Podcast
Questions and Answers
Which activity is NOT considered a core function of network management?
Which activity is NOT considered a core function of network management?
- Monitoring network performance.
- Troubleshooting network issues.
- Developing new network hardware. (correct)
- Configuring network components.
In the context of network management, what does 'fault management' primarily address?
In the context of network management, what does 'fault management' primarily address?
- Identifying, correcting, and preventing network faults. (correct)
- Maintaining and updating network device configurations.
- Controlling user access to network resources.
- Optimizing network performance to meet user demands.
Which of the following is a key element monitored by performance management systems to maintain network efficiency?
Which of the following is a key element monitored by performance management systems to maintain network efficiency?
- Frequency of hardware upgrades.
- Network capacity and throughput. (correct)
- Number of connected devices.
- Physical security of network hardware.
How does 'accounting management' control access to network resources?
How does 'accounting management' control access to network resources?
What is the primary function of 'configuration management' in a network?
What is the primary function of 'configuration management' in a network?
Which statement best describes the role of Simple Network Management Protocol (SNMP) in network management?
Which statement best describes the role of Simple Network Management Protocol (SNMP) in network management?
What are the two primary components that interact within the SNMP framework?
What are the two primary components that interact within the SNMP framework?
Which protocols are essential to the operation of management on the Internet, alongside SNMP?
Which protocols are essential to the operation of management on the Internet, alongside SNMP?
In SNMP, what is the role of the Structure of Management Information (SMI)?
In SNMP, what is the role of the Structure of Management Information (SMI)?
What is the primary function of the Management Information Base (MIB) in SNMP?
What is the primary function of the Management Information Base (MIB) in SNMP?
What is the role of SNMP in network management?
What is the role of SNMP in network management?
Which statement best describes the relationship between SMI and ASN.1?
Which statement best describes the relationship between SMI and ASN.1?
Which SNMP component is responsible for defining the number of objects for each entity to be managed?
Which SNMP component is responsible for defining the number of objects for each entity to be managed?
In the context of SNMP, if a manager wants to retrieve the current number of UDP datagrams received by an agent, which SNMP operation would be most appropriate?
In the context of SNMP, if a manager wants to retrieve the current number of UDP datagrams received by an agent, which SNMP operation would be most appropriate?
Which of the following is NOT a function of Structure of Management Information (SMI)?
Which of the following is NOT a function of Structure of Management Information (SMI)?
According to SMI, what is required for each managed object such as a router?
According to SMI, what is required for each managed object such as a router?
What standard does SMI use to encode data for network transmission, specifying a triplet format of tag, length, and value (TLV)?
What standard does SMI use to encode data for network transmission, specifying a triplet format of tag, length, and value (TLV)?
What is the purpose of the 'tag' in the Basic Encoding Rules (BER) format used by SMI?
What is the purpose of the 'tag' in the Basic Encoding Rules (BER) format used by SMI?
What is the role of the well-known port 161 in SNMP communications?
What is the role of the well-known port 161 in SNMP communications?
What security features were added in SNMPv3?
What security features were added in SNMPv3?
What does ASN.1 do in data communication?
What does ASN.1 do in data communication?
In ASN.1, what does the symbol ::=
mean?
In ASN.1, what does the symbol ::=
mean?
According to ASN.1, which of the following keywords is for defining new objects?
According to ASN.1, which of the following keywords is for defining new objects?
What is the purpose of defining new data types in ASN.1?
What is the purpose of defining new data types in ASN.1?
In ASN.1, what contraint might be specified for an Integer subtype, representing student count?
In ASN.1, what contraint might be specified for an Integer subtype, representing student count?
What casing requirements must be met when specifying variables in ASN.1?
What casing requirements must be met when specifying variables in ASN.1?
Which ASN.1 keyword is used to define a structured data type similar to 'struct' in C or C++?
Which ASN.1 keyword is used to define a structured data type similar to 'struct' in C or C++?
What happens after data has been defined and values are associated with variables in ASN.1?
What happens after data has been defined and values are associated with variables in ASN.1?
A network administrator notices that the response time for applications has significantly increased. Which area of network management should they investigate first?
A network administrator notices that the response time for applications has significantly increased. Which area of network management should they investigate first?
A company wants to track the usage of network resources by different departments for budgeting. Which area of network management is most relevant?
A company wants to track the usage of network resources by different departments for budgeting. Which area of network management is most relevant?
A network engineer needs to identify and document all hardware and software components in a newly established network. Which of the following falls under Configuration Management?
A network engineer needs to identify and document all hardware and software components in a newly established network. Which of the following falls under Configuration Management?
A manufacturer specifies a lifetime for component parts in the network. Which type of fault management is performed if the parts are replaced before reaching their end of life?
A manufacturer specifies a lifetime for component parts in the network. Which type of fault management is performed if the parts are replaced before reaching their end of life?
What is the purpose of Reactive Fault Management?
What is the purpose of Reactive Fault Management?
If you detect many users unable to connect to the network and response time is severely impacted, what would be appropriate to examine?
If you detect many users unable to connect to the network and response time is severely impacted, what would be appropriate to examine?
SNMP uses which transport layer protocol?
SNMP uses which transport layer protocol?
In ASN.1, which of the following data types defines the size of the value?
In ASN.1, which of the following data types defines the size of the value?
Which of the following shows the ASN.1 encoding format for the IPAddress 131.21.14.8?
Which of the following shows the ASN.1 encoding format for the IPAddress 131.21.14.8?
A GetRequest PDU is sent, what tag (Hex) would be associated with the SNMP message PDU Type?
A GetRequest PDU is sent, what tag (Hex) would be associated with the SNMP message PDU Type?
Which of the following is a type of error associated with Table 12.4 PDU type?
Which of the following is a type of error associated with Table 12.4 PDU type?
How does a network management system ensure the predefined quality of service for users?
How does a network management system ensure the predefined quality of service for users?
Why is documentation crucial in configuration management?
Why is documentation crucial in configuration management?
In a large network with frequent changes, what is the main goal of a Configuration Management system?
In a large network with frequent changes, what is the main goal of a Configuration Management system?
What is the primary focus of reactive fault management?
What is the primary focus of reactive fault management?
A network administrator notices a recurring network fault at a specific location. How would proactive fault management address this issue?
A network administrator notices a recurring network fault at a specific location. How would proactive fault management address this issue?
Why is it important for a performance management system to monitor network capacity?
Why is it important for a performance management system to monitor network capacity?
How does monitoring internal and external traffic contribute to effective performance management?
How does monitoring internal and external traffic contribute to effective performance management?
What does throughput monitoring help a network administrator achieve?
What does throughput monitoring help a network administrator achieve?
What is indicated by a significant increase in response time in a network?
What is indicated by a significant increase in response time in a network?
What are the two key functions of security management?
What are the two key functions of security management?
What is the main purpose of accounting management?
What is the main purpose of accounting management?
In the context of network management, how does SNMP operate within the TCP/IP protocol suite?
In the context of network management, how does SNMP operate within the TCP/IP protocol suite?
What is the role of an agent in the SNMP framework?
What is the role of an agent in the SNMP framework?
Besides SNMP, which protocols are essential for management on the Internet?
Besides SNMP, which protocols are essential for management on the Internet?
What is the role of SNMP in network device management?
What is the role of SNMP in network device management?
In SNMP, what is SMI primarily responsible for?
In SNMP, what is SMI primarily responsible for?
In the context of SNMP, what does the MIB do?
In the context of SNMP, what does the MIB do?
How do SMI and a programming language's syntax relate in the context of network management?
How do SMI and a programming language's syntax relate in the context of network management?
Considering a scenario where a manager wants to update the maximum transmission unit (MTU) size on a router, which SNMP operation is most suited?
Considering a scenario where a manager wants to update the maximum transmission unit (MTU) size on a router, which SNMP operation is most suited?
Which aspect of a managed object, such as a router, is NOT handled by the Structure of Management Information (SMI)?
Which aspect of a managed object, such as a router, is NOT handled by the Structure of Management Information (SMI)?
What best describes how SMI enables global naming of managed objects?
What best describes how SMI enables global naming of managed objects?
How is the type of data for managed objects defined within SMI?
How is the type of data for managed objects defined within SMI?
According to Basic Encoding Rules (BER), what does the 'length' component specify in the TLV format?
According to Basic Encoding Rules (BER), what does the 'length' component specify in the TLV format?
In BER encoding, what is the purpose of the 'tag' field?
In BER encoding, what is the purpose of the 'tag' field?
What is the default port used by the SNMP agent to listen for requests from the manager?
What is the default port used by the SNMP agent to listen for requests from the manager?
How does SNMPv3 enhance security compared to its predecessors?
How does SNMPv3 enhance security compared to its predecessors?
What role does ASN.1 play in data communication?
What role does ASN.1 play in data communication?
In ASN.1, what is the purpose of the double colon followed by an equals sign (::=
)?
In ASN.1, what is the purpose of the double colon followed by an equals sign (::=
)?
Which ASN.1 keyword is used to create new or derived data types?
Which ASN.1 keyword is used to create new or derived data types?
What is the main advantage of defining new data types in ASN.1?
What is the main advantage of defining new data types in ASN.1?
If you want to specify that an integer subtype can only be between 10 and 20, how would you define this range in ASN.1?
If you want to specify that an integer subtype can only be between 10 and 20, how would you define this range in ASN.1?
How should variables be specified in ASN.1 to differentiate them from types?
How should variables be specified in ASN.1 to differentiate them from types?
Which ASN.1 keyword is used to define a structured data type, similar to a struct
in C?
Which ASN.1 keyword is used to define a structured data type, similar to a struct
in C?
In ASN.1, what happens after data has been defined and values are associated with variables?
In ASN.1, what happens after data has been defined and values are associated with variables?
A network engineer is tasked with ensuring only authorized devices are accessing a highly secure part of the network. Which area of network management is most pertinent?
A network engineer is tasked with ensuring only authorized devices are accessing a highly secure part of the network. Which area of network management is most pertinent?
What is the primary purpose of proactive fault management?
What is the primary purpose of proactive fault management?
In the process of accessing MIB variables, what group is often used as an example to demonstrate access to simple variables and tables?
In the process of accessing MIB variables, what group is often used as an example to demonstrate access to simple variables and tables?
A network operator is using SNMP to monitor network devices. What is the name given to the software used by the operator to initiate requests?
A network operator is using SNMP to monitor network devices. What is the name given to the software used by the operator to initiate requests?
During network troubleshooting, a network administrator identifies a noSuchName
error. According to Table 12.4, what does this error indicate?
During network troubleshooting, a network administrator identifies a noSuchName
error. According to Table 12.4, what does this error indicate?
A technician sends a GetRequest PDU to identify the system description of an SNMP agent. According to Figure 12.18, where is such detail stored for the agent to respond to?
A technician sends a GetRequest PDU to identify the system description of an SNMP agent. According to Figure 12.18, where is such detail stored for the agent to respond to?
In the context of network management, which of the following actions is most aligned with ensuring the 'smooth, efficient operation of the network'?
In the context of network management, which of the following actions is most aligned with ensuring the 'smooth, efficient operation of the network'?
Which of the following scenarios represents the application of 'reconfiguration' within configuration management?
Which of the following scenarios represents the application of 'reconfiguration' within configuration management?
What is the fundamental difference between reactive and proactive fault management?
What is the fundamental difference between reactive and proactive fault management?
Why is it essential to consider both internal and external traffic when conducting performance management?
Why is it essential to consider both internal and external traffic when conducting performance management?
Which of the following scenarios explains how 'throughput' monitoring contributes to network management?
Which of the following scenarios explains how 'throughput' monitoring contributes to network management?
What is the relationship between 'encryption' and 'authentication' within the context of security management?
What is the relationship between 'encryption' and 'authentication' within the context of security management?
How does accounting management aid in the effective allocation of network resources within an organization?
How does accounting management aid in the effective allocation of network resources within an organization?
In the context of SNMP, how would a network administrator use the protocol to monitor the status of a specific network device?
In the context of SNMP, how would a network administrator use the protocol to monitor the status of a specific network device?
If a network administrator wants to retrieve multiple, related pieces of information about a network device with a single request, which SNMP PDU would be the most efficient choice?
If a network administrator wants to retrieve multiple, related pieces of information about a network device with a single request, which SNMP PDU would be the most efficient choice?
How can SNMP facilitate proactive network management, beyond simply reacting to network issues?
How can SNMP facilitate proactive network management, beyond simply reacting to network issues?
Which of the following is a crucial requirement for naming managed objects in SNMP, according to SMI?
Which of the following is a crucial requirement for naming managed objects in SNMP, according to SMI?
How do SMI's data type definitions contribute to the interoperability of network management systems?
How do SMI's data type definitions contribute to the interoperability of network management systems?
Why is the 'tag' field important in the Basic Encoding Rules (BER) used by SMI?
Why is the 'tag' field important in the Basic Encoding Rules (BER) used by SMI?
In ASN.1, which of the following describes the role of keywords such as INTEGER, SEQUENCE, and ENUMERATED?
In ASN.1, which of the following describes the role of keywords such as INTEGER, SEQUENCE, and ENUMERATED?
How does using ASN.1 to define data types and structures impact network management?
How does using ASN.1 to define data types and structures impact network management?
When defining a new data type in ASN.1 using the Backus-Naur Form (BNF) syntax, what is a key requirement?
When defining a new data type in ASN.1 using the Backus-Naur Form (BNF) syntax, what is a key requirement?
What is the primary purpose of defining subtypes in ASN.1, as opposed to defining entirely new data types?
What is the primary purpose of defining subtypes in ASN.1, as opposed to defining entirely new data types?
How is a 'variable' distinguished from a 'type' when specifying values in ASN.1?
How is a 'variable' distinguished from a 'type' when specifying values in ASN.1?
What is the correct order of operations when encoding data with ASN.1?
What is the correct order of operations when encoding data with ASN.1?
In ASN.1, what role does the keyword SEQUENCE
play in defining data structures, and why is it used?
In ASN.1, what role does the keyword SEQUENCE
play in defining data structures, and why is it used?
Flashcards
Network Management
Network Management
Monitoring, testing, configuring, and troubleshooting network components to meet requirements defined by an organization.
Configuration Management
Configuration Management
Managing changes such as hardware upgrades, software updates, and user account modifications.
Reconfiguration Types
Reconfiguration Types
Hardware, software, and user account adjustments fall under this.
Documentation (Network)
Documentation (Network)
Signup and view all the flashcards
Fault Management
Fault Management
Signup and view all the flashcards
Reactive Fault Management
Reactive Fault Management
Signup and view all the flashcards
Proactive Fault Management
Proactive Fault Management
Signup and view all the flashcards
Performance Management
Performance Management
Signup and view all the flashcards
Network Capacity
Network Capacity
Signup and view all the flashcards
Network Traffic
Network Traffic
Signup and view all the flashcards
Throughput
Throughput
Signup and view all the flashcards
Response Time
Response Time
Signup and view all the flashcards
Security Management
Security Management
Signup and view all the flashcards
Accounting Management
Accounting Management
Signup and view all the flashcards
SNMP
SNMP
Signup and view all the flashcards
Manager (SNMP)
Manager (SNMP)
Signup and view all the flashcards
Agent (SNMP)
Agent (SNMP)
Signup and view all the flashcards
SMI and MIB
SMI and MIB
Signup and view all the flashcards
Role of SNMP
Role of SNMP
Signup and view all the flashcards
Role of SMI
Role of SMI
Signup and view all the flashcards
Role of MIB
Role of MIB
Signup and view all the flashcards
SMI Attributes
SMI Attributes
Signup and view all the flashcards
Object Identifier
Object Identifier
Signup and view all the flashcards
Data Type
Data Type
Signup and view all the flashcards
Encoding Method (SMI)
Encoding Method (SMI)
Signup and view all the flashcards
MIB
MIB
Signup and view all the flashcards
Accessing MIB variables
Accessing MIB variables
Signup and view all the flashcards
SNMP
SNMP
Signup and view all the flashcards
SNMP PDUs (v3)
SNMP PDUs (v3)
Signup and view all the flashcards
SNMP ports
SNMP ports
Signup and view all the flashcards
SNMPv3
SNMPv3
Signup and view all the flashcards
ASN.1
ASN.1
Signup and view all the flashcards
ASN.1 language basics
ASN.1 language basics
Signup and view all the flashcards
BEGIN (ASN.1 keyword)
BEGIN (ASN.1 keyword)
Signup and view all the flashcards
CHOICE (ASN.1 keyword)
CHOICE (ASN.1 keyword)
Signup and view all the flashcards
DEFINITIONS (ASN.1 keyword)
DEFINITIONS (ASN.1 keyword)
Signup and view all the flashcards
END (ASN.1 keyword)
END (ASN.1 keyword)
Signup and view all the flashcards
EXPORTS (ASN.1 keyword)
EXPORTS (ASN.1 keyword)
Signup and view all the flashcards
IDENTIFIER (ASN.1 keyword)
IDENTIFIER (ASN.1 keyword)
Signup and view all the flashcards
IMPORTS (ASN.1 keyword)
IMPORTS (ASN.1 keyword)
Signup and view all the flashcards
INTEGER (ASN.1 keyword)
INTEGER (ASN.1 keyword)
Signup and view all the flashcards
NULL (ASN.1 keyword)
NULL (ASN.1 keyword)
Signup and view all the flashcards
OBJECT (ASN.1 keyword)
OBJECT (ASN.1 keyword)
Signup and view all the flashcards
ОСТЕТ (ASN.1 keyword)
ОСТЕТ (ASN.1 keyword)
Signup and view all the flashcards
OF (ASN.1 keyword)
OF (ASN.1 keyword)
Signup and view all the flashcards
SEQUENCE (ASN.1 keyword)
SEQUENCE (ASN.1 keyword)
Signup and view all the flashcards
SEQUENCE OF (ASN.1 keyword)
SEQUENCE OF (ASN.1 keyword)
Signup and view all the flashcards
SET (ASN.1 keyword)
SET (ASN.1 keyword)
Signup and view all the flashcards
SET OF (ASN.1 keyword)
SET OF (ASN.1 keyword)
Signup and view all the flashcards
STRING (ASN.1 keyword)
STRING (ASN.1 keyword)
Signup and view all the flashcards
ASN.1 Simple Data Types
ASN.1 Simple Data Types
Signup and view all the flashcards
ASN.1 BOOLEAN Type
ASN.1 BOOLEAN Type
Signup and view all the flashcards
ASN.1 INTEGER Type
ASN.1 INTEGER Type
Signup and view all the flashcards
ASN.1 New Data Types
ASN.1 New Data Types
Signup and view all the flashcards
ASN.1 Subtype Example
ASN.1 Subtype Example
Signup and view all the flashcards
Example of a Structure Variable
Example of a Structure Variable
Signup and view all the flashcards
Study Notes
Network Management
- Network management involves monitoring, testing, configuring, and troubleshooting network components
- It meets requirements set by an organization and ensures smooth, efficient network operation
- Network management systems use hardware, software, and human resources
Areas of Network Management
- Configuration management: Tracks and manages the status of network entities and their relationships
- Fault management: Addresses network faults with reactive and proactive strategies
- Performance management: Monitors network capacity, traffic, throughput, and response time
- Security management: Controls network access based on predefined policies using encryption and authentication
- Accounting management: Controls user access to network resources through charges or debits for budgeting, not necessarily cash transfers
Configuration Management
- Large networks comprise multiple interconnected entities with evolving configurations
- A configuration management system must track the status of each entity and its relation to others
- Two subsystems of configuration management are reconfiguration and documentation
Reconfiguration Types
- Hardware reconfiguration
- Software reconfiguration
- User-account reconfiguration
Documentation
- The original network setup and subsequent changes need meticulous recording, covering hardware, software, and user accounts
Fault Management
- Fault Management is vital in complex networks to ensure component operate correctly in relation to each other
- Effective fault management systems uses reactive and proactive subsystems
Reactive Fault Management
- Reactive fault management detects, isolates, corrects, and records faults, providing short-term solutions
Proactive Fault Management
- Proactive fault management aims to prevent faults, by predicting failures and prevent reoccurence
Performance Management
- Performance Management monitors the capacity of the network so it's not used above a certain capacity.
Capacity
- Network capacity that must be monitored
- There will be data rate issues if threshold is exceeded
Traffic
- Traffic can be measured internally (packets inside the network) or externally (packets exchanging with outside of the network)
- Blocking may occur if traffic is excessive
Throughput
- Measure throughput of a router or part of the network and ensure it does not fall to unacceptable levels
Response Time
- The time a service is requested until the service is granted
- Capacity and traffic will affect response time, which must be monitored
- An increase of response time indicates that the network is working above capacity
Security Management
- Security management controls access to a network based on predefined policy.
- Tools such as encryption, to allow privacy, and authentication are used
Accounting Management
- Accounting management controls user access through charges, or debits for network resources for budgeting
SNMP
- Simple Network Management Protocol (SNMP) is a network management standard
- It's used by the Internet and allows it to manage devices using TCP/IP protocol suite
Managers and Agents
- A manager is a host running the SNMP client program
- An agent is a router or host running the SNMP server program
- Management is achieved through simple interaction
Management Components
- Structure of Management Information (SMI)
- Management Information Base (MIB)
Role of SNMP
- Defines the packet format between manager and agent
- Interprets results and creates statistics, exchanging object names, their values and their status
- Responsible for reading and changing
Role of SMI
- Establishes naming rules for objects, ensuring hierarchical structure
- Defines object types and encoding rules
Role of MIB
- For each entity to be managed, it defines protocol, object number, naming rules defined by SMI and a type for each named object
- Creates a set of objects resembling a database with metadata
Overview of SNMP in Action
- An overview of components involved in a simple scenario
- A manager station wants to message the agent station, an SNMP client wants to send a message to an SNMP server
- The SNMP client wants to find out the number of UDP user datagrams received by the agent
SMI
- The Structure of Management Information version 2 (SMIv2) is a component for network management, and a guideline for SNMP
- It emphasizes object name, data type and encoding method
- This handles objects, defines data type, and shows how encode data
Name Attribute
- Managed objects requires unique names
- SMI uses object identifiers, a hierarchical identifier based on the tree structure, to name objects globally
Type Attribute
- The data type is the second Attribute of an object
- SMI uses Abstract Syntax Notation One (ASN.1) to define the data type and new definitions
- SMI is a subset and a superset of ASN.1.
- Two broad categories of data type: simple and structured
Encoding Method
- SMI uses Basic Encoding Rules (BER) to encode data to be transmitted over the network
- BER specifies each piece of data is encoded in triplet format: tag, length, and value (TLV)
MIB
- The Management Information Base version 2 (MIB2) is the second component used in network management
- Each agent has its own MIB2, which is the collection of all the objects that the manager can manage
Accessing MIB Variables
- The udp group is an example to show accessing different variables.
- This group includes four simple variables and one sequence of table of records
SNMP Use
- SNMP uses SMI and MIB in Internet network management as an application program that allows:
- A manager to retrieve the value of an object in an agent
- An agent to send an alarm message
PDUs
- SNMPv3 defines eight types of Protocol Data Units (PDUs): GetRequest, GetNextRequest, GetBulkRequest, SetRequest, Response, Trap, InformRequest, and Report
SNMP UDP Ports
- SNMP uses UDP ports 161 and 162.
- Port 161 is used by the server (agent)
- Port 162 is used by the client (manager)
Security
- SNMPv3 has added security and remote administration features.
- It allows message authentication, confidentiality, and integrity
ASN.1
- Abstract Syntax Notation One(ASN.1) defines the format of data when sending continuous bits
- Separates the definition of data types from bits transmitted through the network
ASN.1 Language Basics
- It defines objects and associated values
- It uses: symbols, keywords, and primitive data types
ASN.1 Symbols
- Defined As or assignment ::=
- Or, alternative, or option |
- Negative sign -
- The following is a comment --
- Range ..
- Start and End of a list {}
- Start and End of a Tag []
- Start and end of a Subtype ()
ASN.1 Keywords
- BEGIN = Start of a module
- CHOICE = List of alternatives
- DEFINITIONS = Definition of a data type or an object
- END = End of a module
- EXPORTS = Data type that can be exported to other modules
- IDENTIFIER = A sequence of non-negative numbers that identifies an object
- IMPORTS = Data type defined in an external module and imported
- INTEGER = Any positive, zero, or negative integer
- NULL = A null value
- OBJECT = Used with IDENTIFIER to uniquely define an object
- OCTET = Eight-bit binary data
- OF = Used with SEQUENCE or SET
- SEQUENCE = An ordered list
- SEQUENCE OF = An ordered array of data of the same type
- SET = An unordered list
- SET OF = An array of unordered lists
- STRING = A string of data
ASN.1 Data Types
- The ASN.1 defines simple data types
- Computer languages such as C, C++, or Java exist in ASN1
- Simple data types can be combined to make new simple data types, structured data types
ASN.1 Simple Data Types
- Boolean = TRUE or FALSE
- INTEGER = Integers
- BIT STRING = A string of binary digits (bits) or a null set
- OCTET STRING = A String of octets or a null set
- NULL = Null
- OBJECT IDENTIFIER = A set of values that defines an object
- ObjectDescriptor = Human readable text describing an object
- EXTERNAL = A type that is not in the standard
- REAL = Real numbers in scientific notation
- ENUMERATED = A list of integers
- SEQUENCE, SEQUENCE OF = Ordered list of types
- SET, SET OF = Unordered list of types
- NumericString = Digits 0–9 and space
- PrintableString = Printable characters
- VisibleString = ISO646String
- GeneralString = General character string
- CHARACTER STRING = Character set
ASN.1 New Data Types
- For defining data types from a builtin or previously defined data type
ASN.1 New Subtypes
- New Subtypes use the same method as new data types for defining
ASN.1 Simple Variables
- Can create a variable of a particular type and assign (store) a value in it
- Variables should start with a lower-case letter to distinguish it from the type
ASN.1 Structured Type
- To define a structured data type similar to struct use the keyword SEQUENCE
- It's an ordered list with userName, password, and account number
Encoding
- Encoding is used after the data has been defined and values associated with variables
- It uses the Basic Encoding Rule
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.