throbber
OVER 500,000 SOLD
`
`'l'
`
`The Authoritative Resource for
`
`Telecommunications, Networking.
`
`the Internet and Information Technology
`
`_
`
`_
`
`’
`
`fulf-
`H" ._
`i
`E57'lllldflteflfiniltfiflllanded Edition
`T3er
`
`CMPBooks
`
`7‘
`
`Page 1 of 7
`
`Samsung Exhibit 1033
`
`
`
`Page 1 of 7
`
`Samsung Exhibit 1033
`
`

`

`
`
`Page 2 of 7
`
`
`
`Page 2 of 7
`
`

`

`NEWTflN’s
`TELEBDIVI
`DIBTIIJNARY
`
`
`
`Page 3 of 7
`
`

`

`A—
`at», r,
`
`K
`
`5; r 0:2
`
`«PM
`goo”).
`NIW‘I'ON'S TELECOM DICTIONARY M
`copyright © 2002 Harry Newton
`Email: Harry@HarryNeMOn.com
`ersonal web site: WWW.HarryNewton.com
`Business web site: www.Techno|ogylnvestor.com
`
`All rights reserved under International and Pan-American Copyright conventions, including
`the right to reproduce this book or portions thereof in any torn-r whatsoever.
`
`Published by CMP Books
`An imprint of CM? Media LLC.
`12 West 21 Street
`New York, NY 10010
`
`ISBN Number 1757820-1041-7
`
`February 2002
`
`Eighteenth Edition
`
`For individual orders, and tar iniormation on special discounts For quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 1-800-500-6875 or 408-848-3854
`Fax: 408-848-5784
`Web: www.cmpbooks.com
`Email: cmp@rushorder.com
`
`This book is also sold through wwwAmazomcom, ww.Fatbrain.oom and
`www.BarnesAndNoble.com
`
`Distributed to the book trade in the U.SA and Canada by Publishers Group West
`1700 Fourth 53., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 4 of 7
`
`
`
`Page 4 of 7
`
`

`

`MWL'MLLl/blgg
`qty/907$?
`
`-E {-c :r
`
`7 m He 0 2
`
`Table of Contents
`
`HELP MAKE THIS DICTIONARY EVEN BETTER
`- We offer a reel reward .
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`r
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. .Ii
`
`I I9 BEST DOLLAR-SAVING TIPS
`- How To Save on Telecom, PC, Internet and Airline Expenses and Best Investment Tips .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. VII
`
`.
`
`.
`
`.
`
`. XII
`
`WHY IS IT SO HARD TO BUY?
`- The logic of call centers! customer cares, and buying on the Internet
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`WHERE'S THE TECHNOLOGY GOING?
`- Cheaper, foster and more reliable are obvious trends but there are other less obvious important ones also.
`
`.
`
`.
`
`.
`
`. XVII
`
`DISASTER RECOVERY PLANNING
`— How to Make Sure Your Computing and Telecommunications Still Run .
`
`.
`
`.
`
`.
`
`r
`
`.
`
`_
`
`r
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. XIX
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`r
`
`r
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. XXI
`
`RULES FOLLOWED IN THIS DICTIONARY
`- How to figure our ordering of terms and our spellings
`
`.
`
`.
`
`.
`
`.
`
`.
`
`ABOUT THE AUTHOR
`- Harry Newton does have a life outside this dictionary .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`,
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_
`. XXV
`
`.
`
`.
`
`_
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`_ XXVII
`
`ABOUT THE CONTRIBUTING EDITOR
`- Roy Horak teaches, consults and lives in Paradise .
`
`.
`
`.
`
`.
`
`DICTIONARY
`
`Dictionary begins with Numbers then goes onto Letters .
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`. I
`
`APPENDIX
`— Industry Stondards Organizations and their contact information .
`- International Calling Codes .
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`- Standard Plugs and Connectors
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`.
`.
`.
`
`. 850
`. 856
`. 858
`
`III
`
`Page 5 of 7
`
`
`
`Page 5 of 7
`
`

`

`and Zilog 1-30, were installed in flbitcumputers such as the ripple II, the htSJll BOB0, and
`the Commodore 64.
`.00 ihe first “area code' for what r'JBi originally cubed InWATS service. See 000
`Service and fill".
`800 Parlalslllty BOB Portability refers to the fact thotlou can takeyour Bill] rum-
`ber to any long distance carrier. it rose example, once I ha
`l~000iJBRhltt For many
`years, that ncmtlaerwas provleded MEI. When portabiity (ante along, we were able to
`d‘rg'rfiit hon! am to MU and
`keep I-BOB-lJBllhRY, which is 8005424279. 800
`Pa
`uy‘oprmidedhyoseaesafmmplexdatohoestbebmlalmemmparries,urdu
`FCC mandate, have built. 000 Partnbiity started on Boy I, l993. See 000 Service.
`800 Service A tall call paid tar by the called party, rather than the toting party. it gener-
`iEcyand common term for InWhiS (Vitae Area Telecommunications Service) service
`rage
`tlllllmecfllmtlty,wllelltetalf( [total ErcdvrrrgeCorrier) neuritic llrrtere
`terrier). in tlortirrimer‘coondr'norderoltheirirtroduction, cl those In’r'ihTSserviceshave
`800 “967), BBB “996], B]? (199m, BBB [2000], at 055 (200” as their 'atea
`code.‘ (Note: Future BBB numbers will follow the convention Blitl, where till are specific
`numbers which are identical. Sadr BUB sentice is typically used by merchants offering to sell
`sometlirgsudrashotelresenatior'rs,clothes,orrentol carsiheideoofthefceesenicetsto
`errtkeaatunesmcoldiemrln,wimdndmrybeiogdmdmemlunarolculmd
`thereforeoastthewstorrrersarneth'
`hearsherrs'aubolessincinedtacd.Suppliersat
`800 sarvics use ua'ioos ways to
`' are rrd bill their BUD services
`800 Service works like this: You're somewhere in North America. You dial 11300, 1-883,
`101?, Hind or 1-055 and seven at is The LEE {Local Exchange Canter, tn, the local
`phone company) central office sees
`'l’ and recogniIes the Bill as long cistence. it
`alsarecogrizesthefitltl areaoadeoadcpreriesacerrhaizeddatohosebeloro processing
`the call lurther, with the query generally taking place over a SS? (Signing System 7)
`link. the centrairod database resides on a Service Management System lSMSl, which is
`a centralized computing platform, The database identifies the LEC or hit {InterErrcharrr'ai
`Earned planting the Shit number. Based on that information, and assuming thatth
`hummborisassociatedwithanlllt,thelEEsw-itchtautesthecalltothepraperlilt.
`Once the tilt has been tanded the call, it processes the 300 anther, perhaps translating
`it into a 'real" tolefihone number in order to route itcorrecily. rtltenrathrely, the lllC trans
`lures lhe 300 hour ar into an internal, nonstandard l0digit number for further roofing to
`the tenninating Central fli‘lice (C0) and trunk or trunk group.
`its a realife example. the Masher of his book has an 500 number, BDOdJBltARY (at
`000-54 2427‘”. When you call that camber, MU routes that number to the list available
`channel on the dedicated i—l circuit whid'r leased from Mtl's, and connecting the MCI New
`York Uty POP (Point 0t Presence) to the (MP New York my office.
`Because 000 long distance service is essentially a database aakop and translation service
`for incoming phone calls, mg: cue erdlessflsefiices’ you can amen can p3;
`pennunear irrstructions into
`company in
`routing patterns
`on tine
`day, day of week. number called, number calling. Same long distance compan‘os allow you
`to mange your roofing instructions lrom one minute to another. for example, you might
`have two call centers into which 800 phone calls are paorin . When one gets busy, you
`my tell your long distance company to route all the 300 '
`and phone clls to the call
`center, which isn't busy. See Eight Hundred Service and Due Plumber [ailing for more,
`especially ollthe leamresyao can now ton BOB service.
`In hiay of 1993 the HI mandated that a 000 {and by emeroion cll 8th numbers became
`"portable." That means that orstorners can take theier telephone number from one long
`d'atonce company to another, and still keep the same 000. See als 000 Portabiity.
`800 Services are known internationally as Trustee Services." In other cameras the chal-
`ing scheme may vary, with simples being 0-000 and 0500. Such serviceson go wider
`the name ’Breeidane.‘ In lane rm, the "UT approved the E169 standard llrl‘versal
`lntemotional Freefone llurnber lUIFN) numbers, also known as 'Biohal 300.” mm will
`work across nation! boundaries, based on a standard numbering scheme at 300, BBB or
`871' plus an Bdigit telephone numaer, See also Him and Vanity Numbers.
`I01 See 802 Standards.
`802 Stand-roll 1119.302 Standards are a set of storidmrh to: bill I{Local Area
`Network) and MN (Mahopoitan Area Netwodci data communicators developed thrauh
`the lEEE’s Protect 302. The two mastimparfant standards are 802i lb and 802.1io.ihe
`standards also indude an overview of recommended networking ard'itectares, approved it
`1990. The 302 aardordsfoluw a unique numbering convention. A number followed by a
`capital letter denotes a standalone standard; a number followed by a lower case letter
`
`800 / 802.1“
`
`denotes either a supplement to a standard, or alpgrt of a rmrltiple-nurnber standard le.g.,
`002.] 8 302.3). The 80? standards segment
`data link layer into two arblayers:
`i.Ahlediakcess Conhol (MAD lfltfitthliindudesspea'hcmothods for gain
`accessto
`tie Litt. These methods — such as Etirerrret’s random access method and T on king's
`token passing procedure - are in the 802.3. 802.5 and 802.6 standards.
`2. it Logical link [antral tilt) layer, described in the 802.2 standard, that provides for
`connection estdilishment, data transfer, and connection termination services. [it specifies
`tl'Iee types of convnuuicatiora inks:
`" An Unoclcnonrledgsd Conrrectianless Link. where the sending and receiving devices do not
`set up a connection before transmitting. Instead. messages are sent an a 'besi effort"
`basis, with no provision lor error detection, error recovery, or message sequencing. This
`type of ink is best suited for applications where the higher layer protocols can provide the
`error conection and hurctions, or where the loss of broadcast messages is not critical.
`*nConmchminadeLmkwhereaconuection benveeurnessogesourceanddestinatioa
`is established prior to transmission. This type of ink works best in applications, sachaslile
`transfer, where large amounts of die are being honsmitted at one time.
`* in hcknouuidedged Connectflegsflag as its namedindicates,
`ravides for acknowl-
`edgernorrt
`messages at
`a
`‘
`9 receiving
`evices w‘ maintaining a con-
`mcian.thismamn,iisnmstaheausedfaraniimhamudtereacenhalpmesw
`communicates with a lar
`camber of devices with lirrrited processlrg rapabitities.
`802.] IEEE standard or overall architecture at bills and internetworking. See all the
`following definitions.
`802.] III 802.1ia is actually an updated, bigger, better, faster version of 802.1 lb
`(also oiled WiFil, which is now cannnorrly install
`in offices, airports, coffee shops, etc.
`Many laptops rraw come with 802.iib brit-in. the newer 002i la, also car IIEE starr-
`dard forwireless'ihtls, apportsspeedsupto 54 Mbps Emilio unrsia-ru Sim-tritium
`cation in the 5 EH: range, which was ulocated by the FCC to support of UNII {the
`Unlicensed National luforrrration infrastructure). Specifically, 200 MH: is allocated at 5.15-
`5.35MH1 for inoiitdng applications, and 100 MHz at 5.72550 25 trin for outdoor use.
`il'isallocoled spectnurt is divided mtotlueeworkingdonrains.rlt5.155.25MH1,rnarri
`rrrurrr poweroutput is restricted to 50rni'r' traditions), 5.25-5.35 to 250th card 5.725
`5.825 to l Itiatt. B02.ila has been dubbed iii-HS l'dfireless Fidelity 5 MHz) by the
`Wireless Ethernet [ampatihifity irlliance l‘t‘l'EEtl.
`rrul
`802.1 in Laos Coded Orthogonal Freacancy Division hiuhiplerring lEBFDlrli as the s’
`sh-
`modulation bdmique. (OFDMsendsostreomol data symbols inamassively parallel
`ion, with muitiplo subcarriers (i.e., smol slices of llf, or ltodra Spectrum, width the desig-
`nated carrier ireqriency hand. Each center channel is 20 MI-iz wide, and is subdivided into
`52 sobrarrier channels, each at which is approximately 300 lltiz wide; 43 at the subcat-
`rior channels are used tor data transmission. and the remaining four for error conhol.
`through the application of a coding tectniqua, each symbol comprises multi
`data bits.
`Thespec‘rliedcudingtedmiquesarddatn mtesspecilied,ullofwtich must
`supported
`try 802.] l-cornph'ontproducts, include Bi’SK lBinary Phase Shift lieinth at 125 llbps rt
`channel lot a total of 6 hibps across all 40 data channels. OPSK {Ouadrahrre Phase 5 iii
`Keying) at for 250 Kbps per channel for a total at 12 Mbps, and room llolevel
`Quadrature Amplitude Modulation] at 500 Kbps per channel For a total of 24 Mbps. The
`standard riso allows more complex modulation schemes, that offer inaeased data rates.
`fluently. the mostcamplerr and fastest is 640% led-level 0M). at [325 Mbps per
`channel la! a total of 54 Mbps.
`The symbol rate is slowed down enough that each symbol transmission is longer than the
`delay spread. The delay spread is the variation in timing between receipt of the signals
`associated with a
`iven symbol, with the delay ahead raised by multipoth fading.
`Multipalhfadiugis
`phenornenonwherebytheltfsigmiscmryinga'
`dotosymbal
`ant-real the receivermsiightlydrfierenttimes. Thistsbeamse the signo spreadsautlrom
`the transmitter, with certain portions attire signal reading the receiver more or less direct-
`ly, while other portions of the signal bounce around all of walls, lumiture, your cowork-
`er's pointy bead, and soda. Now, each of the
`bots contains multiple bits, whidi are
`imposedunitdnaughihecorhng pcacessesidon'
`a’oove.hsdrenwttiplesyrrnbolsreodt
`thereceiver, they are sonedarnarntdecoded. withthedecoding process prancing some
`oddrtiorral time for the receiver to adust for the delay spread and to get ready to receive
`the next symbol. Bath 3021 la and 802. I th as designed to becompotirie with Ethemet
`bills, using the MAC lh‘odia ticoess Control]
`techninue of [Stilt/Ch (Carrier Sense
`Multiple Access with Collision hvoidancel.
`lfthissoundsgeat,thut’sbecooseitisgreot.tlttissouodstoogoodtobetme, that's
`
`l?
`
`Page 6 of 7
`
`
`
`Page 6 of 7
`
`

`

`302.110 / 802.10
`
`because it gets a little more complicated. While the 5 Bit: spectrum is pretty clear in the
`05, it's not so readily available elsewhere. Military and govemmenr installations use per-
`tiens of this band overseas.
`in Japan, only the 5.15-5.25 MHz spectrum is voiloble. [a
`Europe, the 5.7255325 MHz spectrum isnlready allocated forather uses. In Europe, ETSI
`(European Telecommunications Standards Institute) requires that two additional protocols
`be used in coniunctian with 302.110 in order to protect incumbent applicators and sys-
`tems running over previously allocated shared spectrum. DFS (Dynamic Frequency
`Selection) allows tan 302.11a s stem to dynamically shift frequency channels and TPE
`(Transmission Power (antral) t
`oces the power level. In combination, these protocols
`serve to eliminate interference issues witlt
`incumbent signals. See also 302.1 lb,
`802.1 lg, BPSK, (Shirl/Ch, PM, DFDlrl, 0AM, OPSK, WECA and Wi-fi.
`802.1 111 302.11b is now the most common wireless local area network. 302,111)
`(also called llrifi) is new commonly installed in offices, airports, coffee shops, etc. Many
`laptops now come with 302.1lb built-in. 302.11b has been dubbed van (Wireless
`fidelin by the Wireless EthemetCompatibility hlliance (WECA). 802.) lb defines both the
`Physical
`(PHY) and Medium Access Control (MAC) protocols. Specifically,
`the PHY spec
`includes three transmission options — one Ir (lnfmred), and two RF (Radio Frequency).
`302.1 lb uses 0555 (Direct Sequence Spread Spectrum) madnlationlar digital communi-
`cation. DSSS involves the nnnsniss'ron of a stream of one’s and zevo's, which is modulat-
`ed with the Darker code chipping sequence. Barkr code is an 1 11bit sequence [e.g.,
`101101 11000) that has advantages in wireless transmission. Each bit is encoded into on
`11-bit Barfcer code, with each resulting data abiecr forming a “chip.” ‘the chip is put an a
`canier frequency in the 2.4 3H: range (2.42.433 3H:), and the wavelonn is modulated
`using one of several techniques. 302.11 systerrrs running at 1 Mbps make use of mi!
`(Dinaty Phase Shift Keying]. Systems running at 2 Mbps make use of 0PStt (Quaternary
`Phase Shift (laying). Systems running at 11 Mbps make use of (Elf (Complementary Code
`Keying), which involves 64 unique code sequences, which technique supports six bits per
`code word. The [Elf code word is then modulated onto the RF carrier using 0PSll, which
`allows another nvo bin to be encoded for each dish symbol. Therefore, each 6-bit s or-
`bol contains eight hits. Power outprn is limited by the EEC to 1 watt ElRP lErtuivnllent
`lsotrapically Radioted Power). At this low power level, the physical distance between the
`transmitting devices becomes an issue, with error performance suffering as the distance
`increases. therefore, the devices adoptto longer distances by usia
`a less complex encod
`ing technique, and a resulting lower signaling speed, which trans
`tes into a lower data
`rate. For example, a system nrnning at 11 Mbps using [Elf and 0951, might throttie back
`to 5.5 Mbps by halving the signaling rate as the distances increase and enor pedormance
`drops. its the situation gets worse, it might throttle back to 2 Mbps using only GPSK, and
`1 Mbps using BPSK. Also to he considered in this equation is the fact that the 2.4 3H:
`mega is in the unlicensed lSM (Industrial, Scientific and Medical) band, which is shared by
`garage door openers, microwave ovens, bar code scanners, cordless drones, Eluetooth
`LANs, and a wide variety of other devices. As a result, this slice of spectrum can he heavi-
`ly congested at times, and performance can drop considerably. 302.1 I divides the avail-
`able spectrum into 14 channels In the US, the EEC allows the use of I 1 channels. Eaar
`draanels are available in France, 13 in the rest of Europe, and only one in Japan. There
`also is overlap between ad‘acent channels leg, channels one and two), which fact further
`affects perforrrrunce; therefore, any given system must maintain maximum channel sepa-
`ration from other systems in proximity.
`Both 302.11a and 302.1 lb are designedto be compatible with Ethernet Lhtls. 302.1 lb uses
`rr variation of the Mitt (Media rlccess Control) technique of (Shift/Ch ([un‘rer Sense Multiple
`r‘rccess with Coffsion hvotdance), which iscoed in some wired Ethemets, oswell. hdevice seek-
`ing to transrnit ave: the shared medium (in this case, a shared RF channel) listens to the net—
`work. If it senses no activity over the ccnrier frequency fora mirimmt period of time known
`as the DIES (01F (Distributed (aotdirated function) lntarftame Spa ‘
`), ttreqoests access
`byfirst transmitting o 315 (Request in Send) packet. The R15 pocket in odes both the source
`(i.e., transmitter) and destinath (i.e., intended receiver) addresses, the duration attire intend
`ed session lie, transm'as'ron), and theAClt (AEKnawlodgement) associated with it. If the net-
`wadcis available, the destination device responds va‘th C15 (Clear To Send), repeating both the
`duration and the MIC. All other devices back off the network until the session is concluded. If
`the network, on the other hand, is busy, the device waits a period of time equal to the DlES,
`plus a madam another of slot times, as calculated with seveml backaff timers. lhe “listening”
`process takes several loans. CAM (Constant hccess Menard}, the default method, involves corr-
`stant monitoring of the ntwork. Since [MA creates a power consumption issue for battery-
`powered devices, PAM (Pulled tlccess Mode) can be substituted. PAM calls focal dient devices
`
`to go into sleep mode, cdl awaking at regular intewois, at the exact same time, to Esten for
`network activity. 011 tcnoary 3, 2000 the 302.11 technologyugot another boost when
`Microsoft and Starbucks announced that they were to into forces to
`er wireless access, using
`3021 lb among other standards, in mastaf Starbucks“ coffee outlets ever the next harayeats.
`the deal, some analysts say, a a further sign that 302.) lb raid becorrna serious compet'r
`tor to better known wireless technologies such as BlMooth, HomeRF, or even nextgeneration
`cellular networks. ripple was the list to launch an 802] lb product line (called hfrPott). All
`Apple computers now include a builtin antenna which, in conirmction with a networking card,
`can exchange data with a small base station plugged into a broadband imenretcannecttoa up
`to 45 metros (150 feet) away. Although some PE laptops nowcome preecyripped with wire
`less hardware, most users boy a PCMCIrl cord, or PC card, that serves as a wireless modem
`and antenna. See also 302.11g, 302.1 lg, Illuetooth, El‘Slf, Chip, [SIM/EA, 055$, Ellil’,
`Ethernet, HameRF, MAC, 0P5If, Spread Spectnm, WECA and Witt.
`802.12 Standard for lUUVfiahnthN. Addresses 100 Mops demandpriarity access
`method physical-layer and repeater specifications. Approved in 1995.
`802.15 A developing IEEE standatd for Wireless Personal Area Networks lWPllrttsl. the
`302.15 Wetking Group (WE) comprises four Task Gm
`(139.151 is denvin e WPrlli
`standard based on the Bluetooth specifications. 132 is oveloping recommend
`practices
`to tecihtate the coexistence of 302.15 WE'th and 302.11 Wilttts (Wireless Local Area
`Networks) 1153 is chartered to draft a new standard for high-rate WPth running at 20
`Mbps or better. Development is focusing on the 2.4 0H,;r hand, using 00PSll (Orthogonal
`Quaternary Phase Shift Keying) as the modulation technique. 104 is charged with investi-
`gating a low data rate WPer solution running atna more than 200 Kbps in support of appli-
`cations such as wireless interactive toys, serrson, automation, and smart tags and badges,
`802.16 A developing IEEE standard for broadband wireless access.
`lhe 30216
`Working Etoup (WE) is working on a variety affixed wireless standards intended to serve
`hih-speed applications.
`002.10 Standard lot [hilt/IIth management, oppreved in 1992; along with 3020:,
`became the basis of ISO/IEE 15302-2.
`802.10 IEEE standard for interconnecting Lth thraa h MAC bridges (specifically
`between 302.3, 302.4, and 302.5 nenvarks).1'he stando was approved in 1990, and
`was incorporated into ISO/IE1 10033. Works at the Milt level.
`802.1! lEEE standard for LAN and MAN load protocols. npptoved in 1990, leaned the
`basis for 150/(EC 15302-4.
`002.11 Standard for defining network mnagement information specified in 302
`umbrella standards. Ihpproved in 1993.
`002.10 A developing standard for remote bridging at the MAC layer.
`802.111 IEEE practices recommended for bridging Ethernet Lhtls at the MAC layer.
`hpptoved in 1995.
`002.11 iEEE standard for using EDDI (Fiber Distributed Data interface) as a Mitt-layer
`bridge. Approved in 1992, the standard was incerpomred into l50/lEC 10033.
`802.11 IEEE standacd for Lilli connectivity using MAC-layer bridges. A supplement to
`302.10, it was approved in 1996.
`802.111 IEEE standard for the discovery and dynamic control of network management
`information. Approved in 1993.
`In conjunction with 302.13, was the basis for (SD/IE1
`153022.
`802.118 tr conformance statement for 302.] E, it addresses definitions and protocols for
`system land management. Approved in 1993, it was incorporated into lSD/lEC 15302-4.
`002." IEEE extens‘an of 302.10. Specification for the use of MAC-layer brid es in filter-
`ing and ercpediting moiticost traffic. Prioritization of traffic is accomphshed thraug the addi
`tion of a 331i, priority value in the frame header. Eight tapalogyindependent priority values
`(07} are specified, with all eight values mapping directly into 302.4 and 302.6. Switches
`that support 302.1P and 302.10 provide a homework for bandwidth prioritization.
`Essentially what all these words mean is that you can assign a priority to the type of traf-
`fic with IEEE 3021p class-of-servica ((oS) vines and these allow network devices along
`the way to recognize and deliver highpriority traffic in a predictable manner. When can-
`QIESTIEIEIZJCICUIS, 09$ drops lawprionty traffic to allow delivery of higlrpriority traffic. See
`a so
`. 0.
`802.10 IEEE specification for implementation of 'thNS in Layer 2 LAN switches, with
`emphasis an Ethernet. Similar to 302.1P, prioritization of traffic is accomplished through
`an additional four bytes of data in the frame header. Most data fields in this addition to
`the header are specific to llLAhl opemtian. rllsa included is a field which provides the same
`3-bit priority flag specified in 302.1 P’s prioritycnapping scheme.
`in addition to conven
`
`18
`
`Page 7 of 7
`
`
`
`Page 7 of 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket