`
`MOOSE ope
`
`EH Gga
`
`"anmm oT]SI
`
`CMPBooks Page 1 of 7
`
`The Authoritative Resource for
`Telecommunications, Networking,
`the Internet and Information Technology
`
`td 7
`EeEeata
`
`Samsung Exhibit 1033
`
`
`
`Page 1 of 7
`
`Samsung Exhibit 1033
`
`
`
`
`
`Page 2 of 7
`
`
`
`Page 2 of 7
`
`
`
`NEWTON’s
`TELECOM
`DICTIONARY
`
`
`
`Page 3 of 7
`
`
`
`N49
`R002
`b}
`Ory
`
`NEWTON's TELECOM DICTIONARY
`copyright © 2002 Harry Newton
`email: Harry@HarryNewton.com
`ersonal web site: www.HarryNewton.com
`Binecs web site; www.TechnologyInvestor.com
`All rights reserved underInternational and Pan-American Copyright conventions, including
`the right to reproduce this book or portions thereof in any form whatsoever,
`
`Published by CMP Books
`An imprint of CMP Media LLC.
`12 West 21 Street
`New York, NY 10010
`
`ISBN Number 1-57820-104-7
`
`February 2002
`
`Eighteenth Edition
`
`Forindividual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMPBooks
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 1-800-500-6875 or 408-848-3854
`Fax: 408-848-5784
`Web: www.cmpbooks.com
`Email: cmp@rushorder.com
`
`This bookis also sold through www.Amazon.com, www.Fatbrain.com and
`www.BarnesAndNoble.com
`
`Distributed to the book trade in the U.S. and Canada by Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 4 of 7
`
`
`
`Page 4 of 7
`
`
`
`LAWLN LU bles
`
`sane
`
`e (tr
`Fr-t-od
`
`Table of Contents
`
`HELP MAKETHIS DICTIONARY EVEN BETTER
`= Wecoffar- rend teWGtbccs cance emunmecenrn examen Ab SEG BRN ARN OR ERIE eae V
`
`119 BEST DOLLAR-SAVING TIPS
`- How To Save on Telecom, PC, Inteet and Airline Expenses and Best Investment Tips............2+20055 VII
`
`WHYIS IT SO HARD TO BUY?
`- The logic of call centers, customer cares, and buying on the Internet ......... 222. ..0eeese esse eeees XV
`
`WHERE'S THE TECHNOLOGY GOING?
`- Cheaper, faster and more reliable are obvious frends but there are other less obvious important ones also. .... XVII
`
`DISASTER RECOVERY PLANNING
`- How to Make Sure Your Computing and Telecommunications Still Run... 2.2.2... eee e eee XIX
`
`RULES FOLLOWEDIN THIS DICTIONARY
`- How to figure our ordering of terms and our spellings... 2... 0... e eee e cece eee eee teen ee XXI
`
`ABOUT THE AUTHOR
`- Harry Newton does have a life outside this dictionary ..... 2... .02- esse cece eee e eee eee eee eee XXV
`
`ABOUT THE CONTRIBUTING EDITOR
`- Ray Horak teaches, consults and lives in Paradise... 2.02... cece e ence eect eee eee XXVIl
`
`DICTIONARY
`Dictionary begins with Numbers then goes onto Letets .... 2.2... 0. cece cette eee ]
`
`APPENDIX
`- Industry Stondards Organizations and their contact information....... 2.6.02 ese eeeee renee eee 850
`[GRAN CONN CONGRco; ccayeiese perme saws veces wionarmann eaosmcemmeaemm comecnmeeen re 856
`- Stondard Plugs and Connectors... 0... eee eee eee e cet e ee eee eee e eet een e nent n ees 858
`
`Ml
`
`Page 5 of 7
`
`
`
`Page 5 of 7
`
`
`
`800 / 802.114
`
`tond commonterm for In-WATS (Wide Area Telecommunications Service) service a
`
`a centrolized computing platform. The database identifies the LEC or IXC nachage
`
`denotes either o supplementto a standard, or aFeaof o multiple-number stondard (e.g.,
`ond Zilog 7-80, were instolled in 8-bit computers such as the Apple Il, the MSAI 8080, ond
`the Commodore 64.
`802.1 & 802.3). The 802 stondards segmentthedata link layer into two sublayers:
`800 The first “oreo code” for what AT&T originally called In-WATS service. See 800
`1. A Media Access Control (MAC) layer that includes specific methods for gaining
`access to
`Service and 8NN.
`elLsThese methods— suchos Ethemet’srondom access methodandToken Ring's
`mtA‘giaLink Control
`(LLC) Layer, described in the 802.2 stondord, that provides for
`800 Portability 800Portability refers ¥thefact thatyecan takeyour 800 num-
`ing procedure — ore in the 802.3, 802.5 ond 802.6 standards.
`ber to“—distance comier. A case example, once | hod
`1-G00-LIBRARY. For many
`umberwas noviAT&T. When portability comealong, we were able to
`
`ities AT&TtoMCIondstillkeep 1-BOC-IBRARY, which is 800-542-7279. 800
`connection establishment, data tronsfer, and connection termination services. LLC specifies
`three types of communications links:
`* An Unacknowledged Connectionless Link, where the sending ond receiving devices do not
`Portability is provided by a series of complex databases the local phone companies, under
`set up a connection before transmitting. Instead, messages are sent on o “best effort”
`FCC mandate, have built. 800 Portability started on May 1, 1993. See 800 Service,
`basis, with no provision for error detection, ertor recovery, or message sequencing. This
`800 ServiceA toll call paid for by the called party, rother than the calling party. A gener-
`type oflink is bast suited for applications where the higher layer protocols con provide the
`0 phone company, whether a LEC (Local Exchange Corries) or on IXC (IntereXchange
`error comection ond functions, or where the loss of broadcast messages is not critical
`Corrier). in North America ond in order of their introduction, oll these In-WATS services have
`* A Connection-Mode Link, where a connection between message source ond destination
`is estoblished prior to transmission. This type of link works best in applications, such as file
`800 (1967), 888 (1996), 877 (1998), 866 (2000), or 855 (2001) os their “orea
`tronsfer, where large amounts of data are being transmitted ot one time.
`code.” (Note: Future 800 numbers wil follow the convention 8NN, where NN are specific
`* An Acknowledged Connectionless Link that, os its name indicates,
`provides for acknow!
`numbers which are identical. Such 800 service is typically used by merchants offering to sell
`t of messages without burdening the receiving devices with maintaining o con
`something such as hotel reservations, clothes, or rental cars. The ideo of the free servica is fo
`nection, For this reason,it is most often used for opplications where a central processor
`entice customers to call the number, with the theory being that if the call was o toll call and
`communicates with o large
`number of devices with limited processing capobilities.
`therefore cost the customer something,
`he or she might be less inclined to coll. Suppliers of
`802,1 IEEE standard for overall architecture of LANs ond intemetworking. See all the
`800services use various ways fo
`configure and bill their 800 services.
`800 Service works like this: You're somewhere in North America, You dial 1-800,1-888,
`following definitions.
`1-877, 1-866 ot 1-855 andseven digits. The LEC (Local Exchange Cartier, i.e., the local
`802.1 Ve 802.110 is actually on updoted, bigger, better, foster version of 802.1 1b
`phone company) central office seesthe“1” and recognizes the call as long distance. It
`(clso called WiFi), which is now commonly installed
`in offices, airports, coffee shops, etc.
`also recognizes the SNN oreo code ond queries a centralized dotobase before processing
`Many laptops now come with 802.11b built-in. The newer 802.1 Io, also on IEEE ston-
`dord for wireless LANs, supports speads up to 54 Mbps. 802.110 runs in o 300-MAH7zallo-
`the call further, with the query generally taking ploce over 0 SS7 (Signaling System 7)
`cation in the 5 GHz range, which wos allocated by the FCC in support of UNII (the
`link. The centralized database resides an a Service Management System (SMS), which is
`Unlicensed National Information Infrastructure). Specifically, 200 MHz is allocated at 5.15-
`5.35 MHz for in-building applications, and 100 MHz at 5.725-5.825 MHzfor outdoor use.
`This allocated spectrum is divided into three working domains. At 5.15-5.25 Miz, moxi-
`mum power output is restricted to SOmW (milliWatts), 5.25-5.35 to 250mW, ond 5.725-
`5.825 to | Wott. 802.110 hos been dubbed Wi-FiS (Wireless Fidelity 5 MHz) by the
`Wireless Ethernet Compatibility Alionce (WECA).
`
`Corrier) providing the BNN number. Based on that information, and assumingthat the
`free number is associated with an IXC, the LEC switch routes the call to the proper IXC.
`Once the IXC has been handed the call, it processes the 800 number, perhaps translating
`it into a “real” icsp numberin order to route itcorrectly, Alternatively, the IXC trans:
`lates the 800 number
`into an intemal, nonstandard 10-digit number for further routing to
`802.110 uses Coded Orthogonal Frequency Division Multiplexing pealos theartya
`the terminating Central Office (CO) and trunk or trunk group.
`As a reoHlife example, the publisherofthis book has on 800 number, 8O0-LIBRARY (or
`modulotion technique. COFDM sends a stream of dota symbols in o massively parallel
`ion, with multiple subcarriers (i.e., small slices of RF, or Radio Spectrum, within the desig-
`800-542-7279). When you call that number, MCI routes that number fo the first available
`noted cater frequency band. Each conier channel is 20 Miz wide, ond is subdividedinfo
`chonnel on the dedicated T-1 circuit which leased from MCI’s, and connecting the MCI New
`York City POP (Point Of Presence) to the CMP New York City
`office.
`52 subcorier channels, each of which is approximately 300 KHz wide; 48 of the subcor
`rier channels ore used 4 data transmission, and the remaining four for error control.
`Because 800 long distance service is essentially a database lookup ondtranslation service
`Through the opplication of a codingtechnique, eachsymbol comprises multi oebits.
`for incoming phonecalls, - are aruieetet you con= con
`
`permonentinstructions intothecompany to routing pattems on time
`
`The specified coding techniques and , all of which mustbesupporteddeta rates
`
`
`by802.pretirarincludeBPSK(BinaryPhaseShiftKeying)ot125baa
`doy, day of week, number colled, number calling. Some longdistance companies allow you
`channel for a tofal of 6 Mbps across all 48 dato channels, QPSK (Quodictve Phase Shift
`to change your routing instructions from one minute to another. For example, you might
`have two call centers into which 800 phonecalls ore nya When onegets busy, you
`Keying) at for 250 Kbps per channel for a total of 12 Mbps, and 16QAM (1éevel
`may tell your long distonce company to route all the 800 inbound phone calls to the call
`Quodroture Amplitude Modulation) at 500 Kbps per channel for a total of 24 Mbps. The
`center, which isn't busy. See Eight Hundred Service and One Number Calling for more,
`stondard also allows more complex modulation schemes, thot offer increased data rates.
`Currently, the most complex ond fastest is 640AM (64-level QAM), at 1.125 Mbps per
`especially all the features you con now get on 800 service.
`inMayof1993theFCCmandotedthatoll 800(andbyextensionall BNN) numbersbecome
`channel for a total of 54 Mbps,
`“portable.” Thot means that customers can take their 800 telephone number from one long
`The symbol rate is slowed down enough that each symbol transmission is longer thon the
`dene compony 10 another, and still keep the some 800,See also 800 Portability.
`delay spread. The delay spread is the variation in timing between receipt of the signals
`800 Services ore known internationally as “Freefone Services.” In other countries the dia
`ate ers oe pectFr fence
`
`Multipathfadingisthephenomenon the RF signalscomryingdapeste
`ing scheme may vary, with examples being 0-800 and 0-500. Such services also go under
`arive ot the receiveratslightlydifferenttimes. This isbecmeefoethe si
`SealeouFan
`the name “Greenfone.” In lune 1996, the ITU-T approved the £.169 standard Universal
`the transmitter, with certain portions ofthe signal reaching the scatmore or less directs
`International Freefone Number (UIFN) numbers, also known os “Global 800." UIFN will
`ly, while otherportions of the poreewuoff of walls, furniture, your co-work-
`work across national boundaries, based on o standard numbering scheme of 800, 888 or
`imposedonitthroughthecoding eSdiAsthemultiplesymbolsreach
`877 plus on 8-digit telephone number. See also UIFN ond Vonity Numbers.
`er’s pointy head, and such, Now, eo
`contains multiple bits, which ore
`802 See 802 Standards.
`802 Standards The 802 Stondords ore o set of standards for LAN (Local Area
`the receiver, they are sorted out ond decoded, with the decoding process providing some
`Network) and MAN (Mettopoliton Area Network} data communications developed through
`additional fime for the receiver to adjust for the delay spread ond to get ready to receive
`the next symbol. Both 802.1 To and 802.1 1b are designed to be compatible with Ethernet
`the IEEE’s Project 802. The two most important standards ore 802.116 ond 802.110. The
`LANs, using the MAC (Media Access Control)
`technique of CSMA/CA (Cormier Sense
`stondards also include an overview of recommended networking architectures, opproved in
`Multiple Access with Collision Avoidance),
`1990. The 802 stondards follow o unique numbering convention. A number followed by a
`copital letfer denotes a standalone standard; a number followed by o lower cose letter
`If this sounds great, that’s becouse it is great. If this sounds too good to be true, that’s
`
`Page 6 of 7
`
`
`
`Page 6 of 7
`
`
`
`802.11b / 802,19
`
`because it gets a little more complicated, While the 5 GHz spectrum is pretty cleor in the
`US,it’s notso readily available elsewhere. Military and government installations use por
`tions of this bond overseas.
`In Japan, only the 5.15-5.25 MHz spectrum is available,
`In
`Europe, the 5.725-5.825MHz spectrum is already allocated for other uses. In Europe, ETSI
`(European Telecommunications Standards Institute) requires that two additional protocols
`be used in conjunction with 802.110 in order to protect incumbent applications and sys-
`tems running over previously ollocated shared spectrum. DFS (Dynamic Frequency
`Selection) allows the 802.110 system to dynamically shift frequency channels and TPC
`(Transmission Power Control) reduces the power level. In combination, these protocols
`seve to eliminate interference issues with incumbent signals. See also 802.11b,
`802.11g, BPSK, CSMA/CA, MAC, OFDM, QAM, QPSK, WECA and WiFi.
`802.1 1b 802.11b is now the most common wireless local area network, 802.11b
`(also called WiFi) is now commonly installed in offices, airports, coffee shops, etc. Many
`loptops now come with 802.11b builtin. 802.11b hos heen dubbed Wii (Wireless
`Fidelity) by the Wireless Ethemet Compatibility Alliance (WECA). 802.11b defines both the
`Physical
`(PHY) ond Medium Access Control (MAC) protocols, Specifically,
`the PHY spec
`includes three tronsmission options — one Ir (Infrared), and two RF (Rodio Frequency).
`802.11b uses DSSS (Direct Sequence Spread Spectrum) modulation.for digital communi:
`cation. DSSS involves the transmission of a stteam of one’s and zero’s, which is modulat-
`ed with the Barker code chipping sequence. Barker code is on 11-bit sequence (e.g.,
`10110111000) that has advantages in wireless transmission. Each bit is encoded into on
`11-bit Barker code, with each resulting data object forming o “chip.” The chip is put on 0
`cartier frequency in the 2.4 GHz range (2.4-2.483 GHz), ond the waveform is modulated
`using one of several techniques. 802.11 systems running at 1 Mbps make use of BPSK
`(Binary Phase Shift Keying). Systems running at 2 Mbps make use of QPSK (Quaternary
`Phase Shift Keying). Systems running at 11 Mbps make use of CCK (Complementary Code
`Keying), which involves 64 unique code sequences, which technique supports six bits per
`code word. The CCK code word is then modulated onto the RF carrier using QPSK, which
`allaws another two bits to be encoded for each é-bit symbol. Therefore, each 6-bit sym-
`bol contains eight bits. Power output is limited by the FCC to 1 watt EIRP (Equivalent
`Isotropicolly Radiated Power). At this low power level, the physical distance between the
`transmitting devices becomes an issue, with error performance suffering as the distonce
`increases. Therefore, the devices adapt fo longer distances by using
`a less complex encod
`ing technique, and a resulting lower signaling speed, which translates into
`lower data
`rate. For example, a system running at 11 Mbps using CCK and QPSK, might throttle back
`to 5.5 Mbps by halving the signaling rate as the distances increase and error performance
`drops. As the situation gets worse, it might throttle back to 2 Mbps using only QPSK, and
`1 Mbps using BPSK. also to be considered in this equation is the foct that ihe 2.4 GHz
`range is in the unlicensed ISM\ (Industrial, Scientific and Medical) bond, which is shared by
`garage door openers, microwave ovens, bar code scanners, cordless phones, Bluetootn
`LANs, ond a wide voriety of other devices. As a result, this slice of spectrum can be heavi
`ly congested ot times, and performance can drop considerably. 802.11 divides the avai
`able spectrum into 14 chonnels. In the US, the FCC allows the use of 11 channels. Four
`channels are available in France, 13 in the rest of Europe, and only one in Japan. There
`also is overlap hetween adjacent channels (e.g., channels one and two), which fact further
`affects performance; thrloe, any given system must mointain maximum channel sepo-
`ration from other systems in proximity.
`Both 802.110 and 802.1 1h are designed to be compatible with Ethernet LANs. 802.1 1b uses
`a variation of the MAC (Media Access Contol) technique of CSMA/CA (Carrier Sense Multiale
`Access with Collision Avoidance), which és used in some wired Ethemets, as well. A device seek-
`ing to transmit over the shared medium (in this case, a shored RF channel) listens to the net-
`work. If it senses no activity over the canier frequency for a minimum period of time known
`as the DIFS (DCF (Distibuted Coordinated Function) InterFrame Spacing), it requests access
`by fist transmitting a RTS (Request To Send) packet. The RIS packet includes both the source
`(i.e., transmitter) ond destination (ie., intended receiver) addresses, the duration ofthe intend
`ed session (ie., transmission), and the ACK (ACKnowledgement) associated with it, If the net
`work is available, the destination device responds with CTS (Clear To Send), repeating both the
`duration ond the ACK. All other devices back off the network unfil the session is concluded. If
`the network, on the other hand,is busy, the device waits
`period of time equal to the DIFS,
`olus 0 random number of slot fimes, os calculated with saveral back-off timers. The “listening”
`process takes several forms. CAM (Constant Access Method), the default method, involves corr
`stant monitoring of the network, Since CAM creotes c power consumption issue for battery:
`powered devices, PAM (Polled Access Mode) con be substituted. PAM calls for all clent devices
`
`fo go into sleep mode, all awoking at regular intervals, at the exact sammetime, to listen for
`network octivity. On Ianuary 3, 2000 the 802.11 technologygf another boost when
`Microsoft and Starbucks announced that they were to join forces to
`offer wireless access, using
`802.11b among other standards, in most of Storbucks’ coffee outlets overthe next two years.
`The deal, some analysts say, is a further sign that 802.1 1b could become a serious competi
`for to better known wireless technologies such as Bluetooth, HomeRF, or even next-generation
`cellulor networks. Apple was the first to lounch on 802.116 product line (called AirPort). All
`Apple computers now include a builtin antenna which, in conjunction with a networking card,
`can exchange data with a small bose station plugged into a broadband Internet connection up
`to 45 metros (150 feet) away. Although some PC laptops now come pre-equipped with wire-
`less hardware, most users buy a PCMCIA card, or PC card, that serves as o wireless modem
`ond antenna. See also 802.110, 802.1 1g, Bluetooth, BPSK, Chip, CSMA/CA, DSSS, EIRP,
`Ethernet, HomeRF, MAC, QPSK, Spread Spectum, WECA and WiFi.
`802.12 Siondord for JOOVGAnylAN. Addresses 100 Mbps demandpriority access
`method physiccblayer and repeater specifications. Approved in 1995.
`802.15 A developing IEEE stondord for Wireless Personal Area Networks (WPANs), the
`802.15 Working Group (WG)comprises four Task Groups
`(TGs). T61is deriving
`a WPAN
`stondard bosed on the Bluetooth specifications. 162 is
`developing recommended
`practices
`to focilitate the coexistence of 802,15 WPANand 802.11 WLANs (Wireless Local Area
`Networks). 1G3 is chartered to draft a new standard for high-rate WPANs running at 20
`Mbps or better. Development is focusing on the 2.4 GHz band, using OQPSK (Orthogonal
`Quaternary Phase Shift Keying) as the modulation technique. 164 is chorged with investi-
`gating o low data rate WPAN solution running at no more then 200 Kbps in support of appli
`cations such as wireless interactive toys, sensors, outomation, and smart tags and badges.
`802.16 A developing IEEE standard for broadbond wireless access. The 802.16
`Working Group (WG) is working on a voriety of fixed wireless standards intended fo serve
`high-speed applications.
`$02. 1B Stondard for LAN/WAN management, approved in 1992; along with 802.1k,
`became the basis of ISO/IEC 15802-2.
`802.1D IEEE standard for interconnecting LANs through MAC bridges (specifically
`between 802.3, 802.4, and 802.5 networks). The stondord wos approved in 1990, ond
`was incorporated into [S0/IEC 10038. Works ot the MAC level.
`802. TE IEEE stondard for LAN and MAN load protocols. Approved in 1990, formed the
`basis for ISO/IEC 15802-4.
`802.1F Standard for defining network management information specified in 802
`umbrella stondards. Approved in 1993.
`80:2..1G A developing stondord for remote bridging at the MAC layer.
`802.1H IEEE practices recommended for bridging Ethernet LANs at the MAC layer.
`Approved in 1995.
`$02. TE IEEE stundard for using FDD! (Fiber Distributed Data Interface) as a MAClayer
`bridge. Approved in 1992, the standard wos incorporated into ISO/IEC 10038.
`02.14 IEEE stondord for LAN connectivity using MAClayer bridges. A supplement to
`802.10, it was approvedin 1996.
`802.1K IEEE standard for the discovery and dynamic control of network management
`information. Approved in 1993.
`In conjunction with 802.18, was the bosis for ISO/IEC
`15802-2.
`802. 1M A conformance statement for 802.1, it addresses definitions and protocols for
`system load monagement. Approved in 1993, it was incorporated into ISO/IEC 15802-4.
`80:2. 1P IEEE extension of 802.10. Specification for the use of MAC-oyer bridgesin filter
`ing end expediting multicast frffic. Priortization of traffic is occomplished through
`the addé
`tion of a $-bit, priority voluein the frame header. Eight topologyindependent priority volves
`(0-7) ore specified, with all eight values mappingdirectly into 802.4 and 802.6. Switches
`that support 802.1P ond 802.10 provide a framework for bandwidth prioritization.
`Essentially what all these wards meanis thot you con assign a priority to the type of traf
`fic with IEEE 802.1p class-ofservice (CoS) values and these allow network devices along
`the way to recognize and deliver high-priority troffic ino predictable manner. When con-
`ingas QoS drops low-pricrity traffic to allow delivery of highpriority traffic. See
`also
`802.10.
`$02.10 IEEE specification for implementation of VLANs in Layer 2 LAN switches, with
`emphasis on Ethernet. Similar to 802.1P, prioritization of traffic is accomplished through
`on additional four bytes of data in the frome header. Most data fields in this addition to
`the header are specific to VLAN operation. Also included is a field which provides the same
`3-bit priority flag specified in 802.1P’s prioritymapping scheme,
`in addition to conven-
`
`18
`
`Page 7 of 7
`
`
`
`Page 7 of 7
`
`