throbber

`
`
`
`Delivering Voice over
`IP Networks
`
`Second Edition
`
`DANIEL MINOLI
`EMMA MINOL!
`
`Wiley Publishing, Inc.
`
`Page 1 of 14
`
`Samsung Exhibit 1031
`
`Page 1 of 14
`
`Samsung Exhibit 1031
`
`

`

`Publisher: Robert Ipsen
`Editor: Margaret Eldridge
`Assistant Editor: Adaobi Obi
`Managing Editor: Angela Smith
`New Media Editor: Brian Snapp
`Text Design & Composition: North Market Street Graphics
`
`Designations used by companiesto distinguish their products are often claimed as trade-
`marks, In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names
`appearin initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro-
`priate companies for more complete information regarding trademarks andregistration.
`
`This text is printed on acid-free paper.
`
`Copyright © 2002 by Dan Minoli, Emmanuelle Minoli, All rights reserved.
`
`Published by Wiley Publishing, Inc., Indianapolis, Indiana
`
`Published simultaneously in Canada.
`
`Nopart of this publication may be reproduced, stored in a retrieval system or transmitted in
`any form or by any means, electronic, mechanical, photocopying, recording, scanning or
`otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy-
`right Act, without either the prior written permission of the Publisher, or authorization
`through payment of the appropriate per-copyfee to the Copyright Clearance Center, 222
`Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to
`the Publisher for permission should be addressed to the Legal Department, Wiley Publishing,
`Inc., 10475 Crosspointe Blvd., Indianapolis, IN 46256, (317) 572-3447,fax (317) 572-4447,
`E-mail: permcoordinator@wiley.com.
`
`This publication is designed to provide accurate and authoritative information in regard to
`the subject matter covered.It is sold with the understanding that the publisheris not
`engaged in professional services. If professional advice or other expert assistance is required,
`the services of a competent professional person should be sought.
`
`Library ofCongress Cataloging-in-Publication Data:
`
`Minoli, Daniel
`Delivering voice over IP networks / Dan Minoli, Emma Minoli— 2nd ed.
`p.cm.
`ISBN 0-471-38606-5
`1. Internet telephony. 2. TCP/IP (Computer network protocol). 3. Digital telephone
`systems. 4. Computer networks, 5, Data transmission sytems. I. Minoli, Emma. IL. Title.
`
`TK5105.8865 .M57 2002
`621.385—de21
`
`2002071368
`Wiley also publishes its books in a variety of electronic formats. Some content that appears in
`print may notbeavailable in electronic versions. For more information about Wiley products,
`visit our web site at www.wiley.com.
`
`Printed in the United States of America.
`
`100987654321]
`
`Page 2 of 14
`
`Page 2 of 14
`
`

`

`Contents
`
`xiii
`PREFACE
`XV
`ACKNOWLEDGMENT
`ABOUT THE AUTHORS—xvii
`
`Introduction and Motivation
`Chapter 1:
`1.1
`INrTRopuUCTION
`1
`6
`1.2 DRIVERS FOR VOICE OVERIP
`12
`THE NEGATIVE DRIVERS
`_ 1.3. APPROACHES FOR IP-BASED VOICE SYSTEMS
`VOICE SERVERS APPROACH
`=15
`IP VOICE AND VIDEO PHONES=18
`1.4 THe FurureE
`18
`REFERENCES
`18
`
`14
`
`1
`
`Chapter 2: An Overview of IP, IPOATM, MPLS,
`and RTP
`21
`
`2.1
`2.2
`
`24
`
`21
`INTRODUCTION
`24
`INTERNET PROTOCOL
`THE ROLE OFTHEIP
`IP ROUTING
`26
`IP DATAGRAMS=.29
`SUPPORT OF VOICE AND VIDEO IN ROUTERS
`32
`IP VERSION 6 (IPV6)
`33
`IP over ATM (IPOATM)
`36
`2.3
`2.4 Basic Synopsis OF MPLS
`—=.39
`MPLS FoRWARDING/LABEL-SWITCHING MECHANISM
`MPLS LaBEL-DISTRIBUTION MECHANISM
`43
`2.5 REAL-TIME TRANSPORT PROTOCOL (RTP)
`45
`2.6 RIP Controi Prorocot (RTCP)
`50
`2.7
`STREAM CONTROL ‘TRANSMISSION PRoTocoL (SCTP)
`
`41
`
`52
`
`Page 3 of 14
`
`Page 3 of 14
`
`

`

`(i) Contents
`
`_
`
`54
`2.8 ATM QoS MECHANISMS
`QUALITY OF SERVICE PARAMETERS
`QoS CLAsses
`57
`REFERENCES
`59
`Notes
`61
`
`—
`
`56
`
`co
`
`
`
`63
`
`3.2.
`
`Issues in Packet Voice Communication
`Chapter 3:
`3.1
`INTRODUCTION
`63
`Score
`64
`SUMMARY OF RESULTS
`TRAFFIC MODELS
`66
`INTRODUCTION
`66
`SPEECH EVENTS
`66
`SPEAKER MODELS
`67
`CALL ORIGINATION MODEL=72
`3.3.
`PERFORMANCE CRITERIA
`74
`RESULTS OF SUBJECTIVE STUDIES
`SMOOTHNESS CRITERIA
`76
`3.4 Link MopEL
`78
`79
`INTRODUCTION
`MopeL DESCRIPTION
`3.5 Resutts
`84
`PROPERTIES OF THE DELAY DISTRIBUTION
`FINITE-BUFFER CASE
`86
`EFFECT OF SPEECH MopELS=88
`OPTIMAL PACKET LENGTH
`90
`TRANSIENT BEHAVIOR
`92
`3.6 CONCLUSION
`95
`REFERENCES
`96
`
`65
`
`79
`
`74
`
`84
`
`Chapter 4: Voice Technologies for Packet-Based
`Voice Applications
`101
`101
`4.)
`INTRODUCTION
`101
`GENERAL OVERVIEW OF SPEECH TECHNOLOGY
`WAVEFORM CODING=102
`VocopDING (ANALYSIS/SYNTHESIS) IN THE FREQUENCY DOMAIN—107
`4.2. G.727: ADPCM For PACKET NETWORK APPLICATIONS
`111
`INTRODUCTION
`111
`ADPCM ENCODER PRINCIPLES
`ADPCM DECODER PRINCIPLES
`
`114
`121
`
`Page 4 of 14
`
`Page 4 of 14
`
`

`

`ot
`
`Contents
`
`EXAMPLE OF APPLICATION
`4.3
`REFERENCES
`123
`Notes
`123
`
`123
`
`5.2
`
`Chapter 5: Technology and Standards for Low-Bit-Rate
`Vocoding Methods
`125
`5.1
`INTRODUCTION
`125
`OVERVIEW
`127
`128
`VOCODER ATTRIBUTES
`LINEAR PREDICTION ANALYSIS-BY-SYNTHESIS (LPAS) CopING
`INTRODUCTION TO G.729 AND G.723.1
`133
`DIFFERENTIATIONS
`133
`STANDARDIZATION PRocEsS
`STANDARDIZATION INTERVAL
`5.3 G723.1
`136
`136
`INTRODUCTION
`ENCODER/DECODER
`5.4 G728
`138
`LD-CELP ENcopER
`LD-CELP Decoper
`5.5 G729
`140
`14]
`ENCODER
`143
`DECODER
`145
`5.6 EXAMPLE OF APPLICATIONS
`H.263 VIDEO CODING FOR Low-BIT-RATE COMMUNICATION
`H.324 MULTIMEDIA COMMUNICATION
`146
`H.323 MULTIMEDIA COMMUNICATIONS STANDARD FOR LANs AND ENTERPRISE
`Networks
`148
`REFERENCES
`150
`Nores
`15]
`
`134
`135
`
`136
`
`139
`140
`
`130
`
`145
`
`Chapter 6: Voice over IP and the Internet
`6.1
`INTRODUCTION
`153
`
`6.2. IP/INTERNET BACKGROUND=157
`INTERNET PROTOCOL SUITE
`157
`THE INTERNET
`157
`6.3. VoICE TRANSMISSION AND APPROACHES IN ATM, FRAME RELAY, ANDIP=162
`ATM—162
`FRAME RELAY
`164
`IP
`164
`
`153
`
`Page 5 of 14
`
`Page 5 of 14
`
`

`

`TET
`
`
`
`~=165
`
`ITU-T H.323 Group OF STANDARDS
`STREAMING AUDIO
`166
`6.4 QoS PROBLEMS AND SOLUTIONS~—167
`6.5
`PROTOCOLS FOR QOS SupporT FOR AUDIO AND VIDEO APPLICATIONS
`RSVP APPLICATIONS
`169
`IP Mutricast
`17]
`INTERNET TELEPHONY SERVERS (ITSs)
`6.6
`THE VOICE OVER JP/INTERNET MARKET
`6.7
`6.8 VOIP REGULATORY [ssuES
`177
`6.9
`CONCLUSION
`180
`REFERENCES
`18]
`Notes
`18]
`
`172
`177
`
`183
`
`Chapter 7: Signaling Approaches
`7.1
`INrropuUCTION
`183
`
`7.2. SIGNALING IN CIRCUIT-SWITCHED NETWORKS=187
`7.3. H.323 STANDARDS
`189
`FUNCTIONAL ELEMENTS
`H.323 Basics
`190
`EXAMPLE OF SIGNALING
`7.4 MGCP
`202
`7.5
`SIP
`207
`SIP PROTOCOL COMPONENTS
`SIP-T
`210
`215
`7.6 OTHER IETF SIGNALING EfrorTs
`PINT AND SPIRITS=215
`ENUM 218
`TRIP
`219
`7.7 MEGACO
`219
`221
`7.8
`SIGTRAN PROTOCOLS
`PERFORMANCE CONSIDERATIONS FOR CCSS7 OVER IP
`SECURITY REQUIREMENTS FOR CCSS7 OVER IP
`SCTP Use In CCSS7
`223
`226
`TRANSPORTING MTP OVER IP
`TRANSPORTING SCCP OVER IP=229
`7.9
`SCTP
`230
`230
`INTRODUCTION
`230
`MotIvaTION
`ARCHITECTURAL VIEW OF SCTP—-230
`FUNCTIONAL VIEW OFSCTP=231
`Key TERMS
`236
`SERIAL NUMBER ARITHMETIC
`
`189
`
`196
`
`209
`
`236
`
`Page 6 of 14
`
`Page 6 of 14
`
`

`

`=239
`SCTP PACKET ForMAT
`SCTPASSOCIATION STATE DIAGRAM—-.258
`ASSOCIATION INITIALIZATION
`260
`UseR DATA TRANSFER
`262
`TERMINATION OF AN ASSOCIATION
`REFERENCES
`276
`Notes
`277
`
`273
`
`
`
`Chapter 8: Quality of Service
`8.1
`INTRODUCTION
`279
`8.2
`BACKGROUND
`281
`284
`8.3. QoS APPROACHES
`PER-FLow QoS=284
`CLass-BASED QOS=.288
`MPLS-BaseD QoS=289
`"TRAFFIC MANAGEMENT/QUEVE MANAGEMENT=291
`8.4 QoS Derans
`294
`IETF INTSERV APPROACH=.294
`IETF DIFFSERV APPROACH==305
`ADDITIONAL DETAILS ON QUEUE MANAGEMENT=320
`CONCLUSION
`326
`8.5 CAsE STUDY
`327
`REAL-TIME SERVICE REQUIREMENTS
`TECHNICAL CHALLENGES
`330
`Cisco SOLUTIONS FOR SUPPORTING IP-BASED REAL-TIME SERVICES
`REFERENCES
`340
`Notes
`342
`
`279
`
`327
`
`330
`
`Chapter 9: Voice over MPLS and Voice overIP
`over MPLS
`343
`
`343
`
`INTRODUCTION AND BACKGROUND
`9.1
`9.2. Motivations
`344
`349
`9.3.
`BASIC MPLS Features
`MPLS FoRWARDING/LABEL-SWITCHING MECHANISM
`MPLS LABEL-DISTRIBUTION MECHANISM
`356
`OTHER FEATURES
`358
`COMPARISON
`359
`9.4 QoS CapaBiLiries
`363
`INTRODUCTION
`365
`DETAILS
`368
`
`353
`
`Page 7 of 14
`
`Page 7 of 14
`
`

`

`370
`9.5 Vorce APPLICATIONS
`371
`IP HEADER COMPRESSION
`372
`VOIPOMPLS ProrosaAL
`MPLSForuM SPECIFICATION
`REFERENCES
`375
`Notes
`376
`
`374
`
`
`
`377
`
`10.4.
`
`Chapter 10: Telephone Number Mapping (ENUM)
`10.1
`INTRODUCTION
`377
`10.2)
`BACKGROUND
`379
`
`10.3. INTRODUCTION TO ENUM—383
`ENUM: AN EVOLVING ARCHITECTURE
`385
`DEFINING ENUM ApPLicATIONS
`387
`THE ENUM Roap To Success
`389
`SUMMARY OF CAPABILITIES AND IssuES
`390
`CAPABILITIES
`390
`Apvocacy
`397
`10.5 NUMBER PORTABILITY
`Types OF NP
`400
`SPNP SCHEMES
`401
`DATABASE QUERIES IN THE NP ENVIRONMENT=405
`CALL ROUTING IN THE NP ENVIRONMENT
`408
`NP IMPLEMENTATIONS FOR GEOGRAPHIC E,164 NuMBERS
`NP-ENABLED NUMBER CONSERVATION METHODS
`41]
`CONCLUSION
`414
`10.6 E.164 NuMBERS AND DNS
`INTRODUCTION
`417
`417
`E.164 NUMBERS AND DNS
`FETCHING UNIFORM RESOURCE IDENTIFIERS (URIs) GIVEN AN E.164 NUMBER
`IANA CoNnsIDERATIONS
`420
`SECURITY CONSIDERATIONS
`420
`10.7. APPENDIX TO THE RFC 2916 ScENARIO
`REFERENCES
`422
`Notes
`424
`
`398
`
`417
`
`421
`
`41]
`
`418
`
`Chapter 11: Carrier Applications
`11.1
`INTRODUCTION AND OPPORTUNITIES
`427
`11.2. WHERE THE ACTION SHOULD BE
`432
`11.3.
`CARRIER Voice NeTworKS
`439
`
`427
`
`Page 8 of 14
`
`Page 8 of 14
`
`

`

`a amenaae
`
`Contents ()
`
`446
`11.4 DEPLOYMENT AND Issues
`450
`WIRELESS Networks
`CABLE TELEPHONY NETWORKS
`ENTERPRISE APPLICATIONS
`465
`11.5
`INTERNATIONAL OPPORTUNITIES
`11.6
`EQUIPMENT/VENDOR TRENDS
`11.7
`REFERENCES
`473
`Notes
`474
`
`458
`
`466
`469
`
`INDEX
`
`477
`
`Page 9 of 14
`
`Page 9 of 14
`
`

`

`transport portion based on ATM, POS, MPLS,and Ethernet. Media plane protocols
`are covered in this chapter; signaling plane protocols are covered in Chapter 7; and
`QoS protocols are covered in Chapter 8.
`This chapter covers the following issues that will play a role in voice over data
`networks:
`
`IP and IPv6 [4, 5]
`e IP over ATM
`
`e MPLS
`
`e RTP
`
`e Stream Control Transmission Protocol (SCTP)
`
`2.2
`
`Internet Protocol
`
`This section highlights key IP functionability and capabilities.
`
`The Role of the IP
`TCP/IP is the namefor a family of communications protocols used to support
`internetting in enterprise and interenterprise applications. Protocols include the
`Internet Protocol (IP), the Transmission Control Protocol (TCP), the User Data-
`gram Protocol (UDP), and other protocols that support specific tasks, such as
`transferring files between computers, sending mail, or logging into another com-
`puter. TCP/IP protocols are normally deployed in layers, with each layer responsi-
`ble for a different facet of the communications. Eachlayer has a different
`responsibility.
`
`1. The link layer (sometimes called the network interface layer) normally
`includes the device driver in the operating system and the corresponding
`networkinterface card in the computer. Together they handle all the hard-
`ware details of physically interfacing with thecable.
`2. The network layer (sometimescalled the internet layer) handles the move-
`mentof packets in the network. Routing of packets, for example, takes
`place here. IP provides the networklayer in the TCP/IP protocolsuite.
`3. The transport layer provides a flow of data between two end system hosts
`for the application layer above. In the Internet protocol suite there are two
`transport protocols, TCP and UDP. TCPprovidesa reliable flow of data
`between twohosts. It is concerned with such things aspartitioning the data
`passed to it from the application into appropriately sized framesfor the net-
`worklayer below, acknowledging received packets, and setting time-outs to
`
`Page 10 of 14
`
`Page 10 of 14
`
`

`

`AnOverviewofIP,IPOATM,MPLS,andRTP(@)-
`
`makecertain that the other end acknowledges packets that are sent. Because
`this reliable flow of data is provided by the transport layer, the application
`layer can ignore all those details. UDP, on the other hand, provides a much
`simpler service to the application layer. It sends packets of data called data-
`grams from one host to the other, but there is no guarantee that the data-
`grams will be delivered to the other end. Any desired reliability must be
`added by the applicationlayer.
`4. The application layer handles the details of the particular application. There
`are many common TCP/IPapplications that almost every implementation
`provides:
`° Telnet for remote login
`° Thefile transfer protocol (FTP)
`¢ The Simple Mail Transfer Protocol (SMTP) for e-mail
`® The Simple Network Management Protocol (SNMP)
`© Others
`
`In this architecture,TCP is responsible for verifying the correct delivery of
`data from the sender to the receiver.TCP allows a process on one end system to
`reliably send a stream of data to a process on another end system. It is connection-
`oriented: Before transmitting data, participants mustestablish a connection. Data
`can be lost in the intermediate networks. TCP adds support to detect lost data and
`to trigger retransmissions until the data is correctly and completely received.
`IP is responsible for relaying packets of data [protocol data units (PDU)] from
`node to node. IP provides the basis for connectionless best-effort packet delivery
`service. IP’s job is to move—specifically to route—blocks of data over each of the
`networks thatsit between the end systems that want to communicate. IP provides
`for the carriage of datagrams from a source host to destination hosts, possibly pass-
`ing through one or more gateways (routers) and networks in the process. An IP
`protocol data unit (datagram) is a sequence offields containing a header and a pay-
`load. The header information identifies the source, destination, length, and charac-
`teristics of the payload contents, The payload is the actual data transported. Both
`end system hosts and routers in an internet are involved in the processing of the IP
`headers. The hosts must create and transmit them and process them on receipt; the
`routers must examine them for the purpose of making routing decisions and mod-
`ify them (e.g., update somefields in the header) as the IP packets make their way
`from the source to the destination.
`IP protocols are supported overa variety of underlying media, such as ATM,
`framerelay, dedicated lines, ISDN, Ethernet, DSL, and so forth. As IP networks
`have become ubiquitous, the business community has become sophisticated about
`utilizing IP networks as a cost-effective corporate tool, first in data communica-
`tions and nowforotherreal-time applications. Organizations favor networks based
`
`Page 11 of 14
`
`Page 11 of 14
`
`

`

`
`
` AATRERTTART
`
`on IP because of theflexibility and vendor support. IP networks run under the
`most widely used networkoperating systems; they are scaleable to a large degree;
`and they enjoy extensive implementation across productlines (e.g., in the routers,
`PCclients, server switches, etc.). As noted, a relatively new IP application now in
`demandis toll-quality, low-bandwidth voice (and fax) transmission over IP net-
`works,
`Intranets use the same WWW/HTML/HTTPand TCP/IP technology used for
`the Internet. Whenthe Internet caught onin the early to mid-1990s, planners
`were not lookingat it as a way to run their businesses. But just as the action of
`putting millions of computers around the world on the sameprotocolsuite
`fomented the Internet revolution, so connectingislands of information in a corpo-
`ration via intranets is now sparking a corporate-based information revolution.
`Thousands of corporations now haveintranets. Across the business world, employ-
`ees from engineers to office workers are creating their own homepages and shar-
`ing details of their projects with the rest of the company.
`
`IP Routing
`Oneof the common waysto interconnect LANs and subnetworksat this timeis
`through the use ofrouters. Routers are found at the boundary points between two
`logical or physical subnetworks. Routing is a more sophisticated—and, hence, more
`effective—methodof achieving intemetworking, as compared to bridging. In the-
`ory, a router or, more specifically, a network layer relay, can translate between a
`subnetwork with a physical layer protocol P1, a data link layer protocol DL1, and a
`network layer protocol N1 to a subnetwork with a physical layer protocol P2, a
`data link layer protocol DL2, and a network layer protocol N2. In general, how-
`ever, a router is used for internetworking two networks or subnetworks that use
`the same networklayer but have different data link layer protocols [6-8] (see Fig-
`ure 2.2).
`Routers have become the fundamental and the predominant building technol-
`ogy for data internetworking; however, ATM technology will likely impact the
`overall outlook. Routers permit the physical as well as the logical interconnection
`of two networks, Routers support interconnection of LANs over WANsusingtra-
`ditional as well as new services, including frame relay and ATM. Somerouters
`operate directly over synchronousoptical network (SONET). Theyalso are uti-
`lized to interconnect dissimilar LANs, such as Token Ring to Ethernet. With the
`introduction of Layer 2 switching, ATM, and/or MPLS, however, therole of
`routers in enterprise networks could changeslightly. For example, devices enabling
`connectivity between locations based on router technology may, conceivably, no
`longer be obligatory elements—but the conceptof routing (forwarding frames at
`the network layer of the protocol model) will certainly continue to éxist. In addi-
`tion, routers work well for traditional data applications, but new broadband video
`and multimedia applications need different forwarding treatment, higher through-
`put, and tighter QoS control.
`
`Page 12 of 14
`
`Page 12 of 14
`
`

`

`
`
`Voice over IP and the Internet
`‘BGPPNSTIRETERSRTREa aTITETTT
`
`SRE
`
`
`6.2
`
`IP/Internet Background
`
`Network communications can be categorized into twobasic types, as implied in
`Chapter 2:circuit-switched (sometimes called connection-oriented) and packet- or
`fastpacket-switched (these can be connectionless or connection-oriented). Circuit-
`switched networks operate by forming a dedicated connection (circuit) between
`two points. In packet-switched networks, data to be transferred across a network is
`segmented into small blocks called packets [also called datagrams or protocol data
`units (PDUs)] that are multiplexed onto high-capacity intermachine connections.
`A packet, which usually contains a few hundred bytesof data, carries identification
`that enables the network hardware to know how tosendit forward to the specified
`destination, In framerelay, the basic transfer unit is the data link layer frame; in cell
`relay, this basic unit is the data link layercell. Services such as frame relay and
`ATM usecircuit-switching principles; namely, they use a call setup mechanism
`similar to that of a circuit-switched (ISDN)call, IP has becomethe de facto stan-
`dard connectionless packet network layer protocol for both local area networks
`(LANs) and wide area networks (WANs). In a connectionless environmentthereis
`no call setup. Each packet finds its way across the network independently of the
`previous one.
`
`Internet Protocol Suite
`Chapter 2 provided a basic review of the TCP/IP and UDP/IP suite of networking
`protocols, TCP/IP is a family of over 100 data communications protocols used in
`the Internet and in intranets. In addition to the communication functions sup-
`ported by TCP (end-to-endreliability over a connection-oriented session) and IP
`(subnetwork-level routing and forwarding in a connectionless manner), the other
`protocols in the suite support specific application-orientedtasks, for example,
`transferring files between computers, sending mail, or logging into a remote host.
`TCP/IP protocols support layered communication, with each layer responsible for
`a different facet of the communications(as seen in Table 6.2). Some of the VOIP
`applications utilize TCP, while others utilize RTCP and UDP.
`
`The Internet
`The sameIP technology now used extensively in corporate internetsis also used in
`(and,in fact, originated from) the Internet. The Internet is a global collection of
`interconnected business, government, and education computer networks—in effect,
`a network of networks, Recently there has been a near-total commercialization of the
`Internet, allowing it to be used for pure business applications (the original roots of
`the Internet were in the research and education arenas), A person at a computer ter-
`minal or personal computer equipped with the proper software communicates
`across the Internet by having the driver place the data in an IP packet and addressing
`
`Page 13 of 14
`
`Page 13 of 14
`
`

`

`2g
`
`__ChapterSix
`
`Haai
`i
`i !
`t
`F
`y
`e
`E
`i eT EEAIhr A adIPCSTSOa ai al ele 9p ce at
`
`RTTP AS
`
`Table 6.2 Functionality of the TCP/IP Suite Layers
`
`Network interface
`layer
`
`Network layer
`(Internet layer)
`
`This layer is responsible for accepting and transmitting
`IP datagrams. This layer may consist of a device driver
`(eg., when the network is a local network to which the
`machine attaches directly) or of a complex subsystem
`that uses its owndata link protocol.
`This layer handles communication from one machine to
`the other. It accepts a request to send data fromthe
`transport layer, along with the identification of the
`destination, It encapsulates the transport layer data
`unit in an JP datagram and uses the datagram routing
`algorithm to determine whether to send the datagram
`directly onto a router. The internetlayer also handles
`the incoming datagrams anduses the routing algo-
`rithm to determine whether the datagram is to be
`processed locally or be forwarded.
`In this layer the software segments the stream of data
`being transmitted into small data units and passes each
`packet, along with a destination address, to the next
`layer for transmission. The software adds information
`to the packets, including codes that identify which
`application program sentit, as well as a checksum.
`This layer also regulates the flow of information and
`providesreliable transport, ensuring that data arrives in
`sequence and with no errors.
`At this level, users invoke application programs to
`access available services across the TCP/IP internet.
`The application program chooses the kind of transport
`needed, which can be either messages or stream of
`bytes, and passes it to the transportlevel.
`
`Transport layer
`
`Application layer
`
`the packet to a particular destination on the Internet. Communications softwarein
`routers in the intervening networks between the source and destination networks
`reads the addresses on packets moving through the Internet and forwards the pack-
`ets toward their destinations.TCP guarantees end-to-endintegrity.
`From a thousand or so networks in the mid-1980s, the Internet has grown to
`an estimated 100 million connected network hosts with about 300 million people
`having accessto it (as of 2001). The majority of these Internet users currently live
`in the United States or Europe, but the Internetis expected to have ubiquitous
`global reach over the next few years.
`In 1973, ARPAinitiated a research program to investigate techniques and tech-
`nologies for interlinking packet networks ofvarious kinds. The objective was to
`develop communication protocols that would allow networked computers to com-
`municate transparently across multiple packet networks. The project became very
`successful and there was increasing demandto use the network, so the government
`separated military traffic from civilian research traffic, bridging the two by using
`
`Page 14 of 14
`
`Page 14 of 14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket