Requests types in distributed enrollment protocol , Computer Networking

Assignment Help:

Control Commands: The STAT command is used as a way for the client to confirm that the server is still responding properly.

The server must simply send a positive command response to satisfy this command. The server then expects to receive the next request from the client. The EXIT command is used by the client to request termination of the connection. The server must send a positive command response, then immediately close its end of the connection. The BasicEnrollmentManager instance created for the current client session will be discarded.

Method Commands

Upon receiving a recognized method command, the server must send a positive command response.

Parameters (if any) are sent by the client in the sequence specified in Table 1. The client sends one parameter at a time, waiting each time for the server to send a positive parameter response before continuing. If, for any parameter, the server returns a negative parameter response, the client must not send any further parameters for this command. The server in this case will immediately abandon processing of the current command and expect the client to send another command from the beginning.

Once the server has received all parameters, it must then invoke the requested method of the BasicEnrollmentManager instance for this client. See the Responses section below for more details about the expected response.

Unrecognized Commands

If the server receives any unrecognized request, meaning any command other than those listed in Table 1, it must send a negative command response. The server then expects the client to send another command request. No further action is taken by the server until it receives another command request.


Related Discussions:- Requests types in distributed enrollment protocol

Error detection-redundancy, Q. Error Detection-Redundancy? In its p...

Q. Error Detection-Redundancy? In its place of repeating the entire data stream a shorter group of bits may be appended to the end of each unit. Called as -redundancy?

Determine the 802.11g ofdm, 802.11g OFDM a) Uses OFDM with same 2.4 GH...

802.11g OFDM a) Uses OFDM with same 2.4 GHz band b) Achieves a 54-Mbps data rate c) Works with same 802.11b equipment

Describe briefly how the news filtering agent works, QUESTION (a) Conce...

QUESTION (a) Concerning agents that reduce workload, there are four agents developed using a learning approach among which is the News Filtering Agent. Name the other three age

Explain the static and dynamic interconnection network, Static and Dynamic ...

Static and Dynamic Interconnection Network In a static network, the connection amid input and output nodes is permanent and can't be changed. Static interconnection network can

Mail access protocols - application layer, Mail Access Protocols The e...

Mail Access Protocols The e mail  message  are usually  sent to  an email  server that stores received message  in the  recipient   e mail  mailbox.  The user  retrieves messa

Determine the objectives of computer security, Determine the Objectives of ...

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one

Application layer , Normal 0 false false false EN-IN ...

Normal 0 false false false EN-IN X-NONE X-NONE Application Layer   The application  layer

Which layer defines the physical topology, The Physical layer deals with th...

The Physical layer deals with the definite physical medium and the method of transporting 1s and 0s.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd