`Cisco v. SSL, |PR2015-01754
`Page 1 of4
`
`CSCO-1037
`Cisco v. SSL, IPR2015-01754
`Page 1 of 4
`
`
`
`TCP/IP Illustrated, Volume 1
`
`The Protocols
`
`W. Richard Stevens
`
`A
`VV
`
`ADDISON-WESLEY
`
`An imprint of Addison Wesley Longman, Inc.
`Reading, Massachusetts - Harlow, England - Menlo Park, California
`Berkeley, California - Don Mills, Ontario - Sydney
`Bonn - Amsterdam - Tokyo - Mexico City
`
`CSCO-1037
`Cisco v. SSL, IPR2015-01754
`Page 2 of 4
`
`
`
`UNIX is a technology trademark of X/Open Company, Ltd.
`
`The publisher offers discounts on this book when ordered in quantity for special sales.
`For more information please contact:
`Corporate & Professional Publishing Group
`Addison-Wesley Publishing Company
`One Jacob Way
`Reading, Massachusetts 01867
`
`Library of Congress Cataloging-in-Publication Data
`Stevens, W. Richard
`TCP/IP Illustrated: the protocols/W. Richard Stevens.
`p. cm. — (Addison-Wesley professional computing series)
`Includes bibliographical references and index.
`ISBN 0-201-63346-9 (v. 1)
`1.TCP/IP (Computer network protocol) I. Title. II. Series.
`TK5105.55S74 1994
`-
`004.6’2—dc20
`
`Copyright © 1994 Addison Wesley Longrnan, Inc.
`
`All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
`or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or
`otherwise, without prior written permission of the publisher. Printed in the United States of
`America. Published simultaneously in Canada.
`
`Text printed on recycled and acid-free paper
`
`ISBN 0-20 1 -63 346-9
`9101] 1213 14151617-MA-99989796
`Ninth printing, December 1996
`
`CSCO-1037
`Cisco v. SSL, IPR2015-01754
`Page 3 of 4
`
`
`
`routing
`daemon
`\
`
`route
`command
`
`routing table “
`updates from\
`adjacent routers ‘\
`
`our packet (one of
`our IP addresses or
`broadcas addrs) ?
`
`process IP options
`
`IP input queue
`
`JP_1‘1y_er_______________ _ _
`
`network interfaces
`
`Figure 9.1 Processing done at the IP layer.
`
`Routing Principles
`
`The place to start our discussion of IP routing is to understand what is maintained by
`the kernel in its routing table. The information contained in the routing table drives all
`the routing decisions made by IP.
`In Section 3.3 we listed the steps that IP performs when it searches its routing table.
`
`1. Search for a matching host address.
`
`2. Search for a matching network address.
`3. Search for a default entry. (The default entry is normally specified in the routing
`table as a network entry, with a network ID of O.)
`
`A matching host address is always used before a matching network address.
`The routing done by IP, when it searches the routing table and decides which inter-
`face to send a packet out, is a routing mechanism. This differs from a routing policy, which
`is a set of rules that decides which routes go into the routing table. IP performs the
`routing mechanism while a routing daemon normally provides the routing policy.
`
`CSCO-1037
`Cisco v. SSL, IPR2015-01754
`Page 4 of 4