throbber
Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`1 of 7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`2 of 7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`3 of 7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`Switch:A device thatfilters and forwards packets between LAN segments. Switches operate at the
`
`datalink layer (layer 2) and sometimes the network layer(layer 3) of the OSI Reference Model.
`
`Router: A router is a device that forwards data packets along networks. A router is connectedto at least
`
`two networks and is located at gateways, the places where two or more networks connect.
`
`RecommendedReading: The Difference Between Hubs, Switches and Routers
`
`Gateway: A node on a network that serves as an entrance to another network.
`
`Bridge:A device that connects twolocal-area networks (LANs), or two segments of the same LAN that
`
`use the same protocol
`
`ChannelService Unit/Digital Service Unit (CSU/DSU): The CSU is a device that connects a terminal to
`a digital line. Typically, the two devices are packaged as a single unit.
`
`Terminal Adapter(ISDN Adapter): A device that connects a computer to an external digital
`
`communicationsline, such as an ISDN line. A terminal adapter is a bit like a modem but only needs to
`pass along digital signals.
`
`Access Point: A hardware device or a computer's software that acts as a communication hub for users
`of a wireless device to connect to a wired LAN.
`
`Modem (modulator-demodulator): A modemis a device or program that enables a computer to
`
`transmit data over, for example, telephone or cable lines.
`
`Firewall: A system designed to prevent unauthorized accessto or from a private network. Firewalls can
`be implemented in both hardware and software, or a combination of both.
`
`RecommendedReading: The Differences and Features of Hardware and Software Firewalls
`
`MAC Address: A MAC (Media Access Control) address, sometimes referred to as a hardware address or
`
`physical address, is an ID codethat's assigned to a network adapteror any device with built-in
`
`networking capability.
`
`NETWORK MODELS
`
`To simplify networks, everything is separated in layers and each layer handles specific tasks and is
`
`independentofall other layers. Control is passed from one layer to the next, starting at the top layer in one
`station, and proceeding to the bottom layer, over the channel to the next station and back up thehierarchy.
`
`Network models are usedto define a set of network layers and how theyinteract. The two most widely
`
`recognized network models include the TCP/IP Model and the OSI Network Model.
`
`THE 7 LAYERS OF THE OSI MODEL
`
`The Open System Interconnect (OSI) is an open standard for all communication systems.The OSI model
`
`defines a networking framework to implement protocols in sevenlayers.
`
`Physical Layer
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#Htopologies
`
`Code200, UAB,etal. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`4of7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`This layer conveys the bit stream — electrical impulse,light or radio signal — through the networkat the
`
`electrical and mechanical level. It provides the hardware meansof sending andreceiving data ona
`carrier, including defining cables, cards and physical aspects. Examples include Ethernet, FDDI, B8ZS,
`V.35, V.24, RI45.
`
`Data Link Layer
`
`At this layer, data packets are encoded and decodedintobits.It furnishes transmission protocol
`
`knowledge and managementand handleserrors in the physical layer, flow control and frame
`
`synchronization. The datalink layer is divided into two sub layers: The Media Access Control (MAC) layer
`and the Logical Link Control (LLC) layer. Examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE
`
`802.3/802.2, HDLC, FrameRelay.
`
`Network Layer
`
`This layer provides switching and routing technologies, creating logical paths, knownasvirtual circuits,
`
`for transmitting data from node to node. Routing and forwarding are functionsof this layer, as well as
`
`addressing, internetworking, error handling, congestion control and packet sequencing. Examples
`
`include AppleTalk DDP,IP, IPX.
`
`Transport Layer
`
`This layer provides transparenttransfer of data between end systems,or hosts, and is responsible for
`
`end-to-end error recovery and flow control. It ensures complete data transfer.Examples include SPX,
`TCP, UDP.
`
`Session Layer
`
`This layer establishes, manages and terminates connections between applications. The session layer
`
`sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
`
`applications at each end. Examples include NFS, NetBios names, RPC, SQL.
`
`Presentation Layer
`
`This layer provides independencefrom differences in data representation (e.g., encryption) by
`
`translating from application to network format, andvice versa. This layer formats and encrypts data to
`
`be sent across a network, providing freedom from compatibility problems. Examples include
`encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
`
`Application Layer
`
`This layer supports application and end-user processes. Communication partnersare identified, quality
`
`of serviceis identified, user authentication and privacy are considered, and any constraints on data
`
`syntax are identified. Everything at this layer is application-specific. This layer provides application
`
`servicesfor file transfers, e-mail, and other network softwareservices. Examples include WWW
`browsers, NFS, SNMP,Telnet, HTTP, FTP
`
`Recommended Reading: View Webopedia’s The 7 Layers of the OS! Mode! study guidefor in-depth
`descriptions and diagrams.
`
`THE TCP/IP MODEL
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#Htopologies
`
`Code200, UAB,etal. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`5 of 7
`
`5/7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`6 of 7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-00861, EX. 2039
`7 of 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket