SlideShare a Scribd company logo
International Telecommunication Union 
AASSNN..11 TTooddaayy aanndd 
TToommoorrrrooww 
© 2002 OSS Nokalva
What is ASN.1? 
What are Encoding Rules? 
 ASN.1 (Abstract Syntax Notation One) 
defines the syntax of messages to be 
exchanged between peer applications 
independently of local representation. 
 Encoding Rules define how application 
messages should be encoded while in 
transit between peers.
Sample ASN.1 Definition 
Age ::= INTEGER (0..7) 
User ::= SEQUENCE { 
name IA5String (SIZE(1..128)), 
age Age, 
address IA5String OPTIONAL, 
... 
} 
 Power to express both simple and complex types. 
 Types may be constrained in size and/or value. 
 More powerful constraints are available. 
 Fields may be marked as OPTIONAL. 
 Type extensibility allows for smooth enhancements.
Rich Set of Types 
BOOLEAN 
INTEGER 
BIT STRING 
OCTET STRING 
NULL 
REAL 
ENUMERATED 
SEQUENCE 
SEQUENCE OF 
GeneralizedTime 
IA5String 
BMPString 
UTF8String
What are the Basic Encoding Rules 
Age ::= INTEGER (0..7) 
firstGrade Age ::= 6 
Application 1 02 01 06 Application 2 
Value 
Length 
Tag } Total of 
 BER specifies how data should be encoded for transmission, 
24 bits 
independently of machine type, programming language, or representation 
within an application program. 
 BER is highly structured, prefixing all values with a tag and a length.
What are the Packed Encoding Rules? 
Age ::= INTEGER (0..7) 
firstGrade Age ::= 6 
Application 1 110 Application 2 
total length of 3 bits 
 Like BER, PER specifies how data should be encoded for transmission, 
independently of machine type, programming language, or representation 
within an application program. 
 Unlike BER, tags are never transmitted, while lengths and values are not 
transmitted if known by both peers. 
 PER’s reason for existence is to conserve bandwidth. It is valuable in 
audio and video over the Internet, air-ground communication, radio-paging, 
or wherever bandwidth is at a premium.
What are the XML Encoding Rules? 
Age ::= INTEGER (0..7) 
firstGrade Age ::= 6 
Application 1 <Age>6</Age> Application 2 
total length of 12 octets 
 Just like BER and PER, XER also specifies how data should be encoded 
for transmission, independently of machine type, programming language, 
or representation within an application program. 
 Unlike the more compact encoding rules, XER is immediately legible. 
 XER’s reason for existence is ease of legibility (no tools are needed), but 
 XER uses significantly more bandwidth.
ECN 
Encoding Control Notation 
 Customize the encoding 
 Modify (improve) the standard ASN.1 
encoding rules 
 Retrofit ASN.1 syntax to non-ASN.1 
protocols
Some Benefits of ASN.1 
 Application protocol designers can focus on the information that 
needs to be exchanged 
 Provides implementors with a more precise description of the 
messages to be exchanged 
 Application programmers can focus on the substance of their 
application 
 Allows you to choose the most suitable programming language 
 Development time significantly reduced with use of quality ASN.1 
tools 
 Proven technology 
 Widely adopted International Standard
Using ASN.1 
ASN.1 can be used with most modern programming languages, 
including Java and C++, as well as older ones such as C and COBOL. 
ASN.1 PersonalInfo ::= SEQUENCE { 
married BOOLEAN, 
age INTEGER (123456..124000), 
name PrintableString 
} 
Generated C header file: typedef struct PersonalInfo { 
ossBoolean married; 
int age; 
char *name; 
} PersonalInfo; 
Encoding/decoding: ossEncode(world, PersonalInfo_PDU, 
&inBuf, &outBuf); 
ossDecode(world, &pdunum, &inBuf, 
&outBuf);
Development Work Flow 
ASN.1 
Syntax 
ASN.1 
Compiler 
C Header 
File 
Application 
Source Code 
include 
C/C++ 
Compiler 
Encoder/ 
Decoder 
Libraries 
Linker 
Executable Application
Current Uses of ASN.1 
 Audio & Video over the Internet 
AT&T, Intel, IBM, Microsoft, 3COM 
 Electronic Commerce 
American Express, GTE, MasterCard, VISA 
 Telephony 
AT&T, MCI, Motorola, Nokia, Sprint 
 Aviation 
FAA, ICAO 
 Manufacturing 
Ford, Mercedes Benz, Mitsubishi 
 Network Management 
Bull, Compaq, Hewlett-Packard, Sun 
 Routers 
Bay Networks, Cisco, Racal, Xyplex
ASN.1 and Encoding Rules Standards Documents 
 ITU-T Rec. X.680 | ISO/IEC 8824-1 - Basic ASN.1 
Notation 
 ITU-T Rec. X.681 | ISO/IEC 8824-2 - Information Object 
Classes 
 ITU-T Rec. X.682 | ISO/IEC 8824-3 - Constraints 
 ITU-T Rec. X.683 | ISO/IEC 8824-4 - Parameterization 
 ITU-T Rec. X.690 | ISO/IEC 8825-1 
Basic Encoding Rules (BER) 
Canonical Encoding Rules (CER) 
Distinguished Encoding Rules (DER) 
 ITU-T Rec. X.691 | ISO/IEC 8825-2 
Packed Encoding Rules (PER)
Newest ASN.1 and Encoding Rules 
Standards Documents 
 ITU-T Rec. X.692 | ISO/IEC 8825-3 
Encoding Control Notation (ECN) 
 ITU-T Rec. X.693 | ISO/IEC 8825-4 
XML Encoding Rules (XER) 
 ITU-T Rec. X.694 | ISO/IEC 8825-5 
Encoding XML-Defined Data Using ASN.1
ASN.1 Into the Future 
 Security standards: XML Cryptographic 
Message Syntax (XCMS) 
 Biometrics Information Management and 
Security (X9.84) 
 Intelligent Transportation System (ITS) 
 Electric Power Utilities 
 Cellular telephones (UMTS)
The future: Why ASN.1? 
 XML 
ASN.1 as an XML schema notation is simpler 
than and about as powerful as XSD. Users can 
benefit from the browser display capabilities of 
XML and still have compact ASN.1 encodings. 
 PER 
The compact encodings of PER are ideal for low-bandwidth 
applications of which there are many. 
PER can go where XML encodings can not. It 
makes XML usable in applications that it 
otherwise cannot touch.
The future: Why ASN.1? (cont.) 
 ECN 
Apply ASN.1 to legacy protocols. Replace error-prone hand 
encodings and bitmaps with machine-processable cutomized 
encodings. 
 DER 
Used in every secure web purchase, secure email, digital 
signatures, etc. 
 Extensibility 
The extensibility built into ASN.1 allows version 1 systems to 
seamlessly interwork with version 2 systems.
ASN.1 Consortium 
 Share technical information and solutions 
 Develop implementor’s agreement on limits to 
impose on ASN.1 
 Coordinate with the ASN.1 Project to promote 
the use of ASN.1 
 Keep interested parties abreast of upcoming 
applications of ASN.1 in industry 
 Create test suite database 
 http://www.asn1.org

More Related Content

Similar to 78247 pp7[1]

Communication Protocols Augmentation in VLSI Design Applications
Communication Protocols Augmentation in VLSI Design ApplicationsCommunication Protocols Augmentation in VLSI Design Applications
Communication Protocols Augmentation in VLSI Design ApplicationsIJERA Editor
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetIAEME Publication
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET Journal
 
Design and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaDesign and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaIAEME Publication
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...Videoguy
 
Ofdm based wireless lan transmitter
Ofdm based wireless lan transmitterOfdm based wireless lan transmitter
Ofdm based wireless lan transmitterIAEME Publication
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsMohamed Daif
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layerSerious_SamSoul
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 

Similar to 78247 pp7[1] (20)

Data representation
Data representationData representation
Data representation
 
Data representation
Data representationData representation
Data representation
 
Serialization
SerializationSerialization
Serialization
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Communication Protocols Augmentation in VLSI Design Applications
Communication Protocols Augmentation in VLSI Design ApplicationsCommunication Protocols Augmentation in VLSI Design Applications
Communication Protocols Augmentation in VLSI Design Applications
 
Optimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernetOptimization of ipv6 packet’s headers over ethernet
Optimization of ipv6 packet’s headers over ethernet
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...IRJET-  	  Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
 
Design and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaDesign and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpga
 
Enea OSE Datasheet
Enea OSE DatasheetEnea OSE Datasheet
Enea OSE Datasheet
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...
 
Dsa00170624
Dsa00170624Dsa00170624
Dsa00170624
 
Ofdm based wireless lan transmitter
Ofdm based wireless lan transmitterOfdm based wireless lan transmitter
Ofdm based wireless lan transmitter
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 
B034205010
B034205010B034205010
B034205010
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 

More from Arthur Sanchez

160121 cdp research update
160121 cdp research update160121 cdp research update
160121 cdp research updateArthur Sanchez
 
Ee8315 lecture12 wi_max_2005_pa1
Ee8315 lecture12 wi_max_2005_pa1Ee8315 lecture12 wi_max_2005_pa1
Ee8315 lecture12 wi_max_2005_pa1Arthur Sanchez
 
14 1 qo_s_digitization
14 1 qo_s_digitization14 1 qo_s_digitization
14 1 qo_s_digitizationArthur Sanchez
 
14 1 qo_s_digitization
14 1 qo_s_digitization14 1 qo_s_digitization
14 1 qo_s_digitizationArthur Sanchez
 
19427661 wi max-network-architecture
19427661 wi max-network-architecture19427661 wi max-network-architecture
19427661 wi max-network-architectureArthur Sanchez
 
47525890 wimax-english
47525890 wimax-english47525890 wimax-english
47525890 wimax-englishArthur Sanchez
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutArthur Sanchez
 
Frost & sullivan oss-bss global competitive strategies
Frost & sullivan   oss-bss global competitive strategiesFrost & sullivan   oss-bss global competitive strategies
Frost & sullivan oss-bss global competitive strategiesArthur Sanchez
 

More from Arthur Sanchez (14)

Sp 040921
Sp 040921Sp 040921
Sp 040921
 
U.s. medicine
U.s. medicineU.s. medicine
U.s. medicine
 
160121 cdp research update
160121 cdp research update160121 cdp research update
160121 cdp research update
 
Ee8315 lecture12 wi_max_2005_pa1
Ee8315 lecture12 wi_max_2005_pa1Ee8315 lecture12 wi_max_2005_pa1
Ee8315 lecture12 wi_max_2005_pa1
 
14 1 qo_s_digitization
14 1 qo_s_digitization14 1 qo_s_digitization
14 1 qo_s_digitization
 
2 1
2 12 1
2 1
 
14 1 qo_s_digitization
14 1 qo_s_digitization14 1 qo_s_digitization
14 1 qo_s_digitization
 
19427661 wi max-network-architecture
19427661 wi max-network-architecture19427661 wi max-network-architecture
19427661 wi max-network-architecture
 
47525890 wimax-english
47525890 wimax-english47525890 wimax-english
47525890 wimax-english
 
Prepaid
PrepaidPrepaid
Prepaid
 
Multicore computing
Multicore computingMulticore computing
Multicore computing
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handout
 
Frost & sullivan oss-bss global competitive strategies
Frost & sullivan   oss-bss global competitive strategiesFrost & sullivan   oss-bss global competitive strategies
Frost & sullivan oss-bss global competitive strategies
 
Alpha lipoic acid
Alpha lipoic acidAlpha lipoic acid
Alpha lipoic acid
 

Recently uploaded

National-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxNational-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxAlecAnidul
 
Claire's designing portfolio presentation
Claire's designing portfolio presentationClaire's designing portfolio presentation
Claire's designing portfolio presentationssuser8fae18
 
Heuristic Evaluation of System & Application
Heuristic Evaluation of System & ApplicationHeuristic Evaluation of System & Application
Heuristic Evaluation of System & ApplicationJaime Brown
 
CA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdfCA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdfSudhanshuMandlik
 
Art Nouveau Movement Presentation for Art History.
Art Nouveau Movement Presentation for Art History.Art Nouveau Movement Presentation for Art History.
Art Nouveau Movement Presentation for Art History.rrimika1
 
The Design Code Google Developer Student Club.pptx
The Design Code Google Developer Student Club.pptxThe Design Code Google Developer Student Club.pptx
The Design Code Google Developer Student Club.pptxadityakushalsaha
 
Pitch Presentation for Service Design in Technology
Pitch Presentation for Service Design in TechnologyPitch Presentation for Service Design in Technology
Pitch Presentation for Service Design in TechnologyJaime Brown
 
Research about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anasResearch about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anasanasabutalha2013
 
BIT- Pinal .H. Prajapati Graphic Designer
BIT- Pinal .H. Prajapati  Graphic DesignerBIT- Pinal .H. Prajapati  Graphic Designer
BIT- Pinal .H. Prajapati Graphic Designerbitwgin12
 
Spring 2024 wkrm_Enhancing Campus Mobility.pdf
Spring 2024 wkrm_Enhancing Campus Mobility.pdfSpring 2024 wkrm_Enhancing Campus Mobility.pdf
Spring 2024 wkrm_Enhancing Campus Mobility.pdfJon Freach
 
Design lessons from Singapore | Volume 3
Design lessons from Singapore | Volume 3Design lessons from Singapore | Volume 3
Design lessons from Singapore | Volume 3Remy Rey De Barros
 
The Evolution of Fashion Trends: History to Fashion
The Evolution of Fashion Trends: History to FashionThe Evolution of Fashion Trends: History to Fashion
The Evolution of Fashion Trends: History to FashionPixel poets
 
Common Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid themCommon Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid themmadhavlakhanpal29
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdffabianavillanib
 

Recently uploaded (14)

National-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptxNational-Learning-Camp 2024 deped....pptx
National-Learning-Camp 2024 deped....pptx
 
Claire's designing portfolio presentation
Claire's designing portfolio presentationClaire's designing portfolio presentation
Claire's designing portfolio presentation
 
Heuristic Evaluation of System & Application
Heuristic Evaluation of System & ApplicationHeuristic Evaluation of System & Application
Heuristic Evaluation of System & Application
 
CA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdfCA OFFICE office office office _VIEWS.pdf
CA OFFICE office office office _VIEWS.pdf
 
Art Nouveau Movement Presentation for Art History.
Art Nouveau Movement Presentation for Art History.Art Nouveau Movement Presentation for Art History.
Art Nouveau Movement Presentation for Art History.
 
The Design Code Google Developer Student Club.pptx
The Design Code Google Developer Student Club.pptxThe Design Code Google Developer Student Club.pptx
The Design Code Google Developer Student Club.pptx
 
Pitch Presentation for Service Design in Technology
Pitch Presentation for Service Design in TechnologyPitch Presentation for Service Design in Technology
Pitch Presentation for Service Design in Technology
 
Research about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anasResearch about Venice ppt for grade 6f anas
Research about Venice ppt for grade 6f anas
 
BIT- Pinal .H. Prajapati Graphic Designer
BIT- Pinal .H. Prajapati  Graphic DesignerBIT- Pinal .H. Prajapati  Graphic Designer
BIT- Pinal .H. Prajapati Graphic Designer
 
Spring 2024 wkrm_Enhancing Campus Mobility.pdf
Spring 2024 wkrm_Enhancing Campus Mobility.pdfSpring 2024 wkrm_Enhancing Campus Mobility.pdf
Spring 2024 wkrm_Enhancing Campus Mobility.pdf
 
Design lessons from Singapore | Volume 3
Design lessons from Singapore | Volume 3Design lessons from Singapore | Volume 3
Design lessons from Singapore | Volume 3
 
The Evolution of Fashion Trends: History to Fashion
The Evolution of Fashion Trends: History to FashionThe Evolution of Fashion Trends: History to Fashion
The Evolution of Fashion Trends: History to Fashion
 
Common Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid themCommon Designing Mistakes and How to avoid them
Common Designing Mistakes and How to avoid them
 
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdfPORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
PORTFOLIO FABIANA VILLANI ARCHITECTURE.pdf
 

78247 pp7[1]

  • 1. International Telecommunication Union AASSNN..11 TTooddaayy aanndd TToommoorrrrooww © 2002 OSS Nokalva
  • 2. What is ASN.1? What are Encoding Rules?  ASN.1 (Abstract Syntax Notation One) defines the syntax of messages to be exchanged between peer applications independently of local representation.  Encoding Rules define how application messages should be encoded while in transit between peers.
  • 3. Sample ASN.1 Definition Age ::= INTEGER (0..7) User ::= SEQUENCE { name IA5String (SIZE(1..128)), age Age, address IA5String OPTIONAL, ... }  Power to express both simple and complex types.  Types may be constrained in size and/or value.  More powerful constraints are available.  Fields may be marked as OPTIONAL.  Type extensibility allows for smooth enhancements.
  • 4. Rich Set of Types BOOLEAN INTEGER BIT STRING OCTET STRING NULL REAL ENUMERATED SEQUENCE SEQUENCE OF GeneralizedTime IA5String BMPString UTF8String
  • 5. What are the Basic Encoding Rules Age ::= INTEGER (0..7) firstGrade Age ::= 6 Application 1 02 01 06 Application 2 Value Length Tag } Total of  BER specifies how data should be encoded for transmission, 24 bits independently of machine type, programming language, or representation within an application program.  BER is highly structured, prefixing all values with a tag and a length.
  • 6. What are the Packed Encoding Rules? Age ::= INTEGER (0..7) firstGrade Age ::= 6 Application 1 110 Application 2 total length of 3 bits  Like BER, PER specifies how data should be encoded for transmission, independently of machine type, programming language, or representation within an application program.  Unlike BER, tags are never transmitted, while lengths and values are not transmitted if known by both peers.  PER’s reason for existence is to conserve bandwidth. It is valuable in audio and video over the Internet, air-ground communication, radio-paging, or wherever bandwidth is at a premium.
  • 7. What are the XML Encoding Rules? Age ::= INTEGER (0..7) firstGrade Age ::= 6 Application 1 <Age>6</Age> Application 2 total length of 12 octets  Just like BER and PER, XER also specifies how data should be encoded for transmission, independently of machine type, programming language, or representation within an application program.  Unlike the more compact encoding rules, XER is immediately legible.  XER’s reason for existence is ease of legibility (no tools are needed), but  XER uses significantly more bandwidth.
  • 8. ECN Encoding Control Notation  Customize the encoding  Modify (improve) the standard ASN.1 encoding rules  Retrofit ASN.1 syntax to non-ASN.1 protocols
  • 9. Some Benefits of ASN.1  Application protocol designers can focus on the information that needs to be exchanged  Provides implementors with a more precise description of the messages to be exchanged  Application programmers can focus on the substance of their application  Allows you to choose the most suitable programming language  Development time significantly reduced with use of quality ASN.1 tools  Proven technology  Widely adopted International Standard
  • 10. Using ASN.1 ASN.1 can be used with most modern programming languages, including Java and C++, as well as older ones such as C and COBOL. ASN.1 PersonalInfo ::= SEQUENCE { married BOOLEAN, age INTEGER (123456..124000), name PrintableString } Generated C header file: typedef struct PersonalInfo { ossBoolean married; int age; char *name; } PersonalInfo; Encoding/decoding: ossEncode(world, PersonalInfo_PDU, &inBuf, &outBuf); ossDecode(world, &pdunum, &inBuf, &outBuf);
  • 11. Development Work Flow ASN.1 Syntax ASN.1 Compiler C Header File Application Source Code include C/C++ Compiler Encoder/ Decoder Libraries Linker Executable Application
  • 12. Current Uses of ASN.1  Audio & Video over the Internet AT&T, Intel, IBM, Microsoft, 3COM  Electronic Commerce American Express, GTE, MasterCard, VISA  Telephony AT&T, MCI, Motorola, Nokia, Sprint  Aviation FAA, ICAO  Manufacturing Ford, Mercedes Benz, Mitsubishi  Network Management Bull, Compaq, Hewlett-Packard, Sun  Routers Bay Networks, Cisco, Racal, Xyplex
  • 13. ASN.1 and Encoding Rules Standards Documents  ITU-T Rec. X.680 | ISO/IEC 8824-1 - Basic ASN.1 Notation  ITU-T Rec. X.681 | ISO/IEC 8824-2 - Information Object Classes  ITU-T Rec. X.682 | ISO/IEC 8824-3 - Constraints  ITU-T Rec. X.683 | ISO/IEC 8824-4 - Parameterization  ITU-T Rec. X.690 | ISO/IEC 8825-1 Basic Encoding Rules (BER) Canonical Encoding Rules (CER) Distinguished Encoding Rules (DER)  ITU-T Rec. X.691 | ISO/IEC 8825-2 Packed Encoding Rules (PER)
  • 14. Newest ASN.1 and Encoding Rules Standards Documents  ITU-T Rec. X.692 | ISO/IEC 8825-3 Encoding Control Notation (ECN)  ITU-T Rec. X.693 | ISO/IEC 8825-4 XML Encoding Rules (XER)  ITU-T Rec. X.694 | ISO/IEC 8825-5 Encoding XML-Defined Data Using ASN.1
  • 15. ASN.1 Into the Future  Security standards: XML Cryptographic Message Syntax (XCMS)  Biometrics Information Management and Security (X9.84)  Intelligent Transportation System (ITS)  Electric Power Utilities  Cellular telephones (UMTS)
  • 16. The future: Why ASN.1?  XML ASN.1 as an XML schema notation is simpler than and about as powerful as XSD. Users can benefit from the browser display capabilities of XML and still have compact ASN.1 encodings.  PER The compact encodings of PER are ideal for low-bandwidth applications of which there are many. PER can go where XML encodings can not. It makes XML usable in applications that it otherwise cannot touch.
  • 17. The future: Why ASN.1? (cont.)  ECN Apply ASN.1 to legacy protocols. Replace error-prone hand encodings and bitmaps with machine-processable cutomized encodings.  DER Used in every secure web purchase, secure email, digital signatures, etc.  Extensibility The extensibility built into ASN.1 allows version 1 systems to seamlessly interwork with version 2 systems.
  • 18. ASN.1 Consortium  Share technical information and solutions  Develop implementor’s agreement on limits to impose on ASN.1  Coordinate with the ASN.1 Project to promote the use of ASN.1  Keep interested parties abreast of upcoming applications of ASN.1 in industry  Create test suite database  http://www.asn1.org