throbber
or kin
`
`Your introduction
`to the concepts of
`networking
`
`JoAnne Woodcock
`
`Page 1 of 15
`
`GOOGLE EXHIBIT 1026
`
`

`

`Step Up
`to Networking
`
`"!!·
`
`JoAnne Woodcock
`
`Page 2 of 15
`
`

`

`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond,Washington 98052-6399
`
`Copyright © 1999 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Woodcock, JoAnne.
`Step Up to Networking I JoAnne Woodcock.
`p. em.
`ISBN 0-7356-0572-6
`1. Computer networks.
`TK5105.5.W65 1999
`004.6--dc21
`
`I. Title.
`
`Printed and bound in the United States of America.
`
`1 2 3 4 5 6 7 8 9 MLML
`
`4 3 2 1 0 9
`
`98-55330
`CIP
`
`.;.
`
`Distributed in Canada by ITP Nelson, a division of Thomson Canada Limited .
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa(cid:173)
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at m press.microsoft.com.
`
`Macintosh is a registered trademark of Apple Computer, Inc. used under license. Active X, BackOffice,
`Microsoft, Microsoft Network, Microsoft Press, MS, MS-DOS, Outlook, Windows, and Windows NT
`are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other
`countries. Other product and company names mentioned herein may be the trademarks of their respective
`owners.
`
`The example companies, organizations, products, people, and events depicted herein are fictitious. No
`association with any real company, organization, product, person, or event is intended or should be
`inferred.
`
`Acquisitions Editor: Juliana Aldous
`Project Editor: Lynn Finnel
`
`Page 3 of 15
`
`

`

`1:
`
`·•
`
`..
`
`...
`
`·.
`
`• ,·.
`
`'
`
`.
`
`.
`CoNTENTS a.{ a· Glance· . ..
`
`~~..:_·---..... _
`
`..:...~·.&..=:-__:_:_:.~~~~-=:..:.,~.-~-; ___ •
`
`-· --
`
`.
`
`.
`
`.
`

`

`
`.... : -
`
`,.-~ ........ !_.....r.--•_._,. __
`
`.
`

`
`•
`
`1
`
`_./
`
`'
`
`.·
`
`:
`
`•
`
`. •
`
`Chapter 1
`Chapter 2
`Chapter 3
`Chapter 4
`Chapter 5
`Chapter 6
`Chapter 7
`Chapter 8
`Chapter 9
`Chapter 10
`
`Introduction
`
`Networks: Past, Present, and Future
`A Network Does ...
`Networks, NetWorks Everywhere
`Standardizing Networks
`LANs
`LAN Hardware and Software
`Larger LANs and WANs
`WAN Technologies
`The Internet and the Web
`The Basic Web
`
`Glossary
`
`Index
`
`xiii
`
`3
`21
`39
`65
`91
`127
`159
`193
`221
`243
`
`267
`
`299
`
`,;.
`
`Page 4 of 15
`
`

`


`
`TABLE oF CoNTENTS
`
`Introduction
`
`What You Will Find Here
`
`About You
`
`What's Next?
`
`Skills 2000
`
`What to Do Next
`
`Chapter 1
`
`Networks: Past, Present, and Future
`
`The Idea of a Network
`
`The Road Behind
`The 1960s
`
`Dumb Terminals and Timesharing
`
`Long-Distance Timesharing
`
`ARPANET
`
`The PC Revolution
`
`Going Global
`
`The Future
`
`Chapter 2
`
`A Network Does ...
`
`Communication First
`
`Networking in RealTime
`
`Networking Asynchronously
`
`Sharing and Distribution
`
`How Communication Needs Affect a Network
`
`Reliability
`
`Scalability
`
`Security
`Speed
`
`Chapter 3
`
`Networks, Networks Everywhere
`
`Networks As a Whole
`
`Types of Networks
`
`xiii
`
`xiii
`
`xiv
`
`XV
`
`XV
`
`xvi
`
`3
`
`4
`
`6
`6
`
`7
`9
`
`10
`
`11
`14
`
`17
`
`21
`
`21
`22
`23
`
`24
`
`27
`
`28
`
`30
`
`31
`
`35
`
`39
`
`39
`
`40
`
`~
`
`v
`
`Page 5 of 15
`
`

`

`TABLE OF CONTENTS
`
`•
`
`.
`
`.
`
`.
`
`.
`
`lANs vs. WANs
`
`Everything Starts with Computers
`
`The Shape of a Network
`
`Bus
`
`Ring
`Star
`
`How Network Traffic Gets from Here to There
`Data Packets
`
`Transmissions
`
`Chapter 4
`
`Standardizing Networks
`
`Network Models
`
`What Open Systems Interconnection Means
`
`Other Networking Models
`
`Network Models and Protocols
`
`Protocol Stacks and Suites
`
`A Quick Look at a Protocol Stack
`Where Standards Come From
`
`ANSI
`EIA
`
`IEEE
`
`IETF
`ISO
`
`ITU
`
`W3C
`
`Chapter 5
`
`LANs
`
`Variations on a LAN
`
`IEEE 802.x
`
`LLC and MAC
`
`The Standards Themselves
`
`vi
`
`45
`
`46
`
`51
`
`52
`
`53
`
`54
`55
`
`56
`
`59
`
`65
`
`65
`
`66
`
`76
`
`81
`
`82
`
`83
`
`85
`86
`
`86
`
`87
`87
`
`88
`
`88
`
`89
`
`91
`
`93
`
`94
`
`94
`
`95
`
`Page 6 of 15
`
`

`

`IEEE 802.3: Ethernet
`
`CSMA/CD.
`
`Features Common to Ethernet Networks
`
`Variations on the Ethernet Theme
`
`Buses, Rings, and Tokens
`
`Tokens and Token Passing
`
`IEEE 802.5: Token Ring
`IEEE 802.4: Token Bus
`
`ARCnet: Token Bus for LANs
`
`Other IEEE LAN Specifications
`
`IEEE 802.9: Isochronous LANs
`
`IEEE 802.11: Wireless Networks
`Leading LAN Protocols
`
`Binding
`
`TCP/IP
`
`NetBEUI
`
`DLC
`
`XNS
`
`IPX/SPX
`
`APPC
`
`Apple Talk
`
`OSI
`
`DECnet
`
`Chapter 6
`
`LAN Hardware and Software
`
`Hardware
`
`Clients and Servers
`
`Adapters
`
`Adapter Drivers
`
`NDIS and ODI
`
`Connectors
`
`.
`
`TABLE oF CoNTENTS
`
`96
`
`97
`99
`
`99
`
`104
`105
`106
`
`108
`110
`
`111
`111
`
`113
`
`115
`
`116
`116
`
`118
`
`119
`
`119
`
`121
`
`122
`
`122
`
`123
`
`124
`
`127
`
`127
`
`128
`
`128
`
`131
`
`131
`
`132
`
`-
`
`vii
`
`Page 7 of 15
`
`

`

`TABLE OF CONTENTS
`
`Cables
`
`Collection Centers and Shuttle Services
`
`Wireless Transmissions
`Software
`
`Network Operating Systems
`
`Administrative Tools
`
`Other Server Software
`
`Client Software
`
`Chapter 7
`
`Larger LANs and WANs
`
`Larger LANs
`
`Repeaters
`
`Bridges
`
`Routers
`
`Brouters
`
`Gateways
`
`~
`
`On toWANs
`
`WANs and Enterprise Networks
`Communications
`
`Modems
`
`Transmission Types
`
`Communications Carriers
`
`POTS
`
`Digital
`
`DDS
`
`ISDN
`
`T1/T3
`
`xDSL
`
`Chapter 8
`
`WAN Technologies
`
`The Way of a WAN
`
`viii
`
`136
`142
`146
`147
`148
`151
`155
`155
`
`159
`
`159
`160
`161
`163
`165
`165
`167
`168
`168
`169
`179
`184
`184
`185
`186
`186
`188
`190
`
`193
`
`193
`
`Page 8 of 15
`
`

`

`Circuit Switching
`
`Message Switching
`
`Packet Switching
`
`Connectionless and Connection-Oriented Services
`
`Types of Packet-Switching Networks
`
`Developing Technologies
`FDDI
`SO NET
`
`SMDS
`
`Chapter 9
`
`The Internet and the Web
`
`Structure of the Internet
`
`Regional and Other Networks
`
`Internet Providers
`
`Internet and Web Commonalities
`
`Domains
`
`DNS Databases and I P Addresses
`
`NSI, lANA, ICANN, and the Future
`
`Organizations and Standards Groups
`
`Internet Connections
`ppp
`
`SUP
`
`CSLIP
`
`Internet and Web Protocols and Services
`
`Search Engines and Services
`
`E-mail
`
`News
`
`Tel net
`
`MUDs, Chats, and Other Forms of Play
`
`195
`195
`196
`197
`198
`208
`209
`213
`216
`
`221
`
`222
`223
`223
`224
`224
`227
`230
`231
`232
`233
`234
`235
`235
`236
`238
`239
`240
`241
`
`-
`
`ix
`
`Page 9 of 15
`
`

`

`.
`
`.
`TABLE OF CONTENTS
`
`Chapter 10
`
`The Basic Web
`
`.
`
`.
`
`.
`
`.
`
`The Internet and the World Wide Web
`
`Web Sites
`
`Web Addresses and URls
`
`Web Browsers
`
`HTML: The Language of the Web
`
`HTTP: The Web Transport Service
`Businesses and the Web
`
`lntranets and Extranets
`
`Electronic Commerce
`
`Summing Up
`
`Glossary
`
`Index
`
`.
`· •
`
`243
`
`244
`244
`247
`248
`249
`252
`254
`254
`255
`263
`
`267
`
`299
`
`X
`
`Page 10 of 15
`
`

`

`3: Networks, Networks Everywhere
`
`which is usually installed in one of the expansion slots inside the ma(cid:173)
`chine. The network adapter card is responsible for both sending messages
`and for monitoring-"listening" to-the network for incoming messages
`addressed to the client. To actually connect the client to the network ca(cid:173)
`bling, the network adapter includes a port that accepts a cable ending in
`one of several types of connectors. Depending on the type of network, the
`connector can be a round plug known as a BNC (British Naval Connector);
`it can be a 15-pin c:ttachment unit interface (AUI) connector-a typical
`"computer"-looking connector; or it can be an Rf-45 jack similar to, but
`larger than, the connector on a telephone wire.
`
`BNC connector
`
`RJ connector
`
`AUI connector
`
`Servers
`Network servers are the behind-the-scenes workhorses that provide ser(cid:173)
`vices requested by the client computers (desktop machines and worksta(cid:173)
`tions). The servers themselves can be categorized in different ways,
`depending on the type of work they do.
`
`Dedicated and nondedicated servers First of all, servers can be classified
`as either dedicated servers or nondedicated servers.
`Dedicated servers are the (usually) quite powerful machines that power the
`network and provide resources but are never used for the tasks performed
`
`47
`
`Page 11 of 15
`
`

`

`Step Up to Networking
`
`by the client desktop PCs and workstations that request their services.
`These machines must be fast enough and powerful enough to handle mul(cid:173)
`tiple simultaneous user requests and to run a network operating system
`that provides for network security, administration, and management.
`
`Nondedicated servers, typical of peer-to-peer networks, are machines that
`are set up so they can both provide (serve) resources and do the work re(cid:173)
`quired of a client machine. These machines can, in fact, be normal desk(cid:173)
`top PCs in their day-to-day lives, as long as they run an operating system,
`such as Windows 98 or Windows NT Workstation, that gives them the
`ability to share files and resources. Specialized services, such as high(cid:173)
`level security and centralized administration and management, are notre(cid:173)
`quired on a nondedicated server.
`
`As for the actual hardware .... A nondedicated server requires less process(cid:173)
`ing power, memory, and disk storage than a dedicated server so, typically,
`it can be a machine along the lines of a Pentium-class desktop computer
`with, say, a standard serving of 32 to 64MB of RAM and a hard disk of 3GB
`or more. In contrast, a dedicated server, such as one running Windows NT
`Server, can be (and in large enterp~ises usually is) a much more powerful
`machine. In high-demand situations, as when such a server hosts a popu(cid:173)
`lar Web site or provides database access to a large number of people, the
`server might even contain eight or more Pentium II processors, or it might
`be based on a RISC (Reduced Instruction Set Computing) chip such as the
`Sun SPARC (Scalable Processor Architecture). It almost surely has large
`quantities of RAM-128 MB or more-and it might have multiple disk
`drives. It is also certain to be protected by some type of backup power sup(cid:173)
`ply and to be carefully monitored both in terms of performance and stability.
`
`Specialized servers Dedicated servers can further be classified by the
`type of work that they do. Although it's tempting to picture servers as
`simply sitting in the middle of the network somewhere, dishing up
`whatever flavor of data their clients request, such a picture would be more
`than just a little oversimplified. It's far better to think of these servers as
`specialized "chefs" in a blue-ribbon kitchen. Instead of concentrating on
`sauces, desserts, and main courses, however, these servers are equipped
`with specialized software services (often, though confusingly, also called
`
`..
`
`48
`
`Page 12 of 15
`
`

`

`3: Networks, Networks Everywhere
`
`servers) that enable them to concentrate on serving up access to: files,
`printers, applications, mail, faxes, communications, and even backup
`services to guard the network's invaluable data stores. Here's a closer look
`at these jobs and what they entail:
`
`• File servers store whole files. When a client requests a particular
`file from a file server, the server transfers the entire document to the
`client. Note that the server does no processing of its own; all the
`processing is done by an application rurining on the computer that
`requests the file. In other words, processing is done at the front end
`(the desktop), rather than the back end (the server). As shown in
`Figure 3-1, the file server in effect serves as a document library, one
`that "checks out" files to its clients when asked to do so.
`
`• Print servers provide access to one or more attached printers.
`Sometimes, the same server acts as both a file server and a print
`server. In other situations, which may be based on the networking
`software that oversees these services, the print server is a machine
`dedicated solely to printing.
`
`• Application servers have a somewhat misleading name. Although
`it sounds as though they're dedicated to handing out applications to
`clients, in fact they are not. Their job is to store information, such as
`databases, and to perform back-end processing on that information
`
`File
`server
`
`Figure 3-1.
`
`A file server delivers whole documents to its clients.
`
`49
`
`Page 13 of 15
`
`

`

`Step Up to Networking
`
`in order to deliver only the portion of data the client requests. In
`other words, the application server runs an application to sift
`through the entire mass of data it holds and find what the client
`wants. The server then delivers just that portion of the data to the
`client's desktop. As shown in Figure 3-2, the fact that an application
`server processes information before delivery to the desktop distin(cid:173)
`guishes it from a file server.
`
`• Mail servers operate as the network postal service. They provide a
`centralized post office for message handling and storage, and they
`work to deliver mail messages to network users, either immediately
`or, as in the case of remote users, on a "when I ask for it" basis. De(cid:173)
`pending on the size of the installation, a mail server can be dedi(cid:173)
`cated only to messaging or (in smaller environments) it can perform
`other duties as well.
`
`• Fax servers are computers equipped with fax/modem boards. As
`you would imagine, they handle incoming and outgoing faxes for
`the organization.
`
`• Communication servers coordinate traffic. Although their name
`suggests some type of messaging service, communication servers ac(cid:173)
`tually handle traffic between the network they serve and other locations,
`including other networks, mainframe computers, and users dialing
`
`Application
`server
`
`Figure 3-2.
`
`An application server delivers requested portions of its data to its clients.
`
`50
`
`Page 14 of 15
`
`

`

`-
`
`3: Networks, Networks Everywhere
`
`into or out of the organization. Gateways, which you'll meet later,
`are a type of communication server.
`
`• Backup servers concentrate on preserving data. With the help of
`backup software and storage media, such as disk or tape, they have
`the ability to perform regularly scheduled backups to archive data
`and thus safeguard the network's store of information.
`
`The Shape of a Network
`The shape, or more technically the topology, of a network refers to the way
`the computers are cabled together. There are three basic designs that net(cid:173)
`works follow, known as bus (essentially a straight line), ring, and star. Al(cid:173)
`though the actual, physical shape of the network might not bear much, if
`any, resemblance to a line, a ring, or a star if you could peer down on them
`from above, the actual connections logically, if not physically, correspond
`to these shapes. That is, network traffic does, indeed, travel in a line, a
`loop, or outward in a starlike pattern. To help you see how this works, the
`following illustration shows a network based on a ring topology in which
`computers are connected one to the other in a closed loop. If you imagine
`these computers as being in different offices or even on different floors of
`a building, you can see that the network might not physically resemble a
`ring, but the logical connections do, indeed, form a closed circle.
`
`~
`
`51
`
`Page 15 of 15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket