`
`
`
`,1.”.wuw_m
`
`mum
`
`
`
`e Offic
`
`1al Diet
`
`Telecom
`
`mun
`
`
`
`
`
`
`
`lonary
`icatlons
`
`
`
`Salnsungj Exhi
`
`it 1074
`
`
`
`Page 1 of 11
`
`Samsung Exhibit 1024
`
`
`
`itx:
`
`
`
`16111 at
`
`
`
`
`
`{
`
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`copyright © 2000 Harry Newton
`Email: Harry Newton @Technologylnvestor.com
`Personal web site: www.HarryNewton.com
`
`rights reserved under international and Pan-American Copyright conventions,
`All
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`
`New York, NY 10010
`
`ISBN # 167820-0539
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`Telecom Books
`
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: BOO-LIBRARY or 408~848—3854
`FAX: 408—848—5784
`Email: telecom@rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 2 of 11
`
`Page 2 of 11
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`Instabusl 080 and lnstabusl480 Trademarks for
`MiCOM‘s direct host attachment products.
`Instalink 1. An MCI International service that allows access
`to a host computer in the USA. from a Telex machine any-
`where overseas. This allows easier retrieval of
`information
`from a US. database
`2. A trademark for MICOM’s data—over—voice products.
`Installation The physical hook-up and diagnostic testing
`of a PBX switch, cabinet, or peripheral item prior to a cutover
`and maintenance acceptance by the maintaining vendor.
`Installed Base How many of whatever are in and working.
`installed base is often confused with annual shipments,
`They‘re very different. Shipments is what goes out the factory.
`Installed base is what's out there. The equation is: Installed
`base at beginning of year plus annual shipments less equip—
`ment taken out of service during the year is equal
`to the
`installed base at the end of the year.
`lnstaller's Tone Also called test tone. A small box that runs
`on batteries and puts an RF tone on a pair oi wires. If the techni—
`cian can’t find a pair of wires by color or binding post, they attach
`a tone at one end and use an inductive amplifier (also called a
`banana or probe) at the other end to find a beeping tone.
`Instance ID An ATM term. A subset of an object's attributes
`which serve to uniquely identify a MIB instance.
`lnstanet Trademark for MICOM’s family of local data distri-
`bution ard data private automatic branch exchange (PABX)
`products.
`load
`I
`Instant Messaging I'm logged into the Internet.
`some sofwarc.
`It shows me that you‘re also logged into the
`Internet.
`i type you a message, You see it on your screen the
`moment I hit “send.” You type your rep y and send it.
`i see it.
`Bingo, a new internet service that has come to be called
`“instant messaging.” instant messagirg is essentially real-
`time, on— ine electronic mail. instant iv‘essaging started with
`software called ICQ, then America Online introduced its huge—
`Iy-popuiar variation (AOL Instant Messenger), then Microsoft
`introduced its software called MSN Messenger. As of writing,
`none of tiese sottwares is compatible w'th the other. But there
`was talk in the trade press of eventual standards. There are
`serious reasons we need standards. nstant messaging is
`evolving 'nto much more than a tool for sending typed mes—
`sages to buddies online, Just as the original Web browsers
`revolutionized the way average users connect to Internet con-
`ent, todaYs instant message screens are evolving into easy-
`o—use connections for linking people at any given moment on
`he Internet via text, voice and video. At the new capabilities
`will be built on a single critical assurrption: knowing that a
`person is onilne. That, in turn, makes it possible for electron—
`'c merchants and providers of oniine services to reach Internet
`Jsers with information or incentives — at the precise time they
`are able to react, namely when they are oniine in front of their
`screen, an easy target. Tools are being integrated into instant
`messaging software that permit the immediate delivery of an
`'ncreasing array of data that does not come from friends or
`amiiy. America Online has unveiled a version of its instant
`nessaging software that automatically delivers tailored news
`ieadiines and stock quotes.
`Instant On Buy a PC (Personal Computer). Turn it on.
`Bingo, it‘s already loaded with Windows or 08/2. instant On is
`a new term for preloading software onto hard disks of new
`computers and shipping these computers already pre—toaded
`with that software,
`Instantaneous Override Energy Function lOEF. A
`feature of the AT&T PBX Dimension Energy Communications
`
`
`
`Service Adjunct (ECSA), which allows the user to turn all the
`ECSA energy functions ON or OFF. lOEF is most often used for
`periodic maintenance, or
`to adjust
`to sudden changes in
`weather.
`Institute for Telecommunications Sciences ITS is
`the
`research and engineering branch of
`the National
`Telecommunications and Information Administration (NTIA),
`which is part of the US. Department of Commerce (DOC).
`www.ntia.doc.gov See NTIA
`lnstructlon Register The register which contains the
`instruction to be executed and functions as the source for the
`subsequent operations of the arithmetic unit.
`Instructional Television Fixed Service ITFS. A ser—
`vice provided by one or more fixed microwave stations oper—
`ated by an educational organization and used mainly to trans—
`mit instructional, cultural and other educational information to
`fixed receiving stations.
`Insulated Wire Wire which has a nonconducting covering.
`Insulating Materials These substances which oppose
`the passage of an electric current through them.
`Insulation A material which does not conduct electricity but
`is suitable for surrounding conductors to prevent the loss of
`current.
`Insulation Displacement Connection IDC. The tDC
`has replaced wire wrap and solder and screw post terminations
`as the way for connecting conductors (le. wires carrying tele—
`com)
`to jacks, patch panels and blocks.
`Insulation
`Displacement Connections are typically two sharp pieces of
`metal in a slight V. As the plastic—covered wire is pushed into
`these metal teeth, the teeth pierce the plastic jacket (the insu—
`lation) and make connection with the inside metal conductor.
`This saves the installer having to strip off the conductors insu-
`lation. This saves time. Since IDCs are very small, they can be
`placed very close together. This reduces the size of jacks.
`patch panels and blocks. IDCs are the best termination for high
`speed data cabling since a gas—tight, uniform connection is
`made. The alternate method of connecting wires is with a
`screw—down post. There are advantages and disadvantages to
`both systems. The iDC system, obviously, is faster and uses
`less space. But
`it requires a special tool. The screw system
`takes more time, but may produce a longer—lasting and
`stronger, more thorough (more of the wire exposed) electrical
`connection. The most common IDC wiring scheme is the 66-
`biock, invented by Western Electric, now Lucent. But there are
`other systems — from other telecom manufacturers. See
`Punchdown Tool.
`Insulation Resistance That property of an Insulating
`material which resists electrical current flow through the insu-
`lating material when a potential difference is applied.
`Insulators Some atoms hold onto their electrons tightly.
`Since electrons cannot move freely these material can’t easily
`conduct electricity and are know as non—conductors or insula-
`tors. Common insulators include glass. ceramic, plastics,
`paper and air. insulators are also called dielectrics.
`INT Induction Neutralizing Transformer. A specially designed
`multipair longitudinal inductor that is spliced into a wireiine
`facility to substantially reduce low frequency steady~state or
`surge induced voltages and currents that may be causing
`noise, equipment malfunctions and/or damages or creating a
`personnel safety hazard. See TEN.
`INTI4 A software Interrupt designed to communicate with the
`com (serial) port
`in a PC. Communications programs use
`interrupt 14b to talk to a modern physically attached to anoth—
`er computer on the network.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`W,Mhfl
`
`
`
`
`
`Page 3 of 11
`
`Page 3 of 11
`
`
`
`r’‘
`
`7
`
`NEWTON’S TELECOM DICTIONARY
`
`tent and the servers themselves. Intranet administrators are
`currently fascinated with analyzing Web server logs which
`contain data of some sort,
`including user connections and
`page activity.
`According to a white paper released by Sun Microsystems in
`the summer of 1996, the basic infrastructure for an intranet
`consists of an Internal TCP/iP network connecting servers
`and desktops, which may or may not be connected to the
`Internet through a firewall, The intranet provides services to
`desktops via standard open Internet protocols. In addition to
`TCP/IP for basic network communication, these also include
`protocols for:
`Browsing
`File Service
`Mail Service
`Naming Service
`Directory Services
`Booting Services
`NetworkAdminislratIon
`Object Services
`See also Extranet and Intranet,
`Intranodal Service Intranodal service is a feature of
`some central office switches and smaller remote switches. It
`means that it will continue to switch in which
`lntranode Communications path which originates and ter—
`minates In the same node.
`Intruottire Call A call involving only one switching system.
`lntrnottice Trunk A telephone channel between two
`pieces of equipment within the same central office.
`lntrapreneur An entrepreneur who works Inside a big
`company. Hence,
`intra, as in inside.
`It‘s hard to imagine it
`actually happening. But the word has became popular as a
`way for large can panies to motivate their employees to take
`personal career risks and introduce new products.
`Intrastate Services, traffic or facilities that originate and
`terminate within tie same state. Therefore,
`If related to tele—
`phone, falling under the jurisdiction of that state’s telephone
`regulatory procedares.
`Intrustrmture A term coined by “Data Communications”
`and referring to lie software, hardware, and Internet services
`underlying a corporate Intranet.
`Intrinsic Joint loss That loss in optical power transmis-
`sion, intrinsic to tie optical fiber, caused by fiber parameters,
`e.g., dimensions, profile pararneler, mode field diameter, mis—
`matches when two non identical fibers are joined.
`Intrinsics intrirsics are a component of many windows
`toolkits. The windows toolkit
`lntrinsics definition has been
`developed by the MIT X Consortium. The intrinsics define the
`function of spec'fic graphical user
`interface and window
`objects. They do rot define any particular look or feel, just the
`function. Example: A pull down menu Intrinsic would define
`the function of a pull down menu within a toolkit but not the
`appearance of it.
`Intrusive Test Breaking a circuit in order to test Its func—
`tionality, Testing intrusiver will drop service on the circuit.
`INTUG International Telecommunications Users Group.
`lntumescent Firestop A firestopping material
`expands under the Influence of heat.
`Inverse ARPA See Reverse DNS.
`Inverse Fourier Transform Inversion of Fourier trans-
`form to convert frequency representation of signal to time rep
`resentation.
`Inverse Multiplexer l—Mux. An inverse multiplexer per—
`forms the Inverse function of a multiplexer. “Multiplexer”
`
`ack
`
`it's
`ce,
`
`:ept
`the
`IDB
`telr
`
`1e).
`ISS-
`
`t or
`
`ling
`nce
`sig-
`rvilh
`g. a
`
`unk
`
`that
`
`time
`Cate
`l as
`lets,
`it
`to
`Igo—
`from
`
`late.
`i cell
`tame
`
`ling
`on—
`Sing
`rical
`i the
`her—
`lures
`hour
`bar—
`the
`,fling
`ions
`
`ading
`ange
`eters
`- ents
`iicw
`ely.
`that
`
`
`I ,
`
`
`
`
`
`compresses information within a single frame. Compare to
`Inter rame Coding.
`lntmlATA Telecommunications services that originate and
`term'nate in the same Local Access and Transport Area. See
`also Local Access and Transport Area. This can be either
`Interstate or Intrastate service, traffic or facilities.
`Intrumodul Distortion In an optical fiber, the distortion
`resu ting from dispersion of group velocity of a propagating
`mode, it is the only form of multi mode distortion occurring
`In sitgle—mode fibers.
`Intranet A private network that uses Internet software and
`Internet standards. In essence, an Intranet is a private Internet
`reserved for use by people who have been given the authori—
`Iy ard passwords necessary to use that network. Those peo—
`ple are typically employees and often customers of a compa-
`ny. An Intranet might use circuits also used by the internet or
`it m'ght not. Companies are increasingly using Intranets —
`internal Web servers —— to give their employees easy access
`to corporate information.
`According to my friends at Strategic Networks Consulting.
`Boiled down to Its simplest, an intranet Is: a private network
`environment built around Internet technologies and standards
`~ predominantly the World Wide Web. The primary user
`interface, called a Web browser, accesses Web servers locat»
`ed locally, remotely or on the Internet. The Web server is the
`heart of an Intranet, making selection of Web server software
`a crucial decision, even though much fanfare has focused on
`browsers (Netscape‘s Navigator vs. Microsoft’s Explorer).
`At
`its core, a Web server handles two arcane languages
`(HTML and (36!) that are the meat and potatoes of generating
`Web pages dynamically, making connections and responding
`to user requests. But In the rush to dominate the potentially
`lucrative Intranet market,
`these simple Web functions are
`being bundled Into operating systems and vendors are now
`touting pricey “intranet suites" which encompass everything
`from database and application Interfaces, to e—mall and news—
`groups, to the kitchen sink.
`Most medium— or larger-sized companies will need more than
`just a handful of simple Web servers to deploy a reasonably
`robust Intranet. To help a company post current job openings,
`or make up—to-date product specs and available inventory
`accessible by traveling sales reps, an Intranet needs the fol—
`lowing capabilities:
`0 Database access. Getting at critical data housed In corpo—
`rate databases can be accomplished via generic, universal
`ODBC linking or based on "native" links directly to Sybase,
`Oracle et al. allowing use of all the databases features.
`0 Application hooks. Used by developers, a standard pro-
`gramming interface (APi) allows outside applications like
`Lotus Notes to interact with Web data and vice versa. In addi—
`tion, proprietary APls exist — most notably Microsoft’s ISAPI
`(for “Internet Server API") which lets developers link directly
`to Microsoft applications.
`' User publishing.
`In addition to dialogues via chat/news—
`group/bulletin board features, users will want to post their
`own content on Web servers without having to attain
`Webmaster status.
`‘ Search vehicles, How} does an engineer find the current
`specs on Project #686—2 among thousands of pages spread
`across a bunch of Web servers? The answer; an indexing and
`search engine that creates an Internal Yahoo! for your own
`Websites.
`{Admin/management. A catch-all for loads of important, but
`still lll~concelved features for managing access, users, con-
`
`
`
`
`HTTP
`NFS
`lMAP4/SMTP
`DNS/NIS+
`DNS/LDAP
`Bootp/DHCP
`SNMP
`IIOP (COHBA)
`
`
`
`that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 11
`
`Page 4 of 11
`
`
`
`i
`
`to point in timea
`acomputerlele.
`rally be no more
`isseconds 99% i
`lsed to illustrate
`load. When the
`rthanthe above
`lcity. Of course,
`y mimic the real
`5 largely mean-
`one, president,
`)uier telephony
`
`i
`
`'ing is the tech
`lrocessing nor.
`atworking, load
`fen connecting
`nd Token Ring
`'k) link such as
`as the need for
`each serving a
`
`he goal of load
`ixceed its busy
`ng conditions.
`at steps until it
`the system is
`lyond its load?
`iow is service
`aceful or must
`i system reset
`inderstand the
`ost significant
`oad testing. it
`Jhony system
`ie system will
`ins. See also
`
`loading coils
`ie distortion.
`
`ty of a phone
`i lines. What
`i loop circuit
`ding “tunes”
`500 Hz) and
`l bandwidth.
`3 removed if
`:lusively on
`
`local loops
`tes for wire
`is. Loading
`ces, as dis-
`so used for
`
`A group of
`rd similarly
`
`r loading a
`t) program
`inder DOS,
`device dri-
`:y memory
`
`
`
`
`
`
`
`managers use that own routines to load high, though they
`can sometimes borrow DOS commands.
`‘
`loading Plan A telephone company term. A_ Loading Plan
`is a systematic scheme for fully utiliztng all exrsting capaClty
`m a given switciing entity; Utilizing and coordinating‘the
`capablililBS and capacity limitations of various entities in a
`multi—enttty wire center and maintaining objective servrce lev-
`els at all times. A _oad‘ng Plan is the basis for achieving and
`retaining good Load Balance.
`‘
`too An ATM term. Loss of Cell Delineation: A condition at the
`receiver or a main enarce signal transmitted in the PHY over-
`head indicating fiat the receiving equipment has lost cell
`delineation. Used 0 monitor the performance of the PHY layer.
`local Pertaining to a system or device that resides within a
`subject device’s switch‘ng domain.
`local Access Tie connection between a customer’s premis-
`es and a point of presence of the Exchange Carrier.
`Local Access and Transport Area LATA. The MFJ
`(Modified Final Judgement). which broke up the Bell System,
`also defined 196 distinct geographical areas known as LATAs.
`The LATA boundaries generally were drawn in consideration
`of SMSAs (Standard
`etropolitan Statistical Areas), which
`were defined by the Census Bureau to identify "communities
`of interest" in econom'c terms. Generally speaking, the LATA
`boundaries also were coterminous with state lines and exist—
`ing area code boundaries, and generally included the territo—
`ry served by only a single RBOC. The basic purpose of the
`LATA concept was to delineate the serving areas reserved for
`LEC (Local Exchange Carrier) activity.
`in other words,
`intraLATA traffic (i.e.,
`local and local
`long distance) became
`the sole right and responsibility of the LECs. lnterLATA traffic,
`on the other hand, became the sole right and responsibility of
`the IXCs. Over time, a number of state PUCs allowed the lXCs
`to compete for titraLATA long distance;
`they also allowed
`CAPs (Competit‘ve Access Providers) to provided limited
`local
`service
`in
`competition with
`the LECs. The
`Telecommunications Act of 1996 (The Act) opened the flood—
`gates for compet'tion with the LATA boundaries. The Act also
`allows the RBOCs to provide lnterLATA service outside the
`states in which t ey provide local service, Additionally, The
`Act contains provisions for the RBOCs to offer lnterLATA ser-
`vice within the state in which they provide local service, once
`they have satisfied a 14-point checklist, the most significant
`conditions of wh‘ch relate to significant, demonstrated levels
`of competition w'thin their respective local exchange serving
`areas. California is divided into 10 LATAs. Sparsely populat-
`ed siates such as South Dakota comprise only a single LATA.
`local Airtime Detail This cellular telephone carrier
`option (which neans it costs money) provides a line—item—
`ized, detailed bi ling of all calls, including call attempts and
`incoming calls to the mobile. What you get for tree is gener-
`ally a non-detailed, total summary of all calls.
`local Area And Transport Area See LATA.
`local Area Dala Transport LADT. A service of your
`local phone company which provides ‘you, the user, with syn-
`chronous data communications.
`local Area Nelworlc LAN. A short distance data commu-
`nications network (typically within a building or campus) used
`to link computers and peripheral devices (such as printers, CD—
`ROMs, modems) under some form of standard control. Older
`data communications networks used dumb terminals (devices
`with no computing power) to talk to distant computers. But the
`economics of computing changed with the invention of the per—
`sonal computer which had “intelligence” and which was cheap.
`
`
`
`NEWTON’S TELECOlVI DICTIONARY
`
`
`
`LANs were invented as an afterthought 7 alter PCs * and
`were originally designed to let cheap PCs share peripherals —
`like laser printers — which were too expensive to dedicate to
`individual PCs. And as time went on, what LANs were used for
`get broader and broader. Today, LANs have four main advan—
`tages: 1. Anyone on the LAN can use any of the peripheral
`devices connected to the LAN. 2. Anyone on the LAN can
`access databases and programs running on client servers
`(super powerful PCs) attached to the LAN; and 3. Anyone on
`the LAN can send messages to and work jointly with others on
`the LAN. 4. While a LAN does not use common carrier circuits,
`it may have gateways and/or bridges to public telecommunicav
`tions networks. See LAN Manager. Token Ring and Ethernet.
`local Area Signaling Services LASS is a group of cen—
`tral office features provided new by virtually all central office
`switch makers that uses existing customer lines to provide
`some extra features to the end user (typically a business user).
`They are based on delivery of calling party number via the local
`signaling network. LASS can be implemented on a standalone
`single central office basis for intra office calls or on a multiple
`central office grouping in a LATA (what the local phone compa-
`nies are allowed to serve) for interoffice calls. Local CCST
`(Common Channel Signaling Seven) is required for all config-
`urations. The following features typically make up LASS:
`Automatic Callback: Lets the customer automatically call the
`last incoming call directory number associated with the cus—
`tomer’s phone when both phones become idle. This feature
`gives the customer the ability to camp—on to a line.
`Automatic Recall: Lets the customer automatically call the last
`outgoing call currently associated with the customer's station
`when both stations become idle. This feature gives the cus—
`tomer the ability to camp—on to a line.
`Customer—Originated Trace: Lets the terminating party request
`an automatic trace of the last call received. The trace includes
`the calling iine directory number and time and date of the call.
`This information is transmitted via an AM lOP channel to a
`designated agency, such as the telephone company or law
`enforcement agency.
`individual Calling Line Identitication: Consists of two distinct
`features:
`1. Calling Number Delivery which transmits data on an
`incoming call to the terminating phone. 1. Directory Number
`Privacy which prevents delivery of the directory number to the
`terminating phone.
`Also, LASS has some selective features:
`Selective Call Acceptance: Allows users to restrict which
`incoming voice calls can terminate, based on the identity
`attribute of the calling party. Only calls from parties identified
`on a screening lists are allowed to terminate. Calls from parties
`not specified on a screening list are rerouted to an appropriate
`announcement or forwarded to an alternate directory number.
`Selective Call Forwarding: Allows a customer to pre—select
`which calls are forwarded based on the identity attribute of the
`calling party.
`Selective Call Rejection: Allows a customer to reject incoming
`voice calls from identity attributes which are on the customer‘s
`rejection list. Call attempts from parties speciiied on the rejec-
`tion list are prevented from terminating to the customer and are
`routed to an announcement which informs the caller that
`his/her call is not presently being accepted by the called party.
`Selective Distinctive Alert: Allows a customer to pre‘select
`which voice calls are to be provided distinctive alerting treat—
`ment based on the identity attributes of the calling party.
`Users can, at their convenience, activate or modify any of
`
`501
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 5 of 11
`
`Page 5 of 11
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`do not have to reboot every time you change cards. My expe-
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for commu-
`nications between a user application program and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuit—level security technology developed by
`David chlas in 1990 and since made publicly available by
`the IETF (Internet Engineering Task Force. SOCKSv5, the cur—
`rent version, provides security in a client/server environment,
`running at the Session Layer, Layer 5 of the OSI Reference
`Model. SOCKSv5 supports multiple means of authentication,
`negotiated between client and server over a virtual circuit, and
`on a session-by-session basis. SOCKSv5 also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an independent message.
`SOCKSv5 also allows protocol
`filtering, which offers
`enhanced access control on a protocol-specific basis. For
`example, a network administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter command to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as Windows NT. The cross-platform nature
`of SOCKS offers portability to Macintosh and other operating
`systems
`and browsers. According to Network World
`Magazine, September 27, 1999,
`“the latest version of
`SOCKSv5 offers network managers an easier way to run
`videoconferencing and video and audio streaming through
`firewalls, which has been difficult and time-consuming.
`Socksv5 does this by providing a single and powerful method
`of authenticating users and managing security policies for all
`Internet applications, including multimedia." SOCKSv5 also
`interoperates on top of IPv4, IPsec. PPTP, L2TP and other
`lower-level protocols.
`’
`SOF Start Of File
`Soft Copy 1. A copy of a file or program which resides on
`magnetic medium, such as a floppy disk, or any form that is
`not a hard copy — which Is paper.
`2. Old legacy systems term reapplied to distributed comput-
`ing in which reports are created on—screen from data residing
`within different applications.
`Soft Decision See SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans-
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft Font A font,usually provided by a font vendor, that
`must be installed on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadable font.
`Soft Honcloff A cellular radio term. A soft handoff is a
`handoff between cell sites that involves first making the con-
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or “break and
`make" handoff, is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft Key There are three types of keys on atelephone: hard,
`programmable and soft. HARD keys are those which do one
`thing and one thing only, e.g. the touchtone buttons 1, 2, 3, *
`and it etc. PROGRAMMABLE keys are those which you can
`program to do produce a bunch of tones. Those tones might
`
`Social Computing A term that emerged in the summer of
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a “communica-
`tions-rich brew," which is “expected to create new ways for
`businesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators." According to
`Peter Lewis, “The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num—
`ber crunching and data base management to wider—ranging
`forms of business communications...Where client server
`broke away from mainframe—based systems and distributed
`computing power to everyone in the organization, social com—
`puting goes the next step and extends the distribution of com-
`puting power to a company’s customers."
`Sociol Contrnct An arrangement between the local tele—
`phone company and its local regulatory authority whereby the
`telephone company's services are detariffed, .but cannot be
`priced at less than cost. Quality of service standards apply.
`Socich Engineering Gaining privileged information about
`a computer system (such as a password) by skillful lying —
`usually via a phone call. Often done by impersonating an
`authorized user.
`i
`Socket 1. A synonym for a port.
`2, A technology that serves as the endpoint when computer
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PCMCIA Card and mapping the host’s internal bus signals to
`the PCMCIA interface signals.
`4. An operating system abstraction which provides the capa-
`bility for application programs to automatically access com—
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The Socketslnterface, introduced in the
`early 19803 with the release of Berkeley UNIX, was the first
`consistent and well—defined application programming inter-
`face (API).
`It
`is used at
`the transport
`layer between
`Transmission Control Protocol
`(TCP) or User Datagram
`Protocol (UDP) and the applications on a system. Since 1980,
`sockets have been implemented on virtually every platform.
`Socket Number In TCP/IP, the socket number is the icin—
`ing of the sender's (or receiver’s) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardware that provides a standardized interface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCMCIA slots of a computer, desktop or laptop
`(but most typically a laptop). Ideally, socket services software
`should be integrated into the notebook’s BIOS, but few man—
`ufacturers have done so to date. For PCMCIA cards to oper-
`ate correctly you also need Card Services, which is (not are)
`a software management interface that allows the allocation of
`system resources (such as memory and interrupts) automati-
`cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCMCIA cards when you buy
`the cards. You will, however, have to load new drivers every
`time you change cards and allocate the correct memory exclu-
`srons. You will have to reboot if you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`be “dial mother.“ They might be “transfer this call to my home
`
`Page 6 of 11
`
`Page 6 of 11
`
`Page 6 of 11
`
`
`
` f
`
`52-355
`
`El
`
`
`
`
`
`
`
`
`NEWTON’S TELECOVI DICTIONARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 7 of 11
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`avalue of the subnet mask is deter
`- Deallrg with the various vendors and providers, including
`o Robust client-server framework. TCP/IP is an excellent
`verifying and paying the bills.
`- 10(le bits of the IP address to o t
`0 lent—server app 'cation platform, especially in wideflwa
`I
`network (WAN) ervironments.
`0 Preparing and managing the Telecommunications budget.
`- ms. The result allows TCP/IP to ca
`go
`- Keeping abreast of changes in technology, services, indus~
`ark IDs of the local workstation.
`- Information sharing. Thousards of academic, defense 33;.
`try struc ure, and rates.
`paddress. For example:
`e title, a d comrrercial organizations share data, electronic
`0 Assisting company management in developing a corporate
`rrail and services on the connected Internet using TCP/(p
`When the IP address rs102.54.92 9
`telecommunications policy that meets business objectives.
`And the subnet mask 13255.255...G
`- General availabi ity. lmplemen ations of TCP/iP are available
`- Developing and implementing company telephone and
`‘he network ID is 102.54 (IP ad re:
`01 nearly every popular comther operating system. Soume
`telecom unications procedures for efficient and cost effective
`(a host ID is 94.97 (IP address ate
`code is w‘dely avai able for many implementations. Additionally
`use, and training company employees in these procedures.
`K, the above was Microsoft's det‘ it;
`b idge, to far and network analyzer vendors all offer supporlrol
`0 Upgrading, procurement, selecting, contracting, or pure
`ie TCP/P protocol famil