throbber

`
`:-
`THIRD EDITION
`~ COMPUTER NETWORKS
`
`ANDREW S. TANENBAUM
`
` Unified Patents Ex. 1002, pg. 1
`
`Unified Patents Ex. 1002, pg. 1
`
`

`

`Computer Networks
`Third Edition
`
`Andrew S. Tanenbaum
`
`Vrije Universiteit
`Amsterdam, The Netherlands
`
`Se at
`
`For book and bookstore information
`
`http://www.prenhall.com
`
`Prentice Hall PTR
`Upper Saddle River, New Jersey 07458
`
`
`
`Unified Patents Ex. 1002, pg. 2
`
`Unified Patents Ex. 1002, pg. 2
`
`

`

`Library of Congress Cataloging in Publication Data
`Tanenbaum, Andrew S. 1944-.
`Computer networks / Andrew S$. Tanenbaum.-- 3rd ed.
`p.
`cm.
`Includes bibliographical references and index.
`ISBN 0-13-349945-6
`1.Computer networks.
`TK5105.5.T36 1996
`004.6--de20
`
`I. Title.
`
`96-4121
`CIP
`
`Editorial/production manager: Camille Trentacoste
`Interior design and composition: Andrew S. Tanenbaum
`Cover design director: Jerry Votta
`Cover designer: Don Martinetti, DM Graphics, Inc.
`Coverconcept: Andrew S. Tanenbaum, from an idea by Marilyn Tremaine
`Interior graphics: Hadel Studio
`Manufacturing manager: Alexis R. Heydt
`Acquisitions editor: Mary Franz
`Editorial Assistant: Noreen Regina
`
`
`
`© 1996 by Prentice Hall PTR
`Prentice-Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, New Jersey 07458
`Thepublisher offers discounts on this book when orderedin bulk quantities. For more information,
`contact:
`Corporate Sales Department, Prentice Hall PTR, One LakeStreet, Upper Saddle River, NJ 07458.
`Phone: (800) 382-3419; Fax: (201) 236-7141. E-mail: corpsales@ prenhall.com
`
`All rights reserved. No part of this book may be reproduced, in any form or by any means, without
`permission in writing from the publisher.
`
`All product names mentioned herein are the trademarks of their respective owners.
`
`Printed in the United States of America
`1098765 43 2
`«1
`
`ISBN 0-13-349945-6
`
`Prentice-Hall International (UK) Limited, London
`Prentice-Hall of Australia Pty. Limited, Sydney
`Prentice-Hall CanadaInc., Toronto
`Prentice-Hall Hispanoamericana, S.A., Mexico
`Prentice-Hall of India Private Limited, New Delhi
`Prentice-Hall of Japan, Inc., Tokyo
`Simon & Schuster Asia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda., Rio de Janeiro
`
`Unified Patents Ex. 1002, pg. 3
`
`Unified Patents Ex. 1002, pg. 3
`
`

`

`
`
`4
`
`INTRODUCTION
`
`CHAP.|
`
`Client machine
`
`Client
`process
`
`Server machine Server
`
`process
`
`Network
`
`Fig. 1-1. The client-server model.
`The server then does the work and sends back the reply. Usually, there are many
`clients using a small number of servers.
`Another networking goal is scalability, the ability to increase system perfor-
`mance gradually as the workload grows just by adding, more processors. With
`centralized mainframes, when the system is full, it must be replaced by a larger
`one, usually at great expense and even greater disruption to the users. With the
`client-server model, new clients and new servers can be added as needed.
`Yet another goal of setting up a computer network has little to do with tech-
`nology at all. A computer network can provide a powerful communication
`medium among widely separated employees. Using a network,it is easy for two
`or more people wholive far apart to write a report together. When one worker
`makes a change to an on-line document, the others can see the change immedi-
`ately, instead of waiting several days for a letter. Such a speedup makes coopera-
`tion amongfar-flung groups of people easy where it previously had been impossi-
`ble.
`In the long run, the use of networks to enhance human-to-human communi-
`cation will probably prove more important than technical goals such as improved
`
`reliability.
`
`1.1.2. Networks for People
`The motivations given above for building computer networks are all essen-
`tially economic and technological in nature.
`If sufficiently large and powerful
`mainframes were available at acceptable prices, most companies would simply
`choose to keep all their data on them and give employees terminals connected to
`them,
`In the 1970s and early 1980s, most companies operated this way. Com-
`puter networks only became popular when networks of personal computers
`offered a hugeprice/performance advantage over mainframes.
`Starting in the 1990s, computer networks beganto start delivering services to
`private individuals at home. These services and the motivations for using them
`
`Unified Patents Ex. 1002, pg. 4
`
`Unified Patents Ex. 1002, pg. 4
`
`

`

`
`
`
`
`SEC. 1.1
`
`USES OF COMPUTER NETWORKS
`
`5
`
`are quite different than the “corporate efficiency’? model described in the previ-
`ous section. Below wewill sketch three of the more exciting ones that are starting
`to happen:
`
`1. Access to remote information.
`
`2. Person-to-person communication.
`
`3.
`
`Interactive entertainment.
`
`Access to remote information will come in many forms. One area in whichit
`is already happening is access to financial
`institutions. Many people pay their
`bills, manage their bank accounts, and handle their investments electronically.
`Home shopping is also becoming popular, with the ability to inspect the on-line
`catalogs of thousands of companies. Someofthese catalogs will soon provide the
`ability to get an instant video on any product by just clicking on the product’s
`name.
`It will be possible to tell the
`Newspapers will go on-line and be personalized.
`newspaper that you want everything about corrupt politicians, big fires, scandals
`involving celebrities, and epidemics, but no football, thank you. At night while
`you sleep, the newspaper will be downloaded to your computer’s disk or printed
`on yourlaser printer. On a small scale, this service already exists. The next step
`beyond newspapers (plus magazines andscientific journals) is the on-line digital
`library. Depending onthecost, size, and weight of book-sized notebook comput-
`ers, printed books may become obsolete. Skeptics should take note of the effect
`the printing press had on the medievalilluminated manuscript.
`Another application thatfalls in this category is access to information systems
`like the current World Wide Web, which contains information aboutthearts, busi-
`ness, cooking, government, health, history, hobbies, recreation, science, sports,
`travel, and too many other topics to even mention.
`All of the above applications involve interactions between a person and a
`remote database. The second broad category of network use will be person-to-
`person interactions, basically the 21st Century’s answerto the 19th Century’s tele-
`phone. Electronic mail or email is already widely used by millions of people and
`will soon routinely contain audio and video as well as text. Smell in messages
`will take a bit longer to perfect.
`Real-time email will allow remote users to communicate with no delay, possi-
`bly seeing and hearing each other as well. This technology makes it possible to
`have virtual meetings, called videoconference, among far-flung people.
`It
`is
`sometimes said that transportation and communication are having a race, and
`whichever wins will make the other obsolete. Virtual meetings could be used for
`remote school, getting medical opinions from distant specialists, and numerous
`other applications.
`Worldwide newsgroups, with discussions on every conceivable topic are
`already commonplace among a select group of people, and this will grow to
`
`Unified Patents Ex. 1002, pg. 5
`
`Unified Patents Ex. 1002, pg. 5
`
`

`

`|
`CHAP.
`INTRODUCTION
`6
`include the population at large. These discussions, in which one person posts a
`message and all the other subscribers to the newsgroup can readit, run the gamut
`from humorousto impassioned.
`Our third category is entertainment, which is a huge and growing industry.
`The killer application here (the one that may drive all
`the rest) is video on
`demand. A decade or so hence, it may be possible to select any movie or televi-
`sion program ever made,
`in any country, and have it displayed on your screen
`instantly. New films may become interactive, where the user is occasionally
`prompted for the story direction (should MacBeth murder Duncan or just bide his
`time?) with alternative scenarios provided for all cases. Live television may also
`become interactive, with the audience participating in quiz shows, choosing
`among contestants, and so on.
`On the other hand, maybethe killer application will not be video on demand.
`Maybeit will be game playing. Already we have multiperson real-time simula-
`tion games,like hide-and-seek in a virtual dungeon, and flight simulators with the
`players on one team trying to shoot down the players on the opposing team.
`If
`done with goggles and 3-dimensional real-time, photographic-quality moving
`images, we have a kind of worldwide shared virtual reality.
`In short, the ability to merge information, communication, and entertainment
`will surely give rise to a massive new industry based on computer networking.
`
`1.1.3. Social Issues
`The widespread introduction of networking will introduce new social, ethical,
`political problems (Laudon, 1995). Let us just briefly mention a few of them, a
`thorough study would require a full book, at least. A popular feature of many net-
`works are newsgroups or bulletin boards where people can exchange messages
`with like-minded individuals. As long as the subjects are restricted to technical
`topics or hobbies like gardening, not too many problems will arise.
`The trouble comes when newsgroupsare set up on topics that people actually
`care about, like politics, religion, or sex. Views posted to such groups may be
`deeply offensive to some people. Furthermore, messages need not be limited to
`text. High-resolution color photographs and even short video clips can now easily
`be transmitted over computer networks. Some people take a live-and-let-live
`view, but others feel that posting certain material (e.g., child pornography) is sim-
`ply unacceptable. Thus the debate rages.
`People have sued network operators, claiming that they are responsible for the
`contents of whatthey carry, just as newspapers and magazines are. The inevitable
`responseis that a network is like a telephone companyorthe post office and can-
`not be expected to police what its users say. Stronger yet, having network opera-
`tors censor messages would probably cause them to delete everything with even
`the slightest possibility of their being sued, and thus violate their users’ rights to
`free speech.
`It is probably safe to say that this debate will go on for a while.
`
`Unified Patents Ex. 1002, pg. 6
`
`Unified Patents Ex. 1002, pg. 6
`
`

`

`SEC. 1.1
`
`USES OF COMPUTER NETWORKS
`
`7
`
`Another fun area is employee rights versus employer rights. Many people
`read and write email at work. Some employers have claimed the right to read and
`possibly censor employee messages, including messages sent from a hometermi-
`nal after work. Not all employees agree with this (Sipior and Ward, 1995),
`Even if employers have power over employees, does this relationship also
`govern universities and students? How about high schools and students? In 1994,
`Carnegie-Mellon University decided to turn off the incoming message stream for
`several newsgroups dealing with sex because the university felt the material was
`inappropriate for minors(i.e., those few students under 18). The fallout from this
`event will take years to settle.
`In
`Computer networks offer the potential for sending anonymous messages.
`somesituations, this capability may be desirable. For example, it provides a way
`for students, soldiers, employees, and citizens to blow the whistle on illegal
`behavior on the part of professors, officers, superiors, and politicians without fear
`of reprisals. On the other hand, in the United States and most other democracies,
`the law specifically permits an accused person the right to confront and challenge
`his accuser in court. Anonymousaccusations cannot be used as evidence.
`In short, computer networks, like the printing press 500 years ago,allow ordi-
`nary citizens to distribute their views in different ways and to different audiences
`than were previously possible. This new-found freedom brings with it many
`unsolved social, political, and moral issues. The solution to these problemsis left
`as an exercise for the reader.
`
`1.2. NETWORK HARDWARE
`
`It is now timeto turn our attention from the applications and social aspects of
`networking to the technical issues involved in network design. There is no gen-
`erally accepted taxonomy into which all computer networks fit, but two dimen-
`sions stand out as important: transmission technology and scale. We will now
`examine each of these in turn.
`Broadly speaking, there are two types of transmission technology:
`
`1. Broadcast networks.
`
`2. Point-to-point networks.
`
`Broadcast networks have a single communication channel that is shared by all
`the machines on the network. Short messages, called packets in certain contexts,
`sent by any machine are received by all the others, An address field within the
`packet specifies for whom it is intended. Upon receiving a packet, a machine
`checks the address field.
`If the packet
`is intended for itself,
`it processes the
`packet; if the packet is intended for some other machine,it is just ignored.
`As an analogy, consider someone standing atthe end of a corridor with many
`rooms off it and shouting “Watson, come here.
`I want you.” Although the packet
`
`Unified Patents Ex. 1002, pg. 7
`
`Unified Patents Ex. 1002, pg. 7
`
`

`

`EE
`
`
`
`CHAP.1
`INTRODUCTION
`8
`may actually be received (heard) by many people, only Watson responds. The
`others just ignoreit. Another exampleis an airport announcementaskingall flight
`644 passengers to report to gate 12.
`Broadcast systems generally also allow the possibility of addressing a packet
`to all destinations by using a special code in the address field. When a packet
`with this code is transmitted,it is received and processed by every machine on the
`network. This mode of operation is called broadcasting. Some broadcast sys-
`tems also support transmission to a subset of the machines, something known as
`multicasting. One possible scheme is to reserve one bit to indicate multicasting.
`The remaining n — | address bits can hold a group number. Each machine can
`“subscribe” to any orall of the groups. When a packet is sent to a certain group,
`it is delivered to all machines subscribing to that group.
`In contrast, point-to-point networks consist of many connections between
`individual pairs of machines. To go from the source to the destination, a packet
`on this type of network may havetofirst visit one or more intermediate machines.
`Often multiple routes, of different lengths are possible, so routing algorithms play
`an importantrole in point-to-point networks. As a general rule (although there are
`many exceptions), smaller, geographically localized networks tend to use broad-
`casting, whereas larger networks usually are point-to-point.
`Interprocessor
`Processors
`Example
`
`distance
`located in same
`Data flow machine
`
`
`Multicomputer
`
`
`
`
`Local area network Metropolitan area network
`
`Wide area network
`
`Theinternet
`
`Fig. 1-2. Classification of interconnected processors by scale.
`In Fig. 1-2 we
`Analternative criterion for classifying networks is their scale.
`give a classification of multiple processor systems arranged by their physicalsize.
`At the top are data flow machines, highly parallel computers with many func-
`tional units all working on the same program. Next come the multicomputers,
`systems that communicate by sending messages over very short, very fast buses.
`Beyond the multicomputers are the true networks, computers that communicate
`
`Unified Patents Ex. 1002, pg. 8
`
`Unified Patents Ex. 1002, pg. 8
`
`

`

`1
`CHAP.
`INTRODUCTION
`interface to the network (sockets) and wrote many application, utility, and
`management programs to make networking easier.
`The timing was perfect. Many universities had just acquired a second orthird
`VAX computer and a LANto connectthem,but they had no networking software.
`When 4.2BSD camealong. with TCP/IP, sockets, and many network utilities, the
`complete package was adopted immediately. Furthermore, with TCP/IP,
`it was
`easy for the LANsto connectto the ARPANET,and many did.
`By 1983, the ARPANET was stable and successful, with over 200 IMPs and
`hundreds of hosts. At this point, ARPA turned the management of the network
`over to the Defense Communications Agency (DCA), to run it as an operational
`network. Thefirst thing DCAdid was to separate the military portion (about 160
`IMPs, of which 110 in the United States and 50 abroad) into a separate subnet,
`MILNET,with stringent gateways between MILNETand the remaining research
`subnet.During the 1980s, additional networks, especially LANs, were connected to
`the ARPANET. Asthe scale increased, finding hosts becameincreasingly expen-
`sive, so DNS (Domain Naming System) was created to organize machines into
`domains and map host names onto IP addresses. Since then, DNS has become a
`generalized, distributed database system for storing a variety of information
`related to naming. We will study it in detail in Chap.7.
`By 1990, the ARPANEThad been overtaken by newer networksthatit itself
`had spawned, so it was shut down and dismantled, but it lives on in the hearts and
`minds of network researchers everywhere. MILNET continues to operate, how-
`
`ever.
`
`1.5.3. NSFNET
`
` 50
`
`By thelate 1970s, NSF (the U.S. National Science Foundation) saw the enor-
`mous impact the ARPANET was having on university research, allowing scien-
`tists across the country to share data and collaborate on research projects. How-
`ever, to get on the ARPANET,a university had to have a research contract with
`the DoD, which many did not have. This lack of universal access prompted NSF
`to set up a virtual network, CSNET,centered around a single machine at BBN
`that supported dial-up lines and had connectionsto the ARPANETandother net-
`works. Using CSNET. academic researchers could call up and leave email for
`other people to pick up later. It was simple, but it worked.
`By 1984 NSF began designing a high-speed successor to the ARPANETthat
`would be open toall university research groups. To have something concrete to
`start with, NSF decided to build a backbone network to connectits six supercom-
`puter centers, in San Diego, Boulder, Champaign, Pittsburgh, Ithaca, and Prince-
`ton. Each supercomputer was given a little brother, consisting of an LSI-11
`microcomputer called a fuzzball. The fuzzballs were connected with 56 kbps
`leased lines and formed the subnet,
`the same hardware technology as the
`
`Unified Patents Ex. 1002, pg. 9
`
`Unified Patents Ex. 1002, pg. 9
`
`

`

`SEC. 1.5
`
`EXAMPLE NETWORKS
`
`51
`
`ARPANETused. The software technology was different however: the fuzzballs
`spoke TCP/IP right from the start, makingit the first TCP/IP WAN.
`NSFalso funded some (eventually about 20) regional networks that connected
`to the backbonetoallow users at thousands of universities, research labs, libraries,
`and museums to access any of the supercomputers and to communicate with one
`another. The complete network,
`including the backbone and the regional net-
`works, was called NSFNET.
`It connected to the ARPANET through a link
`between an IMP and a fuzzball in the Carnegie-Mellon machine room. Thefirst
`
`NSEFNETbackboneis illustrated in Fig. 1-26. © NSF Supercomputer center
`
`® NSF Mid-level network
`® Both
`
`Fig. 1-26. The NSFNETbackbone in 1988,
`
`NSFNETwasan instantaneous success and was overloaded from the word go.
`NSF immediately began planning its successor and awarded a contract
`to the
`Michigan-based MERIT consortium to run it. Fiber optic channels at 448 kbps
`were leased from MCI to provide the version 2 backbone.
`IBM RS6000s were
`used as routers. This, too, was soon overwhelmed, and by 1990, the second back-
`bone was upgradedto 1.5 Mbps.
`As growth continued, NSF realized that the government could not continue
`financing networking forever. Furthermore, commercial organizations wanted to
`join but were forbidden by NSF’s charter from using networks NSF paid for.
`Consequently, NSF encouraged MERIT, MCI, and IBM to form a nonprofit cor-
`poration, ANS (Advanced Networks and Services) as a step along the road to
`commercialization.
`In 1990, ANS took over NSFNET and upgraded the 1.5-
`Mbpslinks to 45 Mbpsto form ANSNET.
`In December 1991, the U.S. Congress passed a bill authorizing NREN,the
`National Research and Educational Network,
`the research successor
`to
`NSFNET, only running at gigabits speeds. The goal was a national network
`
`Unified Patents Ex. 1002, pg. 10
`
`Unified Patents Ex. 1002, pg. 10
`
`

`

`|
`CHAP.
`INTRODUCTION
`52
`running at 3 Gbps before the millenium. This network is to act as a prototype for
`the much-discussed information superhighway.
`By 1995, the NSFNET backbone was no longer needed to interconnect the
`NSF regional networks because numerous compamies were running commercial
`IP networks. When ANSNET was sold to America Online in 1995,
`the NSF
`regional networks had to go out and buy commercial IP service to interconnect.
`To ease the transition and make sure every regional network could communi-
`cate with every other regional network, NSE awarded contracts to four different
`network operators to establish a NAP (Network Access Point). These operators
`were PacBell (San Francisco), Ameritech (Chicago), MES (Washington, D.C.),
`and Sprint (New York City, where for NAP purposes, Pennsauken, N.J. counts as
`New York City). Every network operator that wanted to provide backbone ser-
`vice to the NSF regional networks had to connect to all the NAPs. This arrange-
`ment meant that a packet originating on any regional network had a choice of
`backbonecarriers to get from its NAP to the destination’s NAP. Consequently,
`the backbone carriers were forced to compete for the regional networks’ business
`on the basis of service andprice, which was the idea, of course.
`In addition to the
`NSF NAPs, various government NAPs (e.g., FLX-E, FIX-W, MAE-East and
`MAE-West) and commercial NAPs(e-g., CIX) have also been created, so the con-
`cept of a single default backbone was replaced by a commercially-driven com-
`Other countries and regions are also building networks comparable to
`petitive infrastructure.
`NSENET.
`In Europe, for example, EBONEis an IP backbone for research organ-
`izations and EuropaNETis a more commercially oriented network. Both connect
`numerous cities in Europe with 2-Mbpslines. Upgrades to 34 Mbpsare in prog-
`ress. Each country in Europe has one or more national networks, which are
`roughly comparable to the NSFregional networks.
`
`1.5.4. The Internet
`
`The number of networks, machines, and users connected to the ARPANET
`grew rapidly after TCP/IP became the only official protocol on Jan. 1, 1983.
`When NSENET and the ARPANET were interconnected,
`the growth became
`exponential. Many regional networks joined up, and connections were made to
`networks in Canada, Europe, and the Pacific.
`Sometime in the mid-1980s, people began viewing the collection of networks
`as an internet, and later as the Internet, although there was no official dedication
`with some politician breaking a bottle of champagne Over a fuzzball.
`Growth continued exponentially, and by 1990 the Internet had grown to 3000
`networks and 200,000 computers.
`In 1992, the one millionth host was attached.
`By 1995, there were multiple backbones, hundreds of mid-level (..e., regional)
`networks, tens of thousands of LANs, millions of hosts, and tens of millions of
`users. The size doubles approximately every yeat (Paxson, 1994).
`
`Unified Patents Ex. 1002, pg. 11
`
`Unified Patents Ex. 1002, pg. 11
`
`

`

` SEC. 1.5
`
`1. Email. The ability to compose, send, and receive electronic mail has
`been around since the early days of the ARPANET and is enor-
`mously popular. Many people get dozens of messages a day and
`consider it their primary way of interacting with the outside world,
`far outdistancing the telephone and snail mail. Email programs are
`available on virtually every kind of computer these days.
`
`2. News. Newsgroups are specialized forums in which users with a
`common interest can exchange messages. Thousands of newsgroups
`exist, on technical and nontechnical topics, including computers, sci-
`ence, recreation, and politics. Each newsgroup hasits own etiquette,
`style, and customs, and woe be to anyoneviolating them.
`
`3. Remote login. Using the Telnet, Rlogin, or other programs, users
`anywhere on the Internet can log into any other machine on which
`they have an account.
`
`4, File transfer. Using the FTP program, it is possible to copy files
`from one machine on the Internet to another. Vast numbers ofarti-
`cles, databases, and other information are available this way.
`
`EXAMPLE NETWORKS
`
`53
`
`Muchof the growth comes from connecting existing networks to the Internet.
`In the past these have included SPAN, NASA’s space physics network, HEPNET,
`a high energy physics network, BITNET, IBM’s mainframe network, EARN, a
`European academic network now widely used in Eastern Europe, and many oth-
`ers. Numerous transatlantic links are in use, running from 64 kbps to 2 Mbps.
`The glue that holds the Internet together is the TCP/IP reference model and
`TCP/IP protocol stack. TCP/IP makes universal service possible and can be com-
`pared to the telephone system or the adoption of standard gauge by the railroads in
`the 19th Century.
`What does it actually mean to be on the Internet? Our definition is that a
`machine is on the Internet if it runs the TCP/IP protocol stack, has an IP address,
`and has the ability to send IP packets to all the other machines on the Internet.
`The mere ability to send and receive electronic mail is not enough, since emailis
`gatewayed to many networks outside the Internet. However, the issue is clouded
`somewhat by the fact that many personal computers have the ability to call up an
`Internet service provider using a modem,be assigned a temporary IP address, and
`send IP packets to other Internet hosts.
`It make sense to regard such machines as
`being on the Internet for as long as they are connected to the service provider’s
`router.
`
`the old informal way of running the Internet no
`With exponential growth,
`longer works.
`In January 1992, the Internet Society was set up, to promote the
`use of the Internet and perhaps eventually take over managingit.
`Traditionally, the Internet had four main applications, as follows:
`
`Unified Patents Ex. 1002, pg. 12
`
`Unified Patents Ex. 1002, pg. 12
`
`

`

`CHAP.|
`INTRODUCTION
`54
`Up until the early 1990s, the Internet was largely populated by academic,
`government, and industrial researchers. One new application, the WWW (World
`Wide Web)changedall that and brought millions of new, nonacademic users to
`the net. This application, invented by CERN physicist Tim Berners-Lee, did not
`change any of the underlying facilities but made them easier to use. Together
`with the Mosaic viewer, written at the National Center for Supercomputer Appli-
`cations, the WWW madeit possible for a site to set up a numberof pages of infor-
`mation containing text, pictures, sound, and even video, with embedded links to
`other pages. By clicking on a link, the user is suddenly transported to the page
`pointed to by that link. For example, many companies have a home page with
`entries pointing to other pages for product information, price lists, sales, technical
`support, communication with employees, stockholder information, and much
`more.Numerous other kinds of pages have come into existence in a very short time,
`including maps, stock market tables, library card catalogs, recorded radio pro-
`grams, and even a page pointing to the complete text of many books whose copy-
`rights have expired (Mark Twain, Charles Dickens,etc.). Many people also have
`personal pages (home pages).
`In the first year after Mosaic wasreleased, the number of WWW servers grew
`from 100 to 7000. Enormous growth will undoubtedly continue for years to come,
`and will probably be the force driving the technology and use of the Internet into
`Many books have been written aboutthe Internet and its protocols. For more
`information, see (Black, 1995; Carl-Mitchell and Quarterman, 1993; Comer,
`1995; and Santifaller, 1994).
`
`the next millenium.
`
`1.5.5. Gigabit Testbeds
`The Internet backbones operate at megabit speeds, so for people who wantto
`push the technological envelope, the next step is gigabit networking. With each
`increase in network bandwidth, new applications become possible, and gigabit
`networks are no exception.
`In this section we will first say a few words about
`gigabit applications, mention two of them, and then list some example gigabit
`testbeds that have been built.
`Gigabit networks provide better bandwidth than megabit networks, but not
`always muchbetter delay. For example, sending a 1-KB packet from New York
`to San Francisco at | Mbps takes 1 msec to pump the bits out and 20 msec for the
`transcontinental delay, for a total of 21 msec. A 1-Gbps network can reduce this
`to 20.001 msec. While the bits go out faster, the transcontinental delay remains
`the same, since the speed oflight in optical fiber (or copper wire) is about 200,000
`km/sec, independentof the data rate. Thus for wide area applications in which
`low delayis critical, going to higher speeds may not help much. Fortunately, for
`
`Unified Patents Ex. 1002, pg. 13
`
`Unified Patents Ex. 1002, pg. 13
`
`

`

`SEC. 1.5
`
`EXAMPLE NETWORKS
`
`55
`
`some applications, bandwidth is what counts, and these are the applications for
`which gigabit networks will make a big difference.
`One application is telemedicine. Many people think that a way to reduce
`medical costs is to reintroduce family doctors and family clinics on a large scale,
`so everyone has convenient access to first line medical care. When a serious
`medical problem occurs, the family doctor can order lab tests and medical imag-
`ing, such as X-rays, CAT scans, and MRIscans. Thetest results and images can
`then besent electronically to a specialist who then makes the diagnosis.
`Doctors are generally unwilling to make diagnoses from computer images
`unless the quality of the transmitted image is as good as the original image. This
`requirement means images will probably need 4K x 4K pixels, with 8 bits per
`pixel (black and white images) or 24 bits per pixel (color images). Since many
`tests require up to 100 images (e.g., different cross sections of the organ in ques-
`tion), a single series for one patient can generate 40 gigabits. Moving images
`(e.g., a beating heart) generate even more data. Compression can help some but
`doctors are leary of it because the mostefficient algorithms reduce image quality.
`Furthermore, all the images mustbe stored for years but may need to be retrieved
`at a moment’s notice in the event of a medical emergency. Hospitals do not want
`to become computer centers, so off-site storage combined with high-bandwidth
`electronic retrieval is essential.
`Another gigabit application is the virtual meeting. Each meeting room con-
`tains a spherical camera and one or more people. The bit streams from each of
`the cameras are combinedelectronically to give the illusion that everyone is in the
`same room. Each person sees this imageusing virtual reality goggles. In this way
`meetings can happen withouttravel, but again, the data rates required are stupen-
`dous.
`Starting in 1989, ARPA and NSF jointly agreed to finance a number of
`university-industry gigabit testbeds, later as part of the NREN project.
`In some of
`these, the data rate in each direction was 622 Mbps, so only by counting the data
`going in both directions do you get a gigabit. This kind of gigabit is sometimes
`called a “governmentgigabit.” (Some cynicscall it a gigabit after taxes.) Below
`we will briefly mention the first five projects. They have donetheir job and been
`shut down, but deserve somecredit as pioneers, in the same way the ARPANET
`does.
`
`|. Aurora was a testbed linking four sites in the Northeast: M.LT., the
`University of Pennsylvania, IBM’s T.J. Watson Lab, and Bellcore
`(Morristown, N.J.) at 622 Mbpsusing fiber optics provided by MCI,
`Bell Atlantic, and NYNEX. Aurora was largely designed to help
`debug Bellcore’s Sunshine switch and IBM’s (proprietary) plaNET
`switch using parallel networks. Research issues included switching
`technology, gigabit protocols, routing, network control, distributed
`virtual memory, and collaboration using videoconferencing. For
`more information, see (Clark et al., 1993).
`
`Unified Patents Ex. 1002, pg. 14
`
`Unified Patents Ex. 1002, pg. 14
`
`

`

`
`
`56
`
`INTRODUCTION
`
`CHAP.
`
`1
`
`2, Blanca was originally a research project called XUNETinvolving
`AT&T Bell Labs, Berkeley, and the University of Wisconsin.
`In
`1990 it added some newsites (LBL, Cray Research, and the Univer-
`sity of Illinois) and acquired NSF/ARPA funding. Someofit ran at
`622 Mbps,but other parts ran at lower speeds. Blanca was the only
`nationwide testbed: the rest were regional. Consequently, much of
`the research was concerned with the effects of speed-of-light

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket