PRESENTATION LAYER Communicating computers represent information in different ways Character code: ASCII/EBCDIC? Numbers size 1 s complement/2 s



Similar documents
INTERNATIONAL TELECOMMUNICATION UNION

SNMP....Simple Network Management Protocol...

Packet Structure and Encoding

Network Management. What is network management?

Caml Virtual Machine File & data formats Document version: 1.4

encoding compression encryption

Chapter 9 Network Management

Chapter 9 Network Management. ISO network management. What is network management? Chapter 9: Network Management. Network Management standards

Chapter 9 Network Management

Chapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management

Symbol Tables. Introduction

Abstract Syntax Notation One ASN.1. ASN.1 Abstract Syntax Notation One

INTERNATIONAL TELECOMMUNICATION UNION

Networking Test 4 Study Guide

The OSI Model and the TCP/IP Protocol Suite

Chapter 9. IP Secure

INTERNATIONAL TELECOMMUNICATION UNION

Prepared By: P Lichen. P Xulu

Request for Comments: Category: Experimental NSA February 2000

Package PKI. July 28, 2015

Package PKI. February 20, 2013

Simple Network Management Protocol

Detailed Specifications

MBP_MSTR: Modbus Plus Master 12

S.2.2 CHARACTER SETS AND SERVICE STRING ADVICE: THE UNA SEGMENT

Protocol Security Where?

Introduction to IP v6

Protocol Data Units and Encapsulation

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

OSI Seven Layers Model Explained with Examples

Simple Network Management Protocol (SNMP) Amar J. Desai Graduate Student University of Southern California Computer Science

Arithmetic Coding: Introduction

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Unordered Linked Lists

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

International Journal of Advanced Research in Computer Science and Software Engineering

Security Issues of the Digital Certificates within Public Key Infrastructures

SSC - Communication and Networking Java Socket Programming (II)

R.2 STRUCTURE OF AN EDIFACT TRANSMISSION

Number Representation

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Protocols and Architecture. Protocol Architecture.

Moven Studio realtime. streaming

DIGITAL SIGNATURE FOR EANCOM MESSAGES

Simple Network Management Protocol

Converting a Number from Decimal to Binary

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Systems I: Computer Organization and Architecture

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

TCP/IP and the Internet

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

850 Purchase Order. X12/V4030/850: 850 Purchase Order. Version: 1.0 Draft

Introduction to Network Security. Topics

Computer Networks. Data Link Layer

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

2011, The McGraw-Hill Companies, Inc. Chapter 3

ITU-T Q.812. Amendment 3 (02/00) Protocol profile for electronic communications interactive agent Amendment 3:

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Waspmote Encryption Libraries. Programming guide

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Applies to Version 6 Release 5 X12.6 Application Control Structure

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

HOST EUROPE CLOUD STORAGE REST API DEVELOPER REFERENCE

RARP: Reverse Address Resolution Protocol

Subject knowledge requirements for entry into computer science teacher training. Expert group s recommendations

1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal:

SNMP and Network Management

Alternate Representations of the Public Key Cryptography Standards (PKCS) Using S-Expressions, S-PKCS

CPU Organisation and Operation

The Answer to the 14 Most Frequently Asked Modbus Questions

1. The memory address of the first element of an array is called A. floor address B. foundation addressc. first address D.

Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)

Section IV.1: Recursive Algorithms and Recursion Trees

RaneNote SNMP: SIMPLE? NETWORK MANAGEMENT PROTOCOL

CSI 333 Lecture 1 Number Systems

Online signature API. Terms used in this document. The API in brief. Version 0.20,

Section 4: Interim Local Management Interface Specification

Computer Science 281 Binary and Hexadecimal Review

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev October Document information

Data Structures Fibonacci Heaps, Amortized Analysis

Voice Over IP Per Call Bandwidth Consumption

Configuring SNMP Monitoring

Compression techniques

A binary search tree or BST is a binary tree that is either empty or in which the data element of each node has a key, and:

ESPA Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION

It is the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed.

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Efficient representation of integer sets

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

The application of prime numbers to RSA encryption

Smart Card Application Standard Draft

Transcription:

PRESENTATION LAYER Communicating computers represent information in different ways Character code: ASCII/EBCDIC? Numbers size 1 s complement/2 s complement real format: mantissa/exponent sizes, is exponent a power of 2, 16,? Data structures arrays, records, dynamic data structures Data compression reduces line charges reduces transport delays

Network security systems need to prevent eavesdropping prevent unauthorised messages prevent unauthorised deletion of messages ensure identity of sender

DATA REPRESENTATION AND ASN.1 Data structures used by an application may change during session context n - set of data structures in use at time n presentation layer allows context definition (ASN.1) context changing Specify abstract syntax (data comprises these items) Specify transfer syntax (these items are formatted thus)

DATA STRUCTURES consider a banking transaction sender must unambiguously transmit source bank and destination bank name, address, branch no, account numbers amount, currency, exchange rate date, time application uses ASN.1 to define data types similar to Pascal data type definitions sends definition to receiver

ASN.1 primitives: INTEGER BOOLEAN BIT STRING e.g. 00101010 B or 2A H - Hex version OCTET STRING ANY (union of all types) NULL OBJECT IDENTIFIER (e.g. name of a library of ASN.1 definitions) [iso standard 8571 part 4 ftam-pci(1)] tree-structured name File Transfer, access and Management e.g. for updating a database on a different type of machine Protocol Control Information

Constructors SEQUENCE SEQUENCE OF SET SET OF CHOICE list of various types list of one type (SEQUENCE OF INTEGER) unordered collection of various types unordered collection of one type one type from a given list

An RJE application might use this ASN.1 definition Job ::= SEQUENCE{ header body trailer } Account-PDU, SEQUENCE OF Command-PDU, Termination-PDU Command-PDU ::= CHOICE{ Account-PDU Local-Command ::= Joblib.local etc. ::= Joblib.account Local-command, Remote-command } library module

TRANSFER SYNTAX Layer 6 header includes ASN.1 type with every value transmitted So no need for lexical analysis at destination ASN.1 TYPE IDENTIFIER 1 2 3 4 5 6 7 8 Class Type Tag Known by this app Universal Application disambiguates variant records Context-specific used within the organisation Private 0=Primitive, 1 = Constructed 1 = Boolean 2 = Integer etc Known by everyone LENGTH CONTENTS Class and tag have some mutually redundant info. Can use both (gives error-check) or omit one

Application entity ASN.1 definition data application syntax 1 application syntax 2 Application entity ASN.1 definition data APDU transfer syntax APDU Presentation entity PPDU Presentation entity Non-universal parts of an ASN.1 negotiated beforehand

DATA COMPRESSION run-length encoding 11111111111111111000000000000011111110000 17 13 7 4 00010001 1 00001101 0 00000111 1 00000100 0 can encode 256-bit sequence as 9 bits =41 bits =36 bits Many files contain long runs of zeros run-length encode zeros only

DATA ENCRYPTION & DECRYPTION occur at level 6

Huffman coding 33 Analyse text & construct tree Put most common unplaced character in right subtree Put other charcters in left subtree 8 18 Character codes: Path to character determines code add 0 for each rt branch, add 1 for each left branch d 3 a 5 t 10 e 15 so e -> 0 Relative frequency of occurrence of the letter d t -> 10 a -> 110 d -> 111