` TELEBUM
`nrcrlcmlnr
`
`T The Official Dictionary of Telecommunications
`Computer Telephony, Data Communications
`Internet Telephony, Voice Processing
`Windows 95 & NT Communications
`
`LAN, WAN and Wireless Networking
`
`—f_/'°\\/~\\/"§\’,_r__y
`, T-
`,\L.7
`srnrnc
`
`MPHJ 2009
`
`1
`
`
`
`.
`
`NEWTON’S TELECOM DICTIONARY
`
`Firs
`i.e.-
`
`ly an
`day:
`Iette
`I wr
`grov
`won
`worl
`Fort
`free
`N01
`com
`1. ‘I
`spes
`mak
`tech
`new
`
`2. It
`the‘
`setti
`SCS
`to D
`opel
`Stan
`excl‘
`ielei
`3. ll
`beer
`Ausl
`golf0a
`
`0i ii
`W
`”‘“"
`‘"0"
`4; It
`gills"res
`‘W513
`
`Nm
`
`you
`
`NEWTON'S TELECOM DICTIONARY
`
`A Flatiron Publishing, Inc. Book
`copyright © 1996 Harry Newton
`published by Flatiron Publishing, Inc.
`
`All rights reserved under international and Pan-American Copyright conventions, including the
`right to reproduce this book or portions thereof in any form whatsoever. Published in the United
`States by Flatiron Publishing, lnc., New York.
`
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-300-999-0345
`1-800-LIBRARY
`Email harrynewton@mcimail.com
`ISBN # 0-936648-87-2
`July, 1990
`Manufactured in the United States of America
`
`
`
`
`
`Eleventh Edition
`Cover design by Mara Seinfeld
`Printed at Command Web, New Jersey
`
`
`
`2
`
`
`
` rS rC r3 r
`
`r3 sA (
`
`IpA .
`
`5
`_='u
`
`5S-§f.§9~.E“é'88n'?8,§.§"8§k§5§.%-EH85-E54-9.:r§sa35ex-;Ua5§r.2=E:;>----r_>su
`
`NEWTON'S TELECOM DICTIONARY
`
`APPC/PC An IBM product that implements APPC on a PC.
`Appearance Usually refers to a private branch exchange line or extension which is on (i.e. “appears") on a multi-button key
`telephone. For example, extension 445 appears on three key systems.
`Appearance Test Point The point at which a circuit may be measured by test equipment.
`Append To add the contents of a list, or file, to those of another.
`APPGEN A shortened form of the words APPlications GENerator.
`Apple Computer, Inc., Cupertino, CA. Manufacturer of personal computers. Heavy penetration in the graphics/desktop
`lp/rirblishing business. Apple was formed on April Fool's Day, 1976, by Steve Wozniak and Steve Jobs, aided greatly by Mike
`arkku a.
`Apple Desktop Bus The interface on a Mac where non—peripheral devices, such as the keyboard, attaches. A Mac keyboard
`or mouse is called an ADB device. Contrast with peripherals, which attach through the SCSI interface. See also USB, which isa
`new bus for use on PCs but fulfilling essentially the same function as the Apple Desktop Bus.
`Apple Desktop Interface ADI. A set of user-interface guidelines, developed by Apple Computer and published by
`Addison-Wesley, intended to ensure that the appearance and operation of all Macintosh applications are similar.
`Apple Menu The Apple icon in the upper left hand corner of the Apple Macintosh screen. The Apple menu contains aliases.
`control panels, the chooser and other desk accessories.
`Apple Pie Both an American icon, and the name chosen for Apple Computer's Personal Interactive Electronics (PIE) division
`chartered with extending the company into new growth areas such as Personal Digital Assistants (PDAs), e.g. the Apple Newton,
`The PIE division includes Apple Online Services, Newton and Telecommunications group, publishing activities, and Scriptx.
`based multimedia PDA development.
`Apple Remote Access ARA is Apple Computer's dial—in client software for Macintosh users allowing remote access to Apple
`and third party servers.
`Apple IIRP Apple Update Routing Protocol. The network routing protocol developed by Apple for use with Appletalk.
`Applesltare Apple Computer's local area network.
`It uses AppleTalk protocols. AppIeShare is Apple system software that
`allows sharing of files and network services via a file server in the Apple Macintosh environment. See APPLETALK.
`Applet A small application that performs a specific task, such as the Cardfile and Calculator in Microsoft Windows. See also JAVA
`AppleTalk Apple Computers proprietary networking protocol for linking Macintosh computers and peripherals, especially
`printers. This protocol is independent of what network it is layered on. Current implementations exist for LocalTalk (230.4 Kbps)
`and EtherTalk (10Mbps).
`AppleTalk Zone and Device Filtering Provides an additional level of security for AppleTalk networks. On AppIeTallr
`networks, network managers can selectively hide or show devices and/or zones to ARA clients. See ARA.
`Application A software program that carries out some useful task. Database managers, spreadsheets, communications pack-
`ages, graphics programs and word processors are all applications.
`Application Binary lntertace ABI. The rules by which software code is written to operate specific computer hardware.
`Application software, written to conform to an ABI, is able to be run on a wide variety of system platforms that use the comput-
`er hardware for which the ABI is designed.
`Application Bridge Aspect Telecommunications‘ ACD to host computer link. Originally it ran only over R2—232 serial con
`nections, but it now runs over Ethernet, using the TCP/IP link protocol. See also OPEN APPLICATION INTERFACE.
`Application Class An SCSA term. A group of client applications that perform similar services, such as voice messaging or
`fax—back services.
`Application Equipment Module AEM. A Northern Telecom term for a device within the Meridian 1 Universal Equipment
`Module that supports Meridian Link Modules. The Meridian Link Module (MLM) is an Application Module, specially configured
`to support the Meridian Link interface to host computers.
`Application For Service A standard telephone company order form that includes pertinent billing, technical and other
`des(cjriptive information which enables the company to provide communications network service to the customer and its authrr
`rrze users.
`Application Framework This usually means a class library with a fundamental base class for defining a complete program.
`The framework provides at least some of the facilities through which a program interfaces with the user, such as menus and win
`dows, in a style that is internally consistent and abstracted from the specific environment for which it has been developed.
`This is an explanation I received from Borland. I don't quite understand it, yet. An application framework is an object—oriented
`class library that integrates user-interface building blocks, fundamental data structures, and support for object—oriented inplt
`and output. It defines an application's standard user interface and behavior so that the programmer can concentrate on imple
`menting the specifics of the application. An application framework allows developers to reuse the abstract design of an entire
`application by modeling each major component of an applications as an abstract class.
`Application Generator AG. A program to generate actual programming code. An applications generator will let you pro-
`duce software quickly, but it will not allow you the flexibility had you programmed it from scratch. Voice processing "applica—
`tions generators," despite the name, often do not generate programming code. Instead they are self-contained environments
`which allow a user to define and execute applications. They are more commonly called applications generator, since one gener-
`ator can define and execute many applications. See APPLICATIONS GENERATOR for a longer explanation.
`Application Module A Northern Telecom term for a computer that can be attached to a Northern Telecom phone system and
`add intelligence and programmability to the phone system. Often, the AM will be a computer conforming to open standards, sud’
`as DOS or Windows, or it may be VME—based.
`Application Module link AML. A Northern Telecom internal and proprietary link that connects the Meridian 1 (via EDS '
`or MSDL port) to the Meridian Link Module.
`
`
`
`
`
`44
`
`
`
`3
`
`
`
`ICTIONARY
`
`NEWl0N'S TELECOM DICTIONARY
`
`sion which is on (i.e. "appears") on a multi—button key
`
`red by test equipment.
`
`zomputers. Heavy penetration in the graphics/desktop
`Steve Wozniak and Steve Jobs, aided greatly by Mikg
`
`avices, such as the keyboard. attaches. A Mac keyboard
`:h through the SCSI interface. See also USB, which is a
`e Apple Desktop Bus.
`es, developed by Apple Computer and published by
`Jf all Macintosh applications are similar.
`le Macintosh screen. The Apple menu contains aliases,
`
`mputer's Personal Interactive Electronics (PIE) division,
`rsonal Digital Assistants (PDAs), e.g. the Apple Newton.
`imunications group, publishing activities, and ScriptX-
`
`are for Macintosh users allowing remote access to Apple
`
`ocol developed by Apple for use with Appletalk.
`k protocols. AppleShare is Apple system software that
`e Macintosh environment. See APPLETALK.
`lfile and Calculator in Microsoft Windows. See also JAVA
`iking Macintosh computers and peripherals, especially
`Zurrent implementations exist for LocalTalk (230.4 Kbps)
`
`_
`
`5
`
`'
`
`I level of security for AppleTalk networks. On AppleTalk ,
`or zones to ARA clients. See ARA.
`atabase managers, spreadsheets, communications pack I
`
`',
`2 code is written to operate specific computer hardware.
`a wide variety of system platforms that use the comput- .-
`iputer link. Originally it ran only over R2—232 serial con-
`. See also OPEN APPUCATION INTERFACE.
`iat perform similar services, such as voice messaging or
`n for a device within the Meridian 1 Universal Equipment
`ile (MLM) is an Application Module, specially configured
`
`t
`
`I
`
`;
`form that includes pertinent billing, technical and other
`inications network service to the customer and its authe 1
`l fundamental base class for defining a complete program E
`program interfaces with the user, such as menus and win
`(-
`ecific environment for which it has been developed.
`id it, yet. An application framework is an object—oriented E.
`tal data structures, and support for object—oriented inpiil
`t-
`iavior so that the programmer can concentrate on imple ~
`lows developers to reuse the abstract design of an entire
`an abstract class.
`amming code. An applications generator will let you prtr
`programmed it from scratch. Voice processing “appliia
`ning code. Instead they are self-contained environments
`:ommonly called applications generator, since one gener-
`iENERATOR for a longer explanation.
`: can be attached to a Northern Telecom phone system and
`lM will be a computer conforming to open standards, sucli
`
`‘
`
`id proprietary link that connects the Meridian 1 (via EDSl
`
`$:§i|(§;h.£toi;tCProgram A computer software program designed for a specific job, such as word processing, accounting,
`Erggzgsrihgsformalized software calls and routines that can be referenced by an appli-
`5 piiculion Programming interface API. A set of functions and. values used by one program to communicate with
`another p;9Ql3"'lh°l ¥’_'|”‘ 5/3h“ léléesli/ihlllllg Sllihlfhrn. Seet_APl fer a better explanation.
`app iea ion 1-0 I e s
`e
`. erm.
`I escripion o the kinds of resources and services required by a client application (or
`an applfi;e)lEi30allbe2E|3E1§)ShJ|AhGl|
`rsldeftined once for an instance of an.application;_ then system services such as the
`§CR mafia“ same Heme” ASE A Sig: iithn l?grIrlh0lJAI thedailiplication having to state its needs explicitly.
`pp S {ems hherchhhechoh) hhocohst
`k S g g A
`. mo u e or portion of a protocol in the application layer? of the OSI
`(open ysh. h 0 gist of th MieSE M ac .
`evera
`SEs_are usually combined to form a complete protocol, e.g., the X.40O P1
`protoc_ol W.lC g nflws I.
`he h
`h (
`e/egege Transfer Service Element), and the RTSE (Reliable Transfer Service Element).
`Appliculihgn he
`ufeh rllsgih are
`.TheApplication Software interface is a product of the Application Software Interface
`igxpert Wor ing
`ro_up o
`e
`lmplementors Workshop.‘The interface focuses on the definition of a common application
`e
`‘
`interface ferhaihcceesinghehd adhninistering ISDN services_provided.by hardware commonly referred to in the vendor community
`ghakriggaiéeirsticsaop %:iSs(Ap;|)icaafhohefifiglflfggelg eéiplications requirements generated by the ISDN Users Workshop (IUW). The
`' Portable across the broadest range of system architectures;
`.
`' Extensible (their words, not mine)
`' Abstracted beyond ISDN to facilitate interworking;
`' Defined in terms of services and facilities consistent with OSI layer interface standards.
`;geA§gJr|‘l/Eiihérlhihlst)grEjO:§;I;|l::;gg8:E;gEFEh: primary goal ofthe ASI is to provide a consistent set of application soft-
`0
`rate across a broad range of ISDN Vendor mdhetsacedimp tementatiTon agreement(s) in order that an ‘ISDN application may
`mpeents will be referenced by (and tested a aingt) the lU3lrl]
`lgSN0trlmS' he application Software mrfape lmplgment-mien agree-
`the vendor Companies hh/oh/ed in the deéielo mm of th (
`e
`I sers Workshop) generated applications. it is anticipated that
`marketplace which conform to them As] hh h£:mehhh_
`/ese imp ementation agreements will build products for the ISDN user
`hhmessmg Standard (HPS).
`.
`p
`ion greements are likely to become a US Government Federal Information
`Applications Engineering Applications engineering is the process of analyzing your telephone network to find
`.
`.
`.
`.
`.
`,
`.
`.
`products and
`.
`f.i‘lé°§3ll‘S‘i“3'l;%‘l§S.%l23li'l23l?l B2le“"§l28ll.2t%’l"%l2% ?§%”p‘3’l§“n?!lllr ll§t.”n3§satl5é”J“'e is °“'l”‘~i-‘“" ‘e'e"“°“" °°”“’a'
`.
`.
`.
`,
`-
`h
`.
`se 0 app ica ions engineering con-
`celxehmple. putting DlDs onto a T1 will save you money and provide your network
`Their main goal is not to save you money but father togill?$§35Hneg§§n?3§§yb;¥$refi§i;e£i'iig?§rcomtiiany or byl’tlr<]el” faleii agents‘
`.
`.
`1
`h
`.
`‘ore.
`ey_are uni ey oa vise you
`.
`.
`-
`.
`Slsalllliléiufl%tflié’L%‘3lt$£lll‘€§‘3§£"’fl§“l,?L3ii'l;°‘i;.i‘
`llti ir‘l§'l%i2§l‘ Sl§l“3§le“l"lri”°il'“i’°” “lit” 5‘ °-°”ll“'ili °°s‘ “““'V'
`.
`.
`..
`:
`,
`-
`.
`e
`rea -even a e is
`e
`ate that your
`_
`?:lhlhlhl;lilz’uS:i\I'|hf:hgs0llGS:I:‘the.ihri‘i,t:_al/hcr1or/ihverlshpareighst of the!serihiiée. it is often used synonymously with the term break-even point.
`Computer can understand In simple ttlgtrms h isgseoheha orth 1) re a software tool that,‘ in response to your input, writes code a
`1. They Save hme You Ca-h wrhe sohware faster 2 hege
`a wrrifes eottware. Applications generators have three major benefits:
`he used by non—programmers Applications generatorsyhggeptfwoegistadvlantflesjelmoT[hSetrc1tt)|d]g Sin applldanoni 3ftThey can One“
`-
`I
`h
`'
`y
`_
`h
`.
`.
`ey pro uce is o_ en not as effi-
`'"
`voice response units to mainframe databases yr,/oieze mltgssoao "SI pmvltdmg support tor specmc applications’ such as connecting
`lging sys ehm development, audiotex system development, etc. There
`are simple AGS There are commex AGS Thefe are 8
`ASS There are GUI based AGS In resehmhih Aesgtneratpurpose Gs. There are specialized AGs. There are character-based
`found three dmereht levels of AC Dacha es Fem m o wri etihomputer telephony and interactive voice response applications, I
`30llWare. but they allow you to tweak exigting applicafitgnabloclfss$lrie?e's]?iro_gtE:n]1epili?ir {"flieirfi::°r'S' Thety dqm lreauy Create new
`they often lack database and host connectivity). Then there are the prett GUI form -bg
`d
`y re We ty slmp 8 to use though
`ing a call-flow picture using either pretty icons or eas
`to und
`t
`d ty
`5
`age
`imp genS"T‘hey'usua“y entail bulld-
`compile it and actually “generate” new software The ¥
`erg an ' emplam when you re done mung In 3” the blanks‘ you
`Parity Software Shh Francisco heal hm rammehs hi ythe vehy cute. Finally, theres the script level language of a company like
`complex apps (with T-1/ISDN 'ANl hostgconnection gspelzch rgtggtfiiiitffiiel3ri%lY§%firi§r3a%;%tr g?Cvv)e;:lrJ]'(|jl
`Fordvfiiy
`powe
`...
`.1
`I
`I
`I,‘
`I
`h
`e
`hhag; and (§;3l(t|g)(l)|)lIy of a script language. Most of the better GUI application generators let you drop down to a script-level lan-
`5PP|i¢uli
`l.
`Th
`'
`-
`.
`.
`of the hhehghgharéehdaressgyghmzzhhflh lleyseh ofl ghee} Systems lrliterconnection (OSI) data communications model
`Xilthh other applications or nodes File transfer and electronic mail:vgtgrk fiiigrg |l?aEyiit:nSSe(e):r(;1S()ldll3AS0Eg|E)Ev|ng them to communicate
`list‘
`I!
`-
`-
`.'
`on mi: sr:it:'::i:etli°:h:trtarsal:’:tttr."s:.i:r;i‘iei°t*::t.:3’i3a"i f”'°.~" ll-'"
`t°”“S” ‘°
`Wk Wm
`.
`'
`v
`_
`,
`,
`a
`pp ica ions
`ar ner
`rogram to
`hhplhlhhetgnhfiarhihieitiaePrtegéagns ane disthi_bihte their products. See also DESKTOP CONNECTION.
`p
`ompu er w ic
`attaches to a telephone system and allows it (and the people
`p
`usingitt
`‘
`u
`-
`-
`1|
`.
`.
`.
`.
`,
`,
`_
`tehh. Sgethlitsehrfebnhdhfherent applications, such as voice mail, electronic mail or packet switching. We think AT&T invented the
`
`45
`
`
`
`4
`
`
`
`
`
`terminal equipment and the interconnecting lines.
`'
`Proterted (node A computer's operating mode that is capable of addressing extended mem y directly. The operat'
`
`of 2 to the power of 24 is equal to 16,777,316 unique memory addresses. Each memory address can sto
`tion (16,777,216 bytes equals 16MB). Protected mode operation also makes it possible to run more than
`.3.
`and to handle more processes because more memory is available. Processes can be requests from an
`application to perform disk I/O, memory management, printing, or other functions. Processes are assigned priority numbers if
`
`protected mode. The processor gives priority to those with higher numbers. Operating system processe
`
`ority than application processes. See also REAL MODE and VIRTUAL 8086 MODE.
`
`NEWTON'S TELECOM DICTIONARY
`
`Proshare An lntel hardware/software combination that uses phone lines (analog and ISDN digital) to do collaborative com ‘
`
`
`
`
`'-?.§3_§_E13»;fl_?_§_33a;.'._a§=3.-'—':.:"—;ma-32::
`
`
`
`,
`
`
`
`
`
`tion is now moot, since the charges and the devices no longer exist, except in a museum or attached to very old
`
`also PROTECTIVE COUPLING ARRANGEMENT and PCA.
`.
`-.
`
`Protective Coupling Arrangement PCA. A device placed between the phone company's trunks and your particular!!!-‘
`_
`phone gadget. The objective of the PCA is to isolate the telephone company's lines from your equipment and thus proteclfltfl
`'.
`--
`lines from your equipment. The device is not needed if your equipment has passed FCC approval — under Part 68 of theft}?! -
`'
`
`
`rules. See also PROTECTIVE CONNECTIVE ARRANGEMENT. which is another term for the same thing.
`
`Protector Block A device interconnected to an exchange access line to protect the connected equipment from over- «~-
`and/or over—current of 600 volts or greater. Hazardous voltages and currents are shunted to ground.
`.,
`PROIEL PRocedure Oriented Type Enforcing Language. Protel is a block
`pe—enforcing, high level, software A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`'- ;_ '
`.
`I
`ge of data. A protocol is a specific set of rules, procedures or
`relating to format and timing of data transmission between two devices.
`standard procedure that two data devices must '
`
`protocol: character—oriented, byte-oriented and bit-oriented.
`_
`_
`'
`_.
`Protocols break a file into equal parts called blocks or packets. These packets are sent and the receiving computiff ' -"I
`
`arriving packet and sends an acknowledgement (ACK) back to the sending computer. Because modems use phone lines
`
`fer data, noise or interference on the line will often mess up the block. When a block is damaged in transit, an_err0f_
`
`purpose of a protocol is to set up a mathematical way of measuring if the block came through accurately. And if it di
`-
`.
`,
`
`distant end to re—transmit the block until it gets it right. See PROTOCOLS for a list of the more common PT°l9°°'&od ~ r
`
`Protocol Analyzer A specialized computer and/or program that hooks into a LAN and analyzes its traffic ml
`
`
`analyzers can record and display data on all levels of traffic on a LAN cable, from the lowest media access.c0fl1so“_
`
`
`NetBlOS commands and application data. They are excellent for diagnosing network problems, but they r8t1U”9
`
`
`as their data output can be obscure.
`.
`H
`
`
`Protocol Control Protocol Control is a mechanism which a given application protocol may employ I0 d91<?""'t':g“
`
`
`formance and health of the application. Example, protocol liveness may require that protocol control infomtatiqn
`In
`
`
`imum rate; some applications may become intolerable to users if they are unable to send at least at some minimum
`
`
`
`
`
`484
`
`5