
- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
What is the TFTP Operation?
TFTP operation is very simple. The client sends a read or write request at the server's UDP port 69. The server accepts the request by sharing data messages in case of the read request and sending acknowledgement in the write request. In either case, the server chooses a UDP port for further dialogue and sends its first response to the client through the selected UDP port.
Each data message has a fixed size of the data block (512 octets) and is individually acknowledged. The last data block containing EOF (End of File) or a data block containing less than 512 octets terminates the session. The figure illustrates the mechanism after a diskless client has received the TFTP server's IP address and the boot-file name from the BOOTP server
If a TFTP message is lost and if there is no expected response, the message is repeated by the sender after a timeout. Thus, if an acknowledgement is lost, the data message is repeated after a timeout.
Suppose the next data message is repeated after a timeout. If the next data message is not taken after acknowledgement, the last acknowledgement is repeated after the timeout.
Use of TFTP
- TFTP is mainly used during the device bootstrap process for downloading device OS/firmware and configuration documents. It is generally used for copying bootstrap and configuration data between nodes belonging to a similar LAN.
- TFTP is used in positions where all the features of an entire file transfer protocol such as FTP are not required.
- It is used along with boot protocols such as BOOTP and DHCP to initialize devices. Whenever an IP allows the node to boot up, it gets its IP address and other device and network-related parameters through BOOTP or DHCP. As part of these parameters, the users also receive the TFTP server address, bootstrap file and configuration file elements (file name and directory location). The client then uses the TFTP protocol to download the TFTP server's bootstrap image and configuration files.
- Related Articles
- What is TFTP?
- Difference between FTP and TFTP
- MongoDB profiler output: What is the “command” operation?
- What is the Time Reversal Operation on Signals?
- What is the Time Shifting Operation on Signals?
- What is operation of in Python?
- What is the basic operation of pandas Series.factorize() function?
- What is the basic operation of the series.eq() method in pandas?
- What is the basic operation of the series.equals() method in pandas?
- What is join operation in relational algebra (DBMS)?
- What is the difference between deleteOne() and findOneAndDelete() operation in MongoDB?
- What is update operation on the cursor having JOIN between 2 tables?
- What is Regulated Power Supply? – Circuit Diagram, Operation, and Applications
- What are the modes of operation in a helical antenna?
- Fire trigger after the DELETE operation is executed in MySQL
