SlideShare a Scribd company logo
1 of 15
Serialization
Date : 10-Mar-2017 By:
Sabarinath Gnanasekar
Problem statement?
• OSI badly needed a way of describing the structured data in
protocols.
OSI Layer
HTTP,SMTP,DHCP,SMTP,POP
Serialization
Presentation Layer
• Establishes context between application-layer entities, (in which the higher-layer
entities may use different syntax and semantics , the presentation service provides a
mapping between them).
• If a mapping is available, presentation service data units are encapsulated into session
protocol data units, and passed down the stack.
• Provides independence from data representation (e.g., encryption) by translating
between application and network formats(vice versa). This layer formats and encrypts
data to be sent across a network. It is sometimes called the syntax layer.
• Uses the basic encoding rules of Abstract Syntax Notation One (ASN.1), with
capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or
serialization of objects and other data structures from and to XML(JSON, YAML,
proto buff).
RFC
• https://tools.ietf.org/html/rfc1085
Why & What Serialization?
• In computer science,
In the context of data storage, serialization is the process of
translating data structures or object state into a format that can be stored,
• In a file
• or Memory buffer
• or Transmitted (across a network link)
and reconstructed later (possibly in a different computer environment).
• Serialization is a mechanism of converting the state of an object into a byte stream.
Deserialization is the reverse process where the byte stream is used to recreate the
actual object in memory. This mechanism is used to persist the object and you can
do stuff like store it on disk or send it over the network.
• The byte stream created is platform independent. So, the object serialized on one
platform can be deserialized on a different platform.
• Use Cases:
A method of transferring data through the wires
A method of storing data
A method of remote procedure calls.(SOAP)
A method for detecting changes in time-varying data
A method for distributing objects
• Serializing the data structure in an architecture independent format means
preventing the problems of byte ordering, memory layout, or simply different
ways of representing data structures in different programming languages.
"Dude,
what
puppy?
Serialization format:
ASN.1
JSON
YAML
Proto buff
Thrift
avro
Above all are few independent scheme of serialization.
ASN .1 - Abstract Syntax Notation One
• ASN.1 and its associated encoding rules are standards put forth by the ITU-T
primarily for use within the telecommunications industry.
• Nearly twenty years and have been constantly refined and updated over the years.
The initial standards defined the ASN.1 schema language and the Basic Encoding
Rules (BER). There has always been a clear separation between the schema language
(ASN.1) and the encoding rules (BER, DER, PER, etc.).
• A technology for exchanging structured data in a universally understood, hardware
agnostic way. Many industrial, security and telephony applications heavily rely on
ASN.1.
• an interface description language
• It is probably among the first serialization protocols in the history of computer
science and technology.
• To understand ASN.1, you must realize that ASN.1 separates two concerns:
describing your data and describing what your data looks like in transmission.
• The first part is describing your data. ASN.1 specifies an abstract syntax notation
and second using appropriate encoding.
Example:
• Coordinate is a complex value consisting of a sequence of two integers which must
be between 0 and 100:
Coordinate ::= SEQUENCE {x INTEGER(0..100), y INTEGER(0..100) }
ASN.1 is closely associated with a set of encoding rules that specify how to represent a
data structure as a series of bytes. The standard ASN.1 encoding rules include:
o Distinguished Encoding Rules (DER)
oBasic Encoding Rules (BER)
o Canonical Encoding Rules (CER)
o XML Encoding Rules (XER)
o Canonical XML Encoding Rules (CXER)
o Extended XML Encoding Rules (E-XER)
o Packed Encoding Rules (PER, unaligned: UPER, canonical: CPER, canonical
unaligned: CUPER)
oOctet Encoding Rules (OER, canonical: COER)
o JSON Encoding Rules (JER)
o Generic String Encoding Rules (GSER)
A known usage of ASN.1
• X.509(certificate used in HTTPS)- (DER is a type-length-value encoding is used)
• Below is the data structure shown above encoded in DER format (all numbers are
in hexadecimal):
30 13 02 01 05 16 0e 41 6e 79 62 6f 64 79 20 74 68 65 72 65 3f
30 — type tag indicating SEQUENCE
13 — length in octets of value that follows
02 — type tag indicating INTEGER
01 — length in octets of value that follows
05 — value (5)
16 — type tag indicating IA5String
(IA5 means the full 7-bit ISO 646 set, including variants,
but is generally US-ASCII)
41 6e 79 62 6f 64 79 20 74 68 65 72 65 3f — value ("Anybody there?")
• Advantages of ASN.1? The ability to use tools to generate code. Along with that, the
flexibility to produce different encodings (e.g. XML, PER) from the same abstract
syntax.
• Disadvantages of ASN.1? Probably complexity
• Usage: Telecommunication
o Signalling standards for the public switched telephone network (SS7 family)
o Network management standards (SNMP, CMIP)
o Directory standards (X.500 family, LDAP)
o Public Key Infrastructure standards (X.509, etc.)
o PBX control (CSTA)
o IP-based Videoconferencing (H.323 family)
o Biometrics (BIP, CBEFF, ACBio)
o Intelligent transportation (SAE J2735)
o Cellular telephony (GSM, GPRS/EDGE, UMTS, LTE)

More Related Content

What's hot

Amoeba distributed operating System
Amoeba distributed operating SystemAmoeba distributed operating System
Amoeba distributed operating SystemSaurabh Gupta
 
Cloudera cluster setup and configuration
Cloudera cluster setup and configurationCloudera cluster setup and configuration
Cloudera cluster setup and configurationSudheer Kondla
 
Introduction to Map-Reduce
Introduction to Map-ReduceIntroduction to Map-Reduce
Introduction to Map-ReduceBrendan Tierney
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Distributed Computing
Distributed Computing Distributed Computing
Distributed Computing Megha yadav
 
Big data-cheat-sheet
Big data-cheat-sheetBig data-cheat-sheet
Big data-cheat-sheetmasoodkhh
 
OLTP+OLAP=HTAP
 OLTP+OLAP=HTAP OLTP+OLAP=HTAP
OLTP+OLAP=HTAPEDB
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel systemManish Singh
 
What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...
What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...
What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...Simplilearn
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?sudhakara st
 
Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...
Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...
Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...Simplilearn
 
Hadoop File system (HDFS)
Hadoop File system (HDFS)Hadoop File system (HDFS)
Hadoop File system (HDFS)Prashant Gupta
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed ComputingChandan Padalkar
 
Introduction to Apache Hive
Introduction to Apache HiveIntroduction to Apache Hive
Introduction to Apache HiveAvkash Chauhan
 

What's hot (20)

Amoeba distributed operating System
Amoeba distributed operating SystemAmoeba distributed operating System
Amoeba distributed operating System
 
Cloudera cluster setup and configuration
Cloudera cluster setup and configurationCloudera cluster setup and configuration
Cloudera cluster setup and configuration
 
PPT on Hadoop
PPT on HadoopPPT on Hadoop
PPT on Hadoop
 
Introduction to Map-Reduce
Introduction to Map-ReduceIntroduction to Map-Reduce
Introduction to Map-Reduce
 
Active directory
Active directory Active directory
Active directory
 
Hadoop technology
Hadoop technologyHadoop technology
Hadoop technology
 
Distributed Computing
Distributed Computing Distributed Computing
Distributed Computing
 
Big data-cheat-sheet
Big data-cheat-sheetBig data-cheat-sheet
Big data-cheat-sheet
 
OLTP+OLAP=HTAP
 OLTP+OLAP=HTAP OLTP+OLAP=HTAP
OLTP+OLAP=HTAP
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
 
What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...
What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...
What Is Hadoop? | What Is Big Data & Hadoop | Introduction To Hadoop | Hadoop...
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?
 
Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...
Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...
Hadoop Tutorial For Beginners | Apache Hadoop Tutorial For Beginners | Hadoop...
 
Hadoop File system (HDFS)
Hadoop File system (HDFS)Hadoop File system (HDFS)
Hadoop File system (HDFS)
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Directory structure
Directory structureDirectory structure
Directory structure
 
Introduction to Apache Hive
Introduction to Apache HiveIntroduction to Apache Hive
Introduction to Apache Hive
 
Cs8493 unit 5
Cs8493 unit 5Cs8493 unit 5
Cs8493 unit 5
 
HBASE Overview
HBASE OverviewHBASE Overview
HBASE Overview
 
Hadoop ecosystem
Hadoop ecosystemHadoop ecosystem
Hadoop ecosystem
 

Similar to Serialization

Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...csandit
 
DEVNET-1152 OpenDaylight YANG Model Overview and Tools
DEVNET-1152	OpenDaylight YANG Model Overview and ToolsDEVNET-1152	OpenDaylight YANG Model Overview and Tools
DEVNET-1152 OpenDaylight YANG Model Overview and ToolsCisco DevNet
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalashrawi92
 
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...VLSICS Design
 
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSICS Design
 
Ogsi architectural constructs
Ogsi architectural constructsOgsi architectural constructs
Ogsi architectural constructsPooja Dixit
 

Similar to Serialization (20)

Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
78247 pp7[1]
78247 pp7[1]78247 pp7[1]
78247 pp7[1]
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Networks
NetworksNetworks
Networks
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
 
Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...Dynamic selection of symmetric key cryptographic algorithms for securing data...
Dynamic selection of symmetric key cryptographic algorithms for securing data...
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
DEVNET-1152 OpenDaylight YANG Model Overview and Tools
DEVNET-1152	OpenDaylight YANG Model Overview and ToolsDEVNET-1152	OpenDaylight YANG Model Overview and Tools
DEVNET-1152 OpenDaylight YANG Model Overview and Tools
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
OSI Model
OSI ModelOSI Model
OSI Model
 
CS-324-6-2.pdf
CS-324-6-2.pdfCS-324-6-2.pdf
CS-324-6-2.pdf
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...
 
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
 
MPLS
MPLS MPLS
MPLS
 
Ogsi architectural constructs
Ogsi architectural constructsOgsi architectural constructs
Ogsi architectural constructs
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Serialization

  • 1. Serialization Date : 10-Mar-2017 By: Sabarinath Gnanasekar
  • 2. Problem statement? • OSI badly needed a way of describing the structured data in protocols.
  • 4. Presentation Layer • Establishes context between application-layer entities, (in which the higher-layer entities may use different syntax and semantics , the presentation service provides a mapping between them). • If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack. • Provides independence from data representation (e.g., encryption) by translating between application and network formats(vice versa). This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer. • Uses the basic encoding rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML(JSON, YAML, proto buff).
  • 6. Why & What Serialization? • In computer science, In the context of data storage, serialization is the process of translating data structures or object state into a format that can be stored, • In a file • or Memory buffer • or Transmitted (across a network link) and reconstructed later (possibly in a different computer environment).
  • 7. • Serialization is a mechanism of converting the state of an object into a byte stream. Deserialization is the reverse process where the byte stream is used to recreate the actual object in memory. This mechanism is used to persist the object and you can do stuff like store it on disk or send it over the network. • The byte stream created is platform independent. So, the object serialized on one platform can be deserialized on a different platform. • Use Cases: A method of transferring data through the wires A method of storing data A method of remote procedure calls.(SOAP) A method for detecting changes in time-varying data A method for distributing objects
  • 8. • Serializing the data structure in an architecture independent format means preventing the problems of byte ordering, memory layout, or simply different ways of representing data structures in different programming languages.
  • 11. ASN .1 - Abstract Syntax Notation One • ASN.1 and its associated encoding rules are standards put forth by the ITU-T primarily for use within the telecommunications industry. • Nearly twenty years and have been constantly refined and updated over the years. The initial standards defined the ASN.1 schema language and the Basic Encoding Rules (BER). There has always been a clear separation between the schema language (ASN.1) and the encoding rules (BER, DER, PER, etc.). • A technology for exchanging structured data in a universally understood, hardware agnostic way. Many industrial, security and telephony applications heavily rely on ASN.1. • an interface description language • It is probably among the first serialization protocols in the history of computer science and technology.
  • 12. • To understand ASN.1, you must realize that ASN.1 separates two concerns: describing your data and describing what your data looks like in transmission. • The first part is describing your data. ASN.1 specifies an abstract syntax notation and second using appropriate encoding. Example: • Coordinate is a complex value consisting of a sequence of two integers which must be between 0 and 100: Coordinate ::= SEQUENCE {x INTEGER(0..100), y INTEGER(0..100) }
  • 13. ASN.1 is closely associated with a set of encoding rules that specify how to represent a data structure as a series of bytes. The standard ASN.1 encoding rules include: o Distinguished Encoding Rules (DER) oBasic Encoding Rules (BER) o Canonical Encoding Rules (CER) o XML Encoding Rules (XER) o Canonical XML Encoding Rules (CXER) o Extended XML Encoding Rules (E-XER) o Packed Encoding Rules (PER, unaligned: UPER, canonical: CPER, canonical unaligned: CUPER) oOctet Encoding Rules (OER, canonical: COER) o JSON Encoding Rules (JER) o Generic String Encoding Rules (GSER)
  • 14. A known usage of ASN.1 • X.509(certificate used in HTTPS)- (DER is a type-length-value encoding is used) • Below is the data structure shown above encoded in DER format (all numbers are in hexadecimal): 30 13 02 01 05 16 0e 41 6e 79 62 6f 64 79 20 74 68 65 72 65 3f 30 — type tag indicating SEQUENCE 13 — length in octets of value that follows 02 — type tag indicating INTEGER 01 — length in octets of value that follows 05 — value (5) 16 — type tag indicating IA5String (IA5 means the full 7-bit ISO 646 set, including variants, but is generally US-ASCII) 41 6e 79 62 6f 64 79 20 74 68 65 72 65 3f — value ("Anybody there?")
  • 15. • Advantages of ASN.1? The ability to use tools to generate code. Along with that, the flexibility to produce different encodings (e.g. XML, PER) from the same abstract syntax. • Disadvantages of ASN.1? Probably complexity • Usage: Telecommunication o Signalling standards for the public switched telephone network (SS7 family) o Network management standards (SNMP, CMIP) o Directory standards (X.500 family, LDAP) o Public Key Infrastructure standards (X.509, etc.) o PBX control (CSTA) o IP-based Videoconferencing (H.323 family) o Biometrics (BIP, CBEFF, ACBio) o Intelligent transportation (SAE J2735) o Cellular telephony (GSM, GPRS/EDGE, UMTS, LTE)