throbber
NEWTl||\l’S
` TELEBUM
`nrcrlcmlnr
`
`T The Official Dictionary of Telecommunications
`Computer Telephony, Data Communications
`Internet Telephony, Voice Processing
`Windows 95 & NT Communications
`
`LAN, WAN and Wireless Networking
`
`—f_/'°\\/~\\/"§\’,_r__y
`, T-
`,\L.7
`srnrnc
`
`MPHJ 2009
`
`1
`
`

`
`.
`
`NEWTON’S TELECOM DICTIONARY
`
`Firs
`i.e.-
`
`ly an
`day:
`Iette
`I wr
`grov
`won
`worl
`Fort
`free
`N01
`com
`1. ‘I
`spes
`mak
`tech
`new
`
`2. It
`the‘
`setti
`SCS
`to D
`opel
`Stan
`excl‘
`ielei
`3. ll
`beer
`Ausl
`golf0a
`
`0i ii
`W
`”‘“"
`‘"0"
`4; It
`gills"res
`‘W513
`
`Nm
`
`you
`
`NEWTON'S TELECOM DICTIONARY
`
`A Flatiron Publishing, Inc. Book
`copyright © 1996 Harry Newton
`published by Flatiron Publishing, Inc.
`
`All rights reserved under international and Pan-American Copyright conventions, including the
`right to reproduce this book or portions thereof in any form whatsoever. Published in the United
`States by Flatiron Publishing, lnc., New York.
`
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-300-999-0345
`1-800-LIBRARY
`Email harrynewton@mcimail.com
`ISBN # 0-936648-87-2
`July, 1990
`Manufactured in the United States of America
`
`
`
`
`
`Eleventh Edition
`Cover design by Mara Seinfeld
`Printed at Command Web, New Jersey
`
`
`
`2
`
`

`
` rS rC r3 r
`
`r3 sA (
`
`IpA .
`
`5
`_='u
`
`5S-§f.§9~.E“é'88n'?8,§.§"8§k§5§.%-EH85-E54-9.:r§sa35ex-;Ua5§r.2=E:;>----r_>su
`
`NEWTON'S TELECOM DICTIONARY
`
`APPC/PC An IBM product that implements APPC on a PC.
`Appearance Usually refers to a private branch exchange line or extension which is on (i.e. “appears") on a multi-button key
`telephone. For example, extension 445 appears on three key systems.
`Appearance Test Point The point at which a circuit may be measured by test equipment.
`Append To add the contents of a list, or file, to those of another.
`APPGEN A shortened form of the words APPlications GENerator.
`Apple Computer, Inc., Cupertino, CA. Manufacturer of personal computers. Heavy penetration in the graphics/desktop
`lp/rirblishing business. Apple was formed on April Fool's Day, 1976, by Steve Wozniak and Steve Jobs, aided greatly by Mike
`arkku a.
`Apple Desktop Bus The interface on a Mac where non—peripheral devices, such as the keyboard, attaches. A Mac keyboard
`or mouse is called an ADB device. Contrast with peripherals, which attach through the SCSI interface. See also USB, which isa
`new bus for use on PCs but fulfilling essentially the same function as the Apple Desktop Bus.
`Apple Desktop Interface ADI. A set of user-interface guidelines, developed by Apple Computer and published by
`Addison-Wesley, intended to ensure that the appearance and operation of all Macintosh applications are similar.
`Apple Menu The Apple icon in the upper left hand corner of the Apple Macintosh screen. The Apple menu contains aliases.
`control panels, the chooser and other desk accessories.
`Apple Pie Both an American icon, and the name chosen for Apple Computer's Personal Interactive Electronics (PIE) division
`chartered with extending the company into new growth areas such as Personal Digital Assistants (PDAs), e.g. the Apple Newton,
`The PIE division includes Apple Online Services, Newton and Telecommunications group, publishing activities, and Scriptx.
`based multimedia PDA development.
`Apple Remote Access ARA is Apple Computer's dial—in client software for Macintosh users allowing remote access to Apple
`and third party servers.
`Apple IIRP Apple Update Routing Protocol. The network routing protocol developed by Apple for use with Appletalk.
`Applesltare Apple Computer's local area network.
`It uses AppleTalk protocols. AppIeShare is Apple system software that
`allows sharing of files and network services via a file server in the Apple Macintosh environment. See APPLETALK.
`Applet A small application that performs a specific task, such as the Cardfile and Calculator in Microsoft Windows. See also JAVA
`AppleTalk Apple Computers proprietary networking protocol for linking Macintosh computers and peripherals, especially
`printers. This protocol is independent of what network it is layered on. Current implementations exist for LocalTalk (230.4 Kbps)
`and EtherTalk (10Mbps).
`AppleTalk Zone and Device Filtering Provides an additional level of security for AppleTalk networks. On AppIeTallr
`networks, network managers can selectively hide or show devices and/or zones to ARA clients. See ARA.
`Application A software program that carries out some useful task. Database managers, spreadsheets, communications pack-
`ages, graphics programs and word processors are all applications.
`Application Binary lntertace ABI. The rules by which software code is written to operate specific computer hardware.
`Application software, written to conform to an ABI, is able to be run on a wide variety of system platforms that use the comput-
`er hardware for which the ABI is designed.
`Application Bridge Aspect Telecommunications‘ ACD to host computer link. Originally it ran only over R2—232 serial con
`nections, but it now runs over Ethernet, using the TCP/IP link protocol. See also OPEN APPLICATION INTERFACE.
`Application Class An SCSA term. A group of client applications that perform similar services, such as voice messaging or
`fax—back services.
`Application Equipment Module AEM. A Northern Telecom term for a device within the Meridian 1 Universal Equipment
`Module that supports Meridian Link Modules. The Meridian Link Module (MLM) is an Application Module, specially configured
`to support the Meridian Link interface to host computers.
`Application For Service A standard telephone company order form that includes pertinent billing, technical and other
`des(cjriptive information which enables the company to provide communications network service to the customer and its authrr
`rrze users.
`Application Framework This usually means a class library with a fundamental base class for defining a complete program.
`The framework provides at least some of the facilities through which a program interfaces with the user, such as menus and win
`dows, in a style that is internally consistent and abstracted from the specific environment for which it has been developed.
`This is an explanation I received from Borland. I don't quite understand it, yet. An application framework is an object—oriented
`class library that integrates user-interface building blocks, fundamental data structures, and support for object—oriented inplt
`and output. It defines an application's standard user interface and behavior so that the programmer can concentrate on imple
`menting the specifics of the application. An application framework allows developers to reuse the abstract design of an entire
`application by modeling each major component of an applications as an abstract class.
`Application Generator AG. A program to generate actual programming code. An applications generator will let you pro-
`duce software quickly, but it will not allow you the flexibility had you programmed it from scratch. Voice processing "applica—
`tions generators," despite the name, often do not generate programming code. Instead they are self-contained environments
`which allow a user to define and execute applications. They are more commonly called applications generator, since one gener-
`ator can define and execute many applications. See APPLICATIONS GENERATOR for a longer explanation.
`Application Module A Northern Telecom term for a computer that can be attached to a Northern Telecom phone system and
`add intelligence and programmability to the phone system. Often, the AM will be a computer conforming to open standards, sud’
`as DOS or Windows, or it may be VME—based.
`Application Module link AML. A Northern Telecom internal and proprietary link that connects the Meridian 1 (via EDS '
`or MSDL port) to the Meridian Link Module.
`
`
`
`
`
`44
`
`
`
`3
`
`

`
`ICTIONARY
`
`NEWl0N'S TELECOM DICTIONARY
`
`sion which is on (i.e. "appears") on a multi—button key
`
`red by test equipment.
`
`zomputers. Heavy penetration in the graphics/desktop
`Steve Wozniak and Steve Jobs, aided greatly by Mikg
`
`avices, such as the keyboard. attaches. A Mac keyboard
`:h through the SCSI interface. See also USB, which is a
`e Apple Desktop Bus.
`es, developed by Apple Computer and published by
`Jf all Macintosh applications are similar.
`le Macintosh screen. The Apple menu contains aliases,
`
`mputer's Personal Interactive Electronics (PIE) division,
`rsonal Digital Assistants (PDAs), e.g. the Apple Newton.
`imunications group, publishing activities, and ScriptX-
`
`are for Macintosh users allowing remote access to Apple
`
`ocol developed by Apple for use with Appletalk.
`k protocols. AppleShare is Apple system software that
`e Macintosh environment. See APPLETALK.
`lfile and Calculator in Microsoft Windows. See also JAVA
`iking Macintosh computers and peripherals, especially
`Zurrent implementations exist for LocalTalk (230.4 Kbps)
`
`_
`
`5
`
`'
`
`I level of security for AppleTalk networks. On AppleTalk ,
`or zones to ARA clients. See ARA.
`atabase managers, spreadsheets, communications pack I
`
`',
`2 code is written to operate specific computer hardware.
`a wide variety of system platforms that use the comput- .-
`iputer link. Originally it ran only over R2—232 serial con-
`. See also OPEN APPUCATION INTERFACE.
`iat perform similar services, such as voice messaging or
`n for a device within the Meridian 1 Universal Equipment
`ile (MLM) is an Application Module, specially configured
`
`t
`
`I
`
`;
`form that includes pertinent billing, technical and other
`inications network service to the customer and its authe 1
`l fundamental base class for defining a complete program E
`program interfaces with the user, such as menus and win
`(-
`ecific environment for which it has been developed.
`id it, yet. An application framework is an object—oriented E.
`tal data structures, and support for object—oriented inpiil
`t-
`iavior so that the programmer can concentrate on imple ~
`lows developers to reuse the abstract design of an entire
`an abstract class.
`amming code. An applications generator will let you prtr
`programmed it from scratch. Voice processing “appliia
`ning code. Instead they are self-contained environments
`:ommonly called applications generator, since one gener-
`iENERATOR for a longer explanation.
`: can be attached to a Northern Telecom phone system and
`lM will be a computer conforming to open standards, sucli
`
`‘
`
`id proprietary link that connects the Meridian 1 (via EDSl
`
`$:§i|(§;h.£toi;tCProgram A computer software program designed for a specific job, such as word processing, accounting,
`Erggzgsrihgsformalized software calls and routines that can be referenced by an appli-
`5 piiculion Programming interface API. A set of functions and. values used by one program to communicate with
`another p;9Ql3"'lh°l ¥’_'|”‘ 5/3h“ léléesli/ihlllllg Sllihlfhrn. Seet_APl fer a better explanation.
`app iea ion 1-0 I e s
`e
`. erm.
`I escripion o the kinds of resources and services required by a client application (or
`an applfi;e)lEi30allbe2E|3E1§)ShJ|AhGl|
`rsldeftined once for an instance of an.application;_ then system services such as the
`§CR mafia“ same Heme” ASE A Sig: iithn l?grIrlh0lJAI thedailiplication having to state its needs explicitly.
`pp S {ems hherchhhechoh) hhocohst
`k S g g A
`. mo u e or portion of a protocol in the application layer? of the OSI
`(open ysh. h 0 gist of th MieSE M ac .
`evera
`SEs_are usually combined to form a complete protocol, e.g., the X.40O P1
`protoc_ol W.lC g nflws I.
`he h
`h (
`e/egege Transfer Service Element), and the RTSE (Reliable Transfer Service Element).
`Appliculihgn he
`ufeh rllsgih are
`.TheApplication Software interface is a product of the Application Software Interface
`igxpert Wor ing
`ro_up o
`e
`lmplementors Workshop.‘The interface focuses on the definition of a common application
`e
`‘
`interface ferhaihcceesinghehd adhninistering ISDN services_provided.by hardware commonly referred to in the vendor community
`ghakriggaiéeirsticsaop %:iSs(Ap;|)icaafhohefifiglflfggelg eéiplications requirements generated by the ISDN Users Workshop (IUW). The
`' Portable across the broadest range of system architectures;
`.
`' Extensible (their words, not mine)
`' Abstracted beyond ISDN to facilitate interworking;
`' Defined in terms of services and facilities consistent with OSI layer interface standards.
`;geA§gJr|‘l/Eiihérlhihlst)grEjO:§;I;|l::;gg8:E;gEFEh: primary goal ofthe ASI is to provide a consistent set of application soft-
`0
`rate across a broad range of ISDN Vendor mdhetsacedimp tementatiTon agreement(s) in order that an ‘ISDN application may
`mpeents will be referenced by (and tested a aingt) the lU3lrl]
`lgSN0trlmS' he application Software mrfape lmplgment-mien agree-
`the vendor Companies hh/oh/ed in the deéielo mm of th (
`e
`I sers Workshop) generated applications. it is anticipated that
`marketplace which conform to them As] hh h£:mehhh_
`/ese imp ementation agreements will build products for the ISDN user
`hhmessmg Standard (HPS).
`.
`p
`ion greements are likely to become a US Government Federal Information
`Applications Engineering Applications engineering is the process of analyzing your telephone network to find
`.
`.
`.
`.
`.
`,
`.
`.
`products and
`.
`f.i‘lé°§3ll‘S‘i“3'l;%‘l§S.%l23li'l23l?l B2le“"§l28ll.2t%’l"%l2% ?§%”p‘3’l§“n?!lllr ll§t.”n3§satl5é”J“'e is °“'l”‘~i-‘“" ‘e'e"“°“" °°”“’a'
`.
`.
`.
`,
`-
`h
`.
`se 0 app ica ions engineering con-
`celxehmple. putting DlDs onto a T1 will save you money and provide your network
`Their main goal is not to save you money but father togill?$§35Hneg§§n?3§§yb;¥$refi§i;e£i'iig?§rcomtiiany or byl’tlr<]el” faleii agents‘
`.
`.
`1
`h
`.
`‘ore.
`ey_are uni ey oa vise you
`.
`.
`-
`.
`Slsalllliléiufl%tflié’L%‘3lt$£lll‘€§‘3§£"’fl§“l,?L3ii'l;°‘i;.i‘
`llti ir‘l§'l%i2§l‘ Sl§l“3§le“l"lri”°il'“i’°” “lit” 5‘ °-°”ll“'ili °°s‘ “““'V'
`.
`.
`..
`:
`,
`-
`.
`e
`rea -even a e is
`e
`ate that your
`_
`?:lhlhlhl;lilz’uS:i\I'|hf:hgs0llGS:I:‘the.ihri‘i,t:_al/hcr1or/ihverlshpareighst of the!serihiiée. it is often used synonymously with the term break-even point.
`Computer can understand In simple ttlgtrms h isgseoheha orth 1) re a software tool that,‘ in response to your input, writes code a
`1. They Save hme You Ca-h wrhe sohware faster 2 hege
`a wrrifes eottware. Applications generators have three major benefits:
`he used by non—programmers Applications generatorsyhggeptfwoegistadvlantflesjelmoT[hSetrc1tt)|d]g Sin applldanoni 3ftThey can One“
`-
`I
`h
`'
`y
`_
`h
`.
`.
`ey pro uce is o_ en not as effi-
`'"
`voice response units to mainframe databases yr,/oieze mltgssoao "SI pmvltdmg support tor specmc applications’ such as connecting
`lging sys ehm development, audiotex system development, etc. There
`are simple AGS There are commex AGS Thefe are 8
`ASS There are GUI based AGS In resehmhih Aesgtneratpurpose Gs. There are specialized AGs. There are character-based
`found three dmereht levels of AC Dacha es Fem m o wri etihomputer telephony and interactive voice response applications, I
`30llWare. but they allow you to tweak exigting applicafitgnabloclfss$lrie?e's]?iro_gtE:n]1epili?ir {"flieirfi::°r'S' Thety dqm lreauy Create new
`they often lack database and host connectivity). Then there are the prett GUI form -bg
`d
`y re We ty slmp 8 to use though
`ing a call-flow picture using either pretty icons or eas
`to und
`t
`d ty
`5
`age
`imp genS"T‘hey'usua“y entail bulld-
`compile it and actually “generate” new software The ¥
`erg an ' emplam when you re done mung In 3” the blanks‘ you
`Parity Software Shh Francisco heal hm rammehs hi ythe vehy cute. Finally, theres the script level language of a company like
`complex apps (with T-1/ISDN 'ANl hostgconnection gspelzch rgtggtfiiiitffiiel3ri%lY§%firi§r3a%;%tr g?Cvv)e;:lrJ]'(|jl
`Fordvfiiy
`powe
`...
`.1
`I
`I
`I,‘
`I
`h
`e
`hhag; and (§;3l(t|g)(l)|)lIy of a script language. Most of the better GUI application generators let you drop down to a script-level lan-
`5PP|i¢uli
`l.
`Th
`'
`-
`.
`.
`of the hhehghgharéehdaressgyghmzzhhflh lleyseh ofl ghee} Systems lrliterconnection (OSI) data communications model
`Xilthh other applications or nodes File transfer and electronic mail:vgtgrk fiiigrg |l?aEyiit:nSSe(e):r(;1S()ldll3AS0Eg|E)Ev|ng them to communicate
`list‘
`I!
`-
`-
`.'
`on mi: sr:it:'::i:etli°:h:trtarsal:’:tttr."s:.i:r;i‘iei°t*::t.:3’i3a"i f”'°.~" ll-'"
`t°”“S” ‘°
`Wk Wm
`.
`'
`v
`_
`,
`,
`a
`pp ica ions
`ar ner
`rogram to
`hhplhlhhetgnhfiarhihieitiaePrtegéagns ane disthi_bihte their products. See also DESKTOP CONNECTION.
`p
`ompu er w ic
`attaches to a telephone system and allows it (and the people
`p
`usingitt
`‘
`u
`-
`-
`1|
`.
`.
`.
`.
`,
`,
`_
`tehh. Sgethlitsehrfebnhdhfherent applications, such as voice mail, electronic mail or packet switching. We think AT&T invented the
`
`45
`
`
`
`4
`
`

`
`
`
`terminal equipment and the interconnecting lines.
`'
`Proterted (node A computer's operating mode that is capable of addressing extended mem y directly. The operat'
`
`of 2 to the power of 24 is equal to 16,777,316 unique memory addresses. Each memory address can sto
`tion (16,777,216 bytes equals 16MB). Protected mode operation also makes it possible to run more than
`.3.
`and to handle more processes because more memory is available. Processes can be requests from an
`application to perform disk I/O, memory management, printing, or other functions. Processes are assigned priority numbers if
`
`protected mode. The processor gives priority to those with higher numbers. Operating system processe
`
`ority than application processes. See also REAL MODE and VIRTUAL 8086 MODE.
`
`NEWTON'S TELECOM DICTIONARY
`
`Proshare An lntel hardware/software combination that uses phone lines (analog and ISDN digital) to do collaborative com ‘
`
`
`
`
`'-?.§3_§_E13»;fl_?_§_33a;.'._a§=3.-'—':.:"—;ma-32::
`
`
`
`,
`
`
`
`
`
`tion is now moot, since the charges and the devices no longer exist, except in a museum or attached to very old
`
`also PROTECTIVE COUPLING ARRANGEMENT and PCA.
`.
`-.
`
`Protective Coupling Arrangement PCA. A device placed between the phone company's trunks and your particular!!!-‘
`_
`phone gadget. The objective of the PCA is to isolate the telephone company's lines from your equipment and thus proteclfltfl
`'.
`--
`lines from your equipment. The device is not needed if your equipment has passed FCC approval — under Part 68 of theft}?! -
`'
`
`
`rules. See also PROTECTIVE CONNECTIVE ARRANGEMENT. which is another term for the same thing.
`
`Protector Block A device interconnected to an exchange access line to protect the connected equipment from over- «~-
`and/or over—current of 600 volts or greater. Hazardous voltages and currents are shunted to ground.
`.,
`PROIEL PRocedure Oriented Type Enforcing Language. Protel is a block
`pe—enforcing, high level, software A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`'- ;_ '
`.
`I
`ge of data. A protocol is a specific set of rules, procedures or
`relating to format and timing of data transmission between two devices.
`standard procedure that two data devices must '
`
`protocol: character—oriented, byte-oriented and bit-oriented.
`_
`_
`'
`_.
`Protocols break a file into equal parts called blocks or packets. These packets are sent and the receiving computiff ' -"I
`
`arriving packet and sends an acknowledgement (ACK) back to the sending computer. Because modems use phone lines
`
`fer data, noise or interference on the line will often mess up the block. When a block is damaged in transit, an_err0f_
`
`purpose of a protocol is to set up a mathematical way of measuring if the block came through accurately. And if it di
`-
`.
`,
`
`distant end to re—transmit the block until it gets it right. See PROTOCOLS for a list of the more common PT°l9°°'&od ~ r
`
`Protocol Analyzer A specialized computer and/or program that hooks into a LAN and analyzes its traffic ml
`
`
`analyzers can record and display data on all levels of traffic on a LAN cable, from the lowest media access.c0fl1so“_
`
`
`NetBlOS commands and application data. They are excellent for diagnosing network problems, but they r8t1U”9
`
`
`as their data output can be obscure.
`.
`H
`
`
`Protocol Control Protocol Control is a mechanism which a given application protocol may employ I0 d91<?""'t':g“
`
`
`formance and health of the application. Example, protocol liveness may require that protocol control infomtatiqn
`In
`
`
`imum rate; some applications may become intolerable to users if they are unable to send at least at some minimum
`
`
`
`
`
`484
`
`5

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket