`Networking
`
`4 Cenaeee
`
`=
`
`Deon Reynders »
`
`‘
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 1 of 324
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 1 of 324
`
`
`
`
`
`
`Practical TCP/IP and
`Ethernet Networking
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 2 of 324
`
`
`
`Titles in the series
`
`Practical Cleanrooms: Technologies and Facilities (David Conway)
`
`Practical Data Acquisition for Instrumentation and Control Systems (John Park,
`Steve Mackay)
`
`Practical Data Communications for Instrumentation and Control (Steve Mackay,
`Edwin Wright, John Park)
`
`Practical Digital Signal Processing for Engineers and Technicians (Edmund Lai)
`
`Practical Electrical Network Automation and Communication Systems (Cobus
`Strauss)
`
`Practical Embedded Controllers (John Park)
`
`Practical Fiber Optics (David Bailey, Edwin Wright)
`
`Practical Industrial Data Networks: Design, Installation and Troubleshooting (Steve
`Mackay, Edwin Wright, John Park, Deon Reynders)
`
`Practical Industrial Safety, Risk Assessment and Shutdown Systems for
`Instrumentation and Control (Dave Macdonald)
`
`Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (Gordon
`Clarke, Deon Reynders)
`
`Practical Radio Engineering and Telemetry for Industry (David Bailey)
`
`Practical SCADA for Industry (David Bailey, Edwin Wright)
`
`Practical TCP/IP and Ethernet Networking (Deon Reynders, Edwin Wright)
`
`Practical Variable Speed Drives and Power Electronics (Malcolm Barnes)
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 3 of 324
`
`
`
`
`
`Practical TCP/IP and
`Ethernet Networking
`
`
`
`
`Deon Reynders Pr Eng, BSc BEng, BSc Eng (Elec)(Hons), MBA
`
`
`Edwin Wright MIPENZ, BSc(Hons), BSc(Elec Eng), IDC Technologies, Perth,
`Australia
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AMSTERDAM • BOSTON • HEIDELBERG • LONDON • NEW YORK • OXFORD
`
`PARIS• SAN DIEGO• SAN FRANCISCO• SINGAPORE• SYDNEY• TOKYO
`
`ELSEVIER
`
`Newnes
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 4 of 324
`
`
`
`Newnes
`An imprint of Elsevier
`Linacre House, Jordan Hill, Oxford OX2 8DP
`200 Wheeler Road, Burlington, MA 01803
`
`First published 2003
`
`Copyright 2003, IDC Technologies. All rights reserved
`
`No part of this publication may be reproduced in any material form (including
`photocopying or storing in any medium by electronic means and whether
`or not transiently or incidentally to some other use of this publication) without
`the written permission of the copyright holder except in accordance with the
`provisions of the Copyright, Designs and Patents Act 1988 or under the terms of
`a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road,
`London, England W1T 4LP. Applications for the copyright holder’s written
`permission to reproduce any part of this publication should be addressed
`to the publisher
`
`
`British Library Cataloguing in Publication Data
`A catalogue record for this book is available from the British Library
`
`
`ISBN 07506 58061
`
`
` For information on all Newnes publications, visit
`
` our website at www.newnespress.com
`
`
`
`
`Typeset and Edited by Vivek Mehra, Mumbai, India
`(vivekmehra@tatanova.com)
`
`Printed and bound in Great Britain
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 5 of 324
`
`
`
`6XKLGIK
`
`
`
`
`
`
`
`)UTZKTZY
`
`
`
`
`
`
`
`
`
`
`^\OO
`
`1
`1.1
`1.2
`
`1.3
`
`1.4
`
`1.5
`
`1.6
`
`1.7
`
`2
`2.1
`2.2
`
`2.3
`
`/TZXUJ[IZOUTZUIUSS[TOIGZOUTY
`Data communications
`Transmitters, receivers and communication channels
`
`/TZKXLGIKYZGTJGXJY
`
`)UJOTM
`
`6XUZUIURY
`
`9USKIUSSUTR_[YKJIUSS[TOIGZOUTYVXUZUIURY
`Types of communication channels
`
`'TGRUMIUSS[TOIGZOUTINGTTKRY
`Communications channel properties
`
`9OMTGRGZZKT[GZOUT
`
`)NGTTKRHGTJ]OJZN
`
`4UOYK
`Data transmission modes
`
`*OXKIZOUTULYOMTGRLRU]
`
`9_TINXUTO`GZOUTULJOMOZGRJGZGYOMTGRY
`
`'Y_TINXUTU[YZXGTYSOYYOUT
`
`9_TINXUTU[YZXGTYSOYYOUT
`Encoding methods
`
`3GTINKYZKX
`
`*OLLKXKTZOGR3GTINKYZKX
`
`8@XKZ[XTZU`KXU
`
`48@TUTXKZ[XTZU`KXU
`
`32:
`
`((
`Error detection
`
`)_IROIXKJ[TJGTI_INKIQ)8)
`
`4KZ]UXQOTML[TJGSKTZGRY
`Overview
`Network communication
`
`)OXI[OZY]OZINOTM
`
`6GIQKZY]OZINOTM
`
`*GZGMXGSYGTJ\OXZ[GRIOXI[OZY
`Types of networks
`
`2UIGRGXKGTKZ]UXQY2'4Y
` =OJKGXKGTKZ]UXQY='4Y
`
`3KZXUVUROZGTGXKGTKZ]UXQY3'4Y
`
`
`1
`2
`
`
`
`
`4
`
`4
`
`
`
`8
`
`
`
`
`12
`
`
`
`
`
`
`14
`
`
`
`15
`16
`
`
`
`18
`
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 6 of 324
`
`
`
`vi Contents
`
`2.4
`
`2.5
`2.6
`2.7
`2.8
`
`2.9
`2.10
`2.11
`2.12
`
`2.13
`
`3
`3.1
`3.2
`
`3.3
`3.4
`
`
`)U[VROTMXGZOU
`
`<OXZ[GRVXO\GZKTKZ]UXQY<64Y
`The open systems interconnection model
`
`5VKTGTJIRUYKJY_YZKSY
`
`:NKUVKTY_YZKSYOTZKXIUTTKIZOUTXKLKXKTIKSUJKR59/SUJKR
`
`59/RG_KXYKX\OIKY
`
`'VVROIGZOUTRG_KX
`
`6XKYKTZGZOUTRG_KX
`
`9KYYOUTRG_KX
`
`:XGTYVUXZRG_KX
`
`4KZ]UXQRG_KX
`
`*GZGROTQRG_KX
`
`6N_YOIGRRG_KX
`Interoperability and internetworking
`Protocols and protocol standards
`IEEE/ISO standards
`Network topologies
`
`(XUGJIGYZGTJVUOTZZUVUOTZZUVURUMOKY
`
`2UMOIGRGTJVN_YOIGRZUVURUMOKY
`Bus topology
`Star topology
`Ring topology
`Other types of topology
`
`9ZGX]OXKJXOTMZUVURUM_
`
`*OYZXOH[ZKJYZGXZUVURUM_
`
`3KYNZUVURUM_
`
`:XKKZUVURUM_
`Media access methods
`
`)UTZKTZOUTY_YZKSY
`
`:UQKTVGYYOTM
`
`6URROTM
`
`+ZNKXTKZTKZ]UXQY
`IEEE 802.3 CSMA/CD (‘Ethernet’)
`Physical layer
`
`(GYKY_YZKSY
`
`(GYKY_YZKSY
`
`(GYK:
`
`(GYK,
`
`(XUGJ
`
`(GYK
`Signaling methods
`Medium access control
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`28
`30
`31
`33
`
`
`35
`36
`36
`38
`
`
`
`
`40
`
`
`
`
`
`43
`44
`
`
`
`
`
`
`50
`50
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 7 of 324
`
`
`
`3.5
`3.6
`3.7
`3.8
`3.9
`3.10
`3.11
`
`4
`4.1
`
`4.2
`
`4.3
`
`4.4
`
`4.5
`
`Frame transmission
`Frame reception
`Collisions
`MAC frame format
`Difference between 802.3 and Ethernet
`Reducing collisions
`Ethernet design rules
`
`2KTMZNULZNKIGHRKYKMSKTZ
`
`3G^OS[SZXGTYIKO\KXIGHRKRKTMZN
`
`4UJKVRGIKSKTZX[RKY
`
`3G^OS[SZXGTYSOYYOUTVGZN
`
`3G^OS[STKZ]UXQYO`K
`
`8KVKGZKXX[RKY
`
`)GHRKY_YZKSMXU[TJOTM
`
`Contents vii
`
`51
`51
`52
`53
`55
`55
`55
`
`
`
`
`
`
`
`
`
`,GYZGTJMOMGHOZ+ZNKXTKZY_YZKSY
`59
`Achieving higher speed
`
`
`)GHROTMROSOZGZOUTY
`60
`100Base-T (100Base-TX, -T4, -FX, -T2)
`
`
`/+++[(GYK:YZGTJGXJYGXXGTMKSKTZ
`
`
`6N_YOIGRSKJO[SOTJKVKTJKTZ6.?Y[HRG_KX
`
`(GYK:>GTJ,>VN_YOIGRSKJOGJKVKTJKTZ63*Y[HRG_KX
`
`(GYK:VN_YOIGRSKJOGJKVKTJKTZ63*Y[HRG_KX
`
`
`(GYK:
`
`
`(GYK:N[HY
`
`
`(GYK:GJGVZKXY
`
`Fast Ethernet design considerations
`65
`
`;:6IGHROTMJOYZGTIKY(GYK:>:
`
`
`,OHKXUVZOIIGHRKJOYZGTIKY(GYK,>
`
`
`(GYK:XKVKGZKXX[RKY
`
`
`9GSVRKIGRI[RGZOUT
`
`Gigabit Ethernet 1000Base-T
`67
`
`-OMGHOZ+ZNKXTKZY[SSGX_
`
`
`-OMGHOZ+ZNKXTKZ3')RG_KX
`
`
`6N_YOIGRSKJO[SOTJKVKTJKTZ6.?Y[HRG_KX
`
`
`(GYK9>LUXNUXO`UTZGRLOHKX
`
`
`(GYK2>LUX\KXZOIGRHGIQHUTKIGHROTM
`
`
`(GYK)>LUXIUVVKXIGHROTM
`
`
`(GYK:LUXIGZKMUX_;:6
`
`
`-OMGHOZ+ZNKXTKZL[RRJ[VRK^XKVKGZKXY
`
`Gigabit Ethernet design considerations
`71
`
`,OHKXUVZOIIGHRKJOYZGTIKY
`
`
`-OMGHOZXKVKGZKXX[RKY
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 8 of 324
`
`
`
`viii Contents
`
`5
`5.1
`5.2
`5.3
`
`6
`6.1
`6.2
`
`6.3
`
`6.4
`
`6.5
`6.6
`
`/TZXUJ[IZOUTZU:)6/6
`The origins of TCP/IP
`The ARPA model vs the OSI model
`The TCP/IP protocol suite vs the ARPA model
`
`/TZKXTKZRG_KXVXUZUIURY
`Overview
`Internet protocol version 4 (IPv4)
`
`9U[XIKUL/6GJJXKYYKY
`
`:NKV[XVUYKULZNK/6GJJXKYY
`
`/6\GJJXKYYTUZGZOUT
`
`4KZ]UXQ/*GTJNUYZ/*
`
`'JJXKYYIRGYYKY
`
`*KZKXSOTOTMZNKGJJXKYYIRGYYH_OTYVKIZOUT
`
`4[SHKXULTKZ]UXQYGTJNUYZYVKXGJJXKYYIRGYY
`
`9[HTKZSGYQY
`
`9[HTKZZOTM
`
`6XO\GZK\Y/TZKXTKZ[TOW[K/6GJJXKYYKY
`
`)RGYYRKYYGJJXKYYOTM
`
`)RGYYRKYYOTZKXJUSGOTXU[ZOTM)/*8
`
`/6\NKGJKXYZX[IZ[XK
`
`6GIQKZLXGMSKTZGZOUT
`Internet protocol version 6 (IPv6/IPng)
`
`/TZXUJ[IZOUT
`
`/6\U\KX\OK]
`
`/6\NKGJKXLUXSGZ
`
`/6\K^ZKTYOUTY
`
`/6\GJJXKYYKY
`
`,RU]RGHKRY
`Address resolution protocol (ARP)
`
`'JJXKYYXKYUR[ZOUTIGINK
`
`'86NKGJKX
`
`6XU^_'86
`
`-XGZ[OZU[Y'86
`Reverse address resolution protocol (RARP)
`Internet control message protocol (ICMP)
`
`/)36SKYYGMKYZX[IZ[XK
`
`/)36GVVROIGZOUTY
`
`9U[XIKW[KTIN
`
`8KJOXKIZOUTSKYYGMKY
`
`:OSKK^IKKJKJSKYYGMKY
`
`6GXGSKZKXVXUHRKSSKYYGMKY
`
`;TXKGINGHRKJKYZOTGZOUT
`
`
`74
`75
`75
`
`
`78
`79
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`94
`
`
`
`
`
`
`103
`
`
`
`
`106
`107
`
`
`
`
`
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 9 of 324
`
`
`
`6.7
`
`6.8
`6.9
`
`7
`7.1
`
`7.2
`
`8
`8.1
`8.2
`
`8.3
`
`8.4
`8.5
`8.6
`8.7
`
`
`/)36W[KX_SKYYGMKY
`Routing protocols
`
`8U[ZOTMHGYOIY
`
`*OXKIZ\YOTJOXKIZJKRO\KX_
`
`9ZGZOI\KXY[YJ_TGSOIXU[ZOTM
`
`'[ZUTUSU[YY_YZKSY
`
`/TZKXOUXK^ZKXOUXGTJMGZK]G_ZUMGZK]G_VXUZUIURY
`Interior gateway protocols
`Exterior gateway protocols (EGP’s)
`
`(-6
`
`.UYZZUNUYZZXGTYVUXZRG_KXVXUZUIURY
`TCP (transmission control protocol)
`
`(GYOIL[TIZOUTY
`
`6UXZY
`
`9UIQKZY
`
`9KW[KTIKT[SHKXY
`
`'IQTU]RKJMSKTZT[SHKXY
`
`9ROJOTM]OTJU]Y
`
`+YZGHROYNOTMGIUTTKIZOUT
`
`)RUYOTMGIUTTKIZOUT
`
`:NKV[YNUVKXGZOUT
`
`3G^OS[SYKMSKTZYO`K
`
`:NK:)6LXGSK
`UDP (user datagram protocol)
`
`(GYOIL[TIZOUTY
`
`:NK;*6LXGSK
`
`'VVROIGZOUTRG_KXVXUZUIURY
`Introduction
`File transfer protocol (FTP)
`
`/TZKXTGR,:6IUSSGTJY
`
`,:6[YKXIUSSGTJY
`
`'TUT_SU[Y,:6
`Trivial file transfer protocol (TFTP)
`
`/TZXUJ[IZOUT
`
`,XGSKZ_VKY
`TELNET (telecommunications network)
`RLOGIN (remote login)
`NFS (network file system)
`DNS (domain name system)
`
`4GSKXKYUR[ZOUT[YOTMNUYZYLORKY
`
`Contents ix
`
`
`114
`
`
`
`
`
`117
`120
`
`
`
`123
`
`
`
`
`
`
`
`
`
`
`
`131
`
`
`
`
`133
`134
`
`
`
`137
`
`
`140
`143
`143
`144
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 10 of 324
`
`
`
`x Contents
`
`8.8
`
`8.9
`
`8.10
`8.11
`8.12
`8.13
`
`9
`9.1
`9.2
`9.3
`9.4
`9.5
`9.6
`9.7
`9.8
`9.9
`9.10
`
`10
`10.1
`10.2
`
`10.3
`
`4GSKXKYUR[ZOUT[YOTM*49
`
`
`WINS
`
`/TZXUJ[IZOUT
`
`=/49TGSKXKMOYZXGZOUT
`
`=/49TGSKXKYUR[ZOUT
`
`=/49VXU^_GMKTZY
`SNMP (simple network management protocol)
`
`9436HGYOIIUSVUTKTZY
`
`9436HGYOIIUSSGTJY
`
`9436SGTGMKSKTZOTLUXSGZOUTHGYK3/(
`
`9436\VXUZUIURUVKXGZOUTY
`
`9436SGTGMKSKTZ
`
`9436YKI[XOZ_
`
`9436OTZKXUVKXGHOROZ_
`SMTP (simple mail transfer protocol)
`POP (post office protocol)
`BOOTP (bootstrap protocol)
`DHCP (dynamic host configuration protocol)
`
`*.)6UVKXGZOUT
`
`*.)6SKYYGMKLUXSGZ
`
`:)6/6[ZOROZOKY
`Introduction
`PING (packet Internet groper)
`ARP
`NETSTAT
`NBTSTAT
`IPCONFIG
`WINIPCFG
`TRACE RouTe
`ROUTE
`The HOSTS file
`
`2'4Y_YZKSIUSVUTKTZY
`Introduction
`Repeaters
`
`6GIQGMOTM
`
`2UIGR+ZNKXTKZXKVKGZKXY
`
`8KSUZKXKVKGZKXY
`Media converters
`
`
`149
`
`
`
`
`150
`
`
`
`
`
`
`
`154
`155
`156
`158
`
`
`
`
`162
`163
`166
`167
`167
`168
`169
`170
`172
`173
`
`
`174
`175
`
`
`
`176
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 11 of 324
`
`
`
`10.4
`
`10.5
`
`10.6
`
`10.7
`
`10.8
`10.9
`10.10
`10.11
`10.12
`10.13
`
`11
`11.1
`11.2
`
`11.3
`
`11.4
`11.5
`
`/TZKRROMKTZHXOJMKY
`9U[XIKXU[ZOTMHXOJMKY
`98:GTJZXGTYRGZOUTGRHXOJMKY
`2UIGR\YXKSUZKHXOJMKY
`
`*KYQZUV\YYZGIQGHRKN[HY
`9NGXKJ\YY]OZINKJN[HY
`3GTGMKJN[HY
`9KMSKTZGHRKN[HY
`*[GRYVKKJN[HY
`3UJ[RGXN[HY
`.[HOTZKXIUTTKIZOUT
`
`Bridges
`
`
`
`
`Hubs
`
`
`
`
`
`
`
`Switches
`
`
`
`
`Routers
`
`:]UVUXZ\YS[RZOVUXZXU[ZKXY
`
`'IIKYYXU[ZKXY
`
`(UXJKXXU[ZKXY
`
`8U[ZOTM\YHXOJMOTM
`Gateways
`Print servers
`Terminal servers
`Thin servers
`Remote access servers
`Network timeservers
`
`)[ZZNXU[MN\YYZUXKGTJLUX]GXJ
`2G_KXY]OZINKY\YRG_KXY]OZINKY
`,[RRJ[VRK^Y]OZINKY
`9]OZINGVVROIGZOUTY
`
`:NK/TZKXTKZ
`The Internet and internet
`The objectives, background and history of TCP/IP
`
`:NKUXOMOTUL:)6GTJ/6
`
`:NKNOYZUX_GTJHGIQMXU[TJUL:)6/6
`The Internet organizational structure
`
`/))(/'(
`
`/+:,/8:,
`
`:NK/TZKXTKZYUIOKZ_
`
`/'(
`The World Wide Web
`An introduction to HTML
`
`Contents xi
`
`177
`
`
`
`
`179
`
`
`
`
`
`
`
`182
`
`
`
`
`186
`
`
`
`
`187
`188
`188
`189
`189
`190
`
`
`191
`191
`
`
`192
`
`
`
`
`193
`194
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 12 of 324
`
`
`
`xii Contents
`
`11.6
`11.7
`11.8
`11.9
`11.10
`11.11
`11.12
`
`12
`12.1
`12.2
`12.3
`
`HTTP
`Java
`CGI
`Scripting: JavaScript
`XML
`Server side includes
`Perl
`
`/TZKXTKZGIIKYY
`Connecting a single host to the Internet
`Connecting remote hosts to corporate LAN
`Connecting multiple hosts to the Internet
`
`)UTTKIZOUT\OGVXU^_YKX\KX
`
`)UTTKIZOUT\OG4':YKX\KX/6SGYW[KXGJOTM
`
`)UTTKIZOUT\OG/6YNGXKX
`
`)UTTKIZOUT\OG;4/>UX4:MGZK]G_
`
`)UTTKIZOUT\OGJKJOIGZKJXU[ZKX
`
`13
`13.1
`13.2
`13.3
`13.4
`13.5
`
`13.6
`
`13.7
`
`:NK/TZKXTKZLUXIUSS[TOIGZOUTY
`Introduction
`Hardware and software issues
`Speed/bandwidth issues
`Legal issues
`
`656GTJ93:6YKX\KXY
`
`+SGORYULZ]GXKXKYOJOTMUTZNKRUIGRNUYZ]UXQYZGZOUT
`
`+SGORYULZ]GXKXKYOJOTMUTGXKSUZKYKX\KX
`
`<UOIKXKZXOK\GRULKSGOR
`Internet telephony
`
`/TZXUJ[IZOUT
`
`6)ZU6)
`
`6)ZUVNUTK
`
`6NUTKZUVNUTK
`
`3O^KJ6)VNUTKZUSO^KJ6)VNUTK]OZNOTZXGTKZ6(>
`
`/TIUSOTMIGRRY]OZNIGRR]GOZOTM
`
`5[ZMUOTMIGRRY]OZNXKM[RGXVNUTKZNXU[MN6)
`
`2O\K\UOIKIUSS[TOIGZOUT]OZNI[YZUSKXY\OG]KHVGMK
`
`9KI[XKVNUTKY
`Paging
`
`
`
`939YNUXZSKYYGMKYKX\OIK
`*'0*YUIQ
`
`194
`195
`196
`196
`196
`197
`197
`
`
`198
`200
`200
`
`
`
`
`
`
`
`203
`203
`204
`204
`205
`
`
`
`
`206
`
`
`
`
`
`
`
`
`
`209
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 13 of 324
`
`
`
`13.8
`
`13.9
`
`13.10
`
`13.11
`
`13.12
`
`14
`14.1
`14.2
`
`14.3
`
`14.4
`
`14.5
`
`14.6
`
`Voice mail
`
`6)ZU6)
`Fax
`
`,G^SGINOTKKSGORZULG^SGINOTKKSGOR
`
`,G^SGINOTKZULG^SGINOTK
`Video conferencing
`
`<OJKUG[JOUJUI[SKTZIUTLKXKTIOTM
`
`<OJKUTKZ]UXQOTM
`News
`
`4K]YV[YN
`
`4K]YV[RR
`
`4K]YMXU[VY ;9+4+:
`
`9KGXINGMKTZY
`Additional information
`
`/TZKXTKZZKRKVNUT_
`
`<OJKUIUTLKXKTIOTM
`
`6GMOTM
`
`,G^
`
`<UOIKIUSS[TOIGZOUT\OG]KHVGMKROTQ
`
`<UOIKSGOR
`
`4K]YYKX\OIKY
`
`666YKX\KXY
`
`+SGOR
`
`9KI[XOZ_IUTYOJKXGZOUTY
`The security problem
`Controlling access to the network
`
`'[ZNKTZOIGZOUT
`
`8U[ZKXY
`
`,OXK]GRRY
`Intrusion detection systems (IDS)
`
`.UYZHGYKJ/*9
`
`4KZ]UXQHGYKJ/*9
`Security management
`
`)KXZOLOIGZOUT
`
`/TLUXSGZOUTYKI[XOZ_VUROIOKY
`
`9KI[XOZ_GJ\OYUX_YKX\OIKY
`The public key infrastructure (PKI)
`
`/TZXUJ[IZOUTZUIX_VZUMXGVN_
`
`+TIX_VZOUTGTJJOMOZGRYOMTGZ[XKK^VRGOTKJ
`
`61/JKLOTOZOUTV[HROIQK_OTLXGYZX[IZ[XK
`
`61/L[TIZOUTY
`References
`
`/TZKXTKZK^ZXGTKZOTZXGTKZYKI[XOZ_
`
`Contents xiii
`
`210
`
`211
`
`
`211
`
`
`212
`
`
`
`
`214
`
`
`
`
`
`
`
`
`
`
`
`216
`218
`
`
`
`223
`
`
`224
`
`
`
`227
`
`
`
`
`232
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 14 of 324
`
`
`
`xiv Contents
`
`
`
`
`+TIX_VZOUT
`,OXK]GRRYVXU^_YKX\KXYKZI
`
`15
`15.1
`15.2
`15.3
`
`15.4
`
`16
`16.1
`
`16.2
`16.3
`16.4
`16.5
`16.6
`16.7
`
`16.8
`
`17
`17.1
`17.2
`
`6XUIKYYG[ZUSGZOUT
`Background
`Legacy automation architectures
`The factory of the future
`
`:NKTKZ]UXQOTMVXUZUIURYZGIQ
`
`'VVROIGZOUTRG_KXJGZGYZX[IZ[XKY
`
`+SHKJJKJ]KHYKX\KXY
`
`8U[ZKXYGTJY]OZINKY
`
`4KZ]UXQGIIKYY
`
`:NOTYKX\KXY
`
`4KZ]UXQIGVGHRKGVVROIGZOUTVXUIKYYUXY4)'6Y
`
`+ZNKXTKZIUSVGZOHRK62)Y
`
`+ZNKXTKZIUSVGZOHRK9)'*'Y_YZKSY
`References
`
`'[ZUSGZOUTZXKTJY
`
`:)6/6HGYKJLGIZUX_G[ZUSGZOUT
`
`:NOTYKX\KXY
`
`=KHIUSVGZOHRK9)'*'Y_YZKSY
`
`0G\G
`
`/TYZGRROTMGTJZXU[HRKYNUUZOTM+ZNKXTKZY_YZKSY
`Network drivers
`
`4KZ]UXQJXO\KXY
`
`)USVGZOHOROZ_GTJ[YGMK
`Network card/driver configuration
`Network driver interface specification (NDIS)
`Open data link interface (ODI)
`Packet drivers
`Plug and play architecture
`PCMCIA interface
`
`/TZXUJ[IZOUT
`
`6)3)/'OTZKXLGIK
`Protocol analyzers
`
`:XU[HRKYNUUZOTM:)6/6
`Maintenance and troubleshooting of real TCP/IP networks
`Network troubleshooting
`
`/TIXKGYOTMT[SHKXULIURROYOUTYUTZNK+ZNKXTKZTKZ]UXQ
`
`
`
`
`
`234
`234
`236
`
`
`
`
`
`
`
`
`
`241
`
`
`
`
`
`
`
`243
`
`
`244
`245
`245
`246
`246
`246
`
`
`247
`
`
`249
`250
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 15 of 324
`
`
`
`
`4KZ]UXQ[ZORO`GZOUTRU]H[ZKXXUXYNOMN
`
`.OMNT[SHKXULVGIQKZYH[ZRU]JGZGZXGTYLKXY
`Troubleshooting with TCP/IP utilities
`
`+^GSVRKUL[YKULGLK]ULZNK[ZOROZOKYZUMKZNKX
`
`;TXKROGHRKIUTTKIZOUTY
`
`4KZ]UXQIUTMKYZOUT
`
`9GZKRROZKYGTJ:)6/6
`Introduction
`Overview of satellite communications
`Advantages of satellite networks
`Applications of satellite systems
`
`8KSUZKIUTZXURGTJRUMOT
`
`<OJKUIUTLKXKTIOTM
`
`+RKIZXUTOISGOR
`
`/TLUXSGZOUTXKZXOK\GR
`
`([RQOTLUXSGZOUTHXUGJIGYZOTM
`
`/TZKXGIZO\KMGSOTM
`Review of TCP/IP
`
`/TZKXTKZVXUZUIURUX/6VXUZUIUR
`
`:XGTYSOYYOUTIUTZXURVXUZUIURUX:)6
`Weaknesses of TCP/IP in satellite usage
`
`=OTJU]YO`KZUUYSGRR
`
`(GTJ]OJZNGJGVZGZOUT
`
`9KRKIZO\KGIQTU]RKJMSKTZ
`
`9RU]YZGXZ
`
`:)6LUXZXGTYGIZOUTY
`Methods of optimizing TCP/IP over satellite channels
`
`17.3
`
`18
`18.1
`18.2
`18.3
`18.4
`
`18.5
`
`18.6
`
`18.7
`
`
`Appendix A: -RUYYGX_
`
`
`
`Appendix B: 6UXZT[SHKXGRRUIGZOUT
`
`
`
`
`/TJK^
`
`
`
`
`Contents xv
`
`
`
`251
`
`
`
`
`
`255
`255
`258
`259
`
`
`
`
`
`
`261
`
`
`265
`
`
`
`
`
`266
`
`
`
`
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 16 of 324
`
`
`
`Preface
`
`
`One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as
`the open standard today for all network and communications systems. The reasons for this popularity
`are not hard to find. TCP/IP and Ethernet are truly open standards available to competing
`manufacturers and providing the user with a common standard for a variety of products from different
`vendors. In addition, the cost of TCP/IP and Ethernet is low. Initially TCP/IP was used extensively in
`military applications and the purely commercial world such as banking, finance, and general business.
`But of great interest has been the strong movement to universal usage by the hitherto disinterested
`industrial and manufacturing spheres of activity who have traditionally used their own proprietary
`protocols and standards. These proprietary standards have been almost entirely replaced by the usage
`of the TCP/IP suite of protocols.
`This is a hands-on book that has been structured to cover the main areas of TCP/IP and Ethernet in
`detail, while going through the practical implementation of TCP/IP in computer and industrial
`applications. Troubleshooting and maintenance of TCP/IP networks and communications systems in
`an office and industrial environment will also be covered.
`
`
`After reading this book we would hope you would be able to:
`
`
`
`
`
`
`
`
`
`• Understand the fundamentals of the TCP/IP suite of protocols
`• Gain a practical understanding of the application of TCP/IP
`• Learn how to construct a robust local area network (LAN)
`• Learn the basic skills in troubleshooting TCP/IP and LANs
`• Apply the TCP/IP suite of protocols to both an office and industrial
`environment
`
`Typical people who will find this book useful include:
`
`• Network technicians
`• Data communications managers
`• Communication specialists
`• IT support managers and personnel
`• Network planners
`• Programmers
`• Design engineers
`• Electrical engineers
`• Instrumentation and control engineers
`• System integrators
`• System analysts
`• Designers
`• IT and MIS managers
`• Network support staff
`• Systems engineers
`
`You should have a modicum of computer knowledge and know how to use the Microsoft Windows
`operating system in order to derive maximum benefit from this book.
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 17 of 324
`
`
`
`xviii Preface
`
`The structure of the book is as follows.
`
`
`Chapter 1: Overview. This chapter gives a brief overview of what is covered in the book with an
`outline of the essentials of communications systems.
`
`Chapter 2: Networking fundamentals. An overview of network communication, types of
`networks, the OSI model, network topologies and media access methods.
`
`Chapter 3: Ethernet networks. A description of the operation and performance of Ethernet
`networks commencing with the basic principles.
`
`Chapter 4: Fast and gigabit Ethernet Systems. A minimum speed of 100 Mbps is becoming
`de rigeur on most Ethernet networks and this chapter examines the design and installation issues for
`fast Ethernet and gigabit Ethernet systems, which go well beyond the traditional 10 Mbps speed of
`operation.
`
`Chapter 5: Introduction to TCP/IP. A brief review of the origins of TCP/IP to lay the
`foundation for the following chapters.
`
`Chapter 6: Internet layer protocols. Perhaps the workhorse of the TCP/IP suite of protocols this
`chapter fleshes out the Internet protocol (both Ipv4 and Ipv6) and also examines the operation of ARP,
`RARP and ICMP.
`
`Chapter 7: Host-to-host (transport) layer protocols. The TCP (transmission control protocol)
`and UDP (user datagram protocol) are both covered in this chapter.
`
`Chapter 8: Application layer protocols. A thorough coverage of the most important application
`layer protocols such as FTP (file transfer protocol), TFTP (trivial file transfer protocol), TELNET,
`Rlogin, network file system, domain name system, WINS, simple network management protocol
`(SNMP), SMTP, POP, BOOTP and DHCP.
`
`Chapter 9: TCP/IP utilities. A coverage focussing on the practical application of the main
`utilities such as Ping, ARP, NETSTAT NBTSTAT, IPCONFIG, WINIPCFG, tracert, ROUTE and the
`hosts file.
`
`Chapter 10: LAN system components. A discussion on the key components in connecting
`networks together such as repeaters, bridges, switches and routers.
`
`Chapter 11: The Internet. A brief discussion on the origins of the Internet and the various
`associated standards organizations.
`
`Chapter 12: Internet access. The typical methods of connecting to the Internet are outlined here
`with a discussion on connecting a single host to the Internet, connecting multiple remote hosts to a
`corporate LAN, and in connecting multiple hosts to the Internet.
`
`Chapter 13: The Internet for communications. Speed/bandwidth issues, the different options
`for E-mail, voice over IP and voice mail will be described in this chapter.
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 18 of 324
`
`
`
`Preface xix
`
`Chapter 14: Security considerations. The security problem and methods of controlling access
`to a network will be examined in this chapter. This is a growing area of importance due to the
`proliferation attacks on computer networks by external parties.
`
`Chapter 15: Process automation. The legacy architectures and the factory of the future will be
`examined here together with an outline of the key elements of the modern Ethernet and TCP/IP
`architecture.
`
`
`Chapter 16: Installing and troubleshooting Ethernet systems. The functions of the various
`types of network driver software together with the parameters to set the network card to match up to
`the software for correct operation will be described here.
`
`Chapter 17: Troubleshooting TCP/IP. Maintenance of a TCP/IP network together with three
`typical methods requiring troubleshooting and the use of the utilities such as NETSTAT, Ping, tracert,
`and ripquery.
`
`Chapter 18: Satellites and TCP/IP. An overview of satellites and TCP/IP with satellites.
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 19 of 324
`
`
`
`1
`
`/TZXUJ[IZOUTZU
`
`IUSS[TOIGZOUTY
`
`
`
`
`
`5HPKIZO\KY
`
`When you have completed study of this chapter you should be able to:
`• Understand the main elements of the data communication process
`• Understand the difference between analog and digital transmission
`• Explain how data transfer is affected by attenuation, bandwidth and noise in
`the channel
`• Know the importance of synchronization of digital data systems
`• Describe the basic synchronization concepts used with asynchronous and
`synchronous systems
`• Explain the following types of encoding:
`• Manchester
`• RZ
`• NRZ
`• MLT-3
`• 4B/5B
`• Describe the basic error detection principles.
`
`
`
`*GZGIUSS[TOIGZOUTY
`
`Communications systems exist to transfer information from one location to another. The
`components of the information or message are usually known as data (derived from the
`Latin word for items of information). All data are made up of unique code symbols or
`other entities on which the sender and receiver of the messages have agreed. For example
`binary data is represented by two states ‘0’ and ‘1’. These are referred to as Binary digiTS
`or ‘bits’. These bits are represented inside our computers by the level of the electrical
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 20 of 324
`
`
`
`6XGIZOIGR:)6/6GTJ+ZNKXTKZ4KZ]UXQOTM
`
`signals within storage elements; a high level could represent a ‘1’, and a low-level
`represent a ‘0’. Alternatively, the data may be represented by the presence or absence of
`light in an optical fiber cable.
`
`
`
`:XGTYSOZZKXYXKIKO\KXYGTJIUSS[TOIGZOUTINGTTKRY
`
`
`
`A communications process requires the following components:
`• A source of the information
`• A transmitter to convert the information into data signals compatible with
`the communications channel
`• A communications channel
`• A receiver to convert the data signals back into a form the destination can
`understand
`• The destination of the information
`
`
`This process is shown in Figure 1.1.
`
`
`Communications
`Channel
`
`Receiver
`
`
`
`Figure 1.1
`Communications process
`The transmitter encodes the information into a suitable form to be transmitted over the
`communications channel. The communications channel moves
`this signal as
`electromagnetic energy from the source to one or more destination receivers. The
`channel may convert this energy from one form to another, such as electrical to optical
`signals, whilst maintaining the integrity of the information so the recipient can understand
`the message sent by the transmitter.
`For the communications to be successful the source and destination must use a mutually
`agreed method of conveying the data.
`The main factors to be considered are:
`• The form of signaling and the magnitude(s) of the signals to be used
`• The type of communications link (twisted pair, coaxial, optic fiber, radio etc)
`• The arrangement of signals to form character codes from which the message
`can be constructed
`• The methods of controlling the flow of data
`• The procedures for detecting and correcting errors in the transmission
`
`
`The form of the physical connections is defined by interface standards, some agreed
`coding is applied to the message and the rules controlling the data flow and detection and
`correction of errors are known as the protocol.
`
`
`
`/TZKXLGIKYZGTJGXJY
`An interface standard defines the electrical and mechanical aspects of the interface to
`allow the communications equipment from different manufacturers to operate together.
`A typical example is the EIA/TIA-232-E interface standard. This specifies the
`following three components:
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 21 of 324
`
`
`
`
`
`
`
`/TZXUJ[IZOUTZUIUSS[TOIGZOUTY
`
`• Electrical signal characteristics – defining the allowable voltage levels,
`grounding characteristics etc
`• Mechanical characteristics – defining the connector arrangements and pin
`assignments
`• Functional description of the interchange circuits – defining the function
`of the various data, timing and control signals used at the interface
`
`
`It should be emphasized that the interface standard only defines the electrical and
`mechanical aspects of the interface between devices and does not cover how data is
`transferred between them.
`
`)UJOTM
`A wide variety of codes have been used for communications purposes. Early telegraph
`communications used Morse code with human operators as transmitter and receiver. The
`Baudot code introduced a constant 5-bit code length for use with mechanical telegraph
`transmitters and receivers. The commonly used codes for data communications today are
`the Extended Binary Coded Decimal Interchange Code (EBCIDIC) and the American
`Standards Committee for Information Interchange (ASCII).
`
`6XUZUIURY
`A protocol is essential for defining the common message format and procedures for
`transferring data between all devices on the network. It includes the following important
`features:
`
`• Initialization: Initializes the protocol parameters and commences the data
`transmission
`• Framing and synchronization: Defines the start and end of the frame and
`how the receiver can synchronize to the data stream
`• Flow control: Ensures that the receiver is able to advise the transmitter to
`regulate the data flow and ensure no data is lost.
`• Line control: Used with half-duplex links to reverse the roles of transmitter
`and receiver and begin transmission in the other direction.
`• Error control: Provides techniques to check the accuracy of the received
`data to identify transmission errors. These include Block Redundancy checks
`and cyclic redundancy checks
`• Time out control: Procedures for transmitters to retry or abort transmission
`when acknowledgments are not received within agreed time limits
`
`
`
`9USKIUSSUTR_[YKJIUSS[TOIGZOUTYVXUZUIURY
`
`• Xmodem or Kermit for asynchronous file transmission
`• Binary synchronous protocol (BSC), synchronous data link control (SDLC)
`or high level data link control (HDLC) for synchronous transmissions
`• Industrial protocols such as manufacturing automation protocol (MAP),
`technical office protocol (TOP), Modbus, Data Highway Plus, HART,
`Profibus, Foundation Fieldbus, etc
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 22 of 324
`
`
`
`6XGIZOIGR:)6/6GTJ+ZNKXTKZ4KZ]UXQOTM
`
`
`
`:_VKYULIUSS[TOIGZOUTINGTTKRY
`
`
`
`'TGRUMIUSS[TOIGZOUTYINGTTKRY
`that are changing
`An analog communications channel conveys analog signals
`continuously in both frequency and amplitude. These signals are commonly used for
`audio and video communication as illustrated in Figure 1.2 and Figure 1.3.
`
`Wavelength
`
`+
`
`Varying
`Amplitude
`
`0
`
`Velocity of
`signal movement
`though channel