throbber
rruacou
`DICTIIINAHY
`
`1411,0110
` utwrou’s
`
`W‘s/*1,,
`SELLER e
`
`I E
`
`' The Official Dictionary of Telecommunications
`Computer Telephony, Data Communications
`Internet Telephony, Voice Processing
`Windows 9581 NT Communications
`
`LAN, WAN and Wireless Networking
`
`MPHJ 2004
`
`1
`
`

`

`
`
`
`a
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Firs
`i.e. -
`
`Iy an
`day:
`lette
`l wr
`grov
`won
`worl
`Fort
`free
`No (
`com
`1. 1
`spes
`mak
`tech
`new
`
`2. It
`the '
`setti
`808
`to D
`opei
`Stan
`exci'
`telet
`
`3.Il
`beer
`Ausl
`Corr
`blue
`or ti
`telec
`mun
`man
`
`4. ll
`gish
`alrez
`with
`l pul
`tradi
`page
`5- N
`com
`you
`199;
`hapr
`6. TI
`matc
`
`NEWTON’S TELECOM DICTIONARY
`
`A Flatiron Publishing, Inc. Book
`copyright © 1996 Harry Newton
`published by Flatiron Publishing, inc.
`
`All rights reserved under international and Pan-American Copyright conventions, including the
`right to reproduce this book or portions thereof in any form whatsoever. Published in the United
`States by Flatiron Publishing, inc., New York.
`
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345
`1-800-LIBRARY
`Email harrynewton@mcimail.com
`
`lSBN # 0-936648-87-2
`
`July, 1996
`
`Manufactured in the United States of America
`
`Eleventh Edition
`
`Cover design by Mara Seinfeld
`Printed at Command Web, New Jersey
`
`
`
`2
`
`

`

` rS rC ra ra sA (
`
`rpA _
`
`E—\
`
`aiytnnnoty
`
`3.482354.9.:tgsaa5?.>133551
`
`Cit
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`APPC/PC An IBM product that implements APPC on a PC.
`Appearance Usually refers to a private branch exchange line or extension which is on (I.e. “appears") on a multi-button key
`telephone. For example, extension 445 appears on three key systems.
`Appearance 'l'est Point The point at which a circuit may be measured by test equipment.
`Append To add the contents of a list. or file. to those of another.
`APPGEN A shortened form of the words APPIications GENerator.
`Apple Computer, Inc., Cupertino. CA. Manufacturer of personal computers. Heavy penetration in the graphics/desktop
`publishing business. Apple was formed on April Fool's Day. 1976. by Steve Wozniak and Steve Jobs. aided greatly by Mike
`Markkula.
`
`Apple Desktop Bus The Interface on a Mac where non-peripheral devices. such as the keyboard. attaches. A Mac keybmm
`or mouse is called an ADB device. Contrast with peripherals. which attach through the SCSI interface. See also USB, which isa
`new bus for use on PCs but fulfilling essentially the same function as the Apple Desktop Bus.
`Apple Desktop Interface ADI. A set of user-interface guidelines. developed by Apple Computer and published by
`Addison-Wesley. intended to ensure that the appearance and operation of all Macintosh applications are similar.
`Apple Menu The Apple icon in the upper left hand corner of the Apple Macintosh screen. The Apple menu contains aliases.
`control panels, the chooser and other desk accessories.
`Apple Pie Both an American icon, and the name chosen for Apple Computer’s Personal Interactive Electronics (PIE) division
`chartered with extending the company into new growth areas such as Personal Digital Assistants (PDAs). eg. the Apple Newton
`The PlE division includes Apple Online Services, Newton and Telecommunications group. publishing activities. and Scriptx.
`based multimedia PDA development.
`Apple Remote Access ARA is Apple Computer's dial-in client software for Macintosh users allowing remote access to Apple
`and third party servers.
`Apple URP Apple Update Routing Protocol. The network routing protocol developed by Apple for use with Appletalk.
`AppleShare Apple Computer’s local area network.
`It uses AppleTalk protocols. AppleShare is Apple system software that
`allows sharing of files and network services via a file server in the Apple Macintosh environment. See APPLETALK.
`Applet A small application that performs a specific task. such as the Cardfile and Calculator in Microsoft Windows. See also JAVA
`AppleTalk Apple Computer’s proprietary networking protocol for linking Macintosh computers and peripherals. especially
`printers. This protocol is independent of what network it is layered on. Current implementations exist for LocaITalk (230.4 Kbps)
`and EtherTalk(10Mbps).
`AppleTalk Zone and Device Filtering Provides an additional level of security for AppleTalk networks. On AppleTaIIr
`networks. network managers can selectively hide or show devices and/or zones to ARA clients. See ARA.
`Application A software program that carries out some useful task. Database managers. spreadsheets. communications pack-
`ages. graphics programs and word processors are all applications.
`Application Binary Interface ABI. The rules by which software code is written to operate specific computer hardware.
`Application software, written to conform to an ABI. is able to be run on a wide variety of system platforms that use the comput-
`er hardware for which the ABI is designed.
`Application Bridge Aspect Telecommunications‘ AC0 to host computer link. Originally it ran only over R2—232 serial con
`nections, but it now runs over Ethernet. using the TCP/IP link protocol. See also OPEN APPLICATION INTERFACE.
`Application Class An SCSA term. A group of client applications that perform similar services. such as voice messaging or
`fax-back services.
`Application Equipment Module AEM. A Northern Telecom term for a device within the Meridian 1 Universal Equipmert
`Module that supports Meridian Link Modules. The Meridian Link Module (MLM) is an Application Module. specially configured
`to support the Meridian Link interface to host computers.
`Application For Service A standard telephone company order form that includes pertinent billing. technical and other
`desgriptive information which enables the company to provide communications network service to the customer and its autho
`nze users.
`Application Framework This usually means a class library with a fundamental base class for defining a complete program.
`The framework provides at least some of the facilities through which a program Interfaces with the user. such as menus and win
`dows. in a style that is internally consistent and abstracted from the specific environment for which it has been developed.
`This is an explanation I received from Borland. I don't quite understand it. yet. An application framework is an object-oriented
`class library that integrates user-interface building blocks. fundamental data structures. and support for object-oriented Inptl
`and output. It defines an application's standard user interface and behavior so that the programmer can concentrate on imple
`menting the specifics of the application. An application framework allows developers to reuse the abstract design of an entire
`application by modeling each major component of an applications as an abstract class.
`Application Generator AG. A program to generate actual programming code. An applications generator will let you pro-
`duce software quickly. but it will not allow you the flexibility had you programmed it from scratch. Voice processing "applica—
`tions generators." despite the name. often do not generate programming code. Instead they are self-contained environments
`which allow a user to define and execute applications. They are more commonly called applications generator. since one gener-
`ator can define and execute many applications. See APPLICATIONS GENERATOR for a longer explanation.
`Application Module A Northern Telecom term for a computer that can be attached to a Northern Telecom phone system and
`add intelligence and programmability to the phone system. Often. the AM will be a computer conforming to open standards. sud“
`as DOS or Windows. or it may be VME—based.
`Application Module link AML. A Northern Telecom internal and proprietary link that connects the Meridian 1 (via EDSI '
`or MSDL port) to the Meridian Link Module.
`
`44
`
`
`
`3
`
`

`

`NEWION'S TELECOM DICTIONARY
`
`sion which is on (i.e. "appears") on a multi—button key
`
`:omputers. Heavy penetration in the graphics/desktop
`Steve Wozniak and Steve Jobs. aided greatly by Mike
`
`evices. such as the keyboard. attaches. A Mac keyboard
`:h through the SCSI interface. See also USB. which is a
`
`es, developed by Apple Computer and published by
`)f all Macintosh applications are similar.
`le Macintosh screen. The Apple menu contains aliases.
`
`mputer's Personal Interactive Electronics (PIE) division.
`rsonal Digital Assistants (PDAs). e.g. the Apple Newton.
`imunications group, publishing activities. and Scrith-
`
`are for Macintosh users allowing remote access to Apple
`
`ocol developed by Apple for use with Appletalk.
`k protocols. AppleShare is Apple system software that
`e Macintosh environment. See APPLETALK.
`Ifile and Calculator in Misrosolt Windows. See also JAVA
`iking Macintosh computers and peripherals. especially
`)urrent implementations exist for LocalTalk (230.4 Kbps)
`
`.
`
`r
`
`'
`
`I level of security for AppleTalk networks. 0n AppleTalk .
`or zones to ARA clients. See ARA.
`atabase managers. spreadsheets. communications pack-
`
`.
`
`'.
`a code is written to operate specific computer hardware.
`a wide variety of system platforms that use the comput- .-
`
`iputer link. Originally it ran only over R2—232 serial con-
`. See also OPEN APPUCATION INTERFACE.
`iat perform similar services. such as voice messaging 0f
`n for a device within the Meridian 1 Universal Equipment
`ile (MLM) is an Application Module. specially configured
`
`I
`
`.-
`form that includes pertinent billing. technical and other
`inications network service to the customer and its authe ._
`t
`[fundamental base class for defining a complete program i
`program interfaces with the user. such as menus and win E
`ecific environment for which it has been developed.
`(-
`id it. yet. An application framework is an object—oriented I.
`tal data structures. and support for object-oriented input
`‘-.'
`iavior so that the programmer can concentrate on imple- ~
`lows developers to reuse the abstract design of an entire
`
`amming code. An applications generator will let you pro
`programmed it from scratch. Voice processing “applitar
`ning code. Instead they are self-contained environments .
`:ommonly called applications generator. since one genet-
`iENERATOR for a longer explanation.
`: can be attached to a Northern Telecom phone system and
`M will be a computer conforming to open standards. such
`
`id proprietary link that connects the Meridian 1 (via EDSI
`
`Appggfitiprrtcl’rogram A computer software program designed for a specific job. such as word processing. accounting.
`s rea s 863 ,
`-
`pp plicotlon Program Interface API. A set of formalized software calls and routines that can be referenced by an appli-
`cation program rc access underlyinlg rretwfork se/rrjicez.
`'
`‘
`ro ram
`lication
`rogcammlna n er ace
`.
`set of functions and values used b one
`to communicate WIN]
`p g
`:nofher program or with an operating system. See API for a better explanation.
`y
`licatron Profile As SCSA term. A description of the kinds of resources and services required by a client application (or
`an application class). An application profile is defined once for an instance of an application; then system services such as the
`SCR will be able to fulfill the needs of the application without the application having to state its needs explicitly.
`Application Servrce Element ASE. A messaging term. A module or portion of a protocol in the application layer 7 of the OSI
`(Open Systems Interconnection) protocol stack. Several ASEs are usually combined to form a complete protocol. e.g.. the X.400 P1
`protocol which conSIsts of the MTSE (Message Transfer Service Element), and the RTSE (Reliable Transfer Service Element).
`Application Software Interface ASI. The Application Software Interface is a product of the Application Software Interface
`Expert Working Group of the ISDN lmplementor's Workshop. The Interface focuses on the definition of a common application
`interface for accessing and administering ISDN serVices provided by hardware commonly referred to in the vendor community
`as Network Adapters (NAs) and responds to the applications re uirements enerated b the ISDN
`characteristics of this Application Interface shall be
`q
`g
`y
`Users Workshop UUW)’ The
`' Portable across the broadest range of system architectures;
`'
`' Extensible (their words. not mine)
`' Abstracted beyond ISDN to facilitate interworking;
`' Defined in terms of services and facilities consistent with OSI layer interface standards.
`According to Application Software Interface Group. the primary goal of the ASI is to provide a consistent set of application soft-
`ware interface serVices and application software interface implementation agreement(s) in order that an ISDN application may
`operate across a broad range of ISBN vendor products and platforms. The application software interface implementation agree—
`ments Will be referenced by (and tested against) the IUW (ISDN Users Workshop) generated applications. It is anticipated that
`therrreritror cocrpzalncies firiI/rrrlr/erthin thcsrravelapmentt cf th/ase implementation agreements will build products for the ISDN user
`ma e p ace w i
`on r
`o
`em.
`m emen a ion
`reements are II
`I
`'
`Processing Standard (FIPS).
`p
`g
`ke y to become a US Government Federal Information
`Applications Engineering Applications engineering is the process of anal
`in
`our late hone network to ind
`services that w ll reduce your monthly bill without sacrificing network quality. ltgn(be, as simpJIe as calling the Igleplgogguccofinailigq
`ny to convert a particular serVice to a Rate Stabilization Plan (RSP). In many instances. the use of applications engineering con-
`cepts Will increase the quality of your network. For example. putting DIDs onto a T1 will save you money and provide your network
`With a digital backbone. Unfortunately. most applications engineering is done by the telephone company or by their sales agents.
`Their main-goal is not to save you money. but rather to sell telephone company products. Therefore. they are unlikely to advise you
`of all the hidden costs of converting to a particular service. A true application engineer will provide you with a complete cost analy-
`srs that includes all the conversion costs, and provides you with the “break-even date." The break-even date is the date that your
`monthly saying offsets the initial conversion. cost of the service. It is often used synonymously with the term break-even point.
`Appiications Generator. An Application generator (AG) is a software tool that. in response to your input. writes code a
`computer can understand. In simple terms it is software that writes software. Applications generators have three major benefits'
`1. They save time. You can write software faster. 2. They are perfect for quickly demonstrating an application. 3. They can often
`be used by non-programmers. Applications generators have two disadvantages. 1. The code they produce is often not as effi-
`cent as the code produced by a good programmer. 2. They are often limited in what they can produce. Applications generators
`tend to be either general purpose tools or very specific tools. providing support for specific applications. such as connecting
`vorce response units to mainframe databases. vorce messaging system development. audiotex system development. etc. There
`are simple AGs There are complex AGs. There are general purpose AGs. There are specialized AGs. There are character-based
`AGs There are GUI based AGS. In researching AGs to write computer telephony and interactive voice response applications I
`found three different levels of AG packages. First. there are the sort of non-generator generators. They don't really create new
`software. but they allow you to tweak exrsting application blocks. There's no compiling and they're pretty simple to use (though
`they often lack database and host connectrvrty). Then there are the pretty GUI forms-based app gens. They usually entail build—
`Inga call-flow picture, using eithar pretty icons or easy to understand templates. When you're done filling in all the blanks you
`compile it and actually generate new software. They're very cute. Finally. there's the script level language of a company like
`aritylSoftware. San Francisco. Real programmers dig this. They often feel it gives them a lot more power and flexibility. For very
`comp ex apps (with T-i/ISDN. ANI. host connection. speech recognition. multimedia capabilities. etc.) you'll probably need the
`33:5; accdflgarrirlrw of a script language. Most of the better GUI application generators let you drop down to a script-level lan-
`Applications layer The seventh and highest layer of the O
`'
`‘
`‘
`.
`.
`.
`.
`pen Systems Interconnection OSI data communications m
`|
`elatlrfitgtlrrtemationalStandards Organization (ISO). It supplies functions to applications or nod(es ailowing them to communiggfe
`“P l' er applications or nodes. File transfer and electronic mail work at this layer. See OSI MODEL.
`on KTgctrcns Partner An Applications.Partner is AT&T's new name for an outside company which will write software to work
`work WImp one systems. such as the Merlin. Legend and the Definitely. AT&T is setting up an Applications Partner Program to
`‘P It
`'companies to help them develop programs and distribute their products. See also DESKTOP CONNECTION.
`1! ca Ions Processor A special purpose computer which attaches to a telephone system and allows it (and the people
`usin it
`-
`u
`.
`.
`n
`.
`.
`.
`.
`.
`.
`_
`.
`[Emllsggglpsgrfcbnsdgrcrent applications. such as v0ice mail. electronic mail or packet swrtching. We think AT&T invented the
`
`45
`
`
`
`4
`
`

`

`
`
`
`
`
`
`
`
`
`
`ProShare An lntel hardware/software combination that uses phone lines (analog and ISDN digital) to do collabora
`tive
`Pl
`puting. One version oi ProShare uses ISDN lines and allows you to see and be seen, to speak and be heard, and to share 3m:
`It"
`ument, like an Excel spreadsheet, and have both of you make changes to the spreadsheet during the phone call
`P!
`Prosody Intonation In text to speech, prosody refers to how natural it sounds -— the ups and downs of the sentence
`no
`Prospective The opposite of Retrospective or Retroactive. Most regulatory commission rate cases are prospective. Which
`Pl
`means they relate to prices and things in the future Some rate cases, however, are retroactive or retrospective which means'they
`53'
`apply to prices and things in the past Most of these decisions involve forcing the company to return money to Its SUbscriben
`359
`in the form of a refund Interestingly -— try this one -— most retroactive commissmn decisions are proscectlvely retroactiVe In
`P_|‘
`other words, they only take effect some time in the future, when the decrsion is voted upon by all the commis5ion members
`Ind
`Prospero UNIX software which helps you search archives connected to the Internet Prospero uses a Virtual file system we
`“I“
`enables users to transparently View directions and retrieve files. In shon, Prospero is a distributed directory some and file Systen
`Tilt
`that allows users to construct customized Views of available resources while taking advantage of the structure imposed by 0th
`F"
`Protected Distribution 5 stem PDS This is a US Federal Government definition A wueline or fiber-optics tel
`"a
`munication system which includes adequate acoustic electrical, electromagnetic, and physical safeguards to permit its use
`'1
`the unencrypted transmission of classified information A complete protected distribution system Includes the SUbSCriberand
`'1
`terminal equipment and the interconnecting lines.
`'
`Protected mode A computer's operating mode that is capable of addressing extended memory directly. The operating M m.
`for the Intel 80286 and higher processors (the 80386. 80486 and Pentium) that supports multi tasking, data security, and VIFlLi-
`”i
`at memory. The 80286 processor can run in either of two modes: real or protected. In real mode, it emulates an 8086 (it 3cm. '
`L“:
`es a maximum of 640KB of RAM and runs only one software application at a time). Protected mode allows the 80286 prom '
`“III
`to access up to 16MB of memory. It uses a 24-bit address bus. Since a bit can have one of two values, raising the base number
`m
`of 2 to the power of 24 is equal to 16,777,316 unique memory addresses. Each memory address can store one byte of inform _
`tion (16,777,216 bytes equals 16MB). Protected mode operation also makes it possible to run more than one application at once
`-
`-
`and to handle more processes because more memory is available Processes can be requests from an operating system 0m
`application to perform disk I/O, memory management, printing, or other functions. Processes are assigned priority numbersif
`
`l Pr'
`
`'
`protected mode. The processor gives priority to those with higher numbers. Operating system processes always have higheron-
`'
`ority than application processes. See also REAL MODE and VIRTUAL 8086 MODE.
`
`
`:'
`;
`Protective Connecting Arrangement PCA. A device leased from the telephone company and placed between yOUlO‘ATI
`(customer-provided) telephone equipment and the lines of the telephone company. The idea was to protect their lines fromyou -
`.
`
`
`‘
`junky equipment. No instance/case was ever proven of harm occurring to the network from faulty customer-provided equipnu'
`
`
`and the PCAs were thrown out and replaced by the FCC’s Part 68 Registration Program. Under this program. customer-m1?
`
`equipment which passes FCC tests can be registered and connected directly to the phone network without these devices. TI! , ,3
`
`phone industry eventually refunded most of the fees it charged on the PCAs. NATA and many manufacturers claimed the P015
`3,-
`
`were designed to prevent the growth of the interconnect or customer-owned phone industry. They were probably right. Tire tires-_- ;
`.
`tion is now moot, since the charges and the devices no longer exist, except in a museum or attached to very old equipment. Sat 5 ,
`
`also PROTECTIVE COUPLING ARRANGEMENT and PCA.
`-.
`:.'
`
`
`Protective Coupling Arrangement PCA. A device placed between the phone company's trunks and your particularteltv
`_
`
`phone gadget. The objective of the PCA is to isolate the telephone company‘s lines from your equipment and thus proteclllfl '. -'
`
`
`lines from your equipment. The device is not needed if your equipment has passed FCC approval -— under Part 68 of the F061 -
`
`rules. See also PROTECTIVE CONNECTIVE ARRANGEMENT, which is another term for the same thing.
`
`Protector Block A device interconnected to an exchange access line to protect the connected equipment from over- w-
`
`and/or over—current of 600 volts or greater. Hazardous voltages and currents are shunted to ground.
`.,
`PROTEl PRocedure Oriented Type Enforcing Language. ProteI is a block-structured, type-enforcing, high level, software
`,n.
`
`
`guage that enables extensive type checking on the source code at compile time. It was developed at Bell Northem Rosana.
`
`subsidiary of Northern Telecom. ProteI is used in the OMS—100, a family of Northern Telecom central office telephone ,
`'
`,.'-
` I
`Both the central control CPU and the DMS SuperNode CPU are programmed in ProteI.
`'
`Protn Protection.
`
`r
`
`.
`Protocol A procedure for adding order to the exchange of data. A protocol is a specific set of rules, procedures or
`.
`'-
`
`
`
`relating to format and timing of data transmission between two devices. A standard procedure that two data devrces must '
`i"
`and use to be able to understand each other. Sort of like us both speaking English so we can communicate. The prl '._. -
`
`
`data communications cover such things as framing, error handling, transparency and line control. There are three best:
`(_ '
`
`protocol: character—oriented, byte-oriented and bit-oriented.
`_
`.
`'
`.-
`Protocols break a file into equal parts called blocks or packets. These packets are sent and the receivrng computer . -"-'
`
`arriving packet and sends an acknowledgement (ACK) back to the sending computer. Because modems use phone lines
`
`fer data, noise or interference on the line will often mess up the block. When a block is damaged in transrt, ancirotm
`
`purpose of a protocol is to set up a mathematical way of measuring if the block came through accurately. And if it (It
`
`distant end to re-transmit the block until it gets it right. See PROTOCOLS for a list of the more common MIME-”d \.
`
`Protocol Analyzer A specialized computer and/or program that hooks into a LAN and analyzes its traffic
`at
`
`
`
`
`analyzers can record and display data on all levels of traffic on a LAN cable, from the lowest media accesscnntr
`_
`
`
`NetBIOS commands and application data. They are excellent for diagnosing network problems, but they Millie 5°“
`
`
`as their data output can be obscure.
`.
`..
`
`
`
`
`Protocol Control Protocol Control is a mechanism which a given application protocol may emptoy IO delém'ggi
`
`
`
`formance and health of the application. Example. protocol Iiveness may require that protocol control information
`In
`
`
`imum rate; some applications may become intolerable to users if they are unable to send at least at some minimum
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`
`
`
`
`484
`
`5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket