Solved

encoding OIDs using BER

Posted on 2000-02-14
6
195 Views
Last Modified: 2010-03-18
Can anybody give me an explanation on how to encode OID components using BER. I know the first two use the scheme 40x+y, but my problem is with components 3 onwards larger than 127. For example, how does 134 become 81 02 (hex).

Thanx
0
Comment
Question by:nitelord
  • 5
6 Comments
 
LVL 3

Expert Comment

by:RobWMartin
ID: 2520449
You sure the BER for 134 is not 81 06?

0
 
LVL 3

Expert Comment

by:RobWMartin
ID: 2520467
Using 134;  binary is 10000110.  You start with the least sig bit of the least sig byte and grab the last 7 bits, 0000110.  Then look at the 8 th bit; if it was zero we would stop, but since it is 1, we need another octet, 10000001.  The most sig bit says there are more octets to follow; i.e. it is the continuation bit.  When it is 0 the decoder knows it has the complete component, when 1 it knows to grab the next octet.  Thus, if the 8th bit is significant, i.e. 1, for our data then it must be moved left into another octet to make room for the continuation bit.  Final encoding:

10000001 0000110
    81      06

Hope this helps
Rob
0
 
LVL 3

Expert Comment

by:RobWMartin
ID: 2520478
There are probably links out there that explain it better; I'll look.
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 
LVL 3

Accepted Solution

by:
RobWMartin earned 300 total points
ID: 2520496
Well, that was easy.  Here is a good explanation link:

http://developer.novell.com/research/devnotes/1999/november/02/05.htm

I should've done this first.  Would have saved some calculator work:)

Rob
0
 

Author Comment

by:nitelord
ID: 2520701
when I calculated it I got 81 06 but the book I'm using (pg 589, Feit, Sidnie, SNMP a guide to network management) gave that value. I'll try a few more, thanx

0
 
LVL 3

Expert Comment

by:RobWMartin
ID: 2528989
So how's it going?

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This is a video that shows how the OnPage alerts system integrates into ConnectWise, how a trigger is set, how a page is sent via the trigger, and how the SENT, DELIVERED, READ & REPLIED receipts get entered into the internal tab of the ConnectWise …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

937 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

5 Experts available now in Live!

Get 1:1 Help Now