Requests types in distributed enrollment protocol , Computer Networking

Assignment Help:

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly.

The server must simply send a positive command response to satisfy this command. The server then expects to receive the next request from the client. The EXIT command is used by the client to request termination of the connection. The server must send a positive command response, then immediately close its end of the connection. The BasicEnrollmentManager instance created for the current client session will be discarded.

Method Commands

Upon receiving a recognized method command, the server must send a positive command response.

Parameters (if any) are sent by the client in the sequence specified in Table 1. The client sends one parameter at a time, waiting each time for the server to send a positive parameter response before continuing. If, for any parameter, the server returns a negative parameter response, the client must not send any further parameters for this command. The server in this case will immediately abandon processing of the current command and expect the client to send another command from the beginning.

Once the server has received all parameters, it must then invoke the requested method of the BasicEnrollmentManager instance for this client. See the Responses section below for more details about the expected response.

Unrecognized Commands

If the server receives any unrecognized request, meaning any command other than those listed in Table 1, it must send a negative command response. The server then expects the client to send another command request. No further action is taken by the server until it receives another command request.


Related Discussions:- Requests types in distributed enrollment protocol

Networking services, Your Windows client failed to broadcast to all servers...

Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process? a. Discovery b. Offering c. Reques

What is a hypertext link, A hypertext link is a special tag that links sing...

A hypertext link is a special tag that links single page to another page or resource. If you click the link, the browser goes to the link's destination.

Networking project for 20 computers, can i get a sample networking project ...

can i get a sample networking project for 20 computer with all network components?

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Difference between authentication and deauthentication, Difference between ...

Difference between Authentication and Deauthentication Authentication: Used to establish the self of stations to each other. Deauthentication: This service is appealed whene

What are the tools sued for cryptography and web security, Q. What are the ...

Q. What are the Tools sued for Cryptography and Web Security? Tools - Cryptography VPN - remote access PGP - email Dedicated Circuits -tunnels' - IPSec

Discuss the architecture and applications of e-mail, Question 1 Discuss th...

Question 1 Discuss the following Switching Mechanisms- Circuit switching Message switching Packet switching   Question 2 Discuss the following IEEE standard

Explain parallel computer architecture, Parallel Computer Architecture ...

Parallel Computer Architecture The two key parametric concerns in designing parallel computer architecture are: 1) executing many numbers of instructions concurrently, and

Long term evolution and network requirements-ethernet , You are a network c...

You are a network consultant working for a large European networVservice provider and have been given the task of reviewing the future network requirements of the company for its f

Independent loops statement, INDEPENDENT Loops HPF gives additional opp...

INDEPENDENT Loops HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done indep

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd