Computing in Communication Networks: From Theory To Practice 1st Edition Frank Fitzek Instant Download
Computing in Communication Networks: From Theory To Practice 1st Edition Frank Fitzek Instant Download
https://textbookfull.com/product/computing-in-communication-
networks-from-theory-to-practice-1st-edition-frank-fitzek/
https://textbookfull.com/product/forensic-communication-in-
theory-and-practice-1st-edition-coll/
https://textbookfull.com/product/structures-of-computing-a-guide-
to-practice-oriented-theory-1st-edition-egon-borger/
https://textbookfull.com/product/machine-learning-in-finance-
from-theory-to-practice-matthew-f-dixon/
https://textbookfull.com/product/c-from-theory-to-practice-
george-s-tselikis/
Research Methods: From Theory to Practice Ben Gorvine
https://textbookfull.com/product/research-methods-from-theory-to-
practice-ben-gorvine/
https://textbookfull.com/product/serious-games-in-physical-
rehabilitation-from-theory-to-practice-1st-edition-bruno-
bonnechere-auth/
https://textbookfull.com/product/artificial-intelligence-in-
medical-imaging-from-theory-to-clinical-practice-1st-edition-lia-
morra-author/
https://textbookfull.com/product/contemporary-feminist-research-
from-theory-to-practice-patricia-leavy/
https://textbookfull.com/product/occupational-health-ethics-from-
theory-to-practice-jacques-tamin/
Computing in
Communication
Networks
From Theory to Practice
Computing in
Communication
Networks
From Theory to Practice
Edited by
Frank H.P. Fitzek
Technische Universität Dresden
Dresden, Germany
Fabrizio Granelli
University of Trento
Trento, Italy
Patrick Seeling
Central Michigan University
Mount Pleasant, MI, United States
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2021 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further
information about the Publisher’s permissions policies and our arrangements with organizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods, professional practices, or medical treatment
may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume
any liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.
ISBN: 978-0-12-820488-7
List of contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
About the editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Preface from the editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxv
v
vi Contents
PART 2 CONCEPTS
CHAPTER 3 Network slicing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Fabrizio Granelli
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.2 Network slice: concept and life cycle . . . . . . . . . . . . . . . . . . 65
3.3 Network slicing architectures . . . . . . . . . . . . . . . . . . . . . . . 67
3.3.1 Single owner, single controller . . . . . . . . . . . . . . . . . 69
3.3.2 Single owner, multiple tenants – SDN proxy . . . . . . . 70
3.3.3 Multiple owners, tenants . . . . . . . . . . . . . . . . . . . . . . 71
3.4 Network slicing examples . . . . . . . . . . . . . . . . . . . . . . . . . . 72
CHAPTER 4 Mobile edge cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Roberto Torre, Tung Doan, Hani Salah
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.2 Mobile edge cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.2.1 Similar concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.2.2 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.2.3 Key enablers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.2.4 General architecture . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.3 MANO frameworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.4 MEC example implementations . . . . . . . . . . . . . . . . . . . . . . 86
4.4.1 Tron demonstrator . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.4.2 Ball sorting machine . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.4.3 Ambulance demonstrator . . . . . . . . . . . . . . . . . . . . . 87
4.4.4 Seamless migration for autonomous cars . . . . . . . . . . 88
CHAPTER 5 Content distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Hani Salah, Sandra Zimmermann, Juan A. Cabrera G.
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.2 Content delivery networks . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.2.1 Content distribution . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.2.2 Request routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.3 Information-centric networking . . . . . . . . . . . . . . . . . . . . . . 97
5.3.1 Operation primitives and packet types . . . . . . . . . . . . 99
5.3.2 Content naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.3.3 In-network caching . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.3.4 Node architecture and packet handling . . . . . . . . . . . 100
5.3.5 Content-based security . . . . . . . . . . . . . . . . . . . . . . . 103
PART 6 EXAMPLES
CHAPTER 14 Realizing network slicing . . . . . . . . . . . . . . . . . . . . . 259
Fabrizio Granelli, Truong Giang Nguyen, Huanzhuo Wu
14.1 Network slicing in Mininet . . . . . . . . . . . . . . . . . . . . . . . . 259
14.1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.1.2 Link capacity slicing . . . . . . . . . . . . . . . . . . . . . . . 260
14.2 Network slicing in ComNetsEmu . . . . . . . . . . . . . . . . . . . 263
14.2.1 Example 1: topology slicing . . . . . . . . . . . . . . . . . 265
14.2.2 Example 2: service slicing . . . . . . . . . . . . . . . . . . 268
14.2.3 Example 3: SDN proxy-based slicing . . . . . . . . . . 273
CHAPTER 15 Realizing mobile edge clouds . . . . . . . . . . . . . . . . . 277
Zuo Xiang, Carl Collmann, Patrick Seeling
15.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
15.2 Mechanisms and practical implementation . . . . . . . . . . . . 280
15.2.1 Without SDN/NFV technologies . . . . . . . . . . . . . . 280
15.2.2 With SDN/NFV technologies . . . . . . . . . . . . . . . . 280
15.3 ComNetsEmu experimentation . . . . . . . . . . . . . . . . . . . . . 283
x Contents
PART 7 EXTENSIONS
CHAPTER 24 Connecting to the outer world . . . . . . . . . . . . . . . . . 389
Fabrizio Granelli
24.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
24.2 Connecting ComNetsEmu to the Internet . . . . . . . . . . . . . 389
24.2.1 Manual host configuration . . . . . . . . . . . . . . . . . . 390
24.2.2 Using NAT service . . . . . . . . . . . . . . . . . . . . . . . . 393
24.2.3 Using DNS resolution . . . . . . . . . . . . . . . . . . . . . . 393
24.3 Connecting different test bed VMs . . . . . . . . . . . . . . . . . . 394
24.4 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
24.4.1 Exercise 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
24.4.2 Exercise 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
CHAPTER 25 Integrating time-sensitive networking . . . . . . . . . . 401
Marian Ulbricht, Javier Acevedo
25.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
25.2 IEEE802.1AS – if timing matters . . . . . . . . . . . . . . . . . . . 402
25.3 Different shapes of packets – IEEE802.1Qav and
IEEE802.1Qbv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
25.3.1 Credit-based shaper . . . . . . . . . . . . . . . . . . . . . . . 404
25.3.2 Time-aware shaper . . . . . . . . . . . . . . . . . . . . . . . . 407
25.4 IEEE802.1Qci – you shall not pass! . . . . . . . . . . . . . . . . . 407
25.5 IEEE802.1Qbu, IEEE802.3br – filling the gaps . . . . . . . . . 409
25.6 Hands-on: time-sensitive queueing in the new Linux kernel
5.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
25.6.1 ComNetsEmu setup . . . . . . . . . . . . . . . . . . . . . . . 410
25.6.2 Using the TAS simulator . . . . . . . . . . . . . . . . . . . . 410
25.6.3 Preparing the TAS . . . . . . . . . . . . . . . . . . . . . . . . 411
25.6.4 Measurement and results . . . . . . . . . . . . . . . . . . . . 411
Contents xiii
PART 8 TOOLS
CHAPTER 27 Networking tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Sreekrishna Pandi, Alexander Kropp,
Roland Schingnitz, Sebastian A.W. Itting
27.1 Connectivity testing – ping . . . . . . . . . . . . . . . . . . . . . . . . 432
27.2 Basic network administration – iproute2 . . . . . . . . . . . . . . 433
27.2.1 ip addr . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
27.2.2 ip link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
27.2.3 ip route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
27.3 Traffic generation – iPerf . . . . . . . . . . . . . . . . . . . . . . . . . 436
27.4 Process monitoring – htop . . . . . . . . . . . . . . . . . . . . . . . . . 438
27.5 Network traffic manipulation – TC . . . . . . . . . . . . . . . . . . 439
27.6 Traffic monitoring – tcpdump/Wireshark . . . . . . . . . . . . . . 444
27.6.1 tcpdump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
27.6.2 Wireshark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
27.7 Rapid Python prototyping – Jupyter . . . . . . . . . . . . . . . . . 448
27.8 Hands-on example to tie all tools together . . . . . . . . . . . . . 451
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
List of contributors
Javier Acevedo
Technische Universität Dresden, Dresden, Germany
Riccardo Bassoli
Technische Universität Dresden, Dresden, Germany
Riccardo Bonetto
Technische Universität Dresden, Dresden, Germany
Juan A. Cabrera G.
Technische Universität Dresden, Dresden, Germany
Carl Collmann
Technische Universität Dresden, Dresden, Germany
Tung Doan
Technische Universität Dresden, Dresden, Germany
Frank H.P. Fitzek
Technische Universität Dresden, Dresden, Germany
Fabrizio Granelli
University of Trento, Trento, Italy
Simon Hanisch
Technische Universität Dresden, Dresden, Germany
Thomas Höschele
Technische Universität Dresden, Dresden, Germany
Malte Höweler
Technische Universität Dresden, Dresden, Germany
Sebastian A.W. Itting
Technische Universität Dresden, Dresden, Germany
Bruno Jacobfeuerborn
Deutsche Telekom Group, Bonn, Germany
Alexander Kropp
Technische Universität Dresden, Dresden, Germany
Vincent Latzko
Technische Universität Dresden, Dresden, Germany
xv
xvi List of contributors
Tao Li
Technische Universität Dresden, Dresden, Germany
Truong Giang Nguyen
Technische Universität Dresden, Dresden, Germany
Amr Osman
Technische Universität Dresden, Dresden, Germany
Sreekrishna Pandi
Technische Universität Dresden, Dresden, Germany
Morten V. Pedersen
Technische Universität Dresden, Dresden, Germany
Justus Rischke
Technische Universität Dresden, Dresden, Germany
Hani Salah
Technische Universität Dresden, Dresden, Germany
Roland Schingnitz
Technische Universität Dresden, Dresden, Germany
Robert-Steve Schmoll
Technische Universität Dresden, Dresden, Germany
Patrick Seeling
Central Michigan University, Mount Pleasant, MI, United States
Peter Sossalla
Technische Universität Dresden, Dresden, Germany
Thorsten Strufe
Technische Universität Dresden, Dresden, Germany
Maroua Taghouti
Technische Universität Dresden, Dresden, Germany
Máté Tömösközi
Technische Universität Dresden, Dresden, Germany
Roberto Torre
Technische Universität Dresden, Dresden, Germany
Marian Ulbricht
Technische Universität Dresden, Dresden, Germany
List of contributors xvii
Frank H.P. Fitzek is Professor and head of the “Deutsche Telekom Chair of Com-
munication Networks” at TU Dresden coordinating the 5G Lab Germany since 2014.
He is the spokesman of the DFG Cluster of Excellence “Center for Tactile Internet”
(CeTI). He received his diploma (Dipl.-Ing.) degree in electrical engineering from the
University of Technology – Rheinisch-Westfälische Technische Hochschule (RWTH)
– Aachen, Germany, in 1997 and his Ph.D. (Dr.-Ing.) in Electrical Engineering from
the Technical University Berlin, Germany, in 2002 and became Adjunct Professor at
the University of Ferrara, Italy, in the same year. In 2003, he joined Aalborg Uni-
versity as Professor. In 2015, he was awarded the honorary degree “Doctor Honoris
Causa” from Budapest University of Technology and Economics (BUTE).
xix
Preface from the editors
This book is the result of a series of tutorials, generally on the topic of Computing in
Communication Networks, that we offered at several IEEE conferences over the last
years. Furthermore, parts of this book are outcomes of our lecture series in Dresden,
such as Communication Networks I, II, and III, Network Coding, and Cooperation
in Communication Networks. These particular courses are based on classical lecture
elements and aligned with several problem-based learning course elements, where
the students work on their individual (mini) projects. Therefore we hope that other
educators will find this book helpful in providing easy access to the topic. We simi-
larly hope that students in courses related to computing in communication networks
will find this book helpful to provide valuable learning experiences, particularly by
means of the examples presented in this book.
This book features several tutorial-style chapters in its beginning to provide (stu-
dent) readers with a basic understanding of communication systems and technologies,
assuming a basic familiarity with the overall content domain. We keep this introduc-
tory content to a minimum and focus directly on applied examples for an intuitive
approach to the subject matter. Whenever possible, we provide the interested reader
with additional background references for further studies. We similarly note that the
examples provided in this book are optimized for teaching purposes and are not suited
for production. This book is also the outcome of direct requests from our students
over the last years to have a complete lecture script rather than a set of, hopefully
nice, slides. It is always difficult to aim at a moving target, and the topic of this book
is so current that we had to make a choice of the content to include, selecting what
will likely have the highest possible impact in the future. We maintain a companion
website for this book to improve the provided examples, introduce additional content
over time, and to collect your feedback.
https://cn.ifn.et.tu-dresden.de/compcombook
xxi
xxii Preface from the editors
FIGURE 0.1
Structure of this book.
The first four parts are helpful information for the reader to understand the examples
and to motivate the need for computing in future communication networks.
The core of this book is the ComNets emulator described in Part 5 together with
the underlying software implementations Mininet and Docker. Experts that are famil-
iar with the underlying theoretical topics could directly start with this part. In Part 6,
examples are provided to deploy the various technologies described in the prior parts
of the book. Part 7 contains extensions to the ComNets emulator. The last part, Part 8,
introduces the basic tools used in the aforementioned examples.
Now we wish all students a lot of fun reading this book and trying out the exam-
ples. We look forward to new examples that will be generated in our Problem-Based
Learning courses in the future.
First of all, the editors would like to thank the numerous authors that have contributed
the different chapters to this book. Most of the authors were Ph.D. students or post-
docs at the time of writing with the Deutsche Telekom Chair of Communication
Networks. They have contributed significant time in addition to their regular duties
to make this book possible. We express deep gratitude to the Deutsche Telekom,
especially Tim Höttges, Claudia Nemat, Alex Jin Sung Choi, Antje Williams, and
Daniel Brower, for their continuous support over the last years and their insights into
the future of communication systems. Several examples presented in this book have
been carried out with the 5G Lab Germany, comprised of 23 professors, over 600
researchers, and 20 industrial partners. We would like to explicitly mention Bosch,
BMW, DE-CIX, Ericsson, Magna, Nokia, and Volkswagen. The Centre for Tactile
Internet with Human-In-The-Loop (CeTI) provided us with an abundance of moti-
vation over the last years, showing the clear need for computation in the network
beyond 5G use cases. With the financial support of the center, we are able to con-
duct research in this exciting field. We thank our design team Jens Krzywinski, Tina
Bobbe, Lisa Lueneburg, and their team members for the support in generating de-
signs and graphics for several demonstrators and illustrations presented in the book.
Special thanks go to Oleksandr Zhdanenko and Ievgen Kharabet for the wonderful
design and illustration of numerous virtual worlds. Their work did not only give the
book a nice look, but over the last years helped us to convey the main idea of future
communication systems to the public. The work on this book would not have been
possible without the endless support of our universities Technische Universität Dres-
den, University of Trento, and Central Michigan University. We are deeply thankful
to Christian Scheunert for his support in managing the LATEX sources and his patience
over the last months. It is his achievement to have all the sources of this book pulled
together.
xxiii
Acronyms
1G 1st Generation
2G 2nd Generation
3G 3rd Generation
3GPP 3rd Generation Partnership Project
4G 4th Generation
5G 5th Generation
ACK Acknowledgement
ACM Association for Computing Machinery
ADC Analog-to-Digital Converter
AI Artificial Intelligence
AII Administrative Instance Identifier
AKA Authentication and Key Agreement
AMF Access Management Functions
AMP Approximate Matching Pursuit
ANN Artificial Neural Network
ANNs Artificial Neural Networks
API Application Programming Interface
AR Augmented Reality
ARIB Association of Radio Industries and Businesses
ARP Address Resolution Protocol
ARPANET Advanced Research Projects Agency NETwork
ARQ Automatic Repeat reQuest
AS Autonomous System
ASIC Application-Specific Integrated Circuit
ATIS Alliance for Telecommunications Industry Solu-
tions
xxv
xxvi Acronyms
BP Basis Pursuit
BPDN Basis Pursuit De-Noising
BPF Berkley Packet Filter
BS Base Station
BSI British Standards Institution
BW BandWidth
CA Collision Avoidance
CAPEX CAPital EXpenses
CART Classification And Regression Tree
CBS Credit-based Shaper
CCE Categorical CrossEntropy
CCN Content-Centric Networking
CCSA China Communications Standards Association
CDF Cumulative Distribution Function
CDMA Code-Division Multiple Access
CDN Content Delivery Network
CDNs Content Delivery Networks
CFS Customer Facing System
Cgroups Control Groups
CIR Commited Information Rate
CLI Command Line Interface
CMP Constrained Matching Pursuit
CN Core Network
CNN Convolutional Neural Network
COIN Computing in the Network
COINRG Computing in the Network Proposed Research
Group
ComNetsEmu ComNets Emulator
CoSaMP Compressive SaMPling
COTS Commercial Off-The-Shelf
CPRI Common Public Radio Interface
CPS Cyber-Physical System
CPU Central Processing Unit
C-RAN Cloud Radio Access Network
CRC Cyclic Redundancy Check
CS Content Store
CSI Channel State Information
CSMA Carrier-Sense Multiple Access
Acronyms xxvii
I/O Input/Output
ICMP Internet Control Message Protocol
ICN Information-Centric Networking
Acronyms xxix
L2 OSI Layer 2
L3 OSI Layer 3
LAN Local Area Network
LARS Least Angle Regression
LASSO Least Absolute Shrinkage and Selection
Another Random Scribd Document
with Unrelated Content
298 VisscHER (Schip), 6. VlAMINGH V. OUDTSHOORN
(Arnold de), 191, 12. Vlamingh (Willem de), 30. Vleermuijse of
Vlersmus Eijl., 24, 82. Vliegebay, 86. Vlissingen, 129, T4. Voeten
(Oude Amst.e), 262, gg. Vriendschaps of Tonga E.^n^ zie T. Vries
(David Pietersz de), 34. Vries (Marten Gerritsz), 153, 185, 5, 6, 9,
16, 17, 97. Vrouwenborsten (Eil.), 57. VuLCANis of Het Brandende
EijLANT, zie B. Vulkaan of Manam (Eil.), zie M. VUURLAND, 33.
Vyanen, zie Viana. W. Wagenaar (Jan), 262, 264. Wahaai, 256.
Waigeoe (Eil.), 125 — 128, 249, 251, 5P. 60, 78, 94. Waigeoe
(Straat), pj. Wai Saleja (Hk.), 132. „ Selah (Hk.), 256. Wajag (Eil.),
126. Wakde E.en^ 115, 123, j'p. Walch (Johannes), 263. Walker (J.
B.), 212, 214, 231, 232. „ MemorialVolume,2I3, 231, 232, 36.
Walvisschen, 23. Wanga (Jurregan), 133. Wariai (Hk.), 60.
Wassenaer (N. V.), 26. Wateren (Ambonsche), 2. „ (Chin.), 4, 3.
(Ind.), 3. „ (Jap.), 4, 3, 14. Waterplaets, 82, 83. Water-weereld, zie
Zee-Atlas. Wedda E.kn, 60. r, (Hk.), 130, 60. Weeskamer v. Bat., 12.
Weesp (Schip), 2. Wellesley E.en, 86. Wesel (Schip), 142, i68,
172,2(5. Wessel (Eil), 87. Westewindenweer, 228. West-Indië, zie I.
West-Ind. Compagnie, 65. „ Octroij, 156, 167, 183, 75' Wiak (Eil.),
122, 256. WiCHMANN (A.), 213, 214, 216, 270, 20, 37, 34— 5Ó, 60.
Wieder (F. C), 267. W1E1 of Jacouinot (Eil.), 112. Wilhelm Frederik
(Pr.v.0,), ï86. WiLLAUMEZ (Sch.eil.), 107, 108. Willems Rhede, 119.
WiLLEMS of WiLMS RiV., 143, 148, 149, 155, 162, 175, 183, 29, jo,
33, 40, 41, 61, 81, 88. WiLLiAM (Kp. King), 38. Wilmot Range, 24,
224, 225. WiTOE of Fransche E.en, zie F. Wit (Frederick de), 269.
Wits (de) E.^n, 29, 71. WiTSEN of WiTZEN (Comelis), 144, 153.
157» 164, 173, 270, 271, 8t, g6. WiTSEN (Corn.) Reede, 119. E.EN,
4^, „ Riv., 86. „ (Nicolaas), 15, 270, 271. WiTT (G. F. de), 27, 28. „ „
's LAND, 175, 27, 28. WiTT (de) -District, 27. WoENOH Baai, 126.
W01DE (Ch, G.), 271, 70. WoKEO of RoissY (Eil.), zie R.
299 WONNERAM of FeNI E.^N^ 97. Y. Yk (Cornelis v.), pj.
Ymuiden, 8j. York of Carpentaria (Sch.eil.), 24, 41, Ss^ Z. Zaragoza
(Oon Juste de), j/. Zee (Indische), zie OceaaN. Zee-Atlas ofte Water-
WeeRELD, 269, SSZee-meeuw (Schip), 169, 170, 173, 180—183,
272. 7S, 75, 76. 77. Zee-Spiegel, 206, 209. Zeefakkel (Ne Lichtende),
jj. Zeehaan (Mt.), 24, 224, 225, 227, 44. Zeehaen (Schip), 3 — 11,
14 — 17, 20—22, 25—29, 32, 34,36,37. 40—43, 48—53. 6r, diy 73,
74, 79,83,84,87, 90, 97, loi, 113 — 116, 130, 143 — 145, 151 —
i54> 157 — 159, 163—166, 169, 184, 200, 210, 216, 272, 5', 39,
40, 43, 44, 46, 52, 61, 63, 71, 73. 78. Zeehaen's Bocht, 45, 234, 47,
48, 68. Zeekaarten, zie K. Zeelandia (Fort), 5. Zeelandia Nova, zie N.
Zeerobben, 19. Zeeuwsche Nachtegaal (Schip), 2. Zeevaarders
(Holl.), J, 17. „ (Port.), 144, 37' (Sp.), 17, 84 Zeevaert (Cleyne en
groote), 205. Zei laanwijzingen (Bat.-Pescadores), 16. Zeilaanwijz.
(Bat.-Punte Gale), p. „ (Britsche), 231, 50, Zeilaanwijz. in de Chin.
wateren, 5. Zeilsteen (Mijnen v.), zie M. Zilverschepen (Sp.), 8.
Zilvervloot (Sp.), 17. Zoute E.kn, 6. Zuiderzee. 87. ZUIDLAND,
ZUIJDTLANDT, ZuiDERLAND of SUIJDERLANDT, I, 21, 44, 142 —
145, 148, 149, 153— 157, 159—164, 166—177, 182— 185, 266,
270, 272, 8, IJ, 17, 18, 21—26, 33—38, 41— 44. 55, 61—63, 67, 7^
—76. 81, 87, p/, p4, 95. Zuidoost BAAiof Haven (Maur.), 12, 13, 215,
218. Zuidpool, 37. „ -K.AART, 268. Zuidzee, Zuijtzee of Suijtsee, 87,
143, 148, 149, 155, 165— 167, 173—175. 183. 271, 34. 33, 40, 42,
47, 49, 50, 61, 62, 74. 81. 84. Zuidzee E.en, j6, 42, 97. Zunda, zie
Soenda. Zutphen (Schip), 6. ZuiJD Caep, 30, 31. Zuijdwijck (Adriaen
v.), 169.
VERBETERINGEN. P. 38 reg.J^ V. 0. staat: dach moet zgn :
middach l) »43 , 12 V. 0. „ NOtN n OtN2) „119 en 127, , , I V. 0, 9
Sept. >» 8 Sept. „ t20 , , I V. 0. , Mamberomno 1» Mamberonmo.
,,151 , 2 V. b. , insoleutie »» insolentie. » 233 , I V. 0. , , NOtN n OtN
„ XXVII , , I V. 0. de Witt's krt. »> Hess. Gerr.'s krt „XXX , , 3 en 20 ,
, D. Hartog n D. Hartogs. „ XXXIV , , 8v.b. , Cornelisz. 1» Willem
Corn. „ XXXVIII , , 3 V. 0. , sub 12 M sub 2. „ LVII , 8v.b. , Oembooi
» Oemboi. „ LXXXV , , 21 V. b. , Musgrave E. »> Mulgrave E. „
LXXXVI , , I V. 0. , hierachter »> sub 8 en 9. i) Dit moet een
schrijffout wezen van den copieerder van het Extract-Journaal,
hetgeen blijkt uit de alstoen genomen peilingen in verband met het
middagbestek. 2) Als boven, zooals blijkt uit de bestekken tusschen
^ bij NO H.* Moordenaers Baai, 17/18 Dec. en ^ Admiralty Bay, 21
Dec, in verband met den Journaaltekst in die dagen; o.a. op 20 Dec.
(p. 46, reg. 9 v. b.).
The text on this page is estimated to be only 8.13%
accurate
I
The text on this page is estimated to be only 0.00%
accurate
IJftl*-?' ^^^ÈU±
The text on this page is estimated to be only 0.00%
accurate
V
The text on this page is estimated to be only 0.00%
accurate
^
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com