`Telecommunications
`Essentials
`The Complete Global Source
`for Communications Fundamentals,
`Data Networking and the Internet,
`and Next-Generation Networks
`
`Lillian Goleniewski
`
`vvAddison-Wesley
`Boston * San Francisco e New York * Toronto * Montreal
`London * Munich e Paris * Madrid
`Capetown * Sydney * Tokyo * Singapore * Mexico City
`
`
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`Page1
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 1
`
`
`
`
`
`
`
`Manyofthe designations used by manufacturersandsellers to distinguish their products are claimedas trade-
`marks. Where those designations appear in this book, and Addison-Wesley, Inc. was aware of a trademark claim,
`the designations have been printed withinitial capital letters or in all capitals.
`
`Lido Telecommunications Essentials® is the registered trademark of The Lido Organization, Inc.
`
`The authorand publisher have taken care in the preparation of this book, but make no expressed or implied war-
`ranty of any kind and assumenoresponsibility forerrors or omissions. Noliabilityis assumedfor incidental or con-
`sequential damages in connection with orarising outofthe use of the information or programs contained herein.
`
`Thepublisheroffers discounts on this book when orderedin quantity for special sales. For more information,
`please contact:
`
`Pearson Education Corporate Sales Division
`201 W. 103"Street
`Indianapolis, IN 46290
`(800) 428-5331
`corpsales@pearsoned.com
`
`Visit AW on the Web: www.aw.com/cseng/
`
`Library of Congress Cataloging-in-Publication Data
`
`Goleniewski, Lillian.
`Telecommunications essentials : the complete global source for communications
`fundamentals, data networking and the Internet, and next-generation networks/ Lillian Goleniewski.
`p. cm.
`Includes bibliographical references and index.
`ISBN 0-201-76032-0
`1. Telecommunication. I. Title.
`
`TK5101 G598 2002
`621.382—dc21
`
`Copyright © 2002 by Pearson Education,Inc.
`
`2001053752
`
`All rights reserved. No part of this publication maybe reproduced,stored in a retrieval system, or transmitted, in
`any form, or by any means,electronic, mechanical, photocopying, recording, or otherwise, withoutthe prior con-
`sent of the publisher. Printed in the United States of America. Published simultaneously in Canada.
`
`For information on obtaining permission for use of material from this work, please submit a written requestto:
`
`Pearson Education, Inc.
`Rights and Contracts Department
`75 Arlington Street, Suite 300
`Boston, MA 02116
`Fax: (617) 848-7047
`
`ISBN 0-201-76032-0
`Text printed on recycled paper
`
`123456789 10—CRS—0504030201
`First printing, December 2001
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`Page 2
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 2
`
`
`
`
`
`
`The Internet: Infrastructure and
`Service Providers.
`
`
`
`
`
`w= Internet Basics
`
`
`hat speaks to the pace of Internet development.
`Figure 9.1 is an astounding graph t
`It shows the numberofyears it took a number of technologies to reach 50 million
`
`
`users worldwide. As you can see, whereas it took 74 years for the telephone to
`reach 50 million users, it took the World Wide Web only 4.
`
`
`What forces are propelling our interest in the Internet? One main force is that
`today some 250 million people worldwide have
`usage is increasing dramatically;
`
`
`Internet access, and that numberis growing by leaps and bounds. The Internet is
`very useful and easy to use, and for a growing number of people in the developed
`
`
`world,it is now thefirst place to look for information. As one colleague recently
`
`
`told me,in the past week, besides the numerous times he had used the Internet to
`ork, he'd used the Internetto look up hotels for a week-
`get information for my w
`
`
`end break, to determine what concerts are on in Dublin, to check the specification
`of a car, to transfer funds between bank accounts, to find the address of an old
`
`
`friend, and to obtain sheet music. Electronic commerce (e-commerce) is also grow-
`
`ing, in both the business-to-consumet and business-to-business sectors. Another
`
`how the Internet actually works, the
`This chapter explores the Internet, including
`s levels of service providers, and the
`structure of the Internet in terms of the variou
`organization and characteristics of the growing variety of service providers.
`
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 3
`
`
`
`
`
`
`
`Chapter 9 © The Internet: Infrastructure and Service Providers
`
`
`
`Page 4
`
`A Brief History of the Internet
`‘To help understand thefactors that contributed to the creation of the Internet, let's
`look very briefly at the history of the Internet. In 1969 the Advanced Research
`Projects Agency (ARPA) of the U.S. Department of Defense initiated a project to
`develop a distributed network. There were several reasons for doing this. First, the
`project was launched during the Cold Warera, when there was aninterest in build-
`ing a network that had nosingle point offailure, and that could sustain an attack
`yet continue to function. Second, four supercomputer centers were located in four
`universities throughout the UnitedStates, and we wanted to connect them together
`so that we could engage in some moreintensive processingfeats. So, the Internet
`started as a wide area, packet-switching network called the ARPANET.
`Toward the mid-1970s, ARPA was renamed the Defense Advanced Research
`Projects Agency (DARPA), and while it was working on the distributed, or packet-
`switched, network, it was also working on local area networks (LANs), paging net-
`works, andsatellite networks. DARPA recognized that there was a need for some
`form of internetworking protocol that would allow open communications between
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Telephone
`
`Radio
`
`PC
`Technology
`
`Figure 9.1
`
`Internet pace: Years to reach 50 million users worldwide
`
`contributor is the major shift toward the use of advanced applications, including
`pervasive computing, which introduces a wide range ofintelligent appliances that
`are ready to communicate throughthe Internet, as well as applicationsthat include
`the more captivating visual and sensory streams. Finally, the availability of broad-
`band, or high-speed access technologies,further drives our interest in and ourabil-
`ity to interact with Websites that involve the use of these advanced applications
`and offer e-commerce capabilities.
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Internet Basics
`
`
`
`disparate networks. So, Internet Protocol (IP) was created to support an open-
`architecture network that could link multiple disparate networks via gateways—
`what we todayrefer to as routers.
`In 1980, Transmission Control Protocol/Internet Protocol (TCP/IP) began to
`be implemented on an experimental basis, and by 1983,it was required in order for
`a subnetwork to participate in the larger virtual Internet.
`The original Internet model was not based on the telephone network model.It
`involved distributed control rather than centralized control, andit relied on coop-
`eration among its users, whichinitially were largely academicians and researchers.
`With the original Internet, there's no regulation, no monopoly, and no universal
`service mandate (although theseissues are being considered seriously now).
`Today, no one agencyis in charge of the Internet, although the Internet Society
`(ISOC)is a nonprofit, nongovernmental, international organization that focuses on
`Internet standards, education, and policy issues. ISOC is an organization for Inter-
`net professionals that serves as the organizational homeof the Internet Engineer-
`ing Task Force (IETF), which oversees various organizational and coordinating
`tasks, ISOC is composed ofa board oftrustees,the Internet Architecture Board, the
`IETE the Internet Research Task Force, the Internet Engineering Steering Group,
`and the Internet Research Steering Group.
`The IETFis an international community of network designers, operators, ven-
`dors, and researchers, whosejob is to evolve the Internet and smooth its operation
`by creating technical standards through consensus. Other organizations that are
`critical to the functioning of the Internet include American Registry for Internet
`Numbers (ARIN) in the United States, Asia Pacific Network Information Center
`
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 5
`
`
`
`Page 6
`
`To understandthe Internet, it’s importantto first understand the concept of a com-
`puter network (see Figure 9.2). A network is formed by interconnecting a setof
`computers, typically referred to as hosts, in such a way that they can interoperate
`with one another. Connecting these hosts involves two major components: hard-
`ware (that is, the physical connections) and software. The software can be run on
`the same or dissimilar host operating systems, and it is based on standards that
`define its operation. These standards, referred to as protocols, provide the formats
`for passing packets of data, specify the details of the packet formats, and describe
`how to handle error conditions. The protocols hide the details of network hard-
`ware and permit computers of different hardware types, connected by different
`physical connections, to communicate, despite their differences. (Protocols are dis-
`cussed in detail later in this chapter.)
`In thestrictest sense, the Internetis an internetwork composed of a worldwide
`collection of networks, routers, gateways, servers, and clients, that use a common
`set of telecommunications protocols—the IP family—to link them together (see
`Figure 9.3). The term client is often used to refer to a computer on the network
`
`:
`
`(APNIC) in Asia-Pacific, and RIPE NCC (Reseaux IP Europeens Network Coordi-
`nation Center) in Europe. These organizations manage and sell IP addresses and
`autonomous system numbers. IANA manages and assigns protocol and port num-
`ber, and ICANN (formed in 1998) is responsible for managing top-level domain
`names and the root name servers. ICANN also delegates control for domain name
`registry below the top-level domains. (Domain names and the role of IP addresses
`are discussed later in this chapter.)
`
`Whatthe Internet Is and How It Works
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`
`
`
`Chapter 9 TheInternet: Infrastructure and Service Providers =
`
`
`
`oercuet
`eeoe
`e
`eeeaaa
`
`:ZE
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 6
`
`
`
`Internet Basics
`
`[24s
`
`=a
`
`
`
`“Intelligent S
`=
`200d
`=,
`
`
`“intelligent
`
` reuler
`
`Internet,
`
`
`
`_ intranet,
`\.extranet—
`
`
`
`Figure 9.2 Network components
`
`“Backbone
`
`/
`
`
`
`
`
`Figure 9.3 An internetwork
`
`ered by a server. It also refers to a user run-
`that takes advantage of the services off
`lication. The term server describes either a
`ning theclient side of a client/server app
`ervices to network users Or
`computer or a software-based process that provides s
`Web services to Internet users.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 7
`
`
`
`
`
`Chapter 9 =® The Internet: Infrastructure and Service Providers
`
`Page 8
`
`Networks connect servers andclients, allowingthe sharing of information and
`computing resources. Network equipment includes cable and wire, network adapt-
`ers, hubs, switches, and various other physical connectors. In order for the net-
`work to be connected to the Internet, the network must send and retrieve data by
`using TCP/IP and related protocols. Networks can also be connected to form their
`own internets: Site-to-site connections are known as intranets, internal networks
`that are generally composed of LANs interconnected by a WANthat uses IP Con-
`nections between partnering organizations, using IP are known asextranets.
`The Internet is a complex, highly redundant network of telecommunications
`circuits connected together with internetworking equipment, including routers,
`bridges, and switches. In an environment consisting of several network segments
`with different protocols and architectures, the network needs a device that not only
`knows the address of each segment but can also determinethe best path for send-
`ing data andfiltering broadcast traffic to the local segment. The Internet moves
`data by relaying traffic in packets from one computer network to another.If a par-
`ticular network or computer is down or busy, the network is smart enough to
`reroute thetraffic automatically. This requires computers(that is, routers) that are
`able to send packets from one network to another. Routers make decisions about
`how to route the data or packets, they decide which pipeis best, and then they use
`that best pipe. Routers work at the network layer, Layer 3, of the OSI model, which
`allows them to switch and route packets across multiple networks. Routers read
`complex network addressing information in the packet; they can share status and
`routing information with one another and usethis information to bypass slow or
`malfunctioning connections.
`Routing is the main process that the Internet host uses to deliver packets. The
`Internet uses a hop-by-hop routing model, which means that each hostor router
`that handles a packet examines the destination address in the packet's IP header,
`computes the next hopthatwill bring the packet onestep closerto its destination,
`and delivers that packet to the next hop, where the processis repeated. To make
`this happen, routing tables must match destination addresses with next hops, and
`routing protocols must determine the contentof these tables. Thus, the Internet
`and the public switched telephone network (PSTN) operate quite differently from
`one another. The Internet uses packet switching, where there’s no dedicated con-
`nection and the data is fragmented into packets. Packets can be delivered via differ-
`€nt
`routes over
`the Internet and reassembled at
`the ultimate destination.
`Historically, “back-office” functions such as billing and network management have
`not been associated with Internet. But
`the Internet emphasizes flexibility—the
`capability to route packets around congestedor failed points.
`Recall from Chapter 5, “The PSTN,” that the PSTN usescircuit switching, so a
`dedicated circuit is set up and taken down for each call. This allows charging based
`on minutes andcircuits used, which,in turn, allows chain-of-supply dealings. The
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 8
`
`
`
`major emphasis of the PSTN is on reliability. So, the Internet and the PSTN have dif-
`ferent models and different ways of managingor routing traffic through the network,
`but they share the same physical foundation in terms of the transport infrastructure,
`or the types of communication links they use. (Chapter 4, “Establishing Communi-
`cations Channels,” discusses packet switching and circuit switching in detail.)
`
`Internet Protocols
`TheInternetis a collection of networksthat are interconnected logically as a single,
`large, virtual network. Messages between computers are exchanged by using packet
`switching. Networks can communicate with one another because they all use an
`internetworking protocol. Protocols are formal descriptions of messages to be
`exchanged andofrules to be followed in order for two or more systems to exchange
`information in a manner that both parties will understand. The following sections
`examine the Internet's protocols: TCP/IP, User Datagram Protocol (UDP), Internet
`Control Message Protocol (ICMP), Internet Group Management Protocol (IGMP),
`Address Resolution Protocol (ARP)/Reverse Address Resolution Protocol (RARP),
`routing protocols, and network access protocols.
`
`
`
`Internet Basics | 247
`
`or video—anythingdigital that the network can transmit. The sequence numbers
`
`TCP/IP
`The IETE has technical responsibility for TCP/IP, which is the most popular and
`widely used of the internetworking protocols. All information to be transmitted
`over the Internetis divided into packets that contain a destination address and a
`sequence number. Packets are relayed through nodes in a computer network,
`along the best route currently available between the source and destination. Even
`though the packets may travel along different routes and may arrive out of
`sequence,
`the receiving computer is able to reassemble the original message.
`Packetsize is keptrelatively small—at1,500 bytes or less—so that in the event of
`an error, retransmission is efficient. To manage the traffic routing and packet
`assembly/disassembly, the networks rely on intelligence from the computers and
`software that control delivery.
`TCP/IP referred to as the TCP/IP suite in Internet standards documents,gets its
`name from its two most important protocols, TCP and IP, which are used for
`interoperability among many different types of computers. A major advantage of
`TCP/IP is that it is a nonproprietary network protocol suite that can connect the
`hardware and operating systems of many different computers.
`TCP Networkapplications present data to TCP. TCP divides the data into pack-
`ets and gives each packet a sequence number that is not unique, but which is nonre-
`peating for a very long time. These packets could represent text, graphics, sound,
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 9
`
`
`
`Chapter9 ™ The Internet: Infrastructure and Service Providers
`
`Page 10
`
`help to ensure that the packets can be reassembled correctly at the receiving end.
`Thus, each packet consists of content, or data, as well as the protocol header, the
`information that the protocol needs to do its work. TCP uses another piece of
`information to ensure that the data reaches the right application whenitarrives at
`a system: the port number, which is within the range 1 to 65,535. Port numbers
`identify running applications on servers, applications that are waiting for incoming
`connections from clients. Port numbers identify one listening application from
`another. Ports 1 to 1,023 are reserved for server applications, although servers can
`use higher port numbers as well. Numbers between 1 and 1,023 are reserved for
`“well-known” applications (for example, Web servers run on port 80, FTP runs on
`port 21). Also, many recent protocols have been assigned well-known port num-
`bers above 1,023. Ports with higher numbers, called “ephemeral” ports, are
`dynamically assigned to client applications as needed. A client obtains a random
`ephemeral port when it opens a connection to a well-knownserverport.
`Data to be transmitted by TCP/IP hasa port from whichit is coming and a port
`to whichit is going, plus an IP source and a destination address. Firewalls can use
`these addresses to control the flow of information. (Firewalls are discussed in
`Chapter 11, “Next-Generation Network Services.”)
`TCP is the protocol for sequenced andreliable data transfer. It breaks the
`data into pieces and numbers each piece so that the receipt can be verified and
`the data can be put back in the proper order. TCP provides Layer 4 (transport
`layer) functionality, and it is responsible for virtual circuit setup, acknowledg-
`ments, flow control, and retransmission of lost or damaged data. TCP provides
`end-to-end, connection-oriented, reliable, virtual circuit service. It uses virtual
`ports to make connections; ports are used to indicate where information must be
`delivered in order to reach the appropriate program, and this is how firewalls and
`application gateways canfilter and direct the packets.
`
`IP IP handles packet forwarding and transporting of datagrams across a network.
`With packet forwarding, computers can send a packet on to the next appropriate
`network component, based on the address in the packet's header. IP defines the
`basic unit of data transfer, the datagram,also referred to as the packet, andit also
`defines the exact formatofall data asit travels across the Internet. IP works like an
`envelope in the postalservice, directing information to its proper destination. With
`this arrangement, every computer on the Internet has a unique address. (Address-
`ing is discussedlater in this chapter.)
`IP provides software routines to route and to store and forward data among
`hosts on the network. IP functions at Layer 3 (the network layer), and it provides
`several services, including host addressing, error notification, fragmentation and
`reassembly, routing, and packet timeout. TCP presents the data to IP in order to
`provide basic host-to-host communication. IP then attaches to the packet, in a pro-
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 10
`
`
`
`
` Internet Basics
`249
`
`tocol header, the address from which the data comes and the address of the system
`to whichit is going.
`;
`Underthe standards, IP allows a packetsize of up to 64,000 bytes, but we don't
`transmit packets that large because they would causesession timeouts and big con-
`gestion problems. Therefore, IP packets are segmented into 1,500-byte-maximum
`chunks.
`IP always doesits best to makethe delivery to the requested destination host,
`butifit fails for any reason,it just drops the packet. As such, upper-level protocols
`should not depend onIPto deliver the packet every time. Because IP provides con-
`nectionless, unreliable service and because packets can get lost or arrive out of
`sequence, or the messages may take more than 1,500 bytes, TCP provides the
`recovery for these problems.
`
`IGMP enables a router to determine which host groups have members on a given
`
`UDP
`Like TCP, UDP is a Layer 4 protocol that operates over IP UDP provides end-to-
`end, connectionless, unreliable datagram service.
`It
`is well suited for query-
`response applications, for multicasting, and for use with Voice over IP (VoIP).
`(VoIP is discussed in Chapter 11.) Because UDP does not request retransmissions,
`it minimizes what would otherwise be unmanageable delay; the result is that some-
`times the quality is not very good. For instance, if you encounter losses or errors
`associated with a voice packet, the delays that wouldbe associated with retransmit-
`ting that packet would render the conversation unintelligible. In VoIP, when you
`lose packets, you do not request retransmissions. Instead, you hopethat the user
`can recover from the losses by other means. Unlike TCP, UDP does not providefor
`error correction and sequenced packetdelivery; it is up to the applicationitself to
`incorporate error correction if required.
`
`ICMP
`ICMPprovideserror handling and control functions. It is tightly integrated with IP
`ICMP messages,delivered in IP packets, are used for out-of-band messagesrelated
`to network operation or misoperation. Because ICMP uses IP, ICMP packetdeliv-
`ery is unreliable. ICMP functions include announcing network errors, announcing
`network congestion, assisting in troubleshooting, and announcing timeouts.
`
`IGMP
`Another Layer 3 protocol is Internet Group ManagementProtocol (IGMP), whose
`primary purposeis to allow Internet hosts to participate in multicasting. The IGMP
`standard describes the basics of multicasting IP traffic, including the format of
`multicast IP addresses, multicast Ethernet encapsulation, and the concept of a host
`group (thatis, a set of hosts interested in traffic for a particular multicast address).
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 11
`
`
`
`
`Chapter 9
`© The Internet: Infrastructure and Service Providers
`
`network segment, but IGMP does not address the exchange of multicast packets
`between routers.
`
`ARP and RARP
`At Layer 3 you also find ARP/RARP. ARP determines the physical address of a node,
`given that node's IP address. ARP is the mapping link between IP addresses and the
`underlying physical (MAC) address. RARP enables a host to discover its own IP
`address by broadcasting its physical address. When the broadcast occurs, another
`node on the LAN answers back with the IP address of the requesting node.
`
`Page 12
`
`Routing Protocols
`Routing protocols are protocols that allow routers to communicate with each other.
`They include Routing Information Protocol (RIP), Interior Gateway Protocol
`(IGP), Open Shortest Path First (OSPF), Exterior Gateway Protocol (EGP), and
`Border Gateway Protocol (BGP).
`There are several processes involved in router operation. First, the router cre-
`ates a routing table to gather information from other routers about the optimum
`paths. As discussed in Chapter 8, “Local Area Networking,” the routing tables can
`be static or dynamic; dynamic routing tables are best because they adapt to chang-
`ing network conditions. Next, when data is sent from a network host to a router en
`route to its destination, the router breaks open the data packet and looks at the
`destination address to determine the mostefficient path between two endpoints. To
`identify the most efficient path, the router uses algorithms to evaluate a number of
`factors (called metrics), including distance and cost. Routing protocols considerall
`the various metrics involved when computing the best path.
`
`Distance-Vector Versus Link-State Protocols
`cols are involved in making routing decisions:
`
`Two main types of routing proto-
`
`a Distance-vector routing protocols—These routing protocols require that
`each router simply inform its neighbors of its routing table. For each net-
`work path, the receiving router picks the neighbor advertising the lowest
`cost, and then the router adds this into its routing table for readvertisement.
`Common distance-vector routing protocols are RIP, Internetwork Packet
`Exchange (IPX) RIP, AppleTalk Routing Table Management Protocol
`(RTMP), and Cisco's Interior Gateway Routing Protocol (IGRP).
`Link-state routing protocols—Link-state routing protocols require that
`each router maintain at least a partial map of the network. When a network
`link changes state—up to down or vice versa—anotification is flooded
`throughout the network. All the routers note the change and recompute the
`routes accordingly. This method is more reliable, easier to debug, and less
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 12
`
`
`
`
`
` Internet Basics 251
`
`Interior routing occurs within an autonomoussys-
`Interior and Exterior Routing
`tem, which is a collection of routers undera single administrative authority that
`uses a commoninterior gateway protocolfor routing packets. Most of the common
`routing protocols, such as RIP and OSPEare interior routing protocols. The auton-
`omous system numberis a unique numberthatidentifies an autonomous system in
`the Internet. Autonomous system numbers are managed and assigned by ARIN
`(North America), APNIC (Asia-Pacific), and RIPE NCC (Europe). Exterior routing
`protocols, such as BGP, use autonomous system numbers to uniquely define an
`autonomous system. The basic routable elementis the IP network or subnetwork,
`or the Classless Interdomain Routing (CIDR) prefix for newer protocols. (CIDR is
`discusseda little later in the chapter.)
`OSPE which is sanctioned by the IETF and supported by TCP, is intended to
`becometheInternet's preferred interior routing protocol. OSPFis a link-state proto-
`col with a complex set of options and features. Link-state algorithms control the
`routing process and enable routers to respond quickly to changes in the network.
`Link-state routing makes use of the Dijkstra algorithm (which determines routes
`based on path length andis used in OSPF) to determineroutes based on the number
`of hops, the line speed, the amountoftraffic, and the cost. Link-state algorithms are
`more efficient and create less network traffic than do distance-vector algorithms,
`which can be crucial in environments that involve multiple WANlinks.
`Exterior routing occurs between autonomoussystems andis of concern to ser-
`vice providers and other large or complex networks. Whereas there may be many
`different interior routing schemes, a single exterior routing scheme manages the
`global Internet, and it is based on the exterior routing protocol BGP version 4
`(BGP-4). The basic routable element is the autonomoussystem. Routers determine
`the path for a data packet by calculating the number of hops between internetwork
`segments. Routers build routing tables and use these tables along with routing
`algorithms.
`
`
`
`bandwidth-intensive than distance-vector routing, but it is also more com-
`plex and more computer- and memory-intensive. OSPE, Intermediate Sys-
`tem to Intermediate System (IS-IS), and Network Link Services Protocol
`(NLSP) are link-state routing protocols.
`
`Network Access Protocols
`Network access protocols operate at Layer 2. They provide the underlyingbasis for
`the transportof the IP datagrams. The original network access protocol was Ether-
`net, but IP can be transported transparently over any underlying network,includ-
`ing Token Ring, FDDI, Fibre Channel, Wireless, X.25, ISDN, Frame Relay, or ATM.
`Both Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) were
`designed specifically for IP over point-to-point connections. PPP provides data-link
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 13
`
`
`
`Chapter9 = The Internet: Infrastructure and Service Providers
`
`layer functionality for IP over dialup/dedicatedlinks. In other words, whenever you
`dial in to your ISP you negotiate a PPP session, and part of what PPP doesis to pro-
`vide a mechanism toidentify and authenticate the user thatis dialing up.
`
`Page 14
`
`Internet Addressing
`To make the Internet an open communications system,a globally accepted method
`of identifying computers was needed,and IP acts as the formal addressing mecha-
`nism forall Internet messaging.
`Each hoston the Internet is assigned a unique 32-bit Internet address,called the
`IP address, whichis placed in the IP header and whichis used to route packets to their
`destinations. IP addresses are assigned on a per-interface basis, so a host can have sev-
`eral IP addressesif it has several interfaces (notethata single interface can have multi-
`ple addresses, too). Therefore, an IP address refers to an interface, not to the host. A
`basic conceptof IP addressingis that someofthebits of the IP address can be usedfor
`generalized routing decisions because thesebits indicate which network (andpossibly
`which subnet) the interface is a member of. Addressing is performed on the basis of
`network/subnet and host; routing is performed based on the network/subnet portion
`of the address only. Whena packetreachesits target network, the host portion of the
`address is then examinedforfinal delivery.
`The current generation ofIP is called IP version 4 (1Pv4). IP addresses have
`two parts: Thefirst is the network ID and the secondis the host ID. Under IPv4,
`there are five classes, which differ in how many networks and hosts are supported
`(see Figure 9.4):
`
`Class A—With Class A, there can be a total of 126 networks, and on each
`of those networks there can be 16,777,214 hosts. Class A address spaceis
`largely exhausted,although there is some address space reserved by IANA.
`Class B—Class B addresses provide for 16,384 networks and each of which
`can have 65,534 hosts. Class B spaceis also largely exhausted, with a few
`still available, albeit at a very high cost.
`Class C—Class C allows 2,097,152 networks, each of which can have
`254 hosts.
`Class D—Class D belongsto a special aspect of the Internetcalled the mul-
`ticast backbone (MBONE). Singlecast, or unicast, means going from one
`transmitter to one receiver. Multicast implies moving from one transmitter
`to multiple receivers. Say, for instance, that you are in San Francisco and
`you wantto do a videoconferencingsessionthat involvesthreeoffices
`located in London. In the unicast mode, you need three separate IP connec-
`tions to London from the conferencing point in San Francisco. With multi-
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01383
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01383
`Page 14
`
`
`
`Internet Basics
`
`Class A
`1-126
`
`Class B
`128.0-191.255
`
`Class C
`192.0-223.255.255
`
`Class D
`multicast
`224-239
`
`Class E
`reserved
`240-247
`
`“16, 777,214
`
`2,097,152
`
`
`
`
`
`IETF began to consider the potential of IP address space exhaustion. The result
`
`The digits in an IP address tell you a number of things about the address. For
`example, in the IP address 124.29.88.7, the first set of digits, 124, is the network
`ID, and becauseit falls in the range of numbers for Class A, we knowthatthis is a
`Class A address. The remaining three sets, 29.88.7, are the host ID. In the address
`130.29.88.7, the first two sets, 130.29, comprise the network ID and indicate that
`this is a Class B address; the second twosets in this address, 88.7, comprise the
`host ID. Figure 9.5 shows an example of IP addressing.
`Network IDs are managed and assigned by ARIN, APNIC, and RIPE NCC.
`Host IDs are assigned locally by the network administrator. Given a 32-bit
`address fie