throbber
6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`HOME > NETWORKING
`
`© Vangie Beal
`February 17, 2015
`
`Networking fundamentals teaches the building blocks of modern network design. Learn different types of
`
`networks, concepts, architecture and design.
`
`
`Networking fundamentals teaches computer science students the building blocks of
`modern network design. Typically you will learn about the manydifferent types of
` vy
`Sy) networks, networking concepts, network architecture, network communications and
`AAT3 network design.
`
`NETWORK FUNDAMENTALS CHECKLIST
`
`Jump to a topic:
`
`Getting Started: Key Terms to Know
`
`Defining a Network
`
`Different Types of Networks
`
`The Importance of Network Standards
`
`Network Components, Devices and Functions
`Network Models
`
`The 7 Layers of the OSI Model
`
`The TCP/IP model
`
`Network Topologies
`
`Tweet This Study Guide!
`
`Webopedia study guides offer quick facts to help students prepare for computer science courses. Did you
`
`find this guide useful? Click to share it with friends and classmates on Twitter.
`Oo
`
`GETTING STARTED: KEY TERMS TO KNOW
`
`The following definitions will help you to better understand computer networks:
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`Major Data, UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`IPR2022-00915, EX. 2010
`1 of 7
`1 of 7
`
`1/7
`
`

`

`Network Fundamentals Study Guide | Webopedia
`
`6/14/22, 11:08 AM
`e« network
`
`e« networking
`
`e stub network
`
`e star network
`
`e
`
`ring network
`
`e bus network
`
`* network map
`
`DEFINING A NETWORK
`
`A network is a group of two or more computer systems or other devices that are linked together to
`
`exchange data. Networks share resources, exchange files and electronic communications. For example,
`
`networked computers can sharefiles or multiple computers on the network can share the same printer.
`
`DIFFERENT TYPES OF NETWORKS
`
`There are many types of computer networks. Common types of networks include the following:
`
`e Local-area network (LAN): The computers are geographically close together (that is, in the same
`
`building).
`
`e Wide-area network (WAN): The computersare farther apart and are connected by telephone lines or
`radio waves.
`
`e« Metropolitan-area network (MAN): A data network designed for a townor city.
`
`e Home-area network (HAN): A network contained within a user’s home that connects a person's digital
`devices.
`
`e Virtual private network (VPN): A network that is constructed by using public wires usually the Internet
`
`to connectto a private network, such as a company’s internal network.
`
`e Storage area network (SAN): A high-speed network of storage devices that also connects those storage
`devices with servers.
`
`RecommendedReading: Webopedia’s Virtual Private Network (VPN) Study Guide.
`
`THE IMPORTANCE OF NETWORK STANDARDS
`
`Network standards are important to ensure that hardware and software can work together. Without
`
`standards you could noteasily develop a network to share information. Networking standards can be
`
`categorized in one of two ways: formal and de facto (informal).
`
`Formal standards are developed by industry organizations or governments. Formal standards exist for
`
`network layer software,data link layer, hardware and so on. Formal standardization is a lengthy process of
`
`developing the specification, identifying choices and industry acceptance.
`
`There are a several leading organizations for standardization including The International Organization for
`
`Standardization (ISO) and The American National StandardsInstitute (ANSI). The most known standards
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`Major Data, UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`IPR2022-00915, EX. 2010
`2 of 7
`2 of 7
`
`2/7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`organization in the world is the Internet Engineering Task Force (IETF). IETF sets the standards that govern
`
`how much of the Internet operates.
`
`The second category of networking standardsis de facto standards. These standards typically emerge in
`
`the marketplace and are supported by technology vendors but have no official backing. For example,
`
`Microsoft Windowsis a de facto standard, butis not formally recognized by any standards organization. It is
`
`simply widely recognized and accepted.
`
`NETWORK COMPONENTS, DEVICES AND
`FUNCTIONS
`
`Networks share common devices and functions, such as servers, transmission media (the cabling used to
`
`connect the network) clients, shared data (e.g. files and email), network cards, printers and other peripheral
`devices.
`
`The following is a brief introduction to common network components and devices. You can click anylink
`
`below to read the full Webopedia definition:
`
`Server: A computer or device on a network that manages network resources. Servers are often
`
`dedicated, meaning that they perform no other tasks besides their server tasks.
`
`Client: A client is an application that runs on a personal computer or workstation and relies on a server
`
`to perform some operations.
`
`Devices: Computer devices, such as a CD-ROM drive or printer, that is not part of the essential
`
`computer. Examples of devices include disk drives, printers, and modems.
`
`Transmission Media: the type of physical system used to carry a communication signal from one
`system to another. Examples of transmission media include twisted-pair cable, coaxial cable, and fiber
`
`optic cable.
`
`Network Operating System (NOS): A network operating system includes special functions for
`
`connecting computers and devices into a local-area network (LAN). The term network operating
`
`system is generally reserved for software that enhancesa basic operating system by adding
`
`networking features.
`
`Operating System: Operating systems provide a software platform on top of which other programs,
`
`called application programs, can run. Operating systems perform basic tasks, such as recognizing
`
`input from the keyboard, sending output to the display screen, keeping track of files and directories on
`
`the disk, and controlling peripheral devices such as disk drives and printers.
`
`NetworkInterface Card (NIC): An expansion board you insert into a computer so the computer can be
`
`connected to a network. Most NICs are designed for a particular type of network, protocol, and media,
`
`although some can serve multiple networks.
`
`Hub: Acommon connection point for devices in a network. A hub contains multiple ports. When a
`packetarrives at one port,it is copied to the other ports so that all segments of the LAN can seeall
`
`packets.
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`Major Data, UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`IPR2022-00915, EX. 2010
`3 of 7
`3 of 7
`
`3/7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`Switch:A device thatfilters and forwards packets between LAN segments. Switches operate at the
`
`datalink layer (layer 2) and sometimes the network layer(layer 3) of the OSI Reference Model.
`
`Router: A router is a device that forwards data packets along networks. A router is connectedto at least
`
`two networks and is located at gateways, the places where two or more networks connect.
`
`RecommendedReading: The Difference Between Hubs, Switches and Routers
`
`Gateway: A node on a network that serves as an entrance to another network.
`
`Bridge:A device that connects twolocal-area networks (LANs), or two segments of the same LAN that
`
`use the same protocol
`
`ChannelService Unit/Digital Service Unit (CSU/DSU): The CSU is a device that connects a terminal to
`a digital line. Typically, the two devices are packaged as a single unit.
`
`Terminal Adapter(ISDN Adapter): A device that connects a computer to an external digital
`
`communicationsline, such as an ISDN line. A terminal adapter is a bit like a modem but only needs to
`pass along digital signals.
`
`Access Point: A hardware device or a computer's software that acts as a communication hub for users
`of a wireless device to connect to a wired LAN.
`
`Modem (modulator-demodulator): A modemis a device or program that enables a computer to
`
`transmit data over, for example, telephone or cable lines.
`
`Firewall: A system designed to prevent unauthorized accessto or from a private network. Firewalls can
`be implemented in both hardware and software, or a combination of both.
`
`RecommendedReading: The Differences and Features of Hardware and Software Firewalls
`
`MAC Address: A MAC (Media Access Control) address, sometimes referred to as a hardware address or
`
`physical address, is an ID codethat's assigned to a network adapteror any device with built-in
`
`networking capability.
`
`NETWORK MODELS
`
`To simplify networks, everything is separated in layers and each layer handles specific tasks and is
`
`independentofall other layers. Control is passed from one layer to the next, starting at the top layer in one
`station, and proceeding to the bottom layer, over the channel to the next station and back up thehierarchy.
`
`Network models are usedto define a set of network layers and how theyinteract. The two most widely
`
`recognized network models include the TCP/IP Model and the OSI Network Model.
`
`THE 7 LAYERS OF THE OSI MODEL
`
`The Open System Interconnect (OSI) is an open standard for all communication systems.The OSI model
`
`defines a networking framework to implement protocols in sevenlayers.
`
`Physical Layer
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`4of7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`This layer conveys the bit stream — electrical impulse,light or radio signal — through the networkat the
`
`electrical and mechanical level. It provides the hardware meansof sending andreceiving data ona
`carrier, including defining cables, cards and physical aspects. Examples include Ethernet, FDDI, B8ZS,
`V.35, V.24, RI45.
`
`Data Link Layer
`
`At this layer, data packets are encoded and decodedintobits.It furnishes transmission protocol
`
`knowledge and managementand handleserrors in the physical layer, flow control and frame
`
`synchronization. The datalink layer is divided into two sub layers: The Media Access Control (MAC) layer
`and the Logical Link Control (LLC) layer. Examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE
`
`802.3/802.2, HDLC, FrameRelay.
`
`Network Layer
`
`This layer provides switching and routing technologies, creating logical paths, knownasvirtual circuits,
`
`for transmitting data from node to node. Routing and forwarding are functionsof this layer, as well as
`
`addressing, internetworking, error handling, congestion control and packet sequencing. Examples
`
`include AppleTalk DDP,IP, IPX.
`
`Transport Layer
`
`This layer provides transparenttransfer of data between end systems,or hosts, and is responsible for
`
`end-to-end error recovery and flow control. It ensures complete data transfer.Examples include SPX,
`TCP, UDP.
`
`Session Layer
`
`This layer establishes, manages and terminates connections between applications. The session layer
`
`sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
`
`applications at each end. Examples include NFS, NetBios names, RPC, SQL.
`
`Presentation Layer
`
`This layer provides independencefrom differences in data representation (e.g., encryption) by
`
`translating from application to network format, andvice versa. This layer formats and encrypts data to
`
`be sent across a network, providing freedom from compatibility problems. Examples include
`encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
`
`Application Layer
`
`This layer supports application and end-user processes. Communication partnersare identified, quality
`
`of serviceis identified, user authentication and privacy are considered, and any constraints on data
`
`syntax are identified. Everything at this layer is application-specific. This layer provides application
`
`servicesfor file transfers, e-mail, and other network softwareservices. Examples include WWW
`browsers, NFS, SNMP,Telnet, HTTP, FTP
`
`Recommended Reading: View Webopedia’s The 7 Layers of the OS! Mode! study guidefor in-depth
`descriptions and diagrams.
`
`THE TCP/IP MODEL
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`5 of 7
`
`5/7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`The TCP/IP network model is a four-layer reference model. All protocols that belong to the TCP/IP protocol
`
`suite are located in the top three layers of this model.
`
`Application
`
`Defines TCP/IP application protocols and how host programs interface with transport layer services to
`use the network. Protocol examples include HTTP, Telnet, FTP, TFTP, SNMP, DNS, SMTP.
`
`Transport
`
`Provides communication session management between host computers. Defines the level of service
`
`and status of the connection used when transporting data. Protocol examples include TCP, UDP, RTP.
`
`Internet
`
`Packagesdata into IP datagrams, which contain source and destination address information thatis
`
`used to forward the datagrams between hosts and across networks. Performs routing of IP datagrams.
`
`Protocol examples include IP, ICMP, ARP, RARP.
`
`Network interface
`
`Specifies details of how data is physically sent through the network, including howbits are electrically
`
`signaled by hardware devices that interface directly with a network medium, such as coaxial cable,
`optical fiber, or twisted-pair copper wire. Protocol examples include Ethernet, Token Ring, FDDI, X.25,
`
`Frame Relay, RS-232, v.35.
`
`Eachlayer of the TCP/IP model corresponds to one or morelayers of the seven-layer Open Systems
`
`Interconnection (OSI) reference model.
`
`NETWORK TOPOLOGIES
`
`Network topology refers to the shape or the arrangementof the different elements in a computer network
`
`(i.e. links and nodes). Network Topology defines how different nodes in a network are connected to each
`
`other and how they communicate is determined by the network's topology.
`
`Topologies are either physical or logical. There are four principal topologies used in LANs.
`
`Bus Topology
`
`All devices are connected to a central cable, called the bus or backbone. Bus networksarerelatively
`inexpensive and easy to install for small networks.
`
`Ring Topology
`
`All devices are connected to one another in the shapeof a closed loop, so that each deviceis
`
`connecteddirectly to two other devices, one on either side ofit.
`
`Star Topology
`
`All devices are connected to a central hub. Star networksare relatively easy to install and manage, but
`
`bottlenecks can occur becauseall data must pass through the hub.
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`Major Data, UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`IPR2022-00915, EX. 2010
`6 of 7
`6 of 7
`
`6/7
`
`

`

`6/14/22, 11:08 AM
`Tree Topology
`
`Network Fundamentals Study Guide | Webopedia
`
`A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-
`
`configured workstations connected to a linear bus backbone cable.
`
`These topologies can also be mixed. For example, a bus-star network consists of a high-bandwidth bus,
`
`called the backbone, which connects a collections of slower-bandwidth star segments.
`
`RecommendedReading: View Webopedia’s What are Network Topologies study guide for in-depth
`
`descriptions and diagrams.
`
`UPDATED:This page was updated April 2021 by Web Webster.
`
`https://;www.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`Major Data, UABv. Bright Data Ltd.
`Major Data, UAB v. Bright Data Ltd.
`IPR2022-00915, EX. 2010
`IPR2022-00915, EX. 2010
`7of7
`7 of 7
`
`7/7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket