throbber
Network Working Group J. Moy
`Request for Comments: 2178 Cascade Communications Corp.
`Obsoletes: 1583 July 1997
`Category: Standards Track
`
` OSPF Version 2
`
`Status of this Memo
`
` This document specifies an Internet standards track protocol for the
` Internet community, and requests discussion and suggestions for
` improvements. Please refer to the current edition of the "Internet
` Official Protocol Standards" (STD 1) for the standardization state
` and status of this protocol. Distribution of this memo is unlimited.
`
`Abstract
`
` This memo documents version 2 of the OSPF protocol. OSPF is a link-
` state routing protocol. It is designed to be run internal to a
` single Autonomous System. Each OSPF router maintains an identical
` database describing the Autonomous System’s topology. From this
` database, a routing table is calculated by constructing a shortest-
` path tree.
`
` OSPF recalculates routes quickly in the face of topological changes,
` utilizing a minimum of routing protocol traffic. OSPF provides
` support for equal-cost multipath. An area routing capability is
` provided, enabling an additional level of routing protection and a
` reduction in routing protocol traffic. In addition, all OSPF routing
` protocol exchanges are authenticated.
`
` The differences between this memo and RFC 1583 are explained in
` Appendix G. All differences are backward-compatible in nature.
` Implementations of this memo and of RFC 1583 will interoperate.
`
` Please send comments to ospf@gated.cornell.edu.
`
`Table of Contents
`
` 1 Introduction ........................................... 5
` 1.1 Protocol Overview ...................................... 5
` 1.2 Definitions of commonly used terms ..................... 6
` 1.3 Brief history of link-state routing technology ........ 9
` 1.4 Organization of this document ......................... 10
` 1.5 Acknowledgments ....................................... 11
` 2 The link-state database: organization and calculations 11
` 2.1 Representation of routers and networks ................ 11
`
`Moy Standards Track [Page 1]
`
`FatPipe, Ex. 2002, pg. 1
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` 2.1.1 Representation of non-broadcast networks .............. 13
` 2.1.2 An example link-state database ........................ 14
` 2.2 The shortest-path tree ................................ 18
` 2.3 Use of external routing information ................... 20
` 2.4 Equal-cost multipath .................................. 22
` 3 Splitting the AS into Areas ........................... 22
` 3.1 The backbone of the Autonomous System ................. 23
` 3.2 Inter-area routing .................................... 23
` 3.3 Classification of routers ............................. 24
` 3.4 A sample area configuration ........................... 25
` 3.5 IP subnetting support ................................. 31
` 3.6 Supporting stub areas ................................. 32
` 3.7 Partitions of areas ................................... 33
` 4 Functional Summary .................................... 34
` 4.1 Inter-area routing .................................... 35
` 4.2 AS external routes .................................... 35
` 4.3 Routing protocol packets .............................. 35
` 4.4 Basic implementation requirements ..................... 38
` 4.5 Optional OSPF capabilities ............................ 39
` 5 Protocol data structures .............................. 40
` 6 The Area Data Structure ............................... 42
` 7 Bringing Up Adjacencies ............................... 44
` 7.1 The Hello Protocol .................................... 44
` 7.2 The Synchronization of Databases ...................... 45
` 7.3 The Designated Router ................................. 46
` 7.4 The Backup Designated Router .......................... 47
` 7.5 The graph of adjacencies .............................. 48
` 8 Protocol Packet Processing ............................ 49
` 8.1 Sending protocol packets .............................. 49
` 8.2 Receiving protocol packets ............................ 51
` 9 The Interface Data Structure .......................... 54
` 9.1 Interface states ...................................... 57
` 9.2 Events causing interface state changes ................ 59
` 9.3 The Interface state machine ........................... 61
` 9.4 Electing the Designated Router ........................ 64
` 9.5 Sending Hello packets ................................. 66
` 9.5.1 Sending Hello packets on NBMA networks ................ 67
` 10 The Neighbor Data Structure ........................... 68
` 10.1 Neighbor states ....................................... 70
` 10.2 Events causing neighbor state changes ................. 75
` 10.3 The Neighbor state machine ............................ 76
` 10.4 Whether tocome adjacent ............................ 82
` 10.5 Receiving Hello Packets ............................... 83
` 10.6 Receiving Database Description Packets ................ 85
` 10.7 Receiving Link State Request Packets .................. 88
` 10.8 Sending Database Description Packets .................. 89
` 10.9 Sending Link State Request Packets .................... 90
` 10.10 An Example ............................................ 91
`
`Moy Standards Track [Page 2]
`
`FatPipe, Ex. 2002, pg. 2
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` 11 The Routing Table Structure ........................... 93
` 11.1 Routing table lookup .................................. 96
` 11.2 Sample routing table, without areas ................... 97
` 11.3 Sample routing table, with areas ...................... 97
` 12 Link State Advertisements (LSAs) ......................100
` 12.1 The LSA Header ........................................100
` 12.1.1 LS age ............................................... 101
` 12.1.2 Options .............................................. 101
` 12.1.3 LS type .............................................. 102
` 12.1.4 Link State ID ........................................ 102
` 12.1.5 Advertising Router ................................... 104
` 12.1.6 LS sequence number ................................... 104
` 12.1.7 LS checksum .......................................... 105
` 12.2 The link state database .............................. 105
` 12.3 Representation of TOS ................................ 106
` 12.4 Originating LSAs ..................................... 107
` 12.4.1 Router-LSAs .......................................... 110
` 12.4.1.1 Describing point-to-point interfaces ................. 112
` 12.4.1.2 Describing broadcast and NBMA interfaces ............. 113
` 12.4.1.3 Describing virtual links ............................. 113
` 12.4.1.4 Describing Point-to-MultiPoint interfaces ............ 114
` 12.4.1.5 Examples of router-LSAs .............................. 114
` 12.4.2 Network-LSAs ......................................... 116
` 12.4.2.1 Examples of network-LSAs ............................. 116
` 12.4.3 Summary-LSAs ......................................... 117
` 12.4.3.1 Originating summary-LSAs into stub areas ............. 119
` 12.4.3.2 Examples of summary-LSAs ............................. 119
` 12.4.4 AS-external-LSAs ..................................... 120
` 12.4.4.1 Examples of AS-external-LSAs ......................... 121
` 13 The Flooding Procedure ............................... 122
` 13.1 Determining which LSA is newer ....................... 126
` 13.2 Installing LSAs in the database ...................... 127
` 13.3 Next step in the flooding procedure .................. 128
` 13.4 Receiving self-originated LSAs ....................... 130
` 13.5 Sending Link State Acknowledgment packets ............ 131
` 13.6 Retransmitting LSAs .................................. 133
` 13.7 Receiving link state acknowledgments ................. 134
` 14 Aging The Link State Database ........................ 134
` 14.1 Premature aging of LSAs .............................. 135
` 15 Virtual Links ........................................ 135
` 16 Calculation of the routing table ..................... 137
` 16.1 Calculating the shortest-path tree for an area ....... 138
` 16.1.1 The next hop calculation ............................. 144
` 16.2 Calculating the inter-area routes .................... 145
` 16.3 Examining transit areas’ summary-LSAs ................ 146
` 16.4 Calculating AS external routes ....................... 149
` 16.4.1 External path preferences ............................ 151
` 16.5 Incremental updates -- summary-LSAs .................. 151
`
`Moy Standards Track [Page 3]
`
`FatPipe, Ex. 2002, pg. 3
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` 16.6 Incremental updates -- AS-external-LSAs .............. 152
` 16.7 Events generated as a result of routing table changes 153
` 16.8 Equal-cost multipath ................................. 154
` Footnotes ............................................ 155
` References ........................................... 158
` A OSPF data formats .................................... 160
` A.1 Encapsulation of OSPF packets ........................ 160
` A.2 The Options field .................................... 162
` A.3 OSPF Packet Formats .................................. 163
` A.3.1 The OSPF packet header ............................... 164
` A.3.2 The Hello packet ..................................... 166
` A.3.3 The Database Description packet ...................... 168
` A.3.4 The Link State Request packet ........................ 170
` A.3.5 The Link State Update packet ......................... 171
` A.3.6 The Link State Acknowledgment packet ................. 172
` A.4 LSA formats .......................................... 173
` A.4.1 The LSA header ....................................... 174
` A.4.2 Router-LSAs .......................................... 176
` A.4.3 Network-LSAs ......................................... 179
` A.4.4 Summary-LSAs ......................................... 180
` A.4.5 AS-external-LSAs ..................................... 182
` B Architectural Constants .............................. 184
` C Configurable Constants ............................... 186
` C.1 Global parameters .................................... 186
` C.2 Area parameters ...................................... 187
` C.3 Router interface parameters .......................... 188
` C.4 Virtual link parameters .............................. 190
` C.5 NBMA network parameters .............................. 191
` C.6 Point-to-MultiPoint network parameters ............... 191
` C.7 Host route parameters ................................ 192
` D Authentication ....................................... 193
` D.1 Null authentication .................................. 193
` D.2 Simple password authentication ....................... 193
` D.3 Cryptographic authentication ......................... 194
` D.4 Message generation ................................... 196
` D.4.1 Generating Null authentication ....................... 196
` D.4.2 Generating Simple password authentication ............ 197
` D.4.3 Generating Cryptographic authentication .............. 197
` D.5 Message verification ................................. 198
` D.5.1 Verifying Null authentication ........................ 199
` D.5.2 Verifying Simple password authentication ............. 199
` D.5.3 Verifying Cryptographic authentication ............... 199
` E An algorithm for assigning Link State IDs ............ 201
` F Multiple interfaces to the same network/subnet ....... 203
` G Differences from RFC 1583 ............................ 204
` G.1 Enhancements to OSPF authentication .................. 204
` G.2 Addition of Point-to-MultiPoint interface ............ 204
` G.3 Support for overlapping area ranges .................. 205
`
`Moy Standards Track [Page 4]
`
`FatPipe, Ex. 2002, pg. 4
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` G.4 A modification to the flooding algorithm ............. 206
` G.5 Introduction of the MinLSArrival constant ............ 206
` G.6 Optionally advertising point-to-point links as subnets 207
` G.7 Advertising same external route from multiple areas .. 207
` G.8 Retransmission of initial Database Description packets 209
` G.9 Detecting interface MTU mismatches ................... 209
` G.10 Deleting the TOS routing option ...................... 209
` Security Considerations .............................. 210
` Author’s Address ..................................... 211
`
`1. Introduction
`
` This document is a specification of the Open Shortest Path First
` (OSPF) TCP/IP internet routing protocol. OSPF is classified as an
` Interior Gateway Protocol (IGP). This means that it distributes
` routing information between routers belonging to a single Autonomous
` System. The OSPF protocol is based on link-state or SPF technology.
` This is a departure from the Bellman-Ford base used by traditional
` TCP/IP internet routing protocols.
`
` The OSPF protocol was developed by the OSPF working group of the
` Internet Engineering Task Force. It has been designed expressly for
` the TCP/IP internet environment, including explicit support for CIDR
` and the tagging of externally-derived routing information. OSPF also
` provides for the authentication of routing updates, and utilizes IP
` multicast when sending/receiving the updates. In addition, much work
` has been done to produce a protocol that responds quickly to topology
` changes, yet involves small amounts of routing protocol traffic.
`
`1.1. Protocol overview
`
` OSPF routes IP packets based solely on the destination IP address
` found in the IP packet header. IP packets are routed "as is" -- they
` are not encapsulated in any further protocol headers as they transit
` the Autonomous System. OSPF is a dynamic routing protocol. It
` quickly detects topological changes in the AS (such as router
` interface failures) and calculates new loop-free routes after a
` period of convergence. This period of convergence is short and
` involves a minimum of routing traffic.
`
` In a link-state routing protocol, each router maintains a database
` describing the Autonomous System’s topology. This database is
` referred to as the link-state database. Each participating router has
` an identical database. Each individual piece of this database is a
` particular router’s local state (e.g., the router’s usable interfaces
` and reachable neighbors). The router distributes its local state
` throughout the Autonomous System by flooding.
`
`Moy Standards Track [Page 5]
`
`FatPipe, Ex. 2002, pg. 5
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` All routers run the exact same algorithm, in parallel. From the
` link-state database, each router constructs a tree of shortest paths
` with itself as root. This shortest-path tree gives the route to each
` destination in the Autonomous System. Externally derived routing
` information appears on the tree as leaves.
`
` When several equal-cost routes to a destination exist, traffic is
` distributed equally among them. The cost of a route is described by
` a single dimensionless metric.
`
` OSPF allows sets of networks to be grouped together. Such a grouping
` is called an area. The topology of an area is hidden from the rest
` of the Autonomous System. This information hiding enables a
` significant reduction in routing traffic. Also, routing within the
` area is determined only by the area’s own topology, lending the area
` protection from bad routing data. An area is a generalization of an
` IP subnetted network.
`
` OSPF enables the flexible configuration of IP subnets. Each route
` distributed by OSPF has a destination and mask. Two different
` subnets of the same IP network number may have different sizes (i.e.,
` different masks). This is commonly referred to as variable length
` subnetting. A packet is routed to the best (i.e., longest or most
` specific) match. Host routes are considered to be subnets whose
` masks are "all ones" (0xffffffff).
`
` All OSPF protocol exchanges are authenticated. This means that only
` trusted routers can participate in the Autonomous System’s routing.
` A variety of authentication schemes can be used; in fact, separate
` authentication schemes can be configured for each IP subnet.
`
` Externally derived routing data (e.g., routes learned from an
` Exterior Gateway Protocol such as BGP; see [Ref23]) is advertised
` throughout the Autonomous System. This externally derived data is
` kept separate from the OSPF protocol’s link state data. Each
` external route can also be tagged by the advertising router, enabling
` the passing of additional information between routers on the boundary
` of the Autonomous System.
`
`1.2. Definitions of commonly used terms
`
` This section provides definitions for terms that have a specific
` meaning to the OSPF protocol and that are used throughout the text.
` The reader unfamiliar with the Internet Protocol Suite is referred to
` [Ref13] for an introduction to IP.
`
`Moy Standards Track [Page 6]
`
`FatPipe, Ex. 2002, pg. 6
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` Router
` A level three Internet Protocol packet switch. Formerly called a
` gateway in much of the IP literature.
`
` Autonomous System
` A group of routers exchanging routing information via a common
` routing protocol. Abbreviated as AS.
`
` Interior Gateway Protocol
` The routing protocol spoken by the routers belonging to an
` Autonomous system. Abbreviated as IGP. Each Autonomous System has
` a single IGP. Separate Autonomous Systems may be running
` different IGPs.
`
` Router ID
` A 32-bit number assigned to each router running the OSPF protocol.
` This number uniquely identifies the router within an Autonomous
` System.
`
` Network
` In this memo, an IP network/subnet/supernet. It is possible for
` one physical network to be assigned multiple IP network/subnet
` numbers. We consider these to be separate networks. Point-to-
` point physical networks are an exception - they are considered a
` single network no matter how many (if any at all) IP
` network/subnet numbers are assigned to them.
`
` Network mask
` A 32-bit number indicating the range of IP addresses residing on a
` single IP network/subnet/supernet. This specification displays
` network masks as hexadecimal numbers. For example, the network
` mask for a class C IP network is displayed as 0xffffff00. Such a
` mask is often displayed elsewhere in the literature as
` 255.255.255.0.
`
` Point-to-point networks
` A network that joins a single pair of routers. A 56Kb serial line
` is an example of a point-to-point network.
`
`Moy Standards Track [Page 7]
`
`FatPipe, Ex. 2002, pg. 7
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` Broadcast networks
` Networks supporting many (more than two) attached routers,
` together with the capability to address a single physical message
` to all of the attached routers (broadcast). Neighboring routers
` are discovered dynamically on these nets using OSPF’s Hello
` Protocol. The Hello Protocol itself takes advantage of the
` broadcast capability. The OSPF protocol makes further use of
` multicast capabilities, if they exist. Each pair of routers on a
` broadcast network is assumed to be able to communicate directly.
` An ethernet is an example of a broadcast network.
`
` Non-broadcast networks
` Networks supporting many (more than two) routers, but having no
` broadcast capability. Neighboring routers are maintained on these
` nets using OSPF’s Hello Protocol. However, due to the lack of
` broadcast capability, some configuration information may be
` necessary to aid in the discovery of neighbors. On non-broadcast
` networks, OSPF protocol packets that are normally multicast need
` to be sent to each neighboring router, in turn. An X.25 Public
` Data Network (PDN) is an example of a non-broadcast network.
`
` OSPF runs in one of two modes over non-broadcast networks. The
` first mode, called non-broadcast multi-access or NBMA, simulates
` the operation of OSPF on a broadcast network. The second mode,
` called Point-to-MultiPoint, treats the non-broadcast network as a
` collection of point-to-point links. Non-broadcast networks are
` referred to as NBMA networks or Point-to-MultiPoint networks,
` depending on OSPF’s mode of operation over the network.
`
` Interface
` The connection between a router and one of its attached networks.
` An interface has state information associated with it, which is
` obtained from the underlying lower level protocols and the routing
` protocol itself. An interface to a network has associated with it
` a single IP address and mask (unless the network is an unnumbered
` point-to-point network). An interface is sometimes also referred
` to as a link.
`
` Neighboring routers
` Two routers that have interfaces to a common network. Neighbor
` relationships are maintained by, and usually dynamically
` discovered by, OSPF’s Hello Protocol.
`
` Adjacency
` A relationship formed between selected neighboring routers for the
` purpose of exchanging routing information. Not every pair of
` neighboring routers become adjacent.
`
`Moy Standards Track [Page 8]
`
`FatPipe, Ex. 2002, pg. 8
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` Link state advertisement
` Unit of data describing the local state of a router or network.
` For a router, this includes the state of the router’s interfaces
` and adjacencies. Each link state advertisement is flooded
` throughout the routing domain. The collected link state
` advertisements of all routers and networks forms the protocol’s
` link state database. Throughout this memo, link state
` advertisement is abbreviated as LSA.
`
` Hello Protocol
` The part of the OSPF protocol used to establish and maintain
` neighbor relationships. On broadcast networks the Hello Protocol
` can also dynamically discover neighboring routers.
`
` Flooding
` The part of the OSPF protocol that distributes and synchronizes
` the link-state database between OSPF routers.
`
` Designated Router
` Each broadcast and NBMA network that has at least two attached
` routers has a Designated Router. The Designated Router generates
` an LSA for the network and has other special responsibilities in
` the running of the protocol. The Designated Router is elected by
` the Hello Protocol.
`
` The Designated Router concept enables a reduction in the number of
` adjacencies required on a broadcast or NBMA network. This in turn
` reduces the amount of routing protocol traffic and the size of the
` link-state database.
`
` Lower-level protocols
` The underlying network access protocols that provide services to
` the Internet Protocol and in turn the OSPF protocol. Examples of
` these are the X.25 packet and frame levels for X.25 PDNs, and the
` ethernet data link layer for ethernets.
`
`1.3. Brief history of link-state routing technology
`
` OSPF is a link state routing protocol. Such protocols are also
` referred to in the literature as SPF-based or distributed-database
` protocols. This section gives a brief description of the
` developments in link-state technology that have influenced the OSPF
` protocol.
`
` The first link-state routing protocol was developed for use in the
` ARPANET packet switching network. This protocol is described in
` [Ref3]. It has formed the starting point for all other link-state
` protocols. The homogeneous ARPANET environment, i.e., single-vendor
`
`Moy Standards Track [Page 9]
`
`FatPipe, Ex. 2002, pg. 9
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` packet switches connected by synchronous serial lines, simplified the
` design and implementation of the original protocol.
`
` Modifications to this protocol were proposed in [Ref4]. These
` modifications dealt with increasing the fault tolerance of the
` routing protocol through, among other things, adding a checksum to
` the LSAs (thereby detecting database corruption). The paper also
` included means for reducing the routing traffic overhead in a link-
` state protocol. This was accomplished by introducing mechanisms
` which enabled the interval between LSA originations to be increased
` by an order of magnitude.
`
` A link-state algorithm has also been proposed for use as an ISO IS-IS
` routing protocol. This protocol is described in [Ref2]. The
` protocol includes methods for data and routing traffic reduction when
` operating over broadcast networks. This is accomplished by election
` of a Designated Router for each broadcast network, which then
` originates an LSA for the network.
`
` The OSPF Working Group of the IETF has extended this work in
` developing the OSPF protocol. The Designated Router concept has been
` greatly enhanced to further reduce the amount of routing traffic
` required. Multicast capabilities are utilized for additional routing
` bandwidth reduction. An area routing scheme has been developed
` enabling information hiding/protection/reduction. Finally, the
` algorithms have been tailored for efficient operation in TCP/IP
` internets.
`
`1.4. Organization of this document
`
` The first three sections of this specification give a general
` overview of the protocol’s capabilities and functions. Sections 4-16
` explain the protocol’s mechanisms in detail. Packet formats,
` protocol constants and configuration items are specified in the
` appendices.
`
` Labels such as HelloInterval encountered in the text refer to
` protocol constants. They may or may not be configurable.
` Architectural constants are summarized in Appendix B. Configurable
` constants are summarized in Appendix C.
`
` The detailed specification of the protocol is presented in terms of
` data structures. This is done in order to make the explanation more
` precise. Implementations of the protocol are required to support the
` functionality described, but need not use the precise data structures
` that appear in this memo.
`
`Moy Standards Track [Page 10]
`
`FatPipe, Ex. 2002, pg. 10
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
`1.5. Acknowledgments
`
` The author would like to thank Ran Atkinson, Fred Baker, Jeffrey
` Burgan, Rob Coltun, Dino Farinacci, Vince Fuller, Phanindra
` Jujjavarapu, Milo Medin, Tom Pusateri, Kannan Varadhan, Zhaohui Zhang
` and the rest of the OSPF Working Group for the ideas and support they
` have given to this project.
`
` The OSPF Point-to-MultiPoint interface is based on work done by Fred
` Baker.
`
` The OSPF Cryptographic Authentication option was developed by Fred
` Baker and Ran Atkinson.
`
`2. The Link-state Database: organization and calculations
`
` The following subsections describe the organization of OSPF’s link-
` state database, and the routing calculations that are performed on
` the database in order to produce a router’s routing table.
`
`2.1. Representation of routers and networks
`
` The Autonomous System’s link-state database describes a directed
` graph. The vertices of the graph consist of routers and networks. A
` graph edge connects two routers when they are attached via a physical
` point-to-point network. An edge connecting a router to a network
` indicates that the router has an interface on the network. Networks
` can be either transit or stub networks. Transit networks are those
` capable of carrying data traffic that is neither locally originated
` nor locally destined. A transit network is represented by a graph
` vertex having both incoming and outgoing edges. A stub network’s
` vertex has only incoming edges.
`
` The neighborhood of each network node in the graph depends on the
` network’s type (point-to-point, broadcast, NBMA or Point-to-
` MultiPoint) and the number of routers having an interface to the
` network. Three cases are depicted in Figure 1a. Rectangles indicate
` routers. Circles and oblongs indicate networks. Router names are
` prefixed with the letters RT and network names with the letter N.
` Router interface names are prefixed by the letter I. Lines between
` routers indicate point-to-point networks. The left side of the
` figure shows networks with their connected routers, with the
` resulting graphs shown on the right.
`
`Moy Standards Track [Page 11]
`
`FatPipe, Ex. 2002, pg. 11
`Talari v. FatPipe
`IPR2016-00976
`
`

`

`
`RFC 2178 OSPF Version 2 July 1997
`
` **FROM**
`
` * |RT1|RT2|
` +---+Ia +---+ * ------------
` |RT1|------|RT2| T RT1| | X |
` +---+ Ib+---+ O RT2| X | |
` * Ia| | X |
` * Ib| X | |
`
` Physical point-to-point networks
`
` **FROM**
` +---+ *
` |RT7| * |RT7| N3|
` +---+ T ------------
` | O RT7| | |
` +----------------------+ * N3| X | |
` N3 *
`
` Stub networks
`
` +---+ +---+
` |RT3| |RT4| |RT3|RT4|RT5|RT6|N2 |
` +---+ +---+ * ------------------------
` | N2 | * RT3| | | | | X |
` +----------------------+ T RT4| | | | | X |
` | | O RT5| | | | | X |
` +---+ +---+ * RT6| | | | | X |
` |RT5| |RT6| * N2| X | X | X | X | |
` +---+ +---+
`
` Broadcast or NBMA networks
`
` Figure 1a: Network map components
`
` Networks and routers ar

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket