20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• program number, program version, procedure number identifies the<br />

procedue to be called<br />

• credentials identify the client - sometimes the user ID and group ID<br />

• verifier - used with secure RPC (to identify the server); uses DES<br />

encryption<br />

l<br />

Format of an RPC reply message as a UDP datagram<br />

IP Header<br />

20 bytes<br />

UDP Header 8<br />

transaction ID (XID) 4<br />

call (1) 4<br />

status (0=accepted) 4<br />

verifier<br />

upto 400 bytes<br />

procedure results<br />

N<br />

Maguire Network File System (NFS) 5: 56 of 77<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!