SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Pertemuan 3
Marti Widya Sari, S.T., M.Eng
30 September 2013IP Packet 2
Version HLen TOS Length
Identification Flags Offset
TTL Protocol Checksum
Source Address
Destination Address
Options (variable) Pad
(variable)
0 4 8 16 19 31
Data
 Version : 4 bit
 HLEN (header length) : 4 bit
 TOS : 8 bit
 Length : 16 bit
 Identification : 16 bit
 Flags : 3 bit
 Fragmentation offset : 13 bit
 TTL : 8 bit
 Protocol : 8 bit
 Header checksum : 16 bit
 Source address : 32 bit
 Destination address : 32 bit
30 September 2013IP Packet 3
 Version—Versi IP yang digunakan (0100=4)
 IP Header Length (IHL)—Datagram header length
dalam 32-bit words.
 Type-of-Service—Specifies how an upper-layer
protocol would like a current datagram to be
handled, and assigns datagrams various levels of
importance.
 Total Length—Panjang paket dalam bytes,
termasuk data dan header.
 Identification—Nilai integer ebagai identifikasi
paket saat ini. Item ini berguna pada fragmentation
jika paket terdiri atas potongan-potongan paket
besar
30 September 2013IP Packet 4
 Flags—Consists of a 3-bit field of which the two
low-order (least-significant) bits control
fragmentation.
◦ The low-order bit specifies whether the packet can be
fragmented.
◦ The middle bit specifies whether the packet is the last
fragment in a series of fragmented packets.
◦ The third or high-order bit is not used.
 Fragment Offset—Indicates the position of the
fragment's data relative to the beginning of the
data in the original datagram, which allows the
destination IP process to properly reconstruct the
original datagram.
30 September 2013IP Packet 5
 Time-to-Live—Maintains a counter that gradually
decrements down to zero, at which point the
datagram is discarded. This keeps packets from
looping endlessly.
 Protocol—Indicates which upper-layer protocol
receives incoming packets after IP processing is
complete.
 Header Checksum—Helps ensure IP header
integrity.
 Source Address—Specifies the sending node.
 Destination Address—Specifies the receiving node.
 Options—Allows IP to support various options,
such as security.
 Data—Contains upper-layer information.
30 September 2013IP Packet 6
 Diketahui sebuah ip datagram source sebagai berikut :
 45 00 00 54 00 03 00 00 20 06 00 00 7C 4E 03 02 B4 0E
0F 02
 Carilah masing-masing :
a. Version
b. HLEN
c. TOS
d. Length
e. Identification
f. flags
g. Fragmentation offset
h. TTL
i. Protocol
j. Header Checksum
k. Source Address
l. Destination Address
30 September 2013IP Packet 7
 Diketahui sebuah ip datagram source sebagai berikut :
 45 00 00 54 00 03 00 00 20 17 00 00 5E 4F 03 02 C4 6E
B4 52
 Carilah masing-masing :
a. Version
b. HLEN
c. TOS
d. Length
e. Identification
f. flags
g. Fragmentation offset
h. TTL
i. Protocol
j. Header Checksum
k. Source Address
l. Destination Address
30 September 2013IP Packet 8

Weitere ähnliche Inhalte

Was ist angesagt?

Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentationdegarden
 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic CryptographyUniversitas Pembangunan Panca Budi
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
CNIT 141: 11. Hash Functions
CNIT 141: 11. Hash FunctionsCNIT 141: 11. Hash Functions
CNIT 141: 11. Hash FunctionsSam Bowne
 
ACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNSleek International
 
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)GRE (generic routing encapsulation)
GRE (generic routing encapsulation)Netwax Lab
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersSam Bowne
 
Cryptanalysis of autokey cipher
Cryptanalysis of autokey cipherCryptanalysis of autokey cipher
Cryptanalysis of autokey cipherHarshil Darji
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ipPalanivel Kuppusamy
 
IETF 80: Security Extensions for OSPF
IETF 80: Security Extensions for OSPFIETF 80: Security Extensions for OSPF
IETF 80: Security Extensions for OSPFmanav416
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipherVaibhav Khanna
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5Suramrit Singh
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)SrideviM4
 
Data Presentations Cassandra Sigmod
Data  Presentations  Cassandra SigmodData  Presentations  Cassandra Sigmod
Data Presentations Cassandra SigmodJeff Hammerbacher
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques Dr. Kapil Gupta
 

Was ist angesagt? (20)

Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentation
 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
CNIT 141: 11. Hash Functions
CNIT 141: 11. Hash FunctionsCNIT 141: 11. Hash Functions
CNIT 141: 11. Hash Functions
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
ACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPNACIT - CCNA Training India - VPN
ACIT - CCNA Training India - VPN
 
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream Ciphers
 
Cryptanalysis of autokey cipher
Cryptanalysis of autokey cipherCryptanalysis of autokey cipher
Cryptanalysis of autokey cipher
 
10 coms 525 tcpip - internet protocol - ip
10   coms 525 tcpip -  internet protocol - ip10   coms 525 tcpip -  internet protocol - ip
10 coms 525 tcpip - internet protocol - ip
 
IETF 80: Security Extensions for OSPF
IETF 80: Security Extensions for OSPFIETF 80: Security Extensions for OSPF
IETF 80: Security Extensions for OSPF
 
Information and network security 19 feistel cipher
Information and network security 19 feistel cipherInformation and network security 19 feistel cipher
Information and network security 19 feistel cipher
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Data Presentations Cassandra Sigmod
Data  Presentations  Cassandra SigmodData  Presentations  Cassandra Sigmod
Data Presentations Cassandra Sigmod
 
Port numbers
Port numbersPort numbers
Port numbers
 
Symmetric Encryption Techniques
Symmetric Encryption Techniques Symmetric Encryption Techniques
Symmetric Encryption Techniques
 
pathtrace
pathtracepathtrace
pathtrace
 

Andere mochten auch

Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsNoctorous Jamal
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Syed Hassan Ahmed
 
Zywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access ControlZywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access Controljones1812
 
User mobility and location management
User mobility and location managementUser mobility and location management
User mobility and location managementchenjennan
 
Mapping with Android
Mapping with AndroidMapping with Android
Mapping with Androidvgrigoruk
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
Intro To Gsm Wh080917
Intro To Gsm Wh080917Intro To Gsm Wh080917
Intro To Gsm Wh080917hobe
 
Cryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingCryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingGovCloud Network
 
Mobile Video Advertisement
Mobile Video AdvertisementMobile Video Advertisement
Mobile Video AdvertisementYoss Cohen
 
Will the shift from fleet to mobility management revolutionise the leasing in...
Will the shift from fleet to mobility management revolutionise the leasing in...Will the shift from fleet to mobility management revolutionise the leasing in...
Will the shift from fleet to mobility management revolutionise the leasing in...Mischa van Werkhoven
 
Distinguish among leo, meo, heo & gis systems . what type of satellites kenn...
Distinguish among  leo, meo, heo & gis systems . what type of satellites kenn...Distinguish among  leo, meo, heo & gis systems . what type of satellites kenn...
Distinguish among leo, meo, heo & gis systems . what type of satellites kenn...Niaz Shaikh
 
Android Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... OddAndroid Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... OddCommonsWare
 

Andere mochten auch (20)

Ip Packet
Ip PacketIp Packet
Ip Packet
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Ch20
Ch20Ch20
Ch20
 
Routing
RoutingRouting
Routing
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
 
Zywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access ControlZywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access Control
 
User mobility and location management
User mobility and location managementUser mobility and location management
User mobility and location management
 
Mapping with Android
Mapping with AndroidMapping with Android
Mapping with Android
 
Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...
Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...
Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...
 
Moto v551
Moto v551Moto v551
Moto v551
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Intro To Gsm Wh080917
Intro To Gsm Wh080917Intro To Gsm Wh080917
Intro To Gsm Wh080917
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
Cryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud ComputingCryptographic Data Splitting and Cloud Computing
Cryptographic Data Splitting and Cloud Computing
 
Mobile Video Advertisement
Mobile Video AdvertisementMobile Video Advertisement
Mobile Video Advertisement
 
Gsm
GsmGsm
Gsm
 
Will the shift from fleet to mobility management revolutionise the leasing in...
Will the shift from fleet to mobility management revolutionise the leasing in...Will the shift from fleet to mobility management revolutionise the leasing in...
Will the shift from fleet to mobility management revolutionise the leasing in...
 
Distinguish among leo, meo, heo & gis systems . what type of satellites kenn...
Distinguish among  leo, meo, heo & gis systems . what type of satellites kenn...Distinguish among  leo, meo, heo & gis systems . what type of satellites kenn...
Distinguish among leo, meo, heo & gis systems . what type of satellites kenn...
 
Android Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... OddAndroid Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... Odd
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 

Ähnlich wie 3 ip packet

Ähnlich wie 3 ip packet (20)

Ipv4 packet structure
Ipv4 packet structureIpv4 packet structure
Ipv4 packet structure
 
sandhiya
sandhiyasandhiya
sandhiya
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
Network Protocol Analysis
Network Protocol AnalysisNetwork Protocol Analysis
Network Protocol Analysis
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)The Internet Protocol version 4 (IPv4)
The Internet Protocol version 4 (IPv4)
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx1.1.2 - Concept of Network and TCP_IP Model (2).pptx
1.1.2 - Concept of Network and TCP_IP Model (2).pptx
 

Kürzlich hochgeladen

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 

Kürzlich hochgeladen (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

3 ip packet

  • 1. Pertemuan 3 Marti Widya Sari, S.T., M.Eng
  • 2. 30 September 2013IP Packet 2 Version HLen TOS Length Identification Flags Offset TTL Protocol Checksum Source Address Destination Address Options (variable) Pad (variable) 0 4 8 16 19 31 Data
  • 3.  Version : 4 bit  HLEN (header length) : 4 bit  TOS : 8 bit  Length : 16 bit  Identification : 16 bit  Flags : 3 bit  Fragmentation offset : 13 bit  TTL : 8 bit  Protocol : 8 bit  Header checksum : 16 bit  Source address : 32 bit  Destination address : 32 bit 30 September 2013IP Packet 3
  • 4.  Version—Versi IP yang digunakan (0100=4)  IP Header Length (IHL)—Datagram header length dalam 32-bit words.  Type-of-Service—Specifies how an upper-layer protocol would like a current datagram to be handled, and assigns datagrams various levels of importance.  Total Length—Panjang paket dalam bytes, termasuk data dan header.  Identification—Nilai integer ebagai identifikasi paket saat ini. Item ini berguna pada fragmentation jika paket terdiri atas potongan-potongan paket besar 30 September 2013IP Packet 4
  • 5.  Flags—Consists of a 3-bit field of which the two low-order (least-significant) bits control fragmentation. ◦ The low-order bit specifies whether the packet can be fragmented. ◦ The middle bit specifies whether the packet is the last fragment in a series of fragmented packets. ◦ The third or high-order bit is not used.  Fragment Offset—Indicates the position of the fragment's data relative to the beginning of the data in the original datagram, which allows the destination IP process to properly reconstruct the original datagram. 30 September 2013IP Packet 5
  • 6.  Time-to-Live—Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly.  Protocol—Indicates which upper-layer protocol receives incoming packets after IP processing is complete.  Header Checksum—Helps ensure IP header integrity.  Source Address—Specifies the sending node.  Destination Address—Specifies the receiving node.  Options—Allows IP to support various options, such as security.  Data—Contains upper-layer information. 30 September 2013IP Packet 6
  • 7.  Diketahui sebuah ip datagram source sebagai berikut :  45 00 00 54 00 03 00 00 20 06 00 00 7C 4E 03 02 B4 0E 0F 02  Carilah masing-masing : a. Version b. HLEN c. TOS d. Length e. Identification f. flags g. Fragmentation offset h. TTL i. Protocol j. Header Checksum k. Source Address l. Destination Address 30 September 2013IP Packet 7
  • 8.  Diketahui sebuah ip datagram source sebagai berikut :  45 00 00 54 00 03 00 00 20 17 00 00 5E 4F 03 02 C4 6E B4 52  Carilah masing-masing : a. Version b. HLEN c. TOS d. Length e. Identification f. flags g. Fragmentation offset h. TTL i. Protocol j. Header Checksum k. Source Address l. Destination Address 30 September 2013IP Packet 8