Transmitting Internet Protocol Packets Efficiently on Underwater Networks using Entropy-Encoder Header Translation

Size: px
Start display at page:

Download "Transmitting Internet Protocol Packets Efficiently on Underwater Networks using Entropy-Encoder Header Translation"

Transcription

1 Transmitting Internet Protocol Packets Efficiently on Underwater Networks using Entropy-Encoder Header Translation 5.6 Toby Schneider GobySoft, LLC Woods Hole, MA Abstract The Internet Protocol (IP) is ubiquitous in terrestrial and electromagnetic-carrier wireless networking. However, for very low-throughput underwater links (such as those using acoustic modems) the IP header introduces an unacceptable amount of data overhead for the small maximum transmission units available on underwater acoustic links. Nonetheless, it is becoming increasingly valuable to connect undersea deployments to the internet to provide data to researchers on shore, and facilitate remote command of deployed vehicles and sensors. This paper details a technique to reversibly translate the IPv4 header to allow IP packets to traverse acoustic links but with a header that is an order of magnitude smaller than a regular IPv4 header. In addition, this technique provides support for translating the User Datagram Protocol (UDP) header to provide scalable multiplexing. This technique works by dynamically partitioning the address space into the required subnet size based on the number of communicating nodes, and applying a Huffman entropy encoder to the address values based on the probabilistic data flow amongst the nodes. I. INTRODUCTION Oceanographic sensors and autonomous underwater vehicles (AUVs) are increasingly deployed with the expectation that their collected data (and in the other direction, commands) will be available in near real-time via a combination of satellite, cabled, and terrestrial networks which typically use the Internet Protocol (IP). However, the last links to many of these marine systems are often low-throughput, such as over acoustic modems. Fielded networks thus far with acoustic links has generally been to abandon the IP completely and use a custom protocol stack; examples are [1], [2], and [3]. These self-contained solutions lead to acceptable performance, but create a significant impedance mismatch when trying to integrate them into systems using the Internet Protocol. It would appear beneficial to have an option to support a subset of the IP while maintaining the low data overhead required by marine links. This paper outlines a technique for performing header translation on the IP (and the User Datagram Protocol (UDP) transport layer) which greatly reduces the size of the IP header by 1) removing features that are not widely used or do not make sense on underwater links. 2) reducing the addressing space to that required by the maximum number of communicating nodes in the sub-network (subnet). 3) collapsing the source and destination addressing into a single symbol which allows elimination of unused pairs. 4) encoding the addressing symbol and UDP ports using an Huffman entropy encoder that takes advantage of a non-uniform probability distribution of addressing to reduce the encoded packet size. A. Implementation This work was implemented in GNU/Linux using the open-source Dynamic Compact Control Language version 3 (DCCL3) [4] and Goby [2] projects. The goby_ip_gateway application 1 provides a tun interface (a virtual IP-layer networking device that can be used in much the same way as a physical Ethernet interface) on one side, and implements the interface to the Goby ModemDriver on the other. This allows this work to be used immediately with any of the existing or future Goby ModemDriver implementations, for example, over the WHOI Micro-Modem or Iridium satellite links. II. IP HEADER TRANSLATION The aim of this header translation is to combine the IP and UDP headers into a single combined Underwater 1 Source code is available at /16/$ IEEE 241

2 Internet Protocol v4 User Datagram Protocol Underwater NetHeader Version IP Header Differentiated Length services ECN Identification Frag. flags Total Length Total Length Fragment Offset Time To Live Protocol Header Checksum Protocol Source port Length variable length 32-bit word Source IP Address Destination IP Address Options Source/Destination Address Symbol 32-bit word Source Port Dest Port Dest port Checksum Fig. 1. Standard IPv4 and UDP Headers, with new Underwater NetHeader translated representation. Colored fields are preserved (though reduced in size) and gray fields are removed from the NetHeader. Total length is an optional field depending on whether the desired physical links to be used provide packet size information. NetHeader which takes significantly less data, allowing for a reasonable payload size on links that typically have small (order of 10s and 100s of bytes) maximum transmission units (MTUs). The standard IPv4 [5] and UDP [6] headers are given in Fig. 1 along with the NetHeader. Mapping the IP version 6 is a similar process; for the ease of exposition, only IPv4 would be considered. A. Removed and reduced fields Several parts of the IP header (see gray fields in Fig. 1) are removed from the remapped NetHeader because their use is unnecessary or redundant on underwater links. These fields include: Version: The assumption is that the same version (either 4 or 6) of IP is used throughout the last mile underwater links. IP Header Length: The length of the Underwater NetHeader is defined exactly by the size of each field in it, so there is no need for a separate length field. Identification, fragmentation flags, and fragment offset: underwater acoustic networks can have very high packet loss and high inter-packet periods which suggests that it is best to structure the packet payload to be atomically useful rather than rely on transport level fragmentation and reassembly. For example, scalar data files can be represented as a series of samples (with one or more samples per packet) and imagery can be sent using a progressive technique (see, for example, citemurphy2010wavelet). Header Checksum: most physical links provide a checksum for data integrity, making this checksum redundant. In the event that the checksum is not provided by the physical link, it is straightforward to implement it at the link layer interface (e.g. Goby ModemDriver). The removal of these fields reduces the IP header by nine bytes (excluding the possible Options field). In addition, several fields are reduced in size: Protocol: only a handful of protocols that run on IP are in use; thus, this field can be reduced to handle the ones that are sensible. Given the high latencies involved, Transmission Control Protocol (TCP) is unlikely to function acceptably on marine links. UDP, parts of the Internet Control Message Protocol (ICMP), and perhaps the Stream Control Transmission Protocol (SCTP) seem likely to be the protocols that would make sense to use over such low throughput links. Given this, the protocol field can be reduced to two bits (for an enumeration of up to four protocols). Total length: This field is redundant if the physical layer provides variable packet length support already (for example the WHOI Micro-Modem [7] packets or the Iridium Short-Burst Data protocol). In the case where the entire subnet uses such a physical link, this field should be omitted. Otherwise, it can be included to allow delineation of packets in a stream-based physical link (such as Hayes command set based modems). B. Collapsed address space After removing the fields as described in Section II-A, the main remaining space is used by the source and destination IP addresses (eight bytes total). The first way to greatly reduce the size of these fields is to limit the available addresses to the actual number of fielded nodes in the underwater subnet. This brings the space required for these addresses (in bits, b sd ) to b sd = log 2 N 2 a (1) where N a is the number of addresses in the network. In the case of a typical sized subnet of up to eight addresses, b sd = 6 bits /16/$ IEEE 242

3 TABLE I IP ADDRESS TO UNDERWATER NETHEADER SYMBOL MAPPING FOR 8-ADDRESS SUBNET (6 PHYSICAL NODES) a) b) a gate a gate Destination IP Address Source IP Address (within subnet) 0, , Note: source and destination addresses shown are the logical AND of the IP address and the complement of the subnet mask. For example, in the subnet /29, address is given as 3 above. Fig. 2. Examples of possible networks with varying values of autonomy () and collaboration (γ c). Part a) shows a highly autonomous network of sensors with no collaboration ( = 1, γ c = 0), and b) shows a group of tightly coupled vehicles ( > γ c > 0.5). This value can be reduced further by pairing the source and destination into a single value, the source/destination address symbol S[s, d] where { d(n a 2) + s s < d, s a broadcast S[s, d] = d(n a 2) + (s 1) s > d, s a broadcast (2) given that s is the source address and d is the destination address within the subnet. By doing so, the diagonals of Table I can be removed (since a packet destined to the same address from which it is originated never needs to be communicated over a physical link). In addition, the convention of IPv4 is to use the largest address in a subnet for broadcast packets, and to reserve the smallest address for subnet notation. By collapsing these into a single broadcast address (a broadcast ), and assuming that the source address of a valid packet will never be broadcast, this eliminates more symbols. Making these modifications, the bits required for the addresses (b sd ) is b sd = log 2 ( N 2 a 4(N s d 1) ) (3) Now, in the case of the eight-address subnet, b sd = 5.17 bits. While the partial bit saved is not useful here, one could now increase the subnet size to a ten-address subnet while still staying within 6 bits. C. Entropy encoding addresses The encoded space used by the source/destination address symbol could be further reduced by considering that certain pairs of addresses are more or less likely to occur in a given deployment of oceanographic sensors or autonomous vehicles. Let us designate an address (a gate, for example, for the eight-address subnet /29) for the gateway or topside node. This node can be the local destination for much of the traffic, and the source (as far as this subnet is concerned) of commands to any autonomous vehicles. Now, consider two non-dimensional factors with values that range [0, 1] that can parameterize the data flow: autonomy ( ), which weights the probability that a packet has the gateway source address and collaboration (γ c ), which weights the probability of packets amongst all the other source addresses, except those destined to the gateway. The difference -γ c is used to weight outbound traffic (i.e. with a destination of a gateway ) and to allow normalization of the probability mass function. A completely autonomous network ( = 1) needs no commands so it would have no data sent from the gateway node. A completely collaborative network (γ c = ) would have equal data flow between all the non-gateway nodes, and no outbound data (which may occur if no data is offloaded until the mission is complete). For example, a suite of pre-programmed independently collecting sea-floor sensors would likely have a large autonomy value, and a small or zero collaboration value. On the other hand, a fleet of small AUVs flying formation based on shared navigation data would have a large collaboration value (and an autonomy value that depends on how much operator direction is required). Fig. 2 illustrates two possible network scenarios. The probability P [S] of a given symbol is given by p 0 (1 ) s = a gate P [S[s, d]] = p 1 ( γ c ) d = a gate (4) p 2 (γ c ) s a gate, d a gate /16/$ IEEE 243

4 a) Client Server b) Source IP Address Destination IP Address c) dyn : 2 dyn : 2 s: d: 5001 s: 2 d: 0 s: d: 5001 UDP : 2 NetHeader : 2 UDP s: 5001 d: s: 0 d: 2 s: 5001 d: d) e) 001 Fig. 3. Illustration of the process of mapping and encoding the IP addresses (a) onto a final encoded value (e) in the Underwater NetHeader. The addresses are collapsed into a single symbol (b); an example is given in Table I. Then, the probability of each symbol (c) is computed based in the and γ c values as given in Eq. 4. The probability mass function is used to compute a Huffman dictionary (d), which is used to encode the source/destination symbol into a binary value (e). where normalizing constants p 0 = (N a 2) 1 (5) p 1 = (N a 3) 1 (6) p 2 = (N 2 a 6N a + 9) 1 (7) This formulation requires >= γ c to ensure that no symbols have negative probability, which makes sense intuitively since autonomous behavior is a precondition to collaborative behavior. Given this probability distribution, a Huffman [8] dictionary can be created to encode the single source/destination address symbol with close to optimality. Fig. 3 details the process from start to finish of encoding the source/destination value as explained in this section and Section II-B. D. UDP port reduction To support UDP port-based multiplexing, the Underwater NetHeader supports variable sized source and destination port fields. These ports can be designated as static, where there is a fixed mapping from UDP port to NetHeader port. Some ports can also be designated dynamic, so that the goby_ip_gateway application can temporarily map a given UDP source port to a dynamic NetHeader port so that replies to the same port are properly translated back into the correct UDP port. Fig. 4. Example of UDP port mapping to Underwater NetHeader ports. Here four ports are allocated (taking two bits each for source and destination port fields). When the sending side of goby_ip_gateway encounters an unknown port (e.g ), it maps it to the first unused dynamic port. Similarly, on receive, a new dynamic UDP port is requested (e.g ) from the system, allowing this mapping to be maintained for messages sent in the reverse direction (server to client) γ c Fig. 5. Expected value of source/destination symbol Huffman encoded size over the range of possible values of and γ c. Fig. 4 gives an example of this port mapping. This allows clients using dynamic ports to send messages to a server and receive a reply. The number of dynamic ports must be at least as many as the simultaneous sessions required. When the dynamic ports are exhausted, they are recycled starting with the first allocated port. III. RESULTS The expected value of the encoded size of the source/destination address symbol over the entire possible space of the autonomy and collaboration factors ( and γ c ) is shown in Fig. 5. The most compression is obtained when the network is asymmetric, such as when the autonomy is high and the collaboration is low. This corresponds to a network where most traffic is encoded size (bits) /16/$ IEEE 244

5 Expected value of Underwater NetHeader size (bits) uniform distribution = 1, γ c = 0 = 0.9, γ c = subnet size Fig. 6. Expected value of the entire Underwater NetHeader assuming a 2-bit protocol field, 3-bit destination and source port fields, and source/address fields based on Huffman encoding using the probability distribution P [S] for different values of, γ c, and subnet size N a. For comparison, the standard IPv4/UDP headers are at least 224 bits. directed towards the gateway node. In highly collaborative networks, the addressing is much more uniformly distributed amongst all possible source/destination pairs, so there is little or no gain from using the Huffman encoder. Fig. 6 shows the expected value of the size of the Underwater NetHeader as a function of subnet size for a uniform probability distribution, and two pairs of the autonomy and collaboration factors representative of the qualitative networks shown in Fig. 2. This technique shows significant promise for reducing the IP header into a size (2-3 bytes on average) that is acceptable for use with underwater links that may have maximum transmission units of only tens of bytes. IV. CONCLUSION This paper presents a technique for mapping a subset of the IP header (and higher level protocols such as UDP) onto a single Underwater NetHeader with substantially reduced size that would be acceptable for use on the low throughput links that are common in the marine operating environment (5-10% of the IP header, depending on the subnet size and data flow of the network). It would be of significant value to the underwater communications user community (AUV operators and ocean sensor deployers) to create a standard for this type of mapping. Since each underwater subnet must share the exact same parameters for encoding all the fields (especially the source/destination address symbol), some flexibility must be given for the designer of given subnet to choose his or her own parameters based on the nature of the deployed assets. A possibility would be to agree on a handful of pairs of autonomy and collaboration factors that represent realistic networks and are thus given as standard options. Combined with requiring that subnets must be powers of two in size, this would provide flexibility to the subnet designer without so much freedom as to remove the value of having a standard at all. ACKNOWLEDGMENT I would like to thank Jim Partan at the WHOI Micro- Modem group for the initial spark of this idea, and all those who have contributed to the diversity of open source software used in this work: GNU/Linux, IP, DCCL, and Goby. REFERENCES [1] M. Grund, L. Freitag, J. Preisig, and K. Ball, The PLUSNet underwater communications system: acoustic telemetry for undersea surveillance, in OCEANS IEEE, 2006, pp [2] T. Schneider and H. Schmidt, Goby-acomms version 2: extensible marshalling, queuing, and link layer interfacing for acoustic telemetry, in 9th IFAC Conference on Manoeuvring and Control of Marine Craft, Arenzano, Italy, [3] Z. Peng, Z. Zhou, J. H. Cui, and Z. J. Shi, Aqua-net: An underwater sensor network architecture: Design, implementation, and initial testing, in OCEANS 2009, MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local Challenges, Oct 2009, pp [4] T. Schneider, S. Petillo, H. Schmidt, and C. Murphy, The dynamic compact control language version 3, in OCEANS Genova, May 2015, pp [5] J. Postel, Internet protocol RFC 791, ARPANET Working Group Requests for Comments, no. 791, [6], Internet protocol RFC 768, ARPANET Working Group Requests for Comments, no. 768, [7] E. Gallimore, J. Partan, I. Vaughn, S. Singh, J. Shusta, and L. Freitag, The whoi micromodem-2: A scalable system for acoustic communications and networking, in OCEANS IEEE, 2010, pp [8] D. A. Huffman, A method for the construction of minimumredundancy codes, Proceedings of the IRE, vol. 40, no. 9, pp , Sept /16/$ IEEE 245

Goby3: A new open-source middleware for nested communication on autonomous marine vehicles

Goby3: A new open-source middleware for nested communication on autonomous marine vehicles Goby3: A new open-source middleware for nested communication on autonomous marine vehicles Toby Schneider GobySoft, LLC Woods Hole, MA, USA Email: toby@gobysoft.org Abstract Software systems for robotics

More information

Goby-Acomms version 2:

Goby-Acomms version 2: Goby-Acomms version 2: extensible marshalling, queuing, and link layer interfacing for acoustic telemetry...01010100101010100101010001... Toby Schneider MIT/WHOI Joint Program Henrik Schmidt MIT Laboratory

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer 1 CPSC 826 Intering The Network Layer: Routing & Addressing Outline The Network Layer Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu November 10, 2004 Network layer

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Network Layer PREPARED BY AHMED ABDEL-RAOUF Network Layer PREPARED BY AHMED ABDEL-RAOUF Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport

More information

Network Layer/IP Protocols

Network Layer/IP Protocols Network Layer/IP Protocols 1 Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2 IPv4 packet header 3 IPv4 Datagram Header Format version of the IP protocol (4 BIts) IP header

More information

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

The Dynamic Compact Control Language Version 3

The Dynamic Compact Control Language Version 3 The Dynamic Compact Control Language Version 3 Toby Schneider, Stephanie Petillo GobySoft, LLC North Falmouth, MA Emails: toby@gobysoft.org, stephanie@gobysoft.org Henrik Schmidt Massachusetts Institute

More information

Need For Protocol Architecture

Need For Protocol Architecture Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

IPv4. Christian Grothoff.

IPv4. Christian Grothoff. IPv4 christian@grothoff.org http://grothoff.org/christian/ Sites need to be able to interact in one single, universal space. Tim Berners-Lee 1 The Network Layer Transports datagrams from sending to receiving

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly The Internet Protocol IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly IP Addresses IP Addresses are 32 bit. Written in dotted decimal format:

More information

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer

EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer EP2120 Internetworking/Internetteknik IK2218 Internets Protokoll och Principer Homework Assignment 1 (Solutions due 20:00, Mon., 10 Sept. 2018) (Review due 20:00, Wed., 12 Sept. 2018) 1. IPv4 Addressing

More information

Internet Protocol version 6

Internet Protocol version 6 Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The

More information

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis

Computer Network Fundamentals Spring Week 4 Network Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 4 Network Layer Andreas Terzis Outline Internet Protocol Service Model Addressing Original addressing scheme Subnetting CIDR Fragmentation ICMP Address Shortage

More information

Network Layer: Control/data plane, addressing, routers

Network Layer: Control/data plane, addressing, routers Network Layer: Control/data plane, addressing, routers CS 352, Lecture 10 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana (heavily adapted from slides by Prof. Badri Nath and the textbook authors)

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem.

Tutorial 9. SOLUTION Since the number of supported interfaces is different for each subnet, this is a Variable- Length Subnet Masking (VLSM) problem. Tutorial 9 1 Router Architecture Consider a router with a switch fabric, 2 input ports (A and B) and 2 output ports (C and D). Suppose the switch fabric operates at 1.5 times the line speed. a. If, for

More information

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite

CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid. Internet Protocol Suite CC231 Introduction to Networks Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab bacademy for Science &T Technology and Maritime Transport Internet Protocol Suite IP Suite Dr.

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6 RMIT University Data Communication and Net-Centric Computing COSC 1111/2061 Internetworking IPv4, IPv6 Technology Slide 1 Lecture Overview During this lecture, we will understand The principles of Internetworking

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008 Networks an overview dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 4, 2008 dr. C. P. J. Koymans (UvA) Networks February 4, 2008 1 / 53 1 Network modeling Layered networks

More information

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1

CIS-331 Final Exam Fall 2015 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer IPv4, Format and Addressing,, IPv6 Prof. Lina Battestilli Fall 2017 Chapter 4 Outline Network Layer: Data Plane 4.1 Overview of Network layer

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

Lecture 9: Internetworking

Lecture 9: Internetworking Lecture 9: Internetworking CSE 123: Computer Networks Alex C. Snoeren HW 2 due WEDNESDAY So what does IP do? Addressing Fragmentation E.g. FDDI s maximum packet is 4500 bytes while Ethernet is 1500 bytes,

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on IP Version 4 (IPv4) Header (Continued) Identification (16 bits): One of the parameters of any network is the maximum transmission unit (MTU) parameter. This parameter specifies the maximum size of the

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. The Internet 9.1 Introduction The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications. Associated with each access network - ISP network, intranet,

More information

Network Layer (1) Networked Systems 3 Lecture 8

Network Layer (1) Networked Systems 3 Lecture 8 Network Layer (1) Networked Systems 3 Lecture 8 Role of the Network Layer Application Application The network layer is the first end-to-end layer in the OSI reference model Presentation Session Transport

More information

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting Quiz v 10/30/2013 (Wednesday), 20 mins v Midterm question (available on website) v TCP basics Segment structure and fields Flow control (rwnd) Timeout interval v TCP Congestion control Phases transition

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK 219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

CSCI Computer Networks Fall 2016

CSCI Computer Networks Fall 2016 source: computer-s-webdesign.com CSCI 4760 - Computer Networks Fall 2016 Instructor: Prof. Roberto Perdisci perdisci@cs.uga.edu These slides are adapted from the textbook slides by J.F. Kurose and K.W.

More information

Network Protocols - Revision

Network Protocols - Revision Network Protocols - Revision Luke Anderson luke@lukeanderson.com.au 18 th May 2018 University Of Sydney Overview 1. The Layers 1.1 OSI Model 1.2 Layer 1: Physical 1.3 Layer 2: Data Link MAC Addresses 1.4

More information

The Internetworking Problem. Internetworking. A Translation-based Solution

The Internetworking Problem. Internetworking. A Translation-based Solution Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Network Layer: Internet Protocol

Network Layer: Internet Protocol Network Layer: Internet Protocol Motivation Heterogeneity Scale Intering IP is the glue that connects heterogeneous s giving the illusion of a homogenous one. Salient Features Each host is identified by

More information

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways)

Exercise Sheet 4. Exercise 1 (Routers, Layer-3-Switches, Gateways) Exercise Sheet 4 Exercise 1 (Routers, Layer-3-Switches, Gateways) 1. What is the purpose of Routers in computer networks? (Also explain the difference to Layer-3-Switches.) 2. What is the purpose of Layer-3-Switches

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

From underwater simulation to at-sea testing using the ns-2 network simulator

From underwater simulation to at-sea testing using the ns-2 network simulator From underwater simulation to at-sea testing using the ns-2 network simulator Chiara Petrioli and Roberto Petroccia Dipartimento di Informatica Università di Roma la Sapienza Roma, Italy E-mail: {petrioli,petroccia}@di.uniroma1.it

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 2: Internet Protocol Literature: Forouzan: ch (4-6), 7-9 and ch 31 2004 Image Coding Group, Linköpings Universitet Lecture 2: IP Goals: Understand the benefits Understand the architecture IPv4

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12 1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

Communication Systems DHCP

Communication Systems DHCP Communication Systems DHCP Computer Science Copyright Warning This lecture is already stolen If you copy it please ask the author Prof. Dr. Gerhard Schneider like I did 2 Internet Protocol the Universal

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24

1-1. Switching Networks (Fall 2010) EE 586 Communication and. October 25, Lecture 24 EE 586 Communication and Switching Networks (Fall 2010) Lecture 24 October 25, 2010 1-1 Announcements Midterm 1: Mean = 92.2 Stdev = 8 Still grading your programs (sorry about the delay) Network Layer

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁 II Sören Schwertfeger 师泽仁 Outline Review Network Layer Routing Transport Layer Applications HTTP Demos Internet: Huge network of networks Billions of hosts (computers) Internet Structure Network Edge:

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy Hierarchical Routing Our routing study thus far - idealization all routers identical network flat no true in practice scale: with 50 million destinations: can t store all dest s in routing tables! routing

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William

Computer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

IPv4 addressing, NAT. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. IPv4 addressing, NAT http://xkcd.com/195/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

The Internet Protocol (IP)

The Internet Protocol (IP) The Internet Protocol (IP) The Blood of the Internet (C) Herbert Haas 2005/03/11 "Information Superhighway is really an acronym for 'Interactive Network For Organizing, Retrieving, Manipulating, Accessing

More information

End-to-End Communication

End-to-End Communication End-to-End Communication Goal: Interconnect multiple LANs. Why? Diverse LANs speak different languages need to make them talk to each other Management flexibility global vs. local Internet Problems: How

More information

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I

Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide

More information

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga

The Network Layer. Antonio Carzaniga. April 22, Faculty of Informatics University of Lugano Antonio Carzaniga The Network Layer Antonio Carzaniga Faculty of Informatics University of Lugano April 22, 2010 Basic network-layer architecture of a datagram network Outline Introduction to forwarding Introduction to

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

TCP/IP THE TCP/IP ARCHITECTURE

TCP/IP THE TCP/IP ARCHITECTURE TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet

More information

IP : Internet Protocol

IP : Internet Protocol 1/20 IP : Internet Protocol Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: July 30, 1999 Agenda 2/20 IP functions IP header format Routing architecture IP layer 3/20 defines

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

Networking Fundamentals

Networking Fundamentals Networking Fundamentals Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Goby3: A new open-source middleware for nested communication on autonomous marine vehicles

Goby3: A new open-source middleware for nested communication on autonomous marine vehicles Goby3: A new open-source middleware for nested communication on autonomous marine vehicles 1...01010100101010100101010001... Toby Schneider GobySoft, LLC Woods Hole, MA, USA aquatic software MOOS-DAWG

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model Lecture 8 Basic Internetworking (IP) Reminder: Homework 3, Programming Project 2 due on Tuesday. An example internet is shown at right. Routers or gateways are used to connect different physical networks.

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology 2017 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Network Layer The majority of slides presented in

More information

Lecture 11: Networks & Networking

Lecture 11: Networks & Networking Lecture 11: Networks & Networking Contents Distributed systems Network types Network standards ISO and TCP/IP network models Internet architecture IP addressing IP datagrams AE4B33OSS Lecture 11 / Page

More information

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today Network layer: Internet Protocol (v4) Forwarding Next 2 classes:

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 17 CMPE 80N Spring'10 1 Announcements Next class: Presentation of fun projects

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along

More information

Veryx ATTEST TM. Sample Test cases Overview. Conformance Test Suite. Internet Protocol version 4 (IPv4) Part Number: T / TCLS IPv /1.

Veryx ATTEST TM. Sample Test cases Overview. Conformance Test Suite. Internet Protocol version 4 (IPv4) Part Number: T / TCLS IPv /1. Veryx ATTEST TM Conformance Test Suite Internet Protocol version 4 (IPv4) Sample Test cases Overview Part Number: T / TCLS IPv4 1.0-1110/1.0 This page is intentionally left blank. Introduction The Veryx

More information