Experiments with a Simple File Transfer Protocol for Radio Links using Enhanced Trivial File Transfer Protocol (ETFTP)

نویسندگان

  • William J. Polites
  • William Wollman
  • David Woo
  • Russ Langan
چکیده

This document is a description of the Enhanced Trivial File Transfer Protocol (ETFTP). This protocol is an experimental implementation of the NETwork BLock Transfer Protocol (NETBLT), RFC 998 [1], as a file transfer application program. It uses the User Datagram Protocol (UDP), RFC 768 [2], as its transport layer. The two protocols are layered to create the ETFTP client server application. The ETFTP program is named after Trivial File Transfer Protocol (TFTP), RFC 1350 [3], because the source code from TFTP is used as the building blocks for the ETFTP program. This implementation also builds on but differs from the work done by the National Imagery Transmission Format Standard [4].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uniform Resource Identifier (URI) Scheme and Applicability Statement for the Trivial File Transfer Protocol (TFTP)

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The Trivial File Transfer Protocol (TFTP) is a very simple TRIVIAL protocol that has been in use on the Internet for quite a long time. While this document discourages its continued use, largely due to security conc...

متن کامل

A Secure TFTP Protocol with Security Proofs

— Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this work, we present an enhanced lightweight security protocol for smart device and server com...

متن کامل

From Centralization to Distribution: A Comparison of File Sharing Protocols

File sharing service is a fundamental module for many modern collaboration and communication services. The traditional server/client repository model of file sharing has been widely used in many systems, but when it comes to fully decentralized systems, a decentralized file sharing service is also greatly needed. In this paper, we have selected three different protocols, SSH File Transfer Proto...

متن کامل

Performance Measurements for NaradaBrokering Enhanced GridFTP

In this paper, we discuss reliable and secure file transfer middleware called NaradaBrokering. It is our goal to show that reliability features can be decoupled from the implementation of the service and protocol, and instead placed into the messaging substrate. This will allow us to provide file transfer quality of service comparable to GridFTP in other file transfer tools (such as normal FTP,...

متن کامل

Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) [1] and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for “A Secure TFTP Protocol with Security Proofs” [1]. Keywords—Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • RFC

دوره 1986  شماره 

صفحات  -

تاریخ انتشار 1996