throbber
Clsco SYSTEMS
`
`
`
`Computer Networking
`Essentials
`
`An essential guide to understanding networking
`theory, implementation, and interoperability
`
`Facebook's Exhibit No. 1008/1108
`
`Page 1
`
`Facebook's Exhibit No. 1008/1108
`Page 1
`
`

`

`Computer Networking Essentials
`
`DEbt‘yaiL‘ititflejohn Shinder
`
`Cisco: Press
`
`r
`Cisco Press L
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`
`Facebook's Exhibit No. 1008/1108
`
`Page 2
`
`Facebook's Exhibit No. 1008/1108
`Page 2
`
`

`

`
`
`Computer Networking Essentials
`Debra Littlejohn Shinder
`
`Copyright © 2002 Cisco Systems, Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
`written permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 3 4 5 6 7 8 9 0
`
`Third Printing
`January 2002
`Library of Congress Cataloging—in-Publication Number: 2001090429
`ISBN: l-587l3~038—6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capita1~
`ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
`implied.
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`contained in this book or from the use of the discs or programs that may accompany it.
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`Feedback Information
`At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted
`with care and precision, undergoing rigorous development that involves the unique expertise of members from the
`professional technical community.
`Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could
`improve the quality of this book or otherwise alter it to better suit your needs, you can contact us through e—mail at
`feedback@ciscopress.com. Please make sure to include the book title and ISBN in your message.
`
`We greatly appreciate your assistance.
`
`Facebook's Exhibit No. 1008/1108
`
`Page 3
`
`Facebook's Exhibit No. 1008/1108
`Page 3
`
`

`

`
`
`Publisher
`Editor-in-Chief
`Executive Editor
`Cisco Systems Management
`
`Production Manager
`Development Editor
`Senior Editor
`Copy Editor
`Technical Editor
`Reviewers
`
`Associate Editor
`Cover Designer
`Composition
`Indexer
`
`John Wait
`John Kane
`Carl Lindholm
`Michael Hakkert
`Tom Geitner
`William Warren
`
`Patrick Kanouse
`Kitty Wilson Jairett
`Jennifer Chisholm
`Jill Batistick
`Dr. Thomas W. Shinder
`Lynn Bloomer
`Wayne Jarvimaki
`Michael R. Hanson
`
`Shannon Gross
`Louisa Klucznik
`Steve Gifford
`Tim Wright
`
`CISCO SYSTEMS
`
`Corporate Headquarters
`Cisco Systems, Inc.
`170 West Tasman Drive
`San Jose, CA 95134—1706
`USA
`http://www.cisco.com
`Tel: 408 526-4000
`800 553—NETS (6387)
`Fax: 408 526—4100
`
`M®
`European Headquarters
`Americas Headquarters
`Cisco Systems Europe
`Cisco Systems, Inc.
`11 Rue Camille Desmoulins
`170 West Tasman Drive
`92782 Issy-les-Moulineaux
`San Jose, CA 95134-1706
`Cedex 9
`USA
`France
`http://www.cisco.com
`http://www-europe.cisco.com
`Tel: 408 526—7660
`Tel:
`33 l 58 04 6O 00
`Fax: 408 527-0883
`Fax: 33 l 58 04 61 00
`
`Asia Pacific Headquarters
`Cisco Systems Australia, Pty.,
`Ltd
`Level 17, 99 Walker Street
`North Sydney
`NSW 2059 Australia
`http://www.cisco.com
`Tel: +61 2 8448 7100
`Fax: +61 2 9957 4350
`
`Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on the
`Cisco Web site at www.cisco.com/go/oftices
`
`- Bulgaria - Canada - Chile - China - Colombia - Costa Rica -
`Argentina - Australia - Austria - Belgium - Brazil
`Croatia ' Czech Republic - Denmark - Dubai, UAE ' Finland - France
`- Germany - Greece - Hong Kong - Hungary 0
`India - Indonesia - Ireland - Israel
`- Italy - Japan - Korea ' Luxembourg - Malaysia - Mexico - The Netherlands - New
`Zealand - Norway - Peru - Philippines - Poland - Portugal
`‘ Puerto Rico - Romania - Russia - Saudi Arabia - Scotland
`~ Singapore ' Slovakia - Slovenia - South Africa - Spain ' Sweden - Switzerland - Taiwan - Thailand - Turkey - Ukraine
`- United Kingdom - United States 0 Venezuela . Vietnam - Zimbabwe
`
`Copyright © 2001, Cisco Systems, Inc, All rights reserved. Access Registrar, AccessPath, Are You Ready, ATM Director, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA,
`CCNP, CCSI, CD~PAC, CiscoLink, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Networking Academy. Fast Step, FireRunner, Follow Me Browsing,
`FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet Quotient, lP/VC, iQ Breakthrough, iQ Expertise, iQ Fast'l‘rack, iQuick Study. iQ Readiness Scorecard, The
`iQ Logo, Kernel Proxy. MGX, Natural Network Viewer, Network Registrar, the Networkers logo, Packel, P1X, Point and Click lntcrnetworking, Policy Builder, RateMUXv
`ReyMaster, ReyView, ScriptSharc. Secure Script, Shop with Me, SlideCast, SMARTnet, SVX, TrafficDirector, TransPath, VlanDirector, Voice LAN, Wavelength Router,
`Workgroup Director, and Workgroup Stack are trademarks of Cisco Systems, Inc: Changing the Way We Work, Live, Play. and Learn, Empowering the Internet Generation, are
`service marks of Cisco Systems, Inc.: and Aironet. ASIST, BPX, Catalyst, Cisco, the Cisco Certified lnternetwork Expert Logo. Cisco 108, the Cisco IOS logo, Cisco Press, Cisco
`Systems, Cisco Systems Capital, the Cisco Systems logo. Collision Free. Enterprise/Solver, EtherChannel, EtherSwitch, FastHub. FastLink, FttstPAD, IOS, lP/TV, IPX, LightStream,
`LightSwitch. MICA, NetRanger, PoshRouting, Pro—Routing, Registrar, Stratthew Plus, Stratm. S\vitchProbe, TeleRouter, are registered trademarks of Cisco Systems, Inc, or its
`affiliates in the US. and certain other countries.
`
`All other brands, names, or trademarks mentioned in this document or Web site are the property of their respective owrters. The use of the word partner does not imply a partnership
`relationship between Cisco and any other company. (OOlOR)
`
`Facebook's Exhibit No. 1008/1108
`
`Page 4
`
`Facebook's Exhibit No. 1008/1108
`Page 4
`
`

`

`xxii
`
`
`Introduction
`Computer Networking Essentials helps you understand the fundamentals of computer networking concepts and
`implementation and introduces you to the client and server operating systems that run on networked PCs.
`Concepts covered in this book include the history of networking, networking terminology, networking theory and
`established standards, and implementation of local—area and wide-area networks. Special emphasis is placed on
`understanding network protocols and how they operate at all layers of the networking model. Emphasis also is
`placed on the interoperability of networks that run on multiple protocols, platforms, and operating systems.
`Specialty areas such as security, remote access, virtual private networking, thin client networking, monitoring, man~
`agement, and troubleshooting are covered thoroughly. Emerging technologies that are expected to impact the future
`of networking are also introduced.
`
`Who Should Read This Book
`This book’s primary audience is professionals who are beginning training in the networking industry and those who
`need a review of basic concepts.
`
`The secondary audience includes corporate training faculties and staff and members of the business world who
`work with information technology personnel and require a broad overview of the concepts involved in networking
`from the small business to the enterprise—level corporation.
`
`A third target audience is the general user who wants to know more about how computers communicate over net-
`works. The book’s approach is designed to be user—friendly and accessible to the non-technical reader who is
`overwhelmed by the jargon found in vendor documentation and technical manuals.
`
`This Book’s Organization
`This book is organized into four parts and includes 19 chapters, an appendix, and a glossary. The following sections
`describe the contents of each part of the book.
`
`Part I: Introduction to Networking Concepts
`
`Chapter 1, “Introduction to PC Networking,” introduces you to the basic concepts of PC networking by providing a
`brief history of electronic communications and networking and a summary of where PC networking is today.
`Chapter 2, “Categorizing Networks,” discusses the categorization of networks according to physical scope, admin—
`istrative model, network operating system, protocols in use, topology, and architecture.
`Chapter 3, “Networking Concepts, Models, and Standards,” provides an overview of binary communications and
`introduces two popular networking models: the Department of Defense (DOD) model on which the TCP/IP proto-
`cols are based and the Open Systems Interconnection (081) model, which was developed by the International Orga—
`nization for Standardization (ISO). Specifications set forth by the Institute of Electrical and Electronics Engineers
`(IEEE) and vendor—specific models are also covered.
`Chapter 4, “Networking Communications Methods,” discusses signaling methods and provides an understanding of
`analog, digital, broadband, baseband, asynchronous, synchronous, simplex, duplex, and multiplexed signaling.
`Media access methods are described, including CSMA/CD, CSMA/CA, token passing, and demand priority.
`Chapter 5, “LAN Links,” discusses popular LAN types, including Ethernet, Token Ring, FDDI, AppleTalk, and
`ARCnet.
`
`Chapter 6, “WAN Links,” provides an overview of WAN connections such as PSTN, ISDN, t—carriers, Frame Relay,
`X25, and CATV network, as well as high—speed connectivity solutions such as ATM, SONET, and SMDS. This
`
`Facebook's Exhibit No. 1008/1108
`
`Page 5
`
`Facebook's Exhibit No. 1008/1108
`Page 5
`
`

`

`xxiii
`
`
`chapter also covers LAN—to-WAN connection solutions, including Internet Connection Sharing (ICS), Network
`Address Translation (NAT), proxy servers, and routed connections.
`
`Part 11: Networking Hardware and Software
`
`Chapter 7, “Physical Components of the Network,” introduces students to the many types of networking media,
`including coax, twisted—pair cable, and fiber—optic cable, as well as to wireless technologies such as laser, infrared,
`radio, and satellite/microwave communications. Connectivity devices such as repeaters, hubs, bridges, routers, and
`switches are also discussed.
`
`Chapter 8, “Networking Protocols and Services,” describes common LAN protocols—TCP/IP, NetBEUI, IPX/
`SPX—and discusses the OSI protocol suite. PPP and SLIP, which are WAN link protocols, and PPTP and LZTP,
`which are common tunneling protocols, are also presented.
`
`Chapter 9, “The Widest Area Network: The Global Internet,” discusses the evolution of the Internet, the protocols
`used for Internet communicationsmHTTP, FTP, NNTP, SMTP, and POP—and the TCP/IP protocol suite.
`
`Chapter 10, “Network Operating Systems,” discusses general network administration practices and then looks at the
`specifics of common server operating systems, including Windows NT, Windows 2000, NetWare, UNIX, and Linux.
`
`Chapter 11, “Directory Services,” describes the Directory Services Protocol (DAP) and the Lightweight Directory
`Access Protocol (LDAP), as well as the X500 standards developed by the ISO to promote directory services com-
`patibility and interoperability. Novell’s NDS, Microsoft’s Active Directory, and Banyan VINES’ StreetTalk direc-
`tory services are covered in some depth.
`
`Chapter 12, “Desktop Operating Systems,” looks at the client side of the client/server network and discusses the
`advantages and disadvantages of common desktop clients, such as DOS, Windows, Linux, Macintosh, and 05/2,
`and how each can be integrated into popular NOS environments.
`
`Chapter 13, “Hybrid Networks,” provides information about interoperability solutions and protocol gateways that
`allow PCs running different operating systems, protocols, and platforms to communicate with one another. This
`chapter also looks at PC—to—mainfrarne communications using Systems Network Architecture (SNA) solutions.
`
`Part III: Network Specialty Areas
`
`Chapter 14, “Protecting the Network,” addresses security issues and provides an overview of basic cryptography
`concepts, public and private key encryption, certificate services, firewalls and proxies, and internal security mea-
`sures such as “smart cards” and advanced authentication technologies. It also provides guidance for developing
`security policies for your network. The second half of the chapter discusses disaster recovery plans, including
`implementation of disk fault tolerance (or RAID), regular scheduled backups, and server
`clustering.
`
`Chapter 15, “Remote Access,” discusses methods of connecting to a server from a remote location using remote
`connectivity devices such as modems, ISDN terminal adapters, and customer premises equipment (CPE) for dedi—
`cated lines. Dial-in server configuration and special security considerations are also covered.
`
`Chapter 16, “Virtual Private Networking,” provides an overview of VPN concepts and discusses the tunneling pro—
`tocols used to provide VPN security.
`
`Chapter 17, “Thin Client Networking,” discusses Network Computers, Net PCs, and Windows-based terminals.
`Windows terminal services, Citrix Metaframe, web-based computing, the X Window system and Java virtual
`machines—and the role each plays in thin client networking—are also discussed.
`
`Chapter 18, “Monitoring, Management, and Troubleshooting Tools,” presents an introduction to the TCP/IP utilities
`and other tools built into the various operating systems. This chapter also examines commercial products such as
`Sniffer Pro, LANanalzyer, Microsoft’s Systems Management Server, Novell’s ManageWise, and IBM’s Tivoli.
`
`Facebook's Exhibit No. 1008/1108
`
`Page 6
`
`Facebook's Exhibit No. 1008/1108
`Page 6
`
`

`

`xxiv
`
`
`Part IV: The Future of Networking
`Chapter 19, “Tomorrow’s Technologies,” takes a look into the future of PC networking. It discusses ways of over-
`coming the current limits of IP, including the new version of IP——-1Pv6. The goal of universal connectivity is
`addressed, and more exotic possibilities such as artificial intelligence, quantum computing, and cybernetic life
`forms are presented as possible components of tomorrow’s networks.
`
`This Book’s Features
`This book contains several elements that help you learn about operating systems and networking:
`Figures, listings, and tables—This book contains figures, listings, and tables that help to
`explain concepts, commands, and procedural sequences. Diagrams illustrate network layouts
`and processes, and screenshots assist students in visualization configuration procedures. In addi-
`tion, listings and tables provide summaries and comparisons of features and characteristics.
`Author’s notes, tips, sidebars, and cautionsflThese elements are included to provide you
`with extra information on a subject. You will probably find these asides to be very beneficial in
`real—world implementations.
`Chapter summaries—At the end of each chapter is a summary of the concepts covered in the
`chapter, which provides a synopsis of the chapter and can serve as a study aid.
`Further Reading-Each chapter includes a list of resources for additional information about
`the topics covered in the chapter, including website URLs and books and articles that cover the
`topic in more detail.
`Review questions——After the Further Reading section in each chapter are 10 review questions
`that serve as an end—of—chapter assessment. The questions are designed to reinforce the con-
`cepts introduced in the chapter and to help students evaluate their understanding before moving
`on to the next chapter.
`The conventions used to present command syntax in this book are the same conventions used in the Cisco IOS
`Command Reference, as follows:
`Boldface indicates commands and keywords that are entered literally as shown. In examples
`(not syntax), boldface indicates user input (for example, a show command).
`Italics indicates arguments for which you supply values.
`
`Square brackets [] indicate optional elements.
`Vertical bars (I) separate alternative, mutually exclusive elements.
`Braces and vertical bars Within square bracketswfor example, [x {y | z}]-——indicate a required
`choice within an optional element. You do not need to enter what is in the brackets, but if you
`do, you have some required choices in the braces.
`
`Facebook's Exhibit No. 1008/1108
`
`Page 7
`
`Facebook's Exhibit No. 1008/1108
`Page 7
`
`

`

`CHAPTER
`
`
`
`Introduction to PC Networking
`
`Welcome to the world of personal computer (PC) networking. In this world, it is no longer
`enough to simply have and use PCs; today it is imperative that you also “get connected.”
`The real power and usability of PCs becomes apparent only when they are linked so that
`they can communicate with one another. From the simple two-computer home or small
`office local—area network (LAN) to the ever-growing global Internet, networking is the
`future of computing, and that future is here today.
`
`In many areas of the United States, the demand for trained networking professionals far
`exceeds the supply. According to projections of the US. Department of Labor, computer
`networking as an occupation has a bright future. Businesses and individuals are buying
`PCs, and those computers are linking within LANs and wide—area networks (WANs) at an
`astonishing pace. We literally are “networking the world.”
`
`Because network communications is quickly becoming a part of our lives, even those not
`directly involved in the information technology (IT) industry should know something about
`the basics of networking. Just as it would be difficult to function in today’s world if you
`knew nothing about a telephone and its features, in the not~too—distant future, knowing how
`to “get on the network” will be a requirement for many individuals, both at work and at
`home.
`
`History of PC Networking
`The desire to communicate with others is a driving force among human beings, and the
`sophisticated means we have developed to communicate sets us apart from other species.
`From the moment it became possible to link two computers and get them to talk to one
`another, the concept of the Internet was inevitable.
`
`In the early days of computing, computers were enormous machines that filled entire
`rooms—sometimes entire city blocks—and cost hundreds of thousands of dollars.
`Although these expensive behemoths had less processing power and memory than today’s
`tiny handheld computers, they were state~of—the~art technology in the 1950s and 19603. In
`a world in which human beings who were slow and prone to error had done calculations
`manually, the capabilities of the computer were amazing.
`
`
`
`E‘EA-B‘rief
`
`
`
`Facebook's Exhibit No. 1008/1108
`
`Page 8
`
`Facebook's Exhibit No. 1008/1108
`Page 8
`
`

`

`
`
`6 Chapter 1: Introduction to PC Networking
`
`At the midpoint of the twentieth century, computers were still rare, exotic, mysterious
`machines owned only by large companies, governmental bodies, and educational
`institutions. For the most part, computers were standalone systems, isolated from one
`another.
`
`In the 1940s, Thomas Watson, the chairman of IBM, said that a market existed in the world
`for approximately five computers. Even as recently as 1977, Ken Olson, president of Digital
`Equipment Corporation, said, “There is no reason anyone would want a computer in their
`home” (ISBC [International Small Business Consortium], www.isbc.com/isbc/business/
`wisdomcfm). Of course, both have been proven not just wrong, but very wrong. However,
`no one would have predicted, even a decade ago, that PCs would proliferate as they have or
`that computer networking would become a mainstream topic.
`
`The First Communications Networks
`By the mid—1900s, electronic communications had been around for over a century and was
`being implemented in both Europe and the United States. These early networks took many
`forms and sent only coded signals. They later became capable of sending voice across the
`wire.
`
`This section provides a rough time line of how the first networks were developed.
`
`Telegraph Cables
`In the early 1800s, the French developed the first optical telegraph network, which sent
`information at the blazing speed of 20 characters per second, and Samuel Morse
`demonstrated the electrical telegraph, which spurred the development of networked
`communications in the United States.
`
`The Telephone Network: Circuit-Switching Technology
`In the late 1800s, a vast telephone network began to be built. Technology leaders of the day,
`however, were no more farsighted than those of the early computer age. In 1876 an internal
`memo at Western Union stated that “This ’telephone’ has too many shortcomings to be
`seriously considered as a means of communication. The device is inherently of no value to
`us” (www.isbc.com/isbc/business/wisdom.cfm).
`Despite that attitude, there were more than 50,000 telephone lines in the US. by 1880, and
`by 1960, telephone lines covered urban areas, and the telephone network became a global
`communications network.
`
`A telephone system uses circuit—switching technology, in which a circuit, or virtual
`pathway, is established when one telephone connects to another on a network. This works
`
`Facebook's Exhibit No. 1008/1108
`
`Page 9
`
`Facebook's Exhibit No. 1008/1108
`Page 9
`
`

`

`7
`A Brief History of PC Networking
`
`well for voice transmission because the sounds being transferred over the wire flow at a
`relatively constant rate.
`
`In a circuit~switched network, a connection is established, as shown in Figure 1-1, All
`signals are passed over this circuit for the duration of the session. If you disconnect and
`reconnect, a different circuit can be used, as represented by the dotted line.
`
`Figure 1-1
`
`In a circuit—switched network, a connection is established, as represented by the solid line.
`
`
`
`The technology works less well for transfer of computer data, which has a tendency to be
`sent in bursts; that is, periods of high activity are interspersed with intervals of low activity
`or inactivity.
`
`Packet-Switching Technology
`
`During the 1960s, the US. government became interested in developing a computer
`network that would enable systems at military installations and major educational
`institutions to communicate with one another. Because this was during the middle of the
`Cold War, they wanted the network to have robustness, reliability, and redundancy so that
`the network would survive a nuclear war.
`
`Researchers working at the Massachusetts Institute of Technology (MIT), the RAND
`Institute, and the National Physical Laboratory (NFL) in England invented a new
`technology called packet switching, which worked better for bursty transmissions than did
`the traditional circuit-switching technOlogies. Their work created a foundation for the
`communications technology used on the Internet today.
`
`In a packet—switched network, as shown in Figure 1—2, a connection is not established for
`the entire transmission. Instead, each individual packet of data can take a different path.
`
`Facebook's Exhibit No. 1008/1108
`
`Page 10
`
`Facebook's Exhibit No. 1008/1108
`Page 10
`
`

`

`
`
`8 Chapter 1: introduction to PC Networking
`
`Communications from different sources can share the same line, rather than the line being
`dedicated to one end—to—end communication for the duration of a session, as is the case with
`circuit switching.
`
`Figure 1-2 Networked computers share data, software, and hardware resources.
`
`
`
`Circuit Switching Versus Packet Switching
`The terms circuit switching and packet switching sound alike but have different meanings.
`
`The public telephone system, sometimes referred to as POTS (plain old telephone service),
`is a switched~circuit communications network. When you place a telephone call in this type
`of network, only one physical path from your telephone to the one you’re dialing is used
`for the duration of that call. This pathway, or circuit, is maintained for your exclusive use,
`until you end the connection by hanging up your telephone.
`
`Note, however, that if you call the same friend at the same number tomorrow, and do so at
`the same location from which you placed today’s call, the path is not necessarily the same.
`That’s why the circuit is referred to as switched. It also explains why you can get a Clear
`connection one day and noise and static on another.
`
`With a packet-switching network, no dedicated pathway or circuit is established. Packet
`switching is sometimes referred to as a connectionless technology because of the lack of a
`dedicated pathway. If you transfer data, such as a word processing file, from your computer
`to another using a packet-switched network, each individual packet (that is, each small
`chunk of data) can take a different route. Although it all arrives at the same destination, it
`doesn’t all travel the same path to get there. Internet traffic generally uses packet-switching
`technology.
`
`Facebook's Exhibit No. 1008/1108
`
`Page 11
`
`Facebook's Exhibit No. 1008/1108
`Page 11
`
`

`

`
`
`A Brief History of PC Networking 9
`
`The difference between circuit and packet switching can be compared to the different ways
`in which a large group of people traveling from Dallas to San Francisco can reach their
`destination. For example, circuit switching is similar to loading the entire group on a bus,
`a train, or an airplane. The route is plotted out, and the whole group travels over that same
`route.
`
`Packet switching is like having each person travel in an automobile. The group is broken
`down into individual components as the data communication is broken into packets. Some
`travelers can take interstate highways, and others can use back roads. Some can drive
`straight through, and others can take a more roundabout path. Eventually, they all end up at
`the same destination. The group is put back together, just as packets are reassembled at the
`endpoint of the communication.
`
`The ARPAnet
`
`The first packet-switched computer network was conceived in the late 19605, under the
`auspices of the US. Department of Defense (DOD). It was christened the ARPAnet (for
`Advanced Research Projects Agency network). The ARPAnet’s first node, or connection
`point, was installed at the University of California at Los Angeles in 1969. In just three
`years, the network spread across the United States, and two years after that, it spread to
`Europe.
`
`As the network grew, it split into two parts. The military called its part of the internetwork
`Milnet, and ARPAnet continued to be used to describe the part of the network that
`connected research and university sites. In the 1980s the Defense Data Network (a separate
`military network) and NSFNet (a network of scientific and academic sites funded by the
`National Science Foundation) replaced ARPAnet. Eventually this WAN grew into what we
`today call the Internet.
`
`Yesterday’s Networks
`
`Computer networking didn’t begin on such a large scale as the ARPAnet project; that is, the
`LAN came before the WAN. As computers became less expensive and more powerful,
`businesses of all sizes more commonly used them. Although the first machines were useful
`for only very limited types of data processing, as software development flourished, new
`programs enabled users to do much more than just collect and sort data.
`
`With early mainframe systems, for instance, multiple users could access the same stored
`data from terminals, which were stations with input and output devices (for example,
`keyboards and monitors). These stations had no computing power of their own; they were
`points from which the mainframe computer could be accessed.
`
`Using mainframes worked well in many respects, but they had several disadvantages when
`compared to smaller computers (then called microcomputers). Expense was one
`
`Facebook's Exhibit No. 1008/1108
`
`Page 12
`
`Facebook's Exhibit No. 1008/1108
`Page 12
`
`

`

`10 Chapter 1: Introduction to PC Networking
`
`
`disadvantage; large mainframe systems cost far more than the so~called “personal”
`computers designed to sit on a desktop and function independently.
`Another disadvantage of mainframes was the single point offailure concept. With
`mainframe computing, if the computer was down, it was down for everyone. Nobody could
`access data, and nobody who depended on the computer could get any work done. The use
`of individual PCs, on the other hand, circumvented this problem.
`PCs were full~fledged computers that ran programs and performed tasks entirely on their
`own. They also provided some measure offault tolerance, which is the capability of a
`system to continue to function and ensure data integrity when failures occur. If one
`employee’s computer crashed, it didn’t affect the capability of the rest of the employees,
`who had their own PCs, to continue working. In fact, if an employee had saved data to a
`floppy disk, he or she could move to a functioning machine and continue working.
`These factors contributed to the increased popularity of PCs as a computing solution for
`small and large businesses (and everything in between). However, once everyone had a PC
`on the desktop, companies were faced with a dilemma: How could workers share
`information as they had with the old mainframe computing model? The solution was
`networking.
`
`Disadvantages of Standalone Systems
`In the early days of desktop PCs, networking hardware and software were not readily
`available, and many businesses used the machines as standalone systems. If all users
`needed to print documents on occasion, there were three possible ways to provide that
`ability:
`' A printer could be attached to each machine. This was a costly solution because it
`necessitated buying multiple printers, even though it was unlikely that they all would
`be in use at the same time.
`° The file to be printed could be saved to floppy disk and transferred to a machine that
`had an attached printer. This was a less—expensive option, but it was an inconvenience
`both to the person who had to go begging for a printer and to the person with the
`printer, whose work was interrupted while someone else used his or her machine to
`print.
`' A printer could be moved from one workstation to another, depending on who needed
`to print. This was a somewhat cumbersome solution; nonetheless, it was widely
`implemented, using rolling printer carts that were wheeled around the office. Each
`move required that cables be disconnected and reconnected, and sometimes, a move
`involved software reconfiguration as well.
`High cost, inconvenience, and extra work are the primary disadvantages of standalone, or
`non~networked, solutions.
`
`Facebook's Exhibit No. 1008/1108
`
`Page 13
`
`Facebook's Exhibit No. 1008/1108
`Page 13
`
`

`

`
`
`A Brief History of PC Networking 11
`
`What Is a Network, Anyway?
`
`The American Heritage Dictionary defines a network as “a system of lines or channels that
`cross or interconnect.” Earlier we mentioned the telegraph and telephone networks, and of
`course, we’ve all heard references to the television networks. Using the dictionary
`definition, we can call even the state highway system, or the railways that crisscross the
`country, a network.
`
`That being said, what is a computer network? Simply, it is two or more devices linked for
`the purpose of sharing information, resources, or both. The link can be through cable
`(coaxial, twisted-pair, or fiber optics, as you’ll learn later in this chapter), or it can be a
`wireless connection that uses radio signals, laser or infrared technology, or satellite
`transmission. The information and resources shared can be data files, application programs,
`printers, modems, or other hardware devices. See Figure 1—3 for an illustration.
`
`Figure 1-3
`
`This time line shows significant events in PC networking history.
`
`.mmmflmmflga,.,,_..W.WWW,
`
`
`
`Workstation
`
`Workstation
`
`Workstation
`
`Server
`
`
`
`Files Applications Modems
`
`Scanners
`
`Printers
`
`Why Network Computers?
`If the advantage of PCs were each user having an independent computer, why would we
`want to turn around and link them again? We link them because networked PCs give us, in
`many ways, the best of both worlds. Each user has independent processing power, but still
`can enjoy all the benefits of sharing. On the ot

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket