throbber
Computer Networking Essentials
`
`_ Page1
`
`-
`Cisco Press
`201 West 103rd Street
`
`Indianapolis, W 46290 USA
`
`Facebook's Exhibit No. 1017/1117
`
`Debra Littlejohn S'hinder
`
`t
`
`Clso Svsrms
`
`I
`I
`CISCO PRESS
`

`
`Facebook's Exhibit No. 1017/1117
`Page 1
`
`

`

`Computer Networking Essentials
`Debra Littlejohn Shinder
`
`Copyright © 2001 Cisco Systems, Inc.
`
`Cisco Press logo is a trademark of Cisco Systems, Inc.
`
`Published by:
`Cisco Press
`201 West 103rd Street
`
`Library of Congress Cataloging-in—Publication Number: 2001090429
`ISBN: 1-58713-038—6
`
`'Ikademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capital-
`
`ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
`implied.
`
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`contained in this book or from the use of the discs or programs that may accompany it.
`
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system, without writ—
`ten permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 1 2 3 4 5 6 7 8 9 0
`
`Page 2
`
`V ran-2:420:11
`
`L9
`
`“é
`
`Facebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 2
`
`

`

`Contents
`
`Part I
`Chapter 1
`
`Introduction to Networking Concepts
`Introduction to PC Networking
`5
`
`3
`
`6
`10
`
`15
`
`12
`
`16
`
`PC Networking Today
`Home Computing
`16
`16
`Web Presence and E-commerce
`High-Performance Business Solutions
`Online Learning
`17
`
`16
`
`Tomorrow’s Networks
`
`17
`
`”Smart” Appliances and Homes
`Phoning Home
`18
`The Wired Workplace
`Schools of the Future
`
`19
`20
`
`17
`
`20
`Networking Health Care
`Technology and the Law 21
`Intergalactic Networking?
`21
`
`21
`
`22
`
`5
`A Brief History of PC Networking
`The First Communications Networks
`Disadvantages of Standalone Systems
`What Is a Network, Anyway?
`11
`Why Network Computers?
`11
`Benefits of Getting Connected
`The Birth of the Internet
`13
`The Cost of Technology: More and More for Less and Less
`
`Page 3
`
`A Brief Overview of Networking Terminology
`Concept-Related Terminology
`22
`Network Hardware—Related Terminology
`Software-Related Terminology
`23
`Design and Topology Terminology
`Measurement—Related Terminology
`
`24
`24
`
`What This Book Covers and What It Doesn’t
`
`25
`
`26
`Networking Certifications
`26
`Vendor-Specific Certifications
`Non-Vendor—Specific Certifications
`This Book and Certification
`27
`
`26
`
`Facebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 3
`
`

`

`Summary
`
`27
`
`Further Reading
`
`28
`
`Review Questions
`
`28
`
`Chapter 2
`
`Categorizing Networks
`
`33
`
`Categorizing Networks by Physical Scope
`Characteristics of a LAN 34
`Characteristics of a MAN 35
`Characteristics of a WAN 37
`
`33
`
`Categorizing Networks by Administrative Method
`Servers and Clients
`39
`Characteristics of Peer-to-Peer Networks
`Characteristics of Server-Based Networks
`
`44
`47
`
`38
`
`Categorizing Networks by NOS
`Windows Networks
`50
`NetWare Networks
`50
`UNIX Networks
`50
`
`49
`
`Hybrid Networks
`
`51
`
`52
`
`
`
`Categorizing Networks by Protocol
`NetBEUI Networks
`52
`IPX/SPX Networks
`52
`TCP/IP Networks
`53
`Other LAN Protocols Used in Networks
`
`Categorizing Networks by Topology
`Linear Bus Networks
`55
`
`54
`
`53
`
`56
`Ring Networks
`Star Bus Networks
`Mesh Networks
`59
`
`57
`
`Hybrid Topologies
`
`6O
`
`Categorizng Networks by Architecture
`Ethernet Networks
`62
`
`61
`
`Token Ring Networks
`AppleTalk Networks
`
`67
`68
`
`ARCnet Networks
`
`68
`
`Summary
`
`70
`
`Further Reading
`
`70
`
`Review Questions
`
`71
`
`Facebook's Exhibit No. 1017/1117
`
`Page 4
`
`Facebook's Exhibit No. 1017/1117
`Page 4
`
`

`

`Chapter 3
`
`Networking Concepts, Models, and Standards
`
`75
`
`Computer Communication Concepts
`The Language of the Machine
`76
`Common Numbering Systems
`76
`Using Packets
`80
`A Layered Communication Process
`
`75
`
`82
`
`84
`Networking Models
`The Purpose of Models
`The 051 Model
`85
`The DoD Model
`97
`
`84 '
`
`Vendor-Specific Models
`
`99
`
`Networking Standards and Specifications
`Why Standardize?
`100
`
`99
`
`Standards-Setting Bodies
`
`100
`
`Summary
`
`104
`
`Further Reading
`
`104
`
`Review Questions
`
`105
`
`Page 5
`
`Signaling and Communications Problems
`Electromagnetic Interference
`119
`Radio Frequency Interference
`119
`Crosstalk
`1 19
`Attenuation
`120
`
`Chapter 4
`
`Networking Communications Methods
`
`109
`
`Signaling Methods and Characteristics
`Analog and Digital
`109
`Baseband and Broadband
`
`112
`
`109
`
`1 13
`Multiplexing
`115
`Asynchronous and Synchronous Transmission
`Simplex, Half—Duplex, and Full-Duplex Transmission
`
`116
`
`118
`
`Bandwidth Capacity Issues
`
`121
`
`Media Access Methods
`CSMA/CD 122
`CSMA/CA 123
`
`121
`
`Token Passing
`Demand Priority
`
`123
`125
`
`Summary
`
`126
`
`Further Reading
`
`126
`
`Review Questions
`
`127
`
`Facebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 5
`
`

`

`Chapter 5
`
`LAN Links
`
`131
`
`132
`Ethernet
`132
`10B ase2
`1 34
`10Base5
`10B aseT 136
`100B aseX 1 37
`1000B aseT 137
`The Structure of an Ethernet Frame
`
`138
`
`139
`Rules of Ethernet Engagement
`Summary of Ethernet Characteristics
`
`142
`
`143
`
`146
`
`147
`
`142
`Token Ring
`143
`Token Ring Topology
`The Token Ring Communication Process
`Token Ring Hardware Components
`144
`Advantages of Token Ring
`145
`Disadvantages of Token Ring
`145
`The Structure of the Token Ring Frame
`Rules of the Ring
`147
`Summary of Token Ring Characteristics
`
`
`
`147
`FDDI
`How FDDI Works
`
`147
`
`148
`FDDI Specifications
`149
`Advantages of FDDI
`149
`Disadvantages of FDDI
`The FDDI Frame Structure
`149
`
`Summary of FDDI Characteristics
`
`149
`
`150
`AppleTalk
`150
`AppleTalk Specifications
`150
`How AppleTalk Works
`151
`Advantages of AppleTalk
`Disadvantages of AppleTalk
`151
`LocalTalk Data Transmission
`151
`
`Summary of AppleTalk Characteristics
`
`151
`
`ARCnet
`
`151
`
`How ARCnet Works
`
`151
`
`152
`ARCnet Specifications
`153
`Advantages of ARCnet
`153
`Disadvantages of ARCnet
`153
`The ARCnet Packet Structure
`Summary of ARCnet Characteristics
`
`153
`
`Facebook's Exhibit No. 1017/1117
`
`Page 6
`
`Facebook's Exhibit No. 1017/1117
`Page 6
`
`

`

`
`
`Comparing Networking Architectures
`
`154
`
`Summary
`
`154
`
`Further Reading
`
`155
`
`Review Questions
`
`155
`
`WAN Links
`
`159
`
`WAN Hardware
`Modems
`160
`
`160
`
`165
`ISDN and DSL Adapters
`Customer Premises Equipment
`
`165
`
`166
`WAN Topologies
`The Point—to-Point WAN 166
`
`167
`The WAN Ring
`168
`The WAN Star
`Multitiered WANs
`
`169
`
`170
`Network Switching Types
`Circuit-Switching Networks
`Packet—Switching Networks
`
`170
`176
`
`178
`
`Emerging WAN Technologies
`OC-SONET 179 _
`Broadband ISDN 179
`CATV 179
`SMDS
`181
`
`Wireless WAN 181
`
`Page 7
`
`The Role of the NIC in Network Communications
`195
`S l
`'
`NIC 1 6
`e leg a
`9
`Facebook's Exhibit No. 1017/1117
`
`LAN/WAN Connectivity
`Translated Connections
`Proxy Servers
`185
`Routed Connections
`
`186
`
`182
`182
`
`Summary
`
`187
`
`Further Reading
`
`188
`
`Review Questions
`
`188
`
`Networking Hardware and Software
`
`193
`
`Physical Components of the Network
`
`195
`
`NICs
`
`195
`
`Facebook's Exhibit No. 1017/1117
`Page 7
`
`

`

`Configuring and Using a NIC 197
`
`Network Media
`
`200
`
`200
`Cable Types
`Wireless Media
`207
`
`Network Connectivity Devices
`Simple Connectors
`211
`Complex Connectors
`213
`Segmenting and Subnetting Devices
`
`210
`
`214
`
`Summary
`
`222
`
`Further Reading
`
`222
`
`Review Questions
`
`222
`
`Chapter 8
`
`Networking Protocols and Services
`
`227
`
`NetBIOS/NetBEUI
`IPX/SPX 229
`
`227
`
`The Network Layer Protocol: IPX 229
`The Transport Layer Protocol: SPX 230
`
`TCP/1P 231
`The TCP/1P Suite
`
`231
`
`
`
`The Network Layer Protocol: IP 231
`The Transport Layer Protocols: TCP and UDP 245
`Addressing the Envelope: Packet Headers
`248
`Name Resolution
`249
`TCP/1P Utilities
`254
`
`Application Layer Protocols
`
`261
`
`Summary
`
`262
`
`Further Reading
`
`262
`
`Review Questions
`
`263
`
`Chapter 9
`
`The Widest Area Network: The Global Internet 267 .
`
`The Evolution of the Internet
`
`267
`
`The Development of the Backbone
`The Internet2 Project
`269
`
`268
`
`269
`The Components of the Internet
`The Local Computer or LAN 270
`The ISP 270
`-
`
`The Regional Network
`NAPS
`271
`
`270
`
`Facebook's Exhibit No. 1017/1117
`
`Page 8
`
`Facebook's Exhibit No. 1017/1117
`Page 8
`
`

`

`
`
`MAEs
`
`271
`
`How Internet Components Work Together
`
`272
`
`What the Internet Does
`The World Wide Web
`
`273
`274
`
`283
`
`E-mail and Mailing Lists
`Newsgroups
`287
`File Transfer
`289
`Telnet
`290
`
`Streaming Media
`Live Chat
`291
`
`291
`
`Audio/Videoconferencing
`Internet Telephony
`292
`Virtual Private Networking
`
`292
`
`293
`
`293
`
`294
`
`TCP/IP Routing and the Internet
`How IP Routing Works
`294
`An Example of a Simple Routed Network
`Types of Routing Interfaces . 296
`296
`Static Versus Dynamic Routing
`Distance-Vector Versus Link-State Protocols
`Common Routing Protocols
`299
`
`Page 9‘
`
`298
`
`301
`
`Who Owns the Internet?
`ISOC 302
`IAB 302
`IETF 302
`IESG 302
`
`IANA/ICANN 302
`W3C 302
`
`Summary
`
`303
`
`Further Reading
`
`303
`
`Chapter 10
`
`Review Questions
`304
`0 Network Operating Systems
`
`307
`
`General Network Administration
`The Client/Server Environment
`Sharing Network Resources
`31 1
`
`307
`309
`
`Overview of NOSs
`
`320
`
`\
`
`Windows NT and Windows 2000 Networks
`NetWare Networks
`326
`UNIX and Linux Networks
`Other NOSs
`334
`
`329
`
`320
`
`Facebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 9
`
`

`

`Summary
`
`335
`
`Further Reading
`
`336
`
`Review Questions
`
`336
`
`Chapter 11
`
`Directory Services
`
`341
`
`What Are Directories and Directory Services?
`What Is a Directory?
`341
`What Are Directory Services?
`
`343
`
`34]
`
`Directory Services Standards
`X500 346
`DAP and LDAP 347
`
`346
`
`Directory—Enabled Networking
`
`349
`
`Popular Directory Services
`Novell NDS
`349
`
`349
`
`Microsoft Active Directory
`Other Directory Services
`
`350
`354
`
`Summary
`
`356
`
`Further Reading
`
`357
`
`Review Questions
`
`357
`
`
`
`Windows NT Workstation
`Windows 2000 Professional
`Linux/UNIX 396
`Macintosh
`401
`08/2 403
`
`Chapter 12
`
`Desktop Operating Systems
`
`361
`
`361
`Operating System Basics
`Operating System Interfaces
`Using Commands
`364
`Files and File Systems
`
`367
`
`362
`
`Common Desktop Operating Systems
`MS-DOS and Windows 3.x
`379
`Windows 9x
`381
`
`379
`
`388
`392
`
`Summary
`
`404
`
`Further Reading
`
`404
`
`Review Questions
`
`405
`
`Facebook's Exhibit No. 1017/1117
`
`Page 10
`
`Facebook's Exhibit No. 1017/1117
`Page 10
`
`

`

`Chapter 13
`
`Hybrid Networks 409
`
`409
`Characteristics of the Hybrid Network
`Inability of a Single Vendor to Provide All Desired Features
`Personal Preferences of Users
`410
`
`410
`
`Budgetary Factors
`Haphazard Growth
`
`410
`411
`
`41 1
`Multiple—Protocol Networks
`Network/Transport Protocols
`41 1
`File-Sharing Protocols
`415
`
`415
`Multiple—Operating-System Networks
`415
`Multiple Server Operating Systems
`417
`Multiple Client Operating Systems
`Multiple Server and Multiple Client Operating Systems
`
`417
`
`417
`Multiple-Platform Networks
`PC-to—Macintosh Communications
`PC-to-Mainframe Communications
`
`418
`418
`
`PDA-to—PC and Handheld-to—PC Communications
`
`419
`
`Gateway: The Hybrid Connectivity Solution
`Windows-to-NetWare Redirectors
`420
`Cross-Platform Solutions
`420
`SNA 421
`Samba
`422
`
`419
`
`Summary
`
`424
`
`Further Reading
`
`425
`
`Review Questions
`
`425
`
`Part III
`
`Network Specialty Areas 429
`
`Chapter 14
`
`Protecting the Network
`
`431
`
`454
`
`Page 11
`
`431
`Network Security
`432
`Assessing Security Needs
`434
`Assessing Security Threats
`441
`Implementing Security Measures
`448
`How Security Components Work
`Advanced Identification and Authentication Technologies
`Developing Security Policies
`.457
`
`Disaster Protection and Recovery
`Power Backup
`465
`Data Backup
`466
`
`465
`
`Facebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 11
`
`

`

`
`
`Disk Fault Tolerance
`
`469
`
`Clustering Technologies
`
`471
`
`Summary
`
`471
`
`Further Reading
`
`472
`
`Review Questions
`
`473
`
`Chapter 15
`
`Remote Access 477
`
`Why Remote Access?
`Branch Offices
`478
`
`478
`
`After-Hours Connectivity
`Telecommuting
`479
`Mobile Users
`480
`
`478
`
`Providing Access to Clients and Partners
`
`480
`
`482
`
`481
`How Remote Access Works
`Protocols Used for Remote Access
`Remote Access Authentication
`482
`Assignment of IP Addresses
`483
`Aggregation of Bandwidth on Dialup Connections
`Control of Bandwidth Usage
`484
`
`
`
`483
`
`Remote Access Connectivity Devices
`Modems
`484
`
`484
`
`ISDN Terminal Adapters
`Cable Modems
`493
`CSU/DSUs
`494
`
`492
`
`Configuring Remote Access Clients and Servers
`Configuring a Remote Access Client
`495
`Configuring a Remote Access Server 496
`
`495
`
`Remote Access Security Issues
`Callback Security
`497
`RADIUS 498
`
`496
`
`Remote Access Policies
`Account Lockout
`499
`Security Hosts
`499
`
`498
`
`Summary
`
`499
`
`Further Reading
`
`500
`
`Review Questions
`
`501
`
`Facebook's Exhibit No. 1017/1117
`
`Page 12
`
`Facebook's Exhibit No. 1017/1117
`Page 12
`
`

`

`Chapter 16
`
`Virtual Private Networking
`
`505
`
`What Is a VPN?
`
`505
`
`Virtual Networking
`Private Networking
`
`505
`506
`
`How VPNs Work
`
`506
`
`507
`Digging the Tunnel
`Operating System Support for VPNs
`
`509
`
`510
`
`VPN Protocols
`
`516
`
`Tunneling Protocols
`Encryption Protocols
`LAN Protocols
`520
`
`516
`519
`
`520
`VPN Security
`Authentication
`5 21
`Authorization
`521
`
`Encryption
`
`5 21
`
`VPN Performance Issues v 521
`
`522
`Types of VPNs
`Software—Based VPNs
`Hardware-Based VPNs
`
`522
`522
`
`Configuring a VPN Connection
`
`522
`
`Summary
`
`525
`
`Further Reading
`
`526
`
`Review Questions
`
`526
`
`510
`Why Use Virtual Private Networking?
`VPN Versus Dialup Networking: Advantages and Disadvantages
`VPN Scenarios
`512
`>
`
`Page 13
`
`Chapter 17
`
`Thin Client Networking
`
`531
`
`The Evolution of Thin Client Networking 7 532
`Thin Client Technology
`533
`Advantages of Thin Client Technology
`
`534
`
`Thin Client Protocols
`RDP 536
`ICA 5 36
`
`535
`
`X and X Display Manager Communication Protocol (XDMCP)
`RFB 537
`
`536
`
`BOOTH DHCP’ and TFTP Pycebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 13
`
`

`

`
`
`Thin Client Hardware
`WBTs
`539
`
`Network Computers
`Net PCs
`540
`
`538
`
`539
`
`540
`Desktop Computers
`The Thinnest Clients: Handheld PCs
`
`540
`
`541
`Thin Client Software
`Microsoft Terminal Services
`Citrix Winframe/MetaFrame
`
`541
`542
`
`The X Window System 543
`Web-Based Computing
`544
`The JVM 544
`
`ASPs
`
`545
`
`Microsoft .NET 545
`
`Summary
`
`546
`
`Further Reading
`
`546
`
`Review Questions
`
`.547
`
`Chapter 18
`
`Monitoring, Management, and Troubleshooting Tools
`
`551
`
`Analyzing and Optimizing Network Performance
`Bottlenecks
`552
`Baselines
`553
`Best Practices
`
`554
`
`551
`
`Determining Internet Connection Speed
`
`554
`
`556
`
`
`
`Network Monitoring and Management Tools
`Networking Monitoring Software
`556
`Network Management Software
`562
`Management Software for Small and Medium-Sized Networks
`Management Service Providers 568
`
`567
`
`Hardware Monitoring and Troubleshooting Devices
`
`568
`
`Troubleshooting Network Problems
`Troubleshooting Basics
`569
`Using Operating System Log Files
`Using TCP/IP Utilities
`573
`Problem—Solving Guidelines
`
`579
`
`569
`
`571
`
`Summary
`
`5 80
`
`Further Reading
`
`581
`
`Review Questions
`
`5 81
`
`Facebook's Exhibit No. 1017/1117
`
`Page 14
`
`Facebook's Exhibit No. 1017/1117
`Page 14
`
`

`

`
`
`Part IV
`
`The Future of Networking 585
`
`Chapter 19
`
`Tomorrow’s Technologies 587
`
`587
`Ubiquitous Computing
`588
`Bringing Networking Home
`Overcoming the Limits of IP 589
`New Directions in Networking Technologies
`
`590
`
`592
`Universal Connectivity
`593
`”Smart” Everything
`Networking the Family
`594
`That’s Entertainment
`594
`
`Privacy Issues: Big Brother Is Watching
`
`594
`
`596
`
`595
`Networking at Work
`The Impact of Networking Technologies on Government
`The Impact of Networking Technologies on Law 598
`The Impact of Networking Technologies on Medicine
`The Impact of Networking Technologies on Publishing
`
`Page 15
`
`599
`600
`
`New Ways of Learning
`
`601
`
`602
`Artificial Intelligence
`Computers That Think
`602
`
`Cybernetic Life—Forms: The Ultimate Network
`
`603
`
`Summary
`
`603
`
`Further Reading
`
`604
`
`Parting Questions
`
`604
`
`Appendix A
`
`Chapter Review Answer Key 607
`
`Glossary 635
`
`Index 695
`
`Facebook's Exhibit No. 1017/1117
`
`Facebook's Exhibit No. 1017/1117
`Page 15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket