throbber
1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`9 I
`
`P address
`
`From Wikipedia, the free encyclopedia
`
`An Internet Protocol address (IP address) is a numerical label assigned to each device (eg, computer,
`printer) participating in a computer network that uses the Internet Protocol for communication.[1] An IP
`address serves two principal fimctions: host or network interface identification and location addressing. Its
`role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A
`
`route indicates how to get there."[2]
`
`The designers of the Internet Protocol defined an IP address as a 32-bit numberm and this system, known as
`Internet Protocol Version 4 (IPv4), is still in use today. However, because of the growth of the Internet and
`the predicted depletion of available addresses, a new version of IP (IPV6), using 128 bits for the address,
`was developed in 1995.5] IPv6 was standardized as RFC 2460 in l998,[4] and its deployment has been
`ongoing since the mid-2000s.
`
`IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.l (IPv4),
`and 2001:db8:O:l234:0:567:8:l (IPV6).
`
`The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and
`delegates five regional Internet registries (RIRS) to allocate IP address blocks to local Internet registries
`(Internet service providers) and other entities.
`
`
`Contents
`
`1
`
`IP versions
`
`2 IPv4 addresses
`
`2.1 Subnetting
`
`2.2 Private addresses
`
`3 IPv4 address exhaustion
`
`4 IPv6 addresses
`
`4.1 Private addresses
`
`5 IP subnetworks
`
`6 IP address assignment
`I
`
`6.1 Methods
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 1
`
`1/11
`
`Petitioner, Ex. 1035, Page 1
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`6.2 Uses of dynamic address assignment
`
`6.2.1 Sticky dynamic IP address
`
`6.3 Address autoconfiguration
`
`6.4 Uses of static addressing
`
`6.5 Conflict
`
`7 Routing
`
`7.1 Unicast addressing
`
`7 .2 Broadcast addressing
`
`7.3 Multicast addressing
`
`7.4 Anycast addressing
`
`8 Public addresses
`
`9 Modifications to IP addressing
`
`9.1 IP blocking and firewalls
`
`9.2 IP address translation
`
`10 Diagnostic tools
`
`11 See also
`
`12 References
`
`13 External links
`
`
`
`IP versions
`
`Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6. Each version defines
`an IP address differently. Because of its prevalence, the generic term IP address typically still refers to the
`addresses defined by IPV4. The gap in Version sequence between IPV4 and IPV6 resulted from the
`assignment of number 5 to the experimental Internet Stream Protocol in 1979, which however was never
`referred to as IPv5.
`
`IPv4 addresses
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 2
`
`2/11
`
`Petitioner, Ex. 1035, Page 2
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`In IPv4 an address consists of 32 bits which limits the
`
`address space to 4 294 967 296 (232) possible unique
`addresses. IPv4 reserves some addresses for special
`purposes such as private networks (~18 million
`addresses) or multicast addresses (~270 million
`addresses)
`
`IPv4 addresses are canonically represented in dot-
`decimal notation, which consists of four decimal
`numbers, each ranging from 0 to 255, separated by dots,
`e.g., l72.l6.254.l. Each part represents a group of8
`bits (octet) of the address. In some cases of technical
`writing, IPV4 addresses may be presented in various
`hexadecimal, octal, or binary representations.
`
`Subnetting
`
`An IPv4 address (dotted-decimal n0tation)
`
`1
`' 254 '
`1 6
`1? 2 '
`"’
`‘
`*
`"
`10101100 00010000 . 11111110 00000001
`ml Ijljl
`one by“? =El9ht W5
`|
`Thirty_two bits (4 X 8)’ or 4 bytes
`
`Decomposition of an IPv4 address from dot-
`
`decimal notation to its binary value.
`
`In the early stages of development of the Internet Protocol,[1] network administrators interpreted an IP
`address in two parts: network number portion and host number portion. The highest order octet (most
`significant eight bits) in an address was designated as the network number and the remaining bits were
`called the restfield or host identifier and were used for host numbering within a network.
`
`This early method soon proved inadequate as additional networks developed that were independent of the
`existing networks already designated by a network number. In 1981, the Internet addressing specification
`
`was revised with the introduction of classful network architecture.[2]
`
`Classfiil network design allowed for a larger number of individual network assignments and fine-grained
`subnetwork design. The first three bits of the most significant octet of an IP address were defined as the
`class of the address. Three classes (A, B, and C) were defined for universal unicast addressing. Depending
`on the class derived, the network identification was based on octet boundary segments of the entire address.
`Each class used successively additional octets in the network identifier, thus reducing the possible number
`of hosts in the higher order classes (B and C). The following table gives an overview of this now obsolete
`
`system.
`
`Historical classful network architecture
`
`Class
`
`Leading
`.
`b1ts
`
`Size of
`network
`.
`number b1t
`field
`
`Size of
`rest
`f.
`.
`b1t 1eld
`
`Number
`of networks
`
`Addresses
`per network
`
`Start
`address
`
`End address
`
`
`
`__000(00 (1§0:)77»216
`fl16,384(214) 65,536(216)
`f,"0’?,7’”2 00000
`
`0000
`128.0.0.0
`00.0.0.0
`
`000.000.000.000
`191.255.255.255
`000.000.000.000
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 3
`
`3/11
`
`Petitioner, Ex. 1035, Page 3
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`Classful network design served its purpose in the startup stage of the Internet, but it lacked scalability in the
`face of the rapid expansion of the network in the 1990s. The class system of the address space was replaced
`with Classless Inter-Domain Routing (CIDR) in 1993. CIDR is based on variable-length subnet masking
`(VLSM) to allow allocation and routing based on arbitrary—length prefixes.
`
`Today, remnants of classful network concepts function only in a limited scope as the default configuration
`parameters of some network software and hardware components (e.g. netmask), and in the technical jargon
`used in network administrators‘ discussions.
`
`Private addresses
`
`Early network design, when global end-to-end connectivity was envisioned for communications with all
`Internet hosts, intended that IP addresses be uniquely assigned to a particular computer or device. However,
`it was found that this was not always necessary as private networks developed and public address space
`needed to be conserved.
`
`Computers not connected to the Internet, such as factory machines that communicate only with each other
`via TCP/IP, need not have globally unique IP addresses. Three non-overlapping ranges of IPv4 addresses
`for private networks were reserved in RFC 1918. These addresses are not routed on the Internet and thus
`their use need not be coordinated with an IP address registry.
`
`Today, when needed, such private networks typically connect to the Internet through network address
`translation (NAT).
`
`IANA-reserved private IPv4 network ranges
`
`Start
`
`End
`
`N0. of addresses
`
`24-bit block (/8 prefix, 1 X A)
`
`10.0.0.0
`
`10.255.255.255
`
`16 777 216 20-bit block (/12 prefix, 16 X B)
`
`16-bit block (/16 prefix, 256 X C) l92.l68.0.0 192.168.255.255 65 536
`
`l72.16.0.0
`
`l72.3l.255.255
`
`1 048 576
`
`Any user may use any of the reserved blocks. Typically, a network administrator will divide a block into
`subnets; for example, many home routers automatically use a default address range of l92.168.0.0 through
`192.168.0.255 (192.168.0.0/24).
`
`IPv4 address exhaustion
`
`High levels of demand have decreased the supply of unallocated Internet Protocol Version 4 (IPv4)
`addresses available for assignment to Internet service providers and end user organizations since the 1980s.
`This development is referred to as IPv4 address exhaustion. LANA's primary address pool was exhausted on
`3 February 2011, when the last five blocks were allocated to the five RIRs.[5][6] APNIC was the first RIR to
`exhaust its regional pool on 15 April 2011, except for a small amount of address space reserved for the
`transition to IPv6, intended to be allocated in a restricted process.[7]
`
`IPv6 addresses
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 4
`
`4/1 1
`
`Petitioner, Ex. 1035, Page 4
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`The rapid exhaustion of IPv4 address space prompted
`the Internet Engineering Task Force (IETF) to explore
`new technologies to expand the addressing capability in
`the Internet. The permanent solution was deemed to be
`a redesign of the Internet Protocol itself. This new
`.
`generation of the Internet Protocol was eventually
`
`namedInternetProtocol Version 6 (IPv6) in l995.[3][4]
`
`The address size was increased from 32 to 128 bits (16
`octets), thus providing up to 2128 (approximately
`3.403 X 1038) addresses. This is deemed sufficient for
`the foreseeable futm.e_
`
`(In hexadecimal)
`An IPV5 addrei-,5
`2001:0DBB:AC10:FE01:ODOD:O000:000'D:0000
`’
`‘
`‘
`1
`2I'.|01:ODBB=AC1I'.|= FEO1::
`
`Z“-‘W5 '53" be °'"‘*t“-"'
`
`\
`
` 1flI1 101 101 1 ICED: 1010'-|.1fi2IZI11:1 111 lllmlt
`
`
`
`_
`_
`Decomposition of an IPv6 address from
`hexadecimal representation to its binary value.
`
`The intent of the new design was not to provide just a
`sufficient quantity of addresses, but also redesign routing in the Internet by more efficient aggregation of
`subnetwork routing prefixes. This resulted in slower growth of routing tables in routers. The smallest
`possible individual allocation is a subnet for 264 hosts, which is the square of the size of the entire IPv4
`Internet. At these levels, actual address utilization rates will be small on any IPv6 network segment. The
`new design also provides the opportunity to separate the addressing infrastructure of a network segment, i.e.
`the local administration of the segment's available space, from the addressing prefix used to route traffic to
`and from external networks. IPv6 has facilities that automatically change the routing prefix of entire
`networks, should the global connectivity or the routing policy change, without requiring internal redesign or
`manual renumbering.
`
`The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where
`appropriate, to be aggregated for efficient routing. With a large address space, there is no need to have
`complex address conservation methods as used in CIDR.
`
`All modern desktop and enterprise server operating systems include native support for the IPv6 protocol,
`but it is not yet widely deployed in other devices, such as residential networking routers, voice over IP
`(VoIP) and multimedia equipment, and network peripherals.
`
`Private addresses
`
`Just as IPv4 reserves addresses for private networks, blocks of addresses are set aside in IPv6. In IPv6,
`these are referred to as unique local addresses GJLA). RFC 4193 reserves the routing prefix fcOO::/7 for this
`block which is divided into two /8 blocks with different implied policies. The addresses include a 40-bit
`pseudorandom number that minimizes the risk of address collisions if sites merge or packets are
`
`misrouted.[8]
`
`Early practices used a different block for this purpose (fec0::), dubbed site-local addresses.[9] However, the
`definition of what constituted sites remained unclear and the poorly defined addressing policy created
`ambiguities for routing. This address type was abandoned and must not be used in new systems.[10]
`
`Addresses starting with fe80:, called link-local addresses, are assigned to interfaces for communication on
`the attached link. The addresses are automatically generated by the operating system for each network
`interface. This provides instant and automatic communication between all IPv6 host on a link. This feature
`is required in the lower layers of IPv6 network administration, such as for the Neighbor Discovery Protocol.
`Petitioner, Ex. 1035, Page 5
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`5/11
`
`Petitioner, Ex. 1035, Page 5
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`Private address prefixes may not be routed on the public Internet.
`
`IP subnetworks
`
`IP networks may be divided into subnetworks in both IPv4 and IPv6. For this purpose, an IP address is
`logically recognized as consisting of two parts: the network prefix and the host identifier, or interface
`identifier (IPv6). The subnet mask or the CIDR prefix determines how the IP address is divided into
`network and host parts.
`
`The term subnet mask is only used within IPV4. Both IP Versions however use the CIDR concept and
`notation. In this, the IP address is followed by a slash and the number (in decimal) of bits used for the
`network part, also called the routing prefix. For example, an IPv4 address and its subnet mask may be
`l92.0.2.l and 255.255.255.0, respectively. The CIDR notation for the same IP address and subnet is
`l92.0.2.l/24, because the first 24 bits of the IP address indicate the network and subnet.
`
`IP address assignment
`
`Internet Protocol addresses are assigned to a host either anew at the time of booting, or permanently by
`fixed configuration of its hardware or software. Persistent configuration is also known as using a static IP
`address. In contrast, in situations when the computer's IP address is assigned newly each time, this is
`known as using a dynamic IP address.
`
`Methods
`
`Static IP addresses are manually assigned to a computer by an administrator. The exact procedure varies
`according to platform. This contrasts with dynamic IP addresses, which are assigned either by the computer
`interface or host software itself, as in Zeroconf, or assigned by a server using Dynamic Host Configuration
`Protocol (DHCP). Even though IP addresses assigned using DHCP may stay the same for long periods of
`time, they can generally change. In some cases, a network administrator may implement dynamically
`assigned static IP addresses. In this case, a DHCP server is used, but it is specifically configured to always
`assign the same IP address to a particular computer. This allows static IP addresses to be configured
`centrally, without having to specifically configure each computer on the network in a manual procedure.
`
`In the absence or failure of static or stateful (DHCP) address configurations, an operating system may
`assign an IP address to a network interface using state—less auto—configuration methods, such as Zeroconf.
`
`Uses of dynamic address assignment
`
`IP addresses are most frequently assigned dynamically on LANs and broadband networks by the Dynamic
`Host Configuration Protocol (DHCP). They are used because it avoids the administrative burden of
`assigning specific static addresses to each device on a network. It also allows many devices to share limited
`address space on a network if only some of them will be online at a particular time. In most current desktop
`operating systems, dynamic IP configuration is enabled by default so that a user does not need to manually
`enter any settings to connect to a network with a DHCP server. DHCP is not the only technology used to
`assign IP addresses dynamically. Dialup and some broadband networks use dynamic address features of the
`Point-to-Point Protocol.
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 6
`
`6/11
`
`Petitioner, Ex. 1035, Page 6
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`Sticky dynamic IP address
`
`A sticky dynamic IP address is an informal term used by cable and DSL Internet access subscribers to
`describe a dynamically assigned IP address which seldom changes. The addresses are usually assigned with
`DHCP. Since the modems are usually powered on for extended periods of time, the address leases are
`usually set to long periods and simply renewed. If a modem is turned off and powered up again before the
`next expiration of the address lease, it will most likely receive the same IP address.
`
`Address autoconfiguration
`
`RFC 3330 defines an address block, l69.254.0.0/l6, for the special use in link-local addressing for IPv4
`networks. In IPv6, every interface, whether using static or dynamic address assignments, also receives a
`local-link address automatically in the block fe80::/ 10.
`
`These addresses are only valid on the link, such as a local network segment or point-to-point connection,
`that a host is connected to. These addresses are not routable and like private addresses cannot be the source
`or destination of packets traversing the Internet.
`
`When the link-local IPv4 address block was reserved, no standards existed for mechanisms of address
`
`autoconfiguration. Filling the void, Microsoft created an implementation that is called Automatic Private IP
`Addressing (APIPA). APIPA has been deployed on millions of machines and has, thus, become a de facto
`standard in the industry. In RFC 3927, the IETF defined a formal standard for this functionality, entitled
`Dynamic Configuration ofIPv4 Link-Local Addresses.
`
`Uses of static addressing
`
`Some infrastructure situations have to use static addressing, such as when finding the Domain Name
`System (DNS) host that will translate domain names to IP addresses. Static addresses are also convenient,
`but not absolutely necessary, to locate servers inside an enterprise. An address obtained from a DNS server
`comes with a time to live, or caching time, after which it should be looked up to confirm that it has not
`changed. Even static IP addresses do change as a result of network administration (RFC 2072).
`
`Conflict
`
`An IP address conflict occurs when two devices on the same local physical or wireless network claim to
`have the same IP address - that is, they conflict with each other. Since only one of the devices is supposed
`to be on the network at a time, the second one to arrive will generally stop the IP functionality of one or
`both of the devices. In many cases with modern Operating Systems, the Operating System will notify the
`user of one of the devices that there is an IP address conflict (displaying the symptom error message[11][12])
`and then either stop functioning on the network or function very badly on the network, and the user will
`then be stumped as to how to resolve the conflict, probably considering the situation an emergency. In some
`unfortunate cases, both devices will function very badly on the network. In severe cases in which one of the
`devices is the gateway, the network will be crippled. Since IP addresses are assigned by multiple people and
`systems in multiple ways, any of them can be at fault.[13][14][15][16][17]
`
`Routing
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 7
`
`7/1 1
`
`Petitioner, Ex. 1035, Page 7
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`IP addresses are classified into several classes of operational characteristics: unicast, multicast, anycast and
`broadcast addressing.
`
`Unicast addressing
`
`The most common concept of an IP address is in unicast addressing, available in both IPv4 and IPv6. It
`normally refers to a single sender or a single receiver, and can be used for both sending and receiving.
`Usually, a unicast address is associated with a single device or host, but a device or host may have more
`than one unicast address. Some individual PCs have several distinct unicast addresses, each for its own
`
`distinct purpose. Sending the same data to multiple unicast addresses requires the sender to send all the data
`many times over, once for each recipient.
`
`Broadcast addressing
`
`In IPv4 it is possible to send data to all possible destinations ("all-hosts broadcast"), which permits the
`sender to send the data only once, and all receivers receive a copy of it. In the IPv4 protocol, the address
`255.255.255.255 is used for local broadcast. In addition, a directed (limited) broadcast can be made by
`combining the network prefix with a host suffix composed entirely of binary ls. For example, the
`destination address used for a directed broadcast to devices on the l92.0.2.0/24 network is l92.0.2.255.
`
`IPv6 does not implement broadcast addressing and replaces it with multicast to the specially-defined all-
`nodes multicast address.
`
`Multicast addressing
`
`A multicast address is associated with a group of interested receivers. In IPv4, addresses 224.0.0.0 through
`239.255.255.255 (the former Class D addresses) are designated as multicast addresses.[18] IPv6 uses the
`address block with the prefix ff00::/8 for multicast applications. In either case, the sender sends a single
`datagram from its unicast address to the multicast group address and the intermediary routers take care of
`making copies and sending them to all receivers that have joined the corresponding multicast group.
`
`Anycast addressing
`
`Like broadcast and multicast, anycast is a one-to-many routing topology. However, the data stream is not
`transmitted to all receivers, just the one which the router decides is logically closest in the network. Anycast
`address is an inherent feature of only IPV6. In IPv4, anycast addressing implementations typically operate
`using the shortest-path metric of BGP routing and do not take into account congestion or other attributes of
`the path. Anycast methods are usefiil for global load balancing and are commonly used in distributed DNS
`
`systems.
`
`Public addresses
`
`A public IP address, in common parlance, is synonymous with a globally routable unicast IP address.
`
`Both IPv4 and IPV6 define address ranges that are reserved for private networks and link-local addressing.
`The term public IP address often used excludes these types of addresses.
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 8
`
`8/11
`
`Petitioner, Ex. 1035, Page 8
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`Modifications to IP addressing
`
`IP blocking and firewalls
`
`Firewalls perform Internet Protocol blocking to protect networks from unauthorized access. They are
`common on today's Internet. They control access to networks based on the IP address of a client computer.
`Whether using a blacklist or a whitelist, the IP address that is blocked is the perceived IP address of the
`client, meaning that if the client is using a proxy server or network address translation, blocking one IP
`address may block many individual computers.
`
`IP address translation
`
`Multiple client devices can appear to share IP addresses: either because they are part of a shared hosting
`web server environment or because an IPv4 network address translator (NAT) or proxy server acts as an
`intermediary agent on behalf of its customers, in which case the real originating IP addresses might be
`hidden from the server receiving a request. A common practice is to have a NAT hide a large number of IP
`addresses in a private network. Only the "outside" interface(s) of the NAT need to have Intemet-routable
`addresses.[19]
`
`Most commonly, the NAT device maps TCP or UDP port numbers on the side of the larger, public network
`to individual private addresses on the masqueraded network.
`
`In small home networks, NAT functions are usually implemented in a residential gateway device, typically
`one marketed as a "router". In this scenario, the computers connected to the router would have private IP
`addresses and the router would have a public address to communicate on the Internet. This type of router
`allows several computers to share one public IP address.
`
`Diagnostic tools
`
`Computer operating systems provide various diagnostic tools to examine their network interface and
`address configuration. Windows provides the command—line interface tools ipconfig and netsh and users of
`Unix-like systems can use ifconfig, netstat, route, lanstat, fstat, or iproute2 utilities to accomplish the task.
`
`See also
`
`IP address location
`
`Hierarchical name space
`Hostname: a human-readable alpha-numeric designation that may map to an IP address
`IP address spoofing
`IP aliasing
`IP blocking
`IP Multicast
`
`IPv4 subnetting reference
`IPv6 subnetting reference
`List of assigned /8 IPv4 address blocks
`MAC address
`
`Ping (networking utility)
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 9
`
`9/1 1
`
`Petitioner, Ex. 1035, Page 9
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`I Private network
`
`I Regional Internet Registry
`I Subnet address
`
`I Virtual IP address
`
`I WHOIS
`
`References
`
`1. RFC 760, DOD Standard Internet Protocol (January 1980)
`2. RFC 791, Internet Protocol — DARPA Internet Program Protocol Specification (September 1981)
`3. RFC 1883, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden (December 1995)
`4. RFC 2460, Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden, The Internet Society
`(December 1998)
`5. Smith, Lucie; Lipner, Ian (3 February 2011). "Free Pool of IPv4 Address Space Depleted". Number Resource
`Organization. Retrieved 3 February 2011.
`6. ICANN,nanog mailing list. "Five /8s allocated to RIRs — no unallocated IPV4 unicast /8s remain".
`7. Asia-Pacific Network Information Centre (15 April 2011). "APNIC IPv4 Address Pool Reaches Final /8".
`Retrieved 15 April 2011.
`8. RFC 4193 section 3.2.1
`
`9. RFC 3513
`
`10. RFC 3879
`
`11. "Event ID 4198 — TCP/IP Network Interface Configuration". Microsoft. 7 January 2009. Retrieved 2 June 2013.
`"Updated: January 7, 2009"
`12. "Event ID 4199 — TCP/IP Network Interface Configuration". Microsoft. 7 January 2009. Retrieved 2 June 2013.
`"Updated: 7 January 2009"
`13. Mitchell, Bradley. "IP Address Conflicts - What Is an IP Address Conflict?". About.com. Retrieved
`23 November 2013.
`
`14. Kishore, Aseem (4 August 2009). "How to Fix an IP Address Conflict". Online Tech Tips Online-tech-tips.com.
`Retrieved 23 November 2013.
`
`15. "Get help with "There is an IP address conflict" message". Microsoft. 22 November 2013. Retrieved
`23 November 2013.
`
`16. "Fix duplicate IP address conflicts on a DHCP network". Microsoft. Retrieved 23 November 2013. Article ID:
`133490 — Last Review: 15 October 2013 - Revision: 5.0
`
`17. Moran, Joseph (1 September 2010). "Understanding And Resolving IP Address Conflicts - Webopedia. com".
`Webopedia.com. Retrieved 23 November 2013.
`18. RFC 5771
`
`19. Comer, Douglas (2000). Internetworking with TCP/IP:Principles, Protocols, and Architectures — 4th ed. Upper
`Saddle River, NJ: Prentice Hall. p. 394. ISBN 0-13-018380-6.
`
`External links
`
`IP (https://www.dmoz.org/Computers/Intemet/Protocols/IP) at DMOZ
`"Understanding IP Addressing: Everything You Ever Wanted To Know" (PDF). Archived from the
`original (PDF) on 21 August 2010.
`
`Retrieved from "https://en.wikipedia.org/w/index.php?title=IP_address&oldid=696269758"
`
`Categories: Network addressing I Internet Protocol
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 10
`
`10/11
`
`Petitioner, Ex. 1035, Page 10
`
`

`
`1/26/2016
`
`IP address - Wikipedia, the free encyclopedia
`
`I This page was last modified on 22 December 2015, at 01:09.
`I Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may
`apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a
`registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
`
`https://en.wi ki pedia.org/wiki/|P_address
`
`Petitioner, Ex. 1035, Page 11
`
`11/11
`
`Petitioner, Ex. 1035, Page 11

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket