Page 211 - DCAP207_NETWORKS_DCAP406_COMPUTER_NETWORKS
P. 211

Computer Networks/Networks




                    Notes          includes Abstract Syntax Notation 1 (ASN.1) is recommended by OSI. This method takes care of
                                   formatting, diverse nature of data such as text, programs, etc. and the diversity in data storage
                                   format.

                                   Abstract Syntax Notation

                                   Abstract Syntax Notation (ASN.1) is an OSI standard dealing with the issue of representing,
                                   encoding, transmitting, and decoding data structures. It has two parts as given below:
                                   1.  An abstract syntax describing the data structures in an unambiguous manner. The syntax
                                       enables users to use integers, character strings, and structures instead of bits and bytes.
                                   2.  A transfer syntax describing the bit stream encoding of ASN.1 data objects. Data and
                                       additional fields are sent to describe the type of data. At the destination machine, the
                                       reverse operation is applied to convert from ASN.1 format to the internal representation
                                       of the destination machine.
                                   There are alternative approaches to the data representation but they have disadvantages. In one
                                   approach, the source machine converts data into the format expected by the destination machine
                                   so that the destination machine does not need to perform any decoding. The disadvantage to this
                                   approach is that every source machine needs to know how to encode data for every possible
                                   destination machine. In another approach, ASN.1 converts everything into a common form
                                   similarly to the network standard representation of TCP/IP. However, the disadvantage of this
                                   method is that communication between two identical machines results in needless conversions.
                                   ASN.1’s abstract syntax is much like in form to that of any high level programming language.
                                   ASN.1 comprises of primitive types and complex types building on primitive types.
                                   Encryption/Decryption: It deals with security and privacy issues. Encryption is used to scramble
                                   the data so that only authorized persons can unscramble the data of a conversation. Decryption
                                   reverses the encryption process to translate the message back into its original form. To encrypt
                                   the data, the sender in the source machine uses an encryption algorithm and a key to transform
                                   the plaintext (original message) into a ciphertext (encrypted message). At the destination machine,
                                   the reverse process takes place. The receiver has a key and decryption algorithm to translate
                                   back the ciphertext into the original plaintext.
                                   Encryption and decryption methods are of two types. They are conventional and public key
                                   methods. In the conventional method, the encryption and decryption keys are the same and
                                   secret. The disadvantage of the conventional method is that the decryption algorithm is always
                                   the inverse of the encryption algorithm and therefore whoever knows the encryption algorithm
                                   will be able to deduce the decryption algorithm and thus the secrecy and privacy of message is
                                   threatened.
                                   In the public key encryption approach, every user has the same key and algorithm for encryption
                                   of the message. However, the decryption algorithm and key are kept secret. Thus, the message
                                   could be encrypted by anyone; however, it could be decrypted by an authorized person. The
                                   decryption algorithm is designed in such a way that it could not be deduced from the inverse of
                                   the encryption algorithm. Also, different encryption and decryption keys make it difficult to
                                   decrypt the message by an unauthorized person.

                                   Authentication: It verifies the antecedents of the remote party being the real party rather than
                                   an impostor. It means that the message is received from an authentic person not from an impostor.
                                   Digital signature is one of the several authentication approaches that use public key encryption
                                   method.
                                   Data Compression: It compresses data to reduce the amount of transmitted data thus saving in
                                   bandwidth and money. There are three general methods to data compression. Each method



          204                               LOVELY PROFESSIONAL UNIVERSITY
   206   207   208   209   210   211   212   213   214   215   216