throbber
Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 1 of 302
`Case 1:16—cv-02690-AT Document 109-7 Filed 07/19/16 Page 1 of 302
`
`
`
`
`EXHIBIT F
`
`EXHIBIT F
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 2 of 302
`
`PACKET
`RADIO
`NETWORKS
`
`Architectures, Protocols, Technologies
`and Applications
`
`Clifford A Lynch&Edwin B Brownrigg
`
`Press
`
`f
`'j
`-,
`~ ii
`i
`i ~(cid:173)I
`I f-
`I 1--
`
`-I
`
`l
`
`f
`1
`
`ss-
`
`~
`
`-- ..
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 3 of 302
`
`Packet Radio Networks
`Architectures, Protocols, Technologies
`and Applications
`
`~~=~~"=:J¥%iT ;_- -
`
`~~~ -- , - - - - - - - - - - ---
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 4 of 302
`
`Packet Radio Networks
`Architectures, Protocols, Technologies
`and Applications
`
`CLIFFORD A. LYNCH
`and
`
`EDWIN B. BROWNRIGG
`Division of Library Automation
`Office of the President and Universitywide Services
`University of California, Berkeley, California 94720
`
`PERGAMON PRESS
`OXFORD· NEW YORK· BEIJING · FRANKFURT
`sAo PAULO . SYDNEY . TOKYO . TORONTO
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 5 of 302
`
`U.K.
`
`U.S.A.
`
`PEOPLE'S REPUBLIC
`OF CHINA
`FEDERAL REPUBLIC
`OF GERMANY
`BRAZIL
`
`AUSTRALIA
`
`JAPAN
`
`CANADA
`
`Pergamon Press, Headington Hill Hall,
`Oxford OX3 OBW, England
`Pergamon Press, Maxwell House, Fairview Park,
`Elmsford, New York 10523, U.S.A.
`Pergamon Press, Room 4037, Qianmen Hotel, Beijing,
`People's Republic of China
`Pergamon Press, Hammerweg 6,
`D-6242 Kronberg, Federal Republic of Germany
`Pergamon Editora, Rua Er;:a de Queiros, 346,
`CEP 04011, Paraiso, Sao Paulo, Brazil
`Pergamon Press Australia, P.O. Box 544,
`Potts Point, N.S.W. 2011, Australia
`Pergamon Press, 8th Floor, Matsuoka Central Building,
`1-7-1 Nishishinjuku, Shinjuku-ku, Tokyo 160, Japan
`Pergamon Press Canada, Suite No. 271,
`253 College Street, Toronto, Ontario, Canada MST 1 R5
`
`Copyright © 1987 C. A. Lynch and E. B. Brownrigg
`
`All Rights Reserved. No part of this publication may be
`reproduced, stored in a retrieval system or transmitted
`in any form or by any means: electronic, electrostatic,
`magnetic tape, mechanical, photocopying, recording or
`otherwise, without permission in writing from the
`publishers.
`First edition 1987
`
`Library of Congress Cataloging in Publication Data
`Lynch, Clifford A.
`Packet radio networks.
`Bibliography: p.
`Includes index.
`I. Brownrigg,
`1. Radio-Packet transmission.
`Edwin Blake, 1946-
`.
`II. Title.
`TK6562.P32L96 1987 004.6
`87-25874
`
`British Library Cataloguing in Publication Data
`Lynch, Clifford A.
`Packet radio networks: architectures,
`protocols, technologies and applications.
`1. Packet switching (Data transmission)
`2. Radio
`I. Title
`II. Brownrigg, Edwin B.
`004.6'6
`TK5105
`ISBN 0-08-035913-2
`
`Printed in Great Britain by A. Wheaton & Co. ltd., Exeter
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 6 of 302
`
`CONTENTS
`
`Introduction
`
`PART I: PACKET RADIO SYSTEMS
`
`Chapter 1: System Requirements
`
`A Taxonomy of Packet Radio Systems
`System Configurations
`
`Chapter 2: System Design Considerations
`
`Components of a Packet Radio Node
`Integrating a Packet Radio With a Terminal
`Integrating a Packet Radio With a Personal Computer
`System Design Considerations
`Spread Spectrum Techniques
`
`PART II: TECHNOLOGIES FOR PACKET RADIO
`
`Chapter 3: Security and Authentication in Packet
`Radio Networks
`
`A General Perspective on Security
`Security Threats and Countermeasures
`Directional Antenna Considerations
`Spread Spectrum Considerations
`Encryption Techniques
`Authentication
`Summary
`
`ix
`
`3
`
`3
`17
`
`23
`
`24
`31
`34
`35
`51
`
`61
`
`61
`63
`72
`73
`74
`81
`84
`
`V
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 7 of 302
`
`---·JIIIIIIIIIII
`
`vi
`
`Packet Radio Networks
`
`(
`
`Chapter 4: Managing Overload
`
`Overload in Computer Networks
`Managing Overload in a Contention Broadcast Channel
`Control Techniques for Network-Level Overload
`Control Techniques for End-to-End Overload
`Conclusions and Recommendations
`
`Chapter 5: Routing, Repeating, Power Control,
`and Directional Techniques
`
`Issues in Routing
`Components of a Routing Strategy
`Assumptions
`Routing Strategies
`Summary and Recommendations
`
`Chapter 6: P.acket Radio in the HF Bands
`
`The "Thin-Route" Problem
`HF Radio Propagation
`Data Rates
`Interconnection with Line-of-Sight, Wide-Area Networks
`
`Chapter 7: Packet Size and Fragmentation
`
`Packet Size and System Performance
`Factors Affecting Optimal Packet Size
`Selection of Packet Size as an Optimization Problem
`Implementation Considerations
`
`Chapter 8: Antenna Design
`
`Introduction
`Functional Requirements of an Antenna Subsystem
`Antenna Technology
`Log-Spiral Antennae
`Conclusions
`
`87
`
`87
`90
`99
`101
`101
`
`105
`
`105
`107
`108
`117
`128
`
`131
`
`131
`132
`137
`138
`
`141
`
`141
`142
`143
`146
`
`149
`
`149
`149
`152
`153
`156
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 8 of 302
`
`Chapter 9: Coding and Modulation
`
`Basic Definitions
`Receivers
`An Exotic Modulation Technique
`Conclusions and Recommendations
`
`Annotated Bibliography
`
`Contents
`
`vii
`
`159
`
`159
`160
`161
`165
`
`167
`
`Appendix A: Annotated Supplemental Bibliographies
`
`211
`
`Appendix B: The Reliability of Component Networks
`and End-to-End Performance in an
`Internet
`
`Appendix C: A;LOHA Protocols and Asynunetric
`Traffic
`
`Appendix D: Economic and Public Policy Issues
`in the Use of Radio for Library
`Telecommunications
`
`Appendix E: An Experimental Wide-Area Packet
`Radio Network
`
`Index
`
`223
`
`239
`
`249
`
`259
`
`275
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 9 of 302
`
`Introduction
`
`This book discusses different kinds of systems that can be constructed
`using packet radio technology. It explores the technology of packet
`radio proper, which combines traditional packet switching and com(cid:173)
`puter networking techniques with algorithms to share broadcast radio
`channels and with the technologies of digital radio transmission.
`Although it is not primarily tutorial in nature, this book contains
`a good deal of tutorial material and provides a detailed survey of the
`relevant tutorial and research literature. In addition, some sections
`contain research results in packet radio technology that have not
`appeared previously in the literature to the best of our knowledge.
`Finally, we discu~s applications of packet radio systems, along with
`certain regulatory and public policy problems that arise when radio
`channels are used to support these applications.
`
`We have been exploring both the technology and the applications
`of packet radio since 1982 as part of our work at the University of
`California's Division of Library Automation (DLA). Although we had
`been aware of packet radio since the mid-1970s, like many others,
`we regarded it as the more or less exclusive preserve of military
`communications, due both to regulatory problems and to the cost
`and complexity of the required hardware and software.
`
`The overall advances in technology during the 1970s and early
`1980s, which made possible devices such as the Tucson Amateur
`Packet Radio (TAPR) Corporation's Terminal Node Controller
`(TNC), a packet radio device widely used by ham radio operators
`today, has opened up packet radio to a wide variety of new potential
`applications. Since the early 1980s, the Federal Communications
`Commission (FCC) has taken an increasingly accommodating position
`on the use of digital radio technologies, including packet radio, for
`both amateur and general commercial applications.
`
`Our initial interest in packet radio for applications in higher
`education (and libraries specifically) was sparked by the TNC boards.
`
`ix
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 10 of 302
`
`-~
`
`x
`
`Packet Radio Networks
`
`These appeared to offer a cost-effective alternative to the installation
`of wiring for terminals, microcomputers and other hardware, partic(cid:173)
`ularly in older buildings that were constructed of materials such as
`marble and designed with little provision for cable installation.
`
`In 1983 DLA received a grant from the Council on Library
`Resources to purchase and experiment with a number of TNC boards
`and to demonstrate them at several professional meetings for the
`library community. Although this work elicited great interest in
`the technology, our experiments indicated that the TNC board was
`unsuitable for the production applications that we had in mind
`[Brownrigg et al. 1985]. At the same time, it was clear to us that
`a suitable device for our applications in fact could be engineered
`and probably even licensed for operation. One major product of
`this research and experimentation was the survey article "Packet
`Radio for Library Automation" [Brownrigg, Lynch and Pepper 1984],
`which examined the applicability of packet radio in various library
`automation and ~igher education contexts, and discussed appropriate
`choices in packet radio technology to support these applications.
`
`In 1984 the Data Radio Group of the International Business
`Machines (IBM} Corporation initiated an IBM-funded joint study
`with DLA to produce a report on the applicability of packet radio
`for various applications in higher education and libraries and to
`further study and advance the technology. At the time of the study's
`inception, IBM already had considerable experience in the use of radio
`for data communications. The firm was deploying the DARTS data
`radio system for its field engineering force; this sophisticated, special(cid:173)
`purpose hybrid system incorporates ideas from both packet and
`cellular radio technologies in a novel way. Initially, IBM's interests
`were twofold. Having found radio-based data communications to be
`useful internally, they wanted to understand better how the DARTS
`technology and its derivatives might be applied in other applications.
`In addition, they were interested in seeing how packet radio technology
`could be used to avoid the time and expense involved in installing
`cable for terminals or distributed computing and office automation
`applications. The study was intended to cover both the high-level
`design of systems for various applications and some consideration
`of the hardware and software technologies needed to build such
`systems.
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 11 of 302
`
`Introduction
`
`xi
`
`The project was intended to take about six to nine months; in
`fact, the report continued to expand and was not completed until
`early 1986. A somewhat revised version of this report, updated to
`reflect developments through late 1986, forms the core of this book.
`
`The book is divided into two parts, with a total of nine chapters.
`Part I, "Packet Radio Systems," contains Chapters 1 and 2. The
`first chapter, entitled "System Requirements," provides a taxonomy
`of packet radio systems and describes three model systems (including
`their performance requirements) for further study. These three sample
`configurations were the focus of the University of California-IBM
`joint study. They include a low-speed, terminal-oriented, local area
`network much like the one we had originally hoped to build with the
`TNC boards in 1983; a high-speed, local area network intcnd.cd to
`connect computers and fast peripherals in much the same spirit as
`a cable-based Ethernet; and a wide-area packet radio system with
`repeaters, which grew out of the developments that have taken place
`in military as well as amateur packet radio technology. This first
`chapter is adapt~d, in part, from a discussion draft entitled "System
`Requirements for Library Automation Packet Radio Networks" by
`Clifford Lynch, which was submitted to IBM in October 1984.
`
`The second chapter, entitled "System Design Considerations,"
`discusses the components of a packet radio system: radios, digital
`hardware, software and interfaces to terminals or computers. One of
`the most important parts of this chapter is the definition of a logical
`interface between the radio part of a packet radio and the digital
`control component. We believe that the lack of any standardization
`in such an interface has been a significant factor in causing the
`development of a packet radio (especially a high-performance one)
`to become a major undertaking since custom engineering is required.
`Finally, this chapter details the system design considerations for the
`three models described in Chapter 1, using these components as
`building blocks. As part of the discussion of system design, we explore
`the differences between the first two configurations-a packet radio
`network that uses a terminal access controller (TAC) and local area
`distributed computing-in light of the trend to replace terminals with
`personal computers. This discussion leads us to consider how the TAC
`configuration might gracefully evolve into a local area network and the
`implications of operating in a hybrid environment during a transition.
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 12 of 302
`
`xii
`
`Packet Radio Networks
`
`I
`
`Part II, "Technologies for Packet Radio," contains Chapters 3
`through 9. These chapters discuss more technical, research-oriented
`issues in packet radio systems. Rather than producing detailed
`engineering specifications for the hardware and software for the three
`model systems discussed in the first two chapters, we chose to con(cid:173)
`centrate on those areas of technology where we felt we had new ideas
`or new approaches to existing ideas. The areas discussed include
`antennae, radio modulation techniques, and the use of directional
`techniques to improve network capacity, particularly in networks
`with repeaters. Routing is also primarily discussed in Chapter 5,
`although it is briefly covered toward the end of Chapter 2. We
`also consider methods of handling overload conditions, security and
`authentication, optimal packet size, and packet radio in the HF (non(cid:173)
`line-of-sight) environment. Part II also reviews some of the Federal
`Communications Commission regulations that are relevant to these
`different areas of technology. Particular attention is given to the
`provisions of Part 15 of the Codes of Federal Regulation, which permit
`relatively unconstrained use of the electromagnetic spectrum within
`limited geographic areas. Spread spectrum techniques, however, are
`primarily covered toward the end of Chapter 2.
`
`We have included an extensive annotated bibliography, which
`contains citations from all three chapters of the book plus all of the
`appendixes. Appendix A contains several supplementary annotated
`bibliographies. The book assumes some familiarity on the part of the
`reader with computer networking in general and also with some spe(cid:173)
`cific topics, such as the DARPA TCP /IP protocol suite and internet
`architecture; Appendix A provides a list of background material on
`these subjects. In addition, a brief list of references describing the
`networking environment for library automation at the University of
`California's Division of Library Automation may offer a useful context
`for some readers. Appendix A also contains a substantial annotated
`bibliography of papers on packet radio, which are not cited in the
`text but which we felt were relevant, and a specialized bibiography of
`material on amateur packet radio.
`
`In general, mathematical analyses have bee_n relegated to ap(cid:173)
`pendixes, except for a few chapters in Part II. Appendix B contains a
`detailed quantitative analysis of the interaction between the reliability
`of packet radio networks and end-to-end performance for internet
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 13 of 302
`
`Introduction
`
`xiii
`
`communications. The results from this appendix form part of the
`basis for the discussions of acknowledgment strategies in Chapter 2
`and of the handling of overload conditions in Chapter 4.
`
`Appendix C presents some basic results of studies on the per(cid:173)
`formance of various contention-based channel access protocols when
`traffic rates are highly asymmetric (for example, in cases in which
`terminals are connected to a host). It provides additional quantita(cid:173)
`tive background for the discussion of contention-based protocols in
`Chapter 1 and for our proposal for the design of the packet radio
`TAC in Chapter 2.
`
`As we delved further into the three sample configurations de(cid:173)
`scribed in the book, it became clear that although the design of
`a local area network for terminals was entirely feasible, building
`such a system was primarily a problem in manufacturing and mass
`production since the packet radios had to be competitive in cost with
`terminal wiring. Thus, to date, we have not pursued the actual
`construction of prototype systems in the local environment, believing
`that such a project would make sense only in conjunction with a major
`hardware manufacturer who was interested in designing and building
`such a device.
`
`At about the same time that the joint study with IBM was
`initiated, deregulation of the Bell system took hold. This had a
`devastating effect on libraries in the United States, which gradually
`had been increasing their reliance on common-carrier-based telecom(cid:173)
`munications. The library community suddenly found itself facing rate
`increases of 100% or more to support their existing networks, which
`linked terminals in libraries to central computers at a few major cen(cid:173)
`ters in the United States. Concurrently, developments in distributed
`database technology, electronic imaging, electronic publishing using
`optical storage, and similar areas were presaging the need for very
`wide band, low-cost networking capabilities for the library community
`It was clear that common carriers could not
`in the near future.
`provide the requisite services at acceptable costs. (This still seems
`to be true, although perhaps in the next decade relief may be found
`in the widespread availability of ISDN-Integrated Services Digital
`Network--technology. ISDN, a network concept being developed by
`common carriers, would integrate voice and data services. The costs,
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 14 of 302
`
`xiv
`
`Packet Radio Ne_tworks
`
`deployment schedule and functionality of this technology remain to
`be assessed.)
`
`These trends led to a serious interest in wide-area packet radio
`networks for libraries as an alternative to common carrier approaches.
`In 1985 Gary Strong, the State Librarian of the State of California,
`made funding available to the University of California's Division of
`Library Automation to plan, construct and deploy an operational
`prototype of a wide-area packet radio network for linking libraries,
`thus converting theory into practice. This work is still under way; one
`of the key problems has been obtaining access to suitable bandwidth
`for the project within the electromagnetic spectrum. Two papers
`related to this project and its implications are included as additional
`appendixes to this book. Appendix D, which is based in part on a
`paper by Brownrigg [1986], discusses the economic, regulatory and
`policy implications of wide-area packet radio networks for library
`service. Appendix E, a slightly modified and updated version of a
`paper entitled "Progress in Wide-Area Packet Radio" [Lynch and
`Brownrigg 1986b], describes work on the actual prototype network.
`
`We believe that packet radio will become a significant technology
`in coming years; what we have seen so far is only the beginning.
`Consider that there are thousands of packet radios with TNCs in the
`hands of radio amateurs already,"' and these amateur operators are
`well on their way to constructing a national network [Karn et al. 1985;
`Magnuski 1986]. A milestone was reached towards the end of 1986,
`when Phil Karn and others ran successful tests of Karn's TCP /IP
`implementation for use with the TNC boards; this potentially places
`full-scale computer networking capabilities within the reach of the
`amateur packet radio community for the first time.t The TNC
`
`•The TNC series of boards were designed by the Tucson Amateur Packet
`Radio (TAPR) Corporation and initially sold by that organization in kit form.
`Subsequently, the designs were licensed to a number of manufacturers, including
`Heathkit, for mass production and sale. The TAPR Corporation itself indicates
`that as of July 1986 they have sold about 2500 TNCl units and 1200 TNC2 units.
`Although we have no figures for commercial sales, it is likely that the total number
`of mutually compatible amateur packet radio units in the field is well over 10,000
`and growing.
`t The original TNC software was designed to support single-hop connections
`using an X.25 level-2 variant over CSMA; multiple hop connections were established
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 15 of 302
`
`fotroduc tion
`
`xv
`
`boards and systems derived from them (or from other amateur radio
`technology) have made their way into commercial and governmental
`applications as well, using various frequencies designated for industrial
`or governmental use. Among the applications have been the linking
`of bookmobiles to libraries and vehicle dispatching.
`
`Proposals have been presented to the Federal Communications
`Commission by such companies as Motorola for radio-based local area
`networks, and by the amateur community for a citizen's band for
`packet radio (see Appendix D). The IBM Corporation has equipped
`its entire field service staff with a form of packet radio developed by
`Motorola and IBM [Krebs 1983]; Motorola is marketing a variation of
`this system to other clients [Titch 1986]. It is likely that packet radio
`systems ultimately will be used to link libraries together, at least on
`In conjunction with satellite technology, regional
`a regional basis.
`networks can in turn be interconnected to form national and inter(cid:173)
`national internets. In many areas-smaller towns and suburban and
`rural areas., for example-packet radio represents the only reasonably
`priced or readily available basis for high-bandwidth networks for the
`near future.
`
`Libraries represent only one possible user community for high(cid:173)
`speed packet radio networks; others include hospitals and health
`professionals outside of urban areas, educational institutions, and
`scientists and engineers working in remote locations. In a real sense
`these groups have been disfranchised from telecommunications for
`In today's world,
`decades (except perhaps for voice telephony).
`however, activities that require a base of advanced technology {for
`example, health care) increasingly cannot exist without a supporting
`telecommunications infrastructure. Packet radio, in conjunction with
`
`either by extending single-hop connections through digipeaters or by concatenating
`single-hop connections from TNC to TNC through a rather clumsy source routing
`scheme. A terminal or a personal computer emulating a terminal is typically
`connected to the TNC, which makes no real provision for intelligent hosts (e.g.,
`a computer-to-computer network rather than a terminal-to-terminal or terminal(cid:173)
`to-host network). Karn's TCP /IP implementation runs over X.25 level 2, although
`this may be replaced by a more appropriate lower-level protocol (see [Karn and
`Lloyd 1986[); the use of TCP /IP allows for the possible introduction of IP routers
`and gateways.
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 16 of 302
`
`xvi
`
`Packet Radio Nc~works
`
`a number of other (primarily satellite-based) telecommunications ser(cid:173)
`vices now under discussion or in experimental prototype, can provide
`such an infrastructure.
`
`Finally, in the United States nonmilitary packet radio systems are
`inextricably linked to the regulatory environment in which they must
`operate. One aspect of this environment is the perception that the
`electromagnetic spectrum is a limited resource that must be allocated
`wisely for the public good. When regulatory agencies within the
`United States make choices about spectrum allocation, they must
`consider alternatives (such as common carrier services) that do not
`require precious spectrum space, as well as weigh the benefits that the
`use of electromagnetic spectrum offers the proposed application. In
`less developed countries that are trying to introduce modern telecom(cid:173)
`munications technology (often in the face of very difficult geographic
`problems), there is often no analog to the common carrier facilities
`based on wire, cable and point-to-point microwave that now exist
`in the United States because of this country's evolutionary passage
`through a century of advances in telecommunications technology. In
`less developed countries radio-based communications is often the only
`viable communications medium available. It seems likely that packet
`radio will have a role to play in these environments as well.
`
`Acknowledgments
`
`We are indebted to many people who helped us produce this book.
`
`Two superb editors, Mary Jean Moore and Nancy Gusack, edited
`and typeset this book and its antecedent reports. We are grateful for
`their extensive and painstaking efforts.
`
`For Chapters 1-9 and Appendixes A-C, we would like to express
`our thanks to Bob Smith and Phil J{~rns of IBM, who worked on the
`joint study from IBM's side, both for their contributions to the project
`and for their great patience as we developed the final report. We also
`thank Dr. Horace Flatt of the IBM Palo Alto Scientific Center, who
`made this joint study possible; Dave McCutcheon, for speculations on
`radio technology; Donna Chan of DLA, for checking the calculations
`throughout; and Ann Flanagan Typography and Douglas Henderson
`of DLA, for help with graphics.
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 17 of 302
`
`Introduction
`
`xvii
`
`For Appendix D, we thank Steele Lanphier of the University of
`California for numerous illuminating discussions on legal and consti(cid:173)
`tutional issues, and acknowledge our great intellectual debt to the
`works of the late Ithiel de Sola Pool.
`
`Many people have made essential contributions to the work de(cid:173)
`scribed in Appendix E, particularly John Velie and the SRI packet
`radio group, which includes Nachum Shacham, Janet Tornow, Mark
`Lewis, and Roy Stehle. Janet Tornow and Roy Stehle made extensive
`helpful comments on an earlier draft of Appendix E. We also thank
`Janet Bruman of the North Bay Cooperative Library System for
`her discussions about the maintenance of packet radio networks for
`libraries. Special thanks go to Gary Strong, the State Librarian of
`California, for his vision and support in translating packet radio for
`library automation from paper studies to reality.
`
`We have been fortunate to have the insights and expertise of two
`very talented electronics specialists, David Shaughnessy and David
`Wills, in the exgerimental work that forms the basis for much of this
`book. Their contributions are greatly appreciated.
`
`We would also like to express our thanks to the Council on Library
`Resources for supporting our early packet radio experiments and to
`the IBM Corporation for their support of the joint study. Parts
`of this work were also supported by federal Library Services and
`Construction Act (LSCA) funds (grants 40--0737 and 40---0760).
`
`Finally, we would like to express our appreciation to the University
`of California for their support of our explorations in packet radio
`technology and in writing this book. In particular, the enthusiastic
`support of Dr. Michael Buckland, Assistant Vice President for Library
`Plans and Policies at the University's Office of the President, has been
`both an inspiration and an enormous help to us. Richard West, the
`University's Assistant Vice President for Information Systems and
`Administrative Services, maintained the commitment and ensured the
`completion of the book and the continuity of the packet radio research
`effort.
`
`**********
`
`PRN-8
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 18 of 302
`
`xviii
`
`Packet Radio Nftworks
`
`In spite of all the help provided, the authors must assume responsi(cid:173)
`bility for any errors herein.
`
`Although the list below at tempts to cover all the trademarks
`mentioned in this book, we may have missed some, for which we
`apologize.
`
`MELVYL is a registered trademark of The Regents of the Univer(cid:173)
`sity of California. Apple and Macintosh are registered trademarks of
`Apple Computer, Inc. DEC, VAX, and MicroVAX are trademarks of
`Digital Equipment Corporation; Ethernet is a trademark of the Xerox
`Corporation; IBM and IBM PC/ AT are trademarks of International
`Business Machines Corporation; MS-DOS is a registered trademark
`of Microsoft Corporation; Sun Workstation is a registered trademark
`of Sun Microsystems, Inc.; and UNIX is a trademark of AT&T.
`
`The opinions expressed here are only those of the authors and not
`necessarily those of the University of California, the International
`Business Machines Corporation or any other corporation, funding
`agency, government entity or individual. Products mentioned in this
`work are discussed only for purposes of example; their mention is
`not intended to convey any endorsement by the authors or any other
`organization or individual.
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 19 of 302
`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 19 of 302
`
`PART I
`PART I
`
`PACKET RADIO SYSTEMS
`PACKET RADIO SYSTEMS
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 20 of 302
`
`CHAPTER 1
`
`Syste1n Requiren1ents
`
`In this chapter we discuss the criteria by which packet radio systems
`can be characterized and some of the design possibilities implied by
`these characteristics. We also identify three specific system configura(cid:173)
`tions that are of particular interest for library applications of packet
`radio, and develop performance criteria for these configurations.
`
`A Taxonomy of Packet Radio Systems
`
`Mobile vs. Stationary Nodes
`
`Until recently, research on packet radio systems has concentrated
`largely on military applications, which are characterized by highly
`mobile nodes. In these systems, the topology may change literally
`from minute to minute as the packet radios, mounted on vehicles or
`aircraft, enter, move through and leave a given packet radio network.
`Moreover, although the possibility of equipment failure must always
`be taken into account in designing a robust system, these military
`systems assume more drastic and more frequent equipment failures
`than are likely to be encountered in nonmilitary applications. They
`are "worst case" packet radio systems, and the costs and engineering
`complexity are consequently high [Kahn 1977; Kahn et al. 1978;
`Frankel 1983].
`
`Packet radio systems for library automation applications are, for
`all practical purposes, fixed topology systems. However, even within
`this general category, there are important differences that can have
`an impact on the management and operation of the network. For
`example, in manually administered systems, each addition, removal or
`resiting of a packet radio node requires manually initiated changes in
`the network definition tables (wherever they may be stored), possible
`redesign of fixed routing tables, and perhaps the intervention of a
`
`3
`
`

`

`Case 1:16-cv-02690-AT Document 109-7 Filed 07/19/16 Page 21 of 302
`
`4
`
`Packet Radio Networks
`
`technician to manually orient an antenna on the new or resited node.
`In contrast, one can envision a totally adaptive and self-organizing
`network, in which a new packet radio could announce its presence to
`the network and electronically adjust its own antenna; human inter(cid:173)
`vention might only be required to authorize the network address. An
`adaptive system such as this, which minimized management problems,
`would be extremely desirable in library automation applications. It
`could employ some of the self-organizing techniques used in mobile
`packet radio systems, but the application of these techniques would
`be simplified since the performance requirements would be far less
`stringent. For example, transient anomalies in dynamic routing would
`not be a major problem if they settled down within a short period
`because the topology is more or less fixed. This would be unacceptable
`in a military environment, where a p

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket