`
`ct
`
`
`
`owt
`75x3
`
`Page 1 of 11
`
`aNaie
`Telecom
`
`
`
`vi
`
`ications
`
`
`
`
`
`Samsung Exhibit 1024
`
`
`
`Page 1 of 11
`
`Samsung Exhibit 1024
`
`
`
`
`
`
`
`
`
`
`
`|
`|
`The
`Telecom
`|
`
`
`
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`Telecom Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARYor 408-848-3854
`Email: telecom@rushorder.com
`FAX: 408-848-5784
`
`NEWTON'S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`Email: Harry Newton @Technologylnvestor.com
`Personal web site: www.HarryNewton.com
`All
`rights reserved under international and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN # 1-57820-053-9
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`
`
`|
`(
`
`|
`
`|
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`16th l
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 2 of 11
`
`Page 2 of 11
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`
`eect
`
`
`
`
`
`Page 3 of 11
`
`Instabus1080 aad Instabus?480 Trademarks for
`MICOM's direct host attachment products.
`Insteabink 1. An MCI International service that allows access
`to a host computer in the U.S.A. from a Telex machine any-
`where overseas. This allows easier retrieval of
`information
`from a U.S.database.
`2, A trademark for MICOM's data-over-voice products.
`tastallation The physical hook-up and diagnostic testing
`of a PBX switch, cabinet, or peripheral item prior to a culover
`and maintenance acceptance by the maintaining vendor.
`Installed Base How many of whateverare in and working.
`installed base is often confused. with annual shipments.
`They're very different. Shipments is what goes out thefactory.
`Installed base is what's out there. The equation is: Installed
`base at beginning of year plus annual shipments less equip-
`ment taken out of service during the year is equal
`to the
`installed base at the end of the year.
`Installer’s Tone Also called test tone. A small box that runs
`on batteries and puts an RF tone on a pair of wires. If the techni-
`cian can't find a pair of wires by coloror bindingpost, they attach
`a tone at one end and use an inductive amplifier (also called a
`banana or probe) althe other end fo find a beeping tone.
`Imstermee ID An ATM term. A subset of an object's attributes
`which serve to uniquely identify a MiB instance.
`Imstamet Trademark for MICOM'sfamily of local data distri-
`bution and data private automatic branch exchange (PABX)
`products.
`load
`|
`Instant Messaging I'm logged into the Internet.
`some software.
`It shows me that you're also logged into the
`Internet.
`{ type you a message. You see it on your screen the
`moment| hit “send.” You type your reply and sendit. | seeit.
`Bingo, a new Internet service that has come to be called
`“instant messaging.” Instant messaging is essentially real-
`time, on-line electronic mail. instant Messaging started with
`software called ICQ, then America Online introducedits huge-
`ly-popularvariation (AOL Instant Messenger), then Microsoft
`introduced its software called MSN Messenger. As ofwriting,
`noneof these soflwares is compatible with the other. But there
`wastalk in the trade press of eventual standards. There are
`serious reasons we need standards.
`Instant messaging is
`evolving into much more than a tool for sending typed mes-
`sages to buddies online. Just as the original Web browsers
`revolutionized the way average users connectto Internet con-
`ent, today's instant message screens are evolving into easy-
`0-use connectionsforlinking people at any given moment on
`he Internet via text, voice and video. All the new capabilities
`will be built on a single critical assumption: knowing that a
`person is online, That, in turn, makes it possible for electron-
`ic merchants and providers of online services to reach Internet
`users with information or incentives — at the precise time they
`are able to react, namely when they are online in front of their
`screen, an easy targel. Tools are being Integrated Into instant
`messaging software that permit the immediate delivery of an
`increasing array of data that does not come from friends or
`amily. America Online has unveiled a version of its instant
`messaging software that automatically delivers tailored news
`leadtines and stock quotes.
`Instant On Buy a PC (Personal Computer). Turn it on.
`Bingo,it’s already loaded with Windowsor 0S/2. Instant Cn is
`a new term for preloading software onto hard disks of new
`cornputers and shipping those computers already pre-loaded
`with that software.
`Instanfaneous Override Energy Function |OEF A
`feature of the AT&T PBX Dimension Energy Communications
`
`
`
`Service Adjunct (EGSA), which allows the userto turn all the
`ECSA eneray functions ON or OFF. jOEF is most often used for
`periodic maintenance, or
`to adjust
`fo sudden changes in
`weather.
`institute for Telecommunications Sciences ITSis
`the
`research and engineering branch of
`the National
`Telecornmunications and Information Administration (NTIA),
`which is part of the U.S. Department of Commerce (DoC).
`www.ntia.doc.gov See NTIA
`lustruction Register The register which contains the
`instruction to be executed and functions as the source for the
`subsequent operationsofthe arithmetic unit.
`Instructional Television Fixed Service (TFS. A ser-
`vice provided by one or morefixed microwavestations oper-
`ated by an educational organization and used mainlyto trans-
`mit instructional, cultural and other educationalinformation to
`fixed receiving stations,
`Insulated Wire Wire which has a nonconducting covering.
`Insulating Materials Those substances which oppose
`the passage ofan electric current through them.
`Insulation A material which does not conduct electricity but
`is suitable for surrounding conductors to preventthe loss of
`current.
`Insulation Displacement Connection IDC. The IDC
`has replaced wire wrap and solder and screw postterminations
`as the way for connecting conductors (1.e. wires carrying tele-
`com)
`to jacks, patch panels and blocks.
`Insulation
`Displacement Connections are typically two sharp pieces of
`metal ina slight V, As the plaslic-covered wire is pushed into
`these metalteeth, the teeth pierce the plastic jacket (the insu-
`lation) and make connection with the inside metal conductor.
`This saves the installer havingto strip off the conductor's insu-
`lation. This saves time. Since IDCs are very small, they can be
`placed very close together. This reduces the size of jacks,
`patch panels and blocks. IDCsarethe best termination for high
`speed data cabling since a gas-tight, uniform connection is
`made. The alternate method of connecting wires is with a
`screw-downpost. There are advantages and disadvantages to
`both systems. The IDC system, obviously, is faster and uses
`less space. But
`it requires a special tool. The screw syslem
`takes more time, but may produce a longer-lasting and
`stronger, more thorough (more of the wire exposed)electrical
`connection. The most common IDC wiring schemeis the 66-
`block,invented by Western Electric, now Lucent. But there are
`other systems — from other telecom manufacturers. See
`Punchdown Tool.
`Insulation Resistance That property of an insulating
`material which resists electrical current flow through the insu-
`lating material when a potentialdifference is applied.
`Insulators Some atoms hold onto their electronstightly.
`Since electrons cannot move freely these material can't easily
`conduct electricity and are know as non-conductors or insula-
`tors. Common insulators include glass, ceramic, plastics,
`paperandair. Insulators are alsocalled dielectrics.
`INT Induction Neutralizing Transformer. A specially designed
`multipair longitudinal inductor that is spliced into a wireline
`facility to substantially reduce low frequency steady-state or
`surge induced voltages and currenls that may be causing
`noise, equipment malfunctions and/or damagesor creating a
`personnel safely hazard. See TEN.
`INT14 A software interrupt designed to communicate with the
`com (serial) port
`in a PC. Communications programs use
`interrupt 14h totalk to a modem physically altached to anoth-
`er computer on the network.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 3 of 11
`
`
`
`-
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`compresses information within a single frame. Compare to
`Interframe Coding.
`IntraATA Telecommunications services that originale and
`terminate in the same Local Access and Transport Area. See
`also Local Access and Transport Area. This can be either
`Interstate or Intrastate service, traffic or facilities.
`Intramodal Distortion In an optical fiber, the distortion
`resulting from dispersion of group velocity of a propagating
`mode. it is the only form of multi mode distortion occurring
`in single-modefibers.
`Intranet A private network that uses Internet software and
`Internet standards. In essence, an Intranetis a private Internet
`reserved for use by people who have been given the authori-
`ty and passwords necessary to use that network. Those peo-
`ple are typically employees and often customers of a compa-
`ny. An intranet might use circuits also usedby the Internet or
`it might not. Companies are increasingly using Intranets —
`internal Web servers —- to give their employees easy access
`to corporate information.
`According to my friends at Strategic Networks Consulting,
`Boiled downto its simplest, an Intranetis: a private network
`environment built around Internet technologies and standards
`— predominantly the World Wide Web. The primary user
`interface, called a Web browser, accesses Web servers locat-
`ed locally, remotely or on the Internet. The Web serveris the
`heart of an Intranet, making selection of Web server software
`a crucial decision, even though muchfanfare has focused on
`browsers (Netscape’s Navigator vs, Microsoft's Explorer).
`At
`its core, a Web server handies two arcane languages
`(HTML and CGI) that are the meat and potatoes of generating
`Web pages dynamically, making connections and responding
`to user requests. But in the rush to dominate the potentially
`lucrative Intranet market,
`these simple Web functions are
`being bundled into operating systems and vendors are now
`touting pricey “Intranet suites” which encompass everything
`from database and application interfaces, to e-mail and news-
`groups, to the kitchensink.
`Most medium- or larger-sized companieswill need more than
`just a handful of simple Web servers to deploy a reasonably
`robust Intranet. To help a companypostcurrentjob openings,
`or make up-to-date product specs and available inventory
`accessible by traveling sales reps, an Intranet needs the fal-
`lowing capabilities:
`e Database access. Getting at critical data housed in corpo-
`rate databases can be accomplished via generic, universal
`ODBClinking or based on “native” Jinks directly to Sybase,
`Oracle et al. allowing use of all the database's features,
`® Application hooks. Used by developers, a standard pro-
`gramming interface (API) allows outside applications ike
`Lotus Notesto interact with Web data and vice versa. In addi-
`tion, proprietary APIs exist — most notably Microsoft's ISAPI
`(for “Internet Server API") which lets developerslink directly
`lo Microsoft applications.
`© User publishing.
`In addition to dialogues via chat/news-
`group/bulletin board features, users will want to post their
`own content on Web servers without having to attain
`Webmasterstatus.
`® Search vehicles. How does an engineer find the current
`Specs on Project #686-2 among thousands of pages spread
`across a bunch of Web servers? The answer: an indexing and
`Search engine that creates an internal Yahoo! for your own
`ebsites,
`* Admin/management. A catch-all for loads of important, but
`Still ill-conceived features for managing access, users, con-
`
`ee
`
`it's
`
`
`
`
`
`Page 4 of 11
`
`tent and the servers themselves. Intranet administrators are
`currently fascinated with analyzing Web server logs which
`contain data of some sort,
`including user connections and
`page activity.
`According to a white paper released by Sun Microsystems in
`the summer of 1996, the basic infrastructure for an intranet
`consists of an internal TCP/IP network connecting servers
`and desktops, which may or may not be connected to the
`Internet through a firewall. The intranet provides services to
`desktops via standard open internet protocols. in addition to
`TCP/IP for basic network communication, these also include
`protocols for:
`Browsing
`File Service
`Mail Service
`Naming Service
`Directory Services
`Booting Services
`Network Administration
`Object Services
`See also Extranet and Intranet.
`Intranodal Service Intranodal service is a feature of
`some central office switches and smaller remote switches. It
`meansthat it will continue to switch in which
`Infranode Communications path which originates and ter-
`minates in the same node.
`Intvaoffice Call A call involving only one switching system.
`lntraoffice Trunk A telephone channel between two
`pieces of equipment within the same central office.
`lntrapreneur An entrepreneur who works inside a big
`company. Hence,
`intra, as in inside.
`it's hard to imagine it
`actually happening. But the word has became popular as a
`way for large companies to motivate their employees to take
`personal careerrisks and introduce new products.
`Intrastate Services, traffic or facilities that originate and
`terminate within the same state. Therefore,
`if related to tele-
`phone,falling under the jurisdiction of that state's telephone
`regulatory procedures,
`itwastructure A term coined by “Data Communications”
`andreferring to the software, hardware, and Internet services
`underlying a corporateIntranet.
`Intrinsic Join? Loss That loss in optical power transmis-
`sion,intrinsic to the optical fiber, caused by fiber parameters,
`e.g., dimensions, profile parameter, modefield diameter, mis-
`matches when two nonidentical fibers are joined.
`lntrinsic¢s Intrinsics are a component of many windows
`toolkits, The windows toolkit
`intrinsics definition has been
`developed by the MIT X Consortium. The intrinsics define the
`function of specific graphical user
`interface and window
`objects. They do notdefine any particular lookor feel, just the
`function. Example: A pull down menu Intrinsic would define
`the function of a pull down menu within a toolkit but not the
`appearanceofit.
`lntrusive Test Breaking a circuit in orderto test its func-
`tionality, Testing intrusively will drop service on the circuit.
`INTUG International Telecommunications Users Group.
`Intumescent Firestep A firestopping material
`expands under the influence of heat.
`Inverse ARPA See Reverse DNS.
`Inverse Fourier Transform Inversion of Fourier trans-
`form to convert frequency representation of signal to time rep-
`resentation.
`Inverse Multiplexer|-Mux. An inverse multiplexer per-
`forms the inverse function of a multiplexer. “Multiplexer”
`
`HTTP
`NFS
`IMAP4/SMTP
`DNS/NIS+
`DNS/LDAP
`Bootp/DHCP
`SNMP
`OP (CORBA)
`
`
`
`that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 4 of 11
`
`
`
`NEWTON’S TELEGOM DICTIONARY
`
`
`
`LANs were invented as an afterthought — after PCs — and
`were originally designed to let cheap PCs share peripherals —
`like laser printers — which were too expensive to dedicate to
`individual PCs. And as time went on, what LANs were used for
`got broader and broader. Today, LANs have four main advan-
`tages: 1. Anyone on the LAN can use any of the peripheral
`devices connected {o the LAN. 2. Anyone on the LAN can
`access databases and programs running on client servers
`(super powerful PGs) attached to the LAN; and 3, Anyone on
`the LAN can send messagesto and workjointly with others on
`the LAN. 4. While a LAN does not use commoncarrlercircuits,
`it may have gateways and/or bridges to public telecommunica-
`tions networks. See LAN Manager, Token Ring and Ethernet.
`Local Area Signallng Services LASSis a groupof cen-
`tral office features provided now by virtually all central office
`switch makers that uses existing customer lines to provide
`some extra featuresto the end user (typically a business user).
`They are based on delivery of calling party numbervia the local
`signaling network. LASS can be implemented on a standalone
`single central office basis for intra office calls or on a multiple
`central office grouping in a LATA (whatthe !ocal phone compa-
`nies are allowed to serve) {or interoffice calls. Local CCS7
`(Common Channel Signaling Seven) is required for all config-
`urations. The followingfeatures typically make up LASS:
`Automatic Callback: Lets the customer automatically call the
`last Incoming call directory number associated with the cus-
`tomer’s phone when both phones becomeidle, This feature
`gives the customerthe ability to camp-onto a line,
`Automatic Recall: Lets the customer automatically cali the last
`outgoing call currently associated with the customer's station
`whenboth stations becomeidle. This feature gives the cus-
`tomer the ability to camp-onto a line.
`Customer-Originated Trace: Lets the terminating party request
`an automatic trace of the last call received. The trace includes
`thecalling line directory numberand time and dateof thecall.
`This information is transmitted via an AM IOP channel to a
`designated agency, such as the telephone company or law
`enforcement agency,
`Individual Calling Line Identification: Consistsof two distinct
`features:
`1. Calling Number Delivery which transmits data on an
`incoming call to the terminating phone.1. Directory Number
`Privacy which prevents delivery of the directory numberto the
`terminating phone.
`Also, LASS has someselective features:
`Selective Call Acceptance: Allows users to restrict which
`incoming voice calls can terminate, based on the identity
`attribute of the calling party, Only calls from parties identified
`ona screening lists are allowedto terminate. Calls from parties
`not specified on a screening list are rerouted to an appropriate
`announcementof forwarded to an alternate directory number.
`Selective Call Forwarding: Allows a customerto pre-select
`which calls are forwarded based onthe identityattribute of the
`calling party.
`Selective Call Rejection: Allows a customerto reject incoming
`voice calls from identity allributes which are on the customer's
`rejection list. Call attempts from parties specified on the rejec-
`tion list are prevented from terminating to the customer and are
`routed to an announcement which informs the caller that
`his/hercall is not presently being accepted by the called party.
`Selective Distinctive Alert: Allows a customer to pre-select
`which voicecalls are to be provided distinctive alerting treat-
`ment based onthe identify attributes of thecalling party.
`Users can, at their convenience, activate or modify any of
`
`501
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ig point in time a
`2 computertele.
`lally be no more
`‘3 seconds 99%
`'sed toillustrate
`load. When the
`r than the above
`tcily, OF course.
`y mimic the real
`3 largely mean.
`one, president:
`duter telephony
`
`‘ing is the tech=
`wocessing nor-
`atworking, load
`ten connecting
`nd Token Ring
`‘k) link such as
`as the need for
`each serving a
`
`fe goalof load
`ixceedits busy
`ng conditions;
`al steps until it
`the system is
`yondits load?
`towis service
`aceful or must
`: system reset
`inderstand the
`astsignificant
`oadtesting. It
`ahony system
`ie system will
`ins, See also
`
`loading coils
`Je distortion.
`
`ty of a phone
`I lines. What
`Hoopcircuit
`ding “tunes”
`900 Hz) and
`| bandwidth.
`+ removedif
`slusively on
`
`local loops
`tes for wire
`is. Loading
`ces, as dis-
`se used for
`
`A group of
`d similarly
`
`r loading a
`t) program
`Inder DOS,
`device dri-
`y memory
`
`
`
`
`
`
`
`manage’s USE thelr own routines to load high, though they
`can sometimes borrow DOS commands.
`/
`Loading Plan A telephone companyterm. A Loading Pian
`ig a systematic schemefor fully utilizing all existing capacity
`in a given switching entity; Utilizing and coordinating the
`capabilities and capacity limitations of various entities in a
`multi-entity wire center and maintaining objective service lev-
`als al all times. A Loading Plan is the basis for achieving and
`retaining good Load Balance.
`LO€ An ATM term. Loss of Cell Delineation: A condition at the
`receiver of a maintenance signal transmitted in the PHY over-
`head indicating that the receiving equipment has lost cell
`delineation. Used to monitor the performanceofthe PHYlayer.
`Local Pertaining to a system or device that resides within a
`subject device's switching domain.
`Local Access The connection between a customer's premis-
`as and a point of presence of the Exchange Carrier.
`Local Access and Transport Area LATA, The MFJ
`(Modified Final Judgement), which broke upthe Bell System,
`also defined 196distinct geographical areas known as LATAs.
`The LATA boundaries generally were drawn in consideration
`of SMSAs (Standard Metropolitan Statistical Areas), which
`were defined by the Census Bureau to identify “communities
`of interest” in economic terms, Generally speaking, the LATA
`houndaries also were coterminous with state lines and exist-
`ing area code boundaries, and generally included the territo-
`ry served by only a single RBOC. The basic purpose of the
`LATA conceptwasto delineate the serving areas reserved for
`LEC (Local Exchange Carrier) activity.
`In other words,
`IntraLATA traffic (i¢.,
`local and local
`long distance) became
`the sole right and responsibility of the LECs.InterLATAtraffic,
`on the other hand, became Ihe sole right and responsibility of
`the IXCs. Overtime, a numberof stale PUCsallowedthe IXCs
`to compete for IntraLATA long distance;
`they also allowed
`CAPs (Competitive Access Providers) to provided limited
`local
`service
`in
`competition with
`the LECs. The
`Telecommunications Act of 1996 (The Act) openedthe flood-
`gates for competition with the LATA boundaries. The Act also
`allows the RBOCs to provide InterLATA service outside the
`states in which they provide local service. Additionally, The
`Act contains provisions for the RBOCsto offer InterLATA ser-
`vice within the state in whichthey provide localservice, once
`they have satisfied a 14-point checklist, the mostsignificant
`conditions of which relate to significant, demonstrated levels
`of competition within their respective local exchange serving
`areas, California is divided into 10 LATAs. Sparsely populat-
`ed slates such as South Dakota comprise only a single LATA.
`Local Airtime Detail This cellular telephone carrier
`option (which meansit costs money) provides a line-item-
`ized, detailed billing of all calls, including call attempts and
`incomingcalls to the mobile. What you get for free is gener-
`ally a non-delailed, total summary of all calls.
`Local Area And Transport Area See LATA.
`Local Area Data Transport LADT. A service of your
`local phone company which provides'you,the user, with syn-
`chronous data communications.
`Local Avea Network LAN. A short distance data comimu-
`nications network(typically within a building or campus) used
`to link computers and perigheral devices (suchas printers, CD-
`ROMs, modems} under some form of standard control. Older
`data communications networks used dumb terminals (devices
`with no computing power)to talk to distant computers. But the
`economics of computing changedwith the invention of the per-
`sonal computer which had “intelligence” and which was cheap.
`
`Page 5 of 11
`
`Page 5 of 11
`
`
`
`be “dial mother.” They might be “transfer this call to my home
`
`Social ComputingA term that emerged in the summerof
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a “communica-
`tions-rich brew,” which is “expected to create new ways for
`businesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators.” According to
`Peter Lewis, “The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num-
`ber crunching and data base management to wider-ranging
`forms of business communications...Where client server
`broke away from mainframe-based systems and distributed
`computing powerto everyonein the organization, social com-
`puting goes the next step and extends the distribution of com-
`puting power to a company’s customers.”
`Social Contract An arrangement between the local tele-
`phone companyandits focal regulatory authority whereby the
`telephone company's services are detariffed, but cannot be
`priced at less than cost. Quality of service standards apply.
`Social Engineering Gaining privileged information about
`a computer system (such as a password) by skillful lying —
`usually via a phone call. Often done by impersonating an
`authorized user.
`‘
`Socket {. A synonym for a port.
`2, A technology that serves as the endpoint when computer:
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PCMCIA Card and mapping the host's internal bus signals to
`the PCMCIAinterface signals.
`4. An operating system abstraction which provides the capa-
`bility for application programs to automatically access com-
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The SocketsInterface,introduced in the
`early 1980s with the release of Berkeley UNIX, was thefirst
`consistent and well-defined application programming inter-
`face (API).
`It
`is used at
`the transport
`layer between
`Transmission Control Protocol
`(TCP) or User Datagram
`Protocol (UDP) andthe applications on a system. Since 1980,
`sockets have been implemented onvirtually every platform.
`Socket Number(n TCP/IP, the socket numberis the join-
`ing of the sender's (or receiver's) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardware that provides a standardized interface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCMCIAslots of a computer, desktop or laptop
`(but mast typically a laptop). Ideally, socket services software
`should be integrated into the notebook’s BIOS, but few man-
`ufacturers have done so to date. For PCMCIA cards to oper-
`ate correctly you also need Card Services, which is {not are)
`a software managementinterface that allows the allocation of
`system resources (such as memory and interrupts) automati-
`cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCMCIA cards when you buy
`the cards. You will, however, have to load new drivers every
`time you change cards and allocate the correct memory exclu-
`Sions, You will have to rebootif you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`783
`
`Page 6 of 11
`
`NEWTON’S TELECOM DICTIONARY
`
`do not have to reboot every time you change cards. My expe-
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for comimu-
`nications between a user application program and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuit-level ‘security technology developed by
`David Koblas in 1990 and since made publicly available by
`the IETF(Internet Engineering Task Force. SOCKSv5, the cur-
`rent version, provides security in a client/server environment,
`running at the Session Layer, Layer 5 of the OSI Reference
`Model. SOCKSv5 supports multiple means of authentication,
`negotiated between client and server overa virtual circuit, and
`on a session-by-session basis. SOCKSv5 also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an independent message.
`SOCKSv5 also allows protocol
`filtering, which offers
`ennanced access control on a protocol-specific basis. For
`example, a network administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter command to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as WindowsNT. The cross-platform nature
`of SOCKSoffers portability to Macintosh and other operating
`systems
`and browsers. According to Network World
`Magazine, September 27, 1999,
`“the latest version of
`SOCKSv5 offers network managers an easier way to run
`videoconferencing and video and audio streaming through
`firewalls, which has been difficult and time-consuming.
`Socksv5 doesthis by providing a single and powerful method
`of authenticating users and managing security policiesfor all
`Internet applications, including multimedia.” SOCKSv5 also
`interoperates on top of IPv4, IPsec, PPTP, L2TP and other
`lower-level protocols.
`,
`SOFStart OfFile
`Soft Copy1. A copy of a file or program which resides on
`magnetic medium, such as a floppydisk, or any form thatis
`not a hard copy — which is paper.
`2. Old legacy systems term reapplied to distributed comput-
`ing in which reports are created on-screen from data residing
`within different applications.
`Soft Decision Scc SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans-
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft Font A font,usually provided by a-font vendor, that
`must be installed on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadablefont.
`Soft Handoff A cellular radio term. A soft handoff is a
`handoff betweencell sites that involvesfirst making the con-
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or “break and
`make” handoff, is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft Key There are three types of keys on a telephone:hard,
`programmable and soft. HARD keys are those which do one
`thing and one thing only, e.g. the touchtone buttons 1, 2, 3, *
`and # etc. PROGRAMMABLEkeys are those which you can
`program to do produce a bunch of tones. Those tones might
`
`Page 6 of 11
`
`Page 6 of 11
`
`
`
`
` m
`Assigned by a central authority,
`
`commercial users as well, wi
`- Consequently, TCP/IP now is supe
`—qyrers of minicomputers, personal
`-
`technical workstations and data co
`is also the protocol commonly
`SS
`Ns (as well as X.25) networks. |
`averything from PC LANsto minis
`TCP/IP currently divides nelworki
`four layers:
`2
`ANetwork Interface Layer that corres
`and Data Link Layers. This layer raj
`petween a device and the netwo
`utes data between devices on the!
`| An Internet Layer which correspond
`|
`The Internet Protocol (IP) subse
`|
`thls layer. IP providesthe addressit
`oiward packets across a multi
`EEE terms,
`it provides connect:
`_ which meansit attempts to deliver
`provision for
`retransmitting los:
`-
`leaves such error correction,
`if req
`tocols, such as TOP.
`P addresses are 32 bits in lengt
`etwork Identifier (Net 1D) and the
`
`ne value of the subnet mask is deter
`york (Dbits ofthe IP address to o
`_
`jos. The result allows TCP/IPto ce
`york IDs of the local workstation, Hel
`p address. For example:
`oO
`yen the IP address is 102.54.94
`im
`ind the subnet mask ts 255.255.0.¢
`the network ID is 102.54 (IP addres
`pe host ID is 94.97(IP address ang
`_
`6k. the above was Microsoft's detini
`_ hich covers someareas Microsclt
`-
`srotocols developed bythe Deparim:
`- gilar computers across many kin
`-yyellable ones and ones connec
`i
`-70P/IP is the protocol used on th
`=2Bunn
`--pe glue thal binds the Internet. De
`S, Department of Defense’s Ad
`Agency (DARPA) as a military sta
`
`ance of multi vendor connectivity QS=.=.
`
`
`
`
`
`_
`
`address, unique acrossthe Internet,
`group of networks. Assigned bythe
`tor, the Host ID specifies a particular
`ina given network and need only be
`A Transport Layer, which corresps
`Layer. The Transmission Control Fi
`_ atthis layer. TCP provides end-tc
`_
`data source and destination with |
`fom, lost, duplicated, or corrupte
`the error control
`lacking in lowe!
`essage blacks from application
`segments, each with a sequence!
`der of the segment within the bl)
`examines the message segment
`sequence of segments is recelvel
`ment (AGK) to the source, conta n
`byte expected at the destination.
`_ An Application Layer