throbber
gO) litem atag(els
`Networking
`
`4 Cenaeee
`
`=
`
`Deon Reynders »
`
`‘
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 1 of 324
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 1 of 324
`
`

`

`
`
`
`Practical TCP/IP and
`Ethernet Networking
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 2 of 324
`
`

`

`Titles in the series
`
`Practical Cleanrooms: Technologies and Facilities (David Conway)
`
`Practical Data Acquisition for Instrumentation and Control Systems (John Park,
`Steve Mackay)
`
`Practical Data Communications for Instrumentation and Control (Steve Mackay,
`Edwin Wright, John Park)
`
`Practical Digital Signal Processing for Engineers and Technicians (Edmund Lai)
`
`Practical Electrical Network Automation and Communication Systems (Cobus
`Strauss)
`
`Practical Embedded Controllers (John Park)
`
`Practical Fiber Optics (David Bailey, Edwin Wright)
`
`Practical Industrial Data Networks: Design, Installation and Troubleshooting (Steve
`Mackay, Edwin Wright, John Park, Deon Reynders)
`
`Practical Industrial Safety, Risk Assessment and Shutdown Systems for
`Instrumentation and Control (Dave Macdonald)
`
`Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (Gordon
`Clarke, Deon Reynders)
`
`Practical Radio Engineering and Telemetry for Industry (David Bailey)
`
`Practical SCADA for Industry (David Bailey, Edwin Wright)
`
`Practical TCP/IP and Ethernet Networking (Deon Reynders, Edwin Wright)
`
`Practical Variable Speed Drives and Power Electronics (Malcolm Barnes)
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 3 of 324
`
`

`

`
`
`Practical TCP/IP and
`Ethernet Networking
`
`
`
`
`Deon Reynders Pr Eng, BSc BEng, BSc Eng (Elec)(Hons), MBA
`
`
`Edwin Wright MIPENZ, BSc(Hons), BSc(Elec Eng), IDC Technologies, Perth,
`Australia
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`AMSTERDAM • BOSTON • HEIDELBERG • LONDON • NEW YORK • OXFORD
`
`PARIS• SAN DIEGO• SAN FRANCISCO• SINGAPORE• SYDNEY• TOKYO
`
`ELSEVIER
`
`Newnes
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 4 of 324
`
`

`

`Newnes
`An imprint of Elsevier
`Linacre House, Jordan Hill, Oxford OX2 8DP
`200 Wheeler Road, Burlington, MA 01803
`
`First published 2003
`
`Copyright  2003, IDC Technologies. All rights reserved
`
`No part of this publication may be reproduced in any material form (including
`photocopying or storing in any medium by electronic means and whether
`or not transiently or incidentally to some other use of this publication) without
`the written permission of the copyright holder except in accordance with the
`provisions of the Copyright, Designs and Patents Act 1988 or under the terms of
`a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road,
`London, England W1T 4LP. Applications for the copyright holder’s written
`permission to reproduce any part of this publication should be addressed
`to the publisher
`
`
`British Library Cataloguing in Publication Data
`A catalogue record for this book is available from the British Library
`
`
`ISBN 07506 58061
`
`
` For information on all Newnes publications, visit
`
` our website at www.newnespress.com
`
`
`
`
`Typeset and Edited by Vivek Mehra, Mumbai, India
`(vivekmehra@tatanova.com)
`
`Printed and bound in Great Britain
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 5 of 324
`
`

`

`6XKLGIK
`
`
`
`
`
`
`
`)UTZKTZY
`
`
`
`
`
`
`
`
`
`
`^\OO
`
`1
`1.1
`1.2
`
`1.3
`
`1.4
`
`1.5
`
`1.6
`
`1.7
`
`2
`2.1
`2.2
`
`2.3
`
`/TZXUJ[IZOUTZUIUSS[TOIGZOUTY
`Data communications
`Transmitters, receivers and communication channels
`
`/TZKXLGIKYZGTJGXJY
`
`)UJOTM
`
`6XUZUIURY
`
`9USKIUSSUTR_[YKJIUSS[TOIGZOUTYVXUZUIURY
`Types of communication channels
`
`'TGRUMIUSS[TOIGZOUTINGTTKRY
`Communications channel properties
`
`9OMTGRGZZKT[GZOUT
`
`)NGTTKRHGTJ]OJZN
`
`4UOYK
`Data transmission modes
`
`*OXKIZOUTULYOMTGRLRU]
`
`9_TINXUTO`GZOUTULJOMOZGRJGZGYOMTGRY
`
`'Y_TINXUTU[YZXGTYSOYYOUT
`
`9_TINXUTU[YZXGTYSOYYOUT
`Encoding methods
`
`3GTINKYZKX
`
`*OLLKXKTZOGR3GTINKYZKX
`
`8@XKZ[XTZU`KXU
`
`48@TUTXKZ[XTZU`KXU
`
`32:
`
`((
`Error detection
`
`)_IROIXKJ[TJGTI_INKIQ)8)
`
`4KZ]UXQOTML[TJGSKTZGRY
`Overview
`Network communication
`
`)OXI[OZY]OZINOTM
`
`6GIQKZY]OZINOTM
`
`*GZGMXGSYGTJ\OXZ[GRIOXI[OZY
`Types of networks
`
`2UIGRGXKGTKZ]UXQY2'4Y
` =OJKGXKGTKZ]UXQY='4Y
`
`3KZXUVUROZGTGXKGTKZ]UXQY3'4Y
`
`
`1
`2
`
`
`
`
`4
`
`4
`
`
`
`8
`
`
`
`
`12
`
`
`
`
`
`
`14
`
`
`
`15
`16
`
`
`
`18
`
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 6 of 324
`
`

`

`vi Contents
`
`2.4
`
`2.5
`2.6
`2.7
`2.8
`
`2.9
`2.10
`2.11
`2.12
`
`2.13
`
`3
`3.1
`3.2
`
`3.3
`3.4
`
`
`)U[VROTMXGZOU
`
`<OXZ[GRVXO\GZKTKZ]UXQY<64Y
`The open systems interconnection model
`
`5VKTGTJIRUYKJY_YZKSY
`
`:NKUVKTY_YZKSYOTZKXIUTTKIZOUTXKLKXKTIKSUJKR59/SUJKR
`
`59/RG_KXYKX\OIKY
`
`'VVROIGZOUTRG_KX
`
`6XKYKTZGZOUTRG_KX
`
`9KYYOUTRG_KX
`
`:XGTYVUXZRG_KX
`
`4KZ]UXQRG_KX
`
`*GZGROTQRG_KX
`
`6N_YOIGRRG_KX
`Interoperability and internetworking
`Protocols and protocol standards
`IEEE/ISO standards
`Network topologies
`
`(XUGJIGYZGTJVUOTZZUVUOTZZUVURUMOKY
`
`2UMOIGRGTJVN_YOIGRZUVURUMOKY
`Bus topology
`Star topology
`Ring topology
`Other types of topology
`
`9ZGX]OXKJXOTMZUVURUM_
`
`*OYZXOH[ZKJYZGXZUVURUM_
`
`3KYNZUVURUM_
`
`:XKKZUVURUM_
`Media access methods
`
`)UTZKTZOUTY_YZKSY
`
`:UQKTVGYYOTM
`
`6URROTM
`
`+ZNKXTKZTKZ]UXQY
`IEEE 802.3 CSMA/CD (‘Ethernet’)
`Physical layer
`
`(GYKY_YZKSY
`
`(GYKY_YZKSY
`
`(GYK:
`
`(GYK,
`
`(XUGJ
`
`(GYK
`Signaling methods
`Medium access control
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`28
`30
`31
`33
`
`
`35
`36
`36
`38
`
`
`
`
`40
`
`
`
`
`
`43
`44
`
`
`
`
`
`
`50
`50
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 7 of 324
`
`

`

`3.5
`3.6
`3.7
`3.8
`3.9
`3.10
`3.11
`
`4
`4.1
`
`4.2
`
`4.3
`
`4.4
`
`4.5
`
`Frame transmission
`Frame reception
`Collisions
`MAC frame format
`Difference between 802.3 and Ethernet
`Reducing collisions
`Ethernet design rules
`
`2KTMZNULZNKIGHRKYKMSKTZ
`
`3G^OS[SZXGTYIKO\KXIGHRKRKTMZN
`
`4UJKVRGIKSKTZX[RKY
`
`3G^OS[SZXGTYSOYYOUTVGZN
`
`3G^OS[STKZ]UXQYO`K
`
`8KVKGZKXX[RKY
`
`)GHRKY_YZKSMXU[TJOTM
`
`Contents vii
`
`51
`51
`52
`53
`55
`55
`55
`
`
`
`
`
`
`
`
`
`,GYZGTJMOMGHOZ+ZNKXTKZY_YZKSY
`59
`Achieving higher speed
`
`
`)GHROTMROSOZGZOUTY
`60
`100Base-T (100Base-TX, -T4, -FX, -T2)
`
`
`/+++[(GYK:YZGTJGXJYGXXGTMKSKTZ
`
`
`6N_YOIGRSKJO[SOTJKVKTJKTZ6.?Y[HRG_KX
`
`(GYK:>GTJ,>VN_YOIGRSKJOGJKVKTJKTZ63*Y[HRG_KX 
`
`(GYK:VN_YOIGRSKJOGJKVKTJKTZ63*Y[HRG_KX
`
`
`(GYK:
`
`
`(GYK:N[HY
`
`
`(GYK:GJGVZKXY
`
`Fast Ethernet design considerations
`65
`
`;:6IGHROTMJOYZGTIKY(GYK:>:
`
`
`,OHKXUVZOIIGHRKJOYZGTIKY(GYK,>
`
`
`(GYK:XKVKGZKXX[RKY
`
`
`9GSVRKIGRI[RGZOUT
`
`Gigabit Ethernet 1000Base-T
`67
`
`-OMGHOZ+ZNKXTKZY[SSGX_
`
`
`-OMGHOZ+ZNKXTKZ3')RG_KX
`
`
`6N_YOIGRSKJO[SOTJKVKTJKTZ6.?Y[HRG_KX
`
`
`(GYK9>LUXNUXO`UTZGRLOHKX
`
`
`(GYK2>LUX\KXZOIGRHGIQHUTKIGHROTM
`
`
`(GYK)>LUXIUVVKXIGHROTM
`
`
`(GYK:LUXIGZKMUX_;:6
`
`
`-OMGHOZ+ZNKXTKZL[RRJ[VRK^XKVKGZKXY
`
`Gigabit Ethernet design considerations
`71
`
`,OHKXUVZOIIGHRKJOYZGTIKY
`
`
`-OMGHOZXKVKGZKXX[RKY
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 8 of 324
`
`

`

`viii Contents
`
`5
`5.1
`5.2
`5.3
`
`6
`6.1
`6.2
`
`6.3
`
`6.4
`
`6.5
`6.6
`
`/TZXUJ[IZOUTZU:)6/6
`The origins of TCP/IP
`The ARPA model vs the OSI model
`The TCP/IP protocol suite vs the ARPA model
`
`/TZKXTKZRG_KXVXUZUIURY
`Overview
`Internet protocol version 4 (IPv4)
`
`9U[XIKUL/6GJJXKYYKY
`
`:NKV[XVUYKULZNK/6GJJXKYY
`
`/6\GJJXKYYTUZGZOUT
`
`4KZ]UXQ/*GTJNUYZ/*
`
`'JJXKYYIRGYYKY
`
`*KZKXSOTOTMZNKGJJXKYYIRGYYH_OTYVKIZOUT
`
`4[SHKXULTKZ]UXQYGTJNUYZYVKXGJJXKYYIRGYY
`
`9[HTKZSGYQY
`
`9[HTKZZOTM
`
`6XO\GZK\Y/TZKXTKZ[TOW[K/6GJJXKYYKY
`
`)RGYYRKYYGJJXKYYOTM
`
`)RGYYRKYYOTZKXJUSGOTXU[ZOTM)/*8
`
`/6\NKGJKXYZX[IZ[XK
`
`6GIQKZLXGMSKTZGZOUT
`Internet protocol version 6 (IPv6/IPng)
`
`/TZXUJ[IZOUT
`
`/6\U\KX\OK]
`
`/6\NKGJKXLUXSGZ
`
`/6\K^ZKTYOUTY
`
`/6\GJJXKYYKY
`
`,RU]RGHKRY
`Address resolution protocol (ARP)
`
`'JJXKYYXKYUR[ZOUTIGINK
`
`'86NKGJKX
`
`6XU^_'86
`
`-XGZ[OZU[Y'86
`Reverse address resolution protocol (RARP)
`Internet control message protocol (ICMP)
`
`/)36SKYYGMKYZX[IZ[XK
`
`/)36GVVROIGZOUTY
`
`9U[XIKW[KTIN
`
`8KJOXKIZOUTSKYYGMKY
`
`:OSKK^IKKJKJSKYYGMKY
`
`6GXGSKZKXVXUHRKSSKYYGMKY
`
`;TXKGINGHRKJKYZOTGZOUT
`
`
`74
`75
`75
`
`
`78
`79
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`94
`
`
`
`
`
`
`103
`
`
`
`
`106
`107
`
`
`
`
`
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 9 of 324
`
`

`

`6.7
`
`6.8
`6.9
`
`7
`7.1
`
`7.2
`
`8
`8.1
`8.2
`
`8.3
`
`8.4
`8.5
`8.6
`8.7
`
`
`/)36W[KX_SKYYGMKY
`Routing protocols
`
`8U[ZOTMHGYOIY
`
`*OXKIZ\YOTJOXKIZJKRO\KX_
`
`9ZGZOI\KXY[YJ_TGSOIXU[ZOTM
`
`'[ZUTUSU[YY_YZKSY
`
`/TZKXOUXK^ZKXOUXGTJMGZK]G_ZUMGZK]G_VXUZUIURY
`Interior gateway protocols
`Exterior gateway protocols (EGP’s)
`
`(-6
`
`.UYZZUNUYZZXGTYVUXZRG_KXVXUZUIURY
`TCP (transmission control protocol)
`
`(GYOIL[TIZOUTY
`
`6UXZY
`
`9UIQKZY
`
`9KW[KTIKT[SHKXY
`
`'IQTU]RKJMSKTZT[SHKXY
`
`9ROJOTM]OTJU]Y
`
`+YZGHROYNOTMGIUTTKIZOUT
`
`)RUYOTMGIUTTKIZOUT
`
`:NKV[YNUVKXGZOUT
`
`3G^OS[SYKMSKTZYO`K
`
`:NK:)6LXGSK
`UDP (user datagram protocol)
`
`(GYOIL[TIZOUTY
`
`:NK;*6LXGSK
`
`'VVROIGZOUTRG_KXVXUZUIURY
`Introduction
`File transfer protocol (FTP)
`
`/TZKXTGR,:6IUSSGTJY
`
`,:6[YKXIUSSGTJY
`
`'TUT_SU[Y,:6
`Trivial file transfer protocol (TFTP)
`
`/TZXUJ[IZOUT
`
`,XGSKZ_VKY
`TELNET (telecommunications network)
`RLOGIN (remote login)
`NFS (network file system)
`DNS (domain name system)
`
`4GSKXKYUR[ZOUT[YOTMNUYZYLORKY
`
`Contents ix
`
`
`114
`
`
`
`
`
`117
`120
`
`
`
`123
`
`
`
`
`
`
`
`
`
`
`
`131
`
`
`
`
`133
`134
`
`
`
`137
`
`
`140
`143
`143
`144
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 10 of 324
`
`

`

`x Contents
`
`8.8
`
`8.9
`
`8.10
`8.11
`8.12
`8.13
`
`9
`9.1
`9.2
`9.3
`9.4
`9.5
`9.6
`9.7
`9.8
`9.9
`9.10
`
`10
`10.1
`10.2
`
`10.3
`
`4GSKXKYUR[ZOUT[YOTM*49
`
`
`WINS
`
`/TZXUJ[IZOUT
`
`=/49TGSKXKMOYZXGZOUT
`
`=/49TGSKXKYUR[ZOUT
`
`=/49VXU^_GMKTZY
`SNMP (simple network management protocol)
`
`9436HGYOIIUSVUTKTZY
`
`9436HGYOIIUSSGTJY
`
`9436SGTGMKSKTZOTLUXSGZOUTHGYK3/(
`
`9436\VXUZUIURUVKXGZOUTY
`
`9436SGTGMKSKTZ
`
`9436YKI[XOZ_
`
`9436OTZKXUVKXGHOROZ_
`SMTP (simple mail transfer protocol)
`POP (post office protocol)
`BOOTP (bootstrap protocol)
`DHCP (dynamic host configuration protocol)
`
`*.)6UVKXGZOUT
`
`*.)6SKYYGMKLUXSGZ
`
`:)6/6[ZOROZOKY
`Introduction
`PING (packet Internet groper)
`ARP
`NETSTAT
`NBTSTAT
`IPCONFIG
`WINIPCFG
`TRACE RouTe
`ROUTE
`The HOSTS file
`
`2'4Y_YZKSIUSVUTKTZY
`Introduction
`Repeaters
`
`6GIQGMOTM
`
`2UIGR+ZNKXTKZXKVKGZKXY
`
`8KSUZKXKVKGZKXY
`Media converters
`
`
`149
`
`
`
`
`150
`
`
`
`
`
`
`
`154
`155
`156
`158
`
`
`
`
`162
`163
`166
`167
`167
`168
`169
`170
`172
`173
`
`
`174
`175
`
`
`
`176
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 11 of 324
`
`

`

`10.4
`
`10.5
`
`10.6
`
`10.7
`
`10.8
`10.9
`10.10
`10.11
`10.12
`10.13
`
`11
`11.1
`11.2
`
`11.3
`
`11.4
`11.5
`
`/TZKRROMKTZHXOJMKY
`9U[XIKXU[ZOTMHXOJMKY
`98:GTJZXGTYRGZOUTGRHXOJMKY
`2UIGR\YXKSUZKHXOJMKY
`
`*KYQZUV\YYZGIQGHRKN[HY
`9NGXKJ\YY]OZINKJN[HY
`3GTGMKJN[HY
`9KMSKTZGHRKN[HY
`*[GRYVKKJN[HY
`3UJ[RGXN[HY
`.[HOTZKXIUTTKIZOUT
`
`Bridges
`
`
`
`
`Hubs
`
`
`
`
`
`
`
`Switches
`
`
`
`
`Routers
`
`:]UVUXZ\YS[RZOVUXZXU[ZKXY
`
`'IIKYYXU[ZKXY
`
`(UXJKXXU[ZKXY
`
`8U[ZOTM\YHXOJMOTM
`Gateways
`Print servers
`Terminal servers
`Thin servers
`Remote access servers
`Network timeservers
`
`)[ZZNXU[MN\YYZUXKGTJLUX]GXJ
`2G_KXY]OZINKY\YRG_KXY]OZINKY
`,[RRJ[VRK^Y]OZINKY
`9]OZINGVVROIGZOUTY
`
`:NK/TZKXTKZ
`The Internet and internet
`The objectives, background and history of TCP/IP
`
`:NKUXOMOTUL:)6GTJ/6
`
`:NKNOYZUX_GTJHGIQMXU[TJUL:)6/6
`The Internet organizational structure
`
`/))(/'(
`
`/+:,/8:,
`
`:NK/TZKXTKZYUIOKZ_
`
`/'(
`The World Wide Web
`An introduction to HTML
`
`Contents xi
`
`177
`
`
`
`
`179
`
`
`
`
`
`
`
`182
`
`
`
`
`186
`
`
`
`
`187
`188
`188
`189
`189
`190
`
`
`191
`191
`
`
`192
`
`
`
`
`193
`194
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 12 of 324
`
`

`

`xii Contents
`
`11.6
`11.7
`11.8
`11.9
`11.10
`11.11
`11.12
`
`12
`12.1
`12.2
`12.3
`
`HTTP
`Java
`CGI
`Scripting: JavaScript
`XML
`Server side includes
`Perl
`
`/TZKXTKZGIIKYY
`Connecting a single host to the Internet
`Connecting remote hosts to corporate LAN
`Connecting multiple hosts to the Internet
`
`)UTTKIZOUT\OGVXU^_YKX\KX
`
`)UTTKIZOUT\OG4':YKX\KX/6SGYW[KXGJOTM
`
`)UTTKIZOUT\OG/6YNGXKX
`
`)UTTKIZOUT\OG;4/>UX4:MGZK]G_
`
`)UTTKIZOUT\OGJKJOIGZKJXU[ZKX
`
`13
`13.1
`13.2
`13.3
`13.4
`13.5
`
`13.6
`
`13.7
`
`:NK/TZKXTKZLUXIUSS[TOIGZOUTY
`Introduction
`Hardware and software issues
`Speed/bandwidth issues
`Legal issues
`E-mail
`
`656GTJ93:6YKX\KXY
`
`+SGORYULZ]GXKXKYOJOTMUTZNKRUIGRNUYZ]UXQYZGZOUT
`
`+SGORYULZ]GXKXKYOJOTMUTGXKSUZKYKX\KX
`
`<UOIKXKZXOK\GRULKSGOR
`Internet telephony
`
`/TZXUJ[IZOUT
`
`6)ZU6)
`
`6)ZUVNUTK
`
`6NUTKZUVNUTK
`
`3O^KJ6)VNUTKZUSO^KJ6)VNUTK]OZNOTZXGTKZ6(>
`
`/TIUSOTMIGRRY]OZNIGRR]GOZOTM
`
`5[ZMUOTMIGRRY]OZNXKM[RGXVNUTKZNXU[MN6)
`
`2O\K\UOIKIUSS[TOIGZOUT]OZNI[YZUSKXY\OG]KHVGMK
`
`9KI[XKVNUTKY
`Paging
`
`
`
`939YNUXZSKYYGMKYKX\OIK
`*'0*YUIQ
`
`194
`195
`196
`196
`196
`197
`197
`
`
`198
`200
`200
`
`
`
`
`
`
`
`203
`203
`204
`204
`205
`
`
`
`
`206
`
`
`
`
`
`
`
`
`
`209
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 13 of 324
`
`

`

`13.8
`
`13.9
`
`13.10
`
`13.11
`
`13.12
`
`14
`14.1
`14.2
`
`14.3
`
`14.4
`
`14.5
`
`14.6
`
`Voice mail
`
`6)ZU6)
`Fax
`
`,G^SGINOTKKSGORZULG^SGINOTKKSGOR
`
`,G^SGINOTKZULG^SGINOTK
`Video conferencing
`
`<OJKUG[JOUJUI[SKTZIUTLKXKTIOTM
`
`<OJKUTKZ]UXQOTM
`News
`
`4K]YV[YN
`
`4K]YV[RR
`
`4K]YMXU[VY ;9+4+:
`
`9KGXINGMKTZY
`Additional information
`
`/TZKXTKZZKRKVNUT_
`
`<OJKUIUTLKXKTIOTM
`
`6GMOTM
`
`,G^
`
`<UOIKIUSS[TOIGZOUT\OG]KHVGMKROTQ
`
`<UOIKSGOR
`
`4K]YYKX\OIKY
`
`666YKX\KXY
`
`+SGOR
`
`9KI[XOZ_IUTYOJKXGZOUTY
`The security problem
`Controlling access to the network
`
`'[ZNKTZOIGZOUT
`
`8U[ZKXY
`
`,OXK]GRRY
`Intrusion detection systems (IDS)
`
`.UYZHGYKJ/*9
`
`4KZ]UXQHGYKJ/*9
`Security management
`
`)KXZOLOIGZOUT
`
`/TLUXSGZOUTYKI[XOZ_VUROIOKY
`
`9KI[XOZ_GJ\OYUX_YKX\OIKY
`The public key infrastructure (PKI)
`
`/TZXUJ[IZOUTZUIX_VZUMXGVN_
`
`+TIX_VZOUTGTJJOMOZGRYOMTGZ[XKK^VRGOTKJ
`
`61/JKLOTOZOUTV[HROIQK_OTLXGYZX[IZ[XK
`
`61/L[TIZOUTY
`References
`
`/TZKXTKZK^ZXGTKZOTZXGTKZYKI[XOZ_
`
`Contents xiii
`
`210
`
`211
`
`
`211
`
`
`212
`
`
`
`
`214
`
`
`
`
`
`
`
`
`
`
`
`216
`218
`
`
`
`223
`
`
`224
`
`
`
`227
`
`
`
`
`232
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 14 of 324
`
`

`

`xiv Contents
`
`
`
`
`+TIX_VZOUT
`,OXK]GRRYVXU^_YKX\KXYKZI
`
`15
`15.1
`15.2
`15.3
`
`15.4
`
`16
`16.1
`
`16.2
`16.3
`16.4
`16.5
`16.6
`16.7
`
`16.8
`
`17
`17.1
`17.2
`
`6XUIKYYG[ZUSGZOUT
`Background
`Legacy automation architectures
`The factory of the future
`
`:NKTKZ]UXQOTMVXUZUIURYZGIQ
`
`'VVROIGZOUTRG_KXJGZGYZX[IZ[XKY
`
`+SHKJJKJ]KHYKX\KXY
`
`8U[ZKXYGTJY]OZINKY
`
`4KZ]UXQGIIKYY
`
`:NOTYKX\KXY
`
`4KZ]UXQIGVGHRKGVVROIGZOUTVXUIKYYUXY4)'6Y
`
`+ZNKXTKZIUSVGZOHRK62)Y
`
`+ZNKXTKZIUSVGZOHRK9)'*'Y_YZKSY
`References
`
`'[ZUSGZOUTZXKTJY
`
`:)6/6HGYKJLGIZUX_G[ZUSGZOUT
`
`:NOTYKX\KXY
`
`=KHIUSVGZOHRK9)'*'Y_YZKSY
`
`0G\G
`
`/TYZGRROTMGTJZXU[HRKYNUUZOTM+ZNKXTKZY_YZKSY
`Network drivers
`
`4KZ]UXQJXO\KXY
`
`)USVGZOHOROZ_GTJ[YGMK
`Network card/driver configuration
`Network driver interface specification (NDIS)
`Open data link interface (ODI)
`Packet drivers
`Plug and play architecture
`PCMCIA interface
`
`/TZXUJ[IZOUT
`
`6)3)/'OTZKXLGIK
`Protocol analyzers
`
`:XU[HRKYNUUZOTM:)6/6
`Maintenance and troubleshooting of real TCP/IP networks
`Network troubleshooting
`
`/TIXKGYOTMT[SHKXULIURROYOUTYUTZNK+ZNKXTKZTKZ]UXQ
`
`
`
`
`
`234
`234
`236
`
`
`
`
`
`
`
`
`
`241
`
`
`
`
`
`
`
`243
`
`
`244
`245
`245
`246
`246
`246
`
`
`247
`
`
`249
`250
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 15 of 324
`
`

`

`
`4KZ]UXQ[ZORO`GZOUTRU]H[ZKXXUXYNOMN
`
`.OMNT[SHKXULVGIQKZYH[ZRU]JGZGZXGTYLKXY
`Troubleshooting with TCP/IP utilities
`
`+^GSVRKUL[YKULGLK]ULZNK[ZOROZOKYZUMKZNKX
`
`;TXKROGHRKIUTTKIZOUTY
`
`4KZ]UXQIUTMKYZOUT
`
`9GZKRROZKYGTJ:)6/6
`Introduction
`Overview of satellite communications
`Advantages of satellite networks
`Applications of satellite systems
`
`8KSUZKIUTZXURGTJRUMOT
`
`<OJKUIUTLKXKTIOTM
`
`+RKIZXUTOISGOR
`
`/TLUXSGZOUTXKZXOK\GR
`
`([RQOTLUXSGZOUTHXUGJIGYZOTM
`
`/TZKXGIZO\KMGSOTM
`Review of TCP/IP
`
`/TZKXTKZVXUZUIURUX/6VXUZUIUR
`
`:XGTYSOYYOUTIUTZXURVXUZUIURUX:)6
`Weaknesses of TCP/IP in satellite usage
`
`=OTJU]YO`KZUUYSGRR
`
`(GTJ]OJZNGJGVZGZOUT
`
`9KRKIZO\KGIQTU]RKJMSKTZ
`
`9RU]YZGXZ
`
`:)6LUXZXGTYGIZOUTY
`Methods of optimizing TCP/IP over satellite channels
`
`17.3
`
`18
`18.1
`18.2
`18.3
`18.4
`
`18.5
`
`18.6
`
`18.7
`
`
`Appendix A: -RUYYGX_
`
`
`
`Appendix B: 6UXZT[SHKXGRRUIGZOUT
`
`
`
`
`/TJK^
`
`
`
`
`Contents xv
`
`
`
`251
`
`
`
`
`
`255
`255
`258
`259
`
`
`
`
`
`
`261
`
`
`265
`
`
`
`
`
`266
`
`
`
`
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 16 of 324
`
`

`

`Preface
`
`
`One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as
`the open standard today for all network and communications systems. The reasons for this popularity
`are not hard to find. TCP/IP and Ethernet are truly open standards available to competing
`manufacturers and providing the user with a common standard for a variety of products from different
`vendors. In addition, the cost of TCP/IP and Ethernet is low. Initially TCP/IP was used extensively in
`military applications and the purely commercial world such as banking, finance, and general business.
`But of great interest has been the strong movement to universal usage by the hitherto disinterested
`industrial and manufacturing spheres of activity who have traditionally used their own proprietary
`protocols and standards. These proprietary standards have been almost entirely replaced by the usage
`of the TCP/IP suite of protocols.
`This is a hands-on book that has been structured to cover the main areas of TCP/IP and Ethernet in
`detail, while going through the practical implementation of TCP/IP in computer and industrial
`applications. Troubleshooting and maintenance of TCP/IP networks and communications systems in
`an office and industrial environment will also be covered.
`
`
`After reading this book we would hope you would be able to:
`
`
`
`
`
`
`
`
`
`• Understand the fundamentals of the TCP/IP suite of protocols
`• Gain a practical understanding of the application of TCP/IP
`• Learn how to construct a robust local area network (LAN)
`• Learn the basic skills in troubleshooting TCP/IP and LANs
`• Apply the TCP/IP suite of protocols to both an office and industrial
`environment
`
`Typical people who will find this book useful include:
`
`• Network technicians
`• Data communications managers
`• Communication specialists
`• IT support managers and personnel
`• Network planners
`• Programmers
`• Design engineers
`• Electrical engineers
`• Instrumentation and control engineers
`• System integrators
`• System analysts
`• Designers
`• IT and MIS managers
`• Network support staff
`• Systems engineers
`
`You should have a modicum of computer knowledge and know how to use the Microsoft Windows
`operating system in order to derive maximum benefit from this book.
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 17 of 324
`
`

`

`xviii Preface
`
`The structure of the book is as follows.
`
`
`Chapter 1: Overview. This chapter gives a brief overview of what is covered in the book with an
`outline of the essentials of communications systems.
`
`Chapter 2: Networking fundamentals. An overview of network communication, types of
`networks, the OSI model, network topologies and media access methods.
`
`Chapter 3: Ethernet networks. A description of the operation and performance of Ethernet
`networks commencing with the basic principles.
`
`Chapter 4: Fast and gigabit Ethernet Systems. A minimum speed of 100 Mbps is becoming
`de rigeur on most Ethernet networks and this chapter examines the design and installation issues for
`fast Ethernet and gigabit Ethernet systems, which go well beyond the traditional 10 Mbps speed of
`operation.
`
`Chapter 5: Introduction to TCP/IP. A brief review of the origins of TCP/IP to lay the
`foundation for the following chapters.
`
`Chapter 6: Internet layer protocols. Perhaps the workhorse of the TCP/IP suite of protocols this
`chapter fleshes out the Internet protocol (both Ipv4 and Ipv6) and also examines the operation of ARP,
`RARP and ICMP.
`
`Chapter 7: Host-to-host (transport) layer protocols. The TCP (transmission control protocol)
`and UDP (user datagram protocol) are both covered in this chapter.
`
`Chapter 8: Application layer protocols. A thorough coverage of the most important application
`layer protocols such as FTP (file transfer protocol), TFTP (trivial file transfer protocol), TELNET,
`Rlogin, network file system, domain name system, WINS, simple network management protocol
`(SNMP), SMTP, POP, BOOTP and DHCP.
`
`Chapter 9: TCP/IP utilities. A coverage focussing on the practical application of the main
`utilities such as Ping, ARP, NETSTAT NBTSTAT, IPCONFIG, WINIPCFG, tracert, ROUTE and the
`hosts file.
`
`Chapter 10: LAN system components. A discussion on the key components in connecting
`networks together such as repeaters, bridges, switches and routers.
`
`Chapter 11: The Internet. A brief discussion on the origins of the Internet and the various
`associated standards organizations.
`
`Chapter 12: Internet access. The typical methods of connecting to the Internet are outlined here
`with a discussion on connecting a single host to the Internet, connecting multiple remote hosts to a
`corporate LAN, and in connecting multiple hosts to the Internet.
`
`Chapter 13: The Internet for communications. Speed/bandwidth issues, the different options
`for E-mail, voice over IP and voice mail will be described in this chapter.
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 18 of 324
`
`

`

`Preface xix
`
`Chapter 14: Security considerations. The security problem and methods of controlling access
`to a network will be examined in this chapter. This is a growing area of importance due to the
`proliferation attacks on computer networks by external parties.
`
`Chapter 15: Process automation. The legacy architectures and the factory of the future will be
`examined here together with an outline of the key elements of the modern Ethernet and TCP/IP
`architecture.
`
`
`Chapter 16: Installing and troubleshooting Ethernet systems. The functions of the various
`types of network driver software together with the parameters to set the network card to match up to
`the software for correct operation will be described here.
`
`Chapter 17: Troubleshooting TCP/IP. Maintenance of a TCP/IP network together with three
`typical methods requiring troubleshooting and the use of the utilities such as NETSTAT, Ping, tracert,
`and ripquery.
`
`Chapter 18: Satellites and TCP/IP. An overview of satellites and TCP/IP with satellites.
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 19 of 324
`
`

`

`1
`
`/TZXUJ[IZOUTZU
`
`IUSS[TOIGZOUTY
`
`
`
`
`
`5HPKIZO\KY
`
`When you have completed study of this chapter you should be able to:
`• Understand the main elements of the data communication process
`• Understand the difference between analog and digital transmission
`• Explain how data transfer is affected by attenuation, bandwidth and noise in
`the channel
`• Know the importance of synchronization of digital data systems
`• Describe the basic synchronization concepts used with asynchronous and
`synchronous systems
`• Explain the following types of encoding:
`• Manchester
`• RZ
`• NRZ
`• MLT-3
`• 4B/5B
`• Describe the basic error detection principles.
`
`
`
`*GZGIUSS[TOIGZOUTY
`
`Communications systems exist to transfer information from one location to another. The
`components of the information or message are usually known as data (derived from the
`Latin word for items of information). All data are made up of unique code symbols or
`other entities on which the sender and receiver of the messages have agreed. For example
`binary data is represented by two states ‘0’ and ‘1’. These are referred to as Binary digiTS
`or ‘bits’. These bits are represented inside our computers by the level of the electrical
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 20 of 324
`
`

`

`6XGIZOIGR:)6/6GTJ+ZNKXTKZ4KZ]UXQOTM
`
`signals within storage elements; a high level could represent a ‘1’, and a low-level
`represent a ‘0’. Alternatively, the data may be represented by the presence or absence of
`light in an optical fiber cable.
`
`
`
`:XGTYSOZZKXYXKIKO\KXYGTJIUSS[TOIGZOUTINGTTKRY
`
`
`
`A communications process requires the following components:
`• A source of the information
`• A transmitter to convert the information into data signals compatible with
`the communications channel
`• A communications channel
`• A receiver to convert the data signals back into a form the destination can
`understand
`• The destination of the information
`
`
`This process is shown in Figure 1.1.
`
`
`Communications
`Channel
`
`Receiver
`
`
`
`Figure 1.1
`Communications process
`The transmitter encodes the information into a suitable form to be transmitted over the
`communications channel. The communications channel moves
`this signal as
`electromagnetic energy from the source to one or more destination receivers. The
`channel may convert this energy from one form to another, such as electrical to optical
`signals, whilst maintaining the integrity of the information so the recipient can understand
`the message sent by the transmitter.
`For the communications to be successful the source and destination must use a mutually
`agreed method of conveying the data.
`The main factors to be considered are:
`• The form of signaling and the magnitude(s) of the signals to be used
`• The type of communications link (twisted pair, coaxial, optic fiber, radio etc)
`• The arrangement of signals to form character codes from which the message
`can be constructed
`• The methods of controlling the flow of data
`• The procedures for detecting and correcting errors in the transmission
`
`
`The form of the physical connections is defined by interface standards, some agreed
`coding is applied to the message and the rules controlling the data flow and detection and
`correction of errors are known as the protocol.
`
`
`
`/TZKXLGIKYZGTJGXJY
`An interface standard defines the electrical and mechanical aspects of the interface to
`allow the communications equipment from different manufacturers to operate together.
`A typical example is the EIA/TIA-232-E interface standard. This specifies the
`following three components:
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 21 of 324
`
`

`

`
`
`
`
`/TZXUJ[IZOUTZUIUSS[TOIGZOUTY
`
`• Electrical signal characteristics – defining the allowable voltage levels,
`grounding characteristics etc
`• Mechanical characteristics – defining the connector arrangements and pin
`assignments
`• Functional description of the interchange circuits – defining the function
`of the various data, timing and control signals used at the interface
`
`
`It should be emphasized that the interface standard only defines the electrical and
`mechanical aspects of the interface between devices and does not cover how data is
`transferred between them.
`
`)UJOTM
`A wide variety of codes have been used for communications purposes. Early telegraph
`communications used Morse code with human operators as transmitter and receiver. The
`Baudot code introduced a constant 5-bit code length for use with mechanical telegraph
`transmitters and receivers. The commonly used codes for data communications today are
`the Extended Binary Coded Decimal Interchange Code (EBCIDIC) and the American
`Standards Committee for Information Interchange (ASCII).
`
`6XUZUIURY
`A protocol is essential for defining the common message format and procedures for
`transferring data between all devices on the network. It includes the following important
`features:
`
`• Initialization: Initializes the protocol parameters and commences the data
`transmission
`• Framing and synchronization: Defines the start and end of the frame and
`how the receiver can synchronize to the data stream
`• Flow control: Ensures that the receiver is able to advise the transmitter to
`regulate the data flow and ensure no data is lost.
`• Line control: Used with half-duplex links to reverse the roles of transmitter
`and receiver and begin transmission in the other direction.
`• Error control: Provides techniques to check the accuracy of the received
`data to identify transmission errors. These include Block Redundancy checks
`and cyclic redundancy checks
`• Time out control: Procedures for transmitters to retry or abort transmission
`when acknowledgments are not received within agreed time limits
`
`
`
`9USKIUSSUTR_[YKJIUSS[TOIGZOUTYVXUZUIURY
`
`• Xmodem or Kermit for asynchronous file transmission
`• Binary synchronous protocol (BSC), synchronous data link control (SDLC)
`or high level data link control (HDLC) for synchronous transmissions
`• Industrial protocols such as manufacturing automation protocol (MAP),
`technical office protocol (TOP), Modbus, Data Highway Plus, HART,
`Profibus, Foundation Fieldbus, etc
`
`
`
`IPR2022-00833
`CommScope, Inc. Exhibit 1005
`Page 22 of 324
`
`

`

`6XGIZOIGR:)6/6GTJ+ZNKXTKZ4KZ]UXQOTM
`
`
`
`:_VKYULIUSS[TOIGZOUTINGTTKRY
`
`
`
`'TGRUMIUSS[TOIGZOUTYINGTTKRY
`that are changing
`An analog communications channel conveys analog signals
`continuously in both frequency and amplitude. These signals are commonly used for
`audio and video communication as illustrated in Figure 1.2 and Figure 1.3.
`
`Wavelength
`
`+
`
`Varying
`Amplitude
`
`0
`
`Velocity of
`signal movement
`though channel

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket