throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`
`Juniper Networks, Inc. & Palo Alto Networks, Inc.,
`Petitioners,
`
`v.
`
`Packet Intelligence LLC,
`Patent Owner.
`
`
`In re Inter Partes Review of:
`U.S. Patent No. 6,651,099; 6,665,725; 6,771,646; 6,839,751; and 6,954,789
`
`DECLARATION OF KEVIN C. ALMEROTH, PH.D.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Packet Intelligence Ex. 2001 Page 1 of 39
`
`

`

`
`
`TABLE OF CONTENTS
`
`I.
`
`Introduction .......................................................................................................... 1
`
`II. Background and Qualifications ........................................................................... 1
`
`III. Compensation ...................................................................................................... 9
`
`IV. Materials Reviewed ............................................................................................. 9
`
`V. Overview of Basic Network Principles ............................................................. 10
`
`A. The OSI Model ............................................................................................... 17
`
`B. Data Encapsulation ......................................................................................... 18
`
`C. Prior Art Network Monitors ........................................................................... 21
`
`VI. Claim Construction ............................................................................................ 23
`
`A. Person of Ordinary Skill in the Art ................................................................ 23
`
`B. “conversational flow” ..................................................................................... 23
`
`VII.
`
`Riddle .......................................................................................................... 26
`
`A. Overview ........................................................................................................ 26
`
`B. Opinions Regarding Riddle’s Traffic Classes ................................................ 27
`
`C. Opinions Regarding Riddle’s Service Aggregate Traffic Classes ................. 30
`
`D. Opinions Regarding Riddle’s Recognition of PointCast Traffic ................... 32
`
`VIII. Yu ............................................................................................................... 33
`
`A. Overview ........................................................................................................ 33
`
`B. Yu Does Not Teach Conversational Flows .................................................... 34
`
`IX. RFC 1945 ........................................................................................................... 35
`
`A. Overview ........................................................................................................ 35
`
`B. RFC 1945 Does Not Teach Conversational Flows ........................................ 35
`
`
`
`
`
`ii
`
`Packet Intelligence Ex. 2001 Page 2 of 39
`
`

`

`
`
`I, Kevin C. Almeroth, declare as follows:
`
`I. Introduction
`
`1. My name is Kevin C. Almeroth. I have been retained by Heim, Payne
`
`& Chorush LLP, on behalf of Packet Intelligence LLC, and I am submitting this
`
`declaration to offer my independent expert opinion concerning certain issues raised
`
`in the seven co-pending Petitions for Inter Partes Review (“Petition”) regarding five
`
`related patents. Specifically, Petitioners filed seven (7) IPR Petitions: (1) IPR2020-
`
`00335 concerning U.S. Patent No. 6,651,099, (2) IPR2020-00336 concerning U.S.
`
`Patent No. 6,665,725, (3) IPR2020-00337 concerning U.S. Patent No. 6,771,646, (4)
`
`IPR2020-00338 concerning U.S. Patent No. 6,839,751, (5) IPR2020-00339
`
`concerning U.S. Patent No. 6,954,789, (6) IPR2020-00485 concerning U.S. Patent
`
`No. 6,651,099, and (7) IPR2020-00486 concerning U.S. Patent No. 6,954,789
`
`(collectively, the “Asserted IPRs” and “Challenged Patents”, respectively).
`
`II. Background and Qualifications
`
`2.
`
`I hold three degrees from the Georgia Institute of Technology: (1) a
`
`Bachelor of Science degree in Information and Computer Science (with minors in
`
`Economics, Technical Communication, American Literature) earned in June, 1992;
`
`(2) a Master of Science degree in Computer Science (with specialization in
`
`Networking and Systems) earned in June, 1994; and (3) a Doctor of Philosophy
`
`(Ph.D.) degree in Computer Science (Dissertation Title: Networking and System
`
`Support for the Efficient, Scalable Delivery of Services in Interactive Multimedia
`
`System, minor in Telecommunications Public Policy) earned in June, 1997.
`
`1
`
`Packet Intelligence Ex. 2001 Page 3 of 39
`
`

`

`
`
`3.
`
`One of the major themes of my research has been the delivery of
`
`multimedia content and data between computing devices and users. In my research
`
`I have looked at large-scale content delivery systems and the use of servers located
`
`in a variety of geographic locations to provide scalable delivery to hundreds, even
`
`thousands, of users simultaneously. I have also looked at smaller-scale content
`
`delivery systems in which content, including interactive communication like voice
`
`and video data, is exchanged between computers and portable computing devices.
`
`As a broad theme, my work has examined how to exchange content more efficiently
`
`across computer networks, including the devices that switch and route data traffic.
`
`More specific topics include the scalable delivery of content to many users, mobile
`
`computing, satellite networking, delivering content to mobile devices, and network
`
`support for data delivery in wireless and sensor networks.
`
`4.
`
`Beginning in 1992, when I started graduate school, the focus of my
`
`research was on the provision of interactive functions (VCR-style functions like
`
`pause, rewind, and fast-forward) for near video-on-demand systems in cable
`
`systems, in particular, how to aggregate requests for movies at a cable head-end and
`
`then how to satisfy a multitude of requests using one audio/video stream broadcast
`
`to multiple receivers simultaneously. Continued evolution of this research has
`
`resulted in the development of new techniques to scalably deliver on-demand
`
`content, including audio, video, web documents, and other types of data, through the
`
`Internet and over other types of networks, including over cable systems, broadband
`
`telephone lines, and satellite links.
`
`2
`
`Packet Intelligence Ex. 2001 Page 4 of 39
`
`

`

`
`
`5.
`
`An important component of my research from the very beginning has
`
`been investigating the challenges of communicating multimedia content between
`
`computers and across networks. Although the early Internet was designed mostly
`
`for text-based non-real time applications, the interest in sharing multimedia content
`
`quickly developed. Multimedia-based applications ranged from downloading
`
`content to a device to streaming multimedia content to be instantly used. One of the
`
`challenges was that multimedia content is typically larger than text-only content but
`
`there are also opportunities to use different delivery techniques since multimedia
`
`content is more resilient to errors. I have worked on a variety of research problems
`
`and used a number of systems that were developed to deliver multimedia content to
`
`users.
`
`6.
`
`In 1994, I began to research issues associated with the development and
`
`deployment of a one-to-many communication facility (called “multicast”) in the
`
`Internet (first deployed as the Multicast Backbone, a virtual overlay network
`
`supporting one-to-many communication). Some of my more recent research
`
`endeavors have looked at how to use the scalability offered by multicast to provide
`
`streaming media support for complex applications like distance learning, distributed
`
`collaboration, distributed games, and large-scale wireless communication. Multicast
`
`has also been used as the delivery mechanism in systems that perform local filtering
`
`(i.e., sending the same content to a large number of users and allowing them to filter
`
`locally content in which they are not interested).
`
`7.
`
`Starting in 1997, I worked on a project to integrate the streaming media
`
`capabilities of the Internet together with the interactivity of the web. I developed a
`
`3
`
`Packet Intelligence Ex. 2001 Page 5 of 39
`
`

`

`
`
`project called the Interactive Multimedia Jukebox (IMJ). Users would visit a web
`
`page and select content to view. The content would then be scheduled on one of a
`
`number of channels, including delivery to students in Georgia Tech dorms delivered
`
`via the campus cable plant. The content of each channel was delivered using
`
`multicast communication.
`
`8.
`
`In the IMJ, the number of channels varied depending on the capabilities
`
`of the server including the available bandwidth of its connection to the Internet. If
`
`one of the channels was idle, the requesting user would be able to watch their
`
`selection immediately. If all channels were streaming previously selected content,
`
`the user's selection would be queued on the channel with the shortest wait time. In
`
`the meantime, the user would see what content was currently playing on other
`
`channels, and because of the use of multicast, would be able to join one of the
`
`existing channels and watch the content at the point it was currently being
`
`transmitted.
`
`9.
`
`The IMJ service combined the interactivity of the web with the
`
`streaming capabilities of the Internet to create a jukebox-like service. It supported
`
`true Video-on-Demand when capacity allowed, but scaled to any number of users
`
`based on queuing requested programs. As part of the project, we obtained
`
`permission from Turner Broadcasting to transmit cartoons and other short-subject
`
`content. We also attempted to connect the IMJ into the Georgia Tech campus cable
`
`television network so that students in their dorms could use the web to request
`
`content and then view that content on one of the campus's public access channels.
`
`4
`
`Packet Intelligence Ex. 2001 Page 6 of 39
`
`

`

`
`
`10. More recently, I have also studied issues concerning how users choose
`
`content, especially when considering the price of that content. My research has
`
`examined how dynamic content pricing can be used to control system load. By
`
`raising prices when systems start to become overloaded (i.e., when all available
`
`resources are fully utilized) and reducing prices when system capacity is readily
`
`available, users' capacity to pay as well as their willingness can be used as factors in
`
`stabilizing the response time of a system. This capability is particularly useful in
`
`systems where content is downloaded or streamed on-demand to users.
`
`11. As a parallel research theme, starting in 1997, I began researching
`
`issues related to wireless devices and sensors. In particular, I was interested in
`
`showing how to provide greater communication capability to "lightweight devices,"
`
`i.e., small form-factor, resource-constrained (e.g., CPU, memory, networking, and
`
`power) devices. Starting by at least 2004 I researched techniques to wirelessly
`
`disseminate information, for example advertisements, between users using ad hoc
`
`networks. In the system, called Coupons, an incentive scheme is used to encourage
`
`users to relay information, including advertisements, to other nearby users.
`
`12. Starting in 1998, I published several papers on my work to develop a
`
`flexible, lightweight, battery-aware network protocol stack. The lightweight
`
`protocols we envisioned were similar in nature to protocols like Universal Plug and
`
`Play (UPnP) developed by the Digital Living Network Alliance (DLNA).
`
`13. From this initial work, I have made wireless networking, including ad-
`
`hoc and mesh networks, and wireless devices, one of the major themes of my
`
`research. One topic includes development of applications for mobile devices, for
`
`5
`
`Packet Intelligence Ex. 2001 Page 7 of 39
`
`

`

`
`
`example, virally exchanging and tracking "coupons" through "opportunistic contact"
`
`(i.e., communication with other devices coming into communication range with a
`
`user). Other topics include building network communication among a set of mobile
`
`devices unaided by any other kind of network infrastructure. Yet another theme is
`
`monitoring wireless networks, in particular different variants of IEEE 802.11
`
`compliant networks, to (1) understand the operation of the various protocols used in
`
`real-world deployments, (2) use these measurements to characterize use of the
`
`networks and identify protocol limitations and weaknesses, and (3) propose and
`
`evaluate solutions to these problems.
`
`14. Protecting networks, including their operation and content, has been an
`
`underlying theme of my research almost since the beginning. Starting in 2000, I have
`
`been involved in several projects that specifically address security, network
`
`protection, and firewalls. After significant background work, a team on which I was
`
`a member successfully submitted a $4.3M grant proposal to the Army Research
`
`Office (ARO) in the Department of Defense to propose and develop a high-speed
`
`intrusion detection system. Once the grant was awarded, we spent several years
`
`developing and meeting the milestones of the project. I have also used firewalls in
`
`developing techniques for the classroom to ensure that students are not distracted by
`
`online content.
`
`15. As an important component of my research program, I have been
`
`involved in the development of academic research into technology available in the
`
`market place. One aspect of this work is my involvement in the Internet Engineering
`
`Task Force (IETF) including many content delivery related working groups like the
`
`6
`
`Packet Intelligence Ex. 2001 Page 8 of 39
`
`

`

`
`
`Audio Video Transport (AVT) group, the MBone Deployment (MBONED) group,
`
`Source Specific Multicast (SSM) group, the Inter- Domain Multicast Routing
`
`(IDMR) group, the Reliable Multicast Transport (RMT) group, the Protocol
`
`Independent Multicast (PIM) group, and others. I have also served as a member of
`
`the Multicast Directorate (MADDOGS), which oversaw the standardization of all
`
`things related to multicast in the IETF. Finally, I was the Chair of the Internet2
`
`Multicast Working Group for seven years.
`
`16.
`
`I am an author or co-author of approximately 200 technical papers,
`
`published software systems, IETF Internet Drafts and IETF Request for Comments
`
`(RFCs).
`
`17. My involvement in the research community extends to leadership
`
`positions for several journals and conferences. I am the co-chair of the Steering
`
`Committee for the ACM Network and System Support for Digital Audio and Video
`
`(NOSSDAV) workshop and on the Steering Committees for the International
`
`Conference on Network Protocols (ICNP), ACM Sigcomm Workshop on
`
`Challenged Networks (CHANTS), and IEEE Global Internet (GI) Symposium. I
`
`have served or am serving on the editorial boards of IEEE/ACM Transactions on
`
`Networking, IEEE Transactions on Mobile Computing, IEEE Transactions on
`
`Networks and System Management, IEEE Network, ACM Computers in
`
`Entertainment, AACE Journal of Interactive Learning Research (JILR), and ACM
`
`Computer Communications Review.
`
`18.
`
`I have co-chaired a number of conferences and workshops including
`
`the IEEE International Conference on Network Protocols (ICNP), ACM
`
`7
`
`Packet Intelligence Ex. 2001 Page 9 of 39
`
`

`

`
`
`International Conference on Next Generation Communication (CoNext), IEEE
`
`Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON),
`
`International Conference on Communication Systems and Networks (COMSNETS),
`
`IFIP/IEEE International Conference on Management of Multimedia Networks and
`
`Services (MMNS), the International Workshop On Wireless Network Measurement
`
`(WiNMee), ACM Sigcomm Workshop on Challenged Networks (CHANTS), the
`
`Network Group Communication (NGC) workshop, and the Global Internet
`
`Symposium; and I have been on the program committee of numerous conferences.
`
`19. Furthermore, in the courses I teach, the class spends significant time
`
`covering all aspects of the Internet including each of the layers of the Open System
`
`Interconnect (OSI) protocol stack commonly used in the Internet. These layers
`
`include the physical and data link layers and their handling of signal modulation,
`
`error control, and data transmission. I also teach DOCSIS, DSL, and other
`
`standardized protocols for communicating across a variety of physical media
`
`including cable systems, telephone lines, wireless, and high-speed Local Area
`
`Networks (LANs). I teach the configuration and operation of switches, routers, and
`
`gateways including routing and forwarding and the numerous respective protocols
`
`as they are standardized and used throughout the Internet. Topics include a wide
`
`variety of standardized Internet protocols at the Network Layer (Layer 3), Transport
`
`Layer (Layer 4), and above.
`
`20.
`
`In addition to having co-founded a technology company myself, I have
`
`worked for, consulted with, and collaborated with companies such as IBM, Hitachi
`
`8
`
`Packet Intelligence Ex. 2001 Page 10 of 39
`
`

`

`
`
`Telecom, Digital Fountain, RealNetworks, Intel Research, Cisco Systems, and
`
`Lockheed Martin.
`
`21.
`
`I am a Member of the Association of Computing Machinery (ACM)
`
`and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).
`
`22. Additional details about my employment history, fields of expertise,
`
`and publications are further included in my curriculum vitae, attached as Exhibit
`
`2043.
`
`III. Compensation
`
`23.
`
`I am being compensated as an expert witness in this matter at $700 per
`
`hour in addition to out-of-pocket expenses. I have received no additional
`
`compensation for my work on this matter and my compensation does not depend,
`
`and has not ever depended in any way, on my opinion as expressed in this
`
`Declaration, in any testimony that I may give, or on the outcome of this case.
`
`IV. Materials Reviewed
`
`24.
`
`I have reviewed the following materials in connection with the
`
`preparation of this Declaration:
`
`• Provisional Patent Application No. 60/141,903 (Ex. 1016);
`
`• U.S. Patent No. 6,651,099 (Ex. 1001) and its file history (Ex. 1017);
`
`• U.S. Patent No. 6,665,725 (Ex. 1002) and its file history (Ex. 1018);
`
`• U.S. Patent No. 6,771,646 (Ex. 1003) and its file history (Ex. 1019);
`
`• U.S. Patent No. 6,839,751 (Ex. 1004) and its file history (Ex. 1021);
`
`• U.S. Patent No. 6,954,789 (Ex. 1005) and its file history (Ex. 1022);
`
`• U.S. Patent No. 6,412,000 (“Riddle”) (Ex. 1008);
`
`9
`
`Packet Intelligence Ex. 2001 Page 11 of 39
`
`

`

`
`
`• U.S. Patent No. 6,625,150 (“Yu”) (Ex. 1011);
`
`• RFC 1945 (Ex. 1010);
`
`• The Petitions for Inter Partes Review for IPR2020-00335, IPR2020-
`
`00336, IPR2020-00337, IPR2020-00338, IPR2020-00339, IPR2020-
`
`00485, and IPR2020-00486; and
`
`• Declaration of Dr. Jon B. Weissman (Ex. 1006).
`
`V. Overview of Basic Network Principles
`
`25. As basic background, one of the most widely used computer networks
`
`is the Internet. The Internet has been around for several decades. Many trace the
`
`origins of the Internet to the ARPANET (the Advanced Research Projects Agency
`
`Network), which dates back to the late 1960s. While the origins of the Internet were
`
`humble, it has grown into a massive, highly sophisticated network for highly
`
`complex and highly varied forms of communication. One of the major leaps in the
`
`Internet's evolution did not occur until the early 1990s and the sale of the NSFnet
`
`Backbone to MCI, spurring commercialization of the Internet and interest in the
`
`World Wide Web (WWW). These changes were significant contributors towards the
`
`Internet becoming more widely available and usable.
`
`26. Originally useful mainly for the exchange of text documents through
`
`email (using the Simple Mail Transfer Protocol, or SMTP) or file exchange (using a
`
`protocol like the File Transfer Protocol, or FTP), the Internet has evolved to support
`
`more complex data including multiple media types (e.g., pictures, audio, video),
`
`hence the concept of “multimedia.” Coupled with new and improved delivery
`
`capabilities and increased ways of offering information to users, the ways in which
`
`10
`
`Packet Intelligence Ex. 2001 Page 12 of 39
`
`

`

`
`
`the Internet could be used increased dramatically during the 1990s. These factors led
`
`to numerous technical innovations in the way data was made available to users.
`
`27. One of the more important capabilities that existed within the Internet
`
`was that it was acting as an information repository whereby servers held information
`
`and clients would make requests for that information. The Internet was also evolving
`
`such that, instead of servers holding important information, it was other users who
`
`held the information. In some cases, instead of information stored in documents, it
`
`was the users themselves who were the object of contact, for example, in multimedia
`
`conferencing. As described in more detail below, an underlying and long-standing
`
`challenge in the Internet was identifying the right address to use in contacting other
`
`users or servers.
`
`28. A large amount of Internet communication takes place using a
`
`client/server paradigm. That is, content servers hold information desired by users.
`
`Through their clients, users make requests for this information, and the server
`
`responds by providing the requested information. Such a paradigm is used in, for
`
`example, the World Wide Web (WWW). In other applications, like email, servers
`
`are responsible for accepting, storing, and forwarding email.
`
`29. Two principles upon which applications and the underlying network
`
`infrastructure are based are the use of layered communication to break the task of
`
`data delivery into more manageable sub-tasks, and the use of protocols to establish
`
`rules for how data is communicated.
`
`30. Generally, a protocol is a set of rules that defines how a set of functions
`
`will be performed. Protocols are important within networks since the two sides of a
`
`11
`
`Packet Intelligence Ex. 2001 Page 13 of 39
`
`

`

`
`
`communication must act in the same, predictable way for data to be successfully
`
`delivered. For example, the HyperText Transfer Protocol (HTTP) defines both how
`
`requests/responses for objects are to be made and the syntax of request/response
`
`messages. The way in which data is exchanged is as important as the format of the
`
`data when it is exchanged. Called syntax, protocol specifications typically include
`
`the way information in a message is formatted. By clearly describing a protocol's
`
`communication rules and syntax, ambiguities and errors can be avoided.
`
`31. Protocols are then combined, based on the layer at which each operates,
`
`to perform the functions necessary to deliver data between sources and destinations.
`
`In many cases, there is one protocol responsible for the functions of not one, but
`
`sometimes multiple layers. Each layer and its corresponding protocol perform a set
`
`of functions based on widely, but not universally, agreed upon guidelines. As data
`
`is prepared for transmission by an application, it is sent through a set of layers. Each
`
`layer performs specified functions. For some of the layers, there is a corresponding
`
`protocol and a corresponding protocol header that is added to the application's data.
`
`32. To help understand the process and give direction to the flow of data,
`
`the layers are “stacked” one on the other, from the highest layer (the application
`
`layer) to the lowest layer (the physical layer). Data, therefore, flows “down” the
`
`stack from the application layer of the transmitting host, across the network, and
`
`“up” a corresponding stack at the receiver.
`
`33. Over the years, there have been several efforts to “standardize” the
`
`layers and the functions performed by each. One example is the International
`
`Standards Organization's (ISO) Open System Interconnect (OSI). The OSI stack has
`
`12
`
`Packet Intelligence Ex. 2001 Page 14 of 39
`
`

`

`
`
`seven layers and the general functions of each layer are well-known. ISO's OSI stack
`
`model is an older example dating back to the mid-1980s. A more recent example is
`
`the “TCP/IP stack,” also called the “Internet stack.” It integrated the functionality of
`
`two of the layers from the OSI stack (Presentation and Session Layers) into the
`
`Application Layer and better maps to the Internet's currently used protocols, e.g., IP,
`
`UDP, and TCP.
`
`34. Of the layers in the TCP/IP stack, the “highest” layer is the application
`
`layer and includes protocols like the HyperText Transfer Protocol (HTTP) and the
`
`Simple Mail Transfer Protocol (SMTP). There are dozens of application layer
`
`protocols, each typically corresponding to a specific application.
`
`35. The Hypertext Transfer Protocol (or “HTTP”) is an example of a well-
`
`known application (layer 7) protocol. HTTP version 1.1 was published as RFC 2068
`
`in January 1997. As an application layer protocol, HTTP is a set of rules for carrying
`
`application-specific data between a source and a destination (for example, carrying
`
`HTTP protocol headers and world wide web data between a web browser and a web
`
`site server). Because most Internet traffic uses both IP and TCP, Internet traffic is
`
`often described as “TCP over IP” or simply “TCP/IP.” When that traffic happens to
`
`also use HTTP as the application layer protocol, it is often described as “HTTP over
`
`TCP/IP.”
`
`36. The next layer is the transport layer. The two most common protocols
`
`are the Transmission Control Protocol (TCP) and the User Datagram Protocol
`
`(UDP). Where the UDP protocol only provides support for “ports,” TCP provides
`
`better support for reliable data delivery through acknowledgements, in-order packet
`
`13
`
`Packet Intelligence Ex. 2001 Page 15 of 39
`
`

`

`
`
`delivery, connections, as well as congestion control, and similar to UDP, port
`
`numbers. The vast majority of content delivered over the Internet uses one of these
`
`two protocols as its transport layer protocol.
`
`37. The Transmission Control Protocol, referred to as “TCP,” is one of the
`
`main protocols used to send and receive information over the Internet. TCP is well
`
`known in the computer networking industry—one early TCP rule set was published
`
`as a Request for Comment (or “RFC”) by the Internet Engineering Task Force
`
`(“IETF”) in September 1981 (RFC 793). That rule set was based on an even earlier
`
`rule set published in December 1974 as RFC 675. TCP is an example of a transport
`
`(layer 4) protocol in the OSI model. TCP is responsible for adding reliability and
`
`ordering to the stream of network information—for example, the packets of
`
`information sent using IP as the network-layer protocol may not arrive at the
`
`destination in the same order intended by the sender of the message. TCP sets rules
`
`for breaking up and transmitting the message so that the recipient is able to reliably
`
`receive and reassemble the message. Another common analogy from the physical
`
`world is the example of sending a multi-page letter through the mail by separately
`
`numbering page and mailing each page in its own envelope. IP, like the postal
`
`service, will route the envelope-like packets to the destination, but TCP (like the
`
`numbering of the individual pages) sets the rules to allow the recipient to verify that
`
`all of the pages have been received and to reassemble the pages in the right order.
`
`38. TCP describes, for example, how two devices on the Internet may
`
`establish a connection over which TCP data packets may be communicated between
`
`them. By way of a negotiation process known as a three-way handshake, such a
`
`14
`
`Packet Intelligence Ex. 2001 Page 16 of 39
`
`

`

`
`
`connection can be established between two nodes, and once that connection
`
`establishment phase completes, data transfer can begin. Typically, a TCP connection
`
`is managed by a device operating system, so that applications such as a web browser,
`
`or a web server like a CDN caching server, can pass data to the operating system’s
`
`TCP protocol “stack” and the operating system will manage transmission of that data
`
`to the receiver, and will pass received data from the other device up to the application
`
`layer.
`
`39. The next layer down, and the cornerstone of the Internet, is the Internet
`
`layer. The corresponding protocol, the Internet Protocol (IP), provides end-to-end
`
`delivery. Using the IP address and a variety of support protocols (e.g., routing
`
`protocols), routers in the Internet are able to choose the next path towards a
`
`destination, thereby robustly moving packets closer to their destination. From a lay
`
`perspective, the most common transport protocol, TCP, along with IP, form the core
`
`of Internet communications. Hence, the Internet's protocols are commonly called
`
`“TCP/IP.”
`
`40. The Internet Protocol (or “IP”) is an example of a well-known network
`
`(layer 3) protocol. IPv4 was published as RFC 760 in January 1980 while its
`
`successor IPv6 was published as RFC 2460 in December 1998. The IP protocol
`
`describes a set of rules for dividing a message into multiple parts (called “IP
`
`packets”) and then transmitting those packets from an IP sender to an IP destination
`
`across multiple routers or other links in a computer network. Each packet of
`
`information includes an IP address for its destination, analogous to sending a letter
`
`through the mail by placing the letter inside an envelope that has the recipient’s
`
`15
`
`Packet Intelligence Ex. 2001 Page 17 of 39
`
`

`

`
`
`physical address written on the face of the letter. The Data Link Layer (DLL) and
`
`the Physical Layer are often closely coupled. The reason is that the function of the
`
`DLL is to move bits across one physical hop between devices that form part of an
`
`end-to-end path. A DLL protocol is typically designed for a specific physical
`
`medium, though there are often many different protocols that can be used for a given
`
`medium. Physical Layer protocols are responsible for converting digital bits into the
`
`analog transmission signal specific to the particular medium being used for
`
`communication. It is therefore clear why there is a close relationship between a DLL
`
`protocol and the Physical Layer: both work for a specific medium and together move
`
`data across a single hop along a path from a source to a destination’s postal address
`
`printed on it.
`
`41. Often overlooked in the transmission of data is that DLL protocols and
`
`their headers-only survive across a single hop. Once data is delivered across the hop,
`
`the DLL layer header is removed, leaving the IP header exposed, and then based on
`
`the next hop to the destination, a new DLL protocol header is added-this one specific
`
`to the new medium the packet is to traverse. This process is repeated for each hop
`
`along the path from a source to a destination.
`
`42. As mentioned above, while the stack concept is a popular metaphor to
`
`help understand how network communication occurs, no reference model is perfect,
`
`and each model serves as a guideline. Protocols, for example, may perform functions
`
`of other layers, and still be accepted as valid protocols. Even in these cases, the
`
`abstraction provided by the general principle of layering and abstraction are
`
`sufficient to enable data transmission to take place successfully.
`
`16
`
`Packet Intelligence Ex. 2001 Page 18 of 39
`
`

`

`
`
`43.
`
`In client/server based architectures that use a particular protocol to
`
`support a specific application, the protocol is usually implemented in both the client
`
`and the server. Thus, for example, there is an HTTP client (i.e., a web browser) and
`
`an HTTP server. The client and server communicate over the network using
`
`additional protocols focused on the actual delivery of data.
`
`A. The OSI Model
`
`44.
`
`Information is transmitted across networks, such as the Internet, as data
`
`packets. Data packets are formatted in compliance with established rules known as
`
`protocols. To facilitate communications across various networks, the International
`
`Standards Organization (“ISO”) developed the Open Systems Interconnection
`
`(“OSI”) model. The OSI model defines a framework for
`
`implementing
`
`communications between any two network devices and divides the communication
`
`process into seven layers as shown below:
`
`’099 Patent at 9:37-50.
`
`17
`
`Packet Intelligence Ex. 2001 Page 19 of 39
`
`

`

`
`
`45. Each layer provides specific functions to support the layers above it.
`
`The Application layer (layer 7) is the highest layer, while

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket