throbber

`
`
`
`Delivering Voice over
`IP Networks
`
`Second Edition
`
`DANIEL MINOLI
`
`EMMA MINOLI
`
`Wiley Publishing, Inc.
`
`Page 1 of 14
`
`Samsung Exhibit 1031
`
`Page 1 of 14
`
`Samsung Exhibit 1031
`
`

`

`Publisher: Robert lpsen
`Editor: Margaret Eldridge
`Assistant Editor: Adaohi Obi
`
`Managing Editor: Angela Smith
`New Media Editor: Brian Snapp
`Text Design 8:. Composition: North Market Street Graphics
`
`Designations used hy companies to distinguish their products are often claimed as trade-
`marks in all instances where John Wiley & Sons, Inc, is aware of a daim, the product names
`appear in initial. capital or ALL CAPITAL LETI‘ERS. Readers, however, should contact the appro—
`priate companies for more complete information regarding trademarks and registration.
`
`This text is printed on acid~free paper.
`
`Copyright © 2002 by Dan Minoli, Emmanuelle Minna. All rights reserved.
`
`Published by Wiley Publishing, lnc., Indianapolis, lndiana
`
`Published simultaneously in Canada.
`
`No part of this publication may be reproduced, stored in a retrieval system or transmitted in
`any Form or by any means, eiectronic, mechanical, photocopying, recording, scanning or
`otherwise, except as permitted under Sections 107 or 108 of the 1975 United States Copy-
`right Act, without either the prior written permission ofthe Publisher, or authorization
`through payment of the appropriate per—copy fee to the Copyright Clearance Center, 222
`Rosewood Drive, Danvers, MA 01923, (978] 750—8400, fax (978} 750-4744. Requests to
`the Publisher for permission should he addressed to the Legal Department, Wiley Publishing,
`Inc., 10475 Crosspointe Blvd, Indianapolis, lN 45256, (317] 572—3447, 51x81?) 57214447,
`E-mail: permcoordinator@wiley.com.
`
`This pohlication is designed to provide accurate and au Lhoritative information in regard to
`the subject matter covered. it is sold with the understanding that the pubiisher is not
`engaged in professional services. If professional advice or other expert assistance is required,
`the services of a competent professional person should be sought.
`
`Library ofCangres-s Cataloging~in-Publication Dara:
`
`Minoli, Daniel
`Delivering voice over 1'? networks I Dan Minoli, Emma Minoii.— 2nd ed.
`p. cm.
`ISBN 0—471—38606—5
`1. Internet telephony. 2. TCPIIP (Computer network protocol]. 3. Digital! telephone
`systems. 4. Computer networks. 5. Data transmission syterns. I. Minoli, Emma. 11. Title.
`
`TKS] 05.3865 .M57 2002
`621.385—chi
`
`Wiley also publishes its books in a variety of electronic Formats. Some content that appears in
`print may not be available in electronic versions. For more information about \Nilegr products,
`visit our web site at nwutwileyeorn.
`
`2002071358
`
`Printed in the United States of America.
`
`[098765432]
`
`Page 2 of 14
`
`Page 2 of 14
`
`

`

`contents
`
`xiii
`PREFACE
`ACKNOWLEDGMENT
`ABOUT THE AUTHORS
`
`XV
`xvii
`
`Introduction and Motivation
`Chapter 1:
`1.1
`INTRODUCTION
`1
`1.2 DRIVERS FOR VOICE OVER IP
`THE NEGATIVE DRIVERS
`
`6
`12
`
`1
`
`_ 1.3 APPROACHES FOR IP-BASED VOICE SYSTEMS
`VOICE SERVERS APPROACH
`15
`IP VOICE AND VIDEO PHONES
`1.4 THE FUTURE
`18
`REFERENCES
`18
`
`18
`
`14
`
`Chapter 2: An Overview of IP, IPOATM, MPLS,
`and RTP
`21
`
`2.1
`2.2
`
`21
`INTRODUCTION
`24
`IN'I‘ERNETPROTOCOI.
`THE ROLE OF THE IP
`IP ROU'I‘ING
`26
`29
`IP DRI‘AORAMS
`SUPPORT OF VOICE AND VIDEO 1N ROUTERS
`
`24
`
`32
`
`33
`IP VERSION 6 [IPV6)
`36
`23 IP OVER ATM (IPOATM)
`39
`2.4
`BASIC SYNOPSIS OF MPLS
`MPLS FORWARDINOXLAEEL—SWITCHING MECHANISM
`MPLS LABEL-DISTRIBUl‘lON MECHANISM
`43
`
`41'
`
`REAL—TIME TRANSPORT PROTOCOL (RTP)
`2.5
`2.6 RTP CONTROL PROTOCOL [RTCP)
`50
`2.7
`STREAM CONTROL TRANSMISSION PRO'I‘OCOL [S CTP)
`
`45
`
`52
`
`Page 3 of 14
`
`Page 3 of 14
`
`

`

`65
`
`Y9
`
`72
`
`?4
`
`3.3
`
`3.5
`
`Issues in Packet Voice Communication
`Chapter 3:
`3.1
`INTRODUCTION
`63
`SCOPE
`64
`SUMMARY OF RESULTS
`3.2 TRAPPIC MODELS
`66
`INTRODUCTION
`66
`SPEECH EVENIS
`66
`SPEAKER MODELS
`67
`CALL ORIGINA‘I‘ION MODEL
`PEIGORMANCE CRITERIA
`74
`RESULTS OF SUBJECTWE STUDIES
`SMOO’I‘HNESS CRITERLA
`76
`3.4 LINKMODEL
`7'8
`79
`INTRODUCTION
`MODEL DESCRIPTION
`RESULTS
`84
`PROPERTIES OF THE DELAY DISTRIBUTION
`FINITE-BUFEER CASE
`86
`EFFECT OP SPEECH MODELS
`OPTIMAL PACKET LENGTH
`TRANSIENT BEHAVIOR
`92
`3.6 CONCLUSION
`95
`REFERENCES
`96
`
`® (3011:3an
`
`54
`2.8 ATM QOS MECHANISMS
`QUALITY OF SERVICE PARAME‘I‘BRS
`QOS CLASSES
`57
`REFERENCES
`59
`NOTES
`61
`
`_
`
`_
`
`56
`
`
`
`63
`
`84
`
`88
`90
`
`Chapter 4: Voice Technologies for Packet~Based
`Voice Applications
`101
`101
`4.1
`INTRODUCTION
`GENERAL OVERVIEW OF SPEECH TECHNOLOGY
`WAVEPOIUvI CODING
`102
`
`101
`
`4.2
`
`VOCODINO (ANALYSIS/SYNTHESIS] INTI-1E FREQUENCY DOMAIN
`(3.727: ADPCM FOR PACKET NETWORK APPLICATIONS
`111
`INTRODUCTION
`1 11
`ADPCM ENCODER PRINCIPLES
`ADPCM DECODER PRINCIPLES
`
`114
`12]
`
`107
`
`Page 4 of 14
`
`Page 4 of 14
`
`

`

`r
`
`:5
`
`. -.
`
`.:- :..- : ..-w1-.-..~ : —_7.-.-.m:.T:—:r:'r::v.-..rr.=v: .-.
`
`.
`
`Contents
`
`EXAMPLE OF APPLICATION
`4.3
`REFERENCES
`123
`NOTES
`123
`
`123
`
`Chapter 5: Technology and Standards for Low—Bit—Rate
`Vocoding Methods
`125
`5.1
`INTRODUCTION
`125
`OVERVIEW
`127’
`VOCODER ATTRIBUTES
`
`128
`
`134
`135
`
`136
`
`139
`140
`
`130
`
`145
`
`5.2
`
`5.3
`
`5.4
`
`5.5
`
`LINEAR PREDICTION ANALYSIS-BY—SYNTHESIS [LPAS) CODING
`INTRODUCTION TO G729 AND G.723.1
`133
`DIPPEREN'I‘IKTIONS
`133
`STANDARDIZATION PROCESS
`STANDARDIMPION INTERVAL
`(1723.1
`136
`136
`INTRODUCTION
`ENCODER/DECODER
`(3.728
`138
`LD—CELP ENCODER
`LD-CELP DECODER
`(3.729
`140
`141
`ENCODER
`143
`DECODER
`145
`5.6 EXAMPLE OF APPLICATIONS
`H.263 VIDEO CODING FOR LOW—Brr—RATE COMMUNICATION
`H.324 MULTIMEDIA COMMUNICATION
`146
`H.323 MULTIMEDLA COMMUNICKI‘IONS STANDARD POR LANS AND ENTERPRISE
`NETWORKS
`148
`REFERENCES
`150
`NOTES
`151
`
`Chapter 6: Voice over IP and the Internet
`6.1
`INTRODUCTION
`153
`157
`6.2
`IP/INTERNET BACKGROUND
`ENTERNET PROTOCOL SUITE
`THE INTERNET
`157
`
`157
`
`153
`
`6.3 VOICE TRANSMISSION AND APPROACHES IN ATM, FRAME REIAY, AND [P
`ATM 162
`FRAME RELAY
`IP
`164
`
`164
`
`162
`
`_ Page 5 of 14
`
`Page 5 of 14
`
`

`

`Contents
`
`.-._«.«. ---_-.= \Tzwow‘
`
`[TU—T H3 23 GROUP OF STANDARDS
`STREAMING AUDIO
`166
`
`165
`
`6.4
`
`5.5
`
`QoS PROBLEMS AND SOLUTIONS
`167
`PROTOCOLS FOR QOS SUPPORT FOR AUDIO AND VIDEO APPLJCA'I‘IONS
`RSVP APPLICATIONS
`169
`IP MUITICAST
`17']
`
`169
`
`INTERNET TELEPHONY SERVERS (ITSS)
`6.6
`THE VOICE OVER IP/INTERNET MARKB'I‘
`6 .7
`6.8 VOIP REGUIATORY ISSUES
`177
`6.9
`CONCLUSION
`180
`REFERENCES
`181
`NOTES
`181
`
`172
`177
`
`
`
`183
`
`187
`
`189
`
`196
`
`209
`
`215
`
`Chapter 7: Signaling Approaches
`7.1
`INTRODUCTION
`183
`7.2
`SIGNALING IN CIRCUITLSWITCHED NETWORKS
`7.3
`H.323 STANDARDS
`189
`FUNCTIONAL ELEMENTS
`H.323 BASICS
`190
`EXAMPLE OF SIGNALING
`MGCP
`202
`SIP
`207
`SIP PROTOCOL COMPONENTS
`SIP-T
`210
`OTHER IETF SIGNALING EFFORTS
`PINT AND SPIRITS
`215
`ENUM 218
`TRIP
`219
`MEGACO
`219
`221
`SIOTRAN PROTOCOLS
`PERFORMANCE CONSIDERA’HONS FOR CCSS7 OVER IP
`223
`
`7.4
`7.5
`
`7.6
`
`7.7
`7.8
`
`7.9
`
`Page 6 of 14
`
`223
`
`SECURITY REQUIREMENTS 1:011 CCSS? OVER IP
`SCTP USE IN CCSS7
`223
`TRANSPORTINO MTP OVER IP
`TRANSPORTINO SCCP OVER 1?
`SCTP
`230
`230
`INTRODUCTION
`230
`MOTIVA'I‘ION
`ARCHITEC'I‘URAL VIEW OF SCTI’
`FUNCTIONAL VIEW OF SCTP
`KEY 'I‘ERMS
`236
`SERIAL. NUMBER ARI'I‘HMB‘I‘IC
`
`226
`229
`
`230
`
`231
`
`236
`
`Page 6 of 14
`
`

`

`
`
`239
`SC'l‘P PACKET FORMAT
`SCTP ASSOCIATION STATE DIAGRAM
`ASSOCIATION INITIALIZATION
`260
`USER DATA TRANSFER
`262
`TERMINATION OF AN ASSOCIA‘I'ION
`REFERENCES
`276
`NOTES
`27?
`
`258
`
`273
`
`Chapter 8: Quality Of Service
`8.1
`INTRODUCTION
`279
`8.2
`BACKGROUND
`281
`
`279
`
`284
`8.3 QOS APPROACHES
`284
`PER-FLOW QOS
`288
`CLASS-BASED Q03
`289
`MPLS-BASED QOS
`TRAFFIC MANAGEMEme UEUE MANAGEMENT
`8.4 QOS DETAILS
`294
`IETF INTSERVAIJPROACH
`IETF DIFFSERVAPPROACH
`
`294
`305
`
`29]
`
`ADDITIONAL DETAILS ON QUEUE MANAGEMENT
`CONCLUSION
`326
`CASE STUDY
`327
`
`8.5
`
`320
`
`REAL-TIME SERVICE REQUIREMENTS
`TECHNICAL CHALLENGES
`330
`CISCO SOLUTIONS FOR SUPPORTING IP-BASED REAL-TIME SERVICES
`REFERENCES
`340
`NOTES
`342
`
`32?
`
`330
`
`Chapter 9: Voice over MPLS and Voice over I?
`over MPLS
`343
`
`343
`
`INTRODUCTION AND BACKGROUND
`9.1
`9.2 MO'ITVATIONS
`344
`349
`9.3
`BASIC MPLS FEATURES
`MPLS FORWAROINC/LABEL—SWTTCHING MECHANISM
`MPLS LABEL-DIS'I‘IUBU‘I‘ION MECHANISM
`356
`OTHER FEATURES
`358
`COMPARISON
`359
`
`353
`
`9.4 QDS CAPABILZTIES
`INTRODUCTION
`DETAILS
`368
`
`363
`365
`
`Page 7 of 14
`
`Page 7 of 14
`
`

`

`370
`9.5 VOICE APPLICATIONS
`371
`IP HEADER COMPRESSION
`372
`VOIPOMPLS PROPOSAL
`MPLS FORUM SPECIFICA'I'ION
`REFERENCES
`375
`NOTES
`376
`
`374
`
`
`
`377
`
`385
`
`390
`
`Chapter 10: Telephone Number Mapping (ENUM)
`10.]
`INTRODUCTION
`377
`10.2
`BACKGROUND
`379
`10.3
`INTRODUCTION TO ENUM 383
`ENUM: AN EVOLVING ARCHITECTURE
`DEFINING ENUM APRIJCA'I‘IONS
`387
`THE ENUM ROAD TO SUCCESS
`389
`SUMMARY OF CAPABILITIES AND ISSUES
`CAPABILITIES
`390
`ADVOCACY
`397
`10.5 NUMBER POR’I‘ABIIJTY
`TYPES OE NP
`400
`SPNP SCHEMES
`401
`
`10.4
`
`398
`
`405
`
`DATABASE QUERIES IN THE N 1‘ ENVIRONMENT
`CALL ROUTING IN THE NP ENVIRONMENT
`408
`N? IMPLEMENTA'I‘IONS FOR GEOGRAPHIC E.164 NUMBERS
`NP~ENABLED NUMBER CONSERVATION METHODS
`41]
`CONCLUSION
`414
`13.164 NUMBERS AND DNS
`INTRODUCTION
`417
`13.164 NUMBERS AND DNS
`
`417
`
`417
`
`10.6
`
`41}
`
`FE'I‘CHING UNIFORM RESOURCE IDEN'I‘IEIERS (URIS) GIVEN AN E164 NUMBER
`[ANA CONSIDERATIONS
`420
`SECURITY CONSIDERATIONS
`420
`10.? APPENDIX TO THE RFC 2916 SCENARIO
`REFERENCES
`422
`NOTES
`424
`
`421
`
`418
`
`Chapter 11: Carrier Applications
`1 1.1
`INTRODUCTION AND OPPORTUNITIES
`427
`11.2 WHERE THE ACTION SHOULD BE
`432
`11.3
`CARRIER VOlCE NETWORKS
`439
`
`427
`
`Page 8 of 14
`
`Page 8 of 14
`
`

`

`Contents ®
`
`_.=......-o....,z::.-. ,
`
`.-.__ ;.\_-.‘2:::;-...:.-.
`
`.- ; .- “r
`
`446
`1 1.4 DEPLOYMENT AND ISSUES
`450
`WIRELESS NETWORKS
`CABLE TELEPI’iONY NETWORKS
`ENTERPRISE APPLICATIONS
`465
`INTERNATIONAL OPPORTUNITIES
`
`11.5
`11.6
`
`458
`
`466
`
`EQUIPMENT/VENDOR TRENDS
`11.7
`REFERENCES
`473
`NOTES
`474
`
`469
`
`INDEX
`
`477
`
`Page 9 of 14
`
`Page 9 of 14
`
`

`

`{WEZA'.'7.\;.'.T>/2...LL.'_.:.:.L.
`Chaprer Two-W
`
`-.-.--:_.-v:-:-.-:‘:.--\:-. ._sr_-:<.g.,_aara-mwrmr-zrzz.amt-"mm:inseam-H's:.-.,.".::.
`
`;
`
`-.-.\-
`
`w; -.
`
`'u\' 7‘:.-_-;..--‘-. a:
`
`.- . ;.-: 2.. —'.:r.‘ .-.\—w.-v..\.-.;v.:.-.
`
`-- rut":
`
`l.
`
`.'_15:.5:‘..J.'.
`
`transport portion based on Am, PO S, MPLS, and Ethernet. Media plane protocols
`are covered in this chapter; signaling plane protocols are covered in Chapter 7; and
`QoS protocols are covered in Chapter 8.
`This chapter covers the following issues that will play a role in voice over data
`networks:
`
`0 IP and IPv6 {4, S]
`' I? over ATM
`
`- MPLS
`
`0 RTP
`
`II Stream Control Transmission Protocol [SCTP)
`
`2.2
`
`Internet Protocol
`
`This section highlights key IP functionability and capabilities.
`
`The Role of the IP
`
`TCP/IP is the name for a family of communications protocols used to support
`lntemetting in enterprise and interenterprise applications. Protocols include the
`Internet Protocol UP], the Transmission Control Protocol ['I‘CP), the User Data-
`gram Protocol [UDP), and other protocols that support specific tasks, such as
`transferring files between computers, sending mail, or logging into another com—
`puter. TCP/IP protocols are normally deployed in layers, with each layer responsi—
`ble for a different facet of the communications. Each layer has a different
`responsibility.
`
`1. The link layer (sometimes called the nemark interface hime normally
`includes the device driver in the operating system and the corresponding
`network interface card in the computer. Together they handle all the hard-
`ware details of physically interfacing with the cable.
`
`2. The network layer (sometimes called the interns: layer] handles the move-
`ment of packets in the network. Routing of packets, for example, takes
`place here. IP provides the network layer in the TCP/IP protocol suite.
`
`3. The transport layer provides a flow of data between two end system hosts
`for the application layer above. In the Internet protocol suite there are two
`transport protocols, TC-P and UDP. TCP provides a reliable flow of data
`between two hosts. It is concerned with such things as partitioning the data
`passed to it from the application into appropriately sized frames for the net-
`work layer below, acknowledging received packets, and setting timeouts to
`
`Page 10 of 14
`
`Page 10 of 14
`
`

`

`._
`
`..
`
`make certain that the other end acknowledges packets that are sent. Because
`this reliable flow of data is provided by the transport layer, the application
`layer can ignore all those details UD P, on the other hand, provides a much
`simpler service to the application layer. It sends packets of data called data-
`grams from one host to the other, but there is no guarantee that the data-
`grams will be delivered to the other end. Any desired reliability must be
`added by the application layer.
`
`4. The application Myer handles the details of the particular application. There
`are many common TCP/IP applications that almost every implementation
`provides:
`
`' Telnet for remote login
`
`- The file transfer protocol [FTP]
`
`‘ The Simple Mail Transfer Protocol [SMTP] for e—m ail
`
`' The Simple Network Management Protocol [SNMP)
`- Others
`
`In this architecture, TCP is responsible for verifying the correct delivery of
`data from the sender to the receiver. ’l‘CP allows a process on one end system to
`reliably send a stream of data to a process on another end system. It is connection—
`oriented: Before transmitting data, participants must establish a connection. Data
`can be lost in the intermediate networks. TCP adds support to detect lost data and
`to trigger retransmissions until the data is correctly and completely received.
`11’ is responsible for relaying packets of data [protocol data units [PDU)] from
`node to node. 1P provides the basis for connectionless best-effort packet delivery
`service. IP'S job is to moveespecifically to routeublocks of data over each of the
`networks that sit between the end systems that want to communicate. 1? provides
`for the carriage of datagrams from a source host to destination hosts, possibly pass-
`ing through one or more gateways [routers] and networks in the process. An IP
`protocol data unit (datagram) is a sequence of fields containing a header and a pay—
`load. The header information identifies the source, destination, length, and charac—
`teristics of the payload contents. The payload is the actual data transported. Both
`end system hosts and routers in an internet are involved in the processing of the 1P
`headers. The hosts must create and transmit them and process them on receipt; the
`routers must examine them for the purpose of making routing decisions and mod—
`ify them [e.g., update some fields in the header) as the 1P packets make their way
`from the source to the destination.
`
`IP protocols are supported over a variety of underlying media, such as ATM,
`frame relay, dedicated lines, ISDN, Ethernet, DSL, and so forth. As IP networks
`have become ubiquitous, the business community has become sophisticated about
`utilizing IP networks as a cost-effective corporate tool, first in data communica-
`tions and now for other real-time applications. Organizations favor networks based
`
`Page 11 of 14
`
`Page 11 of 14
`
`

`

`
`
` .—.-::72:smmwrrnnsmrzzcataz:'\.'='\ \. - “Mr
`
`-
`
`.-
`
`- :: -. z
`
`on IP because of the flexibility and vendor support. IP networks run under the
`most widely used network. operating systems; they are scaleable to a large degree;
`and they enjoy extensive implementation across product lines [e.g., in the routers,
`PC clients, server switches, etc]. As noted, a relatively new IP application now in
`demand is toll'quality, low—bandwidth voice [and fax] transmission over IP net-
`works.
`_
`Intranets use the same WWW/t-ITML/H’ITP and 'l‘CPfIP technology used for
`the Internet. When the Internet caught on in the early to mid-19905, planners
`were not looking at it as a way to run their businesses. But just as the action of
`putting millions of computers around the world on the same protocol suite
`fomented the Internet revolution, so connecting islands of information in a corpo~
`ration via intranets is now sparking a corporate—based information revolution.
`Thousands of corporations now have intranets. Across the business world, employ—
`ees from engineers to office workers are creating their own home pages and sharw
`ing details of their projects with the rest of the company.
`
`iP Routing
`One of the common ways to interconnect LANs and subnetworks at this time is
`through the use of routers. Routers are found at the boundary points between two
`logical or physical subnetworks. Routing is a more sophisticated—and, hence, more
`effective—method of achieving internetworkin g, as compared to bridging. In the—
`ory, a router or, more specifically, a network layer relay, can translate between a
`subnetwork with a physical layer protocol P1, a data link layer protocol BL}, and a
`network layer protocol N] to a subnetwork with a physical layer protocol P2, a
`data link layer protocol DLZ, and a network layer protocol N2. In general, how"
`ever, a router is used for internetworking two networks or subnetworks that use
`the same netw0rk layer but have different data link layer protocols [6H8] (see Fig-
`ure 2.2).
`Routers have become the fundamental and the predominant building technol-
`ogy for data internetworking; however, ATM technology will likely impact the
`overall outlook. Routers permit the physical as well as the logical interconnection
`of two networks. Routers support interconnection of LANs over WANs using tra~
`ditional as well as new services, including frame relay and ATM. Some routers
`operate directly over synchronous optical network (SONET). They also are uti—
`lized to interconnect dissimilar LANs, such as Token Ring to Ethernet. With the
`introduction of Layer 2 switching, ATM, and /or MPLS, however, the role of
`routers in enterprise networks could change slightly. For example, devices enabling
`connectivity between locations based on router technology may, conceivably, no
`longer be obligatory elements—but the concept of routing [forwarding frames at
`the network layer of the protocol model) will Certainly continue to exist. In addi-
`tion, routers work well for traditional data applications, but new broadband video
`and multimedia applications need different forwarding treatment, higher through-
`put, and tighter QoS control.
`
`Page 12 of 14
`
`Page 12 of 14
`
`

`

`us. _ .'.'..'( $sz .- A1I.'.'.\.'.‘.X.'-—"2r.L.‘x'.‘?99:3:IWin-.K'wa-::9=:a:w=.w.7wo.c;:.-.-::;.magsm. :x-:::rzr;=:.z:-:.c.:anzc;:-.-.-..::.::.-x\:-: :::-.-..-:..2: c.
`
`.7. .2._"_';'.Q:'1-_'Ae;W.;fl:2'.m—¢=::z::::2:z'zru—m JLW—"—""‘"" w.-.
`Voice over IP and the Internet
`
`
`
`
`
`6.2
`
`lP/internet Background
`
`Network communications can be categorized into two basic types, as implied in
`Chapter 2: circuit-switched (sometimes called connection—oriented) and packet— or
`fastbaclaemwirched [these can be connectionless or connection—oriented]. Circuit-
`switched networks operate by forming a dedicated connection [circuit] between
`two points. In packet—switched networks, data to be transferred across a network is
`segmented into small blocks called packets [also called datagrams or protocol data
`units [PDUs]] that are multiplexed onto highucapacity intermachine connections.
`A packet, which usually contains a few hundred bytes 01C data, carries identification
`that enables the network hardware to know how to send it forward to the specified
`destination. In frame relay, the basic transfer unit is the data link layer frame; in cell
`relay, this basic unit is the data link layer celL Services such as Jframe relay and
`ATM use circuit—switching principles; namely, they use a call setup mechanism
`similar to that of a circuiteswitched [ISDN] call. I]J has become the de facto stan—
`dard connectionless packet network layer protocol for both local area networks
`[LANS) and wide area networks [WANS). in a connectionless environment there is
`no call setup. Each packet finds its way across the network independently of the
`previous one.
`
`Internet Protocol Suite
`
`Chapter 2 provided a basic review of the TCP/IP and UDPXIP suite of networking
`protocols. TCP/IP is a family of over 100 data cormnunications protocols used in
`the Internet and in intranets. In addition to the communication functions sup—
`ported by TC? [end~to-end reliability over a cormection—oriented session) and IP
`(subnetwork—level routing and forwarding in a connectionless manner], the other
`protocols in the suite support specific application—oriented tasks, for example,
`transferring files between computers, sending mail, or logging into a remote host.
`TCP/IP protocols support layered communication, with each layer responsible for
`a different facet of the communications [as seen in Table 6.2). Some of the VOIP
`applications utilize TCP, while others utilize RTCP and UDP.
`
`The Internet
`
`The same IP technology now used extensively in corporate internets is also used in
`(and, in fact, originated from] the Internet. The Internet is a global collection of
`interconnected business, government, and education computer networks—in effect,
`a network of networks. Recently there has been a near—total commercialization of the
`Internet, allowing it to be used for pure 'business applications [the original roots of
`the Internet were in the research and education arenas). A person at a computer ter~
`minal or personal computer equipped with the proper software communicates
`across the Internet by having the driver place the data in an IP packet and addreming
`
`Page 13 of 14
`
`Page 13 of 14
`
`

`

`9w.- .e_v_: .3: -.. warms:273.:—
`
`..
`
`g;.:’~tungirLTfizr...1.'.:.<;.L'..:':LLL';':' ": ..:
`
`".“';':=-.":'.'£='TT.7.'\E-.T ~.-.-
`
`.. 4-...:.-
`
`-=-_.
`
`..-_. -..:.-....-,-.:.
`
`-
`
`..-_.::., _.:...'.\_':'.-:.zr::'==.-":.'. --. "when -.
`
`\\-,- -..--.;.n:
`
`Table 6.2 Functionality of the TCPIIP Suite Layers
`
`Network interface
`layer
`
`Network layer
`[Internet layer)
`
`Transport layer
`
`Application layer
`
`This layer is responsible for accepting and transmitting
`1P datagrams. This layer may consist of a device driver
`(eg, when the network is a local network to which the
`machine attach es directly] or of a complex subsystem
`that uses its own data link protocol.
`This layer handles communication from one machine to
`the other. It accepts a request to send data from the
`transport layer, along with the identification of the
`destination. It encapsulates the transport layer data
`unit in an IP datagram and uses the datagram routing
`algorithm to determine whether to send the datagram
`directly onto a router. The internet layer also handles
`the incoming datagrm'ns and uses the routing algo-
`rithm to determine whether the datagram is to be
`processed locally or he fonvardecl.
`In this layer the software segments the stream of data
`being transmitted into small data units and passes each
`packet, along with a destination address, to the next
`layer for transmission. The software adds information
`to the packets, including codes that identify which
`application program sent it, as well as a checksum.
`This layer also regulates the flow of information and
`provides reliable transport, ensuring that data arrives in
`sequence and with no errors.
`At this level, users invoke application programs to
`access available services across the TCP/IP internet.
`
`The application program chooses the kind of transport
`neededI which can be either messages or stream of
`
`bytes, and passes it to the transport level.
`
`the packet to a particular destination on the Internet. Communications software in
`routers in the intervening networks between the source and destination networks
`reads the addresses on packets moving through the Internet and forwards the pack—
`ets toward their destinations. TCP guarantees end—to-end integrity.
`From a thousand or so networks in the mid~198[}s, the Internet has grown to
`an estimated 100 million connected network hosts with about 300 million people
`having access to it [as of 2001). The majority of these Internet users currently live
`in the United States or Europe, but the Internet is expected to have ubiquitous
`global reach over the next few years.
`In 1973, ARPA initiated a research program to investigate techniques and tech-
`nologies for interlinking packet networks of various kinds. The objective was to
`develop communication protocols that would allow networked computers to com—
`municate transparently across multiple packet networks. The project became very
`successful and there was increasing demand to use the network, so the government
`separated military traffic from civilian research traffic, bridging the two by using
`
`Page 14 of 14
`
`Page 14 of 14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket