throbber
Cisco SYSTEMS
`
`
`
`Computer Networking
`Essentials
`
`An essential guide to understanding networking
`theory, implementation, and interoperability
`
`Facebook's Exhibit No. 1008/1108
`Page 1
`
`Facebook's Exhibit No. 1008/1108
`Page 1
`
`

`

`; Computer Networking Essentials
`DebraLittlejohn Shinder
`
`CiscoPress
`o
`Cisco Press —
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`
`Facebook's Exhibit No. 1008/1108
`Page 2
`
`Facebook's Exhibit No. 1008/1108
`Page 2
`
`

`

`
`
`Computer Networking Essentials
`Debra Littlejohn Shinder
`Copyright © 2002 Cisco Systems, Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
`written permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 34567890
`Third Printing
`January 2002
`Library of Congress Cataloging-in-Publication Number: 2001090429
`ISBN: 1-58713-038-6
`
`Trademark Acknowledgments
`All terms mentionedin this book that are known to be trademarksor service marks have been appropriately capital-
`ized. Cisco Press or Cisco Systems, Inc., cannotattest to the accuracy of this information. Use of a term in this book
`should not be regardedas affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This bookis designed to provide information about basic networking and operating system technologies. Every
`effort has been madeto make this book as complete and as accurate as possible, but no warranty orfitness is
`implied.
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems,Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damagesarising from the information
`contained in this book or from the use ofthe discs or programs that may accompany it.
`The opinions expressed in this book belongto the authorand are not necessarily those of Cisco Systems,Inc.
`
`Feedback Information
`At Cisco Press, our goalis to create in-depth technical books of the highest quality and value. Each bookis crafted
`with care andprecision, undergoing rigorous development that involves the unique expertise of members from the
`professional technical community.
`Readers’ feedbackis a natural continuation of this process. If you have any comments regarding how we could
`improvethe quality of this book or otherwisealter it to better suit your needs, you can contact us through e-mail at
`feedback@ciscopress.com. Please make sure to include the booktitle and ISBN in your message.
`Wegreatly appreciate yourassistance.
`
`Facebook's Exhibit No. 1008/1108
`Page 3
`
`Facebook's Exhibit No. 1008/1108
`Page 3
`
`

`

`
`
`Publisher
`Editor-in-Chief
`Executive Editor
`Cisco Systems Management
`
`Production Manager
`DevelopmentEditor
`Senior Editor
`Copy Editor
`Technical Editor
`Reviewers
`
`Associate Editor
`Cover Designer
`Composition
`Indexer
`
`John Wait
`John Kane
`Carl Lindholm
`Michael Hakkert
`Tom Geitner
`William Warren
`Patrick Kanouse
`Kitty Wilson Jarrett
`Jennifer Chisholm
`Jill Batistick
`Dr. Thomas W.Shinder
`Lynn Bloomer
`Wayne Jarvimaki
`Michael R. Hanson
`Shannon Gross
`Louisa Klucznik
`Steve Gifford
`Tim Wright
`
`Cisco SYSTEMS
`
`Corporate Headquarters
`Cisco Systems,Inc.
`170 West Tasman Drive
`San Jose, CA 95134-1706
`USA
`http://www.cisco.com
`Tel:
`408 526-4000
`800 553-NETS (6387)
`Fax: 408 526-4100
`
`European Headquarters
`Cisco Systems Europe
`11 Rue Camille Desmoulins
`92782 Issy-les-Moulineaux
`Cedex 9
`France
`http://www-europe.cisco.com
`Tel:
`33 158 04 60 00
`Fax: 33 158 046100
`
`'@
`
`Americas Headquarters
`Cisco Systems, Inc.
`170 West Tasman Drive
`San Jose, CA 95134-1706
`USA
`http://www.cisco.com
`Tel: 408 526-7660
`Fax: 408 527-0883
`
`Asia Pacific Headquarters
`Cisco Systems Australia, Pty.,
`Ltd
`Level 17, 99 Walker Street
`North Sydney
`NSW 2059 Australia
`http://www.cisco.com
`Tel: +61 2 8448 7100
`Fax: +61 2 9957 4350
`
`Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbersare listed on the
`Cisco Website at www.cisco.com/go/offices
`Argentina * Australia * Austria * Belgium * Brazil
`+ Bulgaria + Canada * Chile * China » Colombia * Costa Rica *
`Croatia * Czech Republic » Denmark * Dubai, UAE * Finland « France
`« Germany * Greece * Hong Kong * Hungary ¢
`India * Indonesia « Ireland + Israel
`* Italy + Japan + Korea * Luxembourg * Malaysia * Mexico * The Netherlands « New
`Zealand * Norway * Peru * Philippines * Poland « Portugal
`« Puerto Rico + Romania * Russia * Saudi Arabia * Scotland
`* Singapore * Slovakia * Slovenia + South Africa ¢ Spain » Sweden ¢ Switzerland * Taiwan + Thailand * Turkey * Ukraine
`* United Kingdom * United States * Venezuela * Vietnam * Zimbabwe
`
`Copyright © 2001, Cisco Systems,Inc. All rights reserved. Access Registrar, AccessPath, Are You Ready, ATM Director, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA,
`CCNP, CCSI, CD-PAC, CiscoLink, the Cisco NetWorks logo,the Cisco Powered Network logo, Cisco Systems Networking Academy, Fast Step, FireRunner, Follow Me Browsing,
`FormShare, GigaStack, IGX,Intelligence in the Optical Core, Internet Quotient, IP/VC, iQ Breakthrough, iQ Expertise, iQ FastTrack, iQuick Study, iQ Readiness Scorecard, The
`iQ Logo, Kernel Proxy, MGX, Natural Network Viewer, Network Registrar, the Networkers logo, Packet, PIX, Point and Click Internetworking, Policy Builder, RateMUX,
`ReyMaster, ReyView, ScriptShare, Secure Script, Shop with Me, SlideCast, SMARTnet, SVX, TrafficDirector, TransPath, VlanDirector, Voice LAN, Wavelength Router,
`Workgroup Director, and Workgroup Stack are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Empowering the Internet Generation, are
`service marks of Cisco Systems,Inc.; and Aironet, ASIST, BPX, Catalyst, Cisco, the Cisco Certified Internetwork Expert Logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco
`Systems, Cisco Systems Capital, the Cisco Systems logo, Collision Free, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub,Fastlink, FastPAD,IOS, IP/TV,IPX, LightStream,
`LightSwitch, MICA, NetRanger, Post-Routing, Pre-Routing, Registrar, StrataView Plus, Stratm, SwitchProbe, TeleRouter, are registered trademarks of Cisco Systems, Inc. or its
`affiliates in the U.S. and certain other countries.
`All otherbrands, names,or trademarks mentioned in this document or Web site are the property oftheir respective owners. The use of the word partner does not imply a partnership
`relationship between Cisco and any other company. (0010R)
`
`Facebook's Exhibit No. 1008/1108
`Page 4
`
`Facebook's Exhibit No. 1008/1108
`Page 4
`
`

`

`xxii
`
`
`Introduction
`Computer Networking Essentials helps you understand the fundamentals of computer networking concepts and
`implementation and introduces youto the client and server operating systems that run on networked PCs.
`Concepts covered in this book include the history of networking, networking terminology, networking theory and
`established standards, and implementation of local-area and wide-area networks. Special emphasis is placed on
`understanding network protocols and how they operateatall layers of the networking model. Emphasisalso is
`placed on the interoperability of networks that run on multiple protocols, platforms, and operating systems.
`Specialty areas such as security, remote access, virtual private networking, thin client networking, monitoring, man-
`agement, and troubleshooting are covered thoroughly. Emerging technologies that are expected to impact the future
`of networking are also introduced.
`
`WhoShould Read This Book
`This book’s primary audienceis professionals who are beginning training in the networking industry and those who
`need a review of basic concepts.
`The secondary audience includes corporate training faculties and staff and members of the business world who
`work with information technology personnel and require a broad overview ofthe concepts involved in networking
`from the small business to the enterprise-level corporation.
`A third target audienceis the general user who wants to know more about how computers communicate over net-
`works. The book’s approachis designedto be user-friendly and accessible to the non-technical reader whois
`overwhelmed by the jargon found in vendor documentation andtechnical manuals.
`
`This Book’s Organization
`This bookis organized into four parts and includes 19 chapters, an appendix,and a glossary. The following sections
`describe the contents of each part of the book.
`
`PartI: Introduction to Networking Concepts
`Chapter 1, “Introduction to PC Networking,” introduces you to the basic concepts of PC networking by providing a
`brief history of electronic communications and networking and a summary of where PC networkingis today.
`Chapter2, “Categorizing Networks,” discusses the categorization of networks according to physical scope, admin-
`istrative model, network operating system, protocols in use, topology, and architecture.
`Chapter 3, “Networking Concepts, Models, and Standards,” provides an overview of binary communications and
`introduces two popular networking models: the Department of Defense (DoD) model on which the TCP/IP proto-
`cols are based and the Open Systems Interconnection (OSI) model, which was developed by the International Orga-
`nization for Standardization (ISO). Specifications set forth by the Institute of Electrical and Electronics Engineers
`(IEEE) and vendor-specific models are also covered.
`Chapter4, “Networking Communications Methods,”discusses signaling methods and provides an understanding of
`analog, digital, broadband, baseband, asynchronous, synchronous, simplex, duplex, and multiplexed signaling.
`Media access methods are described, including CSMA/CD, CSMA/CA,token passing, and demandpriority.
`Chapter 5, “LANLinks,” discusses popular LAN types, including Ethernet, Token Ring, FDDI, AppleTalk, and
`ARCnet.
`Chapter 6, “WAN Links,” provides an overview of WANconnections such as PSTN, ISDN,t-carriers, Frame Relay,
`X.25, and CATV network, as well as high-speed connectivity solutions such as ATM, SONET,and SMDS. This
`
`Facebook's Exhibit No. 1008/1108
`Page 5
`
`Facebook's Exhibit No. 1008/1108
`Page 5
`
`

`

`xxiii
`
`
`chapter also covers LAN-to-WANconnection solutions, including Internet Connection Sharing (ICS), Network
`Address Translation (NAT), proxy servers, and routed connections.
`
`Part II: Networking Hardware and Software
`Chapter 7, “Physical Components of the Network,” introduces students to the many types of networking media,
`including coax, twisted-pair cable, and fiber-optic cable, as well as to wireless technologies such aslaser, infrared,
`radio, and satellite/microwave communications. Connectivity devices such as repeaters, hubs, bridges, routers, and
`switchesare also discussed.
`
`Chapter8, “Networking Protocols and Services,” describes common LAN protocols—TCP/IP, NetBEUI, IPX/
`SPX—and discusses the OSI protocol suite. PPP and SLIP, which are WANlink protocols, and PPTP and L2TP,
`which are common tunneling protocols, are also presented.
`Chapter 9, “The Widest Area Network: The GlobalInternet,” discusses the evolution of the Internet, the protocols
`used for Internet communications—HTTP, FTP, NNTP, SMTP, and POP—and the TCP/IP protocolsuite.
`Chapter 10, “Network Operating Systems,” discusses general network administration practices and then looksat the
`specifics of commonserver operating systems, including Windows NT, Windows 2000, NetWare, UNIX, and Linux.
`Chapter 11, “Directory Services,” describes the Directory Services Protocol (DAP) and the Lightweight Directory
`Access Protocol (LDAP), as well as the X.500 standards developed by the ISO to promote directory services com-
`patibility and interoperability. Novell’s NDS, Microsoft’s Active Directory, and Banyan VINES’ StreetTalk direc-
`tory services are covered in some depth.
`Chapter 12, “Desktop Operating Systems,” looksat the client side of the client/server network and discusses the
`advantages and disadvantages of common desktopclients, such as DOS, Windows, Linux, Macintosh, and OS/2,
`and how each can be integrated into popular NOS environments.
`Chapter 13, “Hybrid Networks,” provides information about interoperability solutions and protocol gateways that
`allow PCs running different operating systems, protocols, and platforms to communicate with one another. This
`chapteralso looks at PC-to-mainframe communications using Systems Network Architecture (SNA) solutions.
`
`Part III: Network Specialty Areas
`Chapter 14, “Protecting the Network,” addresses security issues and provides an overview of basic cryptography
`concepts, public and private key encryption, certificate services, firewalls and proxies, and internal security mea-
`sures such as “smart cards” and advanced authentication technologies.It also provides guidance for developing
`security policies for your network. The secondhalf of the chapter discusses disaster recovery plans, including
`implementation of disk fault tolerance (or RAID), regular scheduled backups, and server
`clustering.
`Chapter 15, “Remote Access,” discusses methods of connecting to a server from a remotelocation using remote
`connectivity devices such as modems, ISDN terminal adapters, and customer premises equipment (CPE) for dedi-
`cated lines. Dial-in server configuration and special security considerations are also covered.
`Chapter 16, “Virtual Private Networking,” provides an overview of VPN concepts and discussesthe tunneling pro-
`tocols used to provide VPN security.
`Chapter 17, “Thin Client Networking,” discusses Network Computers, Net PCs, and Windows-based terminals.
`Windowsterminal services, Citrix Metaframe, web-based computing, the X Window system and Javavirtual
`machines—andthe role each plays in thin client networking—arealso discussed.
`Chapter 18, “Monitoring, Management, and Troubleshooting Tools,” presents an introduction to the TCP/IPutilities
`and other tools built into the various operating systems. This chapter also examines commercial products such as
`Sniffer Pro, LANanalzyer, Microsoft’s Systems Management Server, Novell’s ManageWise, and IBM’sTivoli.
`
`Facebook's Exhibit No. 1008/1108
`Page 6
`
`Facebook's Exhibit No. 1008/1108
`Page 6
`
`

`

`XXxiv
`
`
`Part IV: The Future of Networking
`Chapter 19, “Tomorrow’s Technologies,” takes a look into the future of PC networking. It discusses ways of over-
`comingthe currentlimits of IP, including the new version of IP—IPv6. The goal of universal connectivity is
`addressed, and more exotic possibilities such asartificial intelligence, quantum computing, and cyberneticlife
`formsare presented as possible components of tomorrow’s networks.
`
`This Book’s Features
`This book contains several elements that help you learn about operating systems and networking:
`Figures,listings, and tables—This book containsfigures,listings, and tables that help to
`explain concepts, commands,and procedural sequences. Diagramsillustrate network layouts
`and processes, and screenshots assist students in visualization configuration procedures. In addi-
`tion,listings and tables provide summaries and comparisonsof features and characteristics.
`Author’s notes,tips, sidebars, and cautions—These elements are included to provide you
`with extra information on a subject. You will probably find these asides to be very beneficial in
`real-world implementations.
`Chapter summaries—Atthe end of each chapteris a summary of the concepts covered in the
`chapter, which provides a synopsis of the chapter and canserve as a study aid.
`Further Reading—Eachchapter includesa list of resources for additional information about
`the topics covered in the chapter, including website URLs and booksandarticles that cover the
`topic in more detail.
`Review questions—After the Further Reading section in each chapter are 10 review questions
`that serve as an end-of-chapter assessment. The questions are designed to reinforce the con-
`cepts introducedin the chapter andto help students evaluate their understanding before moving
`onto the next chapter.
`The conventionsused to present command syntax in this book are the same conventions used in the Cisco IOS
`Command Reference, as follows:
`Boldface indicates commands and keywordsthatare enteredliterally as shown. In examples
`(not syntax), boldface indicates user input (for example, a show command).
`Italics indicates arguments for which you supply values.
`Square brackets [ ] indicate optional elements.
`Vertical bars(I) separate alternative, mutually exclusive elements.
`Braces and vertical bars within square brackets—for example,[x {y | z}|—indicate a required
`choice within an optional element. You do notneedto enter what is in the brackets, but if you
`do, you have some required choices in the braces.
`
`Facebook's Exhibit No. 1008/1108
`Page 7
`
`Facebook's Exhibit No. 1008/1108
`Page 7
`
`

`

` CHAPTER
`
`Introduction to PC Networking
`
`
`
`Welcometo the world of personal computer (PC) networking.In this world,it is no longer
`enough to simply have and use PCs; todayit is imperative that you also “get connected.”
`The real power and usability of PCs becomes apparent only when they are linked so that
`they can communicate with one another. From the simple two-computer homeor small
`office local-area network (LAN)to the ever-growing global Internet, networkingis the
`future of computing, and that future is here today.
`
`In manyareas of the United States, the demandfor trained networking professionals far
`exceeds the supply. According to projections of the U.S. Department of Labor, computer
`networking as an occupation has a bright future. Businesses and individuals are buying
`PCs, and those computers are linking within LANs and wide-area networks (WANs)at an
`astonishing pace. We literally are “networking the world.”
`
`Because network communications is quickly becoming a part of ourlives, even those not
`directly involved in the information technology (IT) industry should know something about
`the basics of networking. Just as it would be difficult to function in today’s world if you
`knew nothing about a telephoneandits features, in the not-too-distant future, knowing how
`to “get on the network” will be a requirement for many individuals, both at work and at
`home.
`
`
`
`
`
`ABrie History of PC Networking
`
`The desire to communicate with others is a driving force among human beings, and the
`sophisticated means we have developed to communicate sets us apart from other species.
`From the momentit became possible to link two computers and get them to talk to one
`another, the concept of the Internet was inevitable.
`
`In the early days of computing, computers were enormous machinesthatfilled entire
`rooms—sometimes entire city blocks—and cost hundreds of thousandsof dollars.
`Although these expensive behemoths had less processing power and memory than today’s
`tiny handheld computers, they were state-of-the-art technology in the 1950s and 1960s. In
`a world in which human beings who were slow and prone to error had done calculations
`manually, the capabilities of the computer were amazing.
`
`Facebook's Exhibit No. 1008/1108
`Page 8
`
`Facebook's Exhibit No. 1008/1108
`Page 8
`
`

`

`Chapter 1: Introduction to PC Networking
`6
`
`
`At the midpoint of the twentieth century, computers were still rare, exotic, mysterious
`machines ownedonly by large companies, governmental bodies, and educational
`institutions. For the most part, computers were standalone systems, isolated from one
`another.
`In the 1940s, Thomas Watson, the chairman of IBM,said that a market existed in the world
`for approximately five computers. Even as recently as 1977, Ken Olson,presidentofDigital
`Equipment Corporation,said, “There is no reason anyone would want a computer in their
`home” (ISBC[International Small Business Consortium], www.isbc.com/isbe/business/
`wisdom.cfm). Of course, both have been proven not just wrong, but very wrong. However,
`no one would havepredicted, even a decade ago, that PCs wouldproliferate as they have or
`that computer networking would become a mainstream topic.
`
`The First Communications Networks
`By the mid-1900s,electronic communications had been aroundfor over a century and was
`being implemented in both Europe andthe United States. These early networks took many
`formsand sent only codedsignals. They later became capable of sending voice across the
`wire.
`This section provides a roughtime line of how thefirst networks were developed.
`
`Telegraph Cables
`In the early 1800s, the French developedthefirst optical telegraph network, which sent
`information at the blazing speed of 20 characters per second, and Samuel Morse
`demonstratedtheelectrical telegraph, which spurred the developmentof networked
`communications in the United States.
`
`The Telephone Network: Circuit-Switching Technology
`In the late 1800s, a vast telephone network began to be built. Technology leaders of the day,
`however, were no morefarsighted than those of the early computer age. In 1876 an internal
`memoat Western Unionstated that “This ’telephone’ has too many shortcomings to be
`seriously considered as a meansof communication. The device is inherently of no value to
`us” (www.isbc.com/isbc/business/wisdom.cfm).
`Despite thatattitude, there were more than 50,000 telephonelinesin the U.S. by 1880, and
`by 1960, telephone lines covered urbanareas, and the telephone network became a global
`communications network.
`A telephone system uses circuit-switching technology,in which a circuit, or virtual
`pathway,is established when onetelephone connects to another on a network. This works
`
`Facebook's Exhibit No. 1008/1108
`Page 9
`
`Facebook's Exhibit No. 1008/1108
`Page 9
`
`

`

`
`
` A Brief History of PC Networking 7
`
`Figure 1-1
`
`well for voice transmission because the sounds being transferred over the wire flow at a
`relatively constantrate.
`
`In a circuit-switched network, a connection is established, as shown in Figure 1-1. All
`signals are passed overthis circuit for the duration of the session. If you disconnect and
`reconnect, a different circuit can be used, as represented by the dottedline.
`
`In a circuit-switched network, a connection is established, as represented by the solid line.
`
`
`
`The technology works less well for transfer of computer data, which has a tendency to be
`sent in bursts; that is, periods of high activity are interspersed with intervals of low activity
`or inactivity.
`
`Packet-Switching Technology
`During the 1960s, the U.S. government becameinterested in developing a computer
`network that would enable systemsat military installations and major educational
`institutions to communicate with one another. Because this was during the middle of the
`Cold War, they wanted the network to have robustness, reliability, and redundancyso that
`the network would survive a nuclear war.
`
`Researchers working at the Massachusetts Institute of Technology (MIT), the RAND
`Institute, and the National Physical Laboratory (NPL) in England invented a new
`technology called packet switching, which worked better for bursty transmissions than did
`the traditional circuit-switching technologies. Their work created a foundation for the
`communications technology used on the Internet today.
`
`In a packet-switched network, as shown in Figure 1-2, a connection is not established for
`the entire transmission. Instead, each individual packet of data can take a different path.
`
`Facebook's Exhibit No. 1008/1108
`Page 10
`
`Facebook's Exhibit No. 1008/1108
`Page 10
`
`

`

`8 Chapter 1: Introduction to PC Networking
`
`
`Communications from different sources can share the sameline, rather than the line being
`dedicated to one end-to-end communicationfor the duration of a session, as is the case with
`circuit switching.
`
`Figure 1-2 Networked computers share data, software, and hardware resources.
`
`
`
`Circuit Switching Versus Packet Switching
`The terms circuit switching and packet switching soundalike but have different meanings.
`Thepublic telephone system, sometimesreferredto as POTS(plain old telephone service),
`is a switched-circuit communications network. Whenyouplace a telephonecall in this type
`of network, only one physical path from your telephone to the one you’re dialing is used
`for the duration of that call. This pathway, or circuit, is maintained for your exclusive use,
`until you end the connection by hanging up your telephone.
`Note, however, that if you call the same friend at the same number tomorrow,and do so at
`the same location from which you placed today’s call, the path is not necessarily the same.
`That’s whythe circuit is referred to as switched.It also explains why you can get a clear
`connection one day and noiseandstatic on another.
`With a packet-switching network, no dedicated pathway or circuit is established. Packet
`switching is sometimesreferred to as a connectionless technology because ofthe lack of a
`dedicated pathway.If you transfer data, such as a word processing file, from your computer
`to another using a packet-switched network, each individual packet (that is, each small
`chunkof data) can take a different route. Although it all arrives at the same destination,it
`doesn’tall travel the samepath to get there. Internettraffic generally uses packet-switching
`technology.
`
`Facebook's Exhibit No. 1008/1108
`Page 11
`
`Facebook's Exhibit No. 1008/1108
`Page 11
`
`

`

`A Brief History of PC Networking
`
`9
`
`The difference between circuit and packet switching can be comparedto the different ways
`in which a large group of people traveling from Dallas to San Francisco can reach their
`destination. For example, circuit switching is similar to loading the entire group on a bus,
`a train, or an airplane. Theroute is plotted out, and the whole group travels over that same
`route.
`
`Packet switching is like having each person travel in an automobile. The group is broken
`downinto individual componentsas the data communication is broken into packets. Some
`travelers can take interstate highways, and others can use back roads. Some can drive
`straight through, and others can take a more roundaboutpath. Eventually, they all end up at
`the same destination. The group is put back together, just as packets are reassembledat the
`endpoint of the communication.
`
`The ARPAnet
`The first packet-switched computer network was conceived in the late 1960s, under the
`auspices of the U.S. Department of Defense (DoD). It was christened the ARPAnet(for
`Advanced Research Projects Agency network). The ARPAnet’s first node, or connection
`point, was installed at the University of California at Los Angeles in 1969. In just three
`years, the network spread across the United States, and two years after that, it spread to
`Europe.
`
`As the network grew,it split into two parts. The military called its part of the internetwork
`Milnet, and ARPAnet continuedto be used to describe the part of the network that
`connected research and university sites. In the 1980s the Defense Data Network (a separate
`military network) and NSFNet(a network of scientific and academic sites funded by the
`National Science Foundation) replaced ARPAnet. Eventually this WAN grew into what we
`today call the Internet.
`
`Yesterday’s Networks
`Computer networking didn’t begin on such a large scale as the ARPAnetproject; that is, the
`LANcamebefore the WAN. As computers becameless expensive and more powerful,
`businesses ofall sizes more commonly used them. Althoughthefirst machines were useful
`for only very limited types of data processing, as software developmentflourished, new
`programs enabled users to do much morethan just collect and sort data.
`
`With early mainframe systems, for instance, multiple users could access the same stored
`data from terminals, which were stations with input and output devices (for example,
`keyboards and monitors). These stations had no computing powerof their own; they were
`points from which the mainframe computer could be accessed.
`
`Using mainframes worked well in many respects, but they had several disadvantages when
`compared to smaller computers (then called microcomputers). Expense was one
`
`Facebook's Exhibit No. 1008/1108
`Page 12
`
`Facebook's Exhibit No. 1008/1108
`Page 12
`
`

`

`40 Chapter 1: Introduction to PC Networking
`
`
`disadvantage; large mainframe systemscost far more than the so-called “personal”
`computers designedto sit on a desktop and function independently.
`Another disadvantage of mainframes was the single point offailure concept. With
`mainframe computing, ifthe computer was down,it was downfor everyone. Nobody could
`access data, and nobody who depended on the computer could get any work done. The use
`of individual PCs, on the other hand, circumventedthis problem.
`PCs were full-fledged computers that ran programs and performedtasksentirely on their
`own. Theyalso provided some measure offault tolerance, whichis the capability of a
`system to continueto function and ensure data integrity when failures occur. If one
`employee’s computer crashed,it didn’t affect the capability of the rest of the employees,
`who had their own PCs, to continue working. In fact, if an employee had saved data to a
`floppy disk, he or she could move to a functioning machine and continue working.
`These factors contributed to the increased popularity of PCs as a computing solution for
`small and large businesses (and everything in between). However, once everyone had aPC
`on the desktop, companies were faced with a dilemma: How could workers share
`information as they had with the old mainframe computing model? The solution was
`networking.
`

`
`Disadvantages of Standalone Systems
`In the early days of desktop PCs, networking hardware and software were not readily
`available, and many businesses used the machinesas standalone systems.If all users
`needed to print documents on occasion, there were three possible ways to provide that
`ability:
`© A printer could be attached to each machine. This was a costly solution becauseit
`necessitated buying multiple printers, even though it was unlikely that they all would
`be in use at the same time.
`Thefile to be printed could be saved to floppy disk and transferred to a machine that
`had an attachedprinter. This was a less-expensive option, but it was an inconvenience
`both to the person whohad to go begging fora printer and to the person with the
`printer, whose work was interrupted while someone else used his or her machine to
`print.
`© A printer could be moved from one workstation to another, depending on who needed
`to print. This was a somewhat cumbersomesolution; nonetheless, it was widely
`implemented,using rolling printer carts that were wheeled aroundthe office. Each
`move required that cables be disconnected and reconnected, and sometimes, a move
`involved software reconfiguration as well.
`High cost, inconvenience, and extra work are the primary disadvantages of standalone, or
`non-networked, solutions.
`
`Facebook's Exhibit No. 1008/1108
`Page 13
`
`Facebook's Exhibit No. 1008/1108
`Page 13
`
`

`

`11
`A Brief History of PC Networking
`
`
`What Is a Network, Anyway?
`The American Heritage Dictionary defines a network as “a system of lines or channels that
`cross or interconnect.” Earlier we mentioned the telegraph and telephone networks, and of
`course, we’ve all heard references to the television networks. Using the dictionary
`definition, we can call even the state highway system, or the railways that crisscross the
`country, a network.
`That being said, what is a computer network? Simply,it is two or more devices linked for
`the purpose of sharing information, resources, or both. The link can be through cable
`(coaxial, twisted-pair, or fiber optics, as you’ll learn later in this chapter), or it can be a
`wireless connectionthat uses radio signals, laser or infrared technology, orsatellite
`transmission. The information and resources shared can bedatafiles, application programs,
`printers, modems,or other hardware devices. See Figure 1-3 for anillustration.
`
`Figure 1-3=This time line shows significant events in PC networkinghistory.
`
`ny
`
`Workstation
`
`Workstation
`
`Workstation
`
`Server
`
`
`
`Printers
`
`Files Applications Modems
`
`Scanners
`
`Why Network Computers?
`If the advantage of PCs were each user having an independent computer, why would we
`want to turn around and link them again? We link them because networked PCsgive us, in
`many ways, the best of both worlds. Each user has independentprocessing power,butstill
`can enjoyall the benefits of sharing. On the other hand, a companyseesa significant cost
`savings when expensive, occasionally used peripherals are shared over the network. For
`example, an expensive colorlaser printer might be used only for special projects, yet many
`
`Facebook's Exhibit No. 1008/1108
`Page 14
`
`Facebook's Exhibit No. 1008/1108
`Page 14
`
`

`

`Chapter1: Introduction to PC Networking
`42
`
`
`different members of t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket