throbber
Windows NT
`
`DWVD‘JEIFSa
`
`Server 4
`
`FOR
`
`by Ed Tittel with Mary Madden &
`James Michael Stewart
`
`#
`Hungry MindS"
`
`‘
`
`-\
`
`HUNGRY MINDS, INC.
`
`NewYork, NY 6 lndianapolis,lN O Cleveland,OH
`
`Petitioner Apple Inc. - Ex. 1031, p. 1
`
`

`

`Windows NT® Server 4 For Dummies®
`Published by
`Hungry Minds. Inc.
`909 Third Avenue
`New York, NY 10022
`www . hungryrni nds .com
`,
`www . dummi es . com (Dummies Press Web site) -
`Copyright © 1999 Hungry Minds, inc. All rights reserved. No part of this book, including interior design. cover design.
`and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or
`otherwise) without the prior written permission of the publisher.
`'
`'
`‘
`Library of Congress Catalog Card No.: 99-60727
`iSBN: 0-7645-0524-6
`
`Printed in the United States of America
`10 9 S 7 6 5
`
`.
`leQV/QU/QR/IN
`Distributed in the United States by Hungry Minds, Inc.
`
`Distributed by CD6 Books Canada inc. for Canada; by-Transworld Publishers Limited in the United Kingdom: by
`lDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty.
`Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand. indonesia.
`and Hong Kong; by Gotop information Inc. ior,Taiw‘an; by ICG Muse, Inc. for Japan; by lntersoit ior South Africa; by
`Eyroiles for France; by international Thomson Publishing for Germany, Austria and Switzerland; by Distribuidora
`Cuspide for Argentina; by LR- international for Brazil; by Galileo Libros for Chile; by Ediciones ZETA S.C.R. Ltda. for
`Peru; by WS Computer Publishing Corporation, Inc., for the Philippines; by Contemporanea de Ediciones for
`Venezuela; by Express Computer Distributors for the Caribbean and West indies: by Micronesia Media Distributor,
`inc. for Micronesia: by Chips Computadoras SA de C.V. for Mexico; by Editorial Norma de Panama SA. for Panama;
`by American Bookshops for Finland.
`
`For general information on Hungry Minds’ products and services please contact our Customer Care Department
`within the U.S. at 800-762-2974, outside the U.S. at 317-572-3993 or fax 317-572-4002.
`
`For sales inquiries and reseller information, including discounts, premium and bulk quantity sales. and foreign-
`language transiations. please contact our Customer Care Department at 800-434-3422, fax 317-572-4002. or write to
`Hungry Minds, Inc., Attn: Customer Care Department. 10475 Crosspoint Boulevard, indianapoiis, IN 46256.
`For information on licensing foreign or domestic rights, please contact our Sub-Rights Customer Care Department at
`212-884—5000.
`
`,
`
`
`
`For authorization to photocopy items for corporate, personal, or educational use, please contact Copyright Clearance
`Center, 222 Rosewood Drive, Danvers, MA 01923, or fax 978-?50-4470.
`For information on using Hungry Minds‘ products and services in the classroom or for ordering examination copies,
`please contact our Educational Sales Department at 800-434-2086 or fax 31?-572-4005.
`Please contact our Public Relations Department at 212-884-5163 for press review copies or 212-884-5000 for author
`interviews and other publicity information or fax 212-884-5400.
`
`
`1
`F
`: THE PUBLISHER AND AUTHOR HAVE USED THEIR BEST
`
`
`EFFORTS IN PREPARING THIS BOOK. THE PUBIJSHERAND AUTHOR MAIGF. NO REPRESENTATIONS ORWARRANTIES
`
`WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF,THIS BOOK AND SPECIFICALLY
`DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. THERE
`ARE NO WARRANTIES WHICH EXTEND BEYOND THE DESCRIPTIONS CONTAINED IN THIS PARAGRAPH. NO
`
`
`WARRANTY MAY BE CREATED OR EXTENDED BY SALES REPRESENTATIVES ORWRI'I'I‘EN SALES MATERIAIS. THE
`
`
`ACCURACYAND COMPLETENESS OF THE INFORMATION PROVIDED HEREIN AND THE OPINIONS STATED HEREIN
`
`
`ARE NOT GUARANTEED OR WARRANTED TO PRODUCE ANY PARTICULAR RESULTS, AND THE ADVICE AND
`
`
`STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY INDIVIDUAL. NEITHER THE PUBLISHER NOR
`
`
`AUTHOR SHALL BE LIABLE FOR ANY LOSS OF PROFIT OR ANY OTHER COMMERCIAL DAMAGES, INCLUDING BUT
`NOT LIMITED TO SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR OTHER DAMAGES.
`
`Trademarks: Windows NT is a registered trademark of Microsoft Corporation in the United States and/or other
`countries. For Dummies, Dummies Man. A Reference for the Rest of Usi, The Dummies Way, Dummies Daily, and
`related trade dress are registered trademarks 0r trademarks of Hungry Minds, inc. in the United States and other
`countries, and may not be used without written permission. All other trademarks are the property of their respective
`owners. Hungry Minds. inc. is not associated with any product or vendor mentioned in this book.
`
`#
`HungryMinds'
`
`is a trademark of Hungry Minds, inc.
`
`Petitioner Apple Inc. - Ex. 1031, p. 2
`
`

`

`Chapter 12
`
`Next on Mantel — IP Addresses
`and the Nerds Who Love Them
`
`In This Chapter
`
`p Working with TCP/IP and NetBlOS names
`
`‘ p Understanding IP addressing, nets, and subnets
`
`p» Obtaining Internet-ready IP addresses
`
`p» Using private 1P addresses
`
`[- Using proxy servers and address translation
`
`b» Working with DHCP
`
`h Knowing when to use WINS
`
`yWorking with DNS
`00...]....0IIIOOOOOOOUCOOOOOOOOCOOOOOOOOIIIIIOIOO
`
`TIP/[P drives the Internet and makes it accessible around theworld. TCP/
`
`1?, however, is a lot more than just a collection of protocols: Many
`elements in the TCP/IP marry protocols to related services to provide more
`complete capabilities. Important examples include dynamic address alloca-
`tion and management, known as DHCP, plus domain name to address
`resolution services, known as DNS. You find out about TCP/IP names,
`addresses, and related standard services in this chapter, as well as some
`other services that are unique to Windows NT.
`
`Name‘Caflinq with TCP/ll’cmd NetBlOS
`
`Whenever you issue a command in Windows NT, you‘re expected to use the
`proper syntax. Otherwise, your efforts might not produce the desired
`results. For example, when you issue a NET USE command from a command
`prompt, you'must enter the server name and a share name, as well as the
`drive you wish to map. Thus, a simple command like N ET USE G :
`\\ LANNRI GHTS\APPS associates the drive letter G: with a share named APPS
`
`Petitioner Apple Inc. - Ex. 1031, p. 3
`
`

`

`192 Part III: Rewing Up Your Server
`
`on the LANWRIGHTS server. If you’re using the TCP/IP protocol to convey
`the data involved, the protocol doesn’t know how to interpret the name
`LANWRIGHTS as the server. Instead, it understands IP addresses, such as
`172.16.1.7.
`
`If you use TCP/IP on your network, you need some way to convert 1? ad—
`dresses into names, and vice versa. Just as the United Nations requires
`translators so everyone can communicate, so does Windows NT! That’s why.
`understanding naming conventions and name-to-address resolution is such
`an important part of working with TCP/IP on Windows NT.
`
`NetBIOS names
`
`if you're like most folks, you freeze like a deer in the headlights when you
`hear the word NetBIOS. Don’t worry. Only a small number of people really
`understand NetBIOS in detail, but figuring out what you need to know
`without stressing out is easy.
`-
`
`A NetBIOS name is often called a computer name. When you install Windows
`NT onto a network, each computer that runs Windows NT requires a unique
`computer name. This permits all NetBIOS-based utilities to identify each
`machine by its name. Any time you enter a command that includes a com-
`puter name, Windows NT knows which computer you're talking about.
`
`If you try to give two devices the same name, you run into trouble — like
`trying to use the same Social Security number for two people. Each time a
`computer joins the network, it registers its name with a browser service that
`keeps track of such things. When the second computer with the same name
`tries to register, it is rejected because that name is already “taken.” In fact,
`that machine will be unable to join the network until its name is changed to
`something unique.
`
`When creating NetBIOS names, you need to work within their limitations:
`
`1/ NetBIOS names must be between 1 and 15 characters long. (If you have
`DOS or Windows 3.x machines on your network, they can’t recognize
`NetBIOS names with more than 8 characters.)
`
`1/ NetBIOS names may not contain any of the following characters:
`“ (double quotation mark), / (right slash), \ (left slash), [ (left square
`bracket), ] (right square bracket), : (colon), ; (semicolon),
`| (vertical
`slash), = (equal sign), + (plus sign), * (asterisk), ? (question mark),
`< (left angle bracket), and > (right angle bracket). Dollar signs are not
`recommended because they have a special meaning. (A NetBIOS name
`that ends in $ does not display in a br0wse list.)
`
`Petitioner Apple Inc. - Ex. 1031, p. 4
`
`

`

`_ Chapter 12: Next on Mantel -— IP Addresses and the Nerds Who Love Them
`
`1 93
`
`1/ Don’t use lengthy/names, or put spaces in names. Windows NT doesn‘t
`care if you use longer names or include embedded spaces, but other
`networking clients or systems may not be able to handle such usages.
`
`:1 Pick names that make sense to users that are short and to the point.
`Don’t name machines after their users or locations, especially if users
`come and go regularly, or if machines move around a lot. When it
`comes to servers, name them to indicate organizational role or affilia-
`tion (for example, Sales).
`
`What’s in a NetBlOS name, you ask? A short, clear indication of what’s being
`named so that users can recognize what they see. At best, this kind of
`naming convention will make sense without requiring further explanation. At
`the least, you can do what we do and put a sticker with the machine’s name
`on each monitor for self-identification purposes. Figure 12—1 shows a list of
`NetBlOS names in our'network’s Network Neighborhood (names that begin
`with Nts indicate Windows NT Servers, Ntw indicates Windows NT Worksta-
`tions, and Win98 .
`.
`. well, you see what we mean; we also add numbers to
`identify each machine’s IP address).
`
`Figure 12—1:
`NetBIOS
`computer
`names ' A
`show upfor
`i
`machines
`=
`under
`the NT 5
`
`Explorer
`Network
`
`Neighborhood.
`
`Enlim Network
`. m
`3—
`
`Nts'bpdc
`
`TCP/IP names and addresses
`
`TCP/IP uses a different scheme for names than does NetBIOS. TCP/IP uses
`32—bit numbers to construct IP addresses (for example, 172.16.1.11). Each
`host or node on a TCP/IP network must have a unique IP address.
`
`Petitioner Apple Inc. - Ex. 1031, p. 5
`
`

`

`195 Part III: Rewing Up Your Sewer
`
`IP addresses are not meaningful to most humans and are difficult to remem-
`ber. Thus, it’s helpful to have some way to convert IP addresses into mean-
`ingful names. 011 an Windows NT network, you use computer names (also
`known as NetBIOS names). The Internet community uses a different naming
`convention called domain names. Translation methods, such as WINS and
`DNS maintain databases for cenverting an IP address to a computer name
`(WINS) or a domain name (DNS).
`
`If you’ve ever used a Web browser on the lnternet, you know that you can
`type a URL (Uniform Resource Locator) such as http: l/206 . 224. 65 . 194/
`or http: waw. 1 arm . corn/ to obtain access to a Web page. You can do so
`because the Internet uses the Domain Name Service, also known as DNS, to
`resolve IP addresses to domain names and vice versa. If you type the IP
`address, the Web browser jumps straight to the namedaddress; if you type
`a domain name, your request goes through a DNS server that resolves the
`name to an IP address, and then the browser jumps to the named address
`thereafter.
`‘
`
`In the IP world, the naming scheme you can use is limited if you plan to
`connect your network directly to the Internet. An organization known as the
`Internet Network Information Center, or InteerC, is in charge of approving
`and maintaining the database of "legal" Internet domain names. You can
`request any domain name you want, but if someone else is using it or has a
`legitimate claim to a trade or brand name“, you won’t be able to use it. For
`example, you probably won’t be able to use mcdonal ds . com or
`cocacol a . com as domain names; likewise, if somebody else has already
`registered xy zcor‘p . com, you wouldn’t be able to use that name, even if
`your company is' named XYZ Corporation.
`
`,
`
`'
`
`The format for a typical lP name is hostdomainnamesuffix. The domain '
`name is something you can’t guarantee, but typically represents your
`organization. The suffix sometimes identifies the country of origin (for
`example, .ca is Canada, .de is Germany) or the type of organization (.gov is
`government, .edu is education, .com is a commercial business, .org is a
`nonprofit organization, and so forth).
`
`Some domain names are more complex; they can take a form like
`host.subdomain.domainname.suffix, as in j 61 l 0 . eng . 5 un . com, where the
`host name is jel l 0, the subdomain is eng (for engineering), and the domain
`name is 5 un (the domain name for Sun Microsystems, Inc.) which is a
`commercial (.com) entity. The only part of the name that’s under control of
`the lnteerC is the domain name part, and the suffix, but every domain name
`must be unique in its entirety to be recognized properly.
`
`Names that include the host part and the domain name and suffix (plus any
`other subdomain information that may apply) are called Fully Qualified
`Domain Names or FQDNs. To be valid, any FQDN must have a corresponding
`
`Petitioner Apple Inc. - Ex. 1031, p. 6
`
`

`

`____ Chapter 12: Next on Mantel - IP Addresses and the Nerds Who Love Them
`
`7 95
`
`entry in some DNS server’s database that permits it to be translated into a
`unique numeric TCP/IP address. For example, your authors’ Web server is
`named http : / lwww .‘l anw . corn, which resolves into a numeric address of
`206.224.65.194.
`
`As long as you’re completely isolated from the Internet and intend to stay
`that way, you can assign any names and IP addresses you might like on your
`net-work. But if you ever connect your network to the Internet, you’ll have to
`go back and change everything! If your network will be — or simply might
`be — connecting to the Internet, you have one of two options for assigning
`addresses:
`
`1. You can obtain and install valid public IP addresses and domain
`names now.
`
`You can obtain these directly from the lnterNIC at some difficulty and
`expense, or you can pay your Internet Service Provider (ISP) to do this
`for you. We recommend the latter course. When you obtain a range of
`' IP addresses for your network -— remember, each computer needs its
`own unique address, and some computers or devices need multiple
`addresses (one for each interface) — make sure you get enough to
`leave some room to grow.
`:
`
`_
`
`‘2. You can (and should) obtain a valid domain name from the InterNIC,
`but you can use any of a range of reserved IP addresses called
`private IP addresses to number your networks.
`
`These addresses may not be used directly on the Internet, but have
`been set aside for private use. When used in concert with a type of
`software called Network Address Translation (or NAT for short), this
`approach requires you to obtain only a small number'of public IP
`addresses but still permits Internet access for every computer on your
`network. This topic is discussed in more detail later in this chapter in
`the section “The magic of proxy servers and address translation.”
`
`To find out more about the process of obtaining a domain name, visit the
`lnterNIC’s Web site at htt p : l / 1' nte rni c . net and click the hyperlink that
`reads “domain name registration services.” You’ll find details on name
`registration services and well as the directory and database services that
`support the Internet's distributed collection of DNS servers.
`
`If you’re thinking about registering a domain name, check the existing name
`database at the InteerC Web site to make sure that name’s not already
`
`) assigned to somebody else. Why ask for something you can‘t have?
`
`Petitioner Apple Inc. - Ex. 1031, p. 7
`
`

`

`196 Part III: Rewing Up Your Sewer
`
`
`
`An Address for Every Node
`
`A unique numeric identification tag, called an IP address, is assigned to each
`interface on a TCPflP network. Every IP address within a TCP/IP network
`must be unique. Each device on a TCP/IP network is known as a host. Each
`host has at least one network interface with an assigned IP address. How-
`ever, a host can have multiple network interface cards (Nle), and even
`multiple IP addresses assigned to each NIC.
`
`0f netuiork and host [05
`
`An IP address consists of two components: a network ID and a host ID. The
`network lD identifies the network segment to which the host belongs. The
`host ID identifies an individual host on some specific network segment. A
`host can only communicate directly with other hosts on the same network
`segment. A network segment is a logical division of a network into unique
`numeric network Ids called subnets. A host must use a router to communi-
`cate with hosts on other subnets.
`
`A router moves packets from one subnet to another. A router reads the
`network ID for a packet’s destination address and determines if that packet
`should remain on the current subnet or be routed to a different subnet.
`When a router delivers a packet to the correct subnet, the router then uses
`the host ID portion of the destination address to deliver the packet to its
`final destination.
`
`A typical IP address looks like 207.46.131.13? (which matches the domain
`name http : / {www . mi c r05 oft . com). This numeric IP address format is
`known as dotted-decimal notation. But computers “see" IP addresses as
`binary numbers. This same IP address is 11001111 00101110 10000011
`10001001 in binary form and written in collections of eight bits called octets.
`Each octet is converted to a decimal number and then separated by periods
`to form the dotted-decimal notation format shown at the beginning of this
`paragraph. The decimal version of IP addresses is more human friendly than
`binary. As you may already know, domain names and NetBlOS names are still
`more friendly because they use symbolic names that'make sense to humans.
`
`An IP address requires 32 binary digits and defines a 32-bit address space
`that supports nearly 4.3 billion unique addresses. Although this seems like a
`lot of addresses, the number of available lP addresses is dwindling. Conse-
`quently, several plans exist to expand or change the IP addressing scheme
`to open up many more addresses. For more information on such plans
`please visit the Web site at: http: //www. 6bone . net/ngtrans . html.
`
`Petitioner Apple Inc. - Ex. 1031, p. 8
`
`

`

`_ Chapter 12: Next on Monte] — IP Addresses and the Nerds Who Love Them
`
`1 g 7
`
`IP designers carved the entire galaxy of IP addresses into classes, to meet
`different addressing needs. Today, there are five IP address classes labeled
`by the letters A through E. Classes A, B, and C are assigned to organizations
`to allow their networks to connect to the Internet, and Classes D and E are
`reserved for special uses.
`
`The first three classes of addresses differ by how their network 1D is
`defined:
`
`1/ Class A addresses use the first octet for the network ID.
`
`1’ Class B uses the first. two octets.
`
`1/ Class C uses the first three.
`
`Class A addresses support a relatively small number of networks, each with
`' a huge number of possible hosts. Class C addresses support a large-number
`of networks, each with a relatively small number of hosts as shown in Table
`12-1 (Class B falls in the middle). Thus, branches of the military, government
`agencies, and large corporations are likely to need Class A addresses,
`medium-sized organizations and companies Class B addresses, and small
`companies and organizations Class C addresses.
`
`When it comes to recognizing address classes A through C, the network [D
`for Class A addresses always starts its first octet with a zero. Each Class B
`network lD always starts with 10, while Class C network IDs always start
`with 110. Consequently, you can determine address class by examining an
`address, either in binary or decimal form. (See Tables 12-1 and 12-2.)
`
`
`Address Classes and Corresponding
`Table 12-1
`
`-
`‘
`. Network and Host IDs
`
`Glass .
`
`High-Order Bits
`
`First Octet flange
`
`#Nei‘warks
`
`#Hosts
`
`16,777,214
`126
`1-126.x.y.z
`Dxxxxxxx
`Class A
`Class B
`10xxxxxx
`128-191.x.y.z
`16,384
`55,534"
`
`Class c
`110xxxxx
`-
`192-223.x.y.z
`2,097,152
`254
`
`
`
`Table 12-2 ;
`Division of IP Address Component Detets
`According to Class
`
`
`Class
`A
`'
`
`B
`
`IP Address
`10.1.1.10
`
`172.16.1.1D
`
`Network ID
`10
`
`172.16
`
`Host ID
`1.1.10
`
`1.10
`
`
`
`7 c 10 192.168.1.10 192.168.1
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1031, p. 9
`
`

`

`
`
` 198 Part III: Reviving Up Your Santa-r _ .
`
`
`
`
`Note: Network ID 127 is missing from Table 121. That’s because 12? is a
`loopback address (when testing IP transmission, it transmits to itself).
`
`No valid lP address may include an octet that consists entirely of ones or
`zeros (0 or 255 in decimal), because these addresses are reserved for
`broadcast addresses (255) and subnet identification (0).
`
`Subnetting I1’ addresses
`
`Subnets represent divisions of a single TCP/IP network address into logical
`subsets. The motivation for subnetting is twofold. First, subnetting reduces
`the amount of overall traffic on any network segment by collecting systems
`that communicate often into groups. Second, subnetting makés is easier for
`networks to grow and expand, and adds an extra layer of security controls.
`Subnets work by “stealing" bits from the host part of an IP address and
`using those bits to subdivide a single IP network address into two or more
`subnets.
`
`Subnet‘masks are typically used to divide IP address blocks into smaller
`subnetworks. The base subnet masks for Class A, B, and C networks are
`255.0.0.0, 255.255.0.0, and 255.255.2550 respectively. By adding extra bits set
`to I in the space occupied by the 0 that appears next to the rightmost 255 in
`any such number, additional subnet masks may be created. This transforma-
`tion is illustrated in Table 12-3, which shows the some typical values for
`usable subnet masks.
`
`
`
`Petitioner Apple Inc. - Ex. 1031, p. 10
`
`

`

`_ Chapter 12: Next on Montel — IP Addresses and the Nerds Who Love Them
`
`
`1 99
`
`
`
` Table 12-3 . Subnet Masks and Results
`
`
`Binary Mask
`Decimal
`Number of New
`Number of
`Equivalent
`Subsets
`Hosts
`
`-
`
`A: 255.0.00
`B: 255255.00
`E: 255.255.2550
`
`A: 255128.00
`B: 2552551280
`0: 255.255.255.128
`
`00000000
`
`'
`
`10000000
`
`11000000
`
`11100000
`
`11110000
`
`-'
`
`11111000
`
`11111100
`
`11111110
`
`'
`
`.
`
`1
`
`A: 255192.00
`B: 255.255.1920
`C: 255.255.255.152
`
`A: 255224.00
`B: 255.255.2240
`0: 255.255.255.224
`
`A: 25524000
`B: 255.255.2400
`C: 255.255.255.240
`
`.
`
`A: 255248.00
`B: 255.255.2480
`C: 255.255.255.248
`
`A: 25525200
`B: 255.255.2520
`C: 255.255.255.252
`
`A: 255254.00
`B: 255.255.2540
`C: 255.255.255.254
`
`A: 16,777,214
`B: 55,534
`C: 254
`
`A: Not valid
`B: Not valid
`0:- Not valid
`
`A: 4,194,302
`B: 16,382
`C: 52
`
`A: 2,097,150
`B: 8,190
`0: 30
`
`A: 1,048,574
`B: 4094
`0: 14
`
`A: 524,286
`B: 2,046
`0: 8
`
`A: 262,142
`B: 1022
`0: 2
`
`A: 131.070
`B: 510
`0: Not valid
`
`1
`
`Not valid
`
`2
`
`8
`
`14
`
`30
`
`62
`
`128
`
`
`
`Because routers are required to communicate across IP subnets, some
`router’s IP address on each subnet must be known to every client on that
`subnet. This address is called the default gateway, because it is where all
`out-of-subnet transmissions are directed by default (it’s the gateway to the
`world outside each local subnet, in other words). If no default gateway is
`defined, clients can‘t communicate outside their subnet.
`
`Going ublic: Obtaining Internet-ready
`17’ ad resses
`
`Deploying your own network or using a stand-alone system with NAT to
`connect to the Internet requires that you obtain one or more valid 0’
`
`Petitioner Apple Inc. - Ex. 1031, p. 11
`
`

`

`2 00 Part ill: Rewing Up Your Sewer
`
`addresses. For some uses, you may simply contract with an ISP to use a dial-
`up connection. Each time you connect you’ll be-assigned an IP address
`autOmatically from a pool of available addresses. Once you disconnect from
`the ISP, that IP address will return to the pool for re-use. This works equally
`well for stand—alone machines and for the servers that might dial into an ISP
`to provide an on-demand connection for users who have private IP ad-
`dresses but can attach to the Internet using NAT software.
`
`One way to attach an entire network to the Internet, is to lease a block or
`subnet of IP addresses from an ISP. Leasing IP addresses can be expensive
`and can limit your growth. Also, many ISPs can no longer lease large blocks
`of IP addresses so you may have to limit Internet access to specific ma-
`chines or subnets.
`
`For more information about taking this approach, you need to contact your
`ISP to find out what it can offer by way of available addresses and contigu-
`ous subnets. For some uses, public IP addresses are required because
`security needs dictate a true “end-to-end” connection between clients and
`servers across the Internet. In plain English, a true end-to-end connection
`means that the IP address that a client advertises to the Internet is the same
`
`one it uses in reality. In the section “The magic of proxy servers and address
`translation," you discover an alternate approach where the IP address
`advertised to the Internet is different from the private IP address that a
`client uses on its home subnet.
`~
`
`
`
`For some applications, particularly where secure IP—based protocols like
`iPSec (IP Secure) or particular Secure Sockets Layer (SSL) implementations
`are required, network address translation techniques may not work! Make
`sure you understand your application requirements in detail before you
`decide whether to lease public IP addresses or use private IP addresses with
`network address translation.
`
`The magic of proxy sewers and
`address transfation
`
`If you don't want to pay to lease a range of IP addresses, and your applica-
`tion requirements permit you to use private IP addresses, you can employ
`the IP addresses reserved for private use in RFC 1918 on your networks.
`When used in combination with network address translation software to
`
`connect to an ISP, a single public IP address (or one for each Internet
`connection) is all you need to service an entire network.
`
`RFC 1918 (http : llwww . faqs . org/rfcs/rfc1918 . htmi) defines special IP
`addresses for use on private intranets. These addresses, which appear in
`Table 12-4, will not be routed on the Internet by design. This approach
`actually provides improved security for your network as a fringe benefit,
`
`Petitioner Apple Inc. - Ex. 1031, p. 12
`
`

`

`_ Chapter 12: Next on Mantel — IP Addresses and the Nerds Who Love Them 20 1
`
`because it means that any impostor who wants to break into your network
`cannot easily masquerade as a local workstation. (Doing so would require
`routing a privateIP address packet across the Internet.) Because all of these
`addresses are up for grabs, you can use whatever address class makes sense
`for your organization (and for‘Class B and Class C addresses, you can use as
`many as you need within the legal range of such addresses).
`
`
`
`
` Table 12-4 Private IP Address Ranges from RFC 1918
`
`Class
`
`Address Range
`
`if Networks
`
`A
`
`10.0.0.0 - 10.255.255.255
`
`1
`
`‘
`
`16
`. 172.1600 - 172.31.255.255
`'
`B
`c 254 192168.00 — 192.163.255.255
`
`
`
`
`
`Thus, using address translation software to offer Internet access reduces
`your costs and allows nearly unlimited growth. If you think private IP
`addresses combined with NAT software makes sense for your situation,
`consult with your ISP for specific details and recommendations on how to
`use this technology on your network.
`
`You’ve probably heard the terms firewall and proxy thrown about often
`when reading or talking about Internet access. Firewalls and proxy servers
`are networking tools that are little more than special-purpose routers. A
`firewall may be used to filter traffic, both inbound or outbound.
`
`Firewall filters can be based on source or destination address, a specific
`protocol, or port address, or even on patterns that appear in the content or
`a data packet. A proxy server is an enhanced firewall, and its primary
`purpose is to manage communications between an in—house network and
`external networks such as the Internet. Proxies hide the identity of internal
`clients and can keep local copies of resources that are accessed frequently
`(this is called caching, and improves response time for users),
`
`You can check out several great online resources for firewalls, but online
`information on proxies is limited to product documentation. In addition to
`consulting the Windows NT Server Resource Kit and TechNet, here are
`several online resources you might want to check to discover more about
`these technologies:
`
`1’ Zeuros Firewall Resource: www . ze u re s . C o . u k/
`
`r/ Firewall Overview: www . access . d1 gek . net/~bdboyl e/fi rewal I .
`vendor.html
`
`V Great Circle Associates: www . gre’atci rcl e . com/
`
`:1 4 Firewalls: www.4f1‘ r‘ewaI I s . com/
`
`:1 Microsoft’s Proxy Server 2.0: www . mi (21105 oft . com/proxy/
`
`Petitioner Apple Inc. - Ex. 1031, p. 13
`
`

`

`202 Part-III: Hewing Up Your Server
`
`I/AventailVPN: www.aventail .com/
`1/ Netscape’s'Proxy Server: www . netscape.com/
`
`1/ Ositis Software’s WinProxy: www. 051' ti 5 . com/
`
`1/ Deerfield Communication’s WinGate Pro: www. clee r'fi el d . com/
`
`For example, your authors use Ositis Software’s WinProxy product, which
`acts as a proxy and provides NAT services, to link their networks to an ISP
`across an ISDN connection. We allow the ISP to assign us an IP address each
`time we log onto their host for an Internet connection. This doesn‘t matter
`because the NAT services translate between whatever address they assign
`us and the internal addresses each machine uses on the other side of the
`
`WinProxy software. We only pay for the temporary use of a single IP ad-
`dress, but we can handle up to eight connections to the Internet at a time!
`
`Go Figure: Configuring IP Addresses
`for Windouls NT Server
`
`Configuring TCP/IP on Windows NT Server can range from simple to com-
`plex. We review the simple process and discuss a few advanced items, but
`for complex configurations, you should consult a reference such as the
`Windows NT Server Resource Kit or TechNet.
`
`Three basic items are always required for configuring TCP/IP:
`
`1/ IP address“
`
`1’ Subnet mask
`
`1/ Default gateway
`
`With just these three items, you can connect a client or server to a network.
`The protocol is. configured on the Protocol tab of the Network applet. If the
`protocol isn’t installed already; click the Add button to display a list of
`installable protocols. If it’s already installed, select TCP/IP in the list and
`click Properties.
`
`The TCP/IP Properties dialog box has five tabs. The first tab, Microsoft
`TCP/IP Properties dialog box (see Figure 12-2), is where the three 1P configu-
`ration basics are defined. Notice there’s a selection to obtain an IP address
`
`from a DHCP server. Because most servers don’t work well using dynamic IP
`addresses, you should define a static IP address for your Windows NT .
`Server instead of using DHCP. You will either obtain a public IP address from
`your ISP, or use a private IP address fr0In one of thereserved address
`ranges defined'In RFC 1918.
`
`Petitioner Apple Inc. - Ex. 1031, p. 14
`
`

`

`__ Chapter 12: Next on Montel — IP Addresses and the Nerds Who Love Them 203
`
`Likewise, you must calculate a subnet mask for your network. Here again,
`you may obtain this from your ISP if you're using public IP addresses, or
`calculate your own if you‘re using private IP addresses. In most cases where
`private IP addresses are used, the default subnet mask for the address class
`should work without alteration or additional calculations.
`
`Finally, you must also provide a default gateway address for your server.
`The default gateway should‘be the address of the router on the local subnet
`to which the server is attached that can forward outbound traffic to other
`
`network segments. 0n networks using public IP addresses, this will probably
`be a router, firewall, or proxy server that connects the local subnet to other
`subnets or the Internet. On networks using private [P addresses, this will
`usually be the machine where the proxy and NAT software resides, that
`mediates between the local subnet and an Internet connection.
`
`Once you define an IP address, a subnet mask, and a default gateway, click
`OK, then close the Network applet, and reboot. That’s all there is to basic
`TCP/IP configuration on Windows NT!
`
`Htcto'ofl TCPIIP Pro urtic-
`
`dialog box.
`
`-
`
`_
`
`Figure12—2:
`Microsoft
`TCPIIP 1'.”
`Properties '.
`
`More complex configurations become necessary when your network is
`larger, and therefore, more complicated. The DNS tab is where you can
`define IP addresses for one or more Domain Name System (DNS) servers.
`DNS servers resolve domain names into IP addresses. For more information
`a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket