throbber
However, the proxy agent cannot be run on a computer that is also a WINS server.
`Consult with the network administrator to determine whether your computer
`should be
`
`configured as a WINS proxy agent, as enlyoniy a few computers on each
`subnetwork should
`
`be configured for this feature.
`ll. When.you are done setting advanced options, choose the OK button. When
`the TCP/IP
`Configuration dialog box reappears, choose the OK button. When the Network
`Settings
`dialog box reappears, choose the OK button to complete advanced TCP/IP
`configuration.
`You must restart the computer for the changes to take effect.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`..
`
`.
`
`..
`
`.
`
`..
`
`.
`
`l
`
`~— — —— —— — — ~ ~ — — — — ~ — — — ~~ "7."* — — — — — ~ —— —,;*..*
`J9n¢¢ wan:m1=mr..
`l~ “:a mmw_
`IIWM w~¢:#\wrWmu~::~l: wS#:
`lIlIlIlIlIlIlI__l|lI::lI ___
`fiend Trap with Community Hamas
`Egmmunity Names
`lrap Destination fm engineering
`IP Hnstfhddleee or
`
`MP1—"El1'& fpyq hddress
`Installing and Configuring Microsoft TCP/IP and SNMP 9 ofl3
`Configuring SNMP
`The SNMP service is installed when you check the SNMP Service option in the
`Windows NTTGP+IP§;
`TCP[lP Installation Options dialog box. After the SNMP service software is
`installed on your
`computer, you must configure it with valid information for SNMP to operate.
`You must be logged on as a member of the Administrators group for the local
`computer to
`configure SNMP.
`The SNMP configuration information identifies communities and trap
`destinations.
`
`l A
`
`eemmenityA Community is a group of hosts to which a Windows NTeemputergg
`computer running the SNMP
`service belongs. You can specify one or more communities to which the Windows
`NTeemputerNT
`computer using SNMP will send traps. The community name is placed in the SNMP
`packet
`when the trap is sent.
`When_the SNMP service receives a request for information that does not contain
`the
`
`correct community name and does not match an accepted host name for the
`service,
`the
`SNMP service can.send.aerapa trap to the trap destination(s), indicating that
`the request failed
`authentication.
`
`I; Trap destinations are the names or IP addresses of hosts to which you want
`the SNMP
`
`service to send traps with the selected community nameri
`You.might want to use SNMP for statistics, but may not care about identifying
`communities or
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 31
`
`

`
`In this case, you can specify the "public" community name when you
`traps.
`configure the
`SNMP service.
`
`.,.. To configure the SNMP service
`1 .
`Start the Network option in Control Panel to display the Network Settings
`dialog box. Enig the
`Installed Network Software list box, select SNMP Service, and choose the
`Configure
`button. The SNMP Service Configuration dialog box appears.
`SNMP—Serviee—Genf&guratmn
`
`2T—;:TO identify each community to which you want this computer to send.traps,
`type the name
`in the Community Names box. After typing each name, choose the Add button to
`move the
`
`name to the Send Traps With Community Names list on the left.
`Typically, all hosts belong to public, which is the standard name for the
`common
`
`community of all hosts. To delete an entry in the list, select it and choose
`the Remove
`button.
`Note
`
`Community names are case sensitive.
`3e——é=To specify hosts for each community you send traps to, after you have
`added the
`
`community and while it is still highlighted,
`Host/Address Or
`IPX
`
`type the hosts in the lP;§
`
`Address box. Then choose the Add button to move the host name or-lP;§ address
`to the
`
`Trap Destination for the seleetedsegecfed community list on the left.
`You can enter a host nameT£ its lP;§ addressTé or its lPX;§§ address.
`To delete an entry in the list, select it and choose the Remove button.
`“
`
`é=To enable additional security for the SNMP service, choose the Security
`button. Continue
`
`with the configuration procedure, as described in the next section,
`"Configuring SNMP
`Security."
`
`5.?
`
`£=TO specify Agent
`services), choose
`
`information (comments about the user,
`
`location, and
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 32
`
`

`
`the Agent button. Continue with the configuration procedure, as described.in
`"Configuring
`SNMP Agent Information" later in this chapter.
`
`6w————
`
`ézwhen you have completed.allg;; procedures, choose the OK button. When the
`Network
`
`Settings dialog box reappears, choose the OK button.
`The Microsoft SNMP service has been configured and is ready to start. lt is
`not necessary
`to reboot the computer.
`
`8 Send fxglhentiealion Trap
`—heeepted Community jiames
`Cobrglmunity Name
`'0 Ageept SNMP Packete from Any Host
`—Lil"
`.Qnly .¢|.¢;:c:&pt SHHP Packets fmm These Hosts:
`[F Hestfhddress or
`IPX Address:
`ublic
`
`=JiL1 li " mm— g
`11.101.41.121
`
`Installing and Configuring Microsoft TCP/IP and SNMP lO<>f13
`Configuring SNMP
`Configuring SNMP Security
`SNMP security allows you to specify the communities and hosts aeemputerg
`computer will accept
`requests from, and to specify whether to send an authentication.trap when an
`unauthorized
`
`community or host requests information.
`11JJ>
`
`To configure SNMP security
`1.
`Start the Network option.in.Control Panel to-displaydispiay the Network
`Settings dialog box.
`In the
`Installed Network Software list box, select SNMP Service and choose the
`Configure button:
`2.
`In the SNMP Service Configuration dialog box, choose the Security
`button.
`
`
`
`If you want to send a trap for failed.authentications, select the Send
`3.
`AeEhenEieatienAutnentication Trap
`check box in the SNMP Security Configuration dialog box.
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 33
`
`

`
`E]
`
`;
`
`H.
`
`3;
`
`E.
`
`.
`
`.
`
`E
`
`2
`
`3E
`
`type the community names you will accept
`
`In the Community Name box,
`4.
`requests fromT
`Choose the Add button aelerafter typing each name to move the name to the
`Accepted
`Community Names list on the left.
`AhestA host must belong to a community that appears on this list for the SNMP
`service to accept
`requests from that host. Typically, all hosts belong to public, which is the
`standard name
`
`for the common community of all hosts. To delete an entryently in the list,
`select it and choose
`the Remove button.
`
`{in
`
`é=Select an option to specify whether to accept SNMP packets from any host
`or from only
`specified hosts.
`I;:If the Accept SNMP Packets Fron1Any Host option is selected, no SNMP packets
`are
`
`rejected on the basis of source host ID. The list of hosts under Only Accept
`SNMP
`Packets From These Hosts has no effect.
`
`l I
`
`f‘ lf the Only Accept SNMP Packets From These Hosts option is selected, SNMP
`packets will be accepted only from the hosts listed. In the lP;§ Host/Address
`Or
`IPX
`
`Address box, type the host names, lP;§aaddresses, or IPX addresses of the hosts
`from
`
`which you will accept requests. Then choose the Add button to move the host
`name or
`
`IP address to the list box on the left. To delete an entry in the list, select
`it and choose
`the Remove button.
`gr
`
`é=Choose the OK button. The SNMP Service Configuration.dialog box reappears.
`To specify Agent information (comments about the user,
`location, and
`services), choose
`the Agent button. Continue with the configuration procedure, as described in
`the next
`section.
`
`4w————
`
`é=After you complete all procedures, choose the OK button. When the Network
`Settings
`dialog box reappears, choose the OK button.
`The Microsoft SNMP service and SNMP security have been configured and are ready
`to
`
`start. You do not need to reboot the computer.
`
`—nn—n—4
`
`Qnntact:
`Location:
`
`l
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 34
`
`

`
`Ehysical Qatalink .»" Subnetwork
`internet >< ind—tu—End
`
`><:
`
`igpplicatiorzsi
`.H.
`
`Ernest Ayde 0He
`Bldg. T, mum 823
`Installing and Configuring Microsoft TCP/IP and SNMP ll ofl3
`Configuring SNNIP
`Configuring SNMP Agent Information
`SNMP agent infennatieninformation allows you to specify comments about the
`user and the physical
`location.of the computer and to indicate the types of service to report. The
`types of service that
`can be reported are based on the computer's configuration.
`:TT———To configure SNMP agent
`information
`%l:.Start the Network option in Control Panel to display the Network Settings
`dialog box. Isl; the
`Installed Network Software list box, select SNMP Service and choose the
`Configure button.
`2.
`In_the SNMP Service Configuration.dialog box, choose the Agent button.
`
`D1theSNMPAgentdialogbox,typethecomputeruser'snameiJ1theContact
`3.
`box and the
`
`computer's physical location.in;g the Location.box. These are comments that
`will be used as
`text and cannot
`
`include embedded control characters.
`
`Select the services to report in the Service box. Check all boxes that
`4.
`indicate network
`
`capabilities provided by your Windows NT computer. SNMP must havenave this
`iafeaaatieninformation to
`
`manage the enabled services.
`If you have installed additional TCP/IP services, such.as a bridge or router,
`you should
`consult RFC 1213 for additional infennatieninformation.
`
`Option
`Physical
`
`Meaning
`Select this option if this Windows NT computer manages any
`
`physical TCP+4IP device, such as a repeater.
`Datalink/subnetwork
`Select this option.if this Windows NT'computer manages
`a TCP-!-4IP
`subnetwork or dasalinkdataiink, such as a bridge.
`Ghapter—2—InsEall&ng—aHd—GeHfigHriHg—Miereseft—TGPnP—aad—SNMP
`E
`.
`.
`
`Internet Select this option if this Windows NT computer acts as an lP;=
`gateway.
`
`End—to—End Select this option if this Windows NT computer acts as an lP;=
`host.
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 35
`
`

`
`This option should be selected for all Windows NT installations.
`
`
`5T£ Choose the OK button.
`6T——é:When the SNMP Service Configuration dialog box reappears, choose the
`OK button.
`
`When the Network Settings dialog box reappears, choose the OK button.
`SNMP is now ready to operate without rebooting the computer.
`Applications Select this option if this Windows NT computer includes any
`applications that use TCP/IP, such as electronic mail. This option
`should be selected for all Windows NT installations.
`
`Installing and Configuring Microsoft TCP/IP and SNMP 12 ofl3
`Removing TCP/IP Components
`If you want to remove the TCP/IP protocols or any of the services installed
`on a computer, use
`the Network option in Control Panel to remove it.
`When you remove any network software, Windows NT warns you that the action
`permanently
`removes that component. You cannot reinstall aeempenenea component that has
`been removed until after
`
`you restart the computer.
`ww7w——To remove any TCP/IP component
`lT——;é=In Control Panel, choose the Network option.
`2.
`In the Installed Network Software list in the Network Settings dialog
`box, select the
`component that you want to remove.
`3.
`Choose the Remove button.
`
`Installing and Configuring Microsoft TCP/IP and SNMP laOfl3
`Configuring RAS for Use with TCP/IP
`Windows NT‘users who install Remote.Access Service (RAS) for remote networking
`maintain
`
`all the benefits of TCP/IP;§ networking,
`capabilities of
`Microsoft TCP/IP. RAS clients can be configured to use Point to Point Protocol
`(PPP) or Serial
`
`including access to the WINS and.DNS
`
`Line Internet Protocol (SLIPSLlP) tc>allow'TCP/IP(iial—up support for existing
`TCP/IP;§ internetworks
`and.the-Inteaaaeeinternet. When PPP is configured.on.aiNindows NT'Remote.Access
`server, it can
`function as a router for RAS clients. SLIPSLIP client software is provided
`to support older
`implementations+£ it does not support multiple protocols.
`As with all network services, you install RAS by using the Network option in
`Control Panel.
`
`During RAS installation and configuration, you can specify the network
`protocol settings to use
`for RAS connections, which also allows you to specify TCP/IP configuration
`settings. When the
`network administrator installs a Microsoft RAS server,
`reserved for use by
`
`IP addresses are
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 36
`
`

`
`RAS clients.
`
`Users with RAS client computers can use the Remote Access program to enter
`and maintain
`
`names and telephone numbers of remote networks. RAS clients can connect to
`and
`
`disconnect fronithese networks through the Remote.Access progranu You can also
`use the
`
`Remote Access Phone Book application to select the network protocols to use
`for aspeeifie—a specific
`Phone Book entry. lfTGP+If TCP[IP is installed, the Phone Book automatically
`selects TCP+;IP over
`PPP as the protocol.
`If a RAS client computer has a serial COM port, you can use the Remote Access
`Phone Book
`
`application to configure SLIP for use with aseleeteda selected Phone Book
`entry. If you configure a RAS
`client computer to use the SLIP option, when you dial in for aeenneetieng
`connection to the selected Phone
`
`the Terminal screen appears, and you can begin an interactive
`Book entry,
`session with aSLIP—a SLIP
`
`server. When you use SLIP, Remote Access Phone Book bypasses user
`authentication. You
`
`will not be asked for a usemameusername and password.
`For complete information about setting up RAS servers and clients and using
`RAS with
`
`Windows NT, see Windewsvwgvdows NT Serversenger Remote Access Service.
`€HAP¥ER—3
`
`Networking Concepts for TCP/IP
`¢This chapter describes how'TCP/IP fits in the Windows NT‘network architecture
`and explains
`the various components of the Internetinternet Protocol suite and IP
`addressing. As part of the
`discussion on name resolution in Windows networking,
`describes NetBIOS
`
`this chapter also
`
`over TCP/IP and Domain Name System (DNS). For additional information about
`these topics,
`see the books listed in ¢¢;Finding More Infermatienlnformation" in
`"WelcomeT;"
`¢This chapter alsc>provides conceptual information.about-ewetvvo key features
`for Microsoft TCP/IP:
`Dynamic Host Configuration.Protocol
`(WINS).
`
`(DHCP) and.Windows Internet Name Service
`
`¢The fellewingfoiiowing topics appear in this chapter:
`
`4; TCP/IP and Windows NT networking
`4; Internet protocol suite
`4; IP addressing
`4; Name resolution for Windows networking
`4; SNMP
`
`E
`
`,
`
`3
`
`.
`
`3
`
`Chapter 3
`
`lof17
`
`1.
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 37
`
`

`
`SIIIUP RPC
`Windows So—ckas
`
`Applications
`Wiruziosna Sockets
`Interface
`Windows
`
`HdB103 .Fhpplications
`Haslos Intaface
`naslos wer TCPJIP
`
`2 N
`
`DIS Ul‘i\_|El'S sun PPP
`IQELLE
`
`The architecture of the Microsoft Windows NT operating systen1with.integrated
`networking is
`protocol—independent. This architecture,
`figure, provides
`Windows NT file, print, and other services over any network protocol that uses
`exports from
`the TDI interface. The protocols package network requests for applications
`in their respective
`formats and send the requests to the appropriate network adapter via the
`aeewerknefwork device
`
`illustrated in the following
`
`interface Tkpeeefeeatieaspecification (NDIS)
`specification allows multiple network
`protocols to reside over a wide variety of network adapters and media types.
`.
`3
`.
`3
`E
`1
`:9
`J.
`.
`J.
`.
`Windews—SeekeesNeEBIGS—Ifi%erfaee—Ifiterfaee
`Transnort Deviw..
`lmterface
`Stardard
`
`interface. The NDIS
`
`Tcpnp
`Mcdules
`NeEwerkMetxmork Driver
`
`Interlaee
`Interface
`
`Physieal—NetwerkPhyafcel Tdatxmcrk Layer
`Architectural Model of Windows NT with TCP/IP
`
`Under the Windows NT transport—independent architecture, TCP/IP;§ is a
`protocol family that can
`be used.to offer Windows networking capabilities. The TCP/IP;§:protocol gives
`Windows NT,
`Windows for Workgroups, and.LAN Manager computers transparent access to each
`other and
`
`allows communication.with.non—;Microsoft systems in the enterprise network.
`€hap%er—3—Networking Concepts for T€PaPTCP[IP
`In%ernee—Pre%eeel—Sai%e
`
`and Windows NT Networking
`2ofl7
`
`TCP/IP refers to the Internet suite of protocols. It includes a set of
`standards that specify how
`computers communicate and gives conventions for connecting networks and
`routing traffic
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 38
`
`

`
`through the connections.
`The Internet protocols are a result of a Defense Advanced Research Projects
`Agency
`(DARPA) research project on network interconnection in the late l94Gl970s.le
`;; was mandated on all
`United States defense long—haul networks in 1983 bat—wasbutwas not widely
`accepted until it was
`integrated.with.4.2 Berkeley Software Distribution.(BSD) UNIX. The popularity
`efT€Pof TCP/IP is
`based on: I
`
`Robust client—server framework. TCP/IP;§ is an excellent client—server
`application platform,
`especially in wide—area network (WAN) environments.
`9:.-
`
`Implementations efTGPof TCP/IP are available on
`
`Infermatienl information sharing. Thousands of academic, military,
`scientific, and commercial
`organizations sharesnare data, electronic mail, and.services on the Internet
`using TCP/IP.
`I; General availability.
`nearly every popular
`computer operating system. Source code is widely available for many
`implementations.
`Vendors for bridges, routers, and.network analyzers all offer support for the
`TCP/IP
`protocol suite within their products.
`The following discussion introduces the components of the —I—P£ protocol suite.
`Some knowledge
`of the architecture and interaction between TCP/IP components is useful for
`both
`
`administrators and users, but most of the details discussed here are
`transparent when you are
`actually using TCP/IP.
`Networking Concepts for TCP/IP
`Internet Protocol Suite
`3of17
`
`Internet Protocol Suite
`Transmission Control Protocol and Internet Protocol
`
`Transmission Control Protocol
`members of the IP
`
`(TCP) and Internet Protocol
`
`(IP) are only two
`
`protocol suite. IP is a protocol that provides packet delivery for all other
`protocols within the
`TCP/IP family. IP provides a best—effort, connectionless delivery system for
`computer data.
`That is,
`IP packets are not guaranteed to arrive at their destination, nor
`are they guaranteed to
`be received in the sequence in which they were sent. The protocol's checksum
`feature
`
`confirms only the IP header's integrity. Thus, responsibility for the data
`contained within the IP
`
`packet (and the sequencing) is assured only by using higher— level protocols.
`Perhaps the most common.higher—IeveliPlevel IP protocol is TCP. TCP supplies
`a reliable,
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 39
`
`

`
`connection—based protocol over (or encapsulated within)
`the delivery of
`packets, ensures proper sequencing of the data, and provides aeheeksumg
`checksum feature that
`
`IP. TCP guarantees
`
`validates both the packet header and its data for accuracy. Inig the event
`that the network either
`
`corrupts or loses aTGPa'TCP/IP packet during transmission, TCP is responsible
`for retransmitting
`the faulty packet. This reliability makes TCP/IP the protocol of choice for
`session—based data
`
`transmission, client—server applications, and critical services such as
`electronic mail.
`
`This reliability has a price. TCP headers require the use of additional bits
`to provide proper
`sequencing of information, as well as a mandatory checksum to ensure
`reliability of both the
`TCP header and the packet data. To guarantee successful data delivery,
`protocol also
`requires the recipient to acknowledge successful receipt of data.
`Such acknowledgments (or AGK7sACKS) generate additional network traffic,
`diminishing the level of
`data throughput in.favor of reliability. To reduce the impact on.performance,
`most hosts send
`
`the
`
`an acknowledgment for every other segment or when an ACK timeout expires.
`Networking Concepts for TCP/IP 4of17
`
`Internet Protocol Suite
`
`User Datagram Protocol
`
`Ifif reliability is not essential, User Datagram Protocol
`complement, offers a
`connectionless datagraniservice that guarantees neither delivery nor correct
`sequencing of
`delivered packets (much like lP;§). Higher—level protocols or applications
`may provide reliability
`mechanisms in addition.to UDP/IP. UDP data checksums are optional, providing
`a way to
`exchange data over highly reliable networks without unnecessarily consuming
`network
`
`(UDP), aTGPa TCP
`
`resources or processing time. When UDP checksums are used, they validate both
`header and
`
`data. AGKsACKS are also not enforced by the UDP protocol+£ this is left to
`higher—level protocols.
`UDP also offers one—to—many service capabilities, because it can be either
`broadcast or
`multicast.
`
`Networking Concepts for TCP/IP 50f17
`
`Internet Protocol Suite
`
`Address Resolution Protocol and Internet Control Message
`Protocol
`
`Two other protocols in the IP suite perform important functions, although
`these are not directly
`related to the transport of data: Address Resolution Protocol
`Iateraeeinternet Control
`
`(ARP) and
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 40
`
`

`
`(ICMP). ARP and lGMPICMP are maintenance protocols that
`
`Message Protocol
`support the lP;§
`framework and are usually invisible to users and applications.
`IP packets contain both source and.destination.IP addresses, but the hardware
`address of the
`
`destination computer system must also be known.
`hardware address by
`broadcasting a special inquiry packet
`containing the IP address of the
`system with which it is attempting to communicate. AllAli of the ARP—enabled
`nodes on the local
`
`(an ARP reqees£—paeketrequesfpackef)
`
`IP acquires a system's
`
`IP network detect these broadcasts, and.the system that owns the lP;§ address
`in question
`replies by sending its hardware address to the requesting computer system in
`an ARP reply
`packet. The hardware/IP address mapping is then stored in the requesting
`system's ARP
`cache for subsequent use. Because the ARP reply can also be broadcast to the
`network, it is
`likely that other nodes on the network can use this information.to1xpdate their
`own ARP
`
`(You can use the arp utility to view the ARP tables.)
`caches.
`€hapter—%—Netwerking—€eneepts—fer—T€PnP
`ICMP allows two nodes on an IP network to share IP status and error information.
`This
`
`information can be used by higher—level protocols to recover from transmission
`problems or by
`network administrators to detect network trouble. Although ICMP packets are
`encapsulated
`within IP packets, they are not considered to be a higher—;level protocol (ICMP
`is required in
`every TCP/IP implementation). The ping utility makes use of the ICMP echo
`reqeestrequesf and echo
`reply packets to determine whether a particular IP node (computer system) on
`a network is
`
`functional. This is useful for diagnosing IP network or gateway failures.
`Networking Concepts for TCP/IP 6of17
`
`£P—Addressing
`Ahes%A.host is any device attached to the network that uses TCP/IP. To receive
`and deliver packets sueeessfully
`successfuily between hosts, TCP/IP reliesreiies on three pieces of
`information that the user
`
`IP address, subnet mask, and default gateway.
`provides:
`The network administrator provides each of these pieces of information for
`configuring TCP/IP
`on a computer. Windows NT users on networks with DHCP servers can take
`advantage of
`automatic system eentiguratienconfiguration and do not need to manually
`configure TCP/IP parameters.
`This section provides details about IP addresses, subnet masks, and IP
`gateways.
`Networking Concepts for TCP/IP
`IP Addressing
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 41
`
`

`
`70fl7
`
`IP Addressing
`IP Addresses
`
`Every host interface, or node, on aTGPa TCP/IP network is identified by a
`unique IP address. This
`address is used to identify a host on a network+£ it also specifies routing
`information in an
`
`internetwork. The IP address identifies aeemputera computer as a 32-bit
`address that is unique across a
`TCP/IP network. An.address is usually represented.in.dotted.decimal notation,
`which depicts
`each octet (eight bits, or one byte) of an-IP;§ address as its decimal value
`and separates each
`octet with a period. An IP address looks like this:
`102.54.94.97
`
`Important
`Because IP addresses identify nodes on an interconnected.network, each host
`on the
`
`internetwork must be assigned.a unique IP address, valid for its particular
`network.
`Network ID and Host
`
`ID
`
`Although an lP;§ address is a single value, it contains two pieces of
`information:
`the network lD;2
`and theggg host
`(or system)
`IBLQ for your computer.
`l;'The netwerk—lDnefwork ID identifies a group of computers and other devices
`that are all located on
`
`the same logical network, which are separated or interconnected.by routers.
`In
`
`internetworks (networks formed by aeelleetiena collection of local area
`networks),
`there is a unique
`network IBLQ for each network.
`I; The hest—IDhosf [D identifies your computer within a particular network
`lB;2.
`(A host is any device
`that is attached to the network and uses TCP/IP.)
`Networks that connect to the public Internet must obtain an official network
`lB;2 from the
`lnterNIC to guarantee lP;§ network-IBLQ uniqueness. The lneerNIGInterNlC can
`be contacted via electronic
`
`mail at info@internic.net (for the United.States, l—8GG——444—4%4518004444345
`or,
`for Canada and overseas, 6&9—455—46GG
`6I94554600). Internet registration requests can be sent to
`hostmaster@internic.net. You can
`
`also use FTP to connect to is.internic.net,
`change to the
`/INFeSeURGElNFosouRcE/FAQ directory.
`After receiving a network IBID,
`the local network administrator must assign
`unique host
`IDs for
`computers within.the local network. Although.private networks not connected
`to the Internet
`
`then log in as anonymous, and
`
`can.choose to use their own.network identifier, obtaining"a'valid.network-ID;Q
`from IflterNI€lnterNlC
`
`allows a private network to connect to the Ifiternetinternet in the future
`without reassigning addresses.
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 42
`
`

`
`The Internet community has defined address classes to accommodate networks
`of varying
`sizes. Each network class can be discerned from the first octet of its 19;:
`address. The following
`table summarizes the relationship between.the first octet of a given address
`and its network 4B;2
`and host ID fields. Isl; also identifies the total number of network IDs and
`host IDs for each
`
`address class that participates in the Internet addressing scheme. This sample
`uses w.x.y.z to
`
`designate the bytes of the 4P;§ address.
`€hapter—3—Netwerking—€eneepts—fer—T€PnP
`IP Address Classes
`Avai4ab4e——Avai4ab4e
`
`Networking Concepts for TCP/IP 8of17
`Classafi&Hes4T2—Netwerkflwvalues1,2NetworkZH)HostID AvailableAvailable
`networks hosts per
`net
`
`A 1126 W X.y.z
`
`126 16.777214
`
`16,384 —657534—65.534
`B —128—49&——wTx——128191 W.X y.z
`
`e——44J2—22%—C 192223 w.X.y
`z —27994745&—2 097 1 51 254
`I; Inclusive range for the first octet in the IP address.
`2 The +}ddressaddress 127 is reserved for loopback testing and interprocess
`communication on the local eumputer+computer, it is not a valid network
`address.
`
`Addresses 224 and above are reserved for special protocols (IGMP
`multicast and others), and cannot be used as host addresses.
`AneewerkA network host uses the network ID and host
`ID to determine which
`
`packets it should receive
`or ignore and to determine the scope of its transmissions (only nodes with
`the same network ieig
`accept each other's 4P;§—level broadcasts).
`Because the sender's 1P;§ address is included.in.every outgoing-lP;§ packet,
`it is useful for the
`
`receiving computer system to derive the originating network ID and host ID
`from the 4P;§ address
`field. This is done by using subnet masks, as described in the following
`section.
`Subnet Masks
`
`Subnet masks are 32-bit values that allow the recipient of 1P packets to
`distinguish the network
`ID portion of the 1P address from theggg host ID. Like an lP;§ address,
`value of asubneta subnet mask is
`
`the
`
`frequently represented in dotted decimal notation. subnet masks are
`determined by assigning
`1's to bits that belong to the network iegg and 0's to the bits that belong
`to the host
`ID. Once the
`
`bits are in place, the 32-bit value is converted to dotted decimal notationTé
`as shown in the
`
`following table.
`
`
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 43
`
`

`
`llllllli—éi&&&&&&&&&&&&&&—9€999€99—255w%55¢255TG
`
`The result allows TCP/IP to determine the host and.network-IDs;2§ of the local
`computer. For
`
`example, whenwnen the lP;§ address is 102.54.94.97 and the subnet mask is
`
`%557%55w97G7255.255.O.O the
`network ID is 102.54 and the host ID is 94.97.
`
`Although configuring a host with asubneta subnet mask might seem redundant
`after examining the
`previous tables (since the class of a host is easily determined), subnet masks
`are also used to
`
`further segment an assigned network &0;2 among several local networks.
`For example, suppose a network is assigned the Class—8§ network address
`144.100. This is
`
`one of over 16,000 Class—%§ addresses capable of serving more than 65,000
`nodes. However,
`the worldwide corporate network to which this ID is assigned is composed of
`12 international
`
`LANs with 75 to $00120 nodes each. Insteadinstead of applying for 11 more
`network IDs, it is better to
`use subnetting toinakeinore effective use of the assigned ID 144.100. The third
`octet of the IP
`
`address can be used as a subnet ID,
`This splits the
`Class—%§ address into 254 subnets: 144.100.1 through 144.100.254, each of
`which can have
`
`to define the subnet mask 255.255.255.0.
`
`254 nodes.
`are used as
`
`(Host IBsg;;=0 and.255 should.not be assigned to a computerri they
`
`broadcast addresses, which are typically recognized by all computers.) Any
`12 of these
`
`network addresses could be assigned to the internationalljmflsiJ1this example.
`Within each
`
`LAN, each computer is assigned.aeniquea.unigue host ID, and.they all have the
`subnet mask
`255.255.255.0.
`
`The preceding example demonstrates a simple (and common) subnet scheme for
`Class—Baddresses§
`addresses. Sometimes it is necessary to segment only portions of an octet,
`using only a few
`Address
`class
`Bits for subnet mask subnet
`mask
`Class A 11111111 00000000 00000000
`00000000
`255.0.0.0
`Class B llllllll llllllll 00000000
`00000000
`255.255.0.0
`Class C llllllll llllllll llllllll
`OOOOOOOO
`255.255.255.0
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 44
`
`

`
`bits to specify subnet IDs;Q§ (such as when subnets exceed 256 nodes). Each
`user should check
`
`with the local network administrator to determine the network's subnet policy
`and the correct
`
`subnet mask. For all systems on the local network,
`the same for that
`network ID.
`
`the subnet mask must be
`
`Important
`All computers on.a logical network must use the same subnet mask and network
`ID+£ otherwise,
`addressing and routing problems can occur.
`
`IP Addressing
`Routing and IP Gateways
`TCP/IP networks are connected by gateways (or routers), which have knowledge
`of the
`
`networks connected in the internetwork. Although each IP host can maintain
`static routes for
`
`specific destinations, usually the default gateway is used to find remote
`destinations.
`(The
`
`default gateway is needed only for computers that are part of an internetwork .)
`Ghapter—3—Netwerking—Geaeepts—fer—T€PaP
`When.lP;§ prepares to send a packet, it inserts the local (source) IP address
`and the destination
`
`address of the packet in the lP;§ header and checks whether the network ID
`of the destination
`
`matches the network ID of the source. If they match,
`directly to the
`destination computer on the local network. Ifthelf the network IDs do not
`match,
`the routing table is
`examined for static routesvi If none are found,
`the default gateway for
`delivery.
`The default gateway is aeemputera computer connected to the local subnet and
`other networks that has
`
`the packet is forwarded to
`
`the packet isig sent
`
`knowledge of the network IDs for other networks in the internetwork and how
`to reach them.
`
`Because the default gateway knows the network IDs of the other networks in
`the internetwork,
`it can forward the packet to other gateways until the packet is eventually
`delivered to a gateway
`connected to the specified destination. This process is known as routing.
`N!jI0[E§
`Network
`
`A *
`
`§ Network
`Dther
`C
`networks
`
`Internetwerklnternetwork Routing Through Gateways
`On networks that are not part of an internetwork, IP gateways are not required.
`If a network is
`
`part of an internetwork and a system does not specify a default gateway
`(or iftheif the gateway
`
`Petitioner Sipnet EU S.R.O. - Exhibit 1018 - Page 45
`
`

`
`computer is not operating properly), only communication beyond the local
`subnet is impaired.
`Users can.add static routes by using the route utility to specify a route for
`apartiealara particular system.
`Static routes always override the use of default gateways.
`If the default gateway becomes unavailable,
`the computer cannot communicate
`outside its own
`
`subnet. Multiple default gateways can be assigned to prevent such a problem.
`When aeemputerg
`computer is configured with multiple default gateways, retransmission
`problems result in the
`system trying the other routers in the configuration to ensure
`intemetwerkinginternetworking communications
`capabilities. To configure multiple default gateways in.Windows NT, you must
`provide an lP;§
`address for each gateway in the Advanced Microsoft TCP/IP Configuration dialog
`box, as
`
`described in Chapter 2, "Installing and Configuring Microsoft TCP/IP and
`SNMP."
`
`Networking Concepts for TCP/IP 9of17
`IP

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket