You are on page 1of 23

Chapter 21

Trivial File Transfer Protocol (TFTP)


McGraw-Hill The McGraw-Hill Companies, Inc., 2000

CONTENTS
MESSAGES CONNECTION DATA TRANSFER UDP PORTS TFTP EXAMPLE TFTP OPTIONS SECURITY APPLICATIONS

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

TFTP uses the services of UDP on the well-known port 69.

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.1 MESSAGES

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-1

Message categories

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-2

RRQ Read request

Mode: netascii or octet

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-3

WRQ Write request

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-4

DATA format

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-5

ACK format

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-6

ERROR format

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.2 CONNECTION

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-7

Connection establishment

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.3
DATA TRANSFER

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-8

Sorcerers apprentice bug

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.4
UDP PORTS

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-9

UDP port numbers used by TFTP

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.5
TFTP EXAMPLE

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-10

TFTP example

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.6 TFTP OPTIONS

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.7
SECURITY

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-11

TELNET with FTP for security

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

21.8
APPLICATIONS

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

Figure 21-12

Use of TFTP with BOOTP

McGraw-Hill

The McGraw-Hill Companies, Inc., 2000

You might also like