throbber
Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-01109, EX. 2017
`1 of 7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-01109, EX. 2017
`2 of 7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-01109, EX. 2017
`3 of 7
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`Switch: A device that filters and forwards packets between LAN segments. Switches operate at the
`
`datalink layer (layer 2) and sometimes the network layer(layer 3) of the OSI Reference Model.
`
`Router: A router is a device that forwards data packets along networks. A router is connectedto at least
`
`two networks andis located at gateways, the places where two or more networks connect.
`
`Recommended Reading: The Difference Between Hubs, Switches and Routers
`
`Gateway: A node on a networkthat serves as an entrance to another network.
`
`Bridge: A device that connects two local-area networks (LANs), or two segments of the same LAN that
`use the sameprotocol
`
`Channel Service Unit/Digital Service Unit (CSU/DSU): The CSU is a device that connects a terminal to
`a digital line. Typically, the two devices are packaged asa single unit.
`
`Terminal Adapter (ISDN Adapter): A device that connects a computerto an external digital
`
`communicationsline, such as an ISDN line. A terminal adapteris a bit like a modem but only needsto
`pass along digital signals.
`
`Access Point: A hardware device or a computer's software that acts as a communication hub for users
`of a wireless device to connect to a wired LAN.
`
`Modem (modulator-demodulator): A modem is a device or program that enables a computerto
`
`transmit data over, for example, telephoneorcablelines.
`
`Firewall: A system designed to prevent unauthorized access to or from a private network. Firewalls can
`be implemented in both hardware and software, or a combination of both.
`
`Recommended Reading: The Differences and Features of Hardware and Software Firewalls
`
`MAC Address: A MAC (Media Access Control) address, sometimes referred to as a hardware address or
`
`physical address, is an ID code that's assigned to a network adapter or any device with built-in
`
`networking capability.
`
`NETWORK MODELS
`
`To simplify networks, everything is separated in layers and each layer handles specific tasks and is
`
`independentofall other layers. Control is passed from onelayer to the next, starting at the top layer in one
`station, and proceeding to the bottom layer, over the channelto the next station and back up the hierarchy.
`Network models are used to define a set of networklayers and how they interact. The two most widely
`
`recognized network models include the TCP/IP Model and the OSI Network Model.
`
`THE 7 LAYERS OF THE OSI MODEL
`
`The Open System Interconnect (OSI) is an open standard for all communication systems.The OSI model
`,
`;
`-
`, UAB,et al. v. Bright Data Ltd.
`defines a networking framework to implementprotocols in sevenlayers.
`IPR2022-01109. EX. 2017
`4of7
`The Data Company Technologies Inc. v. Bright Data Ltd.
`IPR2022-00135, EX. 2017
`4of7
`The Data Company Technologies Inc. v. Bright Data Ltd.
`IPR2022-00138, EX. 2017
`A of7
`
`.
`Physical Layer
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`

`

`6/14/22, 11:08 AM
`
`Network Fundamentals Study Guide | Webopedia
`
`This layer conveys the bit stream — electrical impulse,light or radio signal — through the network at the
`
`electrical and mechanical level. It provides the hardware meansof sending and receiving data ona
`carrier, including defining cables, cards and physical aspects. Examples include Ethernet, FDDI, B8ZS,
`V.35, V.24, RI45S.
`
`Data Link Layer
`
`Atthis layer, data packets are encoded and decoded intobits. It furnishes transmission protocol
`knowledge and managementand handleserrors in the physical layer, flow control and frame
`
`synchronization. The datalink layer is divided into two sub layers: The Media Access Control (MAC) layer
`and the Logical Link Control (LLC) layer. Examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE
`802.3/802.2, HDLC, FrameRelay.
`
`Network Layer
`
`This layer provides switching and routing technologies, creating logical paths, knownasvirtual circuits,
`
`for transmitting data from node to node. Routing and forwarding are functions ofthis layer, as well as
`
`addressing, internetworking, error handling, congestion control and packet sequencing. Examples
`include AppleTalk DDP,IP, IPX.
`
`Transport Layer
`
`This layer provides transparenttransfer of data between end systems,or hosts, and is responsible for
`
`end-to-end error recovery and flow control. It ensures complete data transfer.Examples include SPX,
`TCP, UDP.
`
`Session Layer
`
`This layer establishes, manages and terminates connections between applications. The session layer
`sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
`
`applications at each end. Examples include NFS, NetBios names, RPC, SQL.
`
`Presentation Layer
`
`This layer provides independencefrom differences in data representation (e.g., encryption) by
`
`translating from application to network format, and vice versa. This layer formats and encrypts data to
`
`be sent across a network, providing freedom from compatibility problems. Examples include
`encryption, ASCII, EBCDIC,TIFF, GIF, PICT, JPEG, MPEG, MIDI.
`
`Application Layer
`
`This layer supports application and end-user processes. Communication partners are identified, quality
`
`of service is identified, user authentication and privacy are considered, and any constraints on data
`
`syntax are identified. Everything at this layer is application-specific. This layer provides application
`servicesforfile transfers, e-mail, and other networksoftware services. Examples include WWW
`browsers, NFS, SNMP,Telnet, HTTP, FTP
`
`Recommended Reading: View Webopedia’s The 7 Layers of the OS! Mode! study guide for in-depth
`descriptions and diagrams.
`Code200, UAB,et al. v. Bright Data Ltd.
`IPR2022-01109, EX. 2017
`5 of 7
`The Data Company Technologies Inc. v. Bright Data Ltd.
`IPR2022-00135, EX. 2017
`5 of 7
`The Data Company Technologies Inc. v. Bright Data Ltd.
`IPR2022-00138, re
`
`https:/Awww.webopedia.com/reference/network-fundamentals-study-guide/#topologies
`
`T Hf & TC Ppfi Pp M oO D E L
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-01109, EX. 2017
`6 of 7
`
`

`

`Code200, UAB, et al. v. Bright Data Ltd.
`IPR2022-01109, EX. 2017
`7 of 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket