Learn why hundreds of corporations, tech firms, universities, health care organizations and government agencies are partnering with KinderCare Education to provide value-added family care benefits.
This document summarizes a study analyzing census data from India to assess digital inclusion at the village level. The study used analytical tools on publicly available census data to identify common characteristics of villages with similar levels of digital inclusion. Principal component analysis was used to select the most important features from over 90 available in the census data. Machine learning techniques like decision trees and random forests were trained on the data to predict digital inclusion and identify key drivers. The models found infrastructure facilities and socioeconomic indicators were important factors for higher digital inclusion.
This short document recommends visiting certain websites to become entertained and informed with leading information on unspecified topics as well as insightful tips, though it does not specify any particular websites or topics of interest.
China has implemented several policies to promote the growth of the wind power market, including a wind power concession system, requiring power grids to connect wind farms, and establishing a fixed wind energy price. Localization requirements mandate that new wind farms use at least 70% local equipment. Several state-owned energy companies have become major players in China's wind market, along with some domestic and Hong Kong-based companies, and China's wind power capacity grew significantly between 2008 and 2009.
The Evolution to LTE report confirms the status of the LTE market worldwide including LTE and LTE-Advanced network deployments (FDD and TDD), commercial service launches, the user devices ecosystem, subscriptions growth, regulatory developments including spectrum allocations, VoLTE, APT700, LTE Broadcast, LTE roaming, and highlights the main industry trends. The report is based on our own research and industry contacts and is our independent assessment and analysis, supported by facts and metrics.
442 LTE networks are now commercially launched in 147 countries.
380 operators deployed FDD mode only
44 operators deployed TDD mode only
18 operators deployed both FDD and TDD modes
73 operators commercially launched LTE service in 2015.
142 LTE operators are investing in LTE-Advanced deployments, studies or trials in 62 countries. 95 operators have commercially launched LTE-A networks in 48 countries.
111 operators in 52 countries investing in VoLTE deployments, studies or trials. 30 operators have commercially launched VoLTE-HD voice in 21 countries.
Raah International Pte -Jb all electrical and instrumentation catalogueSarah Shaikh
油
Raah International - Design | Supply | Installation for Junction box and supplies.
For Atex Hazardous and Non Hazardous Areas.
Junction Box | Enclosures | Cable Glands | Earthing and Lightning Products | Air Filter Motors and more.
Philip Cargnino has been a prevalent business owner in the HVAC Industry with over 30 years of experience. Philip Cargnino utilized his knowledge to deploy strategic planning while executing large HVAC Projects across the United States and built unprecedented relationships within the business and HVAC community.
De IT Regisseur - grip op IT met Integrated Service Management (ISM)De IT Regisseur B.V.
油
Zijn uw gebruikers niet tevreden over de ICT? Wilt u de kwaliteit van de ICT dienstverlening verbeteren? Heeft u altijd discussie over wie wat moet doen? En bent u vooral bezig met brandjes blussen? Dan wordt het tijd om Integrated Service Management of ISM速 methode te implementeren. De IT Regisseur kan u als implementatie partner helpen om uw IT dienstverlening op orde te krijgen.
The document discusses the role of information and communication technologies (ICTs) in supporting sustainable development. It notes that ICTs can help accelerate progress on all three pillars of sustainability: social inclusion, economic growth, and environmental sustainability. Specifically, ICTs can help enhance international cooperation, promote technology transfer, build capacity, forge partnerships, and improve data monitoring and accountability. The document provides several examples of how ICTs have supported sustainable development initiatives in areas like agriculture, healthcare, education, and environmental protection.
This study evaluated the differences in histological findings and stability between platform-switched implants and flat-to-flat interfaces. 26 patients received 43 implants, with some receiving a platform-switched abutment and others a flat-to-flat healing abutment. Biopsies at 3 months found no significant inflammatory cell infiltrate for either group. ISQ measurements also found no significant differences in stability between the groups over 3 months. The study concluded that platform-switching seems reliable for one-stage procedures and maintains stability comparable to flat-to-flat interfaces.
Learn why hundreds of corporations, tech firms, universities, health care organizations and government agencies are partnering with KinderCare Education to provide value-added family care benefits.
This document summarizes a study analyzing census data from India to assess digital inclusion at the village level. The study used analytical tools on publicly available census data to identify common characteristics of villages with similar levels of digital inclusion. Principal component analysis was used to select the most important features from over 90 available in the census data. Machine learning techniques like decision trees and random forests were trained on the data to predict digital inclusion and identify key drivers. The models found infrastructure facilities and socioeconomic indicators were important factors for higher digital inclusion.
This short document recommends visiting certain websites to become entertained and informed with leading information on unspecified topics as well as insightful tips, though it does not specify any particular websites or topics of interest.
China has implemented several policies to promote the growth of the wind power market, including a wind power concession system, requiring power grids to connect wind farms, and establishing a fixed wind energy price. Localization requirements mandate that new wind farms use at least 70% local equipment. Several state-owned energy companies have become major players in China's wind market, along with some domestic and Hong Kong-based companies, and China's wind power capacity grew significantly between 2008 and 2009.
The Evolution to LTE report confirms the status of the LTE market worldwide including LTE and LTE-Advanced network deployments (FDD and TDD), commercial service launches, the user devices ecosystem, subscriptions growth, regulatory developments including spectrum allocations, VoLTE, APT700, LTE Broadcast, LTE roaming, and highlights the main industry trends. The report is based on our own research and industry contacts and is our independent assessment and analysis, supported by facts and metrics.
442 LTE networks are now commercially launched in 147 countries.
380 operators deployed FDD mode only
44 operators deployed TDD mode only
18 operators deployed both FDD and TDD modes
73 operators commercially launched LTE service in 2015.
142 LTE operators are investing in LTE-Advanced deployments, studies or trials in 62 countries. 95 operators have commercially launched LTE-A networks in 48 countries.
111 operators in 52 countries investing in VoLTE deployments, studies or trials. 30 operators have commercially launched VoLTE-HD voice in 21 countries.
Raah International Pte -Jb all electrical and instrumentation catalogueSarah Shaikh
油
Raah International - Design | Supply | Installation for Junction box and supplies.
For Atex Hazardous and Non Hazardous Areas.
Junction Box | Enclosures | Cable Glands | Earthing and Lightning Products | Air Filter Motors and more.
Philip Cargnino has been a prevalent business owner in the HVAC Industry with over 30 years of experience. Philip Cargnino utilized his knowledge to deploy strategic planning while executing large HVAC Projects across the United States and built unprecedented relationships within the business and HVAC community.
De IT Regisseur - grip op IT met Integrated Service Management (ISM)De IT Regisseur B.V.
油
Zijn uw gebruikers niet tevreden over de ICT? Wilt u de kwaliteit van de ICT dienstverlening verbeteren? Heeft u altijd discussie over wie wat moet doen? En bent u vooral bezig met brandjes blussen? Dan wordt het tijd om Integrated Service Management of ISM速 methode te implementeren. De IT Regisseur kan u als implementatie partner helpen om uw IT dienstverlening op orde te krijgen.
The document discusses the role of information and communication technologies (ICTs) in supporting sustainable development. It notes that ICTs can help accelerate progress on all three pillars of sustainability: social inclusion, economic growth, and environmental sustainability. Specifically, ICTs can help enhance international cooperation, promote technology transfer, build capacity, forge partnerships, and improve data monitoring and accountability. The document provides several examples of how ICTs have supported sustainable development initiatives in areas like agriculture, healthcare, education, and environmental protection.
This study evaluated the differences in histological findings and stability between platform-switched implants and flat-to-flat interfaces. 26 patients received 43 implants, with some receiving a platform-switched abutment and others a flat-to-flat healing abutment. Biopsies at 3 months found no significant inflammatory cell infiltrate for either group. ISQ measurements also found no significant differences in stability between the groups over 3 months. The study concluded that platform-switching seems reliable for one-stage procedures and maintains stability comparable to flat-to-flat interfaces.
La Revoluci坦n Francesa comenz坦 debido a la pobreza generalizada de la poblaci坦n y el aumento de los impuestos bajo el reinado de Luis XVI. Tras una mala cosecha que elev坦 los precios de los alimentos, se convocaron los Estados Generales para abordar la crisis econ坦mica. El Tercer Estado, representado por Maximilien Robespierre, exigi坦 que los privilegiados pagaran impuestos, pero siempre perd鱈an las votaciones. Finalmente, se declararon la Asamblea Nacional y juraron no separarse hasta establecer una nueva constit
This document discusses monopoly power in markets. It defines a pure monopolist as a single supplier that dominates an entire market with 100% concentration. In reality, a working monopoly is deemed to be any firm with over 25% market share, while a dominant firm has at least 40% share. Monopolies can lead to higher prices and lower output compared to competitive markets. However, monopoly power also allows firms to invest profits into research and development. There are economic arguments both for and against monopolies, and intervention may or may not be effective depending on the specific market.
This document discusses the history and challenges of long-term data storage. It describes how storage media and conditions significantly impact longevity, with some analog images surviving over 17,000 years sealed in dry caves but other works deteriorating within 200 years without special efforts. Modern applications now require digital data storage for 5-25 years, with demands expected to increase. Technologies have evolved from tape to disk drives to improve capacity and meet long-term reliability needs.
The document summarizes a wine program called "A Festival of Festivals" that highlights four wine regions and festivals around the world. Four wines were crafted blending grapes from Australia, Argentina, Spain, and Italy to represent the regional festivals of Tjungu, Carrusel, La Batalla, and Carnevale respectively. Masks on the labels symbolize the cultural celebrations in each region. The wines will be released monthly from December to March, with the goal of inspiring consumers to create their own celebrations.
This document describes various WiFi and proximity marketing solutions including captive portals, roaming and federation, data retention, big data analytics, WiFi probing, advertisement injection, iBeacon proximity, proximity with wallet/app, and case histories. It provides details on features like welcome pages, user registration, traffic management, partner networks, data management, analytics tools, passive localization, content insertion, push notifications, and a simplified onboarding process for telecom companies.
The document discusses the evolution of wireless mesh networking technologies. It describes how early ad hoc networks led to developments in wireless sensor networks and wireless mesh networks (WMNs). WMNs provide wireless infrastructure by replacing wired networks with self-configuring, flexible wireless links. This allows for easier deployment in areas where wired infrastructure is not feasible or too expensive. The document outlines ongoing research into heterogeneous mesh networking using multiple wireless technologies to create high-capacity access networks for future applications.
The document outlines MobiMESH technology, which includes a wireless multihop backbone network and access points that allow Wi-Fi clients to connect. The backbone uses a radio-aware routing protocol to avoid interference. Mobility management allows clients to seamlessly roam between access points. The network is configured and managed centrally using a management system.
MobiMESH: Introduction to Wireless MESH Networksacapone
油
This document introduces wireless mesh networks (WMNs) and discusses their advantages over other wireless network types. It describes the Mobimesh project, an experimental WMN platform developed by Politecnico di Milano, and its deployment in Bagnara Calabra, Italy. Ongoing research activities are also summarized, including projects to develop hierarchical routing, automatic frequency assignment, improved mobility management, integrated WMN and sensor networks, and hybrid wireless/powerline networks.
MobiMESH: Introduction to Wireless MESH Networksacapone
油
4 Protocollo Ip
1. Il protocollo IP (Internet Protocol) Servizi offerti da IP Formato del pacchetto IP
2. Il servizio di comunicazione offerto da IP Connectionless progettato secondo un paradigma packet-oriented (o datagram) Due pacchetti (o datagrammi) destinati alla stesso host possono essere trattati in maniera diversa Non affidabile Consegna best-effort dei datagrammi senza garanzia di successo Analogia con il servizio postale ordinario
3. Pacchetto vs Circuito Virtuale Approccio a circuito virtuale: ATM, X25, Frame Relay Approccio a pacchetto: IP Source: Computer Networking, J. Kurose
4. Altri Servizi Offerti da IP Indirizzamento: assegna unindirizzo universalmente riconosciuto Frammentazione/Deframmentazione: frammenta/deframmenta i pacchetti se il livello locale lo richiede (IP 竪 pensato per funzionare su molteplici tecnologie di livello inferiore)
5. UDP TCP Lo stack IP base Livelli inferiori IP ICMP ARP routing 4 3
6. Il pacchetto (datagramma) IP Header 20 BYTE 1 32 bit Flags Ver HLEN Total length Fragment Identification Frag. Offset Source address TOS (DS) TTL Protocol Header Checksum Destination address Options: source routing, record route, timestamp Dati 16 fino a 40 BYTE
7. I campi dellheader IP Ver (4 bit): version : indica la versione del protocollo; IPv4, IPv6. Se il campo VER non corrisponde alla versione del protocollo implementata sul router ricevente, il pacchetto viene scartato. HLEN (4 bit) header length : indica la lunghezza dellheader del pacchetto espressa in parole da 32 bit (max 64 byte) Total length (16 bit): indica la lunghezza totale del pacchetto in byte: valore massimo 2 16 =65536; una volta sottratta la dimensione dellheader d la lunghezza del payload. Serve solo se il livello sottostante effettua padding riempitivo.
8. I campi dellheader IP TOS type of service (8 bit) Recentemente cambiato in Differentiated Services usato per la gestione delle priorit nelle code dei router, e per garantire QoS T R C D Precedence TOS bits
9. Il campo Protocol E un codice che indica il protocollo di livello superiore pi湛 protocolli di livello superiore possono usare IP (multiplazione) il codice identifica il SAP ( Service Access Point ) tra IP e il protocollo di livello superiore UDP TCP Livelli inferiori IP Valore Protocollo 1 ICMP 2 IGMP 6 TCP 17 UDP 89 OSPF
10. Il campo Time To Live (TTL) Il campo TTL viene settato ad un valore elevato da chi genera il pacchetto e viene decrementato da ogni router attraversato Se un router decrementa il valore e questo va a zero, il pacchetto viene scartato e viene generato un messaggio di errore verso la sorgente Time-out sulla validit di un pacchetto TTL=250 TTL=2 TTL=1 TTL=0 messaggio derrore: time exceeded
11. La Frammentazione (1) Alcuni protocolli di livello inferiore a cui IP si appoggia richiedono una dimensione massima del pacchetto IP ( Maximum Transfer Unit, MTU ) inferiore a 65536 bytes Pacchetto IP Header Trailer Pacchetto IP Protocollo MTU (byte) Token Ring 16Mb/s 17914 FDDI 4352 Ethernet 1500
13. La Frammentazione (3) prima di passare il pacchetto al livello inferiore IP divide il pacchetto in frammenti ciascuno con il suo header un frammento di un pacchetto pu嘆 essere frammentato ulteriormente lungo il cammino i frammenti verranno ricomposti dallentit IP del destinatario (frammenti di uno stesso pacchetto possono seguire diversi percorsi) i campi Identification, Flags e Frag. Offset sono usati per questo scopo
14. I campi usati per la frammentazione (1) Identification (16 bit) 竪 un campo che identifica tutti i frammenti di uno stesso pacchetto in modo univoco. E scelto dallIP che effettua la frammentazione Frag. Offset (13 bit) I byte del pacchetto originale sono numerati da 0 al valore della lunghezza totale. Il campo Frag. Offset di ogni frammento riporta il numero di sequenza del primo byte del frammento. esempio: se un pacchetto di 2000 byte viene diviso in due da 1000 il primo frammento avr un Frag Offset pari a 0 e il secondo pari a 1000/8
15. I campi usati per la frammentazione (2) Flags il bit M ( More ) 竪 pari a 0 solo nellultimo frammento il bit D ( Do not fragment ) viene posto a 1 quando non si vuole che lungo il percorso venga applicata la frammentazione in questo caso, se la frammentazione fosse necessaria, il pacchetto sarebbe scartato e verrebbe generato un messaggio di errore - M D
16. La Frammentazione in pratica Loverhead computazionale legato alla frammentazione pu嘆 essere rilevante Si tende, quindi, a non frammentare limitando la dimensione dei segmenti che arrivano allIP dal livello di trasporto. IP supporta tecnologie sottostanti in grado di gestire trame di almeno 576 byte Si pone la dimensione dei segmenti del livello di trasporto pari a 536 byte (+20byte TCP + 20byte IP) La maggior parte delle applicazioni per trasferimento di dati (HTTP) funzionano con dimensione di segmenti tra 512-536 byte.
17. Il campo Checksum: controllo di integrit Informazione ridondante inserita nellheader del pacchetto IP per controllo derrore Il campo di checksum (16 bit) 竪 calcolato dal trasmettitore ed inserito nellheader Il ricevitore ripete lo stesso calcolo sul pacchetto ricevuto (comprensivo di checksum ) Se il risultato 竪 soddisfacente accetta il pacchetto altrimenti lo scarta
18. Clacolo del Checksum lato trasmettitore Lheader 竪 diviso in blocchi da 16 bit Il Checksum 竪 inizializzato a 0 Tutti i blocchi vengono sommati modulo 2 Il risultato 竪 complementato ed inserito nel campo di checksum checksum tutti 0 + + + = somma complemento a 1
19. Clacolo del Checksum lato ricevitore Lheader 竪 diviso in blocchi da 16 bit Tutti i blocchi vengono sommati modulo 2 Il risultato 竪 complementato Se sono tutti 0 il pacchetto 竪 accettato Altrimenti 竪 scartato checksum + + + = somma complemento a 1
20. Le Opzioni La parte iniziale dellheader IP 竪 di 20 byte ed 竪 sempre presente Campi opzionali possono allungare lheader fino ad un massimo di 60 byte Opzioni usate per: Testing Debugging 20 BYTE 1 32 bit Flags Ver HLEN Total length Fragment Identification Frag. Offset Source address TOS TTL Protocol Header Checksum Destination address Options: security, source routing, record route, timestamp Dati
21. Le Opzioni Copy: 0 opzione copiata solo nel primo frammento 1 opzione copiata in tutti i frammenti code 8 bit length 8 bit data dimensione variabile copy 1 bit class 2 bit option number 5 bit Class: 00 controllo del frammento 10 gestione e debugging Option number: 00000 end of option (1 byte) 00001 no operation (1 byte) 00011 loose source route 00100 time stamp 00111 record route 01001 strict source route Richiedono il Campo dati
22. End Of Option e No operation Sono campi opzione di 1 byte utilizzati per fare padding Non hanno la parte di dati Source: TCP/IP Protocol Suite, B. Forouzan.
23. Record Route (1) Serve per registrare il percorso del pacchetto Il campo pointer punto al primo byte libero nella lista degli address Ogni volta che viene attraversato un router il suo indirizzo IP duscita viene registrato nel campo puntato e il pointer viene aumentato di 4 code 8 bit length 8 bit pointer 8 bit 1 st address 32 bit 2 nd address 32 bit 9 th address 32 bit 40 byte
25. Strict Source Route Implementa un meccanismo di source routing Tutti i campi address sono inizialmente pieni e indicano i router che si vuole vengano attraversati il puntatore viene incrementato di 4 ad ogni hop se viene raggiunto un router non previsto il pacchetto viene scartato e viene generato un messaggio di errore (usata molto raramente!!!) code 8 bit length 8 bit pointer 8 bit 1 st address 32 bit 2 nd address 32 bit 9 th address 32 bit 40 byte
26. Loose Source Route come la precedente, ma 竪 possibile visitare anche altri router (il pacchetto non viene scartato) (usata molto raramente!!!) code 8 bit length 8 bit pointer 8 bit 1 st address 32 bit 2 nd address 32 bit 9 th address 32 bit 40 byte
27. Time Stamp misura il tempo assoluto di uscita del pacchetto da un router il campo Over-Flow indica i router sul percorso che non hanno potuto aggiungere il timestamp il campo Flag indica la modalit operativa stabilita dal mittente code 8 bit length 8 bit pointer 8 bit 1 st address 32 bit 2 nd address 32 bit O-Flow 4 bit Flag 4 bit 1 st time stamp 32 bit 2 nd time stamp 32 bit
30. Internet Control Message Protocol (ICMP) E un protocollo per messaggi di servizio fra host e router per informazioni su errori e fasi di attraversamento della rete da questo punto di vista pu嘆 essere considerato come parte di IP i messaggi ICMP sono incapsulati e trasportati da IP, e quindi da questo punto di vista pu嘆 essere considerato un utente di IP IP ICMP IP Livelli inferiori ICMP
31. Internet Control Message Protocol (ICMP) Nel pacchetto IP il campo protocol indica il codice dellICMP il messaggio ICMP viaggia allinterno del pacchetto IP messaggio ICMP header IP header della trama MAC header ICMP payload della trama MAC payload pacchetto IP sezione dati del messaggio ICMP
32. Formato messaggi ICMP Type 0 Echo reply 3 Destination unreachable 4 Source Quench 5 Redirect (change a route) 8 Echo request 11 Time exceeded Type 11 Parameter problem 13 Timestamp request 14 Timestamp reply 17 Address mask request 18 Address mask reply type 8 bit code 8 bit checksum 16 bit resto dellheader 32 bit sezione dati lunghezza variabile
34. Funzionalit di Error Reporting ICMP non corregge errori, ma si limita a segnalarli. Levento errore 竪 notificato alla sorgente del pacchetto IP che lo ha causato Eventi gestiti Destination Unreachable (type 3) Source Quench (type 4) Time Exceeded (type 11) Parameter Problem (type 12) Redirection (type 5) I messaggi di errore contengono lheader del pacchetto IP che li ha generati e i suoi primi 8 byte di dati.
35. Destination Unreachable Quando un router scarta un pacchetto per qualche motivo normalmente genera un messaggio di errore che invia alla sorgente del pacchetto nel campo code 竪 codificato il motivo che ha causato lerrore ovviamente la generazione del messaggio avviene solo nei casi in cui il router pu嘆 accorgersi del problema il motivo pi湛 comune 竪 il fatto che la destinazione non 竪 presente nella tabella di routing ( code = 7) type (3) code (0-12) checksum non usato (0) header + primi 64 bit del pacchetto IP che ha causato il problema
36. Destination unreachable Alcuni Code: 0 network unreachable 1 host unreachable 2 protocol unreachable 3 port unreachable 4 fragmentation needed and DF set 5 source route failed ... type (3) code (0-12) checksum non usato (0) header + primi 64 bit del pacchetto IP che ha causato il problema
37. Time exceeded Code 0 (inviato dai router) Il messaggio di time exceeded viene usato quando il router decrementando il TTL lo pone a 0 il messaggio di time exceeded viene inviato alla sorgente del pacchetto Code 1 (inviato dalla destinazione) viene usato dalla destinazione quando non tutti i frammenti di un pacchetto arrivano entro un tempo massimo type (11) code (0-1) checksum non usato (0) header + primi 64 bit del pacchetto IP che ha causato il problema
38. Parameter problem Code 0 se lheader di un pacchetto IP ha una incongruenza in qualcuno dei suoi campi viene inviato il messaggio di parameter problem ; il campo pointer punta al byte del pacchetto che ha causato il problema Code 1 viene usato quando unopzione non 竪 implementata o qualche parte del campo opzioni manca type (12) code (0-1) checksum non usato (0) header + primi 64 bit del pacchetto IP che ha causato il problema pointer
39. Redirect Questo messaggio viene usato quando si vuole che la sorgente usi per quella destinazione un diverso router type (5) code (0-3) checksum indirizzo IP del router header + primi 64 bit del pacchetto IP A redirect dest. A dest. A
40. Funzionalit di diagnostica Coppie di messaggi secondo il paradigma domanda/risposta Tipi di messaggi: Echo Request/Reply (type 8,0) Timestamp Request/Reply (type 13/14) Address Mask Request/Reply (type 17/18) Router Solicitation/Advertisment (type 10/9)
41. Funzionalit di Echo I messaggi di Echo-request e Echo-reply sono usati per verificare la raggiungibilit e lo stato di un host o un router quando un nodo IP riceve un messaggio di Echo-request risponde immediatamente con un messaggio di Echo reply echo-request echo-reply
42. Messaggi Echo Il campo identifier viene scelto dal mittente della richiesta nella risposta viene ripetuto lo stesso identifier della richiesta pi湛 richieste consecutive possono avere lo stesso identifier e differire per il sequence number una sequenza arbitraria pu嘆 essere aggiunta dal mittente nel campo optional data e deve essere riportata uguale nella risposta type (8 request, 0 reply) code (0) checksum identifier optional data sequence number
45. Traceroute: come funziona? Il traceroute usa (normalmente) messaggi di Echo-request verso la destinazione I primo messaggio ha il TTL=1 echo-request Time-exceeded TTL=1 TTL:=TTL-1=0
46. Traceroute: come funziona? I secondo messaggio ha il TTL=2 echo-request Time-exceeded TTL=2 TTL:=TTL-1=1 TTL:=TTL-1=0
47. Traceroute: come funziona? I terzo messaggio ha il TTL=3, e cos狸 via echo-request Time-exceeded TTL=3 TTL:=TTL-1=2 TTL:=TTL-1=1 TTL:=TTL-1=0
48. Timestamp request e reply Questo messaggio viene usato per lo scambio di informazioni sul clock di sorgente e destinazione originate timestamp: viene riempito dalla sorgente receive timestamp : viene riempito dalla destinazione appena ricevuto il pacchetto transmit timestamp: viene riempito dalla destinazione immediatamente prima di inviare il pacchetto di risposta type ( 13 request, 14 reply) code (0) checksum originate timestamp identifier sequence number receive timestamp transmit timestamp
49. Address mask request e reply Questo messaggio viene usato per conoscere la netmask di un host/router Il campo address mask viene riempito dal destinatario type ( 17 request, 18 reply) code (0) checksum address mask identifier sequence number