Data types in distributed enrollment protocol, Computer Networking

Assignment Help:

Data Types

Each data type of Table 1 must be sent according to the specifications below.

[INT]

Each value of this type is sent as the string representation of the corresponding int value, in decimal notation, on a single line by itself.

[INTEGER]

Each value of this type is sent exactly as an [INT] for the value of any non-null Integer. Any null Integer is represented by the string null instead of a decimal value.

[STR]

Each value of this type is sent as its String value, on a single line by itself, with the following special cases:

Each empty String, and each null String, requires two lines to be sent. In either case, the first line is an empty string, followed by an unsolicited second line in the form of an [INTEGER]. A null [INTEGER] indicates the [STR] should be interpreted as a null String; a zero value [INTEGER] indicates the [STR] should be interpreted as an empty String.

[BLN]

Each value of this type is sent as either True to denote true, or False to denote false. These values must be sent in the exact mixed-case noted.

[CEE] and [SEE]

These exception types indicate an exception has been thrown by the BasicEnrollmentManager. These are is sent by the server as a string beginning with E:CRS (in the case of [CEE]) or E:STD (in the case of

[SEE]). Either value may be followed (on the same line) by a more descriptive message for troubleshooting.

[SET-STR] and [SET-INTEGER]

Each of these return types is sent as a series of multiple lines. The first line is always an [INT] value, as described above, which specifies the number of elements that comprise the set that will follow. This value must not be less than zero; negative values are unexpected. For each specified element, exactly one [STR] value (in the case of [SET-STR]) or one [INTEGER] value (in the case of [SET-INTEGER]) is sent.


Related Discussions:- Data types in distributed enrollment protocol

Define internet network address, Q. Define internet network address? ...

Q. Define internet network address? The internet network address is additional commonly called the -IP address.? It consists of 32 bits a few of which are allocated to a hi

State token ring implementation, Token Ring Implementation Sequence...

Token Ring Implementation Sequence of 150-ohm shielded twisted-pairs sections Output port on every station connected to input port on the next Frame is passed to

Advantages and disadvantage of computer networking , Advantages and Disadva...

Advantages and Disadvantage of Computer Networking Most of the benefits  of networking  can be  divided into  two  generic categories Connectivity and  sharing. Networks

Calculate the peak-to-peak voltage of the signal, A multimeter is used to m...

A multimeter is used to measure a sinusoidal signal and reads 2V RMS; what is the peak-to-peak voltage of the signal? A mark will be deducted if you do not quote your answer to 2 s

What is mesh topology, What is mesh topology Mesh topology is a setup w...

What is mesh topology Mesh topology is a setup wherein every device is linked directly to each other device on the network. Consequently, it needs that each device has at least

Protocol layers and their service models - computer network, Protocol Laye...

Protocol Layers and their Service Models The  internet is an extremely complicated system. It  consists of many  pieces like  numerous  applications and protocols  various  t

Facts about fiber optic cables - Computer Network, Facts about  Fiber Opti...

Facts about  Fiber Optic Cables 1. Outer insulating jacket is made  of Teflon or PVC. 2. Kevler fiber  helps  to strengthen  the cable and prevent breakage. 3. A plas

Topology, what is difference between Star and Mesh topology?

what is difference between Star and Mesh topology?

Give example of the physical layer, FDDI, Token Ring and Ethernet are all p...

FDDI, Token Ring and Ethernet are all physical layer framing standards.

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd