throbber
FOURTH EDITION
`
`“Computer Networks=
`
`jransport Layer
`ee
`
`A
`x
`iy MPMIbattn ‘
`
`ANDREW S. TANENBAUM coe Lay
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`1 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`1 of 8
`
`

`

`Computer Networks
`Fourth Edition
`
`ISBN
`
`BN
`
`QO-13
`O-13-Obb102-4
`
`|
`
`9"7901 30"661028
`
`|
`
`
`
`
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`2 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`2 of 8
`
`

`

`Computer Networks
`Fourth Edition
`
`Andrew S. Tanenbaum
`
`Vrije Universiteit
`Amsterdam, The Netherlands
`
`el
`PTR—
`
`Prentice Hall PTR
`UpperSaddle River, NJ 07458
`www.phptr.com
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`3 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`3 of 8
`
`

`

`
`
`Library of Congress Cataloging-in-Publication Data
`
`Tanenbaum, Andrew S.
`Computer networks / Andrew S. Tanenbaum.--4th ed.
`p.cm.
`Includes bibliographical references.
`ISBN 0-13-066102-3
`1. Computer networks.
`TK5105.5 .T36 2002
`004.6--dce21
`
`I. Title.
`
`2002029263
`
`Editorial/production supervision: Patti Guerrieri
`Coverdesign director: Jerry Votta
`Coverdesigner: Anthony Gemmellaro
`Coverdesign: Andrew S. Tanenbaum
`Art director: Gail Cocker-Bogusz
`Interior Design: Andrew S. Tanenbaum
`Interior graphics: Hadel Studio
`Typesetting: Andrew S. Tanenbaum
`Manufacturing buyer: Maura Zaldivar
`Executive editor: Mary Franz
`Editorial assistant: Noreen Regina
`Marketing manager: Dan DePasquale
`
`© 2003, 1996 Pearson Education, Inc.
`atl
`Publishing as Prentice Hall PTR
`eyyeme
`Zemeee Upper Saddle River, New Jersey 07458
`
`Prentice Hall books are widely used by corporations and governmentagenciesfortraining,
`marketing, and resale.
`
`For information regarding corporate and governmentbulk discounts please contact:
`Corporate and GovernmentSales (800) 382-3419 or corpsales @pearsontechgroup.com
`
`All products or services mentionedin this book are the trademarks or service marksoftheir
`respective companies or organizations.
`
`All rights reserved. No part of this book may be reproduced,in any form or by any means,
`without permission in writing from the publisher.
`
`Printed in the United States of America
`
`1098765432
`
`ISBN 0-13-066102-3
`
`Pearson Education LTD.
`Pearson Education Australia PTY, Limited
`Pearson Education Singapore, Pte. Ltd.
`Pearson Education North Asia Ltd.
`Pearson Education Canada, Ltd.
`Pearson Educaci6n de Mexico,S.A. de C.V.
`Pearson Education — Japan
`Pearson Education Malaysia, Pte. Ltd.
`
`
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`40f8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`4 of 8
`
`

`

`SEC. 1.1
`
`USES OF COMPUTER NETWORKS
`
`a
`
`Although this book primarily focuses on networks, many of the topics are also
`important in distributed systems. For more information aboutdistributed systems,
`see (Tanenbaum and Van Steen, 2002).
`
`1.1 USES OF COMPUTER NETWORKS
`
`Before we start to examine the technical issues in detail, it is worth devoting
`some time to pointing out why people are interested in computer networks and
`what they can be used for. After all, if nobody were interested in computer net-
`works, few of them would be built. We will start with traditional uses at com-
`panies and for individuals and then move on to recent developments regarding
`mobile users and home networking.
`
`1.1.1 Business Applications
`
`Many companies have a substantial number of computers. For example, a
`company may have separate computers to monitor production, keep track of
`inventories, and do the payroll.
`Initially, each of these computers may have
`worked in isolation from the others, but at some point, management may have
`decided to connect them to be able to extract and correlate information about the
`entire company.
`Put in slightly more general form, the issue here is resource sharing, and the
`goal is to make all programs, equipment, and especially data available to anyone
`on the network without regard to the physical location of the resource and the
`user. An obvious and widespread example is having a group of office workers
`share a common printer. None of the individuals really needs a private printer,
`and a high-volume networkedprinter is often cheaper, faster, and easier to main-
`tain than a large collection of individual printers.
`However, probably even more important than sharing physical resources such
`as printers, scanners, and CD burners,
`is sharing information. Every large and
`medium-sized company and many small companiesare vitally dependent on com-
`puterized information. Most companies have customer
`records,
`inventories,
`accounts receivable, financial statements,
`tax information, and much more on-
`line. If all of its computers went down, a bank could not last more than five min-
`utes. A modern manufacturing plant, with a computer-controlled assembly line,
`would not last even that long. Even a small travel agency or three-person law
`firm is now highly dependent on computer networks for allowing employees to
`access relevant information and documents instantly.
`For smaller companies, all the computers are likely to be in a single office or
`perhaps a single building, but for larger ones, the computers and employees may
`be scattered over dozens of offices and plants in many countries. Nevertheless, a
`sales person in New York might sometimes need access to a product inventory
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`5 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`5 of 8
`
`

`

`wa
`
`4
`
`INTRODUCTION
`
`CHAP.
`
`1
`
`In other words, the mere fact that a user happens to be
`database in Singapore.
`15,000 km away from his data should not prevent him from using the data as
`though they were local. This goal may be summarized by saying that it is an
`attempt to end the “tyranny of geography.”
`In the simplest of terms, one can imagine a company’s information system as
`consisting of one or more databases and some number of employees who need to
`access them remotely.
`In this model, the data are stored on powerful computers
`called servers. Often these are centrally housed and maintained by a system
`administrator.
`In contrast, the employees have simpler machines, called clients,
`on their desks, with which they access remote data, for example,
`to include in
`spreadsheets they are constructing.
`(Sometimes we will refer to the human user
`of the client machine as the “client,” but it should be clear from the context
`whether we mean the computerorits user.) The client and server machines are
`connected by a network, asillustrated in Fig. 1-1. Note that we have shown the
`network as a simple oval, without any detail. We will use this form when we
`mean a network in the abstract sense. When more detail is required, it will be
`provided.
`
`
`
`
`
`
` Hing
`
`Figure 1-1. A network with twoclients and one server.
`
`It is widely used
`This whole arrangementis called the client-server model.
`and forms the basis of much network usage.
`It is applicable when the client and
`server are both in the same building (e.g., belong to the same company), but also
`whenthey are far apart. For example, when a person at home accesses a page on
`the World Wide Web, the same model is employed, with the remote Webserver
`being the server and the user’s personal computerbeing the client. Under most
`conditions, one server can handle a large numberofclients.
`If we look at the client-server model in detail, we see that two processes are
`involved, one on the client machine and one on the server machine. Communica-
`tion takes the formofthe client process sending a message overthe network to the
`server process. The client process then waits for a reply message. Whenthe serv-
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`6 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`6 of 8
`
`

`

`
`
`SEC. 1.1
`
`USES OF COMPUTER NETWORKS
`
`5
`
`er process gets the request, it performs the requested work or looks up the re-
`quested data and sends back a reply. These messages are shown in Fig. 1-2.
`Client machine
`Server machine
`
`Request
`
`__———~—_
`
`
`
`
`+—€ NetworkSS
`
`
`Client process
`
`Server process
`
`Reply
`
`Figure 1-2. The client-server model involves requests and replies.
`A second goalof setting up a computer network has to do with people rather
`than information or even computers. A computer network can provide a powerful
`communication medium among employees. Virtually every company that has
`two or more computers now hase-mail (electronic mail), which employees gen-
`erally use for a great deal of daily communication.
`In fact, a common gripe
`around the water cooler is how much e-mail everyone has to deal with, muchofit
`meaningless because bosses have discovered that they can send the same (often
`content-free) messageto all their subordinates at the push of a button.
`But e-mail is not the only form of improved communication made possible by
`computer networks. With a network, it is easy for two or more people who work
`far apart to write a report together. When one worker makes a change to an on-
`line document,
`the others can see the change immediately,
`instead of waiting
`several days for a letter. Such a speedup makes cooperation among far-flung
`groups of people easy whereit previously had been impossible.
`Yet another form of computer-assisted communication is videoconferencing.
`Using this technology, employees at distant locations can hold a meeting, seeing
`and hearing each other and even writing on a shared virtual blackboard. Video-
`conferencing is a powerful
`tool for eliminating the cost and time previously
`devoted to travel.
`It is sometimes said that communication and transportation are
`having a race, and whicheverwins will makethe otherobsolete.
`A third goal for increasingly many companiesis doing business electronically
`with other companies, especially suppliers and customers. For example, manufac-
`turers of automobiles, aircraft, and computers, among others, buy subsystems
`from a variety of suppliers and then assemble the parts. Using computer net-
`works, manufacturers can place orders electronically as needed. Being able to
`place orders in real time (i.e., as needed) reduces the need for large inventories
`and enhancesefficiency.
`A fourth goal that is starting to become more importantis doing business with
`consumers over the Internet. Airlines, bookstores, and music vendors have
`discovered that many customers like the convenience of shopping from home.
`Consequently, many companies provide catalogs of their goods and services on-
`line and take orders on-line. This sector is expected to grow quickly in the future.
`It is called e-commerce(electronic commerce).
`
`—————SSS
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`7 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`7 of 8
`
`

`

`Wii alli.AAU
`
`
`
`alle
`
`FOURTH EDITION
`
`
`Computer Networks
`
`ANDREW S. TANENBAUM
`
`The world’s leading introduction to networking—fully updated for tomorrow’s key technologies
`Computer Networks, fourth edition,is the ideal introduction to today’s networks—and tomorrow’s. This
`classic bestseller has been thoroughly updatedto reflect the newest and most important networking technologies
`with a special emphasis on wireless networking, including 802.11, Bluetooth™, broadband wireless, ad hoc
`networks,i-mode, and WAP. But fixed networks havenot been ignoredeither, with coverage of ADSL, Internet
`over cable, gigabit Ethernet, peer-to-peer networks, NAT, and MPLS. Andthereis lots of new material on
`applications, including over 60 pages on the Web,plus Internet radio, Voice over IP, and video on demand.
`Finally, the coverage of network security has been revised and expandedtofill an entire chapter.
`Author, educator, and researcher Andrew S. Tanenbaum,winner of the ACM KarlV. Karlstrom Outstanding
`Educator Award, carefully explains how networks work on the inside, from underlying hardwareat the physical
`layer up through the top-level application layer. Tanenbaum coversall this and more:
`
`® Physical layer (e.g., copper,fiber, wireless, satellites, and Internet over cable)
`& Datalink layer (e.g., protocol principles, protocolverification, HDLC, and PPP)
`= MAC sublayer(e.g., gigabit Ethernet, 802.11, broadbandwireless, and switching)
`= Network layer (e.g., routing algorithms, congestion control, QoS, IPv4, and IPv6)
`= Transportlayer (e.g., socket programming, UDP, TCP, RTP, and network performance)
`® Application layer (e.g., e-mail, the Web, PHP, wireless Web, MP3, and streaming audio)
`
`= Network security (e.g., AES, RSA, quantum cryptography, IPsec, and Websecurity)
`
`The book gives detailed descriptions of the principles associatedwith each layer and presents many
`examples drawn from the Internet and wireless networks.
`
`and Scientific Director of ASCI, a ——
`Netherlands. Heis also a Fellow ¢ SSS COMPUTER NETWORKS
`
`About the Author
`von
`ANDREWS. TANENBAUMis Profe aes TONENMEGUM
`co-authoredinclude Structured(
`4TH 3
`PH
`
`Implementation, secondedition;
`SSS
`;
`;
`5
`Principles andParadigms (Pren
`—————rm
`See al
`
`973-B-135-H66 182-9
`
`‘
`
`LI 5 E [«
`=: D
`cl
`Oe ae
`om o f Ry
`
`PRENTICE HALL
`Upper Saddle River, NJ 07458
`
`www.phptr.com
`
`—————
`ees
`464
`ae
`—— =
`
`2"
`
`saaiseléeia23
`
`= s
`c.
`:
`en ]
`
`_
`
`a
`
`Major Data UABv.Bright Data Ltd.
`IPR2022-00915, EX. 2069
`8 of 8
`
`Major Data UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2069
`8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket