throbber
( |i
`
`.
`
`|;
`
`
`
` 4iq| | |
`
`DECLARATION OF SANDY GINOZA FOR IETF
`RFC 793: TRANSMISSION CONTROL PROTOCOL
`
`I, Sandy Ginoza, based on my personal knowledge andinformation, hereby declare as
`
`follows:
`
`‘A.
`
`I am an employee of Association Management Solutions, LLC (AMS), which
`
`acts under contract to the Internet Society (ISOC)as the operator of the RFC Production
`Center. The RFC Production Center is part of the "RFC Editor" function, which prepares
`
`documents for publication and places files in an online repository for the authoritative
`
`Request for Comments (RFC) series of documents (RFC Series), and preserves records
`
`relating to these documents. The RFC Series includes, among other things, the series of
`
`Internet standards developed by the Internet Engineering Task Force (IETF), an organized
`
`activity of ISOC. I hold the position of Director of the RFC Production Center. I began
`
`employment with AMSin this capacity on 6 January 2010.
`
`2.
`
`Among my responsibilities as Director of the RFC Production Center, I act as
`
`the custodian of recordsrelating to the RFC Series, and I am familiar with the record keeping
`
`practices relating to the RFC Series, including the creation and maintenance of such records,
`
`3.
`
`From June 1999 to 5 January 2010, I was an employee of the Information
`
`SciencesInstitute at University of Southern California (ISD). 1 held various position titles with
`
`the RFC Editor project at ISL, ending with Senior Editor.
`
`4.
`
`The RFC Editor function was conducted by ISI under contract to the United
`
`States governmentprior to 1998. In 1998, ISOC,in furtherance of its JETF activity, entered into
`
`the first in a series of contracts with ISI providing for ISI's performance of the RFC Editor
`
`function. Beginning in 2010, certain aspects of the RFC Editor function were assumed by the
`
`Apple Inc.
`Ex. 1010 - Page 1
`
`Apple Inc.
`Ex. 1010 - Page 1
`
`

`

` |
`
`
`
`
`
`RFC Production Center operation of AMS undercontract to ISOC (acting through its IETF
`
`function and, in particular, the IETF Administrative Oversight Committee). The business records
`
`of the RFC Editor function as it was conducted by ISI are currently housed on the computer
`
`systems of AMS,as contractor to ISOC.
`
`5.
`
`I makethis declaration based on my personal knowledge and information
`
`contained in the business records of the RFC Editor as they are currently housed at AMS,or
`
`confirmation with other responsible RFC Editor personnel with such knowledge.
`
`6.
`
`Prior to 1998, the RFC Editor's regular practice was to publish RFCs, making
`
`them available from a repository via FTP. When a new RFC waspublished, an announcement
`
`of its publication, with information on how to access the RFC, would be typically sent out
`
`within 24 hours of the publication.
`
`7,
`
`Any REC published on the RFC Editor website or via FTP was reasonably
`
`accessible to the public and was disseminated or otherwise available to the extent that persons
`
`interested and ordinarily skilled in the subject matter or art exercising reasonable diligence could
`
`have located it. In particular, the RFCs were indexed and placed in a public repository.
`
`8.
`
`The RFCsare kept in an online repository in the course of the RFC Editor's
`
`regularly conducted activity and ordinary course of business. The records are made pursuant to
`
`established procedures and are relied upon by the RFC Editorin the performance of its functions.
`
`9,
`
`10.
`
`It is the regular practice of the RFC Editor to make and keep the RFC records.
`
`Based on the business records of the RFC Editor and the RFC Editor’s course of
`
`conduct in publishing RFCs, I have determined that the publication date of RFC 793 was nolater
`
`than October 1992, at which time it was reasonably accessible to the public either on the RFC
`
`Apple Inc.
`Ex. 1010 - Page 2
`
`Apple Inc.
`Ex. 1010 - Page 2
`
`

`

`Editor website or via FTP from a repository. A copy of that RFC is attached to this declaration
`
`as an exhibit.
`
`Pursuant to Section 1746 of Title 28 of United States Code, I declare under penalty of
`
`perjury under the laws of the United States of America that the foregoing is true and correct
`
`and that the foregoing is based upon personal knowledge and information andis believed to be
`
`true.
`
`By:
`Date: Serr ld
`q
`ATTACHED CALIF. ACKNOWLEDGMENTS).| yx
`
`4819-8574-3009.1
`
`a
`
`inoza
`
`Apple Inc.
`Ex. 1010 - Page 3
`
`Apple Inc.
`Ex. 1010 - Page 3
`
`

`

`CIVIL CODE $11189
`CALIFORNIA ALL-PURPOSE ACKNOWLEDGMENT
`
`
`A notary public or cther officer completing this certificate verifies only the identity of the Individual who signed the
`document to whichthis certificate is attached, and not the truthfulness, accuracy, or validity of that document.
`
`State of California
`
`Date
`
`re insert Name and Title of the Officer
`
`
`|
`;
`asAngee;
`County of
`
`On_SeptombarWt atsbefore me, \ A ‘ begacditte- otary pulC
`
`
`personally appeared
`Sandy “Bineoa
`SZ Name(s) ofSignerfe}
`
`who proved to me on the basis of satisfactory evidence to be the p son(g) whose name(gyisvare
`subscribed to the within instrument and acknowledged to me that
`He/sheythey executed the same in
`Fisnerther authorized capacity(ies), and that by hie(her/theit signature
`the instrument the personée},
`or theentity upon behalf of which the person)acted; executed the instrument.
`| certify under PENALTY OF PERJURY under the laws
`of the State of California that the foregoing paragraph
`is true and correct.
`
`9
`
`Beecalhe
`
`he a h
`
`ctead edt hes
`
`A
`
`es
`
`8.8. DELGADILLO
`NotaryPublic ~California
`Los Angeles County
`Commission # 2224720
`My Comm. Expires Dec 9, 2021
`
`a
`
`B
`5
`g
`
`WITNESS my hand andofficial seal.
`
`:
`Signature
`
`oo
`\Vo
`'
`S < S ~
`Signature ofFNotary Public
`
`5
`
`Place Notary Seal Above
`
`OPTIONAL
`Though this section is optional, completing this information can deter alteration of the documentor
`
`tral pteal)
`fraudulentreattachmentofthis form to an unintendeddocument.
`“
`.
`=!
`TC ya:fransihiceiy OP
`Description of Attached Document.
`Title or Type of Document: D Patann is Sandy Gine2n {or LETT C
`
`
`Document Date: Number of Pages:__2ALLS
`
`
`Signer(s} Other Than Named Above:
`
`Capacity(ies) Claimed by Signer(s)
`Signer’s Name:
`Signer’s Name:
`1 Corporate Officer — Titlefs):
`[] Corporate Officer — Title(s):
`CO Partner — [1 Limited
`LI General
`11 Partner — [1 Limited
`(lJ General
`LI Individual
`C1 Attorney in Fact
`C Individual
`(F Attorney in Fact
`L] Trustee
`[t Guardian or Conservator
`[] Trustee
`(] Guardian or Conservator
`
`
`C] Other:
`L Other:
`
`Signer Is Representing: Signer ls Representing:
`
` 62016 National Notary fAssociation « www,v NationalNotary.org: 1.800-Us NOTARYY (te-800-876-"6827) ltem 45907
`
`
`
`
`
`Apple Inc.
`Ex. 1010 - Page 4
`
`Apple Inc.
`Ex. 1010 - Page 4
`
`

`

`RFC: 793
`
` TRANSMISSION CONTROL PROTOCOL
`
` DARPA INTERNET PROGRAM
` PROTOCOL SPECIFICATION
`
` September 1981
`
` prepared for
` Defense Advanced Research Projects Agency
` Information Processing Techniques Office
` 1400 Wilson Boulevard
` Arlington, Virginia 22209
`
` by
` Information Sciences Institute
` University of Southern California
` 4676 Admiralty Way
` Marina del Rey, California 90291
`
`September 1981
` Transmission Control Protocol
`
` TABLE OF CONTENTS
` PREFACE ........................................................ iii
`1. INTRODUCTION ..................................................... 1
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`1
`
`Apple Inc.
`Ex. 1010 - Page 5
`
`

`

` 1.1 Motivation .................................................... 1
` 1.2 Scope ......................................................... 2
` 1.3 About This Document ........................................... 2
` 1.4 Interfaces .................................................... 3
` 1.5 Operation ..................................................... 3
`2. PHILOSOPHY ....................................................... 7
` 2.1 Elements of the Internetwork System ........................... 7
` 2.2 Model of Operation ............................................ 7
` 2.3 The Host Environment .......................................... 8
` 2.4 Interfaces .................................................... 9
` 2.5 Relation to Other Protocols ................................... 9
` 2.6 Reliable Communication ........................................ 9
` 2.7 Connection Establishment and Clearing ........................ 10
` 2.8 Data Communication ........................................... 12
` 2.9 Precedence and Security ...................................... 13
` 2.10 Robustness Principle ......................................... 13
`3. FUNCTIONAL SPECIFICATION ........................................ 15
` 3.1 Header Format ................................................ 15
` 3.2 Terminology .................................................. 19
` 3.3 Sequence Numbers ............................................. 24
` 3.4 Establishing a connection .................................... 30
` 3.5 Closing a Connection ......................................... 37
` 3.6 Precedence and Security ...................................... 40
` 3.7 Data Communication ........................................... 40
` 3.8 Interfaces ................................................... 44
` 3.9 Event Processing ............................................. 52
`GLOSSARY ............................................................ 79
`REFERENCES .......................................................... 85
`
` [Page i]
`
` September 1981
`Transmission Control Protocol
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`2
`
`Apple Inc.
`Ex. 1010 - Page 6
`
`

`

`[Page ii]
`
`September 1981
` Transmission Control Protocol
`
` PREFACE
`
`This document describes the DoD Standard Transmission Control Protocol
`(TCP). There have been nine earlier editions of the ARPA TCP
`specification on which this standard is based, and the present text
`draws heavily from them. There have been many contributors to this work
`both in terms of concepts and in terms of text. This edition clarifies
`several details and removes the end-of-letter buffer-size adjustments,
`and redescribes the letter mechanism as a push function.
` Jon Postel
` Editor
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`3
`
`Apple Inc.
`Ex. 1010 - Page 7
`
`

`

` [Page iii]
`
`RFC: 793
`Replaces: RFC 761
`IENs: 129, 124, 112, 81,
`55, 44, 40, 27, 21, 5
` TRANSMISSION CONTROL PROTOCOL
` DARPA INTERNET PROGRAM
` PROTOCOL SPECIFICATION
`
` 1. INTRODUCTION
`The Transmission Control Protocol (TCP) is intended for use as a highly
`reliable host-to-host protocol between hosts in packet-switched computer
`communication networks, and in interconnected systems of such networks.
`This document describes the functions to be performed by the
`Transmission Control Protocol, the program that implements it, and its
`interface to programs or users that require its services.
`1.1. Motivation
` Computer communication systems are playing an increasingly important
` role in military, government, and civilian environments. This
` document focuses its attention primarily on military computer
`https://www.rfc-editor.org/rfc/rfc793.txt
`4
`
`Apple Inc.
`Ex. 1010 - Page 8
`
`

`

` communication requirements, especially robustness in the presence of
` communication unreliability and availability in the presence of
` congestion, but many of these problems are found in the civilian and
` government sector as well.
` As strategic and tactical computer communication networks are
` developed and deployed, it is essential to provide means of
` interconnecting them and to provide standard interprocess
` communication protocols which can support a broad range of
` applications. In anticipation of the need for such standards, the
` Deputy Undersecretary of Defense for Research and Engineering has
` declared the Transmission Control Protocol (TCP) described herein to
` be a basis for DoD-wide inter-process communication protocol
` standardization.
` TCP is a connection-oriented, end-to-end reliable protocol designed to
` fit into a layered hierarchy of protocols which support multi-network
` applications. The TCP provides for reliable inter-process
` communication between pairs of processes in host computers attached to
` distinct but interconnected computer communication networks. Very few
` assumptions are made as to the reliability of the communication
` protocols below the TCP layer. TCP assumes it can obtain a simple,
` potentially unreliable datagram service from the lower level
` protocols. In principle, the TCP should be able to operate above a
` wide spectrum of communication systems ranging from hard-wired
` connections to packet-switched or circuit-switched networks.
`
` [Page 1]
`
` September 1981
`Transmission Control Protocol
`Introduction
`
` TCP is based on concepts first described by Cerf and Kahn in [1]. The
` TCP fits into a layered protocol architecture just above a basic
` Internet Protocol [2] which provides a way for the TCP to send and
` receive variable-length segments of information enclosed in internet
` datagram "envelopes". The internet datagram provides a means for
` addressing source and destination TCPs in different networks. The
` internet protocol also deals with any fragmentation or reassembly of
` the TCP segments required to achieve transport and delivery through
` multiple networks and interconnecting gateways. The internet protocol
` also carries information on the precedence, security classification
` and compartmentation of the TCP segments, so this information can be
` communicated end-to-end across multiple networks.
` Protocol Layering
` +---------------------+
` | higher-level |
` +---------------------+
` | TCP |
` +---------------------+
` | internet protocol |
` +---------------------+
` |communication network|
` +---------------------+
` Figure 1
` Much of this document is written in the context of TCP implementations
`https://www.rfc-editor.org/rfc/rfc793.txt
`5
`
`Apple Inc.
`Ex. 1010 - Page 9
`
`

`

` which are co-resident with higher level protocols in the host
` computer. Some computer systems will be connected to networks via
` front-end computers which house the TCP and internet protocol layers,
` as well as network specific software. The TCP specification describes
` an interface to the higher level protocols which appears to be
` implementable even for the front-end case, as long as a suitable
` host-to-front end protocol is implemented.
`1.2. Scope
` The TCP is intended to provide a reliable process-to-process
` communication service in a multinetwork environment. The TCP is
` intended to be a host-to-host protocol in common use in multiple
` networks.
`1.3. About this Document
` This document represents a specification of the behavior required of
` any TCP implementation, both in its interactions with higher level
` protocols and in its interactions with other TCPs. The rest of this
`
`[Page 2]
`
`September 1981
` Transmission Control Protocol
` Introduction
`
` section offers a very brief view of the protocol interfaces and
` operation. Section 2 summarizes the philosophical basis for the TCP
` design. Section 3 offers both a detailed description of the actions
` required of TCP when various events occur (arrival of new segments,
` user calls, errors, etc.) and the details of the formats of TCP
` segments.
`1.4. Interfaces
` The TCP interfaces on one side to user or application processes and on
` the other side to a lower level protocol such as Internet Protocol.
` The interface between an application process and the TCP is
` illustrated in reasonable detail. This interface consists of a set of
` calls much like the calls an operating system provides to an
` application process for manipulating files. For example, there are
` calls to open and close connections and to send and receive data on
` established connections. It is also expected that the TCP can
` asynchronously communicate with application programs. Although
` considerable freedom is permitted to TCP implementors to design
` interfaces which are appropriate to a particular operating system
` environment, a minimum functionality is required at the TCP/user
` interface for any valid implementation.
` The interface between TCP and lower level protocol is essentially
` unspecified except that it is assumed there is a mechanism whereby the
` two levels can asynchronously pass information to each other.
` Typically, one expects the lower level protocol to specify this
` interface. TCP is designed to work in a very general environment of
` interconnected networks. The lower level protocol which is assumed
` throughout this document is the Internet Protocol [2].
`1.5. Operation
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`6
`
`Apple Inc.
`Ex. 1010 - Page 10
`
`

`

` As noted above, the primary purpose of the TCP is to provide reliable,
` securable logical circuit or connection service between pairs of
` processes. To provide this service on top of a less reliable internet
` communication system requires facilities in the following areas:
` Basic Data Transfer
` Reliability
` Flow Control
` Multiplexing
` Connections
` Precedence and Security
` The basic operation of the TCP in each of these areas is described in
` the following paragraphs.
`
` [Page 3]
`
` September 1981
`Transmission Control Protocol
`Introduction
`
` Basic Data Transfer:
` The TCP is able to transfer a continuous stream of octets in each
` direction between its users by packaging some number of octets into
` segments for transmission through the internet system. In general,
` the TCPs decide when to block and forward data at their own
` convenience.
` Sometimes users need to be sure that all the data they have
` submitted to the TCP has been transmitted. For this purpose a push
` function is defined. To assure that data submitted to a TCP is
` actually transmitted the sending user indicates that it should be
` pushed through to the receiving user. A push causes the TCPs to
` promptly forward and deliver data up to that point to the receiver.
` The exact push point might not be visible to the receiving user and
` the push function does not supply a record boundary marker.
` Reliability:
` The TCP must recover from data that is damaged, lost, duplicated, or
` delivered out of order by the internet communication system. This
` is achieved by assigning a sequence number to each octet
` transmitted, and requiring a positive acknowledgment (ACK) from the
` receiving TCP. If the ACK is not received within a timeout
` interval, the data is retransmitted. At the receiver, the sequence
` numbers are used to correctly order segments that may be received
` out of order and to eliminate duplicates. Damage is handled by
` adding a checksum to each segment transmitted, checking it at the
` receiver, and discarding damaged segments.
` As long as the TCPs continue to function properly and the internet
` system does not become completely partitioned, no transmission
` errors will affect the correct delivery of data. TCP recovers from
` internet communication system errors.
` Flow Control:
` TCP provides a means for the receiver to govern the amount of data
` sent by the sender. This is achieved by returning a "window" with
` every ACK indicating a range of acceptable sequence numbers beyond
`https://www.rfc-editor.org/rfc/rfc793.txt
`7
`
`Apple Inc.
`Ex. 1010 - Page 11
`
`

`

` the last segment successfully received. The window indicates an
` allowed number of octets that the sender may transmit before
` receiving further permission.
`
`[Page 4]
`
`September 1981
` Transmission Control Protocol
` Introduction
`
` Multiplexing:
` To allow for many processes within a single Host to use TCP
` communication facilities simultaneously, the TCP provides a set of
` addresses or ports within each host. Concatenated with the network
` and host addresses from the internet communication layer, this forms
` a socket. A pair of sockets uniquely identifies each connection.
` That is, a socket may be simultaneously used in multiple
` connections.
` The binding of ports to processes is handled independently by each
` Host. However, it proves useful to attach frequently used processes
` (e.g., a "logger" or timesharing service) to fixed sockets which are
` made known to the public. These services can then be accessed
` through the known addresses. Establishing and learning the port
` addresses of other processes may involve more dynamic mechanisms.
` Connections:
` The reliability and flow control mechanisms described above require
` that TCPs initialize and maintain certain status information for
` each data stream. The combination of this information, including
` sockets, sequence numbers, and window sizes, is called a connection.
` Each connection is uniquely specified by a pair of sockets
` identifying its two sides.
` When two processes wish to communicate, their TCP's must first
` establish a connection (initialize the status information on each
` side). When their communication is complete, the connection is
` terminated or closed to free the resources for other uses.
` Since connections must be established between unreliable hosts and
` over the unreliable internet communication system, a handshake
` mechanism with clock-based sequence numbers is used to avoid
` erroneous initialization of connections.
` Precedence and Security:
` The users of TCP may indicate the security and precedence of their
` communication. Provision is made for default values to be used when
` these features are not needed.
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`8
`
`Apple Inc.
`Ex. 1010 - Page 12
`
`

`

` [Page 5]
`
` September 1981
`Transmission Control Protocol
`
`[Page 6]
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`9
`
`Apple Inc.
`Ex. 1010 - Page 13
`
`

`

`September 1981
` Transmission Control Protocol
`
` 2. PHILOSOPHY
`2.1. Elements of the Internetwork System
` The internetwork environment consists of hosts connected to networks
` which are in turn interconnected via gateways. It is assumed here
` that the networks may be either local networks (e.g., the ETHERNET) or
` large networks (e.g., the ARPANET), but in any case are based on
` packet switching technology. The active agents that produce and
` consume messages are processes. Various levels of protocols in the
` networks, the gateways, and the hosts support an interprocess
` communication system that provides two-way data flow on logical
` connections between process ports.
` The term packet is used generically here to mean the data of one
` transaction between a host and its network. The format of data blocks
` exchanged within the a network will generally not be of concern to us.
` Hosts are computers attached to a network, and from the communication
` network's point of view, are the sources and destinations of packets.
` Processes are viewed as the active elements in host computers (in
` accordance with the fairly common definition of a process as a program
` in execution). Even terminals and files or other I/O devices are
` viewed as communicating with each other through the use of processes.
` Thus, all communication is viewed as inter-process communication.
` Since a process may need to distinguish among several communication
` streams between itself and another process (or processes), we imagine
` that each process may have a number of ports through which it
` communicates with the ports of other processes.
`2.2. Model of Operation
` Processes transmit data by calling on the TCP and passing buffers of
` data as arguments. The TCP packages the data from these buffers into
` segments and calls on the internet module to transmit each segment to
` the destination TCP. The receiving TCP places the data from a segment
` into the receiving user's buffer and notifies the receiving user. The
` TCPs include control information in the segments which they use to
` ensure reliable ordered data transmission.
` The model of internet communication is that there is an internet
` protocol module associated with each TCP which provides an interface
` to the local network. This internet module packages TCP segments
` inside internet datagrams and routes these datagrams to a destination
` internet module or intermediate gateway. To transmit the datagram
` through the local network, it is embedded in a local network packet.
` The packet switches may perform further packaging, fragmentation, or
`
` [Page 7]
`
` September 1981
`Transmission Control Protocol
`Philosophy
`
`https://www.rfc-editor.org/rfc/rfc793.txt
`
`10
`
`Apple Inc.
`Ex. 1010 - Page 14
`
`

`

` other operations to achieve the delivery of the local packet to the
` destination internet module.
` At a gateway between networks, the internet datagram is "unwrapped"
` from its local packet and examined to determine through which network
` the internet datagram should travel next. The internet datagram is
` then "wrapped" in a local packet suitable to the next network and
` routed to the next gateway, or to the final destination.
` A gateway is permitted to break up an internet datagram into smaller
` internet datagram fragments if this is necessary for transmission
` through the next network. To do this, the gateway produces a set of
` internet datagrams; each carrying a fragment. Fragments may be
` further broken into smaller fragments at subsequent gateways. The
` internet datagram fragment format is designed so that the destination
` internet module can reassemble fragments into internet datagrams.
` A destination internet module unwraps the segment from the datagram
` (after reassembling the datagram, if necessary) and passes it to the
` destination TCP.
` This simple model of the operation glosses over many details. One
` important feature is the type of service. This provides information
` to the gateway (or internet module) to guide it in selecting the
` service parameters to be used in traversing the next network.
` Included in the type of service information is the precedence of the
` datagram. Datagrams may also carry security information to permit
` host and gateways that operate in multilevel secure environments to
` properly segregate datagrams for security considerations.
`2.3. The Host Environment
` The TCP is assumed to be a module in an operating system. The users
` access the TCP much like they would access the file system. The TCP
` may call on other operating system functions, for example, to manage
` data structures. The actual interface to the network is assumed to be
` controlled by a device driver module. The TCP does not call on the
` network device driver directly, but rather calls on the internet
` datagram protocol module which may in turn call on the device driver.
` The mechanisms of TCP do not preclude implementation of the TCP in a
` front-end processor. However, in such an implementation, a
` host-to-front-end protocol must provide the functionality to support
` the type of TCP-user interface described in this document.
`
`[Page 8]
`
`September 1981
` Transmission Control Protocol
` Philosophy
`
`2.4. Interfaces
` The TCP/user interface provides for calls made by the user on the TCP
` to OPEN or CLOSE a connection, to SEND or RECEIVE data, or to obtain
` STATUS about a connection. These calls are like other calls from user
`https://www.rfc-editor.org/rfc/rfc793.txt
`11
`
`Apple Inc.
`Ex. 1010 - Page 15
`
`

`

` programs on the operating system, for example, the calls to open, read
` from, and close a file.
` The TCP/internet interface provides calls to send and receive
` datagrams addressed to TCP modules in hosts anywhere in the internet
` system. These calls have parameters for passing the address, type of
` service, precedence, security, and other control information.
`2.5. Relation to Other Protocols
` The following diagram illustrates the place of the TCP in the protocol
` hierarchy:
`
` +------+ +-----+ +-----+ +-----+
` |Telnet| | FTP | |Voice| ... | | Application Level
` +------+ +-----+ +-----+ +-----+
` | | | |
` +-----+ +-----+ +-----+
` | TCP | | RTP | ... | | Host Level
` +-----+ +-----+ +-----+
` | | |
` +-------------------------------+
` | Internet Protocol & ICMP | Gateway Level
` +-------------------------------+
` |
` +---------------------------+
` | Local Network Protocol | Network Level
` +---------------------------+
` Protocol Relationships
` Figure 2.
` It is expected that the TCP will be able to support higher level
` protocols efficiently. It should be easy to interface higher level
` protocols like the ARPANET Telnet or AUTODIN II THP to the TCP.
`2.6. Reliable Communication
` A stream of data sent on a TCP connection is delivered reliably and in
` order at the destination.
`
` [Page 9]
`
` September 1981
`Transmission Control Protocol
`Philosophy
`
` Transmission is made reliable via the use of sequence numbers and
` acknowledgments. Conceptually, each octet of data is assigned a
` sequence number. The sequence number of the first octet of data in a
` segment i

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket