tailieunhanh - Lecture TCP-IP protocol suite - Chapter 21: Trivial File Transfer Protocol (TFTP)

Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer. In this chapter, we discuss two protocols involved in transferring files: File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP). | Chapter 21 Trivial File Transfer Protocol (TFTP) CONTENTS MESSAGES CONNECTION DATA TRANSFER UDP PORTS TFTP EXAMPLE TFTP OPTIONS SECURITY APPLICATIONS TFTP uses the services of UDP on the well-known port 69. MESSAGES Figure 21-1 Message categories Figure 21-2 RRQ Read request Mode: netascii or octet Figure 21-3 WRQ Write request Figure 21-4 DATA format Figure 21-5 ACK format Figure 21-6 ERROR format CONNECTION Figure 21-7 Connection establishment DATA TRANSFER Figure 21-8 Sorcerer’s apprentice bug UDP PORTS Figure 21-9 UDP port numbers used by TFTP TFTP EXAMPLE Figure 21-10 TFTP example TFTP OPTIONS SECURITY Figure 21-11 TELNET with FTP for security APPLICATIONS Figure 21-12 Use of TFTP with BOOTP | Chapter 21 Trivial File Transfer Protocol (TFTP) CONTENTS MESSAGES CONNECTION DATA TRANSFER UDP PORTS TFTP EXAMPLE TFTP OPTIONS SECURITY APPLICATIONS TFTP uses the services of UDP on the well-known port 69. MESSAGES Figure 21-1 Message categories Figure 21-2 RRQ Read request Mode: netascii or octet Figure 21-3 WRQ Write request Figure 21-4 DATA format Figure 21-5 ACK format Figure 21-6 ERROR format CONNECTION Figure 21-7 Connection establishment DATA TRANSFER Figure 21-8 Sorcerer’s apprentice bug UDP PORTS Figure 21-9 UDP port numbers used by TFTP TFTP EXAMPLE Figure 21-10 TFTP example TFTP OPTIONS SECURITY Figure 21-11 TELNET with FTP for security APPLICATIONS Figure 21-12 Use of TFTP with BOOTP | Chapter 21 Trivial File Transfer Protocol (TFTP) CONTENTS MESSAGES CONNECTION DATA TRANSFER UDP PORTS TFTP EXAMPLE TFTP OPTIONS SECURITY APPLICATIONS TFTP uses the services of UDP on the well-known port 69. MESSAGES Figure 21-1 Message categories Figure 21-2 RRQ Read request Mode: netascii or octet Figure 21-3 WRQ Write request Figure 21-4 DATA format Figure 21-5 ACK format Figure 21-6 ERROR format CONNECTION Figure 21-7 Connection establishment DATA TRANSFER Figure 21-8 Sorcerer’s apprentice bug UDP PORTS Figure 21-9 UDP port numbers used by TFTP TFTP EXAMPLE Figure 21-10 TFTP example TFTP OPTIONS SECURITY Figure 21-11 TELNET with FTP for security APPLICATIONS Figure 21-12 Use of TFTP with . | Chapter 21 Trivial File Transfer Protocol (TFTP) CONTENTS MESSAGES CONNECTION DATA TRANSFER UDP PORTS TFTP EXAMPLE TFTP OPTIONS SECURITY APPLICATIONS TFTP uses the services of UDP on the well-known port 69. MESSAGES Figure 21-1 Message categories Figure 21-2 RRQ Read request Mode: netascii or octet Figure 21-3 WRQ Write request Figure 21-4 DATA format Figure 21-5 ACK format Figure 21-6 ERROR format CONNECTION Figure 21-7 Connection establishment DATA TRANSFER Figure 21-8 Sorcerer’s apprentice bug UDP PORTS Figure 21-9 UDP port numbers used by TFTP TFTP EXAMPLE Figure 21-10 TFTP example TFTP OPTIONS SECURITY Figure 21-11 TELNET with FTP for security APPLICATIONS Figure 21-12 Use of TFTP with BOOTP

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.