TFTP Protocolo
TFTP Protocolo
TFTP Protocolo
indigoo.com
Contents
1. Why TFTP?
2. Comparison TFTP and FTP
3. The TFTP protocol
4. TFTP and FTP throughput comparison
TFTP
Peter R. Egli 2014
1/9
Rev. 2.30
indigoo.com
1. Why TFTP?
In the old days, TFTP was typically used for downloading boot code to diskless workstations.
TFTP was simple enough to fit into EEPROMs of diskless workstations
(only a few KBytes of code).
LAN
TFTP Client
(Diskless Workstation)
TFTP Server
with boot code
Today, TFTP is most often used for downloading new code to Internet appliances
(Internet Access Devices, routers, switches, VOIP gateways etc.).
2/9
Rev. 2.30
indigoo.com
FTP
TFTP
Authentication
Connection
Protocol
algorithm
Footprint
3/9
Rev. 2.30
indigoo.com
4/9
Rev. 2.30
indigoo.com
TFTP client
RRQ (Read Request)
DATA block 1 (512 Bytes)
ACK block 1
ACK block 2
ACK block n
The transfer is completed by the last acknowledge.
5/9
Rev. 2.30
indigoo.com
TFTP client
WRQ (Write Request)
ACK block 0
DATA block 1 (512 Bytes)
ACK block 1
ACK block 2
ACK block n
The transfer is completed by the last acknowledge.
Peter R. Egli 2014
6/9
Rev. 2.30
indigoo.com
RRQ (read)
WRQ (write)
Opcode
1=RRQ, 2=WRQ
2 bytes
DATA
Data packet
Opcode
3=DATA
2 bytes
ACK
packet
Opcode
4=ACK
2 bytes
ERROR
packet
Opcode
5=ERROR
2 bytes
Block number
n bytes
1 byte
Filename
0x00
n bytes
mode
netascii (=text),
octet (=binary)
1 byte
0x00
2 bytes
Block number
2 bytes
Error number
n bytes
Error message
1 byte
0x00
7/9
Rev. 2.30
indigoo.com
S:
C:
S:
C.
2
3
4
5
S:
C:
S:
C:
S:
2
3
4
5
6
8/9
Rev. 2.30
indigoo.com
Ws = Window size
9/9
Rev. 2.30