Buka menu utama

IP Interface


The UDP module must be able to determine the source and destination internet addresses and the protocol field from the internet header. One possible UDP/IP interface would return the whole internet datagram including all of the internet header in response to a receive operation. Such an interface would also allow the UDP to pass a full internet datagram complete with header to the IP to send. The IP would verify certain fields for consistency and compute the internet header checksum.

Protocol Application


The major uses of this protocol is the Internet Name Server [3], and the Trivial File Transfer [4].

Protocol Number


This is protocol 17 (21 octal) when used in the Internet Protocol. Other protocol numbers are listed in [5].

References


[1] Postel, J., "Internet Protocol," RFC 760, USC/Information

       Sciences Institute, January 1980.

[2] Postel, J., "Transmission Control Protocol," RFC 761,

       USC/Information Sciences Institute, January 1980.

[3] Postel, J., "Internet Name Server," USC/Information Sciences

       Institute, IEN 116, August 1979.

[4] Sollins, K., "The TFTP Protocol," Massachusetts Institute of

       Technology, IEN 133, January 1980.

[5] Postel, J., "Assigned Numbers," USC/Information Sciences

       Institute, RFC 762, January 1980.

Antar mukaSunting

Peramban web akan menampilkan status “Connection is secure” atau “Koneksi aman” saat mengakses halaman web yang menggunakan protokol HTTPS. Status “Connection is secure” memberikan informasi bahwa halaman web tersebut dapat melindungi data pengguna web baik akun, password, atau kartu kredit.[1]

Latar belakangSunting

HTTPS menjamin tiga keamanan berikut:[2]

  1. Autentikasi server memungkinkan peramban dan pengguna memiliki kepercayaan bahwa mereka sedang berbicara kepada server aplikasi sesungguhnya.
  2. Kerahasiaan data berarti eavesdropper tidak dapat mengerti komunikasi antara peramban pengguna dan server web, karena data tersandi.
  3. Integritas data berarti penyerang jaringan tidak dapat merusak atau mengubah isi komunikasi antara peramban pengguna dengan server web, karena divalidasi oleh message authentication code (MAC).

Catatan kakiSunting

  1. ^ Mentik Yusmantara. "Memahami Pengertian HTTPS untuk Memilih SSL". Diakses tanggal 2018-10-17. 
  2. ^ Chris Palmer (2010-11-15). "How to Deploy HTTPS Correctly - Electronic Frontier Foundation". Diakses tanggal 2012-10-21.