throbber
Page 001
`
`CAVIUM-1028
`Cavium, Inc. v. Alacritech, Inc.
`
`.M87
`1995
`
`INTEL Ex.1028.001
`
`

`

`Page 002
`
`CAVIUM-1028
`Cavium, Inc. v. Alacritech, Inc.
`
`INTEL Ex.1028.002
`
`

`

`COMMUNICATIONS
`TCP/IP
`
`0-13-4608.58-.S
`90000>
`
`9 780134 608587
`
`INTEL Ex.1028.003
`
`

`

`
`
`INTEL Ex.1028.004
`
`CAVIUM-1028
`Cavium, Inc. v. Alacritech, Inc.
`Page 004
`
`

`

`
`
`
`
`CAVIUM-1028
`Cavium, Inc. v. Alacritech, Inc.
`Page 005
`
`

`

`ll l ll llllll llll llll llll llll lll lllll llll lll lllll ll ~llll llll ll l ll
`
`3 0400 12159 0604
`
`'
`
`.
`.
`
`.
`
`.
`
`-
`
`- -
`
`DATE DUE
`
`- ., LUU(J
`Nn11" In --- - _
`" IQ 2 ~~ ZlW
`
`~
`
`-
`
`•
`
`DEMCO 38-297
`
`INTEL Ex.1028.006
`
`

`

`Fifth Edition
`
`© Copyright International Business Machines Corporation 1989, 1995. All rights reserved.
`Note to U.S. Government Users - Documentation related to restricted rights - Use, duplication or disclosure is
`subject to restrictions set forth in GSA ADP Schedule'Contract with IBM Corp.
`
`For Information about redbooks:
`http://www.,redbooks.ibm.com/redbooks
`
`Send comments to:
`redbooks@vnet.ibm.com
`
`Published by M Prentko H'11 PTR
`
`Prentice-Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, NJ 07458
`
`The publisher offers discounts on this book when ordered in bulk quantities. For more information,
`contact
`
`\
`
`Corporate Sales Department,
`Prentice Hall· PTR
`One Lake Street
`Upper Saddle River, NJ 07458
`Phone: 800-382-3419; FAX: 201-236-714
`E-mail (Internet): corpsales@prenhall.com
`
`For book and bookstore information
`
`http://www.prenhall.com
`
`Printed in the United States of America
`10 9 8 7 6 5 4 3 2 1
`ISBN 0-13-460858-5
`
`Prentice-Hall International (UK) Limited, London
`Prentice-Hall of Australia Pty. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`Prentice-Hall Hispanoaroericana, S.A., Mexico
`Prentice-Hall of India Private Limited, New Delhi
`Prentice-Hall of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda., Rio de Janeiro
`
`INTEL Ex.1028.007
`
`

`

`Contents
`
`Figures
`
`. . . . . . . : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
`
`Tables . . . . . . . . . . . . . . . . . . . . . : . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
`
`P-reface
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
`. Speciai Notices
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
`..._ Acknowledgments
`
`Chapter 1. The Internet: Past, Present and Future
`. . . . . . . . . . . . . . . . . . 1-1
`1.1 Introduction
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
`1.2 Internetworks . . . . . . . . . , . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
`. . . ... , .. ...... . .... ...... .. .. .... . ... . .. 1-3
`1.2.1 The Internet
`1.2.2 ARPANET ..... '., .. . ... . ...... .. . .... . ... . . . . . . .... 1-3
`1.2.3 NSFNET
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
`.
`.
`1.2.4 EBONE ...... . .. ...... .. ... . . ....... . ......... ... . 1-6
`1.2.5 CREN .. .. ... . ...... . .......................... . . 1-6
`1.2.6 Cypress
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
`1.2.7 ORI ... . ........ . ................................ 1-7
`1.2.8 European Academic Research Network (EARN)
`.. .. . ............ 1-7
`1.2.9 Reseaux Associes pour la Recherche Europeenne (RARE)
`'. . . . . . . . . . 1-7
`1.2.10 Reseaux IP Europeens (RIPE) ........................... 1-8
`1.2.11 Japanese Internet
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
`1.2.12 Commercial Use of the Internet
`. . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
`1.2.13 Information Super Highway
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
`1.3 IBM and the Internet ........... . . . . . : . . . . . . . . . . . . . . . . . . . 1-10
`1.3.1 ·The IBM Open Blueprint
`. : . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
`. .. .. ........ . . . . . .... . . ... .. ... .. .. . . ... ·1-15
`1.3.2 AnyNet
`1.3.3 IBM Global NetworkServices
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
`1.3.4 Internet Connection Services
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
`. ... . ...... · . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-20
`1.4 Future
`1.4.1 Future - High-Speed Networking
`. . . . . . . . . . . . . . . . . . . . . . . . . 1-21
`. . ... ·. . . . . . . . . . . . . . . . . . . . . . . . . 1-22
`1.5 Request For Coml!lents (RFC)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
`1.5.1 Internet Standards
`1.5.2 For Your Information (FYI)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
`1.5.3 Obtaining RFCs
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
`1.5.4 MajorlnternetProtocols ... . ... . .... . . . ................ 1-26
`
`Chapter 2. Architecture and Protocols
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
`2.1 Architectural Model
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
`. 2.1.1 Internetworking
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
`
`© Copyright IBM Corp. 1989, 1995
`
`iii
`
`...
`
`INTEL Ex.1028.008
`
`

`

`2. 12.2 TCPConcept ................ . .. ... . ...... . .. ..... 2-93
`2.12.3 TCP Application Programming Interface
`. . . . . . . . . . . . . . . . . . 2-103
`2.13 Asynchronous Transfer Mode (ATM) - . . . . . . . . . . . . . . . . . . . . . . . 2-104
`2. 13 .1 Address Resolution (A TMARP and· InA TMARP)
`. . . . . . . . . . . . . 2-104
`2.13.2 Classical IP over ATM
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-107
`2.13.3 ATM LAN Emulation
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-112
`2.13.4 Classical IP over ATM versus LAN Emulation
`. . . . . . . . . . . . . . . 2-116
`2.14 TCP/IP and OSI
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-116
`~ 2.14.1 Differences
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-117
`2.14. 2 The Internet World and OSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 18
`2.14.3 TCP/IP and OSI Coexistence Considerations
`. . . . . . . . . . . . . . . . 2-120
`2.15 Data Link Switching: Switch-to-Switch Protocol . . . . . . . . . . . . . . . . . 2-125
`2. 15.l Introduction
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-125
`2.15.2 Functional Description
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-125
`2.16 IP: The Next Generation (IPng)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 2-127
`2.16.1 The Requirements for IPng
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 2-128
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-129
`2. 16.2 IPng Candidates
`2.16.3 IP Version 6 (1Pv6)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-130
`2. 17 Summary
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-148
`
`Chapter 3. Routing Protocols
`. . ... . .... . ..... .. .. . . . .......... 3-1
`3. 1 Basic IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . 3-1
`3.1.l Routing Daemons
`. ..... . ....... .... . .. ... .. . ....... .. 3-4
`3.2 Historical Perspective
`. ........... ..... . . ..... ........ ... . 3-4
`3.2.l The ARPANET Routing Architecture
`. .... . . .. : . . .. .... . ... . 3-4
`3.2.2 NSFNET Routing Architecture ........................... 3-8
`3.3 Interior Routing Protocols
`. . . . . . . . . . . . . . . . . ·. . . . . . . . . . . . . . . . . 3-8
`3.3. l Routing Algorithms ......... : ..... : . . . . . . . . . . . . . . . . . . . 3-9
`3.3.2 The Hello Protocol
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
`3 .3 .3 Routing Information Protocol (RIP)
`. . . . . . . . . . . . . . . . . . . . . . . 3-17
`3.3.4 Open Shortest Path First Protocol (OSPF) Version 2
`. . . . . . . . . . . . . 3-25
`3.4 Exterior Routing Protocols
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-49
`3.4.1 Exterior Gateway Protocol (EGP)
`. . . . . . . . . . . . . . . . . . . . . . . . . 3-49
`3.4.2 Border Gateway Protocol (BGP)
`. . . . . . . . . . . . . . . . . . . . . . . . . 3-52
`3.4.3 IP Routing Protocols in IBM TCP/IP Products
`. .. ...... ....... ·. 3-69
`
`Chapter 4. Application Protocols
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
`4 .1.1 Characteristics of Applications
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
`4 .1.2 Client/Server Model
`. .. ... .... .. . . ..... .. . ..... . ...... 4-1
`4.2 TELNET
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
`4.2. l TELNET Operation
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
`4.2.2 Implementations .............. . ...... . .. . ........... 4-10
`4.3 Trivial File Transfer Protocol (TFTP) . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
`
`Contents V
`
`INTEL Ex.1028.009
`
`

`

`2.1.2 Internet Architecture ........ . ... ........ .. .. .. ........ 2-3
`2.2 Addressing
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
`2.2.1 The IP Address
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
`2.2.2 Subnets
`. ... . .. ... . . . . .. . ...... ...... .. ..... . .. . . 2-10
`2.2.3 Special IP Addresses
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 6
`2.2.4 Unicasting, Broadcasting andMulticasting ................... 2-17
`2.2.5 The IP Address Exhaustion Problem ................. . ... . . 2-21
`2.2.6 Private Intemets
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
`2.2.7 Classless Inter-Domain Routing (CIDR)
`. . . . . . . . . . . . . . . . . . . . . 2-26
`2.2.8 Domain Name System .. .. . ......... .. .. ..... . ........ 2-31
`2.3 Internet Protocol (IP)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36
`2.3. l IP Datagram ................... .- . . . . . . . . . . . . . . . . . . 2-36
`2.3.2 IP Routing
`.... ........ . ... . ...................... 2-48
`2.4 Internet Control Message Protocol (ICMP)
`. . . . . . . . . . . . . . . . . . . . . . 2-52
`2.4.1 ICMP Messages
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-53
`2.4.2 ICMP Applications
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-62
`2.4.3 ICMP for IP Version 6
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-62
`2.5 Ping
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-63
`2.6 Traceroute
`........ ... ..... ..... . . ..... . .... ... .. .. .. 2-65
`2. 7 Internet Group Management Protocol (IGMP)
`. . '. . . . . . . . . . . . . . . . . . 2-66
`2.7.1 IGMP Messages ... .. ... .. ... .. .. .. . ......... . . ... ... 2-66
`2.7.2 IGMP Operation .................. . ......... .. ...... 2-67
`2.8 Address Resolution Protocol (ARP) .... ... .. . ............... .. 2-69
`2.8.1 Ethernet versus IEEE 802.3 .. .. . . . .............. . .... .. . 2-69
`2.8.2 ARP Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-72
`2.8.3 ARP Detailed Concept
`. . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . 2-73
`2.8.4 ARP and Subnets
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-77
`2.8.5 Proxy-ARP or Transparent Subnetting ·. . . . . . . . . . . . . . . . . . . . . . 2-77
`2.9 Reverse Address Resolution Protocol (RARP)
`. . . . . . . . . . . . . . . . . . . . 2-79
`2.9. 1 RARP Overview .......................... . .... ... . 2-79
`2.9.2 RARP Concept
`. ......... . .. .. .. . .................. 2-79
`2. 10 Ports and Sockets
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ,.2-81
`2.10.l Ports ........ ............ . ........ ...... ... . ... · 2-81
`2.10.2 Sockets
`... . ... . . . . .. ..... . .. . . . ...... . . . .. ... .. 2-81
`2.10.3 Basic Socket Calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-82
`2.10.4 An Example Scenario
`... . ..... . .. .. ........... . . .. ... 2-84
`2.10.5 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8§
`2. 11 User Datagram Protocol (UDP)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-88
`2.11.1 Ports
`... .. ........... . .. .. . . .. .... ...... ... . ... 2-89
`2.11.2 UDP Datagram Format ......... .. ....... .. . ... . ... ~ .. 2-90
`2.11 .3 UDP Application Programming Interface ...... . . . .......... 2-91
`2.12 Transmission Control Protocol (TCP) . . . . . . . . . . . . . . . . . . . . . . . . . 2-92
`... . ......... .. .. . ...................... 2-92
`2.12.l Sockets
`
`iv TCP/IP Tutorial and Technical Overview
`
`INTEL Ex.1028.010
`
`

`

`"'
`
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-129
`4.10 Remote Procedure Call (RPC)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-130
`4.10.1 RPC Concept
`4.10.2 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-134
`4.11 Network Computing System (NCS)
`. . . . . . . . . . . . . . . . . . . . . . . . . 4-136
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1,41
`4.11.2 Implementations
`4.12 Network File System (NFS)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-144
`4.12.1 Concept
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-144
`4.12.2 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-149
`4~ 13 Kerberos Authentication and Authorization System
`. . . . . . . . . . . . . . . 4-155
`4.13.1 Assumptions
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-156
`4.13.2 Naming
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-156
`4.13.3 Kerberos Authentication Process
`. . . . . . . . . . . . . . . . . . . . . . . 4-157
`4.13.4 Kerberos Database Management . . . . . . . . . . . . . . . . . . . . . . . . 4-161
`. . . . . . . . . . . . . . . . . . . . . . . . . 4-162
`4.13:5 Kerberos Authorization Model
`4.13.6 Kerberos Version 5 Enhancements
`. . . . . . . . . . . . . . . . . . . . . . 4-162
`4.13.7 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-163
`4.14 Network Management
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-166
`4.14.1 Standards
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-167
`4.14.2 Structure and Identification of Management Information (SMI}
`. . . . 4-168
`4.14.3 Management Information Base (MIB)
`. . . . . . . . . . . . . . . . . . . . 4-169
`4.14.4 Simple Network Management Protocol (SNMP)
`. . . . . . . . . . . . . . 4-174
`4.14.5 Common Management Information Protocol over TCP/IP (CMOT)
`. . 4-177
`4.14.6 SNMP Distributed Programming Interface (SNMP DPI) . . . . . . . . . 4-179
`. . . . . 4-181
`4.14.7 Simple Network Management Protocol Version 2 (SNMPv2)
`4.14.8 MIB for SNMPv2
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-185
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-185
`4.14.9 Party MIB
`. . . . . . . . . . . . . . . . 4-186
`4.14.10 Single Authentication and Privacy Protocol
`4.14.11 The New Administrative Model
`. . . . . . . . . . . . . . . . . . . . . . . 4-187
`4.14.12 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-189
`4.15 NetBIOS Services Protocol
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-197
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-198
`4.15.1 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-205
`4.16 Line Printer Daemon
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-205
`4.16.1 Implementations
`4.17 BOOTstrapProtocol-BOOTP ........................... 4-210
`4.17.1 Implementations ......... : . . . . . . . . . . . . . . . . . . . . . . . . 4-213
`4.18 Dynamic Host Configuration Protocol (DHCP) .......... ·. . . . . . . . 4-214
`4.19 NETSTAT ......................................... 4-220
`4.20 Finger Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-220
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-221
`4.21 Whois Protocol
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-221
`· 4.22 Time and Daytime Protocols
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-222
`4.23 Other Application Protocols
`4.23.1 Network Database (NDB)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-222
`4.23.2 Network Information Systems (NIS)
`. . . . . . . . . . . . . . . . . . . . . 4-223
`
`Contents Vii
`
`INTEL Ex.1028.011
`
`

`

`4.3.1 Usage .... .. ..... . ...... . . ..... ............. . . . . 4-21
`4.3.2 Protocol Description
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
`4.3.3 Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
`4.4 File Transfer Protocol (FfP)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
`4.4.1 Overview of FTP
`4.4.2 FTP Operations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
`4.4.3 Reply Codes
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
`4.4.4 FTP Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
`4.4.5 A Sample FTP Session ................ ..... ... ..... .... 4-31
`4.4.6 Implementations ... ..... .... .. ... . ......... . .... . ... 4-31
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-39
`4.5 Domain Name System (DNS)
`4.5.l The Distributed Name Space .... .. .................. . ... 4-39
`4.5.2 Domain Resolution .... . ........... .. .... .. . .......... 4-40
`.. . . .. ... .... .. ....... . . 4-44
`4.5.3 Domain System Resource Records
`4.5.4 Domain Name System Messages
`.. ..... . ...... . ....... . .. 4-45
`4.5.5 A Simple Scenario
`... .... .. . . ............. . ..... . ... 4-50
`.. .. . . ................ .... ...... .. 4-52
`4.5.6 Extended Scenario
`4.5.7 Transport .. ... ...... · . .. . . .. .... . ....... .. ... ... .. 4-53
`4.5.8 References
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-53
`4.5.9 DNS Applications .. .... ...... . ...... ............ . ... 4-54
`4.5.10 Implementations .... ·:-. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-54
`4.6 Simple Mail Transfer Protocol (SMTP)
`. . . . . . . . . . . . . . . . . . . . . . . . 4-64
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-66
`4.6.1 How SMTP Works
`4.6.2 SMTP and the Domain Name System ....... ............ ... 4-72
`4.6.3 Post Office Protocol Mail Servers
`. . . . . . . . . . . . . . . . . . . . . . . . . 4-73
`4.6.4 References
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-75
`4.6.5 Implementations ... .... . ....... ... . · . . . . . . . . . . . . . . . . . 4-75
`4.6.6 SMTP Gateways
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-86
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-88
`4.6.7 SMTP and X.400
`4.7 Multipurpose Internet Mail Extensions (MIME)
`. . . . . . . . . . . . . . . . . . . 4-90
`4.7.1 How MIME works ...... .. ......... . ................ 4-94
`. . . .. ..... . . ..... ·. . . . . . . . . . . . . . 4-95
`4.7.2 The Content-Type Field
`4.7.3 The Content-Transfer-Encoding Field
`. . ... " . . . . . . . . . . . . . . . 4-101
`4.7.4 Using Non-ASCII Characters in Message Headers
`. . . . . . . . . . . . . 4-106
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-108
`4.7.5 References
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-108
`4.7.6 Implementations
`4.8 Remote Execution Command Protocol (REXEC)
`. . . . . . . . . . . . . . . . . 4-111
`· 4.8.1 PrincipleofOperation ............................... 4-112
`4.8.2 Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-112
`4.9 X Window System
`.. ......................... ... .... ~ . 4-118
`4.9.1 Functional Concept
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4- 119
`4.9.2 Protocol
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-123
`4.9.3 Implementations
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4- 124
`
`vi TCP/JP Tutorial and Technical Overview
`
`INTEL Ex.1028.012
`
`

`

`. ... .. . ..... . .. ... ... . ... .... .
`4.23.3 CICS Socket Interface
`4.23.4 IMS Socket Interface .......... .... .. ... .. .... ... .. .
`4.23.5 Sockets Extended ...... . .......... ........ .. .... . .
`4.23.6 REXX Sockets
`. ...... . . .. ... ... .. .. .. .... ... . . .. .
`4.23.7 RFC 1006
`: .. . .... . ....... ........ .. ... .. . . . . .. .
`4.24 Summaries
`4.24.l Client/Server Relationships .. . ... .. . .... . . ... · ...... . . .
`4.24.2 APis by Operating System
`. . . . . . . . . . . . . . . . . . . . . . . . . . .
`4.25 APis by Protocol ... . .. .. .. ........ ........ ... ... .... .
`
`4-224
`4-225
`4-225
`4-226
`4-226
`4-226
`4-226
`4-228
`4-228
`
`Chapter 5. Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
`5.1 IBM 3172 Interconnect Controller
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
`5.1.1 3172 TCP/IP Offload
`. ........................... .. . ... 5-2
`5.2 HYPERchannel Adapter
`. ... . . . .. .. . .. ..... . .... . . .. ...... . 5-5
`5.2. l Addressing Particularities .. . ·. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
`5.3 The IBM High-Performance Parallel Interface (HIPPI) .............. · .. 5-6
`5.3.1 Implementations .. .. ... . . ...... . . .. . . ...... . .... .. ... 5-7
`5.3.2 HIPPI Draft Standards and Internet-Draft .......... ... ...... .. 5-8
`5.3.3 Relationship of IBM HIPPI and the ANSI Draft Standards
`. . . . . . . . . . 5-8
`5.4 CTC (Channel To Channel)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
`5.5 Continuously Executing Transfer Interface (CETI)
`. .. .. ... .. . ....... 5-9
`5.5.1 Implementations .. · . .. . . ............................ . 5-10
`5.6 SNALINK
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
`5.6.l Example .. ... .. ........... . .. ..... . ... . .. ..... . .. 5-11
`5.7 Fiber Distributed Data Interface (FDDI)
`. . ................. ... . . 5-12
`5.8 Serial Line IP (SLIP) .. .... .. .. . ... ................... ." .. 5-14
`5.8.1 Implementations . : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14
`5.8.2 Example .......... . ... ...................... ; . . . . 5-15
`5 .9 Point-to-Point Protocol (PPP)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
`5.10 TCPJIPandX.25 ..... ..... .......... . ... . .... . ........ 5-17
`5.10.1 Implementations ... .... . ... .. . .... .... . . . . ..... . . . . 5-17
`5.11 3745 and Ethernet Adapter
`.. .... .. . .. ·.· .... .. . . ... ....... 5-20
`5 .1 1.1 Principle of Operation
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
`5.1 1.2 Example .. . ...... .. ... ....... . .. . .......... . . ... 5-21
`5.12 3174 Establishment Controller
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22
`5.13 PC and PS/2 Connections
`.. . .. ... . ..... . .. .. ............. 5-23
`· 5.13.1 Connections Supported by TCP/IP for OS/2
`. . . . . . . . . . . . . . . . . 5-23
`5.13.2 Connections Supported by TCP/IP for DOS . ... . ............. 5-23
`5. 14 AIX/ESA Connections
`. ................... .. .......... .. 5-25
`5.15 RISC Systern/6000 Connections
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25
`5.15.1 RISC Systern/6000 Parallel Channel Attachment
`. . . ...... .. ... 5-26
`5.15.2 RISC System/6000 ESCON Control Unit Adapter .. ... ... ...... 5-26
`5.16 The IBM Nways Router Family
`. ....................... . ... 5-26
`
`I
`
`.
`
`viii TCP/IP Tutorial and Technical Overview
`
`INTEL Ex.1028.013
`
`

`

`5.16.l IBM 6611 Network Processor .......................... 5-27
`. . . . . . . . . . . . . . . . . . . . 5-28
`5.16.2 IBM 2210 Nways Multiprotocol Router
`5.17 IBM8229LocalAreaNetworkBridge ..... ................... 5-31
`5.18 IBM 8271 EtherStreamer Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-35
`5.19 The IBM Hubs Family .................... . .. . .......... 5-36
`. . . . . . . . . . . . . . . 5-37
`5.19.1 IBM 8230 Token-Ring Controlled Access Unit
`5.19.2 IBM 8222 Workgroup Hub
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-38
`5. 19.3 IBM 8224 Ethernet Stackable Hub
`. . . . . . . . . . . . . . . . . . . . . . . 5-38
`5.19.4 IBM 8244 FDDI Workgroup Concentrator ....... . .......... 5-38
`5.19.5 IBM 8250 Multiprotocol Intelligent Hub .................... 5-39
`5.19.6 IBM 8260 Multiprotocol Intelligent Hub . . . . . . . . . . . . . . . . . . . . 5-40
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-42
`5.20 Connectivity Summary
`
`......
`
`Chapter 6. Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1 ·
`6.1 Gopher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
`6.1 . l Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
`6.1.2 Veronica ......... ...... . ........... .... ........... 6-5
`6.2 World Wide Web ........................... .. .......... 6-6 .
`6.2. l Implementations ...... .. . . .............. .. .......... 6-10
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
`6.3 Firewalls
`... . . . ........ ....... 6-11
`6.3.l IBM NetSP Secured Network Gateway
`
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`Appendix A. Bibliography
`A.1 International Technical Support Center Publications
`. . . . . . . . . . . . . . . .
`A.2 VM Publications .... ...... . ..... .. . ... ... . .. ...... .. . .
`A.3 MYS Publications
`A.4 DOS Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`A.5 OS/2 Publications
`A.6 AIX for RISC/6000 Publications .... . .......... . ........... .
`A.7 AIX/ESA .............. : .... . ........ ......... ..... .
`A.8 AIX General
`. . .. .. .. ... ..... .. .. . ....... ....... ..... . .
`A.9 AS/400 Publications ............ ..... .............. .. .. .
`A. l 0 CETI Publications
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`A.11 HIPP! Publications
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`A.12 X.25 NPSI Publications ..... .. ......... -. .... .. ....... . . .
`A.13 3172 Interconnett Controller Publications
`A. 14 6611 Network Processor Publications ....... . ............... .
`A.15 8229 LAN Bridge Publications ......................... .. .
`. . . . . ..................... .
`A.16 Other IBM Systems Publications
`A.17 DDN Network Information Center Publications .... .. .. . ...... . . .
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`A.18 OSF Publications
`A.19 ANSI Publications
`A.20 Other Publications.
`
`A-1
`A-1
`A-2
`A-2
`A-2
`A-3
`A-3
`A-3
`A-4
`A-4
`A-4
`A-4
`A-4
`A-5
`A-5
`A-5
`A-5
`A-5
`A-6
`A-6
`A-6
`
`...
`
`Contents
`
`ix
`
`INTEL Ex.1028.014
`
`

`

`. . . . . . . . . . . . . . B-1
`Appendix B. Distributed Computing Environment (DCE)
`.. , . ... . ..................................... B-1
`B.l History
`B.2 Overview of DCE Technology Components .............. .. .... . . B-1
`B.3 Implementations ....... ... .......................... . .. B-2
`B.3.1 MVS ........................... . ........... . .... B-3
`B.3.2 VM
`. .. ................... . . ........ . . . . . ... . ... B-3
`B.3.3 OS/400 ... .. . .. ......... . . ... . ... . . ....... . . . .... B-3
`B.3.4 AIX/6000 .... . .. .... ..... ... ... .. . . ... . . . ......... B-4 .
`B.3.5 OS/2 and Windows . ............................ ... ... B-4
`
`Glossary
`
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . X-1
`
`Index
`
`. . . ... .. ...... ... ... .... .... . .. .. . .. .. ...... .... X-13
`
`X TCP/IP Tutorial and Technical Overview
`
`.
`
`INTEL Ex.1028.015
`
`

`

`Figures
`
`'
`
`1-1.
`1-2.
`1-3.
`1-4.
`~ 2-1.
`2-2.
`2-3.
`2-4.
`2-5.
`2-6.
`2-7.
`2-8.
`2-9.
`2-10.
`2-1 1.
`2-12.
`2-13.
`2-14.
`2-15.
`2-16.
`2-17.
`2-18.
`2-19.
`2-20.
`2-21.
`2-22.
`2-23.
`2-24.
`2-25.
`2-26.
`2-27.
`2-28.
`2-29.
`2-30.
`2-31.
`2-32.
`2-33.
`2-34.
`2-35.
`2-36.
`
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
`IBM Networking Blueprint
`. . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
`Common Transport Semantics
`APPC over TCP/IP
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
`Multiple Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
`Internet Examples ................................... 2-2
`Architectural Model ...... ... .. .. ................... . . 2-3
`Detailed Architectural Model
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
`Internet Router
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
`Assigned Classes of Internet Addresses . . . . . . . . . . . . . . . . . . . . . . 2-9
`A Subnet Configuration
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
`IP Routing without Subnets
`IP Routing with Subnets
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
`IP Address Space Usage
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
`Hierarchical Namespace
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
`The Generic Top-level Domains
`. . . . . . . . . . . . . . . . . . . . . . . . . 2-33
`Domain Name Resolution .. .. ... .. ..... . .......... ·. . . . 2-34
`Internet Protocol (IP)
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36
`Base IP Datagram
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-37
`IP Datagram Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-38
`Loose Source Routing Option . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-45
`Strict Source Routing Option
`. . . . . . . . . : . . . . . : . . . . . . . . . . . 2-46
`Record Route Option
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-46
`Internet Times tamp Option
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4 7
`Direct and Indirect IP Routes
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 2-49
`Example IP Routing Table
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-50
`. .... ........... . . ........ ...... 2-51
`IP Routing Algorithm
`Internet Control Message Protocol (ICMP)
`. . . . . . . . . . . . . . . . . . 2-52
`ICMP Message Format
`. . ................. .. .... . .. .. ·. . 2-53
`ICMP Destination Unreachable
`. . . . . . . . . . . . . . . . . . . . . . . . . . 2-55
`ICMP Fragmentation Required with Link MTU
`. . . . . . . . . . . . . . . 2-56
`ICMP Source Quench . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-56
`ICMP Redirect
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-57
`ICMP Echo and Echo Reply ............................ 2-57
`ICMP Router Advertisement
`. . . . . . . . . . . . . . . . . . . . . . . . . . . 2-58
`ICMP Router Solicitation
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-58
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-59
`ICMP Time Exceeded
`ICMP Parameter Problem
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-60
`ICMP Timestamp Request and Timestamp Reply
`. . . . . . . . . . . . . . 2-60
`ICMP Information Request and Information Reply
`. . . . . . . . . . . . . 2-61
`. . . . . . . . . . . . . . . . . . . . 2-61
`ICMP Address Mask Request and Reply
`
`~ Copyright IBM Corp. 1989, 1995
`
`xi
`
`INTEL Ex.1028.016
`
`

`

`2-37. Packet InterNet Groper (PING) .. ..................... . .. 2-63
`2-38.

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket