throbber
UNITED STATES PATENT AND TRADEMARK OFFICE
`
`___________
`
`BEFORE THE PATENT TRIAL AND APPEAL BOARD
`
`___________
`
`CLOUDFLARE, INC. and
`SPLUNK INC.,
`Petitioners,
`
`v.
`
`SABLE NETWORKS, INC.
`Patent Owner.
`
`___________
`
`IPR2021-009091
`Patent 8,243,593 B2
`___________
`
`DECLARATION OF MARGI SPITZER
`
`1 Splunk, Inc., which filed a petition in IPR2022-00228, has been joined as a
`petitioner in this proceeding.
`
`
`
`Cloudflare – Exhibit 1098, page 1
`
`

`

`
`
`I, Margi Spitzer, declare as follows:
`
`1.
`
`I make this declaration based on my personal knowledge and if called
`
`to do so could and would testify to the facts stated in this declaration. I am not
`
`being paid to prepare or sign this declaration.
`
`2. My resume (from 2004) is attached to this declaration. I hold a
`
`Bachelor of Science degree, summa cum laude, in Computer Science from San
`
`Diego State University. I worked as a software engineer at Amdahl Corporation
`
`from 1984 until 1991, and as a technical trainer at Amdahl Corporation from 1991-
`
`1992. I worked at Netlabs from 1992 until 1997 as a technical trainer and
`
`curriculum developer, and during that time I began writing technical marketing
`
`documents.
`
`3.
`
`From 1998 through 2004, I worked at Packeteer, Inc., reaching the
`
`title of Technical Communications Lead. My role with Packeteer included
`
`technical writing, competitive analysis, preparing marketing collateral (such as
`
`datasheets, brochures, and customer success stories), writing product white papers,
`
`and writing material for Packeteer’s website. My work spanned the various
`
`Packeteer product lines, including the PacketShaper product line. PacketShaper
`
`was the major product for Packeteer.
`
`4. When I was working for Packeteer, I wrote the paper entitled “Four
`
`Steps to Application Performance Across the Network” dated September 2002 (the
`
`40197\14829525.1
`
`
`
`
`
`Cloudflare – Exhibit 1098, page
`
`2
`
`

`

`
`
`“Four-Steps Whitepaper”) that is attached to this declaration. I understand that it
`
`has been identified as Exhibit 1006. When I wrote the Four-Steps Whitepaper, I
`
`worked with engineers at Packeteer to obtain updated lists of both a) the
`
`applications PacketShaper automatically identified and classified and b) the
`
`metrics that PacketShaper collected to use in its own analysis graphs and to export
`
`to third-party applications. Those lists are reflected on pages 5-6 and 18 of the
`
`Four-Steps Whitepaper. I waited for the PacketShaper software to be sufficiently
`
`complete so that we could include screenshots from the software in the Four-Steps
`
`Whitepaper. Examples of such screenshots are shown throughout the Four-Steps
`
`Whitepaper including on pages 4, 10, 11, 12, 15, 16, 21, and 25. After writing this
`
`and other whitepapers, a team of at least two engineers, one marketing person, and
`
`one director reviewed my documents to ensure accuracy.
`
`5.
`
`I also drafted an earlier version of the Four-Steps Whitepaper in 2001.
`
`I revised that earlier version to generate the September 2002 version. One purpose
`
`of updating the paper’s contents was to ensure that the whitepaper on Packeteer’s
`
`website reflected the latest release and features of the PacketShaper software.
`
`Another purpose of updating the whitepaper was to make it ready for distribution
`
`at upcoming trade shows and industry events. The September 2002 version of the
`
`Four-Steps Whitepaper (the one that is attached to this declaration) was made
`
`available to the public in September 2002 as indicated on the cover of the paper.
`
`
`
`
`
`Cloudflare – Exhibit 1098, page 3
`
`

`

`
`
`6.
`
`The Four-Steps Whitepaper was a big part of Packeteer’s marketing of
`
`the PacketShaper product. I understood when I wrote it that the purpose was to
`
`inform prospective customers’ IT decisionmakers about the functions and
`
`capabilities of the PacketShaper. I also understood that the different versions of
`
`the whitepaper, including the September 2002 Four-Steps Whitepaper, were
`
`intended to be handed out at the seminars and trade shows where we presented the
`
`PacketShaper. Our salespeople and sales engineers would typically send
`
`whitepapers, including the September 2002 Four-Steps Whitepaper, to prospective
`
`customer accounts as part of their outreach.
`
`7.
`
`I also know from my time at Packeteer that sales and marketing
`
`employees as well as channel partners would e-mail the Four-Steps Whitepaper,
`
`including the September 2002 version, to potential sales contacts at other
`
`companies or institutions. On many occasions, I myself emailed the Four-Steps
`
`Whitepaper (the September 2002 version) to people at other companies and
`
`institutions. For example, I recall several instances when a Packeteer engineer,
`
`marketing director, or VP came to my desk and asked me to email the Four-Steps
`
`Whitepaper to a potential customer, which I did.
`
`8.
`
`I specifically recall that on one occasion, I sent the Four-Steps
`
`Whitepaper (the September 2002 version) via email to an Information Technology
`
`staff person at the University of Southern California. I had learned from a contact
`
`
`
`
`
`Cloudflare – Exhibit 1098, page 4
`
`

`

`
`
`at USC that the school was experiencing network delays and application
`
`slowdowns due to students’ use of their campus network for music and
`
`entertainment downloads, and I thought sending the Four-Steps Whitepaper might
`
`generate some interest in the PacketShaper as a solution to the problem.
`
`9.
`
`Different versions of Four-Steps Whitepaper were posted on
`
`Packeteer’s website at different times on the PacketShaper product page. A
`
`customer, or anyone with interest in Packeteer products, could access the website
`
`and navigate to the PacketShaper product page. The PacketShaper product page
`
`had a link to the paper. Beginning in September 2002, the PacketShaper product
`
`page linked to the version of the Four-Steps Whitepaper that is attached to this
`
`declaration. The whitepaper could be accessed and downloaded by anyone without
`
`using any access credentials like a password and without getting advanced
`
`permission from Packeteer. We wanted people to download and read Packeteer’s
`
`product literature, including the Four-Steps Whitepaper.
`
`10. On the cover of the September 2002 version of the Four-Steps
`
`Whitepaper there is a copyright notice. I included that notice to signify only that
`
`Packeteer owned the whitepaper and to dissuade other companies from coopting
`
`any part of it to promote competing products. The copyright notice was not
`
`intended to prevent people from reading the Four-Steps Whitepaper or from
`
`sharing the URL where the Four-Steps Whitepaper could be viewed. Again, this
`
`
`
`
`
`Cloudflare – Exhibit 1098, page 5
`
`

`

`
`
`was an important marketing document, and we wanted it to be reviewed by as
`
`many of our potential customers as possible.
`
`11. After I left Packeteer at the end of 2004, I worked as a vocational and
`
`interview consultant for job seekers with disabilities for such organizations as the
`
`CA Dept. of Rehabilitation, Project Hired, World Institute on Disability, and
`
`others. I went back to school for a master’s degree in TESOL (“Teaching English
`
`to Speakers of other Languages,” offered in the Linguistics department) from San
`
`Jose State University in 2008. Since then, I have had an additional career teaching
`
`English as a second language. I have not taught since the onset of COVID-19 in
`
`2020.
`
`12.
`
`I declare under penalty of perjury under the laws of the United States
`
`of America that the foregoing is true and correct.
`
`Executed this 27th day of May, 2022, in San Jose.
`
`Respectfully submitted,
`
`
`Margi Spitzer
`
`
`
`
`
`
`
`Cloudflare – Exhibit 1098, page 6
`
`

`

`Attachment 1 of 2
`
`Resume of Margi Spitzer
`
`Cloudflare - Exhibit 1098, page 7
`
`

`

`1462 Bing Dr.
`San Jose, CA 95129
`
`Margi Spitzer
`
`408-252-7053
`margi_spitzer@yahoo.com
`
`Objective
`A position as a technical storyteller writing white papers, sales collateral, product solutions, and/or
`training curriculum where I can work with talented enthusiastic people and intriguing products
`Strengths
` A knack for translating technical complexity into approachable, understandable prose
` Diverse background as a software engineer, product manager, technical trainer, and writer
` Thorough understanding of all phases of the product development lifecycle
` Ability to recognize core issues quickly amid confusing complexity
` Talent for spotting customer needs and turning them into product requirements
` Unusual combination of technical depth, customer empathy, sales perspective, and writing
`skills
`
`Experience
`Technical Communications Lead
`1998-2004
`Packeteer, Cupertino, CA
` Created and maintained white papers to explain the value, technology, and competitive
`advantages of a large, multi-featured networking product line; wrote the paper that had the
`most hits per month of all web-based company material and was the sales team’s favorite
`revenue-generating tool
` Wrote and published 30+ magazine articles on WAN optimization and application
`performance improvement
` Designed and developed a best-practices website to guide customers through the phases of
`large deployments, including product evaluation, purchase, installation, and day-to-day usage
` Coordinated IPO-preparation activities, serving as the company’s liaison to the team of
`bankers and lawyers charged with the task of taking the company public; wrote the business
`section of the IPO S1 materials for the SEC
` Designed and developed course curriculum on application performance management tools;
`course materials consistently garnered top scores (9.5/10) in class evaluations for all five
`years in use
` Wrote 90+ briefings on how to use company products to solve common industry problems:
`DoS attacks, universities’ music-download floods, bandwidth bottlenecks, stutter and static
`from VoIP and streaming media, and more
`Product Manager
`1997
`e-traffic, San Jose, CA
`Juggled a variety of responsibilities for a new start-up including product definition, technical
`marketing, and feature and user-interface design
`Technical Trainer, Program Manager Netlabs, Los Altos, CA
`1992-1997
` Served as technical liaison between engineering and marketing – designed new features,
`reviewed architecture proposals, negotiated release contents and priorities, and provided user
`advocacy
` Developed and delivered training to field engineers, consultants, and customers on the use of
`SNMP-based event-correlation tools
` Wrote white papers that analyzed solutions for managing large corporate networks; one paper
`prompted our product’s first unsolicited sale
` Served as program manager for a product’s first two releases, coordinating interdepartmental
`product development efforts (schedules, dependencies, release contents, technical issues)
`
`Cloudflare - Exhibit 1098, page 8
`
`

`

`Technical Trainer
`1991-1992
`Amdahl Corporation, Sunnyvale, CA
` Developed and delivered a series of classes to 70 engineers covering the organization of 1.5
`million lines of C code, debuggers, error handling, and inter-process communication
` Trained technicians and engineers on topics including source control, software development
`scheduling, presentation skills, and FrameMaker
`Software Engineer
`1984-1991
`Amdahl Corporation, Sunnyvale, CA
`Designed, coded, and tested numerous C/UNIX software projects leading to positions in project
`management and technical leadership
`
`Skills
`MS Word, MS Powerpoint, FrameMaker, DreamWeaver, RoboHelp, Visio, C, Perl, HTML, SNMP,
`TCP/IP, VoIP, PacketShaper, HP OpenView, Network Node Manager, NerveCenter
`Education
`BS in Computer Science with minors in Mathematics and Spanish, San Diego State University,
`Summa cum Laude
`A wide variety of classes from UCSC and Stanford extension and other sources, including:
` Networking Fundamentals
` The Art of Persuasion
` SNMP Network Management
` Marketing Writing
` WAN Optimization
` Presentation Skills
` Creating Web-Based Documentation
` Training Adults
` FrameMaker
` Training for Different Learning Styles
` DreamWeaver
` Facilitation Skills
`
`Cloudflare - Exhibit 1098, page 9
`
`

`

`Attachment 2 of 2
`
`4 Steps to Application Performance
`Across the Network With Packeteer’s
`PacketShaper®
`
`Cloudflare - Exhibit 1098, page 10
`
`

`

`Technical Product Overview
`
`
`
`
`Four Steps to Application Performance
`Across the Network
`
` With Packeteer’s PacketShaper®
`
`
`September 2002
`
`
`Packeteer, Inc.
`Cupertino, CA 95014
`408.873.4400
`info@packeteer.com
`www.packeteer.com
`
`
`
`
`
`Company and product names are trademarks or registered trademarks of their respective companies. Copyright 2002 Packeteer,
`Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, transmitted, or
`translated into another language without the express written consent of Packeteer, Inc.
`
`
`
`
`P/N 1600.B
`
`Cloudflare - Exhibit 1098, page 11
`
`

`

`Table of Contents
`Four Steps to Application Performance ..........................................................................3
`What Is PacketShaper? .................................................................................................3
`Ease of Deployment and Use........................................................................................4
`A Four-Step Snapshot...................................................................................................4
`Step One: Classifying Network Traffic............................................................................5
`Applications and Protocols — Automatically ..............................................................5
`Classification, a Step Above.........................................................................................6
`Common Classification Approaches ............................................................................8
`Step Two: Analyzing Traffic.............................................................................................9
`Utilization Analysis ......................................................................................................9
`Performance Analysis.................................................................................................14
`Raw Metrics................................................................................................................18
`Step Three: Controlling Traffic......................................................................................19
`Partitioning Bandwidth...............................................................................................19
`Per-Session Rate Policies ...........................................................................................21
`Other Policies..............................................................................................................22
`Rate-Control Features.................................................................................................22
`Universal Translator ...................................................................................................24
`Detecting and Avoiding Attacks.................................................................................24
`Step Four: Generating Reports ......................................................................................24
`Following a Typical Investigation...................................................................................26
`Deployment — When and Where...................................................................................27
`Most Appropriate Situations.......................................................................................27
`Choosing a Deployment Strategy ...............................................................................28
`Feature Sets.........................................................................................................28
`Locations .............................................................................................................28
`Topology Pictures................................................................................................29
`Story of a Deployment Progression.....................................................................30
`Questions to Ponder ............................................................................................30
`For More Information .....................................................................................................30
`
`
`
`
`Packeteer, Inc.
`
`2
`
`
`
`Cloudflare - Exhibit 1098, page 12
`
`

`

`Four Steps to Application Performance
`Sluggish mission-critical applications are bad for business. Unfortunately,
`non-critical or less urgent applications tend to dominate when applications
`battle for bandwidth on congested WAN access links. Large email
`attachments or high-capacity file transfers consume more than their share
`of bandwidth, while Oracle, SAP, Citrix, and other critical applications
`struggle. Do any of these problems sound familiar to you?
`• A user downloads a large file and SAP performance lags.
`• An employee synchronizes his laptop with the message server and clogs the branch office’s
`WAN link for 15 minutes.
`• Music enthusiasts’ MP3 downloads cause more urgent, interactive applications to struggle.
`Intranet applications served from a central site offer employees easy access but poor
`•
`performance.
`• Repeated bandwidth upgrades fail to address performance problems but do increase costs
`substantially.
`Today’s enterprises require performance, predictability, and consistency from their networks and
`the applications that traverse them. And that’s precisely what PacketShaper® from Packeteer
`delivers.
`This paper describes a process to avoid problems like those described in the examples above and
`serves as a technical product overview for the PacketShaper product line. The paper is intended
`for system and network administrators in organizations that manage their own applications and
`network performance.
`What Is PacketShaper?
`In enterprise networks that are overwhelmed by increasing amounts of traffic, unmanaged
`congestion at WAN-access links and Internet links undermines application performance,
`resulting in impaired employee and company productivity. Network managers spend increasing
`portions of the budget on bandwidth upgrades in attempts to solve the performance problems,
`only to find that the problems persist.
`PacketShaper is the bandwidth-management solution that brings predictable, efficient
`performance to applications running over enterprise wide-area networks (WANs) and the
`Internet. It balances traffic’s demands, giving each type of traffic the bandwidth it needs to
`perform. PacketShaper protects critical traffic, paces bandwidth-greedy traffic, and prevents any
`single type of traffic from monopolizing resources. It provisions bandwidth to applications,
`sessions, branch offices, and/or users.
`PacketShaper’s four-step approach safeguards application performance and maximizes return on
`network capacity. It provides insight into and control over network usage. PacketShaper
`discovers and classifies applications, analyzes their performance, enforces policy-based
`bandwidth allocation, and generates reports on the results. With PacketShaper, you can control
`application performance to suit business priorities, make efficient use of a limited-capacity link,
`increase throughput, and protect critical applications.
`
`
`
`Packeteer, Inc.
`
`3
`
`
`
`Cloudflare - Exhibit 1098, page 13
`
`

`

`Ease of Deployment and Use
`PacketShaper sits behind WAN-link routers and/or Internet-link routers at main sites and at
`branch offices. PacketShaper must be positioned so that it sees all traffic you intend it to manage.
`You can choose to deploy PacketShaper comprehensively throughout many or all offices, or you
`can start more slowly and follow a phased deployment strategy by starting with a main site first.
`Benefits vary with topology and deployment strategy. PacketShaper is available in a variety of
`models based on capacity and features. For more detail, see Deployment — When and Where
`later in this paper.
`PacketShaper installation is easy and consists of plugging in two cables and entering address and
`access information on a web-based setup page. PacketShaper integrates cleanly with existing
`network infrastructure, imposing no changes on router configuration, topologies, desktops, or
`servers. It also integrates smoothly with central, third-party management platforms and reporting
`tools such as HP OpenView®, HP Policy Xpert™, Micromuse NETCOOL™, InfoVista™,
`Microsoft Excel®, and others. In addition, Packeteer’s PolicyCenter™ provides the convenience
`of centralized management in large deployments, and Packeteer’s ReportCenter provides full-
`featured reports
`analyzing utilization and
`performance for
`multiple locations.
`A web-based user
`interface offers access to
`PacketShaper from any
`desktop with a web
`browser. A command-
`line interface offers fast,
`detailed control from a
`Telnet session. You
`choose the level of
`security required to
`examine and alter
`PacketShaper’s
`configuration and
`measurement data.
`A Four-Step Snapshot
`Each step in PacketShaper’s four-step bandwidth-management strategy is an integral part of
`managing application performance. The steps are introduced below and explained in more detail
`in the remainder of the paper.
`One: Classify Network Traffic
`It’s hard to protect an application if you can’t differentiate it from other types of
`traffic. PacketShaper detects and identifies thousands of types of traffic. You can
`isolate traffic associated with applications, protocols, subnets, web pages, users, and
`more.
`
`
`
`Packeteer, Inc.
`
`4
`
`
`
`Cloudflare - Exhibit 1098, page 14
`
`

`

`Two: Analyze Behavior
`How is limited bandwidth consumed? Why do critical applications move so slowly?
`PacketShaper provides detailed analysis of network and application behavior. It
`tracks traffic levels, detects network trends, measures response time, and calculates
`network efficiency.
`Three: Control Performance
`Managing application performance is a matter of precisely allocating bandwidth
`according to business requirements and the needs of the applications themselves.
`PacketShaper enables the control of all types of traffic: steady rates for voice or
`video streams; immediate passage for small, delay-sensitive traffic such as Telnet;
`and a balance of consistent access and a bandwidth limit for applications such as
`Microsoft Exchange that are both bandwidth-hungry and critically important.
`Four: Report Results
`Comprehensive reports, graphs, and tables provide easy insight into historical
`performance, load, efficiency, and application-based service-level compliance.
`If performance is not suitable, control policies can be modified to bring
`response times within range and keep new traffic and applications from
`unintended impact. Reports offer proof that applications continue to perform as
`desired, even during network growth.
`
`
`Step One: Classifying Network Traffic
`Identifying and categorizing the types of network traffic that compete for limited bandwidth is
`the first step toward solving performance problems. Packeteer calls this process classification.
`Rich traffic classification is crucial — bandwidth controls are useful only if you can apply them
`to the precise traffic you have in mind. In addition, administrators are usually surprised to see the
`diversity of their network applications.
`You can classify traffic by application, protocol, port number, URL or
`wildcard, host name, LDAP host lists, Diffserv setting, MPLS labels, IP
`precedence bits, IP or MAC address, subnet, travel direction
`(inbound/outbound), source, destination, host speed range, Mime type, web
`browser, Oracle database, Citrix published application, Citrix ICA priority
`tagging, VLAN varieties, and more. PacketShaper builds a hierarchical
`traffic-classification tree, inserting an entry for every distinct traffic type it
`observes. Each traffic category is called a traffic class.
`While most products can differentiate traffic based on layers two through four of the standard
`OSI networking model, PacketShaper classifies traffic based on layers two through seven, telling
`you precisely which applications are in use.
`Applications and Protocols — Automatically
`Packeteer continually adds to the list of protocols and applications PacketShaper classifies
`automatically. A recent list includes the following services:
`
`
`
`Packeteer, Inc.
`
`5
`
`
`
`Cloudflare - Exhibit 1098, page 15
`
`

`

`Messaging
`AOL Instant Msging
`ICQ Chat
`MSN Messenger
`Yahoo! Messenger
`Internet Relay Chat
`
`Misc
`CiscoCTI
`Date-Time
`DICOM
`HL7
`NewsStand
`Time Server
`WebShots
`
`MultiMedia
`Multi-cast
` NetShow
`NetMeeting
`QuickTime
`RTP
`Real Audio
`Streamworks
`RTSP
`MPEG
`ST2
`SHOUTcast
`WebEx
`WindowsMedia
`
`
`Music P2P
`Aimster
`AudioGalaxy
`Blubster
`DirectConnect
`eDonkey
`FileRogue
`Gnutella
`Groove
`Hotline
`iMesh
`KaZaA
`Napster
`Scour
`Tripnosis
`
`Network
`Management
`Cisco Discovery
`ICMP by
` packet type
`Microsoft SMS
`NTP
`RSVP
`SNMP
`SYSLOG
`
`Print
`LPR
`IPP
`TN5250p
`TN3287
`
`Thin Client or
`Server Based
`Citrix
` Published Apps
` and VideoFrame
`RDP/Terminal
` Server
`
`Voice over IP
`Clarent
`CUSeeMe
`Dialpad
`H.323
`I-Phone
`MCK Commun.
`Micom VIP
`Net2Phone
`RTP
`RTCP
`T.120
`VDOPhone
`
`
`Routing
`AURP
`BGP
`CBT
`DRP
`EGP
`EIGRP
`IGMP
`IGP
`MPLS (+tag, +app)
`OSPF
`PIM
`RARP
`RIP
`Spanning Tree
`VLAN (802.1p/q)
`
`Security
`Protocol
`DLS
`DPA
`GRE
`IPSEC
`ISAKMP/IKE
` key exchange
`L2TP
`PPTP
`SOCKS Proxy
`
`Session
`REXEC
`rlogin
`rsh
`Telnet
`Timbuktu
`VNC
`Xwindows
`
`Client/Server
`CORBA
`CVS
`Folding@Home
`FIX (Finance)
`Java Rmt Mthd
`MATIP (Airline)
`MeetingMaker
`NetIQ AppMngr
`OpenConnect JCP
`SunRPC (dyn
`port)
`
`Content
`Delivery
`Backweb
`Chaincast
`EntryPoint
`Kontiki
`Marimba
`PointCast
`
`ERP
`Baan
`JavaClient
`JD Edwards
`Oracle (7,8,9i)
`SAP
`
`Games
`Asheron’s Call
`Battle.net
`Diablo II
`Doom
`EverQuest
`Kali
`Half-Life
`LucasArts (Jedi*)
`MSN Zone
`Mythic
`Quake I, II, & III
`SonyOnline
`Tribes I,II
`Unreal
`Warcraft III
`Yahoo! Games
`
`Host Access
`ATSTCP
`Attachmate
` SHARESUDP
`Persoft Persona
`SMTBF
`TN3270
`TN5250
`
`Legacy LAN
`and Non-IP
`AFP
`AppleTalk
`DECnet
`IPX
`FNA
`LAT
`NetBEUI
`MOP-DL/RC
`PPPoE
`SNA
`
`
`Database
`FileMaker Pro
`MS SQL
`Oracle 7/8i
`Progress
`
`Directory
`Services
`CRS
`DHCP
`DNS
`DPA
`Finger
`Ident
`Kerberos
`LDAP
`RADIUS
`TACACS
`WINS
`whois
`
`E-mail,
`Collaboration
`Biff
`cc:MAIL
`IMAP
`LotusNotes MSSQ
`Microsoft DCOM
` (MS Exchange)
`Novell
` GroupWise
`POP3
`SMTP
`
`File Server
`AFS
`CVSup
`Lockd
`Microsoft-ds
`NetBIOS-IP
`NFS
`Novell
` NetWare5
`
`Internet
`ActiveX
`FTP, Passive FTP
`Gopher
`IP, IPIP, UDP, TCP
`IPv6
`IRC
`Mime type
`NNTP
`SSHTCP
`SSL
`TFTP
`UUCP
`URL
`Web browser
`New applications come along at quite a pace these days. Packeteer makes new application
`classification features available to customers between software releases with an easy plug-in
`feature. When the next obtrusive or critical application comes along, a small download enables
`your PacketShaper to automatically detect it.
`Classification, a Step Above
`The number of applications is growing, and many of them are extremely bandwidth intensive.
`Limited bandwidth and shrinking or flat-line budgets are placing a further strain on networks.
`The growing complexities associated with network traffic make sophisticated classification
`techniques a necessity. Simple IP-address or static-port schemes fall short. PacketShaper detects
`dynamic port assignments, tracks transactions with migrating port assignments, differentiates
`among different applications using the same port, and uses layer-seven indicators to identify
`applications.
`
`Web Classification
`Sometimes it seems that two-thirds of network traffic is web traffic — from web browsing to
`web-based clients for mission-critical applications to XML-based e-commerce. But not all web
`
`
`
`Packeteer, Inc.
`
`6
`
`
`
`Cloudflare - Exhibit 1098, page 16
`
`

`

`traffic requires or deserves the same treatment. Web traffic can vary in urgency, sensitivity to
`latency, and performance requirements. PacketShaper can differentiate between different types
`of web traffic so that you can manage each with an appropriate strategy.
`For example, PacketShaper can use travel direction, server location, and/or URLs to distinguish
`employee browsing from your own (potentially profitable) customers’ shopping. It can separate
`critical HTTP XML from recreational HTTP MPEGs, preventing someone’s enthusiasm for
`Madonna or Metallica from interfering with e-business. Some very thin web-based clients, such
`as Oracle’s WebForms™ and web-based S390/AS400 host access, can look like normal HTTP
`traffic, but PacketShaper can classify them separately.
`
`Citrix and Oracle Classification
`PacketShaper can automatically isolate each published application running within a Citrix
`environment. For example, it can distinguish Microsoft Word from PeopleSoft, and it can
`distinguish interactive PeopleSoft traffic from its print traffic.
`PacketShaper differentiates many types of Oracle traffic, allowing you to tailor your analysis or
`management strategies. For example, PacketShaper can separate Oracle traffic accessing the
`“sales” database from Oracle traffic accessing the “accounting” database. PacketShaper
`identifies Oracle8i/9i and netv2 protocols using a multi-threaded server as well as the older
`Oracle 7 (or before) and netv1 protocols using a dedicated server.
`
`Intricate Port Classification
`When multiple applications use the
`same port, it is usually difficult to
`apply different management or
`analysis strategies because they
`appear as one application. Not so for
`PacketShaper. For example,
`PacketShaper can distinguish
`TN3270 and TN5250 sessions from
`other Telnet sessions even though
`all use well-known port 23.
`In addition, an application that hops
`from port to port can be a challenge
`to identify, because it looks like
`different applications. But, as
`before, not so for PacketShaper. For
`example, AOL instant messaging
`and passive FTP both hop ports
`frequently, but PacketShaper tracks
`them both throughout their journeys.
`
`File-Sharing Protocols
`Although specific peer-to-peer applications come and go with political and legal battles, there are
`now whole genres of peer-to-peer applications that facilitate file sharing. These favorites of
`music lovers have taken a heavy toll on network performance. Schools, businesses, and other
`
`
`
`Packeteer, Inc.
`
`7
`
`
`
`Cloudflare - Exhibit 1098, page 17
`
`

`

`organizations have no desire to issue oppressive and controversial mandates regarding
`unsanctioned use of the network. However, they do want to maintain control over their networks
`and uphold acceptable performance for mission-critical applications.
`PacketShaper automatically identifies a large number of these file-sharing applications, enabling
`you to control their behavior (with control features, coming later). These include Aimster,
`AudioGalaxy, Blubster, DirectConnect, eDonkey, Gnutella (BearShare, Furi, Gnotella,
`Gnucleus, Gnut, Gnewtellium, Hagelslag, LimeWire, Mactella, Newtella, Phex, ToadNode),
`Groove, Hotline, Imesh, KaZaA, Napster (amster, BeNapster, BitchX, TekNap, crapster, gnap,
`gnapster, gnome-napster, hackster, iNapster, jnap, Knapster, Lopster, MacStar, MyNapster, nap,
`NapAmp, TkNap, Riscster, Shuban, snap, webnap, XmNap, AudioGnome, Rapigator, potlight,
`StaticNap, Swaptor, WinMX, macster, Rapster, PMNapster QNX, phaster), Scour, Tripnosis,
`and, believe it or not, even more of these popular vehicles.
`
`Multiple Locations
`When customers choose main-site deployment, the ability to distinguish traffic from each branch
`office becomes crucial. PacketShaper can classify traffic according to subnet, IP address, address
`ranges, and host lists, which can all work to discern different offices’ traffic. Even better,
`PacketShaper can then automatically discover all applications used by any location. It keeps
`them separate from those discovered at other locations, allowing different management strategies
`for the same application at different offices.
`
`Classification in Heterogeneous Networks
`PacketShaper can also identify and track hosts by their DNS name, even if DHCP (Dynamic
`Host Configuration Protocol) changes the host’s IP address frequently. You can use

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket