Apple, Inc. v. Motorola, Inc. et al
Filing
92
Declaration of Christine Saunders Haskett filed by Plaintiffs Apple, Inc., NEXT SOFTWARE, INC. re: 90 Motion Requesting Claims Construction (Attachments: # 1 Ex. 1 Moto Infring. Cont. Ex. A, # 2 Ex. 2 '157 patent, # 3 Ex. 3 '179 patent, # 4 Ex. 4 '329 patent, # 5 Ex. 5 '230 file history, # 6 Ex. 6 Oxford dictionary definition, # 7 Ex. 7 '559 file history, # 8 Ex. 8 The OSI Model, # 9 Ex. 9 ISO Standard, # 10 Ex. 10 Japanese file history, # 11 Ex. 11 Japanese prosecution appeal, # 12 Ex. 13 Moto Infring. Cont. Ex. E, # 13 Ex. 14 IEEE Standard, # 14 Ex. 15 '333 patent, # 15 Ex. 16 '721 file history, # 16 Ex. 17 '193 file history, # 17 Ex. 18 Moto Infring. Cont. Ex. F, # 18 Ex. 19 Merriam Webster Dictionary, # 19 Ex. 20 Webster's Dictionary) (Haslam, Robert)
EXHIBIT 8
The OSI Model — Learning & Scholarly Technologies
Networking
Introduction
Transmission
Mediums
Home Network
The OSI Model
Page 1 of 2
Share this page
This section serves as an introduction to the International
Components
Standards Organization/Open System Interconnection
(ISO/OSI) model. You do not need to understand the OSI
Wireless
model in order to build a home network. However, it can be
Encryption
helpful to have a basic understanding of how your network
Protocol
Windows
works in order to troubleshoot future problems. We designed
this section with more advanced users in mind.
Macintosh OS X
The OSI Model
Home Network
Terms
Standard Cat-5
Wiring Schemes
Making Cat-5
Cable
The OSI model defines a networking framework for
implementing protocols according to seven layers. Each layer
is functionally independent of the others, but provides
services to the layer above it and receives services from the
layer below it. The seven OSI layers are explained in more
detail below.
APPLICATION
The Application layer is the layer at which applications access
network services. This layer represents the services that
directly support applications such as software for file
transfers, database access, email, and network games.
PRESENTATION
The Presentation layer translates data from the Application
layer into a network format (and vice-versa). This layer also
manages security issues by providing services such as data
encryption and compression.
http://www.washington.edu/lst/help/computing_fundamentals/networking/osi/
6/15/2011
The OSI Model — Learning & Scholarly Technologies
Page 2 of 2
SESSION
The Session layer allows applications on different computers
to establish, use, and end a session/connection. This layer
establishes dialog control between the two computers in a
session, regulating which side transmits, and when and how
long it transmits.
TRANSPORT
The Transport layer handles error recognition and recovery.
It also repackages long messages when necessary into small
packets for transmission and at the receiving end, rebuilds
packets into the original message. The receiving Transport
layer also sends receipt acknowledgments.
NETWORK
The Network layer addresses messages and translates logical
addresses and names into physical addresses. It also
determines the route from the source to the destination
computer and manages traffic problems (flow control), such
as switching, routing, and controlling the congestion of data
packets.
DATA LINK
The Data Link layer packages raw bits from the Physical layer
into frames (logical, structures packets for data). This layer
is responsible for transferring frames from one computer to
another, without errors. After sending a frame, it waits for an
acknowledgment from the receiving computer.
PHYSICAL
The Physical layer transmits bits from one computer to
another and regulates the transmission of a stream of bits
over a physical medium. This layer defines how the cable is
attached to the network adapter and what transmission
technique is used to send data over the cable.
Back
Next: Home Network Terms
http://www.washington.edu/lst/help/computing_fundamentals/networking/osi/
6/15/2011
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?