throbber

`Telecommunications
`Essentials
`The Complete Global Source
`for Communications Fundamentals,
`Data Networking and the Internet,
`and Next-Generation Networks
`
`Lillian Goleniewski
`
`vvAddison-Wesley
`Boston * San Francisco e New York * Toronto * Montreal
`London * Munich e Paris * Madrid
`Capetown * Sydney * Tokyo * Singapore * Mexico City
`
`
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`Page1
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 1
`
`

`

`
`
`
`
`Manyofthe designations used by manufacturersandsellers to distinguish their products are claimedas trade-
`marks. Where those designations appear in this book, and Addison-Wesley, Inc. was aware of a trademark claim,
`the designations have been printed withinitial capital letters or in all capitals.
`
`Lido Telecommunications Essentials® is the registered trademark of The Lido Organization, Inc.
`
`The authorand publisher have taken care in the preparation of this book, but make no expressed or implied war-
`ranty of any kind and assumenoresponsibility forerrors or omissions. Noliabilityis assumedfor incidental or con-
`sequential damages in connection with orarising outofthe use of the information or programs contained herein.
`
`Thepublisheroffers discounts on this book when orderedin quantity for special sales. For more information,
`please contact:
`
`Pearson Education Corporate Sales Division
`201 W. 103"Street
`Indianapolis, IN 46290
`(800) 428-5331
`corpsales@pearsoned.com
`
`Visit AW on the Web: www.aw.com/cseng/
`
`Library of Congress Cataloging-in-Publication Data
`
`Goleniewski, Lillian.
`Telecommunications essentials : the complete global source for communications
`fundamentals, data networking and the Internet, and next-generation networks/ Lillian Goleniewski.
`p. cm.
`Includes bibliographical references and index.
`ISBN 0-201-76032-0
`1. Telecommunication. I. Title.
`
`TK5101 G598 2002
`621.382—dc21
`
`Copyright © 2002 by Pearson Education,Inc.
`
`2001053752
`
`All rights reserved. No part of this publication maybe reproduced,stored in a retrieval system, or transmitted, in
`any form, or by any means,electronic, mechanical, photocopying, recording, or otherwise, withoutthe prior con-
`sent of the publisher. Printed in the United States of America. Published simultaneously in Canada.
`
`For information on obtaining permission for use of material from this work, please submit a written requestto:
`
`Pearson Education, Inc.
`Rights and Contracts Department
`75 Arlington Street, Suite 300
`Boston, MA 02116
`Fax: (617) 848-7047
`
`ISBN 0-201-76032-0
`Text printed on recycled paper
`
`123456789 10—CRS—0504030201
`First printing, December 2001
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`Page 2
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 2
`
`

`

`
`
`
`The Internet: Infrastructure and
`Service Providers.
`
`
`
`
`
`w= Internet Basics
`
`
`hat speaks to the pace of Internet development.
`Figure 9.1 is an astounding graph t
`It shows the numberofyears it took a number of technologies to reach 50 million
`
`
`users worldwide. As you can see, whereas it took 74 years for the telephone to
`reach 50 million users, it took the World Wide Web only 4.
`
`
`What forces are propelling our interest in the Internet? One main force is that
`today some 250 million people worldwide have
`usage is increasing dramatically;
`
`
`Internet access, and that numberis growing by leaps and bounds. The Internet is
`very useful and easy to use, and for a growing number of people in the developed
`
`
`world,it is now thefirst place to look for information. As one colleague recently
`
`
`told me,in the past week, besides the numerous times he had used the Internet to
`ork, he'd used the Internetto look up hotels for a week-
`get information for my w
`
`
`end break, to determine what concerts are on in Dublin, to check the specification
`of a car, to transfer funds between bank accounts, to find the address of an old
`
`
`friend, and to obtain sheet music. Electronic commerce (e-commerce) is also grow-
`
`ing, in both the business-to-consumet and business-to-business sectors. Another
`
`how the Internet actually works, the
`This chapter explores the Internet, including
`s levels of service providers, and the
`structure of the Internet in terms of the variou
`organization and characteristics of the growing variety of service providers.
`
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 3
`
`

`

`
`
`
`
`Chapter 9 © The Internet: Infrastructure and Service Providers
`
`
`
`Page 4
`
`A Brief History of the Internet
`‘To help understand thefactors that contributed to the creation of the Internet, let's
`look very briefly at the history of the Internet. In 1969 the Advanced Research
`Projects Agency (ARPA) of the U.S. Department of Defense initiated a project to
`develop a distributed network. There were several reasons for doing this. First, the
`project was launched during the Cold Warera, when there was aninterest in build-
`ing a network that had nosingle point offailure, and that could sustain an attack
`yet continue to function. Second, four supercomputer centers were located in four
`universities throughout the UnitedStates, and we wanted to connect them together
`so that we could engage in some moreintensive processingfeats. So, the Internet
`started as a wide area, packet-switching network called the ARPANET.
`Toward the mid-1970s, ARPA was renamed the Defense Advanced Research
`Projects Agency (DARPA), and while it was working on the distributed, or packet-
`switched, network, it was also working on local area networks (LANs), paging net-
`works, andsatellite networks. DARPA recognized that there was a need for some
`form of internetworking protocol that would allow open communications between
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Telephone
`
`Radio
`
`PC
`Technology
`
`Figure 9.1
`
`Internet pace: Years to reach 50 million users worldwide
`
`contributor is the major shift toward the use of advanced applications, including
`pervasive computing, which introduces a wide range ofintelligent appliances that
`are ready to communicate throughthe Internet, as well as applicationsthat include
`the more captivating visual and sensory streams. Finally, the availability of broad-
`band, or high-speed access technologies,further drives our interest in and ourabil-
`ity to interact with Websites that involve the use of these advanced applications
`and offer e-commerce capabilities.
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 4
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Internet Basics
`
`
`
`disparate networks. So, Internet Protocol (IP) was created to support an open-
`architecture network that could link multiple disparate networks via gateways—
`what we todayrefer to as routers.
`In 1980, Transmission Control Protocol/Internet Protocol (TCP/IP) began to
`be implemented on an experimental basis, and by 1983,it was required in order for
`a subnetwork to participate in the larger virtual Internet.
`The original Internet model was not based on the telephone network model.It
`involved distributed control rather than centralized control, andit relied on coop-
`eration among its users, whichinitially were largely academicians and researchers.
`With the original Internet, there's no regulation, no monopoly, and no universal
`service mandate (although theseissues are being considered seriously now).
`Today, no one agencyis in charge of the Internet, although the Internet Society
`(ISOC)is a nonprofit, nongovernmental, international organization that focuses on
`Internet standards, education, and policy issues. ISOC is an organization for Inter-
`net professionals that serves as the organizational homeof the Internet Engineer-
`ing Task Force (IETF), which oversees various organizational and coordinating
`tasks, ISOC is composed ofa board oftrustees,the Internet Architecture Board, the
`IETE the Internet Research Task Force, the Internet Engineering Steering Group,
`and the Internet Research Steering Group.
`The IETFis an international community of network designers, operators, ven-
`dors, and researchers, whosejob is to evolve the Internet and smooth its operation
`by creating technical standards through consensus. Other organizations that are
`critical to the functioning of the Internet include American Registry for Internet
`Numbers (ARIN) in the United States, Asia Pacific Network Information Center
`
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 5
`
`

`

`Page 6
`
`To understandthe Internet, it’s importantto first understand the concept of a com-
`puter network (see Figure 9.2). A network is formed by interconnecting a setof
`computers, typically referred to as hosts, in such a way that they can interoperate
`with one another. Connecting these hosts involves two major components: hard-
`ware (that is, the physical connections) and software. The software can be run on
`the same or dissimilar host operating systems, and it is based on standards that
`define its operation. These standards, referred to as protocols, provide the formats
`for passing packets of data, specify the details of the packet formats, and describe
`how to handle error conditions. The protocols hide the details of network hard-
`ware and permit computers of different hardware types, connected by different
`physical connections, to communicate, despite their differences. (Protocols are dis-
`cussed in detail later in this chapter.)
`In thestrictest sense, the Internetis an internetwork composed of a worldwide
`collection of networks, routers, gateways, servers, and clients, that use a common
`set of telecommunications protocols—the IP family—to link them together (see
`Figure 9.3). The term client is often used to refer to a computer on the network
`
`:
`
`(APNIC) in Asia-Pacific, and RIPE NCC (Reseaux IP Europeens Network Coordi-
`nation Center) in Europe. These organizations manage and sell IP addresses and
`autonomous system numbers. IANA manages and assigns protocol and port num-
`ber, and ICANN (formed in 1998) is responsible for managing top-level domain
`names and the root name servers. ICANN also delegates control for domain name
`registry below the top-level domains. (Domain names and the role of IP addresses
`are discussed later in this chapter.)
`
`Whatthe Internet Is and How It Works
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`
`
`
`Chapter 9 TheInternet: Infrastructure and Service Providers =
`
`
`
`oercuet
`eeoe
`e
`eeeaaa
`
`:ZE
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 6
`
`

`

`Internet Basics
`
`[24s
`
`=a
`
`
`
`“Intelligent S
`=
`200d
`=,
`
`
`“intelligent
`
` reuler
`
`Internet,
`
`
`
`_ intranet,
`\.extranet—
`
`
`
`Figure 9.2 Network components
`
`“Backbone
`
`/
`
`
`
`
`
`Figure 9.3 An internetwork
`
`ered by a server. It also refers to a user run-
`that takes advantage of the services off
`lication. The term server describes either a
`ning theclient side of a client/server app
`ervices to network users Or
`computer or a software-based process that provides s
`Web services to Internet users.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 7
`
`

`

`
`
`Chapter 9 =® The Internet: Infrastructure and Service Providers
`
`Page 8
`
`Networks connect servers andclients, allowingthe sharing of information and
`computing resources. Network equipment includes cable and wire, network adapt-
`ers, hubs, switches, and various other physical connectors. In order for the net-
`work to be connected to the Internet, the network must send and retrieve data by
`using TCP/IP and related protocols. Networks can also be connected to form their
`own internets: Site-to-site connections are known as intranets, internal networks
`that are generally composed of LANs interconnected by a WANthat uses IP Con-
`nections between partnering organizations, using IP are known asextranets.
`The Internet is a complex, highly redundant network of telecommunications
`circuits connected together with internetworking equipment, including routers,
`bridges, and switches. In an environment consisting of several network segments
`with different protocols and architectures, the network needs a device that not only
`knows the address of each segment but can also determinethe best path for send-
`ing data andfiltering broadcast traffic to the local segment. The Internet moves
`data by relaying traffic in packets from one computer network to another.If a par-
`ticular network or computer is down or busy, the network is smart enough to
`reroute thetraffic automatically. This requires computers(that is, routers) that are
`able to send packets from one network to another. Routers make decisions about
`how to route the data or packets, they decide which pipeis best, and then they use
`that best pipe. Routers work at the network layer, Layer 3, of the OSI model, which
`allows them to switch and route packets across multiple networks. Routers read
`complex network addressing information in the packet; they can share status and
`routing information with one another and usethis information to bypass slow or
`malfunctioning connections.
`Routing is the main process that the Internet host uses to deliver packets. The
`Internet uses a hop-by-hop routing model, which means that each hostor router
`that handles a packet examines the destination address in the packet's IP header,
`computes the next hopthatwill bring the packet onestep closerto its destination,
`and delivers that packet to the next hop, where the processis repeated. To make
`this happen, routing tables must match destination addresses with next hops, and
`routing protocols must determine the contentof these tables. Thus, the Internet
`and the public switched telephone network (PSTN) operate quite differently from
`one another. The Internet uses packet switching, where there’s no dedicated con-
`nection and the data is fragmented into packets. Packets can be delivered via differ-
`€nt
`routes over
`the Internet and reassembled at
`the ultimate destination.
`Historically, “back-office” functions such as billing and network management have
`not been associated with Internet. But
`the Internet emphasizes flexibility—the
`capability to route packets around congestedor failed points.
`Recall from Chapter 5, “The PSTN,” that the PSTN usescircuit switching, so a
`dedicated circuit is set up and taken down for each call. This allows charging based
`on minutes andcircuits used, which,in turn, allows chain-of-supply dealings. The
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 8
`
`

`

`major emphasis of the PSTN is on reliability. So, the Internet and the PSTN have dif-
`ferent models and different ways of managingor routing traffic through the network,
`but they share the same physical foundation in terms of the transport infrastructure,
`or the types of communication links they use. (Chapter 4, “Establishing Communi-
`cations Channels,” discusses packet switching and circuit switching in detail.)
`
`Internet Protocols
`TheInternetis a collection of networksthat are interconnected logically as a single,
`large, virtual network. Messages between computers are exchanged by using packet
`switching. Networks can communicate with one another because they all use an
`internetworking protocol. Protocols are formal descriptions of messages to be
`exchanged andofrules to be followed in order for two or more systems to exchange
`information in a manner that both parties will understand. The following sections
`examine the Internet's protocols: TCP/IP, User Datagram Protocol (UDP), Internet
`Control Message Protocol (ICMP), Internet Group Management Protocol (IGMP),
`Address Resolution Protocol (ARP)/Reverse Address Resolution Protocol (RARP),
`routing protocols, and network access protocols.
`
`
`
`Internet Basics | 247
`
`or video—anythingdigital that the network can transmit. The sequence numbers
`
`TCP/IP
`The IETE has technical responsibility for TCP/IP, which is the most popular and
`widely used of the internetworking protocols. All information to be transmitted
`over the Internetis divided into packets that contain a destination address and a
`sequence number. Packets are relayed through nodes in a computer network,
`along the best route currently available between the source and destination. Even
`though the packets may travel along different routes and may arrive out of
`sequence,
`the receiving computer is able to reassemble the original message.
`Packetsize is keptrelatively small—at1,500 bytes or less—so that in the event of
`an error, retransmission is efficient. To manage the traffic routing and packet
`assembly/disassembly, the networks rely on intelligence from the computers and
`software that control delivery.
`TCP/IP referred to as the TCP/IP suite in Internet standards documents,gets its
`name from its two most important protocols, TCP and IP, which are used for
`interoperability among many different types of computers. A major advantage of
`TCP/IP is that it is a nonproprietary network protocol suite that can connect the
`hardware and operating systems of many different computers.
`TCP Networkapplications present data to TCP. TCP divides the data into pack-
`ets and gives each packet a sequence number that is not unique, but which is nonre-
`peating for a very long time. These packets could represent text, graphics, sound,
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 9
`
`

`

`Chapter9 ™ The Internet: Infrastructure and Service Providers
`
`Page 10
`
`help to ensure that the packets can be reassembled correctly at the receiving end.
`Thus, each packet consists of content, or data, as well as the protocol header, the
`information that the protocol needs to do its work. TCP uses another piece of
`information to ensure that the data reaches the right application whenitarrives at
`a system: the port number, which is within the range 1 to 65,535. Port numbers
`identify running applications on servers, applications that are waiting for incoming
`connections from clients. Port numbers identify one listening application from
`another. Ports 1 to 1,023 are reserved for server applications, although servers can
`use higher port numbers as well. Numbers between 1 and 1,023 are reserved for
`“well-known” applications (for example, Web servers run on port 80, FTP runs on
`port 21). Also, many recent protocols have been assigned well-known port num-
`bers above 1,023. Ports with higher numbers, called “ephemeral” ports, are
`dynamically assigned to client applications as needed. A client obtains a random
`ephemeral port when it opens a connection to a well-knownserverport.
`Data to be transmitted by TCP/IP hasa port from whichit is coming and a port
`to whichit is going, plus an IP source and a destination address. Firewalls can use
`these addresses to control the flow of information. (Firewalls are discussed in
`Chapter 11, “Next-Generation Network Services.”)
`TCP is the protocol for sequenced andreliable data transfer. It breaks the
`data into pieces and numbers each piece so that the receipt can be verified and
`the data can be put back in the proper order. TCP provides Layer 4 (transport
`layer) functionality, and it is responsible for virtual circuit setup, acknowledg-
`ments, flow control, and retransmission of lost or damaged data. TCP provides
`end-to-end, connection-oriented, reliable, virtual circuit service. It uses virtual
`ports to make connections; ports are used to indicate where information must be
`delivered in order to reach the appropriate program, and this is how firewalls and
`application gateways canfilter and direct the packets.
`
`IP IP handles packet forwarding and transporting of datagrams across a network.
`With packet forwarding, computers can send a packet on to the next appropriate
`network component, based on the address in the packet's header. IP defines the
`basic unit of data transfer, the datagram,also referred to as the packet, andit also
`defines the exact formatofall data asit travels across the Internet. IP works like an
`envelope in the postalservice, directing information to its proper destination. With
`this arrangement, every computer on the Internet has a unique address. (Address-
`ing is discussedlater in this chapter.)
`IP provides software routines to route and to store and forward data among
`hosts on the network. IP functions at Layer 3 (the network layer), and it provides
`several services, including host addressing, error notification, fragmentation and
`reassembly, routing, and packet timeout. TCP presents the data to IP in order to
`provide basic host-to-host communication. IP then attaches to the packet, in a pro-
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 10
`
`

`

`
` Internet Basics
`249
`
`tocol header, the address from which the data comes and the address of the system
`to whichit is going.
`;
`Underthe standards, IP allows a packetsize of up to 64,000 bytes, but we don't
`transmit packets that large because they would causesession timeouts and big con-
`gestion problems. Therefore, IP packets are segmented into 1,500-byte-maximum
`chunks.
`IP always doesits best to makethe delivery to the requested destination host,
`butifit fails for any reason,it just drops the packet. As such, upper-level protocols
`should not depend onIPto deliver the packet every time. Because IP provides con-
`nectionless, unreliable service and because packets can get lost or arrive out of
`sequence, or the messages may take more than 1,500 bytes, TCP provides the
`recovery for these problems.
`
`IGMP enables a router to determine which host groups have members on a given
`
`UDP
`Like TCP, UDP is a Layer 4 protocol that operates over IP UDP provides end-to-
`end, connectionless, unreliable datagram service.
`It
`is well suited for query-
`response applications, for multicasting, and for use with Voice over IP (VoIP).
`(VoIP is discussed in Chapter 11.) Because UDP does not request retransmissions,
`it minimizes what would otherwise be unmanageable delay; the result is that some-
`times the quality is not very good. For instance, if you encounter losses or errors
`associated with a voice packet, the delays that wouldbe associated with retransmit-
`ting that packet would render the conversation unintelligible. In VoIP, when you
`lose packets, you do not request retransmissions. Instead, you hopethat the user
`can recover from the losses by other means. Unlike TCP, UDP does not providefor
`error correction and sequenced packetdelivery; it is up to the applicationitself to
`incorporate error correction if required.
`
`ICMP
`ICMPprovideserror handling and control functions. It is tightly integrated with IP
`ICMP messages,delivered in IP packets, are used for out-of-band messagesrelated
`to network operation or misoperation. Because ICMP uses IP, ICMP packetdeliv-
`ery is unreliable. ICMP functions include announcing network errors, announcing
`network congestion, assisting in troubleshooting, and announcing timeouts.
`
`IGMP
`Another Layer 3 protocol is Internet Group ManagementProtocol (IGMP), whose
`primary purposeis to allow Internet hosts to participate in multicasting. The IGMP
`standard describes the basics of multicasting IP traffic, including the format of
`multicast IP addresses, multicast Ethernet encapsulation, and the concept of a host
`group (thatis, a set of hosts interested in traffic for a particular multicast address).
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 11
`
`

`

`
`Chapter 9
`© The Internet: Infrastructure and Service Providers
`
`network segment, but IGMP does not address the exchange of multicast packets
`between routers.
`
`ARP and RARP
`At Layer 3 you also find ARP/RARP. ARP determines the physical address of a node,
`given that node's IP address. ARP is the mapping link between IP addresses and the
`underlying physical (MAC) address. RARP enables a host to discover its own IP
`address by broadcasting its physical address. When the broadcast occurs, another
`node on the LAN answers back with the IP address of the requesting node.
`
`Page 12
`
`Routing Protocols
`Routing protocols are protocols that allow routers to communicate with each other.
`They include Routing Information Protocol (RIP), Interior Gateway Protocol
`(IGP), Open Shortest Path First (OSPF), Exterior Gateway Protocol (EGP), and
`Border Gateway Protocol (BGP).
`There are several processes involved in router operation. First, the router cre-
`ates a routing table to gather information from other routers about the optimum
`paths. As discussed in Chapter 8, “Local Area Networking,” the routing tables can
`be static or dynamic; dynamic routing tables are best because they adapt to chang-
`ing network conditions. Next, when data is sent from a network host to a router en
`route to its destination, the router breaks open the data packet and looks at the
`destination address to determine the mostefficient path between two endpoints. To
`identify the most efficient path, the router uses algorithms to evaluate a number of
`factors (called metrics), including distance and cost. Routing protocols considerall
`the various metrics involved when computing the best path.
`
`Distance-Vector Versus Link-State Protocols
`cols are involved in making routing decisions:
`
`Two main types of routing proto-
`
`a Distance-vector routing protocols—These routing protocols require that
`each router simply inform its neighbors of its routing table. For each net-
`work path, the receiving router picks the neighbor advertising the lowest
`cost, and then the router adds this into its routing table for readvertisement.
`Common distance-vector routing protocols are RIP, Internetwork Packet
`Exchange (IPX) RIP, AppleTalk Routing Table Management Protocol
`(RTMP), and Cisco's Interior Gateway Routing Protocol (IGRP).
`Link-state routing protocols—Link-state routing protocols require that
`each router maintain at least a partial map of the network. When a network
`link changes state—up to down or vice versa—anotification is flooded
`throughout the network. All the routers note the change and recompute the
`routes accordingly. This method is more reliable, easier to debug, and less
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 12
`
`

`

`
`
` Internet Basics 251
`
`Interior routing occurs within an autonomoussys-
`Interior and Exterior Routing
`tem, which is a collection of routers undera single administrative authority that
`uses a commoninterior gateway protocolfor routing packets. Most of the common
`routing protocols, such as RIP and OSPEare interior routing protocols. The auton-
`omous system numberis a unique numberthatidentifies an autonomous system in
`the Internet. Autonomous system numbers are managed and assigned by ARIN
`(North America), APNIC (Asia-Pacific), and RIPE NCC (Europe). Exterior routing
`protocols, such as BGP, use autonomous system numbers to uniquely define an
`autonomous system. The basic routable elementis the IP network or subnetwork,
`or the Classless Interdomain Routing (CIDR) prefix for newer protocols. (CIDR is
`discusseda little later in the chapter.)
`OSPE which is sanctioned by the IETF and supported by TCP, is intended to
`becometheInternet's preferred interior routing protocol. OSPFis a link-state proto-
`col with a complex set of options and features. Link-state algorithms control the
`routing process and enable routers to respond quickly to changes in the network.
`Link-state routing makes use of the Dijkstra algorithm (which determines routes
`based on path length andis used in OSPF) to determineroutes based on the number
`of hops, the line speed, the amountoftraffic, and the cost. Link-state algorithms are
`more efficient and create less network traffic than do distance-vector algorithms,
`which can be crucial in environments that involve multiple WANlinks.
`Exterior routing occurs between autonomoussystems andis of concern to ser-
`vice providers and other large or complex networks. Whereas there may be many
`different interior routing schemes, a single exterior routing scheme manages the
`global Internet, and it is based on the exterior routing protocol BGP version 4
`(BGP-4). The basic routable element is the autonomoussystem. Routers determine
`the path for a data packet by calculating the number of hops between internetwork
`segments. Routers build routing tables and use these tables along with routing
`algorithms.
`
`
`
`bandwidth-intensive than distance-vector routing, but it is also more com-
`plex and more computer- and memory-intensive. OSPE, Intermediate Sys-
`tem to Intermediate System (IS-IS), and Network Link Services Protocol
`(NLSP) are link-state routing protocols.
`
`Network Access Protocols
`Network access protocols operate at Layer 2. They provide the underlyingbasis for
`the transportof the IP datagrams. The original network access protocol was Ether-
`net, but IP can be transported transparently over any underlying network,includ-
`ing Token Ring, FDDI, Fibre Channel, Wireless, X.25, ISDN, Frame Relay, or ATM.
`Both Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) were
`designed specifically for IP over point-to-point connections. PPP provides data-link
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 13
`
`

`

`Chapter9 = The Internet: Infrastructure and Service Providers
`
`layer functionality for IP over dialup/dedicatedlinks. In other words, whenever you
`dial in to your ISP you negotiate a PPP session, and part of what PPP doesis to pro-
`vide a mechanism toidentify and authenticate the user thatis dialing up.
`
`Page 14
`
`Internet Addressing
`To make the Internet an open communications system,a globally accepted method
`of identifying computers was needed,and IP acts as the formal addressing mecha-
`nism forall Internet messaging.
`Each hoston the Internet is assigned a unique 32-bit Internet address,called the
`IP address, whichis placed in the IP header and whichis used to route packets to their
`destinations. IP addresses are assigned on a per-interface basis, so a host can have sev-
`eral IP addressesif it has several interfaces (notethata single interface can have multi-
`ple addresses, too). Therefore, an IP address refers to an interface, not to the host. A
`basic conceptof IP addressingis that someofthebits of the IP address can be usedfor
`generalized routing decisions because thesebits indicate which network (andpossibly
`which subnet) the interface is a member of. Addressing is performed on the basis of
`network/subnet and host; routing is performed based on the network/subnet portion
`of the address only. Whena packetreachesits target network, the host portion of the
`address is then examinedforfinal delivery.
`The current generation ofIP is called IP version 4 (1Pv4). IP addresses have
`two parts: Thefirst is the network ID and the secondis the host ID. Under IPv4,
`there are five classes, which differ in how many networks and hosts are supported
`(see Figure 9.4):
`
`Class A—With Class A, there can be a total of 126 networks, and on each
`of those networks there can be 16,777,214 hosts. Class A address spaceis
`largely exhausted,although there is some address space reserved by IANA.
`Class B—Class B addresses provide for 16,384 networks and each of which
`can have 65,534 hosts. Class B spaceis also largely exhausted, with a few
`still available, albeit at a very high cost.
`Class C—Class C allows 2,097,152 networks, each of which can have
`254 hosts.
`Class D—Class D belongsto a special aspect of the Internetcalled the mul-
`ticast backbone (MBONE). Singlecast, or unicast, means going from one
`transmitter to one receiver. Multicast implies moving from one transmitter
`to multiple receivers. Say, for instance, that you are in San Francisco and
`you wantto do a videoconferencingsessionthat involvesthreeoffices
`located in London. In the unicast mode, you need three separate IP connec-
`tions to London from the conferencing point in San Francisco. With multi-
`
`AT&T Exhibit 1024
`AT&Tv. VoIP, IPR 2017-01384
`
`AT&T Exhibit 1024
`AT&T v. VoIP, IPR 2017-01384
`Page 14
`
`

`

`Internet Basics
`
`Class A
`1-126
`
`Class B
`128.0-191.255
`
`Class C
`192.0-223.255.255
`
`Class D
`multicast
`224-239
`
`Class E
`reserved
`240-247
`
`“16, 777,214
`
`2,097,152
`
`
`
`
`
`IETF began to consider the potential of IP address space exhaustion. The result
`
`The digits in an IP address tell you a number of things about the address. For
`example, in the IP address 124.29.88.7, the first set of digits, 124, is the network
`ID, and becauseit falls in the range of numbers for Class A, we knowthatthis is a
`Class A address. The remaining three sets, 29.88.7, are the host ID. In the address
`130.29.88.7, the first two sets, 130.29, comprise the network ID and indicate that
`this is a Class B address; the second twosets in this address, 88.7, comprise the
`host ID. Figure 9.5 shows an example of IP addressing.
`Network IDs are managed and assigned by ARIN, APNIC, and RIPE NCC.
`Host IDs are assigned locally by the network administrator. Given a 32-bit
`address fie

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket