throbber
THE:
`GEEK
`ETUF'F'
`Linux I DB [ Open Source | Web
`
`E Menu
`
`. Home
`.
`Free eBook
`.
`Start Here
`
`0 Contact
`
`o About
`
`TCP/IP Protocol Fundamentals Explained
`with a Diagram
`
`by Himanshu Arora on November 2, 201 l
`
`Tweet
`
`Have you ever wondered how your computer talks to other computers on your local LAN or to
`other systems on the intemet?
`
`Understanding the intricacies of how computers interact is an important part of networking and is
`of equal interest to a sysadmin as well as to a developer. In this article, we will make an attempt
`to discuss the concept of communication from the very basic fundamental level that needs to be
`understood by everybody.
`
`TCP/IP PROTOCOL SUITE
`
`Communications between computers on a network is done through protocol suits. The most
`widely used and most widely available protocol suite is TCP/IP protocol suite. A protocol suit
`consists of a layered architecture where each layer depicts some functionality which can be
`carried out by a protocol. Each layer usually has more than one protocol options to carry out the
`responsibility that the layer adheres to. TCP/IP is normally considered to be a 4 layer system.
`The 4 layers are as follows :
`
`1. Application layer
`2. Transport layer
`3. Network layer
`4. Data link layer
`
`ALA11353476
`
`Alacritech, Ex. 2043 Page 1
`
`Alacritech, Ex. 2043 Page 1
`
`

`

`1. Application layer
`
`This is the top layer of TCP/1P protocol suite. This layer includes applications or processes that
`use transport layer protocols to deliver the data to destination computers.
`
`At each layer there are certain protocol options to carry out the task designated to that particular
`layer. So, application layer also has various protocols that applications use to communicate with
`the second layer, the transport layer. Some of the popular application layer protocols are :
`
`0 HTTP (Hypertext transfer protocol)
`.
`FTP (File transfer protocol)
`.
`SMTP (Simple mail transfer protocol)
`.
`SNMP (Simple network management protocol) etc
`
`2. Transport Layer
`
`This layer provides backbone to data flow between two hosts. This layer receives data from the
`application layer above it. There are many protocols that work at this layer but the two most
`commonly used protocols at transport layer are TCP and UDP.
`
`TCP is used where a reliable connection is required while UDP is used in case of unreliable
`connections.
`
`TCP divides the data(coming fi'om the application layer) into proper sized chunks and then
`passes these chunks onto the network. It acknowledges received packets, waits for
`the acknowledgments of the packets it sent and sets timeout to resend the packets if
`acknowledgements are not received in time. The term “reliable connection’ is used where it is not
`desired to loose any information that is being transferred over the network through this
`connection. So, the protocol used for this type of connection must provide the mechanism to
`achieve this desired characteristic. For example, while downloading a file, it is not desired to
`loose any information(bytes) as it may lead to corruption of do wnloaded content.
`
`UDP provides a comparatively simpler but unreliable service by sending packets from one host
`to another. UDP does not take any extra measures to ensure that the data sent is received by the
`target host or not. The term ‘unreliable connection” are used where loss of some information
`does not hamper the task being fulfilled through this connection. For example while streaming a
`video, loss of few bytes of information due to some reason is acceptable as this does not harm
`the user experience much.
`
`3. Network Layer
`
`This layer is also known as Internet layer. The main purpose of this layer is to organize or handle
`the movement of data on network. By movement ol'data, we generally mean routing ol‘data over
`the network. The main protocol used at this layer is lP. While lCMP(used by popular ‘ping’
`command) and IGMP are also used at this layer.
`
`ALA11353477
`
`Alacritech, Ex. 2043 Page 2
`
`Alacritech, Ex. 2043 Page 2
`
`

`

`4. Data Link Layer
`
`This layer is also known as network interface layer. This layer normally consists ofdevice
`drivers in the OS and the network interface card attached to the system. Both the device drivers
`and the network interface card take care of the communication details with the media being used
`to transfer the data over the network. In most of the cases, this media is in the form of cables.
`Some ofthe famous protocols that are used at this layer include ARP(Address resolution
`protocol), PPP(Point to point protocol) etc.
`
`TCP/IP CONCEPT EXAMPLE
`
`One thing which is worth taking note is that the interaction between two computers over the
`network through TCP/IP protocol suite takes place in the form of a client server architecture.
`
`Client requests for a service while the server processes the request for client.
`
`Now, since we have discussed the underlying layers which help that data flow from host to target
`over a network. Lets take a very simple example to make the concept more clear.
`
`Consider the data flow when you open a website.
`
`ALA11353478
`
`Alacritech, Ex. 2043 Page 3
`
`Alacritech, Ex. 2043 Page 3
`
`

`

`Host (your laptop)
`
`Target (webserver)
`
`
`
`Media for data transfer (eg. Ethernet)
`
`As seen in the above figure, the information flows downward through each layer on the host
`machine. At the first layer, since http protocol is being used, so an HTTP request is formed and
`sent to the transport layer.
`
`Here the protocol TCP assigns some more information(like sequence number, source port
`number, destination port number etc) to the data coming fiom upper layer so that the
`communication remains reliable i.e, a track of sent data and received data could be maintained.
`
`At the next lower layer, IP adds its own information over the data coming from transport layer.
`This information would help in packet travelling over the network. Lastly, the data. link layer
`makes sure that the data transfer to/from the physical media is done properly. Here again the
`communication done at the data link layer can be reliable or unreliable.
`
`This information travels on the physical media (like Ethernet) and reaches the target machine.
`
`Now, at the target machine (which in our case is the machine at which the website is hosted) the
`same series of interactions happen, but in reverse order.
`
`ALA11353479
`
`Alacritech, Ex. 2043 Page 4
`
`Alacritech, Ex. 2043 Page 4
`
`

`

`The packet is first received at the data link layer. At this layer the information (that was stuffed
`by the data link layer protocol of the host machine) is read and rest of the data is passed to the
`upper layer.
`
`Similarly at the Network layer, the information set by the Network layer protocol ofhost
`machine is read and rest of the information is passed on the next upper layer. Same happens at
`the transport layer and finally the HTTP request sent by the host applieation(your browser) is
`received by the target applieation(Website server).
`
`One would wonder what happens when information particular to each layer is read by the
`corresponding protocols at target machine or why is it required? Well, lets understand this by an
`example of TCP protocol present at transport layer. At the host machine this protocol adds
`information like sequence number to each packet sent by this layer.
`
`At the target machine, when packet reaches at this layer, the TCP at this layer makes note of the
`sequence number of the packet and sends an acknowledgement (which is received seq number +
`1).
`
`Now, ifthe host TCP does not receive the acknowledgement within some specified time, it re
`sends the same packet. So this way TCP makes sure that no packet gets lost. So we see that
`protocol at every layer reads the information set by its counterpart to achieve the functionality of
`the layer it represents.
`
`PORTS, SERVERS AND STANDARDS
`
`On a particular machine, a port number coupled with the IP address of the machine is known as a
`socket. A combination oflP and port on both client and server is known as four tuple. This four
`tuple uniquely identifies a connection. In this section we will discuss how port numbers are
`chosen.
`
`You already know that some ofthe very common services like FTP, telnet etc run on well known
`port numbers. While FTP server runs on port 21, Telent server runs on port 23. So, we see that
`some standard services that are provided by any implementation ofTCP/IP have some standard
`ports on which they run. These standard port numbers are generally chosen from 1 to 1023. The
`well known ports are managed by Internet Assigned Numbers Authority(IANA).
`
`While most standard servers (that are provided by the implementation of TCP/IP suite) run on
`standard port numbers, clients do not require any standard port to run on.
`
`Client port numbers are known as ephemeral ports. By ephemeral we mean short lived. This is
`because a client may connect to server, do its work and then disconnect. So we used the term
`‘short lived’ and hence no standard ports are required for them.
`
`Also, since clients need to know the port numbers ofthe servers to connect to them, so most
`standard servers run on standard port numbers.
`
`ALA11353480
`
`Alacritech, Ex. 2043 Page 5
`
`Alacritech, Ex. 2043 Page 5
`
`

`

`The ports reserved for clients generally range from 1024 to 5000. Port number higher than 5000
`are reserved for those servers which are not standard or well known.
`
`If we look at the file ‘/etc/services’, you will find most of the standard servers and the port on
`which they run.
`
`$ cat /eLc/services
`systat
`ll/tcp
`daytime
`l3/udp
`netstat
`lS/tcp
`qotd
`l7/tcp
`msp
`l8/udp
`chargen
`l9/udp
`ftpedata
`20/tcp
`ftp
`Zl/tcp
`ssh
`22/tcp
`ssh
`22/udp
`telnet
`23/tcP
`
`users
`
`quote
`
`ttytst source
`
`As you see from the /etc/services file, FTP has port number 21, telent has port number 23 etc.
`You can use ‘grep’ command on this file to find any server and its associated port.
`
`As far as the standards are concerned, the following four organizations/groups manage the
`TCP/IP protocol suite. Both the IRTF and the IETF fall under the lAB.
`
` PP’Nt‘
`
`The Internet Society (ISOC)
`
`The Internet Architecture Board (IAB). The IAB falls under the ISOC.
`The Internet Engineering Task Force (IETF)
`The Internet Research Task Force (IRTF)
`
`Tweet
`
`> Add your comment
`
`If you enjoyed this article, you might also like..
`
`l. 50 Linux Sysadmin Tutorials
`2. 50 Most Freguently Used Linux
`Commands (With Examples)
`3. Top 25 Best Linux Performance
`
`Monitoring and Debugging Tools
`4. Mommy, I found it! e 15 Practical Linux
`Find Command Examples
`5. Linux 101 Hacks 2nd Edition
`eBook Em
`
`
`- Awk Introduction — 7 Awk Print
`Examples
`
`- Advanced Sed Substitution Examples
`0
`8 Essential Vim Editor Navigation
`Fundamentals
`25 Most Freguently Used Linux
`IPTables Rules Examples
`a Turbocharge PuTTY with 12 Powerfill
`Add-Ons
`
`.
`
`ALA11353481
`
`Alacritech, Ex. 2043 Page 6
`
`Alacritech, Ex. 2043 Page 6
`
`

`

`Wigglsalitks 3% h -
`
`wax’wamwm
`
`Sed & Awk
`101 Hacks
`EWWWLX‘LN-Ukm
`swam-law
`
`Core 3
`Wham-1g khan-ave.
`“13de
`
`,fi} :3.
`
`Vim
`101 HACKS
`mm mwbm
`:wwhmnmnmnem
`
`Mural \’.:u-m~
`
`G
`
`{ 72 comments... m }
`
`. Devin November 2, 2011, 9:02 am
`
`You lefl out the most popular application layer protocol — HTTP!
`
`m
`
`o
`
`krishnan November 2, 2011, 9:09 am
`
`Excellent job. Short and informative
`
`@
`
`o
`
`jalal hajigholamali November 2, 2011, 12:10 pm
`
`Hi,
`
`very nice article
`thanks a lot. ..
`
`Link
`
`0
`
`Julio l-loffimann Mendes November 2, 2011, 1:52 pm
`
`Thank you for the clear explanation! I’ve always wanted to learn a little about TCP/IP.
`Keep the good work!
`
`Regards,
`Julio.
`
`Link
`
`- Walyonaire November 2, 2011, 3:l7 pm
`
`ALA11353482
`
`Alacritech, Ex. 2043 Page 7
`
`Alacritech, Ex. 2043 Page 7
`
`

`

`This reminds me of my Cisco Lessons, thanks for the “refresh”.
`Excellent Article.
`
`
`Link
`
`Narendra Kangralkar November 2, 201 l, 10:21 pm
`
`Very good explanation !!!
`Keep writing.
`
`Link
`
`Ramesh Natarajan November 2, 2011, 10:27 pm
`
`@Devin,
`
`Yes. HTTP is the most popular application layer protocol. This is why the “TCP/IP
`Concept Example” section explains it using the HTTP protocol.
`
`Anyway, thanks for pointing it out, HTTP is added to the “Application Layer” section to
`make the list complete.
`
`
`Link
`
`Joe November 3, 2011, 3:37 am
`
`Thank you for the effort.
`
`Well written.
`
`m V
`
`onskippy November 3, 2011, 2:54 pm
`
`Seems redundant to the 081 model.
`
`m A
`
`TUL KHACHANE November 4, 2011, 8:32 pm
`
`
`Yes. Vonskippy ,
`
`Great articles here always ................ this is one stop resource. . ...and you will find
`almost everything you need...
`
`Link
`
`ALA11353483
`
`Alacritech, Ex. 2043 Page 8
`
`Alacritech, Ex. 2043 Page 8
`
`

`

`Himanshu November 5, 2011, 12:48 pm
`
`Thank you all for your valuable comments.
`
`
`Link
`
`grouchO November 13, 2011, 9: 15 pm
`
`Some books say the 5000 upper limit for client (dynamic/ephemeral) ports was a Inisprint
`in W. Richard Stevens’ “TCP/IP Illustrated Vol. 1” and should have been 50000. The
`
`issue doesn’t seem to have affected the progress of the protocol in taking over the world.
`
`Link
`
`Himanshu November 13, 2011, 11:30 pm
`
`@grouchO
`OK. Can you provide some references?
`
`Link
`
`Devin November 28, 2011. 8:37 pm
`
`You forgot the physical layer.
`
`Link
`
`Himanshu November 29, 2011, 12:08 am
`
`Well, I think you are talking about the 081 model where physical layer is the last layer.
`In TCP/lP model Data link layer is the layer 1. Sometimes this layer is also referred to as
`“Network Interface Layer” as as to avoid confusion with the data link layer of the 051
`model. This Network interface Layer encapsulates physical layer also.
`
`Link
`
`Sravan December 15, 2011, 2:48 am
`
`Thanks. Short and informative article.
`
`m d
`
`eepak kumar January 3, 2012, 2:23 pm
`
`nice .....very helpfull
`tlmx
`
`ALA11353484
`
`Alacritech, Ex. 2043 Page 9
`
`Alacritech, Ex. 2043 Page 9
`
`

`

`% R
`
`eece April 17, 2012, 5:04 am
`
`thanks for the information, it helped me understand TCP/IP
`
`L'Ak
`
`Dharmesh May 13, 2012, 9:42 pm
`
`Thanks a lot!!!
`
`It was a very short and good explanation...
`
`
`Link
`
`AsifMay 13, 2012, 10:08 pm
`
`Simple nd Superbbbbbbbbbbb
`
`Link
`
`rohan June 16, 2012, 1:15 am
`
`an application uses ephemeral port and it uses http as application layer protocol. Now
`when the packet is sent to destination, will it contain both ephemeral destination port and
`standard http destination port no. How this packet will be handled by transport layer and
`application layer at destination?
`
`Link
`
`Tariq August 9, 2012, 3:02 pm
`
`Nice.
`
`A small demo with
`
`wireshark or any other tool could be used to show “how” this happens in real time.
`
`Link
`
`raju September 13, 2012, 8:54 am
`
`Thanks a pile
`It’s fabulous artical and very knowledgeable for me,
`
`Link
`
`ALA11353485
`
`Alacritech, Ex. 2043 Page 10
`
`Alacritech, Ex. 2043 Page 10
`
`

`

`malik usman October 3, 2012, 9:15 am
`
`Thanks a lot!!!
`
`It was a very short and good explanation...
`
`m s
`
`wathi November 24, 2012, 10:13 am
`
`Its is short but soooo ...... informativc,thank u very much
`
`Link
`
`Ritu Kushwaha January 26, 2013, 11:12 am
`
`Useful Information in Short. Well Done!!
`
`Keep Writing...
`
`m U
`
`mar Badu February 7, 2013, 10:28 am
`
`Useful information,i really appreciate this ...... Thanks
`
`mk
`
`poonguzhali February 14, 2013, 7:37 am
`
`Its very easy to understand.
`
`L'Ak
`
`Nagendra Bhat February 20, 2013, 8:20 pm
`
`Hi..
`
`Explanation is good and if there any blogs related to this subject please mention it or
`please mail me.
`
`Link
`
`monica March 15,2013, 3:10 am
`
`Very well explained in simple language
`
`Link
`
`ALA11353486
`
`Alacritech, Ex. 2043 Page 11
`
`Alacritech, Ex. 2043 Page 11
`
`

`

`pemo May 13, 2013, 2:13 am
`
`nice thanks a lot...
`
`
`Link
`
`Ameen June 12, 2013, 9:49 am
`
`tanx 4 ur explanation.
`
`m a
`
`nand July 31, 2013, 12:43 am
`
`very good to understand
`
`m b
`
`rig (retd) ashwani sharma August 20, 2013, 9:47 am
`
`An extremely clear, concise and lucid explanation of TCP/IP.
`Great effort. Keep it up.
`
`Best Wishes
`
`Link
`
`hana September 2, 2013, 12:05 am
`
`good understand
`thanks
`
`Link
`
`khanabusd Scptcmbcr 28, 2013, 6:00 am
`
`very helpful ....................................
`
`
`Link
`
`zug October 16, 2013, 10:29 pm
`
`We’ll written in a language that I find easy to read and understand, Thank you.
`
`Link
`
`ALA11353487
`
`Alacritech, Ex. 2043 Page 12
`
`Alacritech, Ex. 2043 Page 12
`
`

`

`o
`
`justauser October 27, 2013, 2:41 pm
`
`great article! the perfect balance of details and general View 1
`thanks!
`
`Lnk
`
`. maurice November 7, 2013, 2:51 am
`
`it very helpful ....... in simple language
`
`mk
`
`.
`
`jaeo November 8, 2013, 9:00 pm
`
`Thank u
`
`u manage to save me
`as i don’t yet have a text book to read
`this gave light into my understanding of TCP/IP im able to
`peruse my dreams U
`
`Link
`
`0 Mehbub November 19, 2013, 6:00 am
`
`very good explanation,u save me also ............................thank u vry much
`
`
`Link
`
`.
`
`arun mehta December 8, 2013, 8:28 pm
`
`thanks
`
`Link
`
`. Mintu Krishna December 12, 2013, 12:09 pm
`
`very nice, in short & informative explanation. Useful for those who have keen interest in
`lntemet.
`Thanks a lot.
`
`
`Link
`
`0 Ben January 24, 2014, 5:57 am
`
`
`I found this very useful! Thank you very much I
`
`ALA11353488
`
`Alacritech, Ex. 2043 Page 13
`
`Alacritech, Ex. 2043 Page 13
`
`

`

`fl
`
`. Karm Nath February 12, 2014, 3:23 am
`
`good explanation .......
`
`m
`
`.
`
`joe March 19, 2014, 2:22 am
`
`thanks for this articlc, Quite good.
`
`Link
`
`0
`
`amar March 24, 2014, 3:15 am
`
`Hi,
`Explanations are very easy to read and understand. I would like to know more depth
`about encapsulation and decapsulation process of pkts in source side and destination side.
`
`Thanks
`
`Link
`
`0
`
`kamal April 9, 2014, 9:29 am
`
`I really found useful article coz. . .before the exam usually I don’t read the book I just
`look and search the info. . .in the net. . ..
`
`m
`
`.
`
`raVi June 5, 2014, 6:25 am
`
`short n sweet 1
`
`fl
`
`-
`
`kul sidhu June 10,2014, 8:11 am
`
`P12 give difference between osi and tcp/ip with diagram
`
`Link
`
`- Asamoah Apau Daniel August 21, 2014, 6:55 am
`
`ALA11353489
`
`Alacritech, Ex. 2043 Page 14
`
`Alacritech, Ex. 2043 Page 14
`
`

`

`1. what is a transport protocol?
`a. explain with diagrams different between TCP and UDP
`2. Explain secure Protocol
`a. explain with diagrams different between FTP and SSH
`
`Link
`
`Anonymous October 22, 2014, 1:43 am
`
`Clearly explained
`
`Link
`
`Nasham November 24, 2014, 12:15 pm
`
`It very education tanks a lot
`
`Link
`
`lNADRAIEET KUMAR VERMA December 21, 2014, 9:45 pm
`
`Very good explanation !!!
`Keep writing.
`
`m A
`
`run May 16, 2015, 7:00 am
`
`vrh well explained in simple langu
`
`m A
`
`run May 16, 2015, 7:01 am
`
`thanks all
`
`m Z
`
`ubair Khalid May 25, 2015, 6:18 am
`
`well explained sir!
`
`most of my confusion is gone and my concepts are clear now. Thank your very much
`
`Link
`
`ALA11353490
`
`Alacritech, Ex. 2043 Page 15
`
`Alacritech, Ex. 2043 Page 15
`
`

`

`RVT May 25, 2015, 10:22 am
`
`Can you compare Modbus TCP and IEC 61850? What are the advantages and
`disadvantages between these two communication protocols?
`
`Lnk
`
`jagrati sharma June 3, 2015, 8:25 pm
`
`dear friend thanks a lot 11 helped me to understand .thanksV.
`
`m D
`
`anish June 7, 2015, 1:22 am
`
`awesome article. I had a 3 hour class yesterday but I learned more clearly from this
`article than I did in that class. So thanks a lot.. really appreciated”
`
`
`Link
`
`Hum Tum!! June 8,2015, 1:23 pm
`
`Can u just tell me the order of osi layer.
`
`1 > 7 or 7 <1 which 1 is correct?
`
`m V
`
`ignesh July 3, 2015, 4:25 am
`
`any possibility to increase the TCP/IP ports more than 65355.
`
`m A
`
`ravind Reddy Solipuram August 21, 2015, 11:11 pm
`
`vcry informativc.thanks a lot
`
`Link
`
`majulaliefAugust 23, 2015, 8:31 am
`
`Nice and clearly explained
`
`Link
`
`gopi September 14, 2015, 11:20 am
`
`ALA11353491
`
`Alacritech, Ex. 2043 Page 16
`
`Alacritech, Ex. 2043 Page 16
`
`

`

`I like this article. Now 1 undrstnd hw data is tmsfr through layer. Thnxxx
`
`Link
`
`Mitravinda September 23, 2015, 12:20 am
`
`The intemet model or TCP/IP reference model specifically applies to intemet worked
`systems, and has 4 layers. The movement of data packets across a network would be
`managed by which layer?
`A) The link layer
`B) The (inter) network layer
`C) The transport layer
`D) The application layer
`
`Link
`
`Abdul Mohsin December 30, 2015, 3:21 am
`
`Very nice explanation .ThankYou.
`
`Link
`
`Prakash January 25, 2016, 3: 10 am
`
`nicc details on TCP/IP basics.
`
`Link
`
`Carol February 18, 2016, 12:27 pm
`
`Thanks for the short cut TCP/IP lesson. I’m a bit of a hack with interoperability. Helped
`me to understand where to look when I’m stuck. Well done!
`
`fl
`
`DONA DILIGA DUKU March 17, 2016, 12:55 am
`
`very interesting. Thanks alot
`
`fl
`
`Mark Aguilar December 25, 2016, 11:26 pm
`
`Very informative and an excellent refresher.
`
`Link
`
`ALA11353492
`
`Alacritech, Ex. 2043 Page 17
`
`Alacritech, Ex. 2043 Page 17
`
`

`

`o
`
`basavaraj P April 20, 2017, 1:00 am
`
`nice explanation man, many thanks
`
`Link
`
`Cancel re 1
`
`Leave a Comment
`
`Top of Form
`
` Comment
`
`‘J
`
`§ubmit
`
`aa17cOcdff
`
`[— Notify me of followup comments Via e-mail
`
`151
`
`Bottom of Form
`
`Next post: Connect with The Geek Stuff
`
`
`Previous post: 20 OpenOffice Calc Spreadsheet Tips and Tricks
`
`RSS | Email
`
`| Twitter | Facebook | Google+
`
`Top of Form
`
`ALA11353493
`
`Alacritech, Ex. 2043 Page 18
`
`Alacritech, Ex. 2043 Page 18
`
`

`

`00566676360612]
`
`FORIDZ10
`
`I UTF78
`
`l
`Bottom of Form
`
`§earch
`
`EBOOKS
`
`
`BEE! Linux 101 Hacks 2nd Edition eBook - Practical Examples to Build a Strong
`Foundation in Linux
`
`Bash 101 Hacks eBook - Take Control of Your Bash Command Line and Shell Scripting
`
`Sed and Awk 101 Hacks eBook — Enhance Your UNIX / Linux Life with Sed and Awk
`
`Vim 101 Hacks eBook - Practical Examples for Becoming Fast and Productive in Vim
`Editor
`
`Nagios Core 3 eBook - Monitor Everything, Be Proactive, and Sleep Well
`
`POPULAR POSTS
`
`15 Essential Accessories for Your Nikon or Canon DSLR Camera
`
`12 Amazing and Essential Linux Books To Enrich Your Brain and Library
`
`50 UNIX / Linux Sysadmin Tutorials
`50 Most Frequently Used UNIX / Linux Commands (With Examples)
`How To Be Productive and Get Things Done Using GTD
`
`30 Things To Do When you are Bored and have a Computer
`Linux Directog Structure (File System Structure! Explained with Examples
`
`Linux Crontab: 15 Awesome Cron Job Examples
`Get a Grip on the Grep! — 15 Practical Grep Command Examples
`
`Unix LS Command: 15 Practical Examples
`
`15 Examples To Master Linux Command Line History
`Top 10 Open Source Bug Tracking System
`Vi and Vim Macro Tutorial: How To Record and Play
`
`Mommy. I found it! -- 15 Practical Linux Find Ceimnand Examples
`
`15 Awesome Gmail Tips and Tricks
`15 Awesome Google Search Tips and Tricks
`
`RAID 0, RAID 1, RAID 5, RAID 10 Explained with Diagrams
`
`Can You Top This? 15 Practical Linux Top Command Examples
`
`Top 5 Best System Monitoring Tools
`
`Top 5 Best Linux OS Distributions
`How To Monitor Remote Linux Host using Nagios 3.0
`
`Awk Introduction Tutorial — 7 Awk Print Examples
`How to Backup Linux? 15 rsyne Command Examples
`The Ultimate Wget Download Guide With 15 Awesome Examples
`Top 5 Best Linux Text Editors
`
`Packet Analyzer: 15 TCPDUMP Command Examples
`The Ultimate Bash Array Tutorial with 15 Examples
`3 Steps to Perform SSH Login Without Password Using ssh—keygen & ssh—copy—id
`Unix Sed Tutorial: Advanced Sed Substitution Examples
`
`ALA11353494
`
`Alacritech, Ex. 2043 Page 19
`
`Alacritech, Ex. 2043 Page 19
`
`

`

`
`UNIX / Linux: 10 Netstat Command Examples
`
`The Ultimate Guide for Creating Strong Passwords
`
`6 Steps to Secure Your Home Wireless Network
`Turbocharge PuTTY with 12 Powerful Add—Ons
`
`CATEGORIES
`
`Linux Tutorials
`
`M S
`
`ed Scripting
`Awk Scripting
`Bash Shell Scripting
`Nagios Monitoring
`OpenS SH
`IPTables Firewall
`
`Apache Web Server
`Mysg 2L Database
`Perl Programming
`Google Tutorials
`Ubuntu Tutorials
`
`Postgresg 2L DB
`Hello World Examples
`C Programming
`mg
`DELL Server Tutorials
`Oracle Database
`VMware Tutorials
`
`About The Geek Stuff
`
` q
`
`r
`jMy name is Ramesh Natarajan. I will be posting instruction guides, how-to,
`troubleshooting tips and tricks on Linux, database, hardware, security and web. My focus is to
`
`write articles that will either teach you or help you resolve a problem. Read more about Ramesh
`Natarajan and the blog.
`
`Contact Us
`
`Email Me : Use this Contact Form to get in touch me with your comments, questions or
`suggestions about this site. You can also simply drop me a line to say hello!.
`
`ALA11353495
`
`Alacritech, Ex. 2043 Page 20
`
`Alacritech, Ex. 2043 Page 20
`
`

`

`Follow us on Google+
`
`Follow us on Twitter
`
`Become a fan on Facebook
`
`Support Us
`
`Support this blo g by purchasing one of my ebooks.
`
`Bash 101 Hacks eBook
`
`Sed and Awk 101 Hacks eBook
`
`Vim 101 Hacks cBook
`
`Nagios Core 3 cBook
`
`Copyright © 2008—2017 Ramesh Natarajan. All rights reserved | Terms of Service
`
`<style type="text/css" scoped>.menu { display: block; }</style>
`
`ALA11353496
`
`Alacritech, Ex. 2043 Page 21
`
`Alacritech, Ex. 2043 Page 21
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket