throbber
a i
`
`MOOSE ope
`
`EH Gga
`
`"anmm oT]SI
`
`CMPBooks Page 1 of 7
`
`The Authoritative Resource for
`Telecommunications, Networking,
`the Internet and Information Technology
`
`td 7
`EeEeata
`
`Samsung Exhibit 1033
`
`
`
`Page 1 of 7
`
`Samsung Exhibit 1033
`
`

`

`
`
`Page 2 of 7
`
`
`
`Page 2 of 7
`
`

`

`NEWTON’s
`TELECOM
`DICTIONARY
`
`
`
`Page 3 of 7
`
`

`

`N49
`R002
`b}
`Ory
`
`NEWTON's TELECOM DICTIONARY
`copyright © 2002 Harry Newton
`email: Harry@HarryNewton.com
`ersonal web site: www.HarryNewton.com
`Binecs web site; www.TechnologyInvestor.com
`All rights reserved underInternational and Pan-American Copyright conventions, including
`the right to reproduce this book or portions thereof in any form whatsoever,
`
`Published by CMP Books
`An imprint of CMP Media LLC.
`12 West 21 Street
`New York, NY 10010
`
`ISBN Number 1-57820-104-7
`
`February 2002
`
`Eighteenth Edition
`
`Forindividual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMPBooks
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 1-800-500-6875 or 408-848-3854
`Fax: 408-848-5784
`Web: www.cmpbooks.com
`Email: cmp@rushorder.com
`
`This bookis also sold through www.Amazon.com, www.Fatbrain.com and
`www.BarnesAndNoble.com
`
`Distributed to the book trade in the U.S. and Canada by Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 4 of 7
`
`
`
`Page 4 of 7
`
`

`

`LAWLN LU bles
`
`sane
`
`e (tr
`Fr-t-od
`
`Table of Contents
`
`HELP MAKETHIS DICTIONARY EVEN BETTER
`= Wecoffar- rend teWGtbccs cance emunmecenrn examen Ab SEG BRN ARN OR ERIE eae V
`
`119 BEST DOLLAR-SAVING TIPS
`- How To Save on Telecom, PC, Inteet and Airline Expenses and Best Investment Tips............2+20055 VII
`
`WHYIS IT SO HARD TO BUY?
`- The logic of call centers, customer cares, and buying on the Internet ......... 222. ..0eeese esse eeees XV
`
`WHERE'S THE TECHNOLOGY GOING?
`- Cheaper, faster and more reliable are obvious frends but there are other less obvious important ones also. .... XVII
`
`DISASTER RECOVERY PLANNING
`- How to Make Sure Your Computing and Telecommunications Still Run... 2.2.2... eee e eee XIX
`
`RULES FOLLOWEDIN THIS DICTIONARY
`- How to figure our ordering of terms and our spellings... 2... 0... e eee e cece eee eee teen ee XXI
`
`ABOUT THE AUTHOR
`- Harry Newton does have a life outside this dictionary ..... 2... .02- esse cece eee e eee eee eee eee XXV
`
`ABOUT THE CONTRIBUTING EDITOR
`- Ray Horak teaches, consults and lives in Paradise... 2.02... cece e ence eect eee eee XXVIl
`
`DICTIONARY
`Dictionary begins with Numbers then goes onto Letets .... 2.2... 0. cece cette eee ]
`
`APPENDIX
`- Industry Stondards Organizations and their contact information....... 2.6.02 ese eeeee renee eee 850
`[GRAN CONN CONGRco; ccayeiese perme saws veces wionarmann eaosmcemmeaemm comecnmeeen re 856
`- Stondard Plugs and Connectors... 0... eee eee eee e cet e ee eee eee e eet een e nent n ees 858
`
`Ml
`
`Page 5 of 7
`
`
`
`Page 5 of 7
`
`

`

`800 / 802.114
`
`tond commonterm for In-WATS (Wide Area Telecommunications Service) service a
`
`a centrolized computing platform. The database identifies the LEC or IXC nachage
`
`denotes either o supplementto a standard, or aFeaof o multiple-number stondard (e.g.,
`ond Zilog 7-80, were instolled in 8-bit computers such as the Apple Il, the MSAI 8080, ond
`the Commodore 64.
`802.1 & 802.3). The 802 stondards segmentthedata link layer into two sublayers:
`800 The first “oreo code” for what AT&T originally called In-WATS service. See 800
`1. A Media Access Control (MAC) layer that includes specific methods for gaining
`access to
`Service and 8NN.
`elLsThese methods— suchos Ethemet’srondom access methodandToken Ring's
`mtA‘giaLink Control
`(LLC) Layer, described in the 802.2 stondord, that provides for
`800 Portability 800Portability refers ¥thefact thatyecan takeyour 800 num-
`ing procedure — ore in the 802.3, 802.5 ond 802.6 standards.
`ber to“—distance comier. A case example, once | hod
`1-G00-LIBRARY. For many
`umberwas noviAT&T. When portability comealong, we were able to
`
`ities AT&TtoMCIondstillkeep 1-BOC-IBRARY, which is 800-542-7279. 800
`connection establishment, data tronsfer, and connection termination services. LLC specifies
`three types of communications links:
`* An Unacknowledged Connectionless Link, where the sending ond receiving devices do not
`Portability is provided by a series of complex databases the local phone companies, under
`set up a connection before transmitting. Instead, messages are sent on o “best effort”
`FCC mandate, have built. 800 Portability started on May 1, 1993. See 800 Service,
`basis, with no provision for error detection, ertor recovery, or message sequencing. This
`800 ServiceA toll call paid for by the called party, rother than the calling party. A gener-
`type oflink is bast suited for applications where the higher layer protocols con provide the
`0 phone company, whether a LEC (Local Exchange Corries) or on IXC (IntereXchange
`error comection ond functions, or where the loss of broadcast messages is not critical
`Corrier). in North America ond in order of their introduction, oll these In-WATS services have
`* A Connection-Mode Link, where a connection between message source ond destination
`is estoblished prior to transmission. This type of link works best in applications, such as file
`800 (1967), 888 (1996), 877 (1998), 866 (2000), or 855 (2001) os their “orea
`tronsfer, where large amounts of data are being transmitted ot one time.
`code.” (Note: Future 800 numbers wil follow the convention 8NN, where NN are specific
`* An Acknowledged Connectionless Link that, os its name indicates,
`provides for acknow!
`numbers which are identical. Such 800 service is typically used by merchants offering to sell
`t of messages without burdening the receiving devices with maintaining o con
`something such as hotel reservations, clothes, or rental cars. The ideo of the free servica is fo
`nection, For this reason,it is most often used for opplications where a central processor
`entice customers to call the number, with the theory being that if the call was o toll call and
`communicates with o large
`number of devices with limited processing capobilities.
`therefore cost the customer something,
`he or she might be less inclined to coll. Suppliers of
`802,1 IEEE standard for overall architecture of LANs ond intemetworking. See all the
`800services use various ways fo
`configure and bill their 800 services.
`800 Service works like this: You're somewhere in North America, You dial 1-800,1-888,
`following definitions.
`1-877, 1-866 ot 1-855 andseven digits. The LEC (Local Exchange Cartier, i.e., the local
`802.1 Ve 802.110 is actually on updoted, bigger, better, foster version of 802.1 1b
`phone company) central office seesthe“1” and recognizes the call as long distance. It
`(clso called WiFi), which is now commonly installed
`in offices, airports, coffee shops, etc.
`also recognizes the SNN oreo code ond queries a centralized dotobase before processing
`Many laptops now come with 802.11b built-in. The newer 802.1 Io, also on IEEE ston-
`dord for wireless LANs, supports speads up to 54 Mbps. 802.110 runs in o 300-MAH7zallo-
`the call further, with the query generally taking ploce over 0 SS7 (Signaling System 7)
`cation in the 5 GHz range, which wos allocated by the FCC in support of UNII (the
`link. The centralized database resides an a Service Management System (SMS), which is
`Unlicensed National Information Infrastructure). Specifically, 200 MHz is allocated at 5.15-
`5.35 MHz for in-building applications, and 100 MHz at 5.725-5.825 MHzfor outdoor use.
`This allocated spectrum is divided into three working domains. At 5.15-5.25 Miz, moxi-
`mum power output is restricted to SOmW (milliWatts), 5.25-5.35 to 250mW, ond 5.725-
`5.825 to | Wott. 802.110 hos been dubbed Wi-FiS (Wireless Fidelity 5 MHz) by the
`Wireless Ethernet Compatibility Alionce (WECA).
`
`Corrier) providing the BNN number. Based on that information, and assumingthat the
`free number is associated with an IXC, the LEC switch routes the call to the proper IXC.
`Once the IXC has been handed the call, it processes the 800 number, perhaps translating
`it into a “real” icsp numberin order to route itcorrectly, Alternatively, the IXC trans:
`lates the 800 number
`into an intemal, nonstandard 10-digit number for further routing to
`802.110 uses Coded Orthogonal Frequency Division Multiplexing pealos theartya
`the terminating Central Office (CO) and trunk or trunk group.
`As a reoHlife example, the publisherofthis book has on 800 number, 8O0-LIBRARY (or
`modulotion technique. COFDM sends a stream of dota symbols in o massively parallel
`ion, with multiple subcarriers (i.e., small slices of RF, or Radio Spectrum, within the desig-
`800-542-7279). When you call that number, MCI routes that number fo the first available
`noted cater frequency band. Each conier channel is 20 Miz wide, ond is subdividedinfo
`chonnel on the dedicated T-1 circuit which leased from MCI’s, and connecting the MCI New
`York City POP (Point Of Presence) to the CMP New York City
`office.
`52 subcorier channels, each of which is approximately 300 KHz wide; 48 of the subcor
`rier channels ore used 4 data transmission, and the remaining four for error control.
`Because 800 long distance service is essentially a database lookup ondtranslation service
`Through the opplication of a codingtechnique, eachsymbol comprises multi oebits.
`for incoming phonecalls, - are aruieetet you con= con
`
`permonentinstructions intothecompany to routing pattems on time
`
`The specified coding techniques and , all of which mustbesupporteddeta rates
`
`
`by802.pretirarincludeBPSK(BinaryPhaseShiftKeying)ot125baa
`doy, day of week, number colled, number calling. Some longdistance companies allow you
`channel for a tofal of 6 Mbps across all 48 dato channels, QPSK (Quodictve Phase Shift
`to change your routing instructions from one minute to another. For example, you might
`have two call centers into which 800 phonecalls ore nya When onegets busy, you
`Keying) at for 250 Kbps per channel for a total of 12 Mbps, and 16QAM (1éevel
`may tell your long distonce company to route all the 800 inbound phone calls to the call
`Quodroture Amplitude Modulation) at 500 Kbps per channel for a total of 24 Mbps. The
`center, which isn't busy. See Eight Hundred Service and One Number Calling for more,
`stondard also allows more complex modulation schemes, thot offer increased data rates.
`Currently, the most complex ond fastest is 640AM (64-level QAM), at 1.125 Mbps per
`especially all the features you con now get on 800 service.
`inMayof1993theFCCmandotedthatoll 800(andbyextensionall BNN) numbersbecome
`channel for a total of 54 Mbps,
`“portable.” Thot means that customers can take their 800 telephone number from one long
`The symbol rate is slowed down enough that each symbol transmission is longer thon the
`dene compony 10 another, and still keep the some 800,See also 800 Portability.
`delay spread. The delay spread is the variation in timing between receipt of the signals
`800 Services ore known internationally as “Freefone Services.” In other countries the dia
`ate ers oe pectFr fence
`
`Multipathfadingisthephenomenon the RF signalscomryingdapeste
`ing scheme may vary, with examples being 0-800 and 0-500. Such services also go under
`arive ot the receiveratslightlydifferenttimes. This isbecmeefoethe si
`SealeouFan
`the name “Greenfone.” In lune 1996, the ITU-T approved the £.169 standard Universal
`the transmitter, with certain portions ofthe signal reaching the scatmore or less directs
`International Freefone Number (UIFN) numbers, also known os “Global 800." UIFN will
`ly, while otherportions of the poreewuoff of walls, furniture, your co-work-
`work across national boundaries, based on o standard numbering scheme of 800, 888 or
`imposedonitthroughthecoding eSdiAsthemultiplesymbolsreach
`877 plus on 8-digit telephone number. See also UIFN ond Vonity Numbers.
`er’s pointy head, and such, Now, eo
`contains multiple bits, which ore
`802 See 802 Standards.
`802 Standards The 802 Stondords ore o set of standards for LAN (Local Area
`the receiver, they are sorted out ond decoded, with the decoding process providing some
`Network) and MAN (Mettopoliton Area Network} data communications developed through
`additional fime for the receiver to adjust for the delay spread ond to get ready to receive
`the next symbol. Both 802.1 To and 802.1 1b are designed to be compatible with Ethernet
`the IEEE’s Project 802. The two most important standards ore 802.116 ond 802.110. The
`LANs, using the MAC (Media Access Control)
`technique of CSMA/CA (Cormier Sense
`stondards also include an overview of recommended networking architectures, opproved in
`Multiple Access with Collision Avoidance),
`1990. The 802 stondards follow o unique numbering convention. A number followed by a
`copital letfer denotes a standalone standard; a number followed by o lower cose letter
`If this sounds great, that’s becouse it is great. If this sounds too good to be true, that’s
`
`Page 6 of 7
`
`
`
`Page 6 of 7
`
`

`

`802.11b / 802,19
`
`because it gets a little more complicated, While the 5 GHz spectrum is pretty cleor in the
`US,it’s notso readily available elsewhere. Military and government installations use por
`tions of this bond overseas.
`In Japan, only the 5.15-5.25 MHz spectrum is available,
`In
`Europe, the 5.725-5.825MHz spectrum is already allocated for other uses. In Europe, ETSI
`(European Telecommunications Standards Institute) requires that two additional protocols
`be used in conjunction with 802.110 in order to protect incumbent applications and sys-
`tems running over previously ollocated shared spectrum. DFS (Dynamic Frequency
`Selection) allows the 802.110 system to dynamically shift frequency channels and TPC
`(Transmission Power Control) reduces the power level. In combination, these protocols
`seve to eliminate interference issues with incumbent signals. See also 802.11b,
`802.11g, BPSK, CSMA/CA, MAC, OFDM, QAM, QPSK, WECA and WiFi.
`802.1 1b 802.11b is now the most common wireless local area network, 802.11b
`(also called WiFi) is now commonly installed in offices, airports, coffee shops, etc. Many
`loptops now come with 802.11b builtin. 802.11b hos heen dubbed Wii (Wireless
`Fidelity) by the Wireless Ethemet Compatibility Alliance (WECA). 802.11b defines both the
`Physical
`(PHY) ond Medium Access Control (MAC) protocols, Specifically,
`the PHY spec
`includes three tronsmission options — one Ir (Infrared), and two RF (Rodio Frequency).
`802.11b uses DSSS (Direct Sequence Spread Spectrum) modulation.for digital communi:
`cation. DSSS involves the transmission of a stteam of one’s and zero’s, which is modulat-
`ed with the Barker code chipping sequence. Barker code is on 11-bit sequence (e.g.,
`10110111000) that has advantages in wireless transmission. Each bit is encoded into on
`11-bit Barker code, with each resulting data object forming o “chip.” The chip is put on 0
`cartier frequency in the 2.4 GHz range (2.4-2.483 GHz), ond the waveform is modulated
`using one of several techniques. 802.11 systems running at 1 Mbps make use of BPSK
`(Binary Phase Shift Keying). Systems running at 2 Mbps make use of QPSK (Quaternary
`Phase Shift Keying). Systems running at 11 Mbps make use of CCK (Complementary Code
`Keying), which involves 64 unique code sequences, which technique supports six bits per
`code word. The CCK code word is then modulated onto the RF carrier using QPSK, which
`allaws another two bits to be encoded for each é-bit symbol. Therefore, each 6-bit sym-
`bol contains eight bits. Power output is limited by the FCC to 1 watt EIRP (Equivalent
`Isotropicolly Radiated Power). At this low power level, the physical distance between the
`transmitting devices becomes an issue, with error performance suffering as the distonce
`increases. Therefore, the devices adapt fo longer distances by using
`a less complex encod
`ing technique, and a resulting lower signaling speed, which translates into
`lower data
`rate. For example, a system running at 11 Mbps using CCK and QPSK, might throttle back
`to 5.5 Mbps by halving the signaling rate as the distances increase and error performance
`drops. As the situation gets worse, it might throttle back to 2 Mbps using only QPSK, and
`1 Mbps using BPSK. also to be considered in this equation is the foct that ihe 2.4 GHz
`range is in the unlicensed ISM\ (Industrial, Scientific and Medical) bond, which is shared by
`garage door openers, microwave ovens, bar code scanners, cordless phones, Bluetootn
`LANs, ond a wide voriety of other devices. As a result, this slice of spectrum can be heavi
`ly congested ot times, and performance can drop considerably. 802.11 divides the avai
`able spectrum into 14 chonnels. In the US, the FCC allows the use of 11 channels. Four
`channels are available in France, 13 in the rest of Europe, and only one in Japan. There
`also is overlap hetween adjacent channels (e.g., channels one and two), which fact further
`affects performance; thrloe, any given system must mointain maximum channel sepo-
`ration from other systems in proximity.
`Both 802.110 and 802.1 1h are designed to be compatible with Ethernet LANs. 802.1 1b uses
`a variation of the MAC (Media Access Contol) technique of CSMA/CA (Carrier Sense Multiale
`Access with Collision Avoidance), which és used in some wired Ethemets, as well. A device seek-
`ing to transmit over the shared medium (in this case, a shored RF channel) listens to the net-
`work. If it senses no activity over the canier frequency for a minimum period of time known
`as the DIFS (DCF (Distibuted Coordinated Function) InterFrame Spacing), it requests access
`by fist transmitting a RTS (Request To Send) packet. The RIS packet includes both the source
`(i.e., transmitter) ond destination (ie., intended receiver) addresses, the duration ofthe intend
`ed session (ie., transmission), and the ACK (ACKnowledgement) associated with it, If the net
`work is available, the destination device responds with CTS (Clear To Send), repeating both the
`duration ond the ACK. All other devices back off the network unfil the session is concluded. If
`the network, on the other hand,is busy, the device waits
`period of time equal to the DIFS,
`olus 0 random number of slot fimes, os calculated with saveral back-off timers. The “listening”
`process takes several forms. CAM (Constant Access Method), the default method, involves corr
`stant monitoring of the network, Since CAM creotes c power consumption issue for battery:
`powered devices, PAM (Polled Access Mode) con be substituted. PAM calls for all clent devices
`
`fo go into sleep mode, all awoking at regular intervals, at the exact sammetime, to listen for
`network octivity. On Ianuary 3, 2000 the 802.11 technologygf another boost when
`Microsoft and Starbucks announced that they were to join forces to
`offer wireless access, using
`802.11b among other standards, in most of Storbucks’ coffee outlets overthe next two years.
`The deal, some analysts say, is a further sign that 802.1 1b could become a serious competi
`for to better known wireless technologies such as Bluetooth, HomeRF, or even next-generation
`cellulor networks. Apple was the first to lounch on 802.116 product line (called AirPort). All
`Apple computers now include a builtin antenna which, in conjunction with a networking card,
`can exchange data with a small bose station plugged into a broadband Internet connection up
`to 45 metros (150 feet) away. Although some PC laptops now come pre-equipped with wire-
`less hardware, most users buy a PCMCIA card, or PC card, that serves as o wireless modem
`ond antenna. See also 802.110, 802.1 1g, Bluetooth, BPSK, Chip, CSMA/CA, DSSS, EIRP,
`Ethernet, HomeRF, MAC, QPSK, Spread Spectum, WECA and WiFi.
`802.12 Siondord for JOOVGAnylAN. Addresses 100 Mbps demandpriority access
`method physiccblayer and repeater specifications. Approved in 1995.
`802.15 A developing IEEE stondord for Wireless Personal Area Networks (WPANs), the
`802.15 Working Group (WG)comprises four Task Groups
`(TGs). T61is deriving
`a WPAN
`stondard bosed on the Bluetooth specifications. 162 is
`developing recommended
`practices
`to focilitate the coexistence of 802,15 WPANand 802.11 WLANs (Wireless Local Area
`Networks). 1G3 is chartered to draft a new standard for high-rate WPANs running at 20
`Mbps or better. Development is focusing on the 2.4 GHz band, using OQPSK (Orthogonal
`Quaternary Phase Shift Keying) as the modulation technique. 164 is chorged with investi-
`gating o low data rate WPAN solution running at no more then 200 Kbps in support of appli
`cations such as wireless interactive toys, sensors, outomation, and smart tags and badges.
`802.16 A developing IEEE standard for broadbond wireless access. The 802.16
`Working Group (WG) is working on a voriety of fixed wireless standards intended fo serve
`high-speed applications.
`$02. 1B Stondard for LAN/WAN management, approved in 1992; along with 802.1k,
`became the basis of ISO/IEC 15802-2.
`802.1D IEEE standard for interconnecting LANs through MAC bridges (specifically
`between 802.3, 802.4, and 802.5 networks). The stondord wos approved in 1990, ond
`was incorporated into [S0/IEC 10038. Works ot the MAC level.
`802. TE IEEE stondard for LAN and MAN load protocols. Approved in 1990, formed the
`basis for ISO/IEC 15802-4.
`802.1F Standard for defining network management information specified in 802
`umbrella stondards. Approved in 1993.
`80:2..1G A developing stondord for remote bridging at the MAC layer.
`802.1H IEEE practices recommended for bridging Ethernet LANs at the MAC layer.
`Approved in 1995.
`$02. TE IEEE stundard for using FDD! (Fiber Distributed Data Interface) as a MAClayer
`bridge. Approved in 1992, the standard wos incorporated into ISO/IEC 10038.
`02.14 IEEE stondord for LAN connectivity using MAClayer bridges. A supplement to
`802.10, it was approvedin 1996.
`802.1K IEEE standard for the discovery and dynamic control of network management
`information. Approved in 1993.
`In conjunction with 802.18, was the bosis for ISO/IEC
`15802-2.
`802. 1M A conformance statement for 802.1, it addresses definitions and protocols for
`system load monagement. Approved in 1993, it was incorporated into ISO/IEC 15802-4.
`80:2. 1P IEEE extension of 802.10. Specification for the use of MAC-oyer bridgesin filter
`ing end expediting multicast frffic. Priortization of traffic is occomplished through
`the addé
`tion of a $-bit, priority voluein the frame header. Eight topologyindependent priority volves
`(0-7) ore specified, with all eight values mappingdirectly into 802.4 and 802.6. Switches
`that support 802.1P ond 802.10 provide a framework for bandwidth prioritization.
`Essentially what all these wards meanis thot you con assign a priority to the type of traf
`fic with IEEE 802.1p class-ofservice (CoS) values and these allow network devices along
`the way to recognize and deliver high-priority troffic ino predictable manner. When con-
`ingas QoS drops low-pricrity traffic to allow delivery of highpriority traffic. See
`also
`802.10.
`$02.10 IEEE specification for implementation of VLANs in Layer 2 LAN switches, with
`emphasis on Ethernet. Similar to 802.1P, prioritization of traffic is accomplished through
`on additional four bytes of data in the frome header. Most data fields in this addition to
`the header are specific to VLAN operation. Also included is a field which provides the same
`3-bit priority flag specified in 802.1P’s prioritymapping scheme,
`in addition to conven-
`
`18
`
`Page 7 of 7
`
`
`
`Page 7 of 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket