0% found this document useful (0 votes)
178 views16 pages

Trivial File Transfer Protocol (TFTP)

TFTP is a simple file transfer protocol developed in the 1970s for transferring files between devices with limited memory or storage. It uses UDP and requires less memory than FTP. TFTP allows clients to send and receive files from a TFTP server through read and write requests. However, it does not provide security features or support for operations beyond file transfers like delete or rename. As such, TFTP is commonly used to transfer boot files or configurations but not for general file sharing due to its lack of security and limited functionality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
178 views16 pages

Trivial File Transfer Protocol (TFTP)

TFTP is a simple file transfer protocol developed in the 1970s for transferring files between devices with limited memory or storage. It uses UDP and requires less memory than FTP. TFTP allows clients to send and receive files from a TFTP server through read and write requests. However, it does not provide security features or support for operations beyond file transfers like delete or rename. As such, TFTP is commonly used to transfer boot files or configurations but not for general file sharing due to its lack of security and limited functionality.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Trivial File Transfer Proto

col (TFTP)
TFTP
 TFTP was developed in the 1970s for computers
lacking sufficient memory or disk space to provide
full FTP support.
 TFTP is a simple protocol for exchanging files
between two machines connected through network.
 TFTP servers allow connections from a TFTP Client for sending
and receiving files.
 used when no complex interactions are required by
the client and server.
 The service of TFTP is provided by UDP (User
Datagram Protocol) and works on port number 69.
 TFTP does not provide security features therefore it is
not used in communications that take place over the
Internet.
 TFTP requires less amount of memory.
 The TFTP protocol supports only file send and

receive operations.
 File delete, move, and rename are not
supported.
 The TFTP Server can also be used
to upload HTML pages onto the HTTP Server or
to download log files to a remote PC.
 TFTP depends only on the unreliable,
connectionless datagram delivery service (UDP).

 TFTP is mostly used to read and write files/mail


to or from a remote server.
 It is usually used for transferring boot files or
configuration files between machines in a local
setup.
 Because of its simple design, it is rarely used
interactively by users in a computer network.
 TFTP is very useful for boot computers and devices
that do not have hard disk drives or storage
devices.
TFTP Message Formats

 There are four types of TFTP Message


formats.

 1. Read Request
 Read Request is also known as Type 1. A read

request is used by the client to get a copy of


a file from the server.

 2. Write Request
 Write Request is also known as Type 2. Write

Request is being used by the client for writing


a file into the server.
 3. Data
 Data is also known as Type 3. Data consists

of a portion of a file that is being copied. The


data block is of fixed size that is 512 octets.

 4. Acknowledgement
 Acknowledgment is also known as Type 4
 This acknowledgment is used by both client

and server for acknowledging the received


data.
Working of TFTP

 TFTP makes use of port number 69 as it uses


User Datagram Protocol (UDP).

 When the connection is established


successfully between client and server, the
client makes a Read Request (RRQ) or

 Write Request( WRQ). If a client wants to only


read the file it requests RRQ and if the client
wants to write some data into a server then it
requests for WRQ.
 Once the connection is established and a request
is made communication of files takes place in the
form of small packets. These packets are 512
bytes each.
 The server then communicates the packet back to

the client and waits until it receives an


acknowledgment from the client that the packet
has been received.
 When the acknowledgment is received from the

client side, the server again sends the next packet


which is 512 bytes each.
 The same steps as mentioned above continue

until the last packet is sent by the server to the


client.
Advantages of TFTP

 TFTP Protocol makes use of User Datagram


Protocol (UDP).
 TFTP requires less amount of memory.
 TFTP is simple to implement.
 TFTP is supported by many network devices

such as routers, firewalls, and switches.


 TFTP has low overhead as compared to other

protocols and therefore can be used for low-


bandwidth networks.
 TFTP can transfer small files such as boot files,

and firmware images more fastly.


Disadvantages of TFTP
 TFTP does not provide any security features.

 TFTP does not provide any approach for error


checking.

 TFTP can be used for limited functionalities


only.

 TFTP servers do not allow the renaming and


deletion of files.
Applications of TFTP
 TFTP is used to transfer files within clients
and sever connected in a network.

 TFTP is used to transfer the configuration


files within the network.

 TFTP is used to update the firmware on the


devices connected to the network.

 TFTP is used in applications where no


authentication is required.
TFTP Interfaces
 Control Interface explains how to start/stop the
TFTP Server and to manage built-in user accounts.
 Access Interface shows how to filter out hosts,
which are not allowed to connect to the TFTP
Server.
 File System Interface gives you details about the
functions that are used to read/write data on the
TFTP server's storage device.
 Configuration explains the configuration options
of the TFTP server.
RISK
 TFTP does not provide any mechanism for users
to logon to the remote system to access the file.

 Anyone on the network can read the files.

 However the TFTP server on the remote system


sets the restrictions on file retrieve and store.

 TFTP packets are sent in the clear across a


network with no data encryption.
 No authentication, and no encryption, TFTP is
generally not recommended for the transfer
of sensitive data.
Difference between FTP & TFTP
FTP TFTP
Uses TCP port numbers 20 and 21. Uses UDP port number 69.
Uses TCP as transport layer Uses UDP as transport layer
protocol. protocol.
Supports authentication. doesn’t support user
authentication.
Uses robust control commands. Uses simple control commands.
Sends data over a separate TCP Uses no connections since UDP is
connection from control connectionless protocol.
commands.
Requires more memory and Requires less memory and
programming effort. programming effort.
Mostly used by remote users to Mostly used to transfer
upload and download files. configurations to and from

You might also like