`
`tennsrrlefined
`
`The Official Dictionary J V
` of Telecommunications
`Networking and
`a the Internet
`
`
`
`f or
`‘
`
`ARRIS-1017
`
`Arris Group, Inc. v. T0 Delta
`
`Page 1 of 12
`
`
`
`llEW'I'0|l'S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`email: Harry_Nevvton@Technologylnvestor.com
`personal web site: www.HarryNewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by CMP Books
`An Imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN 1-57820-053-9
`
`July, 2000
`
`Sixteenth and a Half Edition, Expanded and Updated
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMP Books
`
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800—L|BRARY or 408-848-3854
`Fax: 408-848-5784
`Email: telecom @ rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 2 of 12
`
`
`
`ARY
`
`NEWTON'S TELECOM DICTIONARY
`
`r Annapolis, MD with over 2,000 empiw
`rw.arinc.com
`
`ing A compression technique which prg
`entire message, rather than encoding ea
`assage. Arithmetic coding improves
`g, although it
`is
`slower. See ais,
`iuffman Encoding.
`ic Unit ALU. The part of the CPU (Cent;
`hat performs the arithmetic and logic:
`croprocessor.
`ration The process that results in a rrraiit
`ilution during the execution of an arithmeg
`tluation of an arithmetic expression.
`rister A register (i.e. short-term store;
`;the operands or the results of operation
`operations, logic operations, and Shifts,
`t The part of a computing system wing
`is that perform the arithmetic operation;
`
`art shows that a file or program has beg’
`must be “exploded” with the arj prograg
`read or used. Groups of files may be can.
`it this is more commonly done with the Zip
`
`us Response Mode. A communication
`re primary station and at least one see.
`are either the primary or one of the secon-
`ransmrssron.
`oquial expression for a dumb, but beauti-
`your arm, as you arrive at the party, is;
`“My,” say your friends, “You have grea
`
`re fabled battlefield where God’s heavenly
`t the demon-led forces of evil The final
`
`at protection usually accomplished bya
`re, braid or served wires or by a combina-
`Jes or wires applied over a cable sheath for
`n. it is normally found only over the outer
`red mostly on cables lying on lake or river
`rhore ends of oceans. See Armored Cable.
`1. A stainless steel handset cord which is
`idalism. Typically used on a coin phone
`handset cords are too short. This is saidtii
`are first ordered for use in prisons, where
`certain they would not be used by the pile
`devices. Thus,
`they requested Weslem
`n too short for such a use. Whether thereis
`;tory is dubious. However,
`it is part of fete
`history and therefore, worth preserving.
`an armored cable has its sheath covered
`e layers: a vinyl jacket, a steel wrap. and
`it. Armored cable is intended for use in
`ations; the steel armor protects the sheath
`g installation. See also Hard Cable.
`olution Protocol. 1. A low—|evel protocol
`ssion Control Protocol/Internet Protocol
`"maps" IP addresses to the corresponding
`In other words, ARP is used to obtain the
`hen only the logical address is known. All
`he IP address is broadcast onto the net-
`r which the IP address resides responds
`address in order that the packets can be
`' of example, TCP/IP requires ARP for use
`
`in which case the physical address would be
`hernet,
`with El
`by the MAC address hard-coded on the NlC (Network
`Interface Card) of the target evorkstatian. See la)lsi)d(ijtARP
`g_ A low-level protocol w rc
`serves o map
`_ a
`resses, or
`Omar non-ATM addresses, to the corresponding address of
`.,,e
`get ATM device. Once the ATM address has been iden-
`lifted, the ARP sewer canstfrearaj data to the target device as
`mg aSmeSeSS|t(1mF|fS mainhaugioiects A enc ' of
`the U S
`“Pam/e\igtVtE)‘fnD?2fens£r3eS((%hCie whole DOD agnuaitelecommuni-'
`a
`-
`.
`.
`.
`gallons bill exceeds $i b|l|lOil.g Muca ;t\Jif‘|t3l;\e eauntryst early;
`work on packet switching was one a
`.
`one s age 1
`was called D_ARPA, which stands for Defense Advanced
`
`t Th D
`r
`ifisel
`398"” mt fun 9
`'th' DARPA
`ARPANET and lam riigAiQi5eTm'e "Isis glniup
`ms
`t
`rgspofislble forlthe A
`lS
`(rr orma ion
`ys ems
`TechFllqUES Otfrce), formerly IPTO (information Processing
`Techniques Office). See also DARPA lnternet. DARPA has
`changed its name to ARPA and back again. Its hard to keep up.
`c|uIAltEl' Advanced Research Proiects Agency NETwork._ A
`Department of Defense data network, developed by _ARPA, which
`tied together many users and computers in universities, govern-
`ment and businesses. ARPANET was the forerunnerof many
`developments in cornmercralvdata communications,
`including
`packet switching, which was first tested on a large scaleon this
`network. The predecessor of the internal, it was started in 1_969
`with funds from the Defense Departments Advanced Proiects
`Research Agency (ARPA). ARPANE‘ was split into DA_RFANET
`(Defense ARPANET) and MILNET (MlLitary NETwork) in 1983.
`AHPANH was officially retired in _1 990.
`ARPM Average Revenue Per_ Minute.
`no Automatic. Retransmissior
`reOuest. The standard
`method of checking transmitted data, used or virtually all
`high-speed data comrnunrcatiors systems. The sender
`encodes an error—delection field based on the contents of the
`message. The receiver recalculates the check f eta and com-
`pares it with that received. if they match, an "ACK _(acknow|-
`edgment) is transmitted to the serlder.
`If they dont match, a
`‘NAK" (negative acknowledgment) s returned, and the sender
`retransmits the message. Note: the method 0 error correc-
`tion assumes the sender temporarily or permanently stores
`the data it has sent. Otherwise, it couldn't possbly retransmit
`the data. No error detection scheme in data transmission is
`foolproof. This one is no exceptior.
`Array 1. The description of a location of polite by coordi-
`nates A 2-D array is described w'th x,y coordinates. A 3-D
`array is described with x,y,z coordinates.
`2. A named, ordered collection of data elements hat have iden-
`tical attributes; or an ordered collection of identical structures.
`3. Two or more hard disks that read and write the same data.
`in a RAID system, the operating system treats the array as if it
`were a single hard disk.
`Array Antenna Take a bunch of directional antennas. Aim
`them at the same transmitting source. Join them together.
`Presto, you now have a very powerful giant antenna. Array
`antennas are used for picking up weak signals. They are often
`used in astronomical and defense communications systems.
`Array Connector A connector for use with ribbon fiber cable
`that ioins 12 fibers simultaneously. A fan-out array design can
`be used to connect ribbon fiber cables to non—ribbon cables.
`llray Processor A processor capable of executing
`instructions in which the operands may be arrays rather than
`data elements.
`
`Arrestor A device used to protect telephone equipment
`from lightning, electrical storms, etc. An arrestor is typically
`gas filled so when lightning strikes,
`the gas ionizes and,
`bingo, a low resistance to the ground that drains the damag-
`ing high voltage elements of the lightning away.
`Arrival late A call center term. The pattern in which calls
`arrive. Call Arrival Rates can be smooth, like outgoing telemar-
`keting calls, or random, like incomingtoll-free number calls, or
`peaked, where calls escalate in response to advertising.
`ARS Automatic Route Selection, also called Least Cost
`Routing. A way that your phone system automatically choos-
`es the least expensive way of making the call that it is pre-
`sented with. That least expensive way may be a tie line or a
`WATS line, etc.
`it may even be dial-up. See Least Cost
`Routing and Alternate Routing.
`Article An Internet term. An article is a USENET conversa-
`tion element. It is a computer file that contains a question or
`piece of information made available to the USENET commu-
`nity by posting to a newsgroup.
`Artifacts Distortions in a video signal. Unintended,
`unwanted visual aberrations in a video image. In all kinds of
`computer graphics, including any display on a monitor, arti-
`facts are things you don't want to see. They fall into many cat-
`egories (such as speckles in scanned pictures), but they all
`have one thing in common: they are chunks of stray pixels
`that don't belong in the image.
`Artificial Intelligence In 19305, Alan Turing, a British
`mathematician, challenged scientists to create a machine that
`could trick people into thinking it was one of them. The idea
`is that a computer will have achieved intelligence when a per-
`son chatting over a teletype is unable to tell whether a human
`being or a machine is at the other end of the conversation.
`And this for long was THE classic definition of artificial intel-
`ligence. After half a century,
`the prospect of passing the
`Turing test remains so remote that many computer scientists
`have abandoned it as a practical goal. The real challenge
`these days with artificial
`intelligence, now more commonly
`called “expert systems,” is not to recreate people but to rec-
`ognize the uniqueness of machine intelligence and learn to
`work with it in intelligent, useful ways.
`Artificial lino Interface in T—1 transmission, refers to
`the ability of a piece of transmission equipment to attenuate
`its output level to meet the required loop loss of 15-225 dB
`normally switch selectable between 07.5, and dB.
`Allll Audio Response Unit. A device which gives audible infor-
`mation to someone calling on the phone. “Press 1 for the train
`timetable to Boston." The ARU reads the timetable. The caller
`responds to questions by punching buttons on his telephone
`keypad. If this sounds like Interactive Voice Response — IVR,
`you're 100% right because that's exactly what it is. See lVR.
`AS 1. Autonomous System. An Internet term. An Autonomous
`System is just
`that — a system which is autonomous.
`Typically, an AS is an lSP, an Internet Service Provider. Within
`the lSP, routers exchange information freely — all systems
`are trusted, as they are under a single administration in the
`same domain. Therefore, such systems can run an IGP
`(Interior Gateway Protocol) such as lGRP (Interior Gateway
`Routing Protocol) or OSPF (Open Shortest Path First). As the
`same level of trust does not exist between ASs, they must run
`an EGP (Exterior Gateway Protocol) such as BGP (Border
`Gateway Protocol) or IDRP (|nterDomain Routing Protocol).
`See also BGP, EGP, IDRP, IGP, lGRP and OSPF.
`2.Australian Standards. Standards that have been approved
`by Standards Australia in response to formal requests from
`
`Page 3 of 12
`
`
`
`|0NARY
`
`NEWTON’S TELECOM DICTIONARY
`
`_
`
`ack-end can be the result of the reps selling .‘.
`the product. See Front End Results.
`feed Pull Used in tight locations where it's i~
`arge cable pulling equipment. The cable is fed ~
`im the mid-point. The first section of cable is
`zction. Afterthis is fed, the remaining cable tsp’
`through the opposite direction to the other eng‘
`Iaul Back haul is a verb. A communications ii
`hauling when it takes traffic beyond its destin
`iere are many reasons it might do this. The first
`ae cheaper to go that route instead of going i‘
`yht, for example, have a full—time private line ii
`Dallas. You might find it cheaper to reach Na .
`3 Dallas first, then dialing back to Nashville.
`v
`of backhauling may change from one in ”
`‘as the line to Dallas is empty, close to full
`I
`r reason for back hauling is that you may .
`a"
`nodate changes in your calling or staffing .1‘
`iy have an automatic call distributor in Omaha . ’
`ago. A call from New York may come into your l
`iut when it gets there you may discover that ‘
`nts available to handle the call. So it may no;
`to back haul the call to the Chicago ACD,
`'
`s available. In fiber networks, back hauling is lg
`ement technique used to reduce the expense of
`i/demultiplexing.
`s_
`Hoe Fde The degradation in service ii‘
`I backhoe cuts your buried fiber optic cable. Cal
`re sometimes not all communications are out i.
`:hey are all cut off, the term becomes a eup .“_
`to report a back hoe fade to your boss than ;
`just
`lost 158,000 circuits between New Y ’
`ngton. Our customers are not pleased."
`Office Operations Management and sup '
`in be performed away from a companys head 5
`is telemarketing, credit card processing, data H
`:e and many clerical and accounting function:
`operations are an economic development op_
`all communities that have the appropriate inlr _
`advanced telecommunications,
`reliable expr
`es.) Back office operations are helping sharea _,
`l of place, one in which,
`for example, --- J
`aness is no longer a liability — because of let,
`M15 and other linkages to the “outside" world. ’
`; Porch The portion of a video signal that oc ‘
`anking from the end of horizontal sync to the -‘,5
`live video. The blanking signal portion wli,
`en the trailing edge of a horizontal sync pulse 1
`g edge of the corresponding blanking pulse. 0 i
`ated on the back porch.
`‘
`r Proieclion When the projection is placed I
`n (as it is in television and various video co :,
`rations where the image is displayed on anion
`screen) it is described as a back projections *
`systems the viewer sees the image via the tran .
`ht as opposed to reflection used in front prtyle '1:
`Audiences generally prefer back projection E
`they seem brighter.
`,
`c lo Back Channel Bank The connection
`ency and signaling leads betweenlchannel "
`rdropping (ie. removing) and inserting (ie. a 3
`nets.
`‘—
`ii to Back Connection A connection be
`.
`it of a transmitting device and the input of an -“
`
`Wining device. When used for equipment measurementsor
`-
`urposes, this eliminates the effects of the transmis-
`ggringhgnnel or medium.
`"A, go Back Peering Peering is when large ISPS
`(Internet Service Providers) assume that the traffic is approx-
`imafly equal between them, and both benefit equally from a
`pee connectivity between them since both companies need
`each others network to get people to their web sites. These
`[SP5 allow traffic from these large lSPs to enter their network
`tor free. Companies that are allowed into this prestigious club
`are called Tier 1 providers. They include Sprint, CAIS, UUNet,
`PSlNet (the first and largest independent commercial ISP in
`ineworid), CablehandMWiLelehss, etc. Companies that do ntot
`have large enttirtligg
`néamgrrkss ave o pay ier
`companies o
`gemcess [0 em one Back to s uare one (or “back at
`‘uh Io §qm'“l'ie
`th
`r‘
`'nal qa of sa 'n
`'t) comes
`square one, whic was
`e Otlgl
`fvv y th
`Th
`from football
`radio cornmen aries
`rom
`e_
`s.
`__ere
`gging no pictore,_these live retpglrts wriluld explainghe ]IJOSlt_|CtlJfl
`or play by dividing the fogt ampitc ligo nuhm erejdllgri si
`Square one was just in ion 0
`egoa. o,w ena Ha wen
`out or play and resulted in a goal kick, the play was back at
`if? firisyfsgr A program or device that copies files so
`(
`.
`V
`at least two up-to—date copies always exist.
`_
`_
`Iaclclcone The backbone is the part of the communications
`network which carries the heaviest ‘traffic. The backbone is
`also that_part of _a network which joins LANs together —
`either inside a building or across a city or the country. LANs
`are connected to the backbore via bridges and/or routers and
`the backbone serves as a conrnunications highway for LAN-
`to-LAN traffic. The backbone is one basis for design of the
`overall network service. The backbone may be the more per-
`manent part of the netiivork. A backbone in a LAN, a WAN, or
`a combination of both dedcated to providing connectivity
`SUbilt;tW0f|klS in ari¢entelrprise—wi;r\le network.
`d
`c
`one
`on ing
`on uclor
`copper con uctor
`extending from the telecomrrunications main grounding bus-
`berti|i(tltie larthestlhloor telecommunications grounding busbar.
`In one to ing Gabe and connecting hardware that
`comprise the main and intermediate cross—connects, as well
`as cable runs that extend be ween telecommunications clos-
`ifi iigiiipmer;_tlroom|'sTa:id entrance fgci_l|i(§i_es.
`h
`m b
`k
`(
`one
`ose
`BCOSB llla Ul
`lflgW STE
`8
`8C -
`bone cable is terminated and cross connected to either hori-
`z'o:ita|lli.listribugion ‘cable or o her backbone cable.
`_ c
`one aci ilies Plant and equipment used to pro-
`v:de1trans;ndission services to connect tributary facilities from
`cusers o
`ispersed users or devices. See Backbone.
`Backbone Network The part of a communications facil-
`littthat connects primary nodes; a primary shared communi-
`cations path that serves multiple users via multiplexing at
`designated jumping-off points. A transmission facility, or
`mllcernent of such facilities, designed to connect
`lower
`Weed channels or clusters of dispersed users or devices.
`|Ic||:|I:one gulhsyslem See Riser Subsystem.
`_
`one o orizontal Cross-Connect BHC. Point
`mgerconnection between backbone wiring and horizontal
`filocnckbone Wiring The physical/electrical
`interconnec-
`s between telecommunications closets and equipment
`rooms Cross-Connect hardware and cabling in the Main and
`flflmediate Cross-Connects are considered part of the back-
`fle wiring.
`
`Backcharging A phone fraud term. Backcharging is start-
`ing the clock on a phone call at the time a customer contacts
`the long-distant phone service provider — not when the per-
`son being called answers the phone — which is what
`it
`should be.
`Backfeecl Pull A method used to pull cable into a conduit
`or a duct liner when the cable is long or when placing cable
`into controlled environmental vaults, central offices, or under
`streets. With this method, the cable pays off its reel at an
`intermediate manhole and is first pulled ir one direction. The
`remaining cable is then removed from tie reel,
`laid on the
`ground, and then pulled in the opposite drection.
`Backfile Conversion The process of scanning in, index-
`ing and storing a large backlog of paper or microform docu-
`ments in preparation of an imaging system. Because of the
`time-consuming and specialized nature o the task,
`it is gen-
`erally performed by a service bureau.
`Backfilling To designate memory on ar expanded memory
`card and make it available for use as conventional memory.
`Background See Background Processing.
`Background Area of Concern, Consequence
`Incenlive BACl.
`A questioning strategy used by
`Lucent Technologies for uncovering a customer's implied
`needs and converting them to clearly defned ones that may
`lead to a purchasing decision.
`Background Communiccrlion Daa communication,
`such as downloading a file from a builet'n board, that takes
`place in the background while the user concentrates on
`another application (eg. a spreadsheet) ii the foreground.
`Background Music This feature at ows music to be
`played through speakers in the ceiling and/or through speak-
`ers in each telephone,
`throughout the office, or office-by-
`office, or selectively. Background music is typically played
`through paging speakers, but
`it can also be played through
`the speakers of speakerphones. In fact, the two — paging and
`background music — often go hand-in-hand. When you want
`to page someone,
`the music turns off automatically and
`comes back on when the paging is over. The same thing hap-
`pens on airplanes. Background music is said to motivate
`workers, often into shutting it off.
`Background Noise The noise you hear when nothing
`else is being transmitted. Digital circuits are so quiet that
`some form of White Noise must be injeccted into them so as
`to prevent people from suspecting that the circuit
`they’re
`speaking on has gone dead. See also White Noise.
`Background Processing The automatic execution of
`’ lower priority computer programs when higher priority pro-
`grams are not using the computer’s resources. A higher pri-
`ority task would be completing calls. A lower priority task
`would be running diagnostics. Some PBXs have this feature.
`Some insist on running their diagnostics even though they
`are choked with calls. The smarter ones tone down their diag-
`nostics when they get busier, which makes sense.
`Background Program A low priority program operating
`automatically when a higher priority (foreground) program is
`not using the computer system’s resources.
`Background Task A secondary job performed while the
`user is performing a primary task. Forexample, many network
`servers will carry out the duties of the network (like control-
`ling who is talking to whom) in the background, while at the
`same time the user is running his own foreground application
`"(like word processing). See also Background Processing.
`Backlcaul See Back Haul.
`Backhoe Fade See Back Hoe Fade.
`
`Page 4 of 12
`
`
`
`/|DlCT|0NARY
`
`NEWTON’S T_ELECOM DICTIONARY
`
`ring installation or manufacture to identify it.
`and Pass Filter BPF A device which passes a specific
`ige of frequencies and (in theory) blocks all others.
`and Splitter A multiplexer designed to split the available
`iquency band into several smaller channels. A band splitter
`it use time division or frequency division multiplexing.
`and Stop Filter BSF. A device which blocks a specific
`ige of frequencies and (in theory) passes all others.
`and, Citizens One of two bands used for low power
`tio transmissions in the United States ~ either 26.965 to
`.225 megahertz or 462.55 to 469.95 megahertz. Citizens
`nd radio is not allowed in many countries, even some civi-
`ed countries. In some countries they use different frequen-
`ts. CB radios, in the United States, are limited by FCC rule
`four WATTS of power, which gives each CB radio a range
`several miles. Some naughty people boost their CBS with
`ternal power. The author of this dictionary has actually spo-
`n to Australia while driving on the Santa Monica Freeway in
`s Angeles. See also CB.
`Ind, Frequency The frequencies between the upper and
`Net bands. See also BAND. Here is the accepted explana-
`n of “bands:"
`low 300 Hertz — ELF — Extremely lowlrequency
`0—3,000 Hertz — ILF — infra Low Frequency
`3—30 kHz — VLF — Very Low Frequency
`30-300 kHz — LF — Low Frequency
`00—3,000 kHz — MF — Medium Frequency
`3-30 MHz — HF — High Frequency
`30-300 MHZ — VHF— Very High Frequency
`t0—3,00tJ MHz — UHF—— Ultra High Frequency
`3——3OGHz — SHF— SuperHigh Frequency
`30—30OGHz — EHF— Extremely High Frequency
`)0——3,000 GHz — THF — Tremendously High Frequency
`Band
`American
`0.2-1.0 Ghz
`1-2 Ghz
`2-4 Ghz
`4-8 Ghz
`8-125 Ghz
`-
`12.5—iEl Ghz
`‘|8—26.5 Ghz
`18-30 on}
`26.5-40 Ghz
`30-47 Ghz
`-
`Q
`mded Memory In a PostScript printer, virtual printer
`imory is a pan of memory that stores font information. The
`imory in Postscript printers is divided into banded TlBTll0-
`and virtual memory. Banded memory contains gaphics
`d page-layout information needed to print your documents.
`tual memory contains any font information that is sent to
`ur printer either when you print a document or wten you
`wnload fonts.
`mded Iiale A price range for regulated telephoie ser-
`:e that has a minimum floor and maximum ceilirg. The
`nimum covers the cost of service; the maximum is he rate
`id in the price list.
`mdil Mobile A mobile subscriber that is revealed in the
`l—ticketing records as having an invalid ESN, inval'd tele-
`one number, or other problem that warrants denial of ser-
`ie to that mobile.
`mio Also called beaver tail. Used to connect devices to
`idular
`jack wiring for
`testing. See Modular B eakout
`apter.
`
`Bunio cli See Modular Breakout Adapter.‘
`ggndmar ing A continuous circumferential band applied
`to an insulated conductor at regular intervals for identification.
`undpass The range of frequencies that a channel will
`transmit (i.e. pass through) without excessive attenuation.
`ggmlpllss Filler A device which transmits a band of fre-
`quencies and blocks or absorbs allother frequencies not in
`specified band. Often used in frequency division multi-
`pjexirig to separate one conversation from many.
`gundpass limiter A device that imposes hard limiting on
`a signal and contains a filter that suppresses the unwanted
`products of the limiting process.
`Bandwidth 1.
`in telecommunications, bandwidth is the
`width of a communications channel.
`In analog communica-
`tions, bandwidth is typically measured in Hertz — cycles per
`secord.
`In digital communications, bandwidth is typically
`measured in bits per second (bps). A voice conversation in
`analog format is typically 3,000 Hertz, carried in a 4,000 Hertz
`analog channel. in digital communications, encoded in POM,
`its 64,000 hits per second. 00 not confuse bandwidth with
`band. Lets say we’re running a communications device in the
`12 GI-z band. What's its bandwidth? That's the space it's occu-
`pying. Lets say it's occupying from 12 GHz to 12.1 GHz. This
`neans that it's occupying the space from 12,000,000,000 Hz
`o12,100,000,000 Hz. This means its bandwidth is one hun-
`dred
`iillion cycles or one hundred megahertz (100 MHz).
`Atfilia ed terms are narrowband, wideband and broadband.
`While these are not precise terms, narrowband generally refers
`o sor e number of 64 Kbps channels (Nx64) providing aggre-
`gate bandwidth less than 1.544 Mbps (24x64 Kbps, or T—1),
`wideband is 1.544 Mbps45 Mbps (T-1 to T-3) and broadband
`provic es 45 Mbps (T-3) or better.
`2. The capacity to move information. A person who can mas-
`er ha dware, software, manufacturing and marketing — and
`plays the oboe or some other musical instrument — is “high
`bandwidth.” The term is believed to have originated in
`Redmond, WA in the headquarters of Microsoft. People there
`'eg., Bill Gates) who are super-intelligent and have generally
`Jroad capabilities, are said to have “high bandwidth.”
`3. Microsoft jargon for schedule. For example, ‘‘I have a band-
`width problem" means that l have an overloaded schedule.
`4. The combined girth of a rock band. By way of example, the
`Jand "Meat|oal” is broadband, largely due to the individual
`girth of the singer by the same name. On the other hand, the
`"Flolling Stones" are narrowband, due largely to the svelte
`Mick Jagger. While the "Rolling Stones" are older, they are
`also richerthan is “Meatloaf.” So, bandwidth is not everything!
`Bandwidth Augmentation Bandwidth augmentation is
`the ability to add another communications channel
`to an
`already existing communications channel.
`Bandwidth Compression A technique to reduce the
`bandwidth needed to transmit a given amount of information.
`Bandwidth compression is used typically in “picture type"
`transmissions — such as facsimile, imaging or video-con-
`ferencing. For example, early facsimile machines scanned
`each bit of the document to be sent and sent a YES or NO (if
`there was material
`in that spot or not). More modern
`machines simply skip overall the blank spaces and transmit
`a message to the receiving facsimile machine when to start
`printing dots again. A facsimile "picture" is made up of tiny
`dots, similar to printing photos in a magazine. Today, band-
`width compression is used to transmit voice, video and data.
`There are many techniques, few of which are standard. The
`key, of course, is that if you’re going to compress a “conver-
`
`sation” at one end, you must “decompress” it at the other
`end. Thus, in every bandwidth compressed conversation there
`nust be two sets of equipment, one at each end. And they bet-
`er be compatible.
`Bandwidth Envy l have a dial-up connnection to the
`nternet. You have a DSL line. You‘re running 20 to 30 times
`aster than me. I envy your good luck.
`I have bandwidth envy.
`Bandwidth Junkie One who worships brute speed when
`‘t comes to Internet connections. He's the type of person who
`has
`a
`T-1
`line
`in
`his
`bedroom.
`Eric Smestad,
`ninfan@Limbo.Alleged.com, wrote me, “After reading your
`definition of “Bandwidth junkie” i started to feel rather wor-
`ied, you see, I am afraid that two of my friends and i may be
`bandwidth junkies. We live in the same apartment building
`and have ethernet cable ran from apartment to apartment, a
`switched hub, and a T—1
`line to the Internet with a Cisco
`outer. These seem to be obvious symptoms. is there a cure?"
`Answer, there is no cure.
`Bandwidth limited Operation The condition prevail-
`'ng when the system bandwidth, rather than the amplitude (or
`power) of the received signal, limits performance. The condi-
`ion is reached when the system distorts the shape of the sig-
`nal wavetorm beyond specified limits. For
`linear systems,
`bandwidth-limited operation is equivalent to distortion-limit-
`ed operation.
`Bandwidth On Demand Just what it sounds like. You
`want two 56 Kbps circuits this moment for a videoconference.
`No problem. Use one of the newer pieces of telecommunica-
`tions equipment and ‘‘dial up" the bandwidth you need. An
`example of such a piece of equipment is an inverse multiplex-
`er. Uses for bandwidth on demand include video conferencing,
`LAN interconnection and disaster recovery. Bandwidth on
`demand is typically done only with digital circuits (they're eas-
`ier to combine). Bandwidth on demand is typically carved out
`of a T—1 circuit, which is permanently connected to the cus-
`tomer's premises trom a long distance carrier's central office,
`also called a POP — Point of Presence.
`Itang An exclamation point (i) used in a Unix-to—Unix Copy
`Program (UUCP) electronic mail address. People who are on
`AT&T Mail often give you their mail address as “Bang Their
`Name.” My AT&T Mail address used to be Bang HarryNewton,
`i.e. !HarryNewton.
`Bang Path A series of UUCP nodes mail will pass through
`to reach a remote user. Node names are separated by excla-
`mation marks nicknamed “bangs." The first node in the path
`must be on the local system, the second node must be linked
`to the first, and so on. To reach user1 on sys2 if your com-
`puter‘s address is syst you would use the following address:
`sys1! sys2! sys3! usert
`Bank A row of similar components used as a single device,
`like a bank of memory. Banks must be installed or removed
`together. See Bank Switching.
`Bank Switching A way of expanding memory beyond an
`operating systems or microprocessor's address limitations by
`switching rapidly between two banks of memory. in MS—DOS,
`a 64K bank of memory between 640K and one megabyte is set
`aside. When more memory is needed, the bank, or page, is
`switched with a 64K page of free memory. This is repeated
`with additional 64K pages of memory. When the computer
`requires data or program instructions not in memory, expand-
`ed memory software finds the bank containing the data and
`switches it with the current bank of memory. Although effec-
`tive, bank switching results in memory access times that are
`slower than true, extended memory.
`
`European
`02-0375 Ghz
`0.375-1.5 Ghz
`1.5-3.75 Ghz
`3.75-6 Ghz
`6-11.5 Ghz
`11.5-18 Ghz
`
`PLSCXJK
`
`KK
`
`u
`
`a
`
`Page 5 of 12
`
`
`
`IOM DICTIONARY
`
`NEWTON’S TELECOM DICTIONARY
`
`Curd Dialer A device attached to a telephone Wm
`accepts a special plastic card and then automatically dials [32
`number on the card as indicated by the holes punched in (1
`card dialer is now obsolete except for unusual applicati
`‘A
`like systems whereby you carry your card with you and US”
`as a security device.
`(pronounced
`Curd Issuer lrlenlilier Code CIID —
`“sid“) A code issued with certain calling cards. AT&T’s Cm)
`cards cannot be used by other interexchange carriers but C3,,
`be used by LECs.
`Curd Servius The softiiiiare layer above Socket Servicg
`that coordinates access to PCMClA cards, sockets and 5“
`tem resources. Card Services is a software management inter.
`face that allows the allocation of system resources (such 3
`memory and interrupts) automatically once the sock,
`Services detects that a PC Card has been inserted. Thisi;
`called “hot swapping." The idea is that you can slide PCMCTA
`cards in and out of PC at will and your Socket and Card set.
`v'ces will recognize them and respond accordingly. its a gm
`tteory. l n practice, it doesn't work because certain cards, mg
`network cards, simply can't be connected and disconnected;
`will. Socket Services is a Bl0S level software interface fig
`provides a method for accessing the PCMCIA slots of a corn
`puter. Card Services is a software management interface iii;
`a lows the allocation of system resources (such as memory
`and interrupts) automatically once the Socket Services
`detects that a PC Card has been inserted. Both of these Spec.
`if'cations are contained in the PCMCIA Standards document
`You do not need either Socket or Card Services to success.
`fully use PCMCIA cards in your desktop or laptop. You sim
`py need the correct device drivers and the proper memory
`exclusions. See PCMCIA, Socket Services and Slot Sizes.
`Curd Slol A place inside a phone system or computer into
`watch you slide a printed circuit board. See Board.
`ccmllus Laptops typically come with slots for what are now
`kr own as PC cards —- little credit card size devices who on
`various things — like become a modem, become a network
`interface card, become a video conferencing card, become at
`ISDN card, etc. These cards were originally called PCMCIA
`cards. (For a full explanation see PCMCIA). The original
`PCMClA spec was 16-bit