You are on page 1of 26

ABSTRACT SYNTAX › ASN.

1
NOTATION ONE: › Encoding Structure
ASN.1
› Macros

1
Video Lecture Links
› https://www.youtube.com/watch?v=EccHushRhWs
› https://www.youtube.com/watch?v=ECXLSdC6FcI

2
ASN.1
› It is formal language develop jointly by ITU-T and ISO
› It is used with application layer for data transfer between
systems
› It separates the abstract syntax with transfer syntax
› Abstract syntax: set of rules used to specify the data types
and structure for the storage of information
› Transfer syntax: set of rules for communication information
between systems
› It can be used on presentation layer (independent of lower
layers)
3
ASN.1 – Terminology, Symbols & Conversions
› It uses the formal syntax language and grammar of BNF
(Backus-Naur Form)
– <name> ::= <definition>
– This “ <entity> ” donates an “entity”
– This “ ::= ” means “define as”
› For example
– <digit> ::= 0|1|2|3|4|5|6|7|8|9
– Here the entity is “digit”
– “|” represents “or”
– On right hand, all possible values of digit
› <operation> ::= +|-|x|/
4
ASN.1 – Basic Example 1
› <digit> ::= 0|1|2|3|4|5|6|7|8|9
› <number> ::= <digit> | <digit><number>
› For example
–1 ➔ <digit> ::= 1
› This is digit 1
–9 ➔ <number> ::= 9
› This is digit 9
– 19 ➔ <number> ::= 19
› This is concatenation of digit 1 and number 9
– 219 ➔ <number> ::= 219
› This is concatenation of digit 2 and number 19
5
ASN.1 – Basic Example 2
› <letter> ::= A|B|C|D|E|…
› <word> ::= <letter>|<word><letter>
› <phrase> ::= <word>|<phrase>’ ’<word>

6
Symbol Meaning
::= Define as or assignment

ASN.1 SYMBOLS | Or, alternative, options of a list

Complete list of ASN.1 - Signed number


symbols -- Following the symbol are comments

{ } Start and end of a list

[ ] Start and end of a tag

() Start and end of a subtype

.. Range

7
Keyword Brief Description
BEGIN Start of an ASN.1 module
CHOICE list of alternatives
DEFINITIONS Definition of a data type or managed object
ASN.1 KEYWORDS END End of an ASN.1 module
Few frequently used ASN.1 EXPORTS Data types that can be exported to other modules
keywords IDENTIFIER A sequence of non-negative numbers
IMPORTS Data types defined in external modules
INTEGER Any negative or non-negative number
NULL A placeholder
OBJECT Used with IDENTIFIER to uniquely Identify an object
OCTET Unbounded 8·bit, bytes (octets) of binary data
OF Used with SET and SEQUENCE
SEQUENCE Ordered list maker
SEQUENCE OF Ordered array of repetitive data
SET Unordered list maker
SET OF Unordered list of repetitive data
STRING Used with OCTET for denoting a string of octets

8
ASN.1 – DATA TYPE
DEFINITION
EXAMPLE
Defining data type
PersonnelRecord, build on
primitive data types.

9
Encoding Structure (1)
› The algorithm, to convert the textual ASN.1 syntax to
machine readable code is called Basic Encoding Rules (BER)
› ASCII text data are converted to bit-oriented data using the
BER define for the transfer syntax
› One basic encoding structure is TLV
› TLV (Type, Length, Value) is define as
– Type: primitive or non-primitive (constant, simple type or construct)
– Length: specifics the length of the value field in octets
– Value: encoded value based on data type
TYPE LENGTH VALUE
10
Encoding Structure (2)
› Type has 3 sub-components
– Tag Number: Taken from Universal Class Tag Assignment
› Unique number is assign to every type name e-g: Boolean [1], Integer [2] etc.
– P/C: structure is primitive or construct (0/1)
– Class: coded in 2 bits. (00,01,10,11)
› Length is short (1 octet) or long (2 or more octets)
– If 8th bit is 1, it means length field is represented by 2 or more octets
– If 8th bit is 0, remaining 7 bits represents the actual length of value
field
› Value is the actual data, encoded based on the data type
TYPE (1-byte) LENGTH VALUE

, Class (7-8th bits), P/C (6th bit), Tag Number (1-5th bits), 11
Encoding structure –
Example
› Data: ‘0C1B’h → 00001100 00011011
› Complete TLV is represented as
› TLV: 00000100 00000010 00001100 00011011
› Class type universal (00) and Primitive (0) and tag value
(4) as it is string with a one octet length field and two
octets of value field
› Here, 8th bit is 0, remaining 7 bits represents the actual
length of value field which is 2 octets

12
Universal Tag Assignment

13
ASN.1 Macros
› By now, we have used ASN.1 notation of syntax directly and
explicitly
› ASN.1 permits extension capabilities to define new data
types and values by the use of ASN.1 macros
› ASN.1 macros also facilitate grouping of instances of an
object or concisely defining various characteristics
associated with an object

14
Structure of ASN.1 Macro
› Basic form of ASN.1 macro
› All keywords in capital letters
– TYPE NOTATION: define the syntax of new types
– VALUE NOTATION: define the syntax of new values
– Auxiliary assignments: define & describe any new type identified

15
OBJECT IDENTITY - Macro
(RFC 1902)
› Create an Internet object using
and OBJECT-IDENTITY macro
› STATUS and DESCRIPTION are
two syntactical objects
› Referpart is optional

16
Example of OBJECT-IDENTITY Macro
› Course cs8113 is registered under the object descriptor
“csclasses” as 50th node.
› The object cs8113 has a value
– It’s status is current
– It’s description is “A graduate-level … ”

17
› Configuration Management
FUNCTIONAL › Fault Management
MODEL
It addresses user oriented
› Performance Management
application
› Security Management
› Accounting Management

18
Configuration Management
› It address the setting and changing of configuration of the
networks and network components
› Management information is embedded in the managed
objects such as hubs, bridges and routers e-g:
– threshold alarms, when packet loss exceeded the define value
– Information of object name and contact person to be contacted
when component failed in the NMS (Network Management System)
› Configuration data is gathered and stored by NMS at the
NOC (Network Operations Center)
› NMS displays real-time configuration of the network and its
status
19
Fault Management
› Detection and isolation of the problem causing the failure in
the network
› Restoration of service is done as soon as possible and could
involve re-configuration (Configuration Management)
› NMS constantly monitors and displays the real-time major
and minor alarms based on severity of failure
› Self-healing: when restoration is done by network itself

20
Fault Management -
Trouble-Ticket Generation System
› Sometimes, restoration of issue doesn't include fixing the
cause of problem else generating the trouble ticket
› All problems are tracked until resolved
› Trouble tracking system, automates the tracking of
trouble, from automatic generation of trouble ticket by
the NMS to the resolution of problem

21
Performance Management
› Concerned with performance behavior of the network
› Network-monitoring system measures the traffic and
performance statistics on the network.
› Performance statistic includes
– Traffic volume, network availability, network delay etc.
› Data traffic can be captured form various segment of
networks

22
Performance Management –
Network Operations Center (NOC)
› Data need to be gather at NOC, updated in timely fashion in
order to administer performance management
› Any temporary relief in congestion are also made by NOC
› Permanent relief is engineered by the addition of equipment,
facilities and change in policies.

23
Performance Management –
Performance Monitoring Tools
› Can gather statistics of all layers
› Analyze application oriented traffic such as
– Web transfer, Internet mail, file transfer etc.
› These statistics on application could be used to make policy
decisions
› Performance data on availability and delay are also useful
for tuning the network to increase the reliability and improve
its performance

24
Security Management
› physically securing the network, accessing the network
resource and secure communication over the network
› Security database is established and maintained by NOC, for
access to the network and network information.
› Unauthorized access
– Generates alarm at NMS
– Firewalls: protection against the personal, program and virus etc
– Cryptography: secure communication

25
Accounting Management
› Administers cost allocation according to the usage of
network
› Traffic data used as input (generated by performance management)
› Metrics are established to measure the usage of resources
and services provided
› Service and business management
– Directed toward the service provider, in order to accomplish
customer satisfaction and ensure profitability of business
– Traffic statistics, trouble ticket administration data and accounting
management are used as input

26

You might also like