-All test will be conducted in a virtual environment. We will use VirtualBox to run a Linux distro with the product installed. All the tests are performed from within the VirtualBox environment. When testing network transmissions we will only analyze the packets sent/received to/from the guest OS. The host system is disconnected from the Internet or any other network in order to prevent unnecessary traffic.
-
-For each test case (except for the basic tests) a file containing previously captured network traffic will be replayed using Wireshark. We will use tcpdump to update the prepared packets with the MAC address of the guest network adapter. The response packets coming from the guest OS will be recorded and analyzed at a later stage. The valid packets are obtained by capturing traffic between known working alternatives to the SUT. Invalid packets are generated from this valid traffic using tcpdump. The boundary values for the different parameters (fields in packets) are determined by hand. Automated scripts are written that will generate packets with some fields replaced with these boundary values. The performance analysis will consists of measured latencies for all packets sent.
-
+All test will be conducted in a virtual environment. We will use VirtualBox to
+run a Linux distribution with the product installed.
+The Linux distribution in question is Ubuntu.
+All the tests are performed from within the VirtualBox environment.
+When testing network transmissions we will only analyze the packets sent/received to/from the SUT. The host system is disconnected from the Internet or any other network in
+order to prevent unnecessary traffic.
+% Dit is niet nodig omdat het via loopback gaat
+% Zeker weten? de SUT ontvangt ook niet loopback packets toch?
+
+For each test case (except for the \emph{manual tests}) a file containing previously
+captured network traffic will be replayed using Wireshark. We will use Bit-Twist
+to update the prepared packets with the MAC address of the guest network
+adapter. The response packets coming from the SUT will be recorded and
+analyzed and validated according to the \textit{RFC793} specification.
+The valid packets are build manually from the \textit{RFC793} specification.
+Invalid packets are generated from this valid traffic using Bit-Twist.
+The boundary values for the different parameters (fields in packets) are determined by hand. Automated scripts are used in order to generate packets with some fields replaced with these
+\emph{boundary values}.
+
+% Dit is mooier om footnotes van te maken en te gebruiken als het voor het
+% eerst gerefereerd is
+% WAT HOE?