.schoenwaelder@iu-bremen.de International University Bremen Campus Ring 1 28725 Bremen, Germany http://www.ibr.cs.tu-bs.de/projects/nmrg/ slides.tex SNMP Traffic

More information

Pemrograman Dasar. Basic Elements Of Java

Pemrograman Dasar. Basic Elements Of Java Pemrograman Dasar Basic Elements Of Java Compiling and Running a Java Application 2 Portable Java Application 3 Java Platform Platform: hardware or software environment in which a program runs. Oracle

More information

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.

Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program. Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to

More information

SNMP Basics BUPT/QMUL 2015-05-12

SNMP Basics BUPT/QMUL 2015-05-12 SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction

More information

Windows 7 Security Event Log Format

Windows 7 Security Event Log Format Windows 7 ecurity vent Log Format Todd Heberlein 23 ep 2010 Windows security event log provides a rich source of information to detect and analyze a wide range of threats against computer systems. Unfortunately

More information

Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14

Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14 Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,

More information

PL/SQL MOCK TEST PL/SQL MOCK TEST I

PL/SQL MOCK TEST PL/SQL MOCK TEST I http://www.tutorialspoint.com PL/SQL MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to PL/SQL. You can download these sample mock tests at your local

More information

CPU Organization and Assembly Language

CPU Organization and Assembly Language COS 140 Foundations of Computer Science School of Computing and Information Science University of Maine October 2, 2015 Outline 1 2 3 4 5 6 7 8 Homework and announcements Reading: Chapter 12 Homework:

More information

Preservation Handbook

Preservation Handbook Preservation Handbook [Binary Text / Word Processor Documents] Author Rowan Wilson and Martin Wynne Version Draft V3 Date 22 / 08 / 05 Change History Revised by MW 22.8.05; 2.12.05; 7.3.06 Page 1 of 7

More information

Section 1.4 Place Value Systems of Numeration in Other Bases

Section 1.4 Place Value Systems of Numeration in Other Bases Section.4 Place Value Systems of Numeration in Other Bases Other Bases The Hindu-Arabic system that is used in most of the world today is a positional value system with a base of ten. The simplest reason

More information

An XML Alternative for Performance and Security: ASN.1

An XML Alternative for Performance and Security: ASN.1 Web Services An XML Alternative for Performance and Security: ASN.1 Darren Mundy and David W. Chadwick Performance tests of XML and ASN.1 found that signed complex XML messages can be up to 1,000-percent

More information

Compiler Construction

Compiler Construction Compiler Construction Regular expressions Scanning Görel Hedin Reviderad 2013 01 23.a 2013 Compiler Construction 2013 F02-1 Compiler overview source code lexical analysis tokens intermediate code generation

More information

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration

Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with

More information

Open Mobile API Test Specification for Transport API

Open Mobile API Test Specification for Transport API Open Mobile Test Specification for Transport V1 Copyright 2014 SIMalliance ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization

More information

Support and Compatibility

Support and Compatibility Version 1.0 Frequently Asked Questions General What is Voiyager? Voiyager is a productivity platform for VoiceXML applications with Version 1.0 of Voiyager focusing on the complete development and testing

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases

More information

Signalling Control System Serial Train Information Interface

Signalling Control System Serial Train Information Interface Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for

More information

DNA Data and Program Representation. Alexandre David 1.2.05 adavid@cs.aau.dk

DNA Data and Program Representation. Alexandre David 1.2.05 adavid@cs.aau.dk DNA Data and Program Representation Alexandre David 1.2.05 adavid@cs.aau.dk Introduction Very important to understand how data is represented. operations limits precision Digital logic built on 2-valued

More information

Email, SNMP, Securing the Web: SSL

Email, SNMP, Securing the Web: SSL Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan

More information

4D Plugin SDK v11. Another minor change, real values on 10 bytes is no longer supported.

4D Plugin SDK v11. Another minor change, real values on 10 bytes is no longer supported. 4D Plugin SDK v11 4D Plugin API 4D Plugin API v11 is a major upgrade of 4D Plugin API. The two major modifications are that it is now fully Unicode compliant, and that it gives support to the new 4D pictures.

More information

Ecma/TC39/2013/NN. 4 th Draft ECMA-XXX. 1 st Edition / July 2013. The JSON Data Interchange Format. Reference number ECMA-123:2009

Ecma/TC39/2013/NN. 4 th Draft ECMA-XXX. 1 st Edition / July 2013. The JSON Data Interchange Format. Reference number ECMA-123:2009 Ecma/TC39/2013/NN 4 th Draft ECMA-XXX 1 st Edition / July 2013 The JSON Data Interchange Format Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2013

More information

Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange

Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange Digital Imaging and Communications in Medicine (DICOM) Part 10: Media Storage and File Format for Media Interchange Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn,

More information

Object Oriented Software Design

Object Oriented Software Design Object Oriented Software Design Introduction to Java - II Giuseppe Lipari http://retis.sssup.it/~lipari Scuola Superiore Sant Anna Pisa October 28, 2010 G. Lipari (Scuola Superiore Sant Anna) Introduction

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009 UNIVERSITY OF BOLTON [CRT09] CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009 Date: Friday 29 th May 2015 Time: 14:00 16:00 Instructions to Candidates:

More information

Data Modeling Basics

Data Modeling Basics Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy

More information

Database System Concepts

Database System Concepts s Design Chapter 1: Introduction Departamento de Engenharia Informática Instituto Superior Técnico 1 st Semester 2008/2009 Slides (fortemente) baseados nos slides oficiais do livro c Silberschatz, Korth

More information

Core Components Data Type Catalogue Version 3.1 17 October 2011

Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 17 October 2011 Core Components Data Type Catalogue Version 3.1 Page 1 of 121 Abstract CCTS 3.0 defines the rules for developing Core Data Types and Business

More information