throbber

`
`www.mchivcorg
`415.561.6763?
`41 5340-0391 c~ fax
`
`Internet Archive
`300 Funston Avenue
`San Francisco, CA 9411 8
`
`AFFIDAVIT OF ELIZABETH ROSENBERG
`
`I am a Records Request Processor at the Internet Archive, located in San Francisco,
`California. I make this declaration of my own personal knowledge.
`
`The Internet Archive is a website that provides access to a digital library of Internet
`sites and other cultural artifacts in digital form. Like a paper library, we provide free
`access to researchers, historians, scholars, and the general public. The Internet
`Archive has partnered with and receives support from various institutions, including
`the Library of Congress.
`
`The Internet Archive has created a service known as the Wayback Machine. The
`Wayback Machine makes it possible to browse more than 450 billion pages stored
`in the Internet Archive‘s web archive. Visitors to the Wayback Machine can search
`archives by URL (i.e., a website address). If archived records for a URL are
`available, the visitor will be presented with a display of available dates. The visitor
`may select one of those dates, and begin browsing an archived version of the Web.
`Links on archived files in the Wayback Machine point to other archived files
`(whether HTML pages or other file types), if any are found for the URL indicated
`by a given link. For instance, the Wayback Machine is designed such that when a
`visitor clicks on a hyperlink on an archived page that points to another URL, the
`visitor will be served the archived file found for the hyperlink’s URL with the
`closest available date to the initial file containing the hyperlink.
`
`The archived data made viewable and browseable by the Wayback Machine is
`obtained by use of web archiving software that automatically stores copies of files
`available via the Internet, each file preserved as it existed at a particular point in
`time.
`
`The Internet Archive assigns a URL on its site to the archived files in the format
`httpia’r’webarchive.org/webi'[Year in yyyy}[Month in mm][Day in dd][Time code in
`hh:mm:ss]l[Archived URL] aka an “extended URL”. Thus, the extended URL
`httpzr’r‘webarchiveorg/webfl9970] 26045828d1ttp:r'fwww.archive.org/ would be the
`URL for the record of the Internet Archive home page HTML file
`(httpu’r’wwwarchiveorgl) archived on January 26, 1997 at 4:58 am. and 28 seconds
`(l997l01r'26 at 04:58:28). A web browser may be set such that a printout front it
`will display the URL of a web page in the printout’s footer. The date indicated by
`an extended URL applies to a preserved instance of a file for a given URL, but not
`necessarily to any other files linked therein. Thus, in the case of a page constituted
`by a primary HTML file and other separate files (e.g., files with images, audio,
`multimedia, design elements, or other embedded content) linked within that primary
`HTML file, the primary HTML file and the other files will each have their own
`respective extended URLs and may not have been archived on the same dates.
`
`Attached hereto as Exhibit A are true and accurate copies of browser printouts of
`the Internet Archive‘s records of the archived files for the URLs and the dates
`
`i
`
`EX1006
`EX1006
`Palo Alto Networks v. Sable Networks
`Palo Alto Networks V. Sable Networks
`IPR2020-01712
`IPR2020-01712
`
`

`

`
`
`specified in the footer of the printout or an attached coversheet (in the case of
`records for which a browser does not provide a ready option to print a URL in the
`footer, e.g., in the case of a PDF file).
`
`7'.
`
`I declare under penalty of perjury that the foregoing is true and correct.
`
`DATE: 0mg ggM W fig?
`
`lizabeth Rosenbe
`
`ii
`ii
`
`

`

`ÿ
`
` ÿÿÿÿÿÿ
`Exhibit A
`
`ÿ
`
`ÿ
`
`ÿ
`
`ÿ
`
`ÿ
`
`ÿ
`
`ÿ
`
`iii
`
`

`

`  
`
   
`
 
`https://web.archive.org/web/2003O317051910/http2/packetee
`
    !ÿ
`r.com/PDF_fi|es/4steps.pdf
`
`iv
`iv
`
`

`

`  ÿ
`
ÿ
` ÿÿ
`
`
`ÿ ÿ ÿ ÿ
`
` ÿÿ
`
` ÿ ÿ 
`ÿ
`
`ÿ
`
`ÿÿ !"#$$$%&'ÿ !"#$(!)$%*
`
`+,-.,/0,1ÿ3443ÿ
`
`ÿ 6
`
`789:;::<=ÿ?@8Aÿ
`BCDEFGHIJKÿBMÿNOPQRÿ
`RPSTSUVTRRPPÿ
`WXYZ[-\]^,.,,1_]Z/ÿ
````_-\]^,.,,1_]Z/ÿ
`
`ÿ
`
`abc)!deÿ!dfÿ)%bfg"ÿd!c$'ÿ!%$ÿ%!f$c!%#'ÿb%ÿ%$h'$%$fÿ%!f$c!%#'ÿbiÿ$%ÿ%$')$"j$ÿ"bc)!d$'kÿab)e%hÿlmmlÿ !"#$$$%nÿ
`od"kÿpqqÿ%h'ÿ%$'$%j$fkÿrbÿ)!%ÿbiÿ'ÿ)gsq"!bdÿc!eÿs$ÿ%$)%bfg"$fnÿ)bb"b)$fnÿ'b%$fÿbdÿ!ÿ%$%$j!qÿ'e'$cnÿ%!d'c$fnÿb%ÿ
`%!d'q!$fÿdbÿ!db$%ÿq!dhg!h$ÿtbgÿ$ÿ$u)%$''ÿt%$dÿ"bd'$dÿbiÿ !"#$$$%nÿod"kÿ
`
`ÿ
`
`ÿ ÿ ÿ
`
`
`
` vrÿwxmmkyÿ
`
`1
`
`

`

`  ÿÿ
`
` ÿ
`
`
ÿÿ ÿ ÿ  ÿ
`
`"#$%ÿ&'ÿ($)*+%,#$-+./00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001ÿ
`
`2$'+ÿ34ÿ5+-6378+9%ÿ$9:ÿ;'+0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000<ÿ
`
`=ÿ>3?.@,%+-ÿ,9$-'#3%000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000<ÿ
`
`ÿABÿCDEÿFG HÿIJÿ
`
`=--6K)$%K39'ÿ$9:ÿ(.3%3)36'ÿLÿ=?%38$%K)$66700000000000000000000000000000000000000000000000000000000000000Mÿ
`
`N6$''K4K)$%K39Oÿ$ÿ,%+-ÿ=P3Q+00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000Rÿ
`
`N38839ÿN6$''K4K)$%K39ÿ=--.3$)#+'0000000000000000000000000000000000000000000000000000000000000000000000000000Sÿ
`
`ÿIG BÿDTEÿIUÿ
`
`;%K6KV$%K39ÿ=9$67'K'000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000Wÿ
`
`(+.43.8$9)+ÿ=9$67'K'0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000X<ÿ
`
`Y$Zÿ[+%.K)'0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000XSÿ
`
`ÿI\BÿC  EÿI]Uÿ
`
`($.%K%K39K9^ÿ_$9:ZK:%#00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000XWÿ
`
`(+.@,+''K39ÿY$%+ÿ(36K)K+'0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000`Xÿ
`
`a%#+.ÿ(36K)K+'00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000``ÿ
`
`Y$%+@N39%.36ÿ>+$%?.+'0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000``ÿ
`
`;9KQ+.'$6ÿb.$9'6$%3.000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000`<ÿ
`
`5+%+)%K9^ÿ$9:ÿ=Q3K:K9^ÿ=%%$)*'000000000000000000000000000000000000000000000000000000000000000000000000000000000`<ÿ
`
`ÿ
BÿcEÿd efÿ
`
`
`
`
 GEÿÿIDÿghE eiÿ
`
`j Dÿkÿl\ÿmÿl\enÿ
`
`[3'%ÿ=--.3-.K$%+ÿ,K%?$%K39'000000000000000000000000000000000000000000000000000000000000000000000000000000000000000`oÿ
`
`N#33'K9^ÿ$ÿ5+-6378+9%ÿ,%.$%+^70000000000000000000000000000000000000000000000000000000000000000000000000000000`Sÿ
`
`pqrstuqÿwqsxyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyz{ÿ
`
`|}~rs}€xyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyz{ÿ
`
`}‚}ƒ}„…ÿ†~stuqxyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyz‡ÿ
`
`ws}u…ÿ}ˆÿrÿ‰q‚ƒ}…Šq€sÿ†u}„uqxx}€yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy‹Œÿ
`
`tqxs}€xÿs}ÿ†}€Žquyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy‹Œÿ
`
`
`
`
ÿ ÿg   ÿ
`
`ÿ
`
`ÿ
`
`($)*+%++.Oÿ&9)0ÿÿ
`
``ÿ ÿ
`
`

`

`  ÿ ÿ ÿ
`

ÿ   ÿÿ
`
`Four Steps to Application Performance f%I
`non-critical or less urgent applications tend to dominate when applications Q,
`attachments orhigh-capacity file transfers consume more than their share %
`
`ÿ !"ÿ"##"!ÿ" $ÿ%"&ÿ' ÿ%$(ÿ)' !"!$*+ÿ
`Sluggish mission-critical applications are bad for business. Unfortunately,
` !"ÿ ÿ$ÿ $!ÿ"##"!ÿ!$&ÿ!ÿ&"!$ÿ,$ÿ"##"!ÿ
`%"!!$ÿ' ÿ%"&,&!ÿÿ$!$&ÿ-./ÿ"$ÿ0(ÿ1" $ÿ$"ÿ
`battle for bandwidth on congested WAN access links. Large email
`"!!"$!ÿ ÿ"#"!*ÿ'$ÿ! "'$ ÿ$ÿ $ÿ!"ÿ!$ ÿ" $ÿ
`
`'ÿ%"&,&!+ÿ,$ÿ2 "$+ÿ.3+ÿ4! 5+ÿ"&ÿ!$ ÿ !"ÿ"##"!ÿ
`of bandwidth, while Oracle, SAP, Citrix, and other critical applications
`! $(ÿÿ6ÿ"*ÿ'ÿ!$$ÿ# %$ÿ&ÿ'"" ÿ!ÿ*7ÿ
`struggle. Do any of these problems sound familiar to you?
`
`8ÿ.ÿ$ ÿ&,"&ÿ"ÿ" $ÿ'$ÿ"&ÿ.3ÿ#$ ' "$ÿ"(ÿÿ
`0 A user downloads a large file and SAP performance lags.
`
`8ÿ.ÿ$#*$$ÿ* :$ÿÿ"#!#ÿ,!ÿ!$ÿ$"$ÿ$ ;$ ÿ"&ÿÿ!$ÿ% "ÿ''$<ÿ
`0 An employee synchronizes his laptop with the message server and clogs the branch office’s
`WAN link for 15 minutes.
`-./ÿ0ÿ' ÿ=>ÿ!$(ÿÿ
`
`8ÿ?ÿ$!"!<ÿ?3@ÿ&,"&ÿ"$ÿ $ÿ $!+ÿ!$ "!;$ÿ"##"!ÿ!ÿ! $(ÿÿ
`0 Music enthusiasts’ MP3 downloads cause more urgent, interactive applications to struggle.
`
`8ÿA! "$!ÿ"##"!ÿ$ ;$&ÿ' ÿ"ÿ$! "ÿ!$ÿ''$ ÿ$#*$$ÿ$"*ÿ"$ÿ%!ÿ# ÿ
`o
`Intranet applications served from a central site offer employees easy access but poor
`#$ ' "$(ÿÿ
`performance.
`
`8ÿB$#$"!$&ÿ%"&,&!ÿ# "&$ÿ'"ÿ!ÿ"&& $ÿ#$ ' "$ÿ# %$ÿ%!ÿ&ÿ $"$ÿ!ÿ
`0 Repeated bandwidth upgrades fail to address performance problems but do increase costs
`%!"!"*(ÿÿ
`substantially.
`
`C&"*<ÿ$!$ # $ÿ $D $ÿ#$ ' "$+ÿ# $&!"%!*+ÿ"&ÿ!$*ÿ' ÿ!$ ÿ$!, 0ÿ"&ÿ
`Today’s enterprises require performance, predictability, and consistency from their networks and
`!$ÿ"##"!ÿ!"!ÿ! ";$ $ÿ!$(ÿ.&ÿ!"!<ÿ# $$*ÿ,"!ÿ3"0$!"#$ Eÿ' ÿ3"0$!$$ ÿ
`the applications that traverse them. And that’s precisely what PacketShaper® from Packeteer
`delivers.
`&$;$ (ÿ
`
`Cÿ#"#$ ÿ&$ %$ÿ"ÿ# $ÿ!ÿ";&ÿ# %$ÿ0$ÿ!$ÿ&$ %$&ÿÿ!$ÿ$5"#$ÿ"%;$ÿ"&ÿ
`This paper describes a process to avoid problems like those described in the examples above and
`$ ;$ÿ"ÿ"ÿ!$"ÿ# &!ÿ;$ ;$,ÿ' ÿ!$ÿ3"0$!"#$ ÿ# &!ÿ$(ÿC$ÿ#"#$ ÿÿ!$&$&ÿ
`serves as a technical product overview for the PacketShaper product line. The paper is intended
`' ÿ*!$ÿ"&ÿ$!, 0ÿ"&! "! ÿÿ ":"!ÿ!"!ÿ""$ÿ!$ ÿ,ÿ"##"!ÿ"&ÿ
`for system and network administrators in organizations that manage their own applications and
`
`$!, 0ÿ#$ ' "$(ÿÿ
`network performance.
`
`FGÿH ÿ IG Jÿ
`What Is PacketShaper?
`
`Aÿ$!$ # $ÿ$!, 0ÿ!"!ÿ" $ÿ;$ ,$$&ÿ%*ÿ $"ÿ"!ÿ'ÿ! "''+ÿ""$&ÿ
`In enterprise networks that are overwhelmed by increasing amounts of traffic, unmanaged
`$!ÿ"!ÿ-./"$ÿ0ÿ"&ÿA!$ $!ÿ0ÿ&$ $ÿ"##"!ÿ#$ ' "$+ÿ
`congestion at WAN-access links and Internet links undermines application performance,
` $!ÿÿ#" $&ÿ$#*$$ÿ"&ÿ#"*ÿ# &!;!*(ÿ/$!, 0ÿ""$ ÿ#$&ÿ $"ÿ
`resulting in impaired employee and company productivity. Network managers spend increasing
`# !ÿ'ÿ!$ÿ%&$!ÿÿ%"&,&!ÿ# "&$ÿÿ"!!$#!ÿ!ÿ;$ÿ!$ÿ#$ ' "$ÿ# %$+ÿ
`portions of the budget on bandwidth upgrades in attempts to solve the performance problems,
`
`*ÿ!ÿ'&ÿ!"!ÿ!$ÿ# %$ÿ#$ !(ÿ
`only to find that the problems persist.
`
`3"0$!"#$ ÿÿ!$ÿ%"&,&!""$$!ÿ!ÿ!"!ÿ% ÿ# $&!"%$+ÿ$''$!ÿ
`PacketShaper is the bandwidth-management solution that brings predictable, efficient
`#$ ' "$ÿ!ÿ"##"!ÿ ÿ;$ ÿ$!$ # $ÿ,&$" $"ÿ$!, 0ÿK-./Lÿ"&ÿ!$ÿ
`performance to applications running over enterprise wide-area networks (WANs) and the
`A!$ $!(ÿA!ÿ%""$ÿ! "''<ÿ&$"&+ÿ;ÿ$"ÿ!*#$ÿ'ÿ! "''ÿ!$ÿ%"&,&!ÿ!ÿ$$&ÿ!ÿ
`Internet. It balances traffic’s demands, giving each type of traffic the bandwidth it needs to
`#$ ' (ÿ3"0$!"#$ ÿ# !$!ÿ !"ÿ! "''+ÿ#"$ÿ%"&,&! $$&*ÿ! "''+ÿ"&ÿ# $;$!ÿ"*ÿ
`perform. PacketShaper protects critical traffic, paces bandwidth-greedy traffic, and prevents any
`$ÿ!*#$ÿ'ÿ! "''ÿ' ÿ#:ÿ $ $(ÿA!ÿ# ;ÿ%"&,&!ÿ!ÿ"##"!+ÿ
`single type of traffic from monopolizing resources. It provisions bandwidth to applications,
`$+ÿ% "ÿ''$+ÿ"&M ÿ$ (ÿÿ
`sessions, branch offices, and/or users.
`
`3"0$!"#$ <ÿ' !$#ÿ"## "ÿ"'$" &ÿ"##"!ÿ#$ ' "$ÿ"&ÿ"5:$ÿ $! ÿÿ
`PacketShaper’s four-step approach safeguards application performance and maximizes return on
`
`$!, 0ÿ"#"!*(ÿA!ÿ# ;&$ÿ!ÿ!ÿ"&ÿ! ÿ;$ ÿ$!, 0ÿ"$(ÿ3"0$!"#$ ÿ
`network capacity. It provides insight into and control over network usage. PacketShaper
`&;$ ÿ"&ÿ"'$ÿ"##"!+ÿ""*:$ÿ!$ ÿ#$ ' "$+ÿ$' $ÿ#*%"$&ÿ
`discovers and classifies applications, analyzes their performance, enforces policy-based
`%"&,&!ÿ""!+ÿ"&ÿ$$ "!$ÿ $# !ÿÿ!$ÿ $!(ÿ-!ÿ3"0$!"#$ +ÿ*ÿ"ÿ! ÿ
`bandwidth allocation, and generates reports on the results. With PacketShaper, you can control
`"##"!ÿ#$ ' "$ÿ!ÿ!ÿ%$ÿ#  !$+ÿ"0$ÿ$''$!ÿ$ÿ'ÿ"ÿ!$&"#"!*ÿ0+ÿ
`application performance to suit business priorities, make efficient use of a limited-capacity link,
` $"$ÿ! #!+ÿ"&ÿ# !$!ÿ !"ÿ"##"!(ÿÿ
`increase throughput, and protect critical applications.
`
`ÿ
`
`3"0$!$$ +ÿA(ÿÿ
`Packeteer, Inc.
`
`@ÿ ÿ
`3
`
`

`

`  ÿÿ  
`
ÿ
ÿ ÿ
`Ease of Deployment and Use
`
`ÿÿÿ !"#$ÿ%&ÿ'%ÿ(#$ÿ%&ÿÿ)ÿÿÿÿ
`PacketShaper sits behind WAN-link routers and/or Internet-link routers at main sites and at
`
`ÿ%**+ÿÿ)&ÿÿ%%ÿ%ÿÿÿÿ$$ÿ**ÿ,%&ÿÿÿ%ÿ)-+ÿ
`branch offices. PacketShaper must be positioned so that it sees all traffic you intend it to manage.
`.%&ÿÿ%%ÿ%ÿ$%,ÿÿ%)/$,ÿ%&-%&ÿ),ÿ%ÿ$$ÿ%**0ÿ%ÿ,%&ÿ
`You can choose to deploy PacketShaper comprehensively throughout many or all offices, or you
`ÿÿ)%ÿ$%1$,ÿÿ*%$$%1ÿÿÿ$%,)ÿ-,ÿ,ÿ-ÿ1ÿÿ)ÿÿ*+ÿÿ
`can start more slowly and follow a phased deployment strategy by starting with a main site first.
`2*ÿ/,ÿ1ÿ%%$%-,ÿÿ$%,)ÿ-,+ÿÿÿ/$$ÿÿÿ/,ÿ%*ÿ
`Benefits vary with topology and deployment strategy. PacketShaper is available in a variety of
`)%$ÿÿ%ÿ,ÿÿ*&+ÿ3%ÿ)%ÿ$0ÿÿ456789:5;<ÿ>ÿ?@5;ÿA;Bÿ?@5C5ÿ
`models based on capacity and features. For more detail, see Deployment — When and Where
`$ÿÿÿ+ÿ
`later in this paper.
`
`ÿ$$%ÿÿ,ÿÿ%ÿ%*ÿ$&---ÿÿ1%ÿ$ÿÿ-ÿÿÿ
`PacketShaper installation is easy and consists of plugging in two cables and entering address and
`ÿ*%)%ÿ%ÿÿ1#ÿ&ÿ-+ÿÿ-ÿ$$,ÿ1ÿE-ÿ
`access information on a web-based setup page. PacketShaper integrates cleanly with existing
`
`1%ÿ*&&0ÿ)%-ÿ%ÿ-ÿ%ÿ%&ÿ%*-&%0ÿ%%$%-0ÿ%0ÿ%ÿ
`network infrastructure, imposing no changes on router configuration, topologies, desktops, or
`/+ÿ(ÿ$%ÿ-ÿ)%%$,ÿ1ÿ$0ÿ#,ÿ)-)ÿ$*%)ÿÿ%-ÿ
`servers. It also integrates smoothly with central, third-party management platforms and reporting
`%%$ÿ&ÿÿFÿGH1I0ÿFÿ%$,ÿJK0ÿL%)&ÿ"MNOGGPK0ÿ(*%HK0ÿ
`tools such as HP OpenView®, HP Policy Xpertm, Micromuse NETCOOL M, InfoVistam,
`L%%*ÿME$I0ÿÿ%+ÿÿ(ÿ%0ÿQÿ%$,OKÿ%/ÿÿ%/ÿ
`Microsoft Excel®, and others. In addition, Packeteer’s PolicyCenterTM provides the convenience
`%*ÿ$Rÿ)-)ÿÿ$-ÿ$%,)0ÿÿQÿS%Oÿ%/ÿ*&$$#
`of centralized management in large deployments, and Packeteer’s ReportCenter provides firll—
`*&ÿ%ÿ
`featured reports
`$,R-ÿ&$R%ÿÿ
`analyzing utilization and
`*%)ÿ*%ÿ
`performance for
`)&$$ÿ$%%+ÿ
`multiple locations.
`
`
`PacketShaper-t © FACKETEEFI"
`tap ten
`minitur
`report
`setup
`ink.
`llalp
`leedhauk
`panelluina
`
`
`
`—': TRAFFIC CLASS ":—
`traffic (lass test
`;
`
`
`
`mm_
`
`
`
`
`
`
`Partition: 1Menone [Dynamic 100k7n0ne]
`
`
`
`
`:: attributes 2'?
`afi'fi,
`
`
`
`
`
`
`
`la games“
`Web service (Hyperel'ext Transport Pretecet)
`
`
`Name: IHTrP
`
`Parent: tlnbound
`
`
`
`
`f‘ Exception
`Type:
`.
`Traffic Discovery
`within Class: Not Available
`Host Analysis:
`I7 Top Talkers
`
`6‘ Standard
`
`l7 Top Listeners
`
`A web-based user
`!ÿ1#ÿ&ÿ
`interface offers access to
`
`*ÿ%**ÿÿ%ÿ
`PacketShaper from any
`ÿ*%)ÿ,ÿ
`desktop With a web
`
`%ÿ1ÿÿ1ÿ
`browser. A command-
`%1+ÿ!ÿ%))#
`$ÿ*ÿ%**ÿ*0ÿ
`line interface offers fast,
`detailed control fiom a
`
`$ÿ%%$ÿ*%)ÿÿ
`Telnet session. You
`N$ÿ%+ÿ.%&ÿ
`choose the level of
`%%ÿÿ$/$ÿ%*ÿ
`&,ÿT&ÿ%ÿ
`security required to
`examine and alter
`E)ÿÿ$ÿ
`Qÿ
`PacketShaper’s
`%*-&%ÿÿ
`configuration and
`measurement data.
`)&)ÿ+ÿ
`
`
`
`UÿVWXYZ ÿZ
[ ÿ
`A Four-Step Snapshot
`
`MÿÿÿQÿ*%&#ÿ1#)-)ÿ-,ÿÿÿ-$ÿÿ%*ÿ
`Each step in PacketShaper’s four-step bandwidth-management strategy is an integral part of
`)--ÿ$%ÿ*%)+ÿNÿÿÿ%&ÿ$%1ÿÿE$ÿÿ)%ÿ$ÿ
`managing application performance. The steps are introduced below and explained in more detail
`
`ÿÿ)ÿ%*ÿÿ+ÿÿ
`in the remainder of the paper.
`
`\]^_ÿ`abccdefÿg^hijklÿmkbeednÿ
`One: Classify Network Traffic
`
`more.
`
`(Qÿÿ%ÿ%ÿÿ$%ÿ*ÿ,%&ÿQÿ**ÿÿ*%)ÿ%ÿ,ÿ%*ÿ
`It’s hard to protect an application if you can’t differentiate it fiom other types of
`**+ÿÿÿÿ*ÿ%&ÿ%*ÿ,ÿ%*ÿ**+ÿ.%&ÿÿ
`traffic. PacketShaper detects and identifies thousands of types of traffic. You can
`%$ÿ**ÿ%ÿ1ÿ$%0ÿ%%%$0ÿ&0ÿ1ÿ-0ÿ&0ÿÿ
`isolate traffic associated with applications, protocols, subnets, web pages, users, and
`)%+ÿ
`
`ÿ
`
`0ÿ(+ÿÿ
`Packeteer, Inc.
`
`oÿ ÿ
`4
`
`

`

`  ÿ
` ÿ
ÿ
`
`ÿÿÿÿ !"ÿ#$ÿÿ % ÿ&& ÿ'ÿÿ$"ÿ
`( )*&%ÿ&%'ÿÿ$ÿ+ÿ%)ÿÿ&& ÿ'%,ÿ-ÿ
`% )ÿ%++ ÿ'.ÿ ÿ%)ÿ%.ÿ!%ÿ%&ÿ.ÿÿ  !ÿ
`
`%)ÿ++  $,ÿÿ
`
`  ÿ/0ÿ1 234 ÿ
`
`566ÿ&& ÿ&%+% ÿÿÿ%ÿ+ÿ&% $ÿ 6ÿÿ
` %6ÿÿ!ÿ%7!%ÿÿÿÿ+ÿÿ&& ÿ',ÿ
`( )*&%ÿÿÿ %ÿ+ÿÿ$&ÿ+ÿ%++ 8ÿ$ÿ%ÿ+%ÿ' ÿ%ÿ
`'ÿ%9ÿÿ&6ÿ+%ÿ.ÿ$:'ÿ%++ ÿ! ÿÿ;9ÿ
`ÿÿ ÿ+ÿ ÿ ÿÿÿÿÿ+%ÿ&& ÿ! ÿÿ
`5 %+ÿ<= 6ÿÿ%ÿÿ:!6%$ÿÿ % $ÿ&%,ÿ
`
`>? ÿ@ A0ÿ@ B?0Bÿ
`
`C&%'ÿ%&%.ÿ6%&.ÿÿÿ&%'ÿ$ÿ6ÿÿ% ÿ
`&%+% .ÿ.ÿ++  $.ÿÿ&& :ÿ%' :'ÿ & ,ÿ
`-+ÿ&%+% ÿÿÿ!.ÿ %ÿ& ÿ ÿÿ+ÿÿ%6ÿ
`%&ÿÿÿ%6ÿÿ)&ÿÿ%++ ÿÿ&& ÿ+%ÿ
`!ÿ& ,ÿD&%ÿ++%ÿ&%+ÿÿ&& ÿ !ÿÿ&%+%ÿÿ
`%.ÿ'ÿ!%6ÿ%)ÿ6%,ÿÿ
`
`ÿ E
`
`FGHÿJKGLÿMNOPPQRSQKTÿUGFVWXYÿZXORRQ[ÿ
`
`-+$6ÿÿ 6%\6ÿÿ$&ÿ+ÿ%)ÿ%++ ÿÿ &ÿ+%ÿÿÿÿ
`ÿ+%ÿ&ÿ%ÿ'6ÿ&%+% ÿ&%,ÿ( )%ÿ ÿÿ&% ÿ ]^__`a`b^c`de,ÿ
`D ÿ%++ ÿ + ÿÿ %! ÿfÿÿ %ÿ%ÿ!+!ÿ$ÿ+ÿ$!ÿ ÿ&&$ÿÿ
`ÿÿ&% ÿ%++ ÿ$!ÿ'ÿÿ,ÿ-ÿ.ÿ%%ÿ%ÿ!!$ÿ!%&%ÿÿÿÿ
`'%$ÿ+ÿ%ÿ%)ÿ&& ,ÿÿÿ
`
`g!ÿ ÿ +$ÿ%++ ÿ$ÿ&& .ÿ&% .ÿ&%ÿ!%.ÿhDiÿ%ÿ
` %.ÿÿ.ÿijk(ÿÿ.ÿj++%'ÿ6.ÿ5(i*ÿ.ÿ-(ÿ
`&%  ÿ.ÿ-(ÿ%ÿ5kCÿ%.ÿ!.ÿ%'ÿ% ÿ
`l!m!!n.ÿ!% .ÿ.ÿÿ&ÿ%6.ÿ5ÿ$&.ÿÿ
`
`%%.ÿo% ÿ.ÿC%=ÿ&!ÿ&& .ÿC%=ÿ-Ckÿ&%%$ÿ
`666.ÿpikqÿ'%.ÿÿ%,ÿ( )*&%ÿ!ÿÿ%%  ÿ
`%++ : + ÿ%.ÿ%6ÿÿ%$ÿ+%ÿ'%$ÿ ÿ%++ ÿ$&ÿÿ
`%',ÿ< ÿ%++ ÿ 6%$ÿÿ ÿÿcr^aa`bÿb]^__,ÿÿ
`
`#ÿÿ&%! ÿ ÿ++%ÿ%++ ÿÿÿ$%ÿÿ%!6ÿ+!%ÿ+ÿÿ%ÿ
`o*-ÿ%)6ÿ.ÿ( )*&%ÿ +ÿ%++ ÿÿÿ$%ÿÿ%!6ÿ'.ÿ6ÿ
`$!ÿ&% $ÿ ÿ&& ÿ%ÿÿ!,ÿÿ
`
`tHHNQ[OFQWKPÿOKuÿvXWFW[WNPÿwÿtxFWyOFQ[ONNSÿ
`( )%ÿ !$ÿÿÿÿÿ+ÿ&% ÿÿ&& ÿ( )*&%ÿ +ÿ
`! $,ÿkÿ% ÿÿ !ÿÿ+6ÿ%' 8ÿ
`
`ÿ
`
`( )%.ÿ- ,ÿÿ
`
`zÿ ÿ
`
`

`

`    ÿÿ
`
ÿ
` ÿ
`ÿÿ
`ÿ !"#ÿ
`$!%!ÿ &ÿ'&(ÿ
`')*ÿ +#ÿ
`'&'!,+ÿ
`-&.ÿ//'+ÿÿ
`
/ "&ÿ$ *ÿ
`0 * ÿ 1ÿ
`/+&#ÿ
`
`2 ÿ
`3  4ÿ
`!",56ÿ
` (!"!7&ÿ
`8&+1*&ÿ
`9&,ÿ
`'!+6!ÿ
`*& !7&ÿ
`
`:;<ÿ
`!!ÿ
`$!%! &ÿÿ
`$=ÿ85!+7ÿ
`
`
+!"ÿ >?@?A#ÿ
`*ÿ
`
`B  ÿ
`"&%ÿÿ
`)*?ÿ*!77%ÿ)*ÿ
`C/(+ÿ
`*?ÿ**?ÿD=*?ÿ) *ÿ
`*%Eÿ
` ÿ
`'ÿ&1/ÿ
`--)*ÿ
`) *ÿ
`Fÿ
`))*ÿ
`DD *ÿ
`D Fÿ
`G6ÿ6+57+ÿ
`
`3HHIHJ ÿ
`'!,+ÿ*+ÿ
`'ÿ.Fÿ
`
`
+!"ÿ>K@ÿ
`*++77ÿ
`
`3 L24ÿ
`  L Jÿÿ
`
` ÿ
`= *ÿ
`=-ÿ
`=*ÿ
`+ÿ
`&ÿ
`9+6+7ÿ
`F=*ÿ
` =Dÿ
`)  ÿ
`G-ÿ
`5(7ÿ
`
`:MNH Oÿ
`2 HI2H2ÿ
`PPÿ
`""Q'Fÿ
`'*ÿ
`F&07-&7ÿ'.ÿ
`'"+7P&ÿ=
'ÿÿ
`ÿÿÿ 'ÿ8R"(!#ÿ
`-%ÿ
`ÿÿÿC+0/G7ÿ
`*
*Sÿ
`')*ÿ
`
`T ÿ  ÿ
`ÿ
` 0/ÿ
`F",ÿ
`'"+7P&U7ÿ
`-&
U*ÿ
`-ÿ
`-%ÿ
`ÿÿÿ-&G!+Vÿ
`
`WHN Jÿ
`7(+X7ÿ !ÿ
`!&&Y&ÿ
`=!6ÿÿ
`=ÿ
`8%+.07&ÿ
`9!ÿ
`!PUFPÿ
`F0"!7+&7ÿ $Z#ÿ
`'-ÿ[ÿ
`'1&("ÿ
`.0!,ÿ?ÿ?ÿ\ÿÿ
`1
ÿ
`)+67ÿ?ÿ
`D+!ÿ
`G!+"+!P&ÿÿ
`]!(^ÿC!7ÿ
`
`_2Jÿ`LL JJÿ
`)) *ÿÿ
`&&!"(!&ÿ
`ÿÿ 8D=*ÿ
`*+7P&ÿ*+7!ÿ
`')ÿÿ
`)-Sa>bÿ
`)-VaVbÿ
`
`c dHL4ÿc`eÿÿ
`Hfÿe2MB<ÿ
`*ÿ
`//)!,ÿ
`=8 &ÿ
`*ÿ
`-ÿ
`F)ÿ
`-&8Dÿ
`'
*U=FK ÿ
`***8ÿ
`-ÿ
`ÿ
`
`opÿ  ÿ2ÿ
`  ÿqHJ fÿ
`
` &+Rÿ
`ÿÿ*067(ÿ//7ÿ
`ÿÿÿ!ÿ+!ÿ
` =*K)+!ÿ
`ÿÿÿ+%+ÿÿ
`
`r2L ÿ2 ÿB<ÿ
`
` !+&ÿ
` D'ÿ
`=!/!ÿ
`YSaSÿ
`U*(ÿ
`' 9ÿ 0Yÿ
`'"ÿ*ÿ
`-&a*(ÿ
` )*ÿ
` ) *ÿ
`)Ymabÿ
`=
*(ÿ
`ÿ
`
`g JJHddÿ
`
Fÿ7&!&ÿ'7ÿ
` .ÿ (!&ÿ
`'-ÿ'77+ÿ
`]!(^ÿ'77+ÿ
`&+&ÿ !1ÿ (!&ÿÿ
`
`gJLÿ
`
` 7" )ÿ
`=!&U)ÿ
`=
'ÿ
`F>ÿ
`-57&!ÿ
`)ÿ+%+ÿ
`G6(&7ÿ
`
`gh g fHÿ
`'0&U"!7&ÿ
`ÿÿÿ-&(5ÿ
`-&'&ÿ
`.0",)ÿ
` )*ÿ
` !ÿ0ÿ
`&+!5+,7ÿ
` )*ÿ
`'*8Cÿ
`)aÿ
`
D)"!7&ÿ
`G68Rÿ
`G57'!ÿ
`ÿ
`
`ghJLÿ<i<ÿ
`7&+ÿ
`0C!!R1ÿ
`067&+ÿ
`=+"& "&ÿ
`=,1ÿ
` 0ÿ
`C0&!ÿ
`C+%ÿ
`&ÿ
`'7(ÿ
`9![!ÿ
`-!/7&+ÿ
`"0+ÿÿ
`)+/77ÿ
`
`e j2kÿ
`gHHd N ÿÿ
`
` 7"ÿ=7"%+1ÿ
` '*ÿ61ÿ
`ÿÿÿ/!",&ÿ&1/ÿ
`'"+7P&ÿ'ÿ
`-)*ÿ
`
` *ÿ
`-'*ÿ
`]F
Cÿ
`
`<ÿ
`F* ÿ
`**ÿ
`)-VaVb/ÿ
`)-Sa@>ÿ
`
`;2hdÿ
`D *ÿ
`C*ÿ
` )ÿ
`= *ÿ
`8C*ÿ
`8C *ÿ
`C'*ÿ
`C*ÿ
`'*Fÿ l&!?ÿl!//#ÿ
`
`
*ÿ
`*'ÿ
`  *ÿ
`
` *ÿ
`/!ÿ)+ÿ
`F-ÿ @baYm/Kn#ÿ
`
` Lh4ÿÿ
`<22L2 ÿ
`=Fÿ
`=*ÿ
`C 8ÿ
`*8 ÿ
`9'*K98ÿ
`ÿÿÿ,1ÿR"(!ÿ
`Fa)*ÿ
`**)*ÿ
`
9ÿ*+R1ÿ
`
` JJ2ÿ
` 88 ÿ
`+ÿ
`+7(ÿÿ
`)&ÿ
`)60,&0ÿ
`- ÿ
`557ÿ
`
`tuvÿxyyz{|x}{~€ÿ|~uÿxz~‚ÿx}ÿƒ„{}uÿxÿyx|uÿ}…u€uÿ†x‡€ˆÿ‰x|Šu}uu‹ÿxŠu€ÿuvÿxyyz{|x}{~ÿ
`|zx€€{Œ{|x}{~ÿŒux}„‹u€ÿxx{zxŽzuÿ}~ÿ|„€}~u‹€ÿŽu}vuuÿ€~Œ}vx‹uÿ‹uzux€u€ÿv{}…ÿxÿux€‡ÿyz„‚{ÿ
`Œux}„‹uˆÿ…uÿ}…uÿu‘}ÿ~Ž}‹„€{uÿ~‹ÿ|‹{}{|xzÿxyyz{|x}{~ÿ|~u€ÿxz~‚’ÿxÿ€xzzÿ†~vz~x†ÿuxŽzu€ÿ
`‡~„‹ÿ‰x|Šu}“…xyu‹ÿ}~ÿx„}~x}{|xzz‡ÿ†u}u|}ÿ{}ˆÿÿ
`
`”•–——˜™˜š–›˜œžÿ–ÿ ›¡¢ÿ£¤œ¥¡ÿ
`
`¦…uÿ„Žu‹ÿ~Œÿxyyz{|x}{~€ÿ{€ÿ‚‹~v{‚’ÿx†ÿx‡ÿ~Œÿ}…uÿx‹uÿu‘}‹uuz‡ÿŽx†v{†}…ÿ{}u€{uˆÿ
`§{{}u†ÿŽx†v{†}…ÿx†ÿ€…‹{Š{‚ÿ~‹ÿŒzx}z{uÿŽ„†‚u}€ÿx‹uÿyzx|{‚ÿxÿŒ„‹}…u‹ÿ€}‹x{ÿ~ÿu}v~‹Š€ˆÿ
`¦…uÿ‚‹~v{‚ÿ|~yzu‘{}{u€ÿx€€~|{x}u†ÿv{}…ÿu}v~‹Šÿ}‹xŒŒ{|ÿxŠuÿ€~y…{€}{|x}u†ÿ|zx€€{Œ{|x}{~ÿ
`}u|…{ƒ„u€ÿxÿu|u€€{}‡ˆÿ“{yzuÿ¨‰x††‹u€€ÿ~‹ÿ€}x}{|y~‹}ÿ€|…uu€ÿŒxzzÿ€…~‹}ˆÿ‰x|Šu}“…xyu‹ÿ†u}u|}€ÿ
`†‡x{|ÿy~‹}ÿx€€{‚u}€’ÿ}‹x|Š€ÿ}‹x€x|}{~€ÿv{}…ÿ{‚‹x}{‚ÿy~‹}ÿx€€{‚u}€’ÿ†{ŒŒu‹u}{x}u€ÿ
`x~‚ÿ†{ŒŒu‹u}ÿxyyz{|x}{~€ÿ„€{‚ÿ}…uÿ€xuÿy~‹}’ÿx†ÿ„€u€ÿzx‡u‹€uuÿ{†{|x}~‹€ÿ}~ÿ{†u}{Œ‡ÿ
`xyyz{|x}{~€ˆÿ
`
`©ª«ÿ­®¯°°±²±³¯´±µ¶ÿ
`
`“~u}{u€ÿ{}ÿ€uu€ÿ}…x}ÿ}v~}…{‹†€ÿ~Œÿu}v~‹Šÿ}‹xŒŒ{|ÿ{€ÿvuŽÿ}‹xŒŒ{|ÿ·ÿŒ‹~ÿvuŽÿŽ‹~v€{‚ÿ}~ÿ
`vuŽŽx€u†ÿ|z{u}€ÿŒ~‹ÿ{€€{~|‹{}{|xzÿxyyz{|x}{~€ÿ}~ÿ¸¹§Žx€u†ÿu|~u‹|uˆÿº„}ÿ~}ÿxzzÿvuŽÿ
`
`ÿ
`
`‰x|Šu}uu‹’ÿ¨|ˆÿÿ
`
`»ÿ ÿ
`
`

`

`  ÿ   
`ÿ ÿ

` 
`ÿÿ
`ÿ ÿÿ  ÿÿ  ÿÿ ÿ
`
` ÿ ÿ
`traffic requires or deserves the same treatment. Web traffic can vary in urgency, sensitivity to
`ÿ
ÿ ÿ   
`ÿ ÿÿ
  ÿÿ
  ÿ
`ÿ
`latency, and performance requirements. PacketShaper can differentiate between different types
`
` ÿÿ  ÿ
` ÿÿ ÿÿÿÿÿÿ  ÿ
` ÿ
`of web traffic so that you can manage each with an appropriate strategy.
`
`
` ÿÿ ÿÿ
`ÿ  ÿ
  ÿ
`  ÿ  ÿ
 ÿ !"
`ÿ ÿ

` 
`ÿ
`For example, PacketShaper can use travel direction, server location, and/or URLs to distinguish
` ÿ 
`ÿ ÿ ÿ ÿ# ÿ $ÿ
` 
`%ÿ
` ÿ&ÿÿ
` ÿ
`employee browsing from your own (potentially profitable) customers’ shopping. It can separate
` ÿ'((ÿ)*"ÿ ÿ   ÿ'((ÿ*+,
`ÿ  ÿ
`  %
`ÿ
`
`ÿ ÿ
`critical HTTP XML fiom recreational HTTP MPEGs, preventing someone’s enthusiasm for
`*
ÿ ÿ*ÿ ÿ  ÿÿ-
`
`
`ÿ ÿ  ÿÿ-
`
ÿ
`ÿ
` ÿ
`Madonna or Metallica fiom interfering with e-business. Some very thin web-based clients, such
`
`ÿ. %
`ÿ 
`/ÿ
ÿ-
`
ÿ0123422ÿ
`ÿ
`
`ÿÿ ÿÿ ÿ'((ÿ
`as Oracle’s WebFormsTM and web-based S390/AS400 host access, can look like normal HTTP
`  ÿ ÿ ÿÿ
`
` ÿÿ
` ÿÿ
`traffic, but PacketShaper can classify them separately.
`
`Citrix and Oracle Classification
`567869ÿ;<=ÿ>8;?@Aÿ5@;BB6C6?;76D<ÿ
`
` ÿÿ ÿ
` ÿÿ 
`
ÿ ÿ ÿÿÿE ÿ
`PacketShaper can automatically isolate each published application running within a Citrix
`  ÿ ÿÿÿÿ

` 
`ÿ*
` ÿ
ÿ ÿ  ÿ
ÿÿÿ
`environment. For example, it can distinguish Microsoft Word from PeopleSoft, and it can
`

` 
`ÿ  ÿ  ÿ  ÿ ÿ
`ÿ ÿ  ÿÿ
`distinguish interactive PeopleSoft traffic from its print traffic.
`
` ÿ
  
`ÿÿ
`ÿ ÿ. ÿ  ÿ ÿ ÿ ÿ ÿ ÿ
`
`ÿ ÿ
`PacketShaper differentiates many types of Oracle traffic, allowing you to tailor your analysis or
`ÿ
` 
`ÿ ÿÿ ÿÿ
` ÿ. ÿ  ÿ
`
`ÿÿ
`management strategies. For example, PacketShaper can separate Oracle traffic accessing the
`FGHIJGKÿ

`ÿ ÿ. ÿ  ÿ
`
`ÿÿFHLLMNOPQORKÿ

`ÿÿ ÿ
`“sales” database fiom Oracle traffic accessing the “accounting” database. PacketShaper
`
 
`ÿ. S1ÿ
ÿ Tÿ  
`ÿ
`ÿÿ - 

ÿ
`  ÿ
`ÿÿ
`ÿÿ 
 ÿ
`identifies Oracle8i/9i and netv2 protocols using a multi-threaded server as well as the older
`. ÿUÿ# ÿ $ÿ
ÿ Vÿ  
`ÿ
`ÿÿ


ÿ
`  ÿÿ
`Oracle 7 (or before) and netvl protocols using a dedicated server.
`
`Intricate Port Classification
`W<786?;7AÿXD87ÿ5@;BB6C6?;76D<ÿ
`
`fi-
`
`I
`EL 9
`E mumnme
`
`ÿ ÿ 
`ÿ
`ÿÿ
`When mult1ple applications use the
`.
`n
`-
`same port, It IS usually dlfficult to
`
`ÿ ÿÿ
`ÿ
` ÿ
  ÿ ÿ
`ÿ
  ÿÿ ÿ
`apply different management or
`
`
`ÿ
` 
`ÿ
`ÿÿ
`analysis strategies because they
` ÿ
`ÿ ÿ ÿY ÿ
` ÿ ÿ
`appear as one application. Not so for
` ÿ ÿÿ
`PacketShaper. For example,
` ÿÿ

` 
`ÿ
`PacketShaper can distinguish
`TN3270 and TN5250 sessions from
`(Y0TU2ÿ
ÿ(YZTZ2ÿ
`
`
` 
`ÿ ÿ
`
`  ÿ(ÿ
`
`
` 
`ÿ ÿ ÿ
`other Telnet sessions even though
`ÿ
`ÿ- ÿ ÿT0ÿÿ
`all use well-known port 23.
`
`them both throughout their journeys.
`
`&ÿ
 ÿÿ ÿÿ 
`ÿ
`In addition, an application that hops
` ÿ ÿ ÿ ÿÿÿÿÿ
`from port to port can be a challenge
` ÿ
 ÿ
`ÿÿ 
`ÿÿ
`to identify, because it looks like
`
`
  ÿ 
`ÿ[ ÿ
`ÿ
`different applications. But, as
` ÿ ÿ
` ÿ ÿ ÿ ÿ
`before, not so for PacketShaper. For
`ÿ3."ÿ
`ÿ
`
`ÿ
`example, AOL instant messaging
`and passive FTP both hop ports
`
ÿ
`
` ÿ(ÿ ÿ ÿ
`ÿ
`  ÿ ÿ ÿ 
`ÿ
`frequently, but PacketShaper tracks
`ÿ ÿ  ÿ ÿ\ 
`ÿÿ
`
`a
`1
`5
`
`5
`
`' "
`
`W
`
`File-Sharing Protocols
`]6@A^_`;86<aÿX8D7D?D@Bÿ
`
`3 ÿ
` ÿ - - ÿ 
`ÿ ÿ
ÿ ÿÿ ÿ
ÿÿ
`ÿ ÿ ÿ
`Although specific peer-to-peer applications come and go with political and legal battles, there are
` ÿ ÿ 
`ÿ ÿ - - ÿ 
`ÿÿ ÿ ÿ
` ÿÿ(
`ÿ  
`ÿ ÿ
`now whole genres of peer-to-peer applications that facilitate file sharing. These favorites of
`
`ÿ 
`ÿ ÿÿÿ ÿ ÿ ÿ ÿ ÿ 
`ÿ
`
`
`
`ÿ
ÿ  ÿ
`music lovers have taken a heavy toll on network performance. Schools, businesses, and other
`
`ÿ
`
` ÿ&ÿÿ
`Packeteer, Inc.
`
`Uÿ ÿ
`7
`
`

`

`   ÿ
`
ÿÿ

ÿÿ
ÿ

ÿ  ÿ
 ÿ  
ÿ
 ÿ
`organizations have no desire to issue oppressive and controversial mandates regarding
` 
ÿ
ÿÿ
`
ÿ
 ÿ
ÿ
`
ÿ ÿ ÿÿ  ÿ ÿ
ÿ
`
 ÿ
 ÿ
`unsanctioned use of the network. However, they do want to maintain control over their networks
`  ÿ
` ÿ 
 
ÿ
  
ÿ ÿ  ÿ  ÿ
`and uphold acceptable performance for mission-critical applications.
`
`
` 

` 
ÿ   ÿ

ÿ ÿ 
ÿ
ÿÿ
`

ÿ

` ÿ  ÿ
 ÿ
`PacketShaper automatically identifies a large number of these file-sharing applications, enabling
`ÿÿ ÿ
`
 ÿ

`  ÿ
`ÿ ÿ

ÿÿ 
ÿ
`

ÿ
ÿ!
ÿ
`you to control their behavior (with control features, coming later). These include Aimster,
`! "  #ÿ$
ÿ%
&
ÿ
%
ÿ"
 ÿ$

`
ÿ' ÿ"
 ÿÿ
`AudioGalaxy, Blubster, DirectConnect, eDonkey, Gnutella (BearShare, Furi, Gnotella,
`"
ÿÿ"ÿ"

ÿ 
 ÿ(
)
ÿ* 
 ÿ+

 ÿÿ
`
#ÿ +
ÿ
`Gnucleus, Gnut, Gnewtellium, Hagelslag, LimeWire, Mactella, Newtella, Phex, ToadNode),
`"
ÿ
ÿ,

`ÿ- . !ÿ+ 
ÿ 
ÿ$
+ 
ÿ$
`/ÿ
+ ÿ 
ÿ ÿ
`Groove, Hotline, Imesh, KaZaA, Napster (amster, BeNapster, BitchX, TekNap, crapster, gnap,
` 
ÿ
 
ÿ
` 
ÿ+ 
ÿ0 ÿ- 
ÿ(
ÿ*  ÿ*+ 
ÿ ÿ
`gnapster, gnome-napster, hackster, iNapster, jnap, Knapster, Lopster, MacStar, MyNapster, nap,
`+ !ÿ + ÿ1
ÿ
` ÿ ÿ
 ÿ/+ ÿ! "
ÿ1   ÿ
`ÿ
`NapAmp, TkNap, Riscster, Shuban, snap, webnap, XmNap, AudioGnome, Rapigator, potlight,
`
` + ÿ  ÿ)*/ÿ 
ÿ1 
ÿ*+ 
ÿ2+/ÿ
` 
ÿ ÿ ÿ
`StaticNap, Swaptor, WinMX, macster, Rapster, PMNapster QNX, phaster), Scour, Tripnosis,
`  ÿ

ÿÿ ÿÿ
ÿ
ÿÿ
`

ÿ ÿ

`
ÿ
`and, believe it or not, even more of these popular vehicles.
`
`34567859ÿ;<=>67<?@ÿ
`Multiple Locations
`
`)
`
ÿ
ÿ
`
ÿ 
ÿ

ÿ
`
ÿ ÿÿ 
`ÿ ÿ ÿ

`ÿ 
`ÿ
`When customers choose main-site deployment, the ability to distinguish traffic from each branch
`
ÿ

ÿ  ÿ 

` 
ÿ ÿ ÿ ÿ  ÿÿ
ÿ,ÿ
ÿ
ÿ
`office b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket