throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`____________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
` ____________
`
`SANDVINE CORPORATION AND SANDVINE INCORPORATED ULC,
`Petitioners,
`
`v.
`
`PACKET INTELLIGENCE, LLC,
`Patent Owner.
`
`____________
`
`Case No. IPR2017-00450
`U.S. Patent No. 6,771,646
` ____________
`
`DECLARATION OF BILL LIN, PH.D.
`
`Petitioners' EX1006 Page 1
`
`

`
`I, Bill Lin, hereby declare the following:
`
`I.
`
`BACKGROUND AND EDUCATION
`1. My name is Bill Lin, and I am a Professor of Electrical and Computer
`
`Engineering and an Adjunct Professor of Computer Science and Engineering at the
`
`University of California, San Diego.
`
`2.
`
`I received a Bachelor of Science in Electrical Engineering and
`
`Computer Sciences from University of California, Berkeley in May 1985; a
`
`Masters of Science in Electrical Engineering and Computer Sciences from the
`
`University of California, Berkeley in May 1988; and a Ph.D. in Electrical
`
`Engineering and Computer Sciences from the University of California, Berkeley in
`
`May 1991. Although I discuss my expert qualifications in more detail below, I
`
`also attach as Appendix A a recent and complete curriculum vitae, which details
`
`my educational and professional background and includes a selected listing of my
`
`relevant publications.
`
`3.
`
`I have been involved in research and technology in all aspects of
`
`computer networking and computer design problems, including the design of data
`
`networks, high-performance switches and routers, high-performance packet
`
`monitoring and measurements, many-core processors, and systems-on-chip
`
`designs.
`
` 1
`
`Petitioners' EX1006 Page 2
`
`

`
`4.
`
`I am a named inventor on five patents in the field of computer
`
`engineering, including several patents in the field of computer networking, and I
`
`have published over 170 journal articles and conference papers in top-tier venues
`
`and publications.
`
`5.
`
`I have also served or am currently serving as Associate Editor or
`
`Guest Editor for 3 ACM or IEEE journals, as General Chair on 4 ACM or IEEE
`
`conferences, on the Organizing or Steering Committees for 6 ACM or IEEE
`
`conferences, and on the Technical Program Committees of over 44 ACM or IEEE
`
`conferences.
`
`6.
`
`In summary, I have over 25 years of experience in research and
`
`development in the areas of computer networking and computer design.
`
`7.
`
`I have been retained by Erise IP, PA on behalf of Sandvine
`
`Corporation and Sandvine Incorporated ULC and am submitting this declaration to
`
`offer my independent expert opinion concerning certain issues raised in the
`
`Petition for inter partes Review (“Petition”). My compensation is not based on the
`
`substance of the opinions rendered here. As part of my work in connection with
`
`this matter, I have studied U.S. Patent No. 6,771,646 (“the ‘646 patent”), including
`
`the respective written descriptions, figures, claims, in addition to the original file
`
`history. Moreover , I have reviewed the Petition for Inter Partes Review of the
`
` 2
`
`Petitioners' EX1006 Page 3
`
`

`
`‘646 patent and I have also carefully considered the following references discussed
`
`in the Petition, in addition to all of the materials cited herein:
`
`• U.S. Patent No. 6,115,393 to Engel et al. (“Engel”), entitled “Network
`Monitoring,” filed July 21, 1995 and issued September 5, 2000
`[EX1007], including Engel’s Appendix VI (cited in Engel at 1:10-15,
`6:1-3, 43:25-56) [EX1009]
`
`• U.S. Patent No. 6,182,146 to Graham-Cumming, Jr. (“Graham-
`Cumming”), entitled “Automatic
`Identification of Application
`Protocols
`through Dynamic Mapping
`of Application-Port
`Associations,” filed June 27, 1997 and issued January 30, 2001
`[EX1010]
`
`• U.S. Patent No. 5,530,834 to Colloff et al. (“Colloff”), entitled “Set-
`Associative Cache Memory Having an Enhanced LRU Replacement
`Strategy,” filed March 3, 1994 and issued June 25, 1996 [EX1011]
`
`• U.S. Patent No. 5,793,954 to Baker et al. (“Baker”), entitled “System
`and Method for General Purpose Network Analysis,” filed December
`20, 1995 and issued August 11, 1998 [EX1012]
`II. LEGAL FRAMEWORK
`8.
`I have been informed by counsel and understand that the first step in
`
`an unpatentability analysis involves construing the claims, as necessary, to
`
`determine their scope. And, second, the construed claim language is then
`
`compared to the disclosure of the prior art. In proceedings before the United States
`
`Patent and Trademark Office, I have been informed that the claims of an unexpired
`
`patent are to be given their broadest reasonable interpretation in light of the
`
`specification from the perspective of a person of ordinary skill in the art at the time
`
`of the invention. I have been informed that the ‘646 Patent is unexpired.
`
` 3
`
`Petitioners' EX1006 Page 4
`
`

`
`9.
`
`In comparing the claims of the ‘646 Patent to the prior art, I have
`
`carefully considered the ‘646 Patent and its prosecution history based upon my
`
`experience and knowledge in the relevant field. In my opinion, the broadest
`
`reasonable interpretation of the claim terms of the ‘646 Patent is generally
`
`consistent with the ordinary and customary meaning of those terms, as one skilled
`
`in the relevant field would understand them at the time of the invention. For
`
`purposes of this proceeding, I have applied the claim constructions set forth in the
`
`claim construction section of the IPR Petition that this declaration accompanies
`
`when analyzing the prior art and the claims. For those terms that have not
`
`expressly been construed, I have applied the meaning of the claim terms of the
`
`‘646 Patent that is generally consistent with the terms’ ordinary and customary
`
`meaning, as a person of ordinary skill in the art would have understood them at the
`
`time of the invention.
`
`10.
`
`I have been informed by counsel that there are two ways in which a
`
`prior art patent or printed publication can be used to invalidate a patent. First, the
`
`prior art can be shown to “anticipate” the claim. Second, the prior art can be shown
`
`to “render obvious” the claim. My understanding of the two legal standards is set
`
`forth below.
`
`11.
`
`I have been informed by counsel that, in general, for a patent claim to
`
`be invalid as “anticipated” by the prior art, each and every feature of the claim
`
` 4
`
`Petitioners' EX1006 Page 5
`
`

`
`must be found, expressly or inherently, in a single prior art reference or product
`
`arranged as in the claim. Claim limitations that are not expressly found in a prior
`
`art reference are inherent if the prior art necessarily functions in accordance with,
`
`or includes, the claim limitations.
`
`12.
`
`I have also been informed by counsel that an inventor is not entitled to
`
`a patent if his or her invention would have been obvious to a person of ordinary
`
`skill in the field of the invention at the time the invention was made. I understand
`
`that a patent claim is not patentable under 35 U.S.C. § 103 if the differences
`
`between the patent claim and the prior art are such that the claimed subject matter
`
`as a whole would have been obvious at the time the claimed invention was made to
`
`a person having ordinary skill in the art to which the subject matter pertains.
`
`Obviousness, as I understand it, is based on the scope and content of the prior art,
`
`the differences between the prior art and the claim, the level of ordinary skill in the
`
`art, and, to the extent that they exist and have an appropriate nexus to the claimed
`
`invention (as opposed to prior art features), secondary indicia of non-obviousness.
`
`13.
`
`I have been informed that whether there are any relevant differences
`
`between the prior art and the claimed invention is to be analyzed from the view of
`
`a person of ordinary skill in the art at the time of the invention, in this case June
`
`30, 1999. As such, my opinions below as to a person of ordinary skill in the art are
`
` 5
`
`Petitioners' EX1006 Page 6
`
`

`
`as of the time of the invention, even if not expressly stated as such; for example,
`
`even if stated in the present tense.
`
`14.
`
`In analyzing the relevance of the differences between the claimed
`
`invention and the prior art, I have been informed that I must consider the impact, if
`
`any, of such differences on the obviousness or non-obviousness of the invention as
`
`a whole, not merely some portion of it. The person of ordinary skill faced with a
`
`problem is able to apply his or her experience and ability to solve the problem and
`
`also look to any available prior art to help solve the problem.
`
`15. An invention is obvious if a person of ordinary skill in the art, facing
`
`the wide range of needs created by developments in the field, would have seen an
`
`obvious benefit to the solutions tried by the applicant. When there is a design need
`
`or market pressure to solve a problem and there are a finite number of identified,
`
`predictable solutions, it would be obvious to a person of ordinary skill to try the
`
`known options. If a technique has been used to improve one device, and a person
`
`of ordinary skill in the art would recognize that it would improve similar devices in
`
`the same way, using the technique would have been obvious.
`
`16.
`
`It is my understanding that a precise teaching in the prior art directed
`
`to the subject matter of the claimed invention is not needed and that one may take
`
`into account the inferences and creative steps that a person of ordinary skill in the
`
`art would have employed in reviewing the prior art at the time of the invention.
`
` 6
`
`Petitioners' EX1006 Page 7
`
`

`
`For example, if the claimed invention combined elements known in the prior art
`
`and the combination yielded results that were predictable to a person of ordinary
`
`skill in the art at the time of the invention, then this evidence would make it more
`
`likely that the claim was obvious. On the other hand, if the combination of known
`
`elements yielded unexpected or unpredictable results, or if the prior art teaches
`
`away from combining the known elements, then this evidence would make it more
`
`likely that the claim that successfully combined those elements was not obvious.
`
`17.
`
`I understand that hindsight must not be used when comparing the
`
`prior art to the invention for obviousness.
`
`18.
`
`It is my understanding that obviousness may also be shown by
`
`demonstrating that it would have been obvious to modify what is taught in a single
`
`piece of prior art to create the subject matter of the patent claim. Obviousness may
`
`be shown by showing that it would have been obvious to combine the teachings of
`
`more than one item of prior art. In determining whether a piece of prior art could
`
`have been combined with other prior art or combined with or modified in view of
`
`other information within the knowledge of one of ordinary skill in the art, the
`
`following are examples of approaches and rationales that may be considered:
`
`•
`
`•
`
`Combining prior art elements according to known methods to yield
`predictable results;
`
`Simple substitution of one known element for another to obtain
`predictable results;
`
` 7
`
`Petitioners' EX1006 Page 8
`
`

`
`•
`
`•
`
`•
`
`•
`
`•
`
`Use of a known technique to improve similar devices (methods, or
`products) in the same way;
`
`Applying a known technique to a known device (method, or product)
`ready for improvement to yield predictable results;
`
`Applying a technique or approach that would have been "obvious to
`try" (choosing from a finite number of identified, predictable solutions,
`with a reasonable expectation of success);
`
`Known work in one field of endeavor may prompt variations of it for
`use in either the same field or a different one based on design
`incentives or other market forces if the variations would have been
`predictable to one of ordinary skill in the art; or
`
`Some teaching, suggestion, or motivation in the prior art that would
`have led one of ordinary skill to modify the prior art reference or to
`combine prior art reference teachings to arrive at the claimed
`invention.
`
`19.
`
`I understand that the rationale for modifying a reference and/or
`
`combining references may come from sources such as explicit statements in the
`
`prior art, or the knowledge of one of ordinary skill in the art, including any need or
`
`problem known in the field at the time, even if different from the specific need or
`
`problem addressed by the inventor of the patent claim.
`
`III. LEVEL OF A PERSON HAVING ORDINARY SKILL IN THE ART
`20.
`I understand that the factors considered when determining the
`
`ordinary level of skill in the art include the complexity of the technology involved
`
`at the time of the alleged invention, the types of problems faced in the art at that
`
`time, prior art solutions to those problems, and the educational level of active
`
`workers in the field. As discussed throughout this declaration, I am familiar with
`
` 8
`
`Petitioners' EX1006 Page 9
`
`

`
`each of these factors. See, e.g., Section VI (discussing the state of the art and
`
`technology involved at the time of the alleged invention).
`
`21.
`
`It is my opinion that a person having ordinary skill in the art at the
`
`time of the alleged invention of the ‘646 patent (June 30, 1999) would have had at
`
`least a bachelor’s degree, or equivalent, in electrical engineering, computer
`
`engineering, computer science, or a related field or an equivalent number of years
`
`of working experience, and one to two years of experience in networking
`
`environments, including at least some experience with network traffic monitors,
`
`analyzers, and/or firewalls or other intrusion detection systems.
`
`22. As demonstrated by my experience above, I more than meet the
`
`definition of one of ordinary skill in the art. In addition, throughout the 1990s and
`
`2000s, I worked with numerous people of ordinary skill in the field in question.
`
`IV. OVERVIEW OF THE ‘646 PATENT
`23. The ‘646 Patent was filed on June 30, 2000 and claims priority to a
`
`provisional application filed on June 30, 1999. The ‘646 Patent describes
`
`implementation of well known cache system in a packet monitoring application.
`
`EX1001, ‘646 patent at 2:37-51. The disclosed packet monitor includes an
`
`acquisition device, a parser, a flow-entry database, a lookup engine and associated
`
`cache subsystem, and a state processor. ‘646 patent at 36:39-67, 37:61-38:27.
`
` 9
`
`Petitioners' EX1006 Page 10
`
`

`
`24. An exemplary implementation of the disclosed system is shown in
`
`Fig. 11:
`
`
`
`25.
`
`In operation, the monitor receives a packet and determines whether
`
`the packet is part of an existing flow from a flow entry database. ‘646 patent at
`
`9:45-52; 10:5-9. Part of this determination includes building a signature from
`
`portions of the packet that are used to recognize a flow in the future. ‘646 patent at
`
`6:47-54; 11:59-62; 12:7-9. If the packet is in an initial state indicative of a new
`
`flow, then a state operation is performed on the packet to build a signature and a
`
`flow entry is created. ‘646 patent at 10:28-31; 11:5-7 (“[A] state process (set of
`
` 10
`
`Petitioners' EX1006 Page 11
`
`

`
`state operations) at a particular state may build a new signature for future
`
`recognition packets of the next state.”). If a packet is identified as being part of a
`
`known flow, i.e., the flow is in a final recognition state, then the flow entry is
`
`updated, including, for example, updating statistics for the flow. ‘646 patent at
`
`10:38-46 (“If the packet is found to have a matching flow-entry in the database …
`
`updating one or more statistical measures stored in the flow-entry.”); 11:62-66
`
`(“Once a packet is identified to be from a known flow, the state of the flow is
`
`known[.]”).
`
`26. The ‘646 patent further includes a teaching of determining whether a
`
`packet is part of an existing flow by utilizing a cache subsystem for storing and
`
`looking up flow entries for recently seen flows. ‘646 patent at 23:1-17; 30:13-22.
`
`The cache subsystem of the ‘646 patent is described as including many well-
`
`known concepts related to caching, such as replacing least recently used entries,
`
`keeping most recently used entries and the related concept of using content
`
`addressable memory cells (CAMs). ‘646 patent at 30:37-31:19.
`
`V. OVERVIEW OF THE RELEVANT FILE HISTORIES
`27. The ‘646 Patent was filed with 20 original claims. See Ex. 1013, ‘646
`
`File History at As-Filed Claims. On September 10, 2003, the Examiner rejected
`
`claims 7-11, 19, and 20 under §102(e) as anticipated by U.S. Patent No. 4,458,310
`
`(“Chang”) and claims 1 and 2 under §102(e) as anticipated by U.S. Patent No.
`
` 11
`
`Petitioners' EX1006 Page 12
`
`

`
`5,917,821 (“Gobuyan”). The Examiner further rejected claims 3-6 as obvious over
`
`Gobuyan in view of Chang and claims 12-18 as obvious over Chang in view of
`
`Carter. EX1013, ‘646 File History at 9/10/03 Rejection.
`
`28.
`
`In
`
`response, Applicants added
`
`the
`
`following
`
`limitations
`
`to
`
`independent claim 1:
`
`(i) “a conversational flow being an exchange of one or more packets in any
`
`direction as a result of an activity corresponding to the flow”;
`
`(ii) “a state processor …. being to perform any state operations specified for
`
`the state of the flow ….”.
`
`Ex. 1014, ‘646 File History at 2/10/04 Response, p. 2 (amended claims).
`
`Applicants distinguished their claims, as amended, by arguing that the cited
`
`reference, Gobuyan, did not disclose a “cache subsystem” or a “state processor.”
`
`Applicants further argued:
`
`“A conversational flow is not identified simply by the stations that are
`involved in a communication, but rather by the nature of the communication.
`e.g., the application program being invoked. […]
`
`Unlike Gobuyan, the present invention is able to identify and classify
`conversational flows rather than only connection flows. The reason for
`this is that some conversational flows involve more than one connection, and
`some even involve more than one exchange of packets between a client and
`server. Thus, there may be different states to a flow. This is particularly true
`when using client/server protocols such as RPC, DCOMP, and SAP, which
`enable a service to be set up or defined prior to any use of that service.
`
`An example of such a case is the SAP (Service Advertising Protocol), a
`NetWare (Novell Systems, Provo, Utah) protocol used to identify the
`
` 12
`
`Petitioners' EX1006 Page 13
`
`

`
`services and addresses of servers attached to a network. In the initial
`exchange, a client might send a SAP request to a server for print service.
`The server would then send a SAP reply that identifies a particular
`address—for example, SAP#5—as the print service on that server. Such
`responses might be used to update a table in a router, for instance, known as
`a Server Information Table. A client who has inadvertently seen this reply or
`who has access to the table (via the router that has the Service Information
`Table) would know that SAP#5 for this particular server is a print service.
`Therefore, in order to print data on the server, such a client would not need
`to make a request for a print service, but would simply send data to be
`printed specifying SAP#5. Like the previous exchange, the transmission of
`data to be printed also involves an exchange between a client and a server,
`but requires a second connection and is therefore independent of the initial
`exchange. In order to eliminate the possibility of disjointed conversational
`exchanges, it is desirable for a network packet monitor to be able to
`“virtually concatenate”—that is, to link—the first exchange with the second.
`If the clients were the same, the two packet exchanges would then be
`correctly identified as being part of the same conversational flow.”
`
`2/10/2004 Amendment, pp. 9-10 (emphasis original).
`
`29. The Examiner issued a Notice of Allowance noting that, among other
`
`things, while the prior art disclosed a cache memory subsystem that utilizes the use
`
`of flow entries, it lacked the ability to distinguish conversational data flow.
`
`EX1013, ‘646 File History at 4/14/04 Notice of Allowance.
`
`VI. BACKGROUND ON RELEVANT TECHNOLOGIES
`30. As discussed above, the subject matter of the ‘646 patent generally
`
`relates to the field of network monitoring of computer networks. To better
`
`understand my opinions on the inventions claimed in the ‘646 patent and their
`
`relation to Engel, Colloff, Graham-Cumming, and Baker, I provide below some
`
` 13
`
`Petitioners' EX1006 Page 14
`
`

`
`background on computer networking, network monitoring, and content addressable
`
`memories.
`
`A. Computer Networking and Protocol Layers
`31. Computer networks based on layered protocol architectures have been
`
`well-known since at least the 1970s. The two most dominant models of protocol
`
`layers are the OSI model and the Internet model. Both models were defined in
`
`1970s. The OSI model defines a seven-layer protocol stack whereas the Internet
`
`model defines a simpler five-layer protocol stack.
`
`32. The Internet model is illustrated in Figure 1(a) below. The physical
`
`layer is concerned with the low-level details of transmitting raw bits over some
`
`physical medium (e.g., fiber optics, copper cables, or radio frequency
`
`transmissions).
`
`Figure 1: The Internet protocol stack (a) and OSI model (b).
`
`
`
` 14
`
`Petitioners' EX1006 Page 15
`
`

`
`33. The link layer is responsible for controlling access to an individual
`
`network by a host or transferring data between two hosts on the same network.
`
`Examples of link layer protocols include Ethernet and WiFi. Such networks are
`
`commonly referred to as Layer 2 networks.
`
`34. For reasons that are beyond the scope of this matter, there are
`
`practical limits on the size of each individual network, and the individual networks
`
`may use different addressing schemes or frame formats, or more broadly, different
`
`link layer protocols. Therefore, an internetworking protocol layer is needed so that
`
`larger networks can be formed from individual networks that may span far
`
`geographical distances.
`
`35. This is the role of the network layer in the Internet protocol stack, and
`
`the network-layer protocol for the Internet is called the IP protocol (Internet
`
`Protocol). Among other functions, the IP protocol provides a uniform addressing
`
`scheme across the Internet so that hosts on different networks can talk to each
`
`other. The IP protocol layer is commonly referred to as Layer 3, and the Layer 3
`
`interconnection devices that are used to internetwork individual networks are
`
`commonly referred to as routers, which are responsible for forwarding (routing)
`
`packets across network boundaries.
`
`36. While the IP protocol layer provides for Internet addressing and
`
`routing functions, the transport layer is concerned with the end-to-end transport of
`
` 15
`
`Petitioners' EX1006 Page 16
`
`

`
`application-layer messages between application end-points. The two most widely
`
`used transport protocols are TCP and UDP, either of which can be used to transport
`
`application-layer messages. Whereas TCP provides a connection-oriented service
`
`to its applications that includes guaranteed delivery and congestion control, UDP
`
`provides a simpler connectionless service that does not provide for reliability or
`
`flow control.
`
`37. Finally, the application layer is concerned with the application itself.
`
`Examples of application layer protocols include HTTP (for web browsing), SMTP
`
`(for emails), and FTP (for file transfers).
`
`38. The seven-layer OSI reference model is illustrated in Figure 1(b)
`
`above. Five of the OSI model layers have roughly the same functions as their
`
`similarly named counterparts in the Internet model (namely, the physical, link,
`
`network, transport, and application layers). The OSI reference model has two
`
`additional layers, the session and presentation layers. The session layer controls
`
`the connections between computers, and the presentation layer establishes context
`
`between application-layer entities. These two layers are not present in the Internet
`
`model. The Internet model assumes that the services associated with these two
`
`layers are built into the application if they are needed.
`
` 16
`
`Petitioners' EX1006 Page 17
`
`

`
`B.
`Encapsulation
`39. To transport application-layer messages across the Internet using
`
`TCP/IP, the application-layer message is first encapsulated into TCP segments.
`
`Each TCP segment adds a TCP header, which contains information that the
`
`receiver-side will use for connection and application identification, sequencing,
`
`and reliable transmission. The TCP segments are in turn encapsulated into IP
`
`(Layer 3) packets. Each IP packet adds an IP header, which contains, among other
`
`information, protocol identification information and the source and destination IP
`
`addresses. Finally, the IP packets are in turn encapsulated into Layer 2 frames for
`
`forwarding within a Layer 2 network. Each Layer 2 frame adds a Layer 2 header,
`
`for example an Ethernet header if Ethernet is used. Among other information, the
`
`Ethernet header contains a Layer 2 address, also referred to as a MAC (media
`
`access control) address. This is illustrated in Figure 2 below. Similar
`
`encapsulations are performed when using another transport-layer protocol like
`
`UDP.
`
`Figure 2: Encapsulation of TCP/IP.
`
` 17
`
`
`
`Petitioners' EX1006 Page 18
`
`

`
`40. The ideas of encapsulation and de-encapsulation are well-known since
`
`at least the 1970s when the Internet protocol stack was first defined. The various
`
`encapsulation steps are performed by the sending host as application messages go
`
`through the different protocols layers, with a layer-specific header added at each
`
`layer, before the final encapsulated packet leaves the host and enters the network.
`
`Similarly, on the receiving end, the host is responsible for de-encapsulating the
`
`received packet, extracting relevant header and payloads at each layer of the
`
`protocol stack, performing protocol specific operations, and passing the de-
`
`encapsulated packet up the next layer for further processing. Since the de-
`
`encapsulation of packets requires the parsing and extraction of packet headers and
`
`payloads, techniques for packet parsing and extraction of specific information
`
`(e.g., protocol identification, port numbers, and address fields, etc) were also well-
`
`known since at least the 1970s.
`
`C. Network Monitoring
`41. The general goal of networking monitoring is to collect useful
`
`information from various parts of the network so that the network can be managed
`
`and controlled using the collected information. Most of the network devices are
`
`located in remote locations. Thus, network monitoring techniques have been
`
`developed to allow network management applications to check the states of remote
`
`network devices and collect information from them.
`
` 18
`
`Petitioners' EX1006 Page 19
`
`

`
`42. SNMP (Simple Network Management Protocol) is an Internet-
`
`standard protocol for collecting and organizing information about managed devices
`
`on IP networks and for modifying that information to change device behavior. It
`
`was initially specified in RFC 1067 in August 1988. (See EX1021, RFC 1067.)
`
`SNMP was further updated to version 2 in January 1996.
`
`43.
`
`In network monitoring using SNMP, monitored information is seen as
`
`a set of managed objects. MIBs (Management Information Bases) define the sets
`
`of objects being monitored.
`
`44. RMON (Remote Network Monitoring) is another important Internet
`
`standard that specifies how to monitor Internet traffic. RMON was originally
`
`standardized by RFC 1271 (see EX1022, RFC 1271) in November 1991, but it was
`
`later updated by RFC 1757 in February 1995. (See EX1023, RFC 1757.) The
`
`overall goal for RMON is to allow RMON-compliant network monitoring devices
`
`to be constructed. These devices are usually referred to as monitors or probes,
`
`which measure specific aspects of the network without interfering normal
`
`operations. These devices are often stand-alone devices and located in remote
`
`parts of the network. The RMON standard allows these devices to communicate
`
`over the network that they are monitoring.
`
` 19
`
`Petitioners' EX1006 Page 20
`
`

`
`45. Starting in the 1995-1996 timeframe, network monitoring products
`
`capable of monitoring performance at the application-level were becoming
`
`commercially available.
`
`is a
` “CoroNet’s CoroNet Management System (CMS)
`Windows-based management platform
`that ca also provide
`application-by-application fault and performance statistics across both
`LANs and WANs.” (See May 15, 1995, Network World, p. 17,
`available
`at:
`https://books.google.com/books?id=yBAEAAAAMBAJ&pg=PA37&
`dq=%22coronet+management+system%22&hl=en&sa=X&ved=0ahU
`KEwjDyuf_65TQAhXDKiYKHUJZDzEQ6AEIMTAF#v=onepage&
`q=%22coronet%20management%20system%22&f=false)
`
`“The firm, which requested that its name not be mentioned, is
`using CoroNet Systems’s CoroNet Management System (CMS) to
`determine how much bandwidth a particular application is using.”
`(See May 1, 1995, Network World, p. 20, available at:
`https://books.google.com/books?id=thIEAAAAMBAJ&pg=PA20&dq
`=%22coronet+systems%22&hl=en&sa=X&ved=0ahUKEwj8z76K85
`TQAhWBKyYKHUVgBEgQ6AEIHzAB#v=onepage&q=%22corone
`t%20systems%22&f=false)
`
`“Compuware Corp. takes the mystery out of understanding and
`managing application-level performance in large complex enterprise
`networks with EcoNet 2.0… EcoNet’s differentiation (and strength)
`lies in its capability to effectively monitor network conversations at
`the application level.” (See September 30, 1996, InfoWorld, p. N/4,
`available
`at:
`https://books.google.com/books?id=LjoEAAAAMBAJ&pg=RA1-
`PA53-
`IA5&dq=%22Econet%22+compuware&hl=en&sa=X&ved=0ahUKE
`wjUhrvB5pTQAhWEbSYKHSIfBx0Q6AEIPzAJ#v=onepage&q=%2
`2Econet%22%20compuware&f=false)
`
` “Compuware plans to announce Version 3.1 of EcoScope 3.1.
`The version has the capability to analyze application traffic at the
`protocol level, and also includes enhanced topology views and Web-
`
` 20
`
`Petitioners' EX1006 Page 21
`
`

`
`based reporting.” (See April 20, 1998, InfoWorld, p. 10, available at:
`https://books.google.com/books?id=vFAEAAAAMBAJ&pg=PA10&
`dq=infoworld+compuware+1998&hl=en&sa=X&ved=0ahUKEwj3u8
`6Ln7PQAhWM0YMKHRcaAMkQ6AEIOzAI%23v=onepage&q&f=
`false)
`
`
`46.
`
`In response to the growing need for network monitoring at the
`
`application-level, the RMON standard was extended to add support for network-
`
`and application-layer monitoring, including classes of protocols at the network,
`
`transport, session, presentation, and application layers. This extended RMON
`
`standard, known as RMON2, was standardized by RFC 2012 in January 1997.
`
`(See EX1024, RFC 2012.) To cover network monitoring on higher layers of
`
`traffic, the RMON2 MIB added ten more groups, including groups that cover
`
`Layer 3 traffic statistics and groups that cover traffic statistics by application
`
`protocols.
`
`D. Caches and Content-Addressable Memories
`47. A cache is a small, fast buffer used to keep a subset of the contents of
`
`a larger, slower memory that are likely to be accessed. Cache systems have been
`
`well known and widely utilized since at least the 1970s. (See EX1025, U.S. Patent
`
`No. 3,967,247 at 1:5-19.) Additionally, at least since the 1970s, it has been known
`
`for systems to utilize a Least-Recently-Used (LRU) algorithm for replacing items
`
`stored in the cache memory. (See U.S. Patent No. 3,967,247 at 3:56-57, 6:39-45,
`
`8:26-31, Fig. 4.)
`
` 21
`
`Petitioners' EX1006 Page 22
`
`

`
`48. By 1982, “virtually all modern large computer systems [had] cache
`
`memories.” (See EX1026, Smith at p. 473-474.) Additionally, as set forth in
`
`Smith, “in typical large, high-speed computers (e.g., Amdahl 470V/7, IBM 3033),
`
`main memory can be accessed in 300 to 600 nanoseconds; information can be
`
`obtained from a cache, on the other hand, in 50 to 100 nanoseconds.” (See Smith
`
`at p. 473.)
`
`49. Related to cache memories is content-addressable memory (CAM).
`
`CAM is a special type of fast memories that can search its entire memory to see if
`
`the input search data word is stored anywhere in it. In the basic CAM, also called
`
`a Binary CAM, the stored data words store just 0’s and 1’s. In addition to 0’s and
`
`1’s, Ternary-CAM allows each memory cell to store a third matching state of “X”
`
`or “don’t care” in the stored data word. This third matching state serves as a “wild
`
`card” when matching against an input search data word with a “0” or a “1” in the
`
`same bit position. This additional state is typically implemented by adding a
`
`m

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket