throbber
T
`
`The Official Dictionary
` of Telecommunications
`
` Networking and
`. the Internet
`
`sp;\~:'
`_
`5
`t
`11-" V/'
`.
`v.:
`._':.
`
`Av‘-.
`,
`,
`.
`
`—'~'
`'-'--v
`
`.
`
`i
`
`._.4~ _ _..j ,
`
`,..
`
`.__
`
`"
`
`COMCAST-1017
`
`Comcast Cable Communications LLC, et. al. v. T0 Delta
`
`Page 1 of 12
`
`

`
`llEW'I'0|l'S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`email: Harry_Nevvton@Technologylnvestor.com
`personal web site: www.HarryNewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by CMP Books
`An Imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN 1-57820-053-9
`
`July, 2000
`
`Sixteenth and a Half Edition, Expanded and Updated
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMP Books
`
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800—L|BRARY or 408-848-3854
`Fax: 408-848-5784
`Email: telecom @ rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 2 of 12
`
`

`
`ARY
`
`NEWTON'S TELECOM DICTIONARY
`
`r Annapolis, MD with over 2,000 empiw
`rw.arinc.com
`
`ing A compression technique which prg
`entire message, rather than encoding ea
`assage. Arithmetic coding improves
`g, although it
`is
`slower. See ais,
`iuffman Encoding.
`ic Unit ALU. The part of the CPU (Cent;
`hat performs the arithmetic and logic:
`croprocessor.
`ration The process that results in a rrraiit
`ilution during the execution of an arithmeg
`tluation of an arithmetic expression.
`rister A register (i.e. short-term store;
`;the operands or the results of operation
`operations, logic operations, and Shifts,
`t The part of a computing system wing
`is that perform the arithmetic operation;
`
`art shows that a file or program has beg’
`must be “exploded” with the arj prograg
`read or used. Groups of files may be can.
`it this is more commonly done with the Zip
`
`us Response Mode. A communication
`re primary station and at least one see.
`are either the primary or one of the secon-
`ransmrssron.
`oquial expression for a dumb, but beauti-
`your arm, as you arrive at the party, is;
`“My,” say your friends, “You have grea
`
`re fabled battlefield where God’s heavenly
`t the demon-led forces of evil The final
`
`at protection usually accomplished bya
`re, braid or served wires or by a combina-
`Jes or wires applied over a cable sheath for
`n. it is normally found only over the outer
`red mostly on cables lying on lake or river
`rhore ends of oceans. See Armored Cable.
`1. A stainless steel handset cord which is
`idalism. Typically used on a coin phone
`handset cords are too short. This is saidtii
`are first ordered for use in prisons, where
`certain they would not be used by the pile
`devices. Thus,
`they requested Weslem
`n too short for such a use. Whether thereis
`;tory is dubious. However,
`it is part of fete
`history and therefore, worth preserving.
`an armored cable has its sheath covered
`e layers: a vinyl jacket, a steel wrap. and
`it. Armored cable is intended for use in
`ations; the steel armor protects the sheath
`g installation. See also Hard Cable.
`olution Protocol. 1. A low—|evel protocol
`ssion Control Protocol/Internet Protocol
`"maps" IP addresses to the corresponding
`In other words, ARP is used to obtain the
`hen only the logical address is known. All
`he IP address is broadcast onto the net-
`r which the IP address resides responds
`address in order that the packets can be
`' of example, TCP/IP requires ARP for use
`
`in which case the physical address would be
`hernet,
`with El
`by the MAC address hard-coded on the NlC (Network
`Interface Card) of the target evorkstatian. See la)lsi)d(ijtARP
`g_ A low-level protocol w rc
`serves o map
`_ a
`resses, or
`Omar non-ATM addresses, to the corresponding address of
`.,,e
`get ATM device. Once the ATM address has been iden-
`lifted, the ARP sewer canstfrearaj data to the target device as
`mg aSmeSeSS|t(1mF|fS mainhaugioiects A enc ' of
`the U S
`“Pam/e\igtVtE)‘fnD?2fens£r3eS((%hCie whole DOD agnuaitelecommuni-'
`a
`-
`.
`.
`.
`gallons bill exceeds $i b|l|lOil.g Muca ;t\Jif‘|t3l;\e eauntryst early;
`work on packet switching was one a
`.
`one s age 1
`was called D_ARPA, which stands for Defense Advanced
`
`t Th D
`r
`ifisel
`398"” mt fun 9
`'th' DARPA
`ARPANET and lam riigAiQi5eTm'e "Isis glniup
`ms
`t
`rgspofislble forlthe A
`lS
`(rr orma ion
`ys ems
`TechFllqUES Otfrce), formerly IPTO (information Processing
`Techniques Office). See also DARPA lnternet. DARPA has
`changed its name to ARPA and back again. Its hard to keep up.
`c|uIAltEl' Advanced Research Proiects Agency NETwork._ A
`Department of Defense data network, developed by _ARPA, which
`tied together many users and computers in universities, govern-
`ment and businesses. ARPANET was the forerunnerof many
`developments in cornmercralvdata communications,
`including
`packet switching, which was first tested on a large scaleon this
`network. The predecessor of the internal, it was started in 1_969
`with funds from the Defense Departments Advanced Proiects
`Research Agency (ARPA). ARPANE‘ was split into DA_RFANET
`(Defense ARPANET) and MILNET (MlLitary NETwork) in 1983.
`AHPANH was officially retired in _1 990.
`ARPM Average Revenue Per_ Minute.
`no Automatic. Retransmissior
`reOuest. The standard
`method of checking transmitted data, used or virtually all
`high-speed data comrnunrcatiors systems. The sender
`encodes an error—delection field based on the contents of the
`message. The receiver recalculates the check f eta and com-
`pares it with that received. if they match, an "ACK _(acknow|-
`edgment) is transmitted to the serlder.
`If they dont match, a
`‘NAK" (negative acknowledgment) s returned, and the sender
`retransmits the message. Note: the method 0 error correc-
`tion assumes the sender temporarily or permanently stores
`the data it has sent. Otherwise, it couldn't possbly retransmit
`the data. No error detection scheme in data transmission is
`foolproof. This one is no exceptior.
`Array 1. The description of a location of polite by coordi-
`nates A 2-D array is described w'th x,y coordinates. A 3-D
`array is described with x,y,z coordinates.
`2. A named, ordered collection of data elements hat have iden-
`tical attributes; or an ordered collection of identical structures.
`3. Two or more hard disks that read and write the same data.
`in a RAID system, the operating system treats the array as if it
`were a single hard disk.
`Array Antenna Take a bunch of directional antennas. Aim
`them at the same transmitting source. Join them together.
`Presto, you now have a very powerful giant antenna. Array
`antennas are used for picking up weak signals. They are often
`used in astronomical and defense communications systems.
`Array Connector A connector for use with ribbon fiber cable
`that ioins 12 fibers simultaneously. A fan-out array design can
`be used to connect ribbon fiber cables to non—ribbon cables.
`llray Processor A processor capable of executing
`instructions in which the operands may be arrays rather than
`data elements.
`
`Arrestor A device used to protect telephone equipment
`from lightning, electrical storms, etc. An arrestor is typically
`gas filled so when lightning strikes,
`the gas ionizes and,
`bingo, a low resistance to the ground that drains the damag-
`ing high voltage elements of the lightning away.
`Arrival late A call center term. The pattern in which calls
`arrive. Call Arrival Rates can be smooth, like outgoing telemar-
`keting calls, or random, like incomingtoll-free number calls, or
`peaked, where calls escalate in response to advertising.
`ARS Automatic Route Selection, also called Least Cost
`Routing. A way that your phone system automatically choos-
`es the least expensive way of making the call that it is pre-
`sented with. That least expensive way may be a tie line or a
`WATS line, etc.
`it may even be dial-up. See Least Cost
`Routing and Alternate Routing.
`Article An Internet term. An article is a USENET conversa-
`tion element. It is a computer file that contains a question or
`piece of information made available to the USENET commu-
`nity by posting to a newsgroup.
`Artifacts Distortions in a video signal. Unintended,
`unwanted visual aberrations in a video image. In all kinds of
`computer graphics, including any display on a monitor, arti-
`facts are things you don't want to see. They fall into many cat-
`egories (such as speckles in scanned pictures), but they all
`have one thing in common: they are chunks of stray pixels
`that don't belong in the image.
`Artificial Intelligence In 19305, Alan Turing, a British
`mathematician, challenged scientists to create a machine that
`could trick people into thinking it was one of them. The idea
`is that a computer will have achieved intelligence when a per-
`son chatting over a teletype is unable to tell whether a human
`being or a machine is at the other end of the conversation.
`And this for long was THE classic definition of artificial intel-
`ligence. After half a century,
`the prospect of passing the
`Turing test remains so remote that many computer scientists
`have abandoned it as a practical goal. The real challenge
`these days with artificial
`intelligence, now more commonly
`called “expert systems,” is not to recreate people but to rec-
`ognize the uniqueness of machine intelligence and learn to
`work with it in intelligent, useful ways.
`Artificial lino Interface in T—1 transmission, refers to
`the ability of a piece of transmission equipment to attenuate
`its output level to meet the required loop loss of 15-225 dB
`normally switch selectable between 07.5, and dB.
`Allll Audio Response Unit. A device which gives audible infor-
`mation to someone calling on the phone. “Press 1 for the train
`timetable to Boston." The ARU reads the timetable. The caller
`responds to questions by punching buttons on his telephone
`keypad. If this sounds like Interactive Voice Response — IVR,
`you're 100% right because that's exactly what it is. See lVR.
`AS 1. Autonomous System. An Internet term. An Autonomous
`System is just
`that — a system which is autonomous.
`Typically, an AS is an lSP, an Internet Service Provider. Within
`the lSP, routers exchange information freely — all systems
`are trusted, as they are under a single administration in the
`same domain. Therefore, such systems can run an IGP
`(Interior Gateway Protocol) such as lGRP (Interior Gateway
`Routing Protocol) or OSPF (Open Shortest Path First). As the
`same level of trust does not exist between ASs, they must run
`an EGP (Exterior Gateway Protocol) such as BGP (Border
`Gateway Protocol) or IDRP (|nterDomain Routing Protocol).
`See also BGP, EGP, IDRP, IGP, lGRP and OSPF.
`2.Australian Standards. Standards that have been approved
`by Standards Australia in response to formal requests from
`
`Page 3 of 12
`
`

`
`|0NARY
`
`NEWTON’S TELECOM DICTIONARY
`
`_
`
`ack-end can be the result of the reps selling .‘.
`the product. See Front End Results.
`feed Pull Used in tight locations where it's i~
`arge cable pulling equipment. The cable is fed ~
`im the mid-point. The first section of cable is
`zction. Afterthis is fed, the remaining cable tsp’
`through the opposite direction to the other eng‘
`Iaul Back haul is a verb. A communications ii
`hauling when it takes traffic beyond its destin
`iere are many reasons it might do this. The first
`ae cheaper to go that route instead of going i‘
`yht, for example, have a full—time private line ii
`Dallas. You might find it cheaper to reach Na .
`3 Dallas first, then dialing back to Nashville.
`v
`of backhauling may change from one in ”
`‘as the line to Dallas is empty, close to full
`I
`r reason for back hauling is that you may .
`a"
`nodate changes in your calling or staffing .1‘
`iy have an automatic call distributor in Omaha . ’
`ago. A call from New York may come into your l
`iut when it gets there you may discover that ‘
`nts available to handle the call. So it may no;
`to back haul the call to the Chicago ACD,
`'
`s available. In fiber networks, back hauling is lg
`ement technique used to reduce the expense of
`i/demultiplexing.
`s_
`Hoe Fde The degradation in service ii‘
`I backhoe cuts your buried fiber optic cable. Cal
`re sometimes not all communications are out i.
`:hey are all cut off, the term becomes a eup .“_
`to report a back hoe fade to your boss than ;
`just
`lost 158,000 circuits between New Y ’
`ngton. Our customers are not pleased."
`Office Operations Management and sup '
`in be performed away from a companys head 5
`is telemarketing, credit card processing, data H
`:e and many clerical and accounting function:
`operations are an economic development op_
`all communities that have the appropriate inlr _
`advanced telecommunications,
`reliable expr
`es.) Back office operations are helping sharea _,
`l of place, one in which,
`for example, --- J
`aness is no longer a liability — because of let,
`M15 and other linkages to the “outside" world. ’
`; Porch The portion of a video signal that oc ‘
`anking from the end of horizontal sync to the -‘,5
`live video. The blanking signal portion wli,
`en the trailing edge of a horizontal sync pulse 1
`g edge of the corresponding blanking pulse. 0 i
`ated on the back porch.
`‘
`r Proieclion When the projection is placed I
`n (as it is in television and various video co :,
`rations where the image is displayed on anion
`screen) it is described as a back projections *
`systems the viewer sees the image via the tran .
`ht as opposed to reflection used in front prtyle '1:
`Audiences generally prefer back projection E
`they seem brighter.
`,
`c lo Back Channel Bank The connection
`ency and signaling leads betweenlchannel "
`rdropping (ie. removing) and inserting (ie. a 3
`nets.
`‘—
`ii to Back Connection A connection be
`.
`it of a transmitting device and the input of an -“
`
`Wining device. When used for equipment measurementsor
`-
`urposes, this eliminates the effects of the transmis-
`ggringhgnnel or medium.
`"A, go Back Peering Peering is when large ISPS
`(Internet Service Providers) assume that the traffic is approx-
`imafly equal between them, and both benefit equally from a
`pee connectivity between them since both companies need
`each others network to get people to their web sites. These
`[SP5 allow traffic from these large lSPs to enter their network
`tor free. Companies that are allowed into this prestigious club
`are called Tier 1 providers. They include Sprint, CAIS, UUNet,
`PSlNet (the first and largest independent commercial ISP in
`ineworid), CablehandMWiLelehss, etc. Companies that do ntot
`have large enttirtligg
`néamgrrkss ave o pay ier
`companies o
`gemcess [0 em one Back to s uare one (or “back at
`‘uh Io §qm'“l'ie
`th
`r‘
`'nal qa of sa 'n
`'t) comes
`square one, whic was
`e Otlgl
`fvv y th
`Th
`from football
`radio cornmen aries
`rom
`e_
`s.
`__ere
`gging no pictore,_these live retpglrts wriluld explainghe ]IJOSlt_|CtlJfl
`or play by dividing the fogt ampitc ligo nuhm erejdllgri si
`Square one was just in ion 0
`egoa. o,w ena Ha wen
`out or play and resulted in a goal kick, the play was back at
`if? firisyfsgr A program or device that copies files so
`(
`.
`V
`at least two up-to—date copies always exist.
`_
`_
`Iaclclcone The backbone is the part of the communications
`network which carries the heaviest ‘traffic. The backbone is
`also that_part of _a network which joins LANs together —
`either inside a building or across a city or the country. LANs
`are connected to the backbore via bridges and/or routers and
`the backbone serves as a conrnunications highway for LAN-
`to-LAN traffic. The backbone is one basis for design of the
`overall network service. The backbone may be the more per-
`manent part of the netiivork. A backbone in a LAN, a WAN, or
`a combination of both dedcated to providing connectivity
`SUbilt;tW0f|klS in ari¢entelrprise—wi;r\le network.
`d
`c
`one
`on ing
`on uclor
`copper con uctor
`extending from the telecomrrunications main grounding bus-
`berti|i(tltie larthestlhloor telecommunications grounding busbar.
`In one to ing Gabe and connecting hardware that
`comprise the main and intermediate cross—connects, as well
`as cable runs that extend be ween telecommunications clos-
`ifi iigiiipmer;_tlroom|'sTa:id entrance fgci_l|i(§i_es.
`h
`m b
`k
`(
`one
`ose
`BCOSB llla Ul
`lflgW STE
`8
`8C -
`bone cable is terminated and cross connected to either hori-
`z'o:ita|lli.listribugion ‘cable or o her backbone cable.
`_ c
`one aci ilies Plant and equipment used to pro-
`v:de1trans;ndission services to connect tributary facilities from
`cusers o
`ispersed users or devices. See Backbone.
`Backbone Network The part of a communications facil-
`littthat connects primary nodes; a primary shared communi-
`cations path that serves multiple users via multiplexing at
`designated jumping-off points. A transmission facility, or
`mllcernent of such facilities, designed to connect
`lower
`Weed channels or clusters of dispersed users or devices.
`|Ic||:|I:one gulhsyslem See Riser Subsystem.
`_
`one o orizontal Cross-Connect BHC. Point
`mgerconnection between backbone wiring and horizontal
`filocnckbone Wiring The physical/electrical
`interconnec-
`s between telecommunications closets and equipment
`rooms Cross-Connect hardware and cabling in the Main and
`flflmediate Cross-Connects are considered part of the back-
`fle wiring.
`
`Backcharging A phone fraud term. Backcharging is start-
`ing the clock on a phone call at the time a customer contacts
`the long-distant phone service provider — not when the per-
`son being called answers the phone — which is what
`it
`should be.
`Backfeecl Pull A method used to pull cable into a conduit
`or a duct liner when the cable is long or when placing cable
`into controlled environmental vaults, central offices, or under
`streets. With this method, the cable pays off its reel at an
`intermediate manhole and is first pulled ir one direction. The
`remaining cable is then removed from tie reel,
`laid on the
`ground, and then pulled in the opposite drection.
`Backfile Conversion The process of scanning in, index-
`ing and storing a large backlog of paper or microform docu-
`ments in preparation of an imaging system. Because of the
`time-consuming and specialized nature o the task,
`it is gen-
`erally performed by a service bureau.
`Backfilling To designate memory on ar expanded memory
`card and make it available for use as conventional memory.
`Background See Background Processing.
`Background Area of Concern, Consequence
`Incenlive BACl.
`A questioning strategy used by
`Lucent Technologies for uncovering a customer's implied
`needs and converting them to clearly defned ones that may
`lead to a purchasing decision.
`Background Communiccrlion Daa communication,
`such as downloading a file from a builet'n board, that takes
`place in the background while the user concentrates on
`another application (eg. a spreadsheet) ii the foreground.
`Background Music This feature at ows music to be
`played through speakers in the ceiling and/or through speak-
`ers in each telephone,
`throughout the office, or office-by-
`office, or selectively. Background music is typically played
`through paging speakers, but
`it can also be played through
`the speakers of speakerphones. In fact, the two — paging and
`background music — often go hand-in-hand. When you want
`to page someone,
`the music turns off automatically and
`comes back on when the paging is over. The same thing hap-
`pens on airplanes. Background music is said to motivate
`workers, often into shutting it off.
`Background Noise The noise you hear when nothing
`else is being transmitted. Digital circuits are so quiet that
`some form of White Noise must be injeccted into them so as
`to prevent people from suspecting that the circuit
`they’re
`speaking on has gone dead. See also White Noise.
`Background Processing The automatic execution of
`’ lower priority computer programs when higher priority pro-
`grams are not using the computer’s resources. A higher pri-
`ority task would be completing calls. A lower priority task
`would be running diagnostics. Some PBXs have this feature.
`Some insist on running their diagnostics even though they
`are choked with calls. The smarter ones tone down their diag-
`nostics when they get busier, which makes sense.
`Background Program A low priority program operating
`automatically when a higher priority (foreground) program is
`not using the computer system’s resources.
`Background Task A secondary job performed while the
`user is performing a primary task. Forexample, many network
`servers will carry out the duties of the network (like control-
`ling who is talking to whom) in the background, while at the
`same time the user is running his own foreground application
`"(like word processing). See also Background Processing.
`Backlcaul See Back Haul.
`Backhoe Fade See Back Hoe Fade.
`
`Page 4 of 12
`
`

`
`/|DlCT|0NARY
`
`NEWTON’S T_ELECOM DICTIONARY
`
`ring installation or manufacture to identify it.
`and Pass Filter BPF A device which passes a specific
`ige of frequencies and (in theory) blocks all others.
`and Splitter A multiplexer designed to split the available
`iquency band into several smaller channels. A band splitter
`it use time division or frequency division multiplexing.
`and Stop Filter BSF. A device which blocks a specific
`ige of frequencies and (in theory) passes all others.
`and, Citizens One of two bands used for low power
`tio transmissions in the United States ~ either 26.965 to
`.225 megahertz or 462.55 to 469.95 megahertz. Citizens
`nd radio is not allowed in many countries, even some civi-
`ed countries. In some countries they use different frequen-
`ts. CB radios, in the United States, are limited by FCC rule
`four WATTS of power, which gives each CB radio a range
`several miles. Some naughty people boost their CBS with
`ternal power. The author of this dictionary has actually spo-
`n to Australia while driving on the Santa Monica Freeway in
`s Angeles. See also CB.
`Ind, Frequency The frequencies between the upper and
`Net bands. See also BAND. Here is the accepted explana-
`n of “bands:"
`low 300 Hertz — ELF — Extremely lowlrequency
`0—3,000 Hertz — ILF — infra Low Frequency
`3—30 kHz — VLF — Very Low Frequency
`30-300 kHz — LF — Low Frequency
`00—3,000 kHz — MF — Medium Frequency
`3-30 MHz — HF — High Frequency
`30-300 MHZ — VHF— Very High Frequency
`t0—3,00tJ MHz — UHF—— Ultra High Frequency
`3——3OGHz — SHF— SuperHigh Frequency
`30—30OGHz — EHF— Extremely High Frequency
`)0——3,000 GHz — THF — Tremendously High Frequency
`Band
`American
`0.2-1.0 Ghz
`1-2 Ghz
`2-4 Ghz
`4-8 Ghz
`8-125 Ghz
`-
`12.5—iEl Ghz
`‘|8—26.5 Ghz
`18-30 on}
`26.5-40 Ghz
`30-47 Ghz
`-
`Q
`mded Memory In a PostScript printer, virtual printer
`imory is a pan of memory that stores font information. The
`imory in Postscript printers is divided into banded TlBTll0-
`and virtual memory. Banded memory contains gaphics
`d page-layout information needed to print your documents.
`tual memory contains any font information that is sent to
`ur printer either when you print a document or wten you
`wnload fonts.
`mded Iiale A price range for regulated telephoie ser-
`:e that has a minimum floor and maximum ceilirg. The
`nimum covers the cost of service; the maximum is he rate
`id in the price list.
`mdil Mobile A mobile subscriber that is revealed in the
`l—ticketing records as having an invalid ESN, inval'd tele-
`one number, or other problem that warrants denial of ser-
`ie to that mobile.
`mio Also called beaver tail. Used to connect devices to
`idular
`jack wiring for
`testing. See Modular B eakout
`apter.
`
`Bunio cli See Modular Breakout Adapter.‘
`ggndmar ing A continuous circumferential band applied
`to an insulated conductor at regular intervals for identification.
`undpass The range of frequencies that a channel will
`transmit (i.e. pass through) without excessive attenuation.
`ggmlpllss Filler A device which transmits a band of fre-
`quencies and blocks or absorbs allother frequencies not in
`specified band. Often used in frequency division multi-
`pjexirig to separate one conversation from many.
`gundpass limiter A device that imposes hard limiting on
`a signal and contains a filter that suppresses the unwanted
`products of the limiting process.
`Bandwidth 1.
`in telecommunications, bandwidth is the
`width of a communications channel.
`In analog communica-
`tions, bandwidth is typically measured in Hertz — cycles per
`secord.
`In digital communications, bandwidth is typically
`measured in bits per second (bps). A voice conversation in
`analog format is typically 3,000 Hertz, carried in a 4,000 Hertz
`analog channel. in digital communications, encoded in POM,
`its 64,000 hits per second. 00 not confuse bandwidth with
`band. Lets say we’re running a communications device in the
`12 GI-z band. What's its bandwidth? That's the space it's occu-
`pying. Lets say it's occupying from 12 GHz to 12.1 GHz. This
`neans that it's occupying the space from 12,000,000,000 Hz
`o12,100,000,000 Hz. This means its bandwidth is one hun-
`dred
`iillion cycles or one hundred megahertz (100 MHz).
`Atfilia ed terms are narrowband, wideband and broadband.
`While these are not precise terms, narrowband generally refers
`o sor e number of 64 Kbps channels (Nx64) providing aggre-
`gate bandwidth less than 1.544 Mbps (24x64 Kbps, or T—1),
`wideband is 1.544 Mbps45 Mbps (T-1 to T-3) and broadband
`provic es 45 Mbps (T-3) or better.
`2. The capacity to move information. A person who can mas-
`er ha dware, software, manufacturing and marketing — and
`plays the oboe or some other musical instrument — is “high
`bandwidth.” The term is believed to have originated in
`Redmond, WA in the headquarters of Microsoft. People there
`'eg., Bill Gates) who are super-intelligent and have generally
`Jroad capabilities, are said to have “high bandwidth.”
`3. Microsoft jargon for schedule. For example, ‘‘I have a band-
`width problem" means that l have an overloaded schedule.
`4. The combined girth of a rock band. By way of example, the
`Jand "Meat|oal” is broadband, largely due to the individual
`girth of the singer by the same name. On the other hand, the
`"Flolling Stones" are narrowband, due largely to the svelte
`Mick Jagger. While the "Rolling Stones" are older, they are
`also richerthan is “Meatloaf.” So, bandwidth is not everything!
`Bandwidth Augmentation Bandwidth augmentation is
`the ability to add another communications channel
`to an
`already existing communications channel.
`Bandwidth Compression A technique to reduce the
`bandwidth needed to transmit a given amount of information.
`Bandwidth compression is used typically in “picture type"
`transmissions — such as facsimile, imaging or video-con-
`ferencing. For example, early facsimile machines scanned
`each bit of the document to be sent and sent a YES or NO (if
`there was material
`in that spot or not). More modern
`machines simply skip overall the blank spaces and transmit
`a message to the receiving facsimile machine when to start
`printing dots again. A facsimile "picture" is made up of tiny
`dots, similar to printing photos in a magazine. Today, band-
`width compression is used to transmit voice, video and data.
`There are many techniques, few of which are standard. The
`key, of course, is that if you’re going to compress a “conver-
`
`sation” at one end, you must “decompress” it at the other
`end. Thus, in every bandwidth compressed conversation there
`nust be two sets of equipment, one at each end. And they bet-
`er be compatible.
`Bandwidth Envy l have a dial-up connnection to the
`nternet. You have a DSL line. You‘re running 20 to 30 times
`aster than me. I envy your good luck.
`I have bandwidth envy.
`Bandwidth Junkie One who worships brute speed when
`‘t comes to Internet connections. He's the type of person who
`has
`a
`T-1
`line
`in
`his
`bedroom.
`Eric Smestad,
`ninfan@Limbo.Alleged.com, wrote me, “After reading your
`definition of “Bandwidth junkie” i started to feel rather wor-
`ied, you see, I am afraid that two of my friends and i may be
`bandwidth junkies. We live in the same apartment building
`and have ethernet cable ran from apartment to apartment, a
`switched hub, and a T—1
`line to the Internet with a Cisco
`outer. These seem to be obvious symptoms. is there a cure?"
`Answer, there is no cure.
`Bandwidth limited Operation The condition prevail-
`'ng when the system bandwidth, rather than the amplitude (or
`power) of the received signal, limits performance. The condi-
`ion is reached when the system distorts the shape of the sig-
`nal wavetorm beyond specified limits. For
`linear systems,
`bandwidth-limited operation is equivalent to distortion-limit-
`ed operation.
`Bandwidth On Demand Just what it sounds like. You
`want two 56 Kbps circuits this moment for a videoconference.
`No problem. Use one of the newer pieces of telecommunica-
`tions equipment and ‘‘dial up" the bandwidth you need. An
`example of such a piece of equipment is an inverse multiplex-
`er. Uses for bandwidth on demand include video conferencing,
`LAN interconnection and disaster recovery. Bandwidth on
`demand is typically done only with digital circuits (they're eas-
`ier to combine). Bandwidth on demand is typically carved out
`of a T—1 circuit, which is permanently connected to the cus-
`tomer's premises trom a long distance carrier's central office,
`also called a POP — Point of Presence.
`Itang An exclamation point (i) used in a Unix-to—Unix Copy
`Program (UUCP) electronic mail address. People who are on
`AT&T Mail often give you their mail address as “Bang Their
`Name.” My AT&T Mail address used to be Bang HarryNewton,
`i.e. !HarryNewton.
`Bang Path A series of UUCP nodes mail will pass through
`to reach a remote user. Node names are separated by excla-
`mation marks nicknamed “bangs." The first node in the path
`must be on the local system, the second node must be linked
`to the first, and so on. To reach user1 on sys2 if your com-
`puter‘s address is syst you would use the following address:
`sys1! sys2! sys3! usert
`Bank A row of similar components used as a single device,
`like a bank of memory. Banks must be installed or removed
`together. See Bank Switching.
`Bank Switching A way of expanding memory beyond an
`operating systems or microprocessor's address limitations by
`switching rapidly between two banks of memory. in MS—DOS,
`a 64K bank of memory between 640K and one megabyte is set
`aside. When more memory is needed, the bank, or page, is
`switched with a 64K page of free memory. This is repeated
`with additional 64K pages of memory. When the computer
`requires data or program instructions not in memory, expand-
`ed memory software finds the bank containing the data and
`switches it with the current bank of memory. Although effec-
`tive, bank switching results in memory access times that are
`slower than true, extended memory.
`
`European
`02-0375 Ghz
`0.375-1.5 Ghz
`1.5-3.75 Ghz
`3.75-6 Ghz
`6-11.5 Ghz
`11.5-18 Ghz
`
`PLSCXJK
`
`KK
`
`u
`
`a
`
`Page 5 of 12
`
`

`
`IOM DICTIONARY
`
`NEWTON’S TELECOM DICTIONARY
`
`Curd Dialer A device attached to a telephone Wm
`accepts a special plastic card and then automatically dials [32
`number on the card as indicated by the holes punched in (1
`card dialer is now obsolete except for unusual applicati
`‘A
`like systems whereby you carry your card with you and US”
`as a security device.
`(pronounced
`Curd Issuer lrlenlilier Code CIID —
`“sid“) A code issued with certain calling cards. AT&T’s Cm)
`cards cannot be used by other interexchange carriers but C3,,
`be used by LECs.
`Curd Servius The softiiiiare layer above Socket Servicg
`that coordinates access to PCMClA cards, sockets and 5“
`tem resources. Card Services is a software management inter.
`face that allows the allocation of system resources (such 3
`memory and interrupts) automatically once the sock,
`Services detects that a PC Card has been inserted. Thisi;
`called “hot swapping." The idea is that you can slide PCMCTA
`cards in and out of PC at will and your Socket and Card set.
`v'ces will recognize them and respond accordingly. its a gm
`tteory. l n practice, it doesn't work because certain cards, mg
`network cards, simply can't be connected and disconnected;
`will. Socket Services is a Bl0S level software interface fig
`provides a method for accessing the PCMCIA slots of a corn
`puter. Card Services is a software management interface iii;
`a lows the allocation of system resources (such as memory
`and interrupts) automatically once the Socket Services
`detects that a PC Card has been inserted. Both of these Spec.
`if'cations are contained in the PCMCIA Standards document
`You do not need either Socket or Card Services to success.
`fully use PCMCIA cards in your desktop or laptop. You sim
`py need the correct device drivers and the proper memory
`exclusions. See PCMCIA, Socket Services and Slot Sizes.
`Curd Slol A place inside a phone system or computer into
`watch you slide a printed circuit board. See Board.
`ccmllus Laptops typically come with slots for what are now
`kr own as PC cards —- little credit card size devices who on
`various things — like become a modem, become a network
`interface card, become a video conferencing card, become at
`ISDN card, etc. These cards were originally

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket