throbber
Cisco Systems, Inc., Exhibit 1115
`Page 1
`
`

`
`Published by CMP Books
`An imprint of CMP Media LLC
`Main office: CMP Books, 600 Harrison St., San Francisco, CA 94107 USA
`Phone:415-947-6615;Fax:415-947-6015
`www.cmpbooks.com
`. .
`Email: books@cmp.com
`••
`••
`•• • •
`•• ••
`•• • •
`••••••
`CMP
`
`United Busmess Media
`
`Copyright© 2003 CMP Media LLC. All rights reserved. No part of this publication may
`be reproduced or distributed in any form or by any means, or stored in a database or
`retrieval system, without the prior written permission of the publisher.
`
`ISBN: 1-57820-302-3
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`CMP Books Distribution Center, 6600 Silacci Way, Gilroy, CA 95020
`..
`Tel: 1-800-500-6875 or 408-848-3854; Fax: 408-848-5784
`Email: cmp@rushorder.com; Web: www.cmpbooks.com
`
`Distributed to the book trade in the U.S. by:
`Publishers Group West, 1700 Fourth Street, Berkeley, California 94 710
`
`Distributed in Canada by:
`Jaguar Book Group, 100 Armstrong Avenue, Georgetown, Ontario M6K 3E7 Canada
`
`Transferred to Digital Printing 20 I 0
`
`Cisco Systems, Inc., Exhibit 1115
`Page 2
`
`

`
`xii
`
`N E T W 0 R K T U T 0 R I A L
`
`Hinners. Melanie McMullen and Steve Steinke expanded and upgraded the glossary to provide
`an even more comprehensive quick reference for unfamiliar terms.
`The third edition was edited by Steve Steinke, building on the editorial framework created
`by Patricia Schnaidt from the first and second editions.
`The tutorials new to the 4th edition ran between January 1996 and March 2000. The
`authors who wrote tutorials in that time span were Lee Chae, Alan Frank, David Greenfield,
`Anita Karve, Steve Steinke, and Alan Zeichick.
`I have one request to make of the reader: Please grant the authors a fair degree of slack
`with respect to the URLs cited here. Internet links get changed all the time, for reasons trivial
`and profound. We tend to print URLs with as much specificity as possible in order to unam(cid:173)
`biguously identify sources. However, these detailed locators are consequently fragile things.
`Aside from these considerations, URLs printed in a book will lack a certain degree of fresh(cid:173)
`ness from the mere facts of printing technology delays and shelf lives. A bit of ingenuity with
`a general search engine, or with the search features at one of the domains we cite, will go a
`long ways toward tracking down documents that are no longer in the place they were when we
`found them. The good news is that as far as I can tell, hardly anything that has been posted to
`the Web ever goes away completely.
`
`Steve Steinke
`January 2000
`
`Cisco Systems, Inc., Exhibit 1115
`Page 3
`
`

`
`Networks Protocols
`Part One
`A network protocol is a set of rules for com:unicating between computers. Protocols
`
`govern format, timing, sequencing, and error control. Without these rules, the computer can(cid:173)
`not make sense of the stream of incoming bits.
`But there is more than just basic communication. Suppose you plan to send a file from one
`computer to another. You could simply send it all in one single string of data. Unfortunately,
`that would stop others from using the network for the entire time it takes to send the message.
`This would not be appreciated by the other users. Additionally, if an error occurred during the
`transmission, the entire file would have to be sent again. To resolve both of these problems, the
`file is broken into small pieces called packets and the packets are grouped in a certain fashion.
`This means that information must be added to tell the receiver where each group belongs in
`relation to others, but this is a minor issue. To further improve transmission reliability, timing
`information and error correcting information are added.
`Because of this complexity, computer communication is broken down into steps. Each
`step has its own rules of operation and, consequently, its own protocol. These steps must be
`executed in a certain order, from the top down on transmission and from the bottom up on
`reception. Because of this hierarchical arrangement, the term protocol stack is often used to
`describe these steps. A protocol stack, therefore, is a set of rules for communication, and each
`step in the sequence has its own subset of rules.
`What is a protocol, really? It is software that resides either in a computer's memory or in
`the memory of a transmission device, like a network interface card. When data is ready for
`transmission, this software is executed. The software prepares data for transmission and sets
`the transmission in motion. At the receiving end, the software takes the data off the wire and
`prepares it for the computer by taking off all the information added by the transmitting end.
`There are a lot of protocols, and this often leads to confusion. A Novell network can com(cid:173)
`municate through its own set of rules (its own protocol called IPX/SPX), Microsoft does it
`another way (NetBEUI), DEC once did it a third way (DECnet), and IBM does it yet a fourth
`(NetBIOS). Since the transmitter and the receiver have to "speak" the same protocol, these
`
`3
`
`Cisco Systems, Inc., Exhibit 1115
`Page 4
`
`

`
`4
`
`UNDERSTANDING NETWORKS-LAYERS AND PROTOCOLS
`
`four systems cannot talk directly to each other. And even if they could directly communicate,
`there is no guarantee the data would be usable once it was communicated.
`Anyone who's ever wanted to transfer data from an IBM-compatible personal computer
`to an Apple Macintosh computer realizes that what should be a simple procedure is some(cid:173)
`times anything but. These two popular computers use widely differing-and incompati(cid:173)
`ble-file systems. That makes exchanging information between them impossible, unless
`you have translation software or a LAN. Even with a network, file transfer between these two
`types of computers isn't always transparent. [Editor's note: Even in the Internet age,
`Mac/Windows/Unix file exchange is often less than perfectly transparent.]
`If two types of personal computers can't communicate easily, imagine the problems
`occurring between PCs and mainframe computers, which operate in vastly different envi(cid:173)
`ronments and usually under their own proprietary operating software and protocols. For
`example, the original IBM PC's peripheral interface-known as a bus-transmitted data
`eight bits at a time. The newer 386,486, and Pentium PCs have 32-bit buses, and mainframes
`have even wider buses. This means that peripherals designed to operate with one bus are
`incompatible with another bus, and this includes network interface cards (NICs). Similar
`incompatibilities also exist with software. For instance, Unix-based applications (and often
`the data generated with them) cannot be used directly on PCs operating under Windows or
`MS-DOS. Resolving some of these incompatibilities is where protocol standards fit in.
`A protocol standard is a set of rules for computer communication that has been widely
`agreed upon and implemented by many vendors, users, and standards bodies. Ideally, a proto(cid:173)
`col standard should allow computers to talk to each other, even if they are from different ven(cid:173)
`dors. Computers don't have to use an industry-standard protocol to communicate, but if they
`use a proprietary protocol then they can only communicate with equipment of their own kind.
`There are many standard protocols, none of which could be called universal, but the suc(cid:173)
`cessful ones can be characterized with something called the OSI model. The standards and
`protocols associated with the OSI reference model are a cornerstone of the open systems
`concept for linking the literally dozens gf dissimilar computers found in offices throughout
`the world.
`
`THE OSI MODEL
`The Open System Interconnection ( OSI) model includes a set of protocols that attempt to
`define and standardize the data communications process. The OSI protocols were defined by
`the International Organization for Standardization {ISO). The OSI protocols have received
`the support of most major computer and network vendors, many large customers, and most
`governments, including the United States.
`
`Cisco Systems, Inc., Exhibit 1115
`Page 5
`
`

`
`NETWORK PROTOCOLS PART ONE
`
`5
`
`..
`
`The OSI model is a concept that describes how data communications should take place.
`It divides the process into seven groups, called layers. Into these layers are fitted the protocol
`standards developed by the ISO and other standards bodies, including the Institute of Elec(cid:173)
`trical and Electronic Engineers (IEEE), American National Standards Institute (ANSI), and
`the International Telecommunications Union (ITU), formerly known as the CCITT (Comite
`Consultatif International Telephonique et Telegraphique).
`The OSI model is not a single definition of how data communications actually takes place
`in the real world. Numerous protocols may exist at each layer. The OSI model states how the
`process should be divided and what protocols should be used at each layer. If a network ven-
`dor implements one of the protocols at each layer, its network components should work with
`other vendors' offerings.
`The OSI model is modular. Each successive layer of the OSI model works with the one
`above and below it. At least in theory, you may substitute one protocol for another at the same
`layer without affecting the operation of layers above or below. For example, Token Ring or
`Ethernet hardware should operate with multiple upper-layer services, including the trans(cid:173)
`port protocols, network operating system, internetwork protocols, and applications inter(cid:173)
`faces. However, for this interoperability to work, vendors must create products that meet the
`OSI model's specifications.
`Although each layer of the OSI model provides its own set of functions, it is possible to
`group the layers into two distinct categories. The first four layers- physical, data link, net(cid:173)
`work, and transport-provide the end-to-end services necessary for the transfer of data
`between two systems. These layers provide the protocols associated with the communica(cid:173)
`tions network used to link two computers together.
`The top three layers-the application, presentation, and session layers-provide the
`application services required for the exchange of information. That is, they allow two appli(cid:173)
`cations, each running on a different node of the network, to interact with each other through
`the services provided by their respective operating systems.
`A graphical illustration of the OSI model is shown above. The following is a description
`of just what each layer does.
`
`1. The Physical layer provides the electrical and mechanical interface to the network
`medium (the cable). This layer gives the data-link layer (layer 2) its ability to transport a
`stream of serial data bits between two communicating systems; it conveys the bits that
`move along the cable. It is responsible for making sure that the raw bits get from one place
`to another, no matter what shape they are in, and deals with the mechanical and electri(cid:173)
`cal characteristics of the cable.
`
`Cisco Systems, Inc., Exhibit 1115
`Page 6
`
`

`
`6
`
`UNDERSTANDING NETWORKS-LAYERS AND PROTOCOLS
`
`• The OS! model is not a sin(cid:173)
`gle definition of how data
`communications takes place.
`It states how the processes
`should be divided and offers
`several options. In addition to
`the OS! protocols, as defined
`by ISO, networks can use the
`TCP/IP protocol suite, the
`IBM Systems Network Archi(cid:173)
`tecture (SNA) suite, and oth(cid:173)
`ers. TCP/IP and SNA roughly
`follow the OS! structure.
`
`TCP/IP
`
`SMTP
`FI'P
`NFS
`Telnet
`SNMP
`
`UDP
`TCP
`
`IP
`
`LLC
`Ethernet
`
`IBM
`
`NetBIOS
`APPC
`
`NetBEUI
`APPC
`
`APPC
`
`LLC
`HDLC
`SDLC
`MAC
`
`MYRIAD PROTOCOL STACKS
`
`layer
`
`ISO
`
`7. Application
`
`FI'AMX.400
`JTAMX.500
`vr
`CASE
`
`6. Presentation
`
`5. Session
`
`8923
`
`8327
`
`8073 (TPO)
`8602 (CONS)
`
`8208 (X.25)
`8473 (CLNS)
`9542 (ES-IS)
`8348 (CONS)
`
`8802.2 LLC
`8802.3/4/5
`
`4. Transport
`
`3. Network
`
`2. Data-Link
`
`1. Physical
`
`8802.3 Ethernet
`8802.4 Token Bus
`8802.5 Token Ring
`
`Ethernet
`FDDI
`Token Ring
`
`Token Ring
`Ethernet
`FDDI
`
`2. The Data-Link layer handles the physical transfer, framing (the assembly of data into a
`single unit or block), flow control and error-control functions over a single transmission
`link; it is responsible for getting the data packaged for the Physical layer. The data link
`layer provides the network layer (layer 3) reliable information-transfer capabilities. The
`data-link layer is often subdivided into two parts-Logical Link Control (LLC) and
`Medium Access Control (MAC)-depending on the implementation.
`
`3. The Network layer establishes, maintains, and terminates logical and physical connec(cid:173)
`tions among multiple interconnected networks. The network layer is responsible for
`translating logical addresses, or names, into physical (or data-link) addresses.lt provides
`network routing and flow-control functions across the computer-network interface.
`
`4. The Transport layer ensures data is successfully sent and received between two end
`nodes. If data is sent incorrectly, this layer has the responsibility to ask for retransmission
`of the data. Specifically, it provides a reliable, network-independent message-interchange
`service to the top three application-oriented layers. This layer acts as an interface
`
`Cisco Systems, Inc., Exhibit 1115
`Page 7
`
`

`
`NETWORK PROTOCOLS PART ONE
`
`7
`
`between the bottom and top three layers. By providing the session layer (layer 5) with a
`reliable message transfer service, it hides the detailed operation of the underlying net(cid:173)
`work from the session layer.
`
`5. The Session layer decides when to turn communication on and off between two com put(cid:173)
`ers-it provides the mechanisms that control the data-exchange process and coordinates
`the interaction between them. It sets up and clears communication channels between two
`communicating components. Unlike the network layer (layer 3), it deals with the programs
`running in each machine to establish conversations between them. Some of the most com(cid:173)
`monly encountered protocol stacks, including TCP/IP, don't implement a session layer.
`
`6. The Presentation layer performs code conversion and data reformatting (syntax transla(cid:173)
`tion).It is the translator of the network, making sure the data is in the correct form for the
`receiving application. Of course, both the sending and receiving applications must be
`able to use data subscribing to one of the available abstract data syntax forms. Most com(cid:173)
`monly, applications handle these sorts of data translations themselves rather than hand(cid:173)
`ing them off to a Presentation layer.
`
`7. The Application layer provides the interface between the software running in a computer
`and the network. It provides functions to the user's software, including file transfer access
`and management (FTAM) and electronic mail service.
`
`Unfortunately, protocols in the real world do not conform precisely to these neat defini(cid:173)
`tions. Some network products and architectures combine layers. Others leave layers out. Still
`others break the layers apart. But no matter how they do it, all working network products
`achieve the same result-getting data from here to there. The question is, do they do it in a
`way that is compatible with networks in the rest of the world?
`
`WHAT 051 IS AND IS NOT
`While discussing the OSI reference model it is important to understand what the model
`does not specify as well as what it actually spells out. The ISO created the OSI reference model
`solely to describe the external behavior of electronics systems, not their internal functions.
`The reference model does not determine programming or operating system functions,
`nor does it specify an application programming interface (API). Neither does it dictate the
`end-user interface-that is, the command-line and/or icon-based prompts a user uses to
`interact with a computer system.
`The OSI standards merely describe what is placed on a network cable and when and how
`it will be placed there. It does not state how vendors must build their computers, only the
`
`Cisco Systems, Inc., Exhibit 1115
`Page 8
`
`

`
`8
`
`UNDERSTANDING NETWORKS-LAYERS AND PROTOCOLS
`
`• ISO has specified
`many different protocols
`at each layer of the OS!
`model. Some of the
`options are shown here.
`
`7
`
`6
`
`5
`
`4
`
`3
`
`2
`
`THE OSI PROTOCOLS
`
`X.400
`
`~
`
`s:
`
`fJ.l
`rJ)
`~
`
`C5
`0
`
`0
`0
`lJ")
`><
`
`0..
`::E
`u
`ACSE
`
`Presentation
`
`Session
`
`Transport Class 0-4
`
`Connection-Oriented, Connectionless
`
`~
`a
`
`l.l<
`
`~
`
`<:
`~
`
`CSMA/CD Token
`(Ethernet) Bus
`
`Token
`Ring
`
`FDDI
`
`X.25
`
`ISDN
`
`8802/3
`
`8802/4
`
`8802/5
`
`XT3.9 HDLC I.APB
`
`ISDN
`
`114A IEIA232
`
`kinds of behavior these systems may exhibit while performing certain communications
`operations.
`The OSI standards are distinct from the OSI suite of protocols. This concept permits a
`vendor to develop network elements that are more or less ignorant of the other components
`on the network. They are said to be ignorant in that they may need to know that other net(cid:173)
`work components exist, but not the specific details about their operating systems or interface
`buses. One of the primary benefits of this concept is that vendors can change the internal
`design of their network components without affecting their network functionality, as long as
`they maintain the OSI-prescribed external attributes. The figure below shows the protocols
`in the OSI suite.
`
`CONNECTION TYPES
`The OSI protocol suite is inherently connection-oriented, but the services each OSI layer
`provides can either be connection-oriented, or connectionless. In the three-step connection(cid:173)
`oriented mode operation (the steps are connection establishment, data transfer, and connec(cid:173)
`tion release), an explicit binding between two systems takes place.
`In connectionless operation, no such explicit link occurs; data transfer takes place with no
`specified connection and disconnection function occurring between the two communicating
`systems. Connectionless communication is also known as datagram communication.
`
`Cisco Systems, Inc., Exhibit 1115
`Page 9
`
`

`
`NETWORK PROTOCOLS PART ONE
`
`9
`
`AT THE PHYSICAL LAYER
`Let's compare some real protocols to the OSI model. The best known physical layer stan(cid:173)
`dards of the OSI model are those from the IEEE. That is, the ISO adopted some of the IEEE's
`physical network standards as part of its OSI model, including IEEE 802.3 or Ethernet, IEEE
`802.4 or token-passing bus, and IEEE 802.5 or Token Ring. ISO has changed the numbering
`scheme, however, so 802.3 networks are referred to as ISO 8802-3, 802.4 networks are ISO
`8802-4, and 802.5 networks are ISO 8802-5.
`Each physical layer standard defines the network's physical characteristics and how to get
`raw data from one place to another. They also define now multiple computers can simulta(cid:173)
`neously use the network without interfering with each other. (Technically, this last part is a
`job for the data-link layer, but we'll deal with that later.)
`IEEE 802.3 defines a network that can transmit data at lOMbps and uses a logical bus (or
`a straight line) layout. (Physically, the network can be configured as a bus or a star.) Data is
`simultaneously visible to all machines on the network and is nondirectional on the cable. All
`machines receive every frame, but only those meant to receive the data will process the frame
`and pass it to the next layer of the stack. Network access is determined by a protocol called
`Carrier Sense Multiple Access/Collision Detection (CSMA/CD). CSMA/CD lets any computer
`send data whenever the cable is free of traffic. If the data collides with another data packet,
`both computers "back off,' or wait a random time, then try again to send the data until access
`is permitted. Thus, once there is a high level of traffic, the more users there are, the more
`crowded and slower the network will become. Ethernet has found wide acceptance in office
`automation networks.
`IEEE 802.4 defines a physical network that has a bus layout. Like 802.3, Token Bus is a
`shared medium network. All machines receive all data but do not respond unless data is
`addressed to them. But unlike 802.3, network access is determined by a token that moves
`around the network. The token is visible to every device but only the device that is next in
`line for the token gets it. Once a device has the token it may transmit data. The Manufactur(cid:173)
`ing Automation Protocol (MAP) and Technical Office Protocol {TOP) standards use an 802.4
`physical layer. Token Bus has had little success outside of factory automation networks.
`IEEE 802.5 defines a network that transmits data at 4Mbps or 16Mbps and uses a logical
`ring layout, but is physically configured as a star. Data moves around the ring from station to
`station, and each station regenerates the signal. It does not support simultaneous multiple
`access as Ethernet does. The network access protocol is token-passing. The token and data
`move about in a ring, rather than over a bus as they do in Token Bus. Token Ring has found
`moderate acceptance in office automation networks and a greater degree of support in IBM(cid:173)
`centric environments.
`
`Cisco Systems, Inc., Exhibit 1115
`Page 10
`
`

`
`10
`
`UNDERSTANDING NETWORKS-LAYERS AND PROTOCOLS
`
`There are other physical and data-link layer standards, some that conform to the OSI
`model and others that don't. ARCnet is a well known one that only became standardized in
`1998, long after the time when it had any commercial significance. It uses a token-passing
`bus access method, but not the same as does IEEE 802.4. LocalTalk is Apple's proprietary
`network that transmits data at 230.4Kbps and uses CSMA/CA (Collision Avoidance). Fiber
`Distributed Data Interface (FDDI) is an ANSI and OSI standard for a fiber-optic LAN that
`uses a token-passing protocol to transmit data at 100Mbps on a ring.
`
`WHEN IT BEGAN
`The International Standards Organization, based in Geneva, Switzerland, is a multina(cid:173)
`tional body of representatives from the standards-setting agencies of about 90 countries.
`These agencies include the American National Standards Institute (ANSI) and British Stan(cid:173)
`dards Institute (BSI).
`Because of the multinational nature of Europe, and its critical need for intersystem com(cid:173)
`munication, the market for OSI-based products is particularly strong there. As a result, the
`European Computer Manufacturers' Association (ECMA) has played a major role in devel(cid:173)
`oping the OSI standards. In fact, before the Internet's Transmission Control Protocol/Internet
`Protocol (TCP/IP) began to dominate international networks, European networking vendors
`and users were generally further advanced in network standards, based on OSI implementa(cid:173)
`tions, than were their American counterparts, who relied principally on proprietary solu(cid:173)
`tions such as IBM's Systems Network Architecture (SNA) or TCP/IP.
`Creating the OSI standards was a long, drawn-out process: The ISO began work on OSI
`protocols in the late 1970s, finally releasing its seven-layer architecture in 1984. It wasn't
`until1988 that the five-step standards-setting process finally resulted in stabilized protocols
`for the upper layers of the OSI reference model. [Editor's note: From the perspective of 2000,
`the primary worldwide significance of the OSI protocols was in the use of the seven layer
`stack model as a way oflearning about networks. While there remain many implementations
`of OSI protocols, particularly in E~rope where they were in some cases legally imposed, it's
`clear that worldwide, the lion's share of new development and investment is devoted to
`TCP/IP and will be for the foreseeable future.]
`
`This tutorial, number 2, was originally published in the September 1988 issue of LAN
`Magazine/Network Magazine.
`
`Cisco Systems, Inc., Exhibit 1115
`Page 11
`
`

`
`NETWORK PROTOCOLS PART TWO
`
`11
`
`Network Protocols
`Part Two
`The Data-Link layer (the second OSI layer) is often divided into two sublayers; the Logi(cid:173)
`cal Link Control (LLC) and the Medium Access Control (MAC). The IEEE also defines stan(cid:173)
`dards at the data-link layer. The ISO standards for the MAC layer, or lower half of the data(cid:173)
`link layer, were taken directly from the IEEE 802.x standards.
`Medium Access Control, as its name suggests, is tlte protocol that determines which com(cid:173)
`puter gets to use the cable (the transmission medium) when several computers are trying.
`For example, 802.3 allows packets to collide with each other, forcing the computers to retry a
`transmission until it is sent successfully. 802.4 and 802.5limit conversation to the computer
`with the token. Remember, this is done in fractions of a second, so even when the network is
`busy, users don't wait very long for access on any of these three network types.
`The upper half of the data-link layer, the LLC, provides reliable data transfer over the
`physical link. In essence, it manages the physical link.
`The IEEE splits the data-link layer in half because the layer has two jobs to do. The first is
`to coordinate the physical transfer of data. The second is to manage access to the physical
`medium. Dividing the layer allows for more modularity and therefore more flexibility. The
`type of medium access control has more to do with the physical requirements of the network
`than the actual management of data transfer. In other words, the MAC layer is closer to the
`physical layer than the LLC layer. By dividing the layer, a number of MAC layers can be cre(cid:173)
`ated, each corresponding to a different physical layer, but just one LLC layer can handle them
`all. This increases flexibility and gives the LLC an important role in providing an interface
`between the various MAC layers and the higher-layer protocols. The role of the data-link's
`upper layer is so crucial, the IEEE gave it a standard of its own: 802.2 LLC.
`Besides 802.2,other protocols can perform the LLC functions. High-level Data-Link Con(cid:173)
`trol (HDLC) is a protocol from ISO, which also conforms to the OSI model. IBM's Synchro(cid:173)
`nous Data-Link Control (SDLC) does not conform to the OSI model but performs functions
`similar to the data-link layer. Digital Equipment's DDCMP or Digital Data Communications
`Protocol provides similar functions.
`
`THREE TRANSPORT PROTOCOLS
`The ISO has established protocol standards for the middle layers of the OSI model. The
`transport layer, at layer four, ensures that data is reliably transferred among transport serv(cid:173)
`ices and users. Layer five, the session layer, is responsible for process-to-process communi(cid:173)
`cation. The line between the session and transport layers is often blurred.
`
`Cisco Systems, Inc., Exhibit 1115
`Page 12
`
`

`
`12
`
`UNDERSTANDING NETWORKS-LAYERS AND PROTOCOLS
`
`As of yet, no ISO transport or session layer has been implemented on a widespread
`basis, nor has the complete OSI protocol stack been established. To make matters more con(cid:173)
`fusing, most middle-layer protocols on the market today do not fit neatly into the OSI
`model's transport and session layers, since many were created before the ISO began work on
`the OSI model.
`The good news is many existing protocols are being incorporated into the OSI model.
`Where existing protocols are not incorporated, interfaces to the OSI model are being imple(cid:173)
`mented. This is the case for TCP/IP, and IPX, which are the major middle-layer protocols
`available today.
`In the PC LAN environment, NetBIOS has been an important protocol. IBM developed
`NetBIOS (or Network Basic Input/Output System) as an input/output system for networks.
`NetBIOS can be considered a session-layer protocol that acts as an application interface to
`the network. It provides the tools for a program to establish a session with another program
`over the network. Many programs have been written to this interface.
`NetBIOS does not obey the rules of the OSI model in that it does not talk only to the layers
`above and below it. Programs can talk directly to NetBIOS, skipping the application and presen(cid:173)
`tation layers. This doesn't keep NetBIOS from doing its job; it just makes it incompatible with the
`OSI model. The main drawback of NetBIOS is that it is limited to working on a single network.
`TCP/IP or Transmission Control Protocol/Internet Protocol is actually several protocols.
`TCP is a transport protocol. IP operates on the network layer. TCP/IP traditionally enjoyed
`enormous support in government, scientific, and academic internetworks and in recent years
`has dominated the commercial networking environment, too. Part of the explanation is that
`corporate networks began to approach the size of networks found in the government and in
`universities, which drove corporations to look for internetworking protocol standards. They
`found TCP/IP to be progressively more useful as it became more widespread. Many people
`once viewed TCP/IP as an interim solution until OSI could be deployed, but no one seriously
`believes that the OSI protocols will ever have more than a niche role in the future.
`Often when TCP/IP is discussed, the subjects of SMTP, FTP, Telnet, and SNMP are also
`raised. These are application protocofs developed specifically for TCP/IP. SMTP or the Sim(cid:173)
`ple Mail Transfer Protocol is the electronic mail relay standard. FTP stands for File Transfer
`Protocol and is used to exchange files among computers running TCP/IP. Telnet is remote
`log-in and terminal emulation software. SNMP or the Simple Network Management Protocol
`is the most widely implemented network management protocol. The figure shows the proto(cid:173)
`cols of TCP /IP.
`Novell traditionally used IPX/SPX as its native transport protocols, though the company
`introduced a "native" implementation of TCP/IP in place of IPX/SPX. Internetwork Packet
`Exchange (IPX) and Sequenced Packet Exchange (SPX) are both variants of Xerox's XNS
`
`Cisco Systems, Inc., Exhibit 1115
`Page 13
`
`

`
`NETWORK PROTOCOLS PART TWO
`
`13
`
`• The TCP/IP stack includes pro(cid:173)
`tocols that provide services equiv(cid:173)
`alent to the OS! stack.
`
`5-7
`
`4
`
`3
`
`2
`
`THE TCP/IP PROTOCOL STACK
`
`File
`Transfer
`Protocol
`(FTP)
`
`Trivial
`File
`Transfer
`Protocol
`(TFTP)
`
`Simple
`Mail
`Transfer
`Protocol
`(SMTP)
`
`Telnet
`
`Simple
`Network
`Management
`Protocol
`(SNMP)
`
`Transmission Control
`Protocol (TCP)
`
`User Datagram
`Protocol (UDP)
`
`Internet Protocol (IP)
`
`Logical Unk Control (LLC)
`
`···································-···-················--·······--·-············-·······-~---·····················-·············
`
`Medium Access Control (MAC)
`
`Ethernet
`
`Token
`Ring
`
`FDDI
`
`X.25
`
`protocol. IPX provides network layer services, while SPX is somewhat rarely employed by
`applications that need transport layer services. Because IPX implementations prior to the
`introduction of Net Ware Link Services Protocol (NLSP) in Net Ware 4 caused a great deal of
`broadcast traffic and required frequent transmission acknowledgements, which can cause
`problems in a WAN, Novell also supported TCP/IP with gateways prior to its native TCP/IP
`implementation.
`Other transport layer protocols include XNS and NetBEUI. XNS or Xerox Network System
`was one of the first local area network protocols used on a wide basis, mainly for Ethernet
`networks. 3Com's 3+ used a version of it. NetBEUI is IBM's transport protocol for its PC net(cid:173)
`working products. (The legacy of IBM's long-deceased partnership with Microsoft lives on in
`Microsoft's default implementations of NetBEUI in Windows for Workgroups, Windows
`95/98, and Windows NT.)
`
`PROTOCOL BABEL
`If the number of available protocols seems like senseless confusion, it is and it isn't. Cer(cid:173)
`tain protocols have different advantages in specific environments. No single protocol stack
`will work better than every other in every setting. NetBIOS works well in small PC networks
`but is practically useless for communicating with WANs; APPC works well in peer-to-peer
`mainframe environments; TCP/IP excels in internetworks and heterogeneous environments.
`On the other hand, much more is made about the differences in protocols than is war(cid:173)
`ranted. Proprietary protocols can be perfect solutions in many cases. Besides, if proprietary
`protocols are sufficiently widespread, they become de facto standards, and gateways to other
`
`Cisco Systems, Inc., Exhibit 1

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket