`
`'l'
`
`The Authoritative Resource for
`
`Telecommunications, Networking.
`
`the Internet and Information Technology
`
`_
`
`_
`
`’
`
`fulf-
`H" ._
`i
`E57'lllldflteflfiniltfiflllanded Edition
`T3er
`
`CMPBooks
`
`7‘
`
`Page 1 of 7
`
`Samsung Exhibit 1033
`
`
`
`Page 1 of 7
`
`Samsung Exhibit 1033
`
`
`
`
`
`Page 2 of 7
`
`
`
`Page 2 of 7
`
`
`
`NEWTflN’s
`TELEBDIVI
`DIBTIIJNARY
`
`
`
`Page 3 of 7
`
`
`
`A—
`at», r,
`
`K
`
`5; r 0:2
`
`«PM
`goo”).
`NIW‘I'ON'S TELECOM DICTIONARY M
`copyright © 2002 Harry Newton
`Email: Harry@HarryNeMOn.com
`ersonal web site: WWW.HarryNewton.com
`Business web site: www.Techno|ogylnvestor.com
`
`All rights reserved under International and Pan-American Copyright conventions, including
`the right to reproduce this book or portions thereof in any torn-r whatsoever.
`
`Published by CMP Books
`An imprint of CM? Media LLC.
`12 West 21 Street
`New York, NY 10010
`
`ISBN Number 1757820-1041-7
`
`February 2002
`
`Eighteenth Edition
`
`For individual orders, and tar iniormation on special discounts For quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 1-800-500-6875 or 408-848-3854
`Fax: 408-848-5784
`Web: www.cmpbooks.com
`Email: cmp@rushorder.com
`
`This book is also sold through wwwAmazomcom, ww.Fatbrain.oom and
`www.BarnesAndNoble.com
`
`Distributed to the book trade in the U.SA and Canada by Publishers Group West
`1700 Fourth 53., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 4 of 7
`
`
`
`Page 4 of 7
`
`
`
`MWL'MLLl/blgg
`qty/907$?
`
`-E {-c :r
`
`7 m He 0 2
`
`Table of Contents
`
`HELP MAKE THIS DICTIONARY EVEN BETTER
`- We offer a reel reward .
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`r
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. .Ii
`
`I I9 BEST DOLLAR-SAVING TIPS
`- How To Save on Telecom, PC, Internet and Airline Expenses and Best Investment Tips .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. VII
`
`.
`
`.
`
`.
`
`. XII
`
`WHY IS IT SO HARD TO BUY?
`- The logic of call centers! customer cares, and buying on the Internet
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`WHERE'S THE TECHNOLOGY GOING?
`- Cheaper, foster and more reliable are obvious trends but there are other less obvious important ones also.
`
`.
`
`.
`
`.
`
`. XVII
`
`DISASTER RECOVERY PLANNING
`— How to Make Sure Your Computing and Telecommunications Still Run .
`
`.
`
`.
`
`.
`
`r
`
`.
`
`_
`
`r
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. XIX
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`r
`
`r
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. XXI
`
`RULES FOLLOWED IN THIS DICTIONARY
`- How to figure our ordering of terms and our spellings
`
`.
`
`.
`
`.
`
`.
`
`.
`
`ABOUT THE AUTHOR
`- Harry Newton does have a life outside this dictionary .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`,
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_
`. XXV
`
`.
`
`.
`
`_
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_ XXVII
`
`ABOUT THE CONTRIBUTING EDITOR
`- Roy Horak teaches, consults and lives in Paradise .
`
`.
`
`.
`
`.
`
`DICTIONARY
`
`Dictionary begins with Numbers then goes onto Letters .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. I
`
`APPENDIX
`— Industry Stondards Organizations and their contact information .
`- International Calling Codes .
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`- Standard Plugs and Connectors
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`. 850
`. 856
`. 858
`
`III
`
`Page 5 of 7
`
`
`
`Page 5 of 7
`
`
`
`and Zilog 1-30, were installed in flbitcumputers such as the ripple II, the htSJll BOB0, and
`the Commodore 64.
`.00 ihe first “area code' for what r'JBi originally cubed InWATS service. See 000
`Service and fill".
`800 Parlalslllty BOB Portability refers to the fact thotlou can takeyour Bill] rum-
`ber to any long distance carrier. it rose example, once I ha
`l~000iJBRhltt For many
`years, that ncmtlaerwas provleded MEI. When portabiity (ante along, we were able to
`d‘rg'rfiit hon! am to MU and
`keep I-BOB-lJBllhRY, which is 8005424279. 800
`Pa
`uy‘oprmidedhyoseaesafmmplexdatohoestbebmlalmemmparries,urdu
`FCC mandate, have built. 000 Partnbiity started on Boy I, l993. See 000 Service.
`800 Service A tall call paid tar by the called party, rather than the toting party. it gener-
`iEcyand common term for InWhiS (Vitae Area Telecommunications Service) service
`rage
`tlllllmecfllmtlty,wllelltetalf( [total ErcdvrrrgeCorrier) neuritic llrrtere
`terrier). in tlortirrimer‘coondr'norderoltheirirtroduction, cl those In’r'ihTSserviceshave
`800 “967), BBB “996], B]? (199m, BBB [2000], at 055 (200” as their 'atea
`code.‘ (Note: Future BBB numbers will follow the convention Blitl, where till are specific
`numbers which are identical. Sadr BUB sentice is typically used by merchants offering to sell
`sometlirgsudrashotelresenatior'rs,clothes,orrentol carsiheideoofthefceesenicetsto
`errtkeaatunesmcoldiemrln,wimdndmrybeiogdmdmemlunarolculmd
`thereforeoastthewstorrrersarneth'
`hearsherrs'aubolessincinedtacd.Suppliersat
`800 sarvics use ua'ioos ways to
`' are rrd bill their BUD services
`800 Service works like this: You're somewhere in North America. You dial 11300, 1-883,
`101?, Hind or 1-055 and seven at is The LEE {Local Exchange Canter, tn, the local
`phone company) central office sees
`'l’ and recogniIes the Bill as long cistence. it
`alsarecogrizesthefitltl areaoadeoadcpreriesacerrhaizeddatohosebeloro processing
`the call lurther, with the query generally taking place over a SS? (Signing System 7)
`link. the centrairod database resides on a Service Management System lSMSl, which is
`a centralized computing platform, The database identifies the LEC or hit {InterErrcharrr'ai
`Earned planting the Shit number. Based on that information, and assuming thatth
`hummborisassociatedwithanlllt,thelEEsw-itchtautesthecalltothepraperlilt.
`Once the tilt has been tanded the call, it processes the 300 anther, perhaps translating
`it into a 'real" tolefihone number in order to route itcorrecily. rtltenrathrely, the lllC trans
`lures lhe 300 hour ar into an internal, nonstandard l0digit number for further roofing to
`the tenninating Central fli‘lice (C0) and trunk or trunk group.
`its a realife example. the Masher of his book has an 500 number, BDOdJBltARY (at
`000-54 2427‘”. When you call that camber, MU routes that number to the list available
`channel on the dedicated i—l circuit whid'r leased from Mtl's, and connecting the MCI New
`York Uty POP (Point 0t Presence) to the (MP New York my office.
`Because 000 long distance service is essentially a database aakop and translation service
`for incoming phone calls, mg: cue erdlessflsefiices’ you can amen can p3;
`pennunear irrstructions into
`company in
`routing patterns
`on tine
`day, day of week. number called, number calling. Same long distance compan‘os allow you
`to mange your roofing instructions lrom one minute to another. for example, you might
`have two call centers into which 800 phone calls are paorin . When one gets busy, you
`my tell your long distance company to route all the 300 '
`and phone clls to the call
`center, which isn't busy. See Eight Hundred Service and Due Plumber [ailing for more,
`especially ollthe leamresyao can now ton BOB service.
`In hiay of 1993 the HI mandated that a 000 {and by emeroion cll 8th numbers became
`"portable." That means that orstorners can take theier telephone number from one long
`d'atonce company to another, and still keep the same 000. See als 000 Portabiity.
`800 Services are known internationally as Trustee Services." In other cameras the chal-
`ing scheme may vary, with simples being 0-000 and 0500. Such serviceson go wider
`the name ’Breeidane.‘ In lane rm, the "UT approved the E169 standard llrl‘versal
`lntemotional Freefone llurnber lUIFN) numbers, also known as 'Biohal 300.” mm will
`work across nation! boundaries, based on a standard numbering scheme at 300, BBB or
`871' plus an Bdigit telephone numaer, See also Him and Vanity Numbers.
`I01 See 802 Standards.
`802 Stand-roll 1119.302 Standards are a set of storidmrh to: bill I{Local Area
`Network) and MN (Mahopoitan Area Netwodci data communicators developed thrauh
`the lEEE’s Protect 302. The two mastimparfant standards are 802i lb and 802.1io.ihe
`standards also indude an overview of recommended networking ard'itectares, approved it
`1990. The 302 aardordsfoluw a unique numbering convention. A number followed by a
`capital letter denotes a standalone standard; a number followed by a lower case letter
`
`800 / 802.1“
`
`denotes either a supplement to a standard, or alpgrt of a rmrltiple-nurnber standard le.g.,
`002.] 8 302.3). The 80? standards segment
`data link layer into two arblayers:
`i.Ahlediakcess Conhol (MAD lfltfitthliindudesspea'hcmothods for gain
`accessto
`tie Litt. These methods — such as Etirerrret’s random access method and T on king's
`token passing procedure - are in the 802.3. 802.5 and 802.6 standards.
`2. it Logical link [antral tilt) layer, described in the 802.2 standard, that provides for
`connection estdilishment, data transfer, and connection termination services. [it specifies
`tl'Iee types of convnuuicatiora inks:
`" An Unoclcnonrledgsd Conrrectianless Link. where the sending and receiving devices do not
`set up a connection before transmitting. Instead. messages are sent an a 'besi effort"
`basis, with no provision lor error detection, error recovery, or message sequencing. This
`type of ink is best suited for applications where the higher layer protocols can provide the
`error conection and hurctions, or where the loss of broadcast messages is not critical.
`*nConmchminadeLmkwhereaconuection benveeurnessogesourceanddestinatioa
`is established prior to transmission. This type of ink works best in applications, sachaslile
`transfer, where large amounts of die are being honsmitted at one time.
`* in hcknouuidedged Connectflegsflag as its namedindicates,
`ravides for acknowl-
`edgernorrt
`messages at
`a
`‘
`9 receiving
`evices w‘ maintaining a con-
`mcian.thismamn,iisnmstaheausedfaraniimhamudtereacenhalpmesw
`communicates with a lar
`camber of devices with lirrrited processlrg rapabitities.
`802.] IEEE standard or overall architecture at bills and internetworking. See all the
`following definitions.
`802.] III 802.1ia is actually an updated, bigger, better, faster version of 802.1 lb
`(also oiled WiFil, which is now cannnorrly install
`in offices, airports, coffee shops, etc.
`Many laptops rraw come with 802.iib brit-in. the newer 002i la, also car IIEE starr-
`dard forwireless'ihtls, apportsspeedsupto 54 Mbps Emilio unrsia-ru Sim-tritium
`cation in the 5 EH: range, which was ulocated by the FCC to support of UNII {the
`Unlicensed National luforrrration infrastructure). Specifically, 200 MH: is allocated at 5.15-
`5.35MH1 for inoiitdng applications, and 100 MHz at 5.72550 25 trin for outdoor use.
`il'isallocoled spectnurt is divided mtotlueeworkingdonrains.rlt5.155.25MH1,rnarri
`rrrurrr poweroutput is restricted to 50rni'r' traditions), 5.25-5.35 to 250th card 5.725
`5.825 to l Itiatt. B02.ila has been dubbed iii-HS l'dfireless Fidelity 5 MHz) by the
`Wireless Ethernet [ampatihifity irlliance l‘t‘l'EEtl.
`rrul
`802.1 in Laos Coded Orthogonal Freacancy Division hiuhiplerring lEBFDlrli as the s’
`sh-
`modulation bdmique. (OFDMsendsostreomol data symbols inamassively parallel
`ion, with muitiplo subcarriers (i.e., smol slices of llf, or ltodra Spectrum, width the desig-
`nated carrier ireqriency hand. Each center channel is 20 MI-iz wide, and is subdivided into
`52 sobrarrier channels, each at which is approximately 300 lltiz wide; 43 at the subcat-
`rior channels are used tor data transmission. and the remaining four for error conhol.
`through the application of a coding tectniqua, each symbol comprises multi
`data bits.
`Thespec‘rliedcudingtedmiquesarddatn mtesspecilied,ullofwtich must
`supported
`try 802.] l-cornph'ontproducts, include Bi’SK lBinary Phase Shift lieinth at 125 llbps rt
`channel lot a total of 6 hibps across all 40 data channels. OPSK {Ouadrahrre Phase 5 iii
`Keying) at for 250 Kbps per channel for a total at 12 Mbps, and room llolevel
`Quadrature Amplitude Modulation] at 500 Kbps per channel For a total of 24 Mbps. The
`standard riso allows more complex modulation schemes, that offer inaeased data rates.
`fluently. the mostcamplerr and fastest is 640% led-level 0M). at [325 Mbps per
`channel la! a total of 54 Mbps.
`The symbol rate is slowed down enough that each symbol transmission is longer than the
`delay spread. The delay spread is the variation in timing between receipt of the signals
`associated with a
`iven symbol, with the delay ahead raised by multipoth fading.
`Multipalhfadiugis
`phenornenonwherebytheltfsigmiscmryinga'
`dotosymbal
`ant-real the receivermsiightlydrfierenttimes. Thistsbeamse the signo spreadsautlrom
`the transmitter, with certain portions attire signal reading the receiver more or less direct-
`ly, while other portions of the signal bounce around all of walls, lumiture, your cowork-
`er's pointy bead, and soda. Now, each of the
`bots contains multiple bits, whidi are
`imposedunitdnaughihecorhng pcacessesidon'
`a’oove.hsdrenwttiplesyrrnbolsreodt
`thereceiver, they are sonedarnarntdecoded. withthedecoding process prancing some
`oddrtiorral time for the receiver to adust for the delay spread and to get ready to receive
`the next symbol. Bath 3021 la and 802. I th as designed to becompotirie with Ethemet
`bills, using the MAC lh‘odia ticoess Control]
`techninue of [Stilt/Ch (Carrier Sense
`Multiple Access with Collision hvoidancel.
`lfthissoundsgeat,thut’sbecooseitisgreot.tlttissouodstoogoodtobetme, that's
`
`l?
`
`Page 6 of 7
`
`
`
`Page 6 of 7
`
`
`
`302.110 / 802.10
`
`because it gets a little more complicated. While the 5 Bit: spectrum is pretty clear in the
`05, it's not so readily available elsewhere. Military and govemmenr installations use per-
`tiens of this band overseas.
`in Japan, only the 5.15-5.25 MHz spectrum is voiloble. [a
`Europe, the 5.7255325 MHz spectrum isnlready allocated forather uses. In Europe, ETSI
`(European Telecommunications Standards Institute) requires that two additional protocols
`be used in coniunctian with 302.110 in order to protect incumbent applicators and sys-
`tems running over previously allocated shared spectrum. DFS (Dynamic Frequency
`Selection) allows tan 302.11a s stem to dynamically shift frequency channels and TPE
`(Transmission Power (antral) t
`oces the power level. In combination, these protocols
`serve to eliminate interference issues witlt
`incumbent signals. See also 302.1 lb,
`802.1 lg, BPSK, (Shirl/Ch, PM, DFDlrl, 0AM, OPSK, WECA and Wi-fi.
`802.1 111 302.11b is now the most common wireless local area network. 302,111)
`(also called llrifi) is new commonly installed in offices, airports, coffee shops, etc. Many
`laptops now come with 302.1lb built-in. 302.11b has been dubbed van (Wireless
`fidelin by the Wireless EthemetCompatibility hlliance (WECA). 802.) lb defines both the
`Physical
`(PHY) and Medium Access Control (MAC) protocols. Specifically,
`the PHY spec
`includes three transmission options — one Ir (lnfmred), and two RF (Radio Frequency).
`302.1 lb uses 0555 (Direct Sequence Spread Spectrum) madnlationlar digital communi-
`cation. DSSS involves the nnnsniss'ron of a stream of one’s and zevo's, which is modulat-
`ed with the Darker code chipping sequence. Barkr code is an 1 11bit sequence [e.g.,
`101101 11000) that has advantages in wireless transmission. Each bit is encoded into on
`11-bit Barfcer code, with each resulting data abiecr forming a “chip.” ‘the chip is put an a
`canier frequency in the 2.4 3H: range (2.42.433 3H:), and the wavelonn is modulated
`using one of several techniques. 302.11 systerrrs running at 1 Mbps make use of mi!
`(Dinaty Phase Shift Keying]. Systems running at 2 Mbps make use of 0PStt (Quaternary
`Phase Shift (laying). Systems running at 11 Mbps make use of (Elf (Complementary Code
`Keying), which involves 64 unique code sequences, which technique supports six bits per
`code word. The [Elf code word is then modulated onto the RF carrier using 0PSll, which
`allows another nvo bin to be encoded for each dish symbol. Therefore, each 6-bit s or-
`bol contains eight hits. Power outprn is limited by the EEC to 1 watt ElRP lErtuivnllent
`lsotrapically Radioted Power). At this low power level, the physical distance between the
`transmitting devices becomes an issue, with error performance suffering as the distance
`increases. therefore, the devices adoptto longer distances by usia
`a less complex encod
`ing technique, and a resulting lower signaling speed, which trans
`tes into a lower data
`rate. For example, a system nrnning at 11 Mbps using [Elf and 0951, might throttie back
`to 5.5 Mbps by halving the signaling rate as the distances increase and enor pedormance
`drops. its the situation gets worse, it might throttle back to 2 Mbps using only GPSK, and
`1 Mbps using BPSK. Also to he considered in this equation is the fact that the 2.4 3H:
`mega is in the unlicensed lSM (Industrial, Scientific and Medical) band, which is shared by
`garage door openers, microwave ovens, bar code scanners, cordless drones, Eluetooth
`LANs, and a wide variety of other devices. As a result, this slice of spectrum can he heavi-
`ly congested at times, and performance can drop considerably. 302.1 I divides the avail-
`able spectrum into 14 channels In the US, the EEC allows the use of I 1 channels. Eaar
`draanels are available in France, 13 in the rest of Europe, and only one in Japan. There
`also is overlap between ad‘acent channels leg, channels one and two), which fact further
`affects perforrrrunce; therefore, any given system must maintain maximum channel sepa-
`ration from other systems in proximity.
`Both 302.11a and 302.1 lb are designedto be compatible with Ethernet Lhtls. 302.1 lb uses
`rr variation of the Mitt (Media rlccess Control) technique of (Shift/Ch ([un‘rer Sense Multiple
`r‘rccess with Coffsion hvotdance), which iscoed in some wired Ethemets, oswell. hdevice seek-
`ing to transrnit ave: the shared medium (in this case, a shared RF channel) listens to the net—
`work. If it senses no activity over the ccnrier frequency fora mirimmt period of time known
`as the DIES (01F (Distributed (aotdirated function) lntarftame Spa ‘
`), ttreqoests access
`byfirst transmitting o 315 (Request in Send) packet. The R15 pocket in odes both the source
`(i.e., transmitter) and destinath (i.e., intended receiver) addresses, the duration attire intend
`ed session lie, transm'as'ron), and theAClt (AEKnawlodgement) associated with it. If the net-
`wadcis available, the destination device responds va‘th C15 (Clear To Send), repeating both the
`duration and the MIC. All other devices back off the network until the session is concluded. If
`the network, on the other hand, is busy, the device waits a period of time equal to the DlES,
`plus a madam another of slot times, as calculated with seveml backaff timers. lhe “listening”
`process takes several loans. CAM (Constant hccess Menard}, the default method, involves corr-
`stant monitoring of the ntwork. Since [MA creates a power consumption issue for battery-
`powered devices, PAM (Pulled tlccess Mode) can be substituted. PAM calls focal dient devices
`
`to go into sleep mode, cdl awaking at regular intewois, at the exact same time, to Esten for
`network activity. 011 tcnoary 3, 2000 the 302.11 technologyugot another boost when
`Microsoft and Starbucks announced that they were to into forces to
`er wireless access, using
`3021 lb among other standards, in mastaf Starbucks“ coffee outlets ever the next harayeats.
`the deal, some analysts say, a a further sign that 302.) lb raid becorrna serious compet'r
`tor to better known wireless technologies such as BlMooth, HomeRF, or even nextgeneration
`cellular networks. ripple was the list to launch an 802] lb product line (called hfrPott). All
`Apple computers now include a builtin antenna which, in conirmction with a networking card,
`can exchange data with a small base station plugged into a broadband imenretcannecttoa up
`to 45 metros (150 feet) away. Although some PE laptops nowcome preecyripped with wire
`less hardware, most users boy a PCMCIrl cord, or PC card, that serves as a wireless modem
`and antenna. See also 302.11g, 302.1 lg, Illuetooth, El‘Slf, Chip, [SIM/EA, 055$, Ellil’,
`Ethernet, HameRF, MAC, 0P5If, Spread Spectnm, WECA and Witt.
`802.12 Standard for lUUVfiahnthN. Addresses 100 Mops demandpriarity access
`method physical-layer and repeater specifications. Approved in 1995.
`802.15 A developing IEEE standatd for Wireless Personal Area Networks lWPllrttsl. the
`302.15 Wetking Group (WE) comprises four Task Gm
`(139.151 is denvin e WPrlli
`standard based on the Bluetooth specifications. 132 is oveloping recommend
`practices
`to tecihtate the coexistence of 302.15 WE'th and 302.11 Wilttts (Wireless Local Area
`Networks) 1153 is chartered to draft a new standard for high-rate WPth running at 20
`Mbps or better. Development is focusing on the 2.4 0H,;r hand, using 00PSll (Orthogonal
`Quaternary Phase Shift Keying) as the modulation technique. 104 is charged with investi-
`gating a low data rate WPer solution running atna more than 200 Kbps in support of appli-
`cations such as wireless interactive toys, serrson, automation, and smart tags and badges,
`802.16 A developing IEEE standard for broadband wireless access.
`lhe 30216
`Working Etoup (WE) is working on a variety affixed wireless standards intended to serve
`hih-speed applications.
`002.10 Standard lot [hilt/IIth management, oppreved in 1992; along with 3020:,
`became the basis of ISO/IEE 15302-2.
`802.10 IEEE standard for interconnecting Lth thraa h MAC bridges (specifically
`between 302.3, 302.4, and 302.5 nenvarks).1'he stando was approved in 1990, and
`was incorporated into ISO/IE1 10033. Works at the Milt level.
`802.1! lEEE standard for LAN and MAN load protocols. npptoved in 1990, leaned the
`basis for 150/(EC 15302-4.
`002.11 Standard for defining network mnagement information specified in 302
`umbrella standards. Ihpproved in 1993.
`002.10 A developing standard for remote bridging at the MAC layer.
`802.111 IEEE practices recommended for bridging Ethernet Lhtls at the MAC layer.
`hpptoved in 1995.
`002.11 iEEE standard for using EDDI (Fiber Distributed Data interface) as a Mitt-layer
`bridge. Approved in 1992, the standard was incerpomred into l50/lEC 10033.
`802.11 IEEE standacd for Lilli connectivity using MAC-layer bridges. A supplement to
`302.10, it was approved in 1996.
`802.111 IEEE standard for the discovery and dynamic control of network management
`information. Approved in 1993.
`In conjunction with 302.13, was the basis for (SD/IE1
`153022.
`802.118 tr conformance statement for 302.] E, it addresses definitions and protocols for
`system land management. Approved in 1993, it was incorporated into lSD/lEC 15302-4.
`002." IEEE extens‘an of 302.10. Specification for the use of MAC-layer brid es in filter-
`ing and ercpediting moiticost traffic. Prioritization of traffic is accomphshed thraug the addi
`tion of a 331i, priority value in the frame header. Eight tapalogyindependent priority values
`(07} are specified, with all eight values mapping directly into 302.4 and 302.6. Switches
`that support 302.1P and 302.10 provide a homework for bandwidth prioritization.
`Essentially what all these words mean is that you can assign a priority to the type of traf-
`fic with IEEE 3021p class-of-servica ((oS) vines and these allow network devices along
`the way to recognize and deliver highpriority traffic in a predictable manner. When can-
`QIESTIEIEIZJCICUIS, 09$ drops lawprionty traffic to allow delivery of higlrpriority traffic. See
`a so
`. 0.
`802.10 IEEE specification for implementation of 'thNS in Layer 2 LAN switches, with
`emphasis an Ethernet. Similar to 302.1P, prioritization of traffic is accomplished through
`an additional four bytes of data in the frame header. Most data fields in this addition to
`the header are specific to llLAhl opemtian. rllsa included is a field which provides the same
`3-bit priority flag specified in 302.1 P’s prioritycnapping scheme.
`in addition to conven
`
`18
`
`Page 7 of 7
`
`
`
`Page 7 of 7
`
`