Data types in distributed enrollment protocol, Computer Networking

Assignment Help:

Data Types

Each data type of Table 1 must be sent according to the specifications below.

[INT]

Each value of this type is sent as the string representation of the corresponding int value, in decimal notation, on a single line by itself.

[INTEGER]

Each value of this type is sent exactly as an [INT] for the value of any non-null Integer. Any null Integer is represented by the string null instead of a decimal value.

[STR]

Each value of this type is sent as its String value, on a single line by itself, with the following special cases:

Each empty String, and each null String, requires two lines to be sent. In either case, the first line is an empty string, followed by an unsolicited second line in the form of an [INTEGER]. A null [INTEGER] indicates the [STR] should be interpreted as a null String; a zero value [INTEGER] indicates the [STR] should be interpreted as an empty String.

[BLN]

Each value of this type is sent as either True to denote true, or False to denote false. These values must be sent in the exact mixed-case noted.

[CEE] and [SEE]

These exception types indicate an exception has been thrown by the BasicEnrollmentManager. These are is sent by the server as a string beginning with E:CRS (in the case of [CEE]) or E:STD (in the case of

[SEE]). Either value may be followed (on the same line) by a more descriptive message for troubleshooting.

[SET-STR] and [SET-INTEGER]

Each of these return types is sent as a series of multiple lines. The first line is always an [INT] value, as described above, which specifies the number of elements that comprise the set that will follow. This value must not be less than zero; negative values are unexpected. For each specified element, exactly one [STR] value (in the case of [SET-STR]) or one [INTEGER] value (in the case of [SET-INTEGER]) is sent.


Related Discussions:- Data types in distributed enrollment protocol

Introduction of dns - domain name server, Introduction of DNS While di...

Introduction of DNS While discussing about the Internet, one things comes automatically in the n=mind and hence it is directly or indirectly depended on DNS. The DNS which sta

Systolic array, Systolic Array This interconnection network is a kind o...

Systolic Array This interconnection network is a kind of pipelined array architecture and it is designed for multidimensional flow of data. It is used for executing fixed algor

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Explain the technique- backpressure, Explain the technique- Backpressure ...

Explain the technique- Backpressure This technique produces an effect same to backpressure in fluids flowing down a pipe. It includes link-by-link use of flow control in a dire

Tech ed, can you help me convert binary into decimals?

can you help me convert binary into decimals?

Determine power dissipated in resistor, Question: With Vout not connect...

Question: With Vout not connected to any additional circuitry, what power is dissipated in the 7 kW resistor?

Explain the building blocks of client and server, Explain the building bloc...

Explain the building blocks of Client/Server? The client side building block runs the client side of the application. The server side building block runs the server side of

Illustrate keep alive and time-waited timer, Q. Illustrate Keep alive and T...

Q. Illustrate Keep alive and Time-Waited Timer? Keep alive timer To prevent a long inactive connection between two TCPs - Either client or server crash

Explain categorization according to pipeline configuration, Categorization ...

Categorization according to pipeline configuration According to the configuration of a pipeline, the below categories are recognized under this classification: Unifunct

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd