throbber

`
`‘Computer Networking Essentials
`
`DebraLittlejohn Shinder
`‘
`
` Hl
`
`Cisco Press
`
`@
`
`Cisco Press _
`201 West 10rd Street
`Indianapolis, IN 46290 USA
`
`Huawei v. Uniloc - Exhibit No. 1017 - 1/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 1/15
`
`

`

`
`
`Computer Networking Essentials
`DebraLittlejohn Shinder
`Copyright © 2001 Cisco Systems, Inc.
`Cisco Press logois a trademark of Cisco Systems,Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`All rights reserved. Nopartof this book may be reproducedor transmitted in any form or by any means,electronic
`or mechanical, including photocopying,recording, or by any information storage and retrieval system, without writ-
`ten permission from the publisher, exceptfor the inclusion of brief quotations in a review.
`Printed in the United States of America 1234567890
`
`Library of Congress Cataloging-in-Publication Number: 2001090429
`ISBN: 1-58713-038-6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capital-
`ized. Cisco Press or Cisco Systems, Inc., cannotattest to the accuracyofthis information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warrantyorfitness is
`implied.
`Theinformationis provided on an “as is” basis. The author, Cisco Press, and Cisco Systems,Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`containedin this book or from the use of the discs or programs that may accompanyit.
`The opinions expressed in this book belong tothe author and are not necessarily those of Cisco Systems, Inc.
`
`
`
` SR
`
`HAY) 2°4 2001
`
`COPY,
`a
`ce
`CPYRIGHT OFF
`
`
`
`
`
`
`
`
`Huawei v. Uniloc - Exhibit No. 1017 - 2/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 2/15
`
`

`

`15
`
`3
`
`6
`10
`
`16
`
`12
`
`17
`
`Introduction to Networking Concepts
`introduction to PC Networking
`5
`5
`A Brief History of PC Networking
`The First Communications Networks
`Disadvantages of Standalone Systems
`WhatIs a Network, Anyway?
`11
`Why Network Computers?
`11
`Benefits of Getting Connected
`The Birth of the Intemet
`13
`The Cost of Technology: More and More for Less andLess
`PC Networking Today
`16
`Home Computing
`16
`16
`WebPresence and E-commerce
`High-Performance Business Solutions
`Online Learning
`17
`17
`Tomorrow’s Networks
`*Smart” Appliances and Homes
`Phoning Home
`18
`19
`The Wired Workplace
`20
`Schoolsof the Future
`20
`Networking Health Care
`Technology and the Law 21
`Intergalactic Networking?
`21
`A Brief Overview of Networking Terminology
`Concept-Related Terminology
`22
`Network Hardware-Related Terminology
`Software-Related Terminology
`23
`24
`Design and Topology Terminology
`24
`Measurement-Related Terminology
`What This Book Covers and WhatIt Doesn’t
`Networking Certifications
`26
`26
`Vendor-Specific Certifications
`Non-Vendor-Specific Certifications
`This Book and Certification
`27
`
`
`
`Contents
`
`Part|
`Chapter1
`
`21
`
`22
`
`25
`
`26
`
`Huawei v. Uniloc - Exhibit No. 1017 - 3/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 3/15
`
`

`

`Summary
`
`27
`
`Further Reading
`
`28
`
`Review Questions
`
`28
`
`Chapter 2
`
`Categorizing Networks
`
`33
`
`Categorizing Networks by Physical Scope
`Characteristics ofa LAN 34
`Characteristics ofa MAN 35
`Characteristics ofa WAN 37
`
`33
`
`Categorizing Networks by Administrative Method
`Servers and Clients
`39
`Characteristics of Peer-to-Peer Networks
`Characteristics of Server-Based Networks
`
`44
`47
`
`38
`
`49
`
`Categorizing Networks by NOS
`Windows Networks
`50
`NetWare Networks
`50
`UNIX Networks
`50
`Hybrid Networks
`51
`
`Categorizing Networks by Protocol
`NetBEUI Networks
`52
`IPX/SPX Networks
`52
`TCP/IP Networks
`53
`Other LAN Protocols Used in Networks
`
`52
`
`53
`
`54
`
`Categorizing Networks by Topology
`Linear Bus Networks
`55
`Ring Networks
`56
`Star Bus Networks
`Mesh Networks
`59
`Hybrid Topologies
`
`60
`
`57
`
`61
`

`
`Categorizing Networks by Architecture
`Ethernet Networks
`62
`Token Ring Networks
`AppleTalk Networks
`ARCnet Networks
`Summary
`70
`
`67
`68
`
`68
`
`Further Reading
`
`70
`
`Review Questions
`
`71
`
`Huawei v. Uniloc - Exhibit No. 1017 - 4/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 4/15
`
`

`

`
`
`xi
`
`Chapter 3
`
`Networking Concepts, Models, and Standards
`
`75
`
`Computer Communication Concepts
`The Language of the Machine
`76
`Common Numbering Systems
`76
`Using Packets
`80
`A Layered Communication Process
`
`75
`
`82
`
`84
`Networking Models
`The Purpose of Models
`The OSI Model
`85
`The DoD Model
`97
`Vendor-Specific Models
`
`84
`
`99
`
`Networking Standards and Specifications
`Why Standardize?
`100
`Standards-Setting Bodies
`
`100
`
`99
`
`Summary
`
`104
`
`Further Reading
`
`104
`
`Review Questions
`
`105
`
`Chapter 4
`
`109
`109
`
`116
`
`Networking Communications Methods
`Signaling Methods and Characteristics
`Analog and Digital
`109
`Baseband and Broadband
`Multiplexing
`113
`115
`Asynchronous and Synchronous Transmission
`Simplex, Half-Duplex, and Full-Duplex Transmission
`Signaling and Communications Problems
`118
`Electromagnetic Interference
`119
`Radio FrequencyInterference
`119
`Crosstalk
`119
`Attenuation
`120
`Bandwidth Capacity Issues
`Media Access Methods
`121
`CSMA/CD 122
`CSMA/CA 123
`123
`Token Passing
`DemandPriority 125
`
`112
`
`121
`
`Summary
`
`126
`
`Further Reading
`Review Questions
`
`126
`127
`
`Huawei v. Uniloc - Exhibit No. 1017 - 5/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 5/15
`
`

`

`xii
`
`Chapter 5
`
`131
`LAN Links
`132
`Ethemet
`132
`10Base2
`134
`10BaseS
`10BaseT 136
`100BaseX 137
`1000BaseT 137
`The Structure of an Ethernet Frame
`Rules of Ethernet Engagement
`139
`Summary of Ethernet Characteristics
`
`138
`
`142
`
`143
`
`146
`
`147
`
`142
`Token Ring
`143
`Token Ring Topology
`The Token Ring Communication Process
`Token Ring Hardware Components
`144
`Advantages of Token Ring
`145
`Disadvantages of Token Ring
`145
`The Structure of the Token Ring Frame
`Rules of the Ring
`147
`Summary of Token Ring Characteristics
`FDDI
`147
`147
`How FDDI Works
`148
`FDDI Specifications
`149
`Advantages of FDDI
`149
`Disadvantages of FDDI
`The FDDI Frame Structure
`149
`Summary of FDDI Characteristics
`
`149
`
`150
`AppleTalk
`150
`AppleTalk Specifications
`150
`How AppleTalk Works
`151
`Advantages of AppleTalk
`151
`Disadvantages of AppleTalk
`151
`LocalTalk Data Transmission
`Summary of AppleTalk Characteristics
`ARCnet
`151
`151
`How ARCnet Works
`152
`ARCnetSpecifications
`153
`Advantages of ARCnet
`153
`Disadvantages of ARCnet
`153
`The ARCnet Packet Structure
`Summary of ARCnet Characteristics
`
`151
`
`153
`
`Huaweiv. Uniloc - Exhibit No. 1017 - 6/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 6/15
`
`

`

`
`
`xiii
`
`Comparing Networking Architectures
`Summary
`154
`
`154
`
`Further Reading
`Review Questions
`WAN Links
`159
`
`155
`155
`
`Chapter6
`
`160
`
`WAN Hardware
`Modems
`160
`165
`ISDN and DSL Adapters
`CustomerPremises Equipment
`WANTopologies
`166
`The Point-to-Point WAN 166
`The WAN Ring
`167
`The WAN Star
`168
`Multitiered WANs
`
`169
`
`165
`
`170
`Network Switching Types
`Circuit-Switching Networks
`Packet-Switching Networks
`
`170
`176
`
`178
`
`Emerging WAN Technologies
`OC-SONET 179
`Broadband ISDN 179
`CATV 179
`SMDS_
`181
`Wireless WAN 181
`
`LAN/WANConnectivity 182
`Translated Connections
`182
`Proxy Servers
`185
`Routed Connections
`
`186
`
`Summary
`
`187
`
`Further Reading
`
`188
`
`Review Questions
`
`188
`
`Part Il
`Chapter 7
`
`Networking Hardware and Software
`Physical Componentsof the Network
`NICs
`195
`
`193
`195
`
`;
`
`The Role of the NIC in Network Communications
`Selecting aNIC 196
`
`195
`
`
`
`Huawei v. Uniloc - Exhibit No. 1017 - 7/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 7/15
`
`

`

`xiv
`
`Configuring and Using a NIC 197
`Network Media
`200
`Cable Types
`200
`Wireless Media
`207
`
`Network Connectivity Devices
`Simple Connectors
`211
`Complex Connectors
`213
`Segmenting and Subnetting Devices
`
`210
`
`214
`
`Summary
`
`222
`
`Further Reading
`
`222
`
`Review Questions
`
`222
`
`Chapter 8
`
`Networking Protocols and Services 227
`NetBIOS/NetBEUI
`227
`
`IPX/SPX 229
`The Network Layer Protocol: IPX 229
`The Transport Layer Protocol: SPX 230
`TCPAP
`231
`231
`The TCP/IP Suite
`The Network Layer Protocol: IP 231
`The Transport Layer Protocols: TCP and UDP 245
`Addressing the Envelope: Packet Headers
`248
`NameResolution 249
`TCPAP Utilities
`254
`Application Layer Protocols
`
`261
`
`Summary
`
`262
`
`Further Reading
`
`262
`
`Review Questions
`
`263
`
`Chapter 9
`
`The Widest Area Network: The GlobalInternet 267
`The Evolution of the Internet
`267
`The Developmentof the Backbone
`The Internet? Project
`269
`
`268
`
`269
`The Componentsof the Internet
`The Local Computer or LAN 270
`The ISP
`270
`The Regional Network
`NAPs
`271
`
`270
`
`Huawei v. Uniloc - Exhibit No. 1017 - 8/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 8/15
`
`

`

`xv
`
`
`272
`
`294
`
`298
`
`291
`
`292
`
`MAEs
`271
`HowInternet Components Work Together
`What the Internet Does
`273
`The World Wide Web
`274
`E-mail and Mailing Lists
`283
`Newsgroups
`287
`File Transfer
`289
`Telnet
`290
`Streaming Media
`Live Chat
`291
`Audio/Videoconferencing
`Internet Telephony
`292
`293
`Virtual Private Networking
`TCP/IP Routing and the Internet
`293
`How IP Routing Works
`294
`An Example of a Simple Routed Network
`Types of Routing Interfaces
`296
`296
`Static Versus Dynamic Routing
`Distance-Vector Versus Link-State Protocols
`Common Routing Protocols
`299
`Who Ownsthe Internet?
`301
`ISOC 302
`IAB 302
`IETF 302
`IESG 302
`IANA/ICANN 302
`W3C 302
`
`Chapter 10
`
`Summary
`
`303
`
`Further Reading
`303
`Review Questions
`304
`Network Operating Systems 307
`General Network Administration
`307
`The Client/Server Environment
`309
`Sharing Network Resources
`311
`
`.
`320
`Overview of NOSs
`Windows NT and Windows 2000 Networks
`NetWare Networks
`326
`UNIX and Linux Networks
`Other NOSs
`334
`
`329
`
`320
`
`.
`
`
`
`Huaweiv. Uniloc - Exhibit No. 1017 - 9/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 9/15
`
`

`

`xvi
`
`Summary
`
`335
`
`Further Reading
`
`336
`
`Review Questions
`
`336
`
`Chapter 11
`
`Directory Services
`
`341
`
`Chapter 12
`
`What Are Directories and Directory Services?
`WhatIs a Directory?
`341
`What Are Directory Services?
`
`343
`
`34]
`
`Directory Services Standards
`X.500
`346
`DAP and LDAP 347
`
`346
`
`Directory-Enabled Networking
`
`349
`
`Popular Directory Services
`Novell NDS
`349
`Microsoft Active Directory
`Other Directory Services
`
`349
`
`350
`354
`
`Summary
`
`356
`
`Further Reading
`
`357
`
`Review Questions
`
`357
`
`Desktop Operating Systems
`Operating System Basics
`361
`Operating System Interfaces
`Using Commands
`364
`Files and File Systems
`
`367
`
`361
`
`362
`
`379
`
`Common Desktop Operating Systems
`MS-DOSand Windows 3.x
`379
`Windows 9x
`381
`Windows NT Workstation
`Windows 2000 Professional
`Linux/UNIX 396
`Macintosh
`401
`OS/2
`403
`
`388
`392
`
`Summary
`
`404
`
`Further Reading
`Review Questions
`
`404
`405
`
`Huaweiv. Uniloc - Exhibit No. 1017 - 10/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 10/15
`
`

`

`xvii
`
`
`Chapter 13
`
`Hybrid Networks 409
`
`409
`Characteristics of the Hybrid Network
`Inability of a Single Vendor to Provide All Desired Features
`Personal Preferences of Users
`410
`Budgetary Factors
`410
`Haphazard Growth
`411
`
`410
`
`411
`Multiple-Protocol Networks
`Network/Transport Protocols
`411
`File-Sharing Protocols
`415
`
`415
`Multiple-Operating-System Networks
`415
`Multiple Server Operating Systems
`417
`Multiple Client Operating Systems
`Multiple Server and Multiple Client Operating Systems
`Multiple-Platform Networks
`417
`418
`PC-to-Macintosh Communications
`418
`PC-to-Mainframe Communications
`PDA-to-PC and Handheld-to-PC Communications
`
`419
`
`417
`
`Gateway: The Hybrid Connectivity Solution
`Windows-to-NetWare Redirectors
`420
`Cross-Platform Solutions
`420
`SNA 421
`Samba
`422
`
`419
`
`Summary
`
`424
`
`Further Reading
`
`425
`
`Review Questions
`
`425
`
`PartIll
`Chapter 14
`
`429
`
`Network Specialty Areas
`Protecting the Network
`431
`Network Security
`431
`432
`Assessing Security Needs
`434
`Assessing Security Threats
`441
`Implementing Security Measures
`How Security Components Work 448
`Advanced Identification and Authentication Technologies
`Developing Security Policies
`457
`
`454
`
`Disaster Protection and Recovery
`Power Backup
`465
`Data Backup
`466
`
`465
`
`Huawei v. Uniloc - Exhibit No. 1017 - 11/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 11/15
`
`

`

`xviii
`
`
`469
`Disk Fault Tolerance
`Clustering Technologies
`471
`Summary
`47]
`
`472
`Further Reading
`473
`Review Questions
`Remote Access 477
`
`Chapter 15
`
`478
`
`478
`
`Why Remote Access?
`Branch Offices
`478
`After-Hours Connectivity
`Telecommuting
`479
`Mobile Users
`480
`Providing Access to Clients and Partners
`How Remote Access Works
`481
`Protocols Used for Remote Access
`Remote Access Authentication
`482
`Assignment of IP Addresses
`483
`Aggregation of Bandwidth on Dialup Connections
`Control of Bandwidth Usage
`484
`Remote Access Connectivity Devices
`Modems
`484
`ISDN Terminal Adapters
`Cable Modems
`493
`CSU/DSUs
`494
`
`480
`
`483
`
`482
`
`484
`
`492
`
`Configuring Remote Access Clients and Servers
`Configuring a Remote Access Client
`495
`Configuring a Remote Access Server
`496
`
`495
`
`496
`
`Remote Access Security Issues
`Callback Security
`497
`RADIUS
`498
`Remote Access Policies
`Account Lockout
`499
`Security Hosts
`499
`
`498
`
`Summary
`
`499
`
`Further Reading
`
`500
`
`Review Questions
`
`501
`
`Huaweiv. Uniloc - Exhibit No. 1017 - 12/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 12/15
`
`

`

`xix
`
`
`Chapter 16
`
`Virtual Private Networking 505
`What Isa VPN?
`505
`Virtual Networking
`Private Networking
`How VPNs Work
`506
`507
`Digging the Tunnel
`Operating System Support for VPNs
`
`505
`506
`
`509
`
`510
`WhyUse Virtual Private Networking?
`VPN Versus Dialup Networking: Advantages and Disadvantages
`VPN Scenarios
`512
`
`510
`
`516
`VPN Protocols
`Tunneling Protocols
`Encryption Protocols
`LAN Protocols
`520
`
`516
`519
`
`520
`VPN Security
`Authentication
`521
`Authorization
`521
`Encryption
`521
`VPNPerformanceIssues.521
`
`522
`Types of VPNs
`Software-Based VPNs
`Hardware-Based VPNs
`
`522
`522
`
`Configuring a VPN Connection
`Summary
`525
`
`522
`,
`
`Further Reading
`Review Questions
`
`526
`526
`
`531
`Thin Client Networking
`Chapter 17
`The Evolution of Thin Client Networking.532
`Thin Client Technology
`533
`Advantages of Thin Client Technology
`Thin Client Protocols’
`535
`RDP 536
`ICA 536
`X and X Display Manager Communication Protocol (XDMCP)
`RFB 537
`BOOTP, DHCP, and TFIP 537
`
`536
`:
`
`534
`
`Huawei v. Uniloc - Exhibit No. 1017 - 13/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 13/15
`
`

`

`XX
`
`
`538
`
`539
`
`Thin Client Hardware
`WBTs
`539
`Network Computers
`Net PCs
`540
`540
`Desktop Computers
`The Thinnest Clients: Handheld PCs
`Thin Client Software
`541
`Microsoft Terminal Services
`Citrix Winframe/MetaFrame
`The X Window System 543
`Web-Based Computing
`544
`TheJVM 544
`
`540
`
`541
`542
`
`545
`ASPs
`Microsoft .NET 545
`
`Summary
`
`546
`
`546
`Further Reading
`Review Questions 547
`
`Chapter 18
`
`Monitoring, Management, and Troubleshooting Tools
`Analyzing and Optimizing Network Performance
`551
`Bottlenecks
`552
`Baselines
`553
`554
`Rest Practices
`Determining Internet Connection Speed
`
`554
`
`551
`
`Network Monitoring and Management Tools
`Networking Monitoring Software
`556
`Network Management Software
`562
`Management Software for Small and Medium-Sized Networks
`ManagementService Providers
`568
`
`556
`
`567
`
`Hardware Monitoring and Troubleshooting Devices
`Troubleshooting Network Problems
`569
`Troubleshooting Basics
`569
`Using Operating System Log Files
`Using TCP/IP Utilities
`573
`Problem-Solving Guidelines
`
`579
`
`571
`
`568
`
`Summary.
`
`580
`
`Further Reading
`
`581
`
`ReviewQuestions
`
`581
`
`Huaweiv. Uniloc - Exhibit No. 1017 - 14/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 14/15
`
`

`

`xxi
`
`
`Part IV
`Chapter 19
`
`The Future of Networking 585
`Tomorrow’s Technologies
`587
`Ubiquitous Computing
`587
`588
`Bringing Networking Home
`Overcoming the Limits of IP 589
`New Directions in Networking Technologies
`Universal Connectivity
`592
`*Smart” Everything
`593
`Networking the Family
`594
`That’s Entertainment
`594
`Privacy Issues: Big Brother Is Watching
`Networking at Work
`595
`The Impact of Networking Technologies on Govemment
`The Impact of Networking Technologies on Law 598
`The Impact of Networking Technologies on Medicine
`The Impact of Networking Technologies on Publishing
`New Ways of Learning
`601
`
`590
`
`594
`
`596
`
`599
`600
`
`602
`Artificial Intelligence
`Computers That Think
`602
`Cybernetic Life-Forms: The Ultimate Network
`Summary
`603
`
`603
`
`Further Reading
`
`604
`
`604
`Parting Questions
`Chapter Review Answer Key
`
`607
`
`Appendix A
`Glossary 635
`Index 695
`
`Huawei v. Uniloc - Exhibit No. 1017 - 15/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 15/15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket