`
`
`
`Page 1
`
`tionary
`ELEN
`abit
`Telecommunications
`TEL
`ATKe
`
`|
`
`
`
`Facebook's Exhibit No. 1024
`
`Facebook's Exhibit No. 1024
`Page 1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`copyright © 2000 Harry Newton
`Email: Harry Newton @ Technologyinvestor.com
`Personal web site: www.HarryNewton.com
`All
`rights reserved under international and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`
`
`|
`
`
`
`
`
`
`Telecom
`|
`
`:
`
`NEWTON'S TELECOM DICTIONARY
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN # 1-57820-053-9
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`For individual orders, and for information on specia! discounts for quantity orders,
`please contact:
`
`Telecom Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARY or 408-848-3854
`FAX: 408-848-5784
`
`Email: telecom@rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 947710
`
`Manufactured in the United States of America
`
`16th
`
`Facebook's Exhibit No. 1024
`Page 2
`
`Facebook's Exhibit No. 1024
`Page 2
`
`
`
`i,
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`coaein
`
`
`
`Peoccmmentyrmnrfiancee
`
`
`lnstabus1080 and Instabust480 Trademarks for
`Service Adjunct (ECSA), which allows the user to turn all the
`ECSA energy functions ON or OFF. {OFF is mostoften used for
`MICOM's direct host attachment products.
`
`lnstalink 1, An MCI International service that allows access
`periodic maintenance, or to adjust
`to sudden changes in
`
`weather.
`
`to a host computer in the U.S.A. from a Telex machine any-
`Institute for Telecommunications Sciences ITS is
`where overseas. This allows easier retrieval of
`information
`
`from a U.S. database.
`the research and engineering branch of
`the National
`
`Telecornmunications and Information Administration (NT/A),
`2. A trademark for MICOM's data-over-voice products.
`
`which is part of the U.S. Department of Commerce (DcC}.
`Installation The physical hook-up and diagnostic testing
`
`www.ntia.doc.gov See NTIA
`of a PBX switch, cabinet, or peripheral item prior to a culover
`
`Instruction Register The register which contains the
`and maintenance acceptance by the maintaining vendor.
`
`instruction to be executed and functions as the sourcefor the
`Installed Base How many of whateverare in and working.
`
`subsequent operations ofthe arithmetic unit.
`Installed base is offen confused. with annual shipments,
`
`Instructional Television Fixed Service (TFS. A ser-
`They're very different. Shipments is what goes out the factory.
`vice provided by one or morefixed microwave stations oper-
`Installed base is what's out there. The equation ts:Installed
`
`ated by an educational organization and used mainlyto trans-
`base at beginning of year plus annual shipments less equip-
`
`mit instructional, cultural and other educational information to
`ment
`taken out of service during the year is equal
`to the
`
`fixed receiving stations,
`installed base at the end ofthe year.
`
`Installer’s Tone Also called test tone. A small box that runs
`Insulated Wire Wire which has a nonconducting covering.
`
`insulating Materials Those substances which oppose
`on batteries and puts an RF tone on a pair of wires.If the techni-
`
`the passageof an electric current through them.
`cian can't find a pair of wires by color or binding post, they attach
`
`Insulation A material which does not conductelectricity but
`a tone at one end anduse an inductive amplifier (also called a
`
`is suitable for surrounding conductors to preventthe loss of
`banana or probe)at the otherend to find a beeping tone.
`current.
`
`Instance ID An ATM term. A subset of an object's attributes
`
`Insulation Displacement Connection IDC. The IDC
`which serve to uniquely identify a MIB instance.
`
`has replaced wire wrap and solder and screw post terminations
`Iustanet Trademark for MICOM's family of local data distri-
`
`as the way for connecting conductors(i.e. wires carrying tele-
`bution and data private automatic branch exchange (PABX)
`
`com)
`to jacks, patch panels
`and blocks.
`Insulation
`products.
`
`Displacement Connections are typically two sharp pieces of
`load
`|
`Instant Messaging I'm logged into the Internet,
`metal in a slight V. As the plastic-covered wire is pushed into
`some software,
`It shows me that you're also logged into the
`
`these metal teeth, the teeth pierce the plastic jacket (the insu-
`Internet. | ype you a message. You see it on your screen the
`
`lation) and make connection with the inside metal conductor.
`moment| hit “send.” You type your reply and sendit. | seeit.
`
`
`This saves the installer havingto strip off the conductor's insu-
`Bingo, a new Internet service that has come to be called
`
`lation. This savestime. Since IDCs are very small, they can be
`“inslant messaging.” Instant messaging is essentially real-
`
`placed very close together. This reduces the size of jacks,
`time, on-line electronic mail.
`instant Messaging staried with
`
`patch panels and blocks. IDCs are the best termination for high
`software called ICQ, then America Online introduced its huge-
`
`speed data cabling since a gas-tight, uniform connection is
`ly-popular variation (AOL Instant Messenger), then Microsoft
`
`made, The alternate method of connecting wires is with a
`introduced its software called MSN Messenger. As of writing,
`screw-down post. There are advantages and disadvantages to
`noneof these softwares is compatible with the other. But there
`
`both systems. The IDC system, obviously, is faster and uses
`was talk in the trace press of eventual standards. There are
`
`less space. Butit requires a special tool. The screw system
`serious reasons we need standards.
`Instant messaging is
`
`lakes more time, but may produce a longer-lasting and
`evolving into much more than a tool for sending typed mes-
`
`stronger, more thorough (more of the wire exposed)electrical
`sages to buddies online. Just as the original Web browsers
`
`connection. The most commonIDC wiring scheme is the 66-
`revolutionized the way average users connectto Internet con-
`
`block, invented by Western Electric, now Lucent. But there are
`tent, today's instant message screens are evolving into easy-
`
`other systems — from other telecom manufacturers. See
`to-use connectionsfor linking people at any given moment on
`
`PunchdownToo!.
`the Internet via text, voice and video, Al! the new capabilities
`
`Insulation Resistance Thal properly of an insulating
`will be built on a single critical assumption: knowing that a
`
`material which resists electrical currentflow through the insu-
`personis online, Thal, in turn, makesit possible for electron-
`
`lating material when a potential difference is applied.
`ic merchants and providers of online services to reach Internet
`
`Insulators Some atoms hold onto their electrons tightly.
`users with information or incentives — at the precise time they
`
`Since electrons cannot move {resly these material can't easily
`are able to react, namely when they are online in front of their
`
`conductelectricity and are know as non-conductors or insula-
`screen, an easy target. Tools ate being integrated into instant
`
`tors. Common insulators include glass, ceramic, plastics,
`messaging software that permit the immediate delivery of an
`
`paperandair. Insulators are also called dielectrics.
`increasing array of data that does not come from friends or
`
`INT Induction Neutralizing Transformer. A specially designed
`family. America Online has unveiled a version of its instant
`
`multipair longitudinal
`inductor that is spliced into a wireline
`messaging software that automatically delivers tailored news
`
`facility to substantially reduce low frequency steady-state or
`headlines and stock quotes.
`
`surge induced voltages and currents that may be causing
`Instant? On Buy a PC (Personal Gompuler). Turn it on.
`
`noise, equipment malfunctions and/or damages or creating a
`Bingo, it’s already loaded with Windows or OS/2. Instant On is
`
`personnel safety hazard. See TEN.
`a new term for preloading software onto hard disks of new
`
`INT14Asoftware interrupt designed to communicate with the
`corpulers and shipping those computers already pre-loaded
`
`with that software.
`com (serial) port
`in a PC. Communications programs use
`interrupt 14h to talk to a modem physically attached to anoth-
`Instantaneous Override Energy Function IOEF A
`er computer on the network.
`feature of the AT&T PBX Dimension Energy Communications
`
`
`
`
`
`
`
`
`
`
`
`
`
`Facebook's Exhibit No. 1024
`Page 3
`
`Facebook's Exhibit No. 1024
`Page 3
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tent and the servers themselves. Intranet administrators are
`compresses information within a single frame. Compare to
`currently fascinated with analyzing Web server logs which
`Interirame Coding.
`contain data of some sort,
`including user connections and
`tntvaLATA Telecommunications services that originate and
`page activity,
`terminate in the sare Local Access and Transport Area. See
`According to a white paper released by Sun Microsystemsin
`also Local Access and Transport Area. This can be either
`the summer of 1996, the basic infrastructure for an intranet
`Interstate or Intrastate service, traffic orfacilities.
`consists of an internal TCP/IP network connecting servers
`Intramodal Distortion In an optical fiber, the distortion
`and desktops, which may or may not be connected to the
`resulting from dispersion of group velocity of a propagating
`Internet through a firewall. The intranet provides services to
`mode. It is the only form of multi modedistortion occurring
`desktops via standard open Internet protocols. In addition to
`in single-mode fibers.
`TCP/IP for basic network communication, these also include
`Intrenet A private network that uses Internet software and
`protocols for:
`Internet standards. In essence, an intranetis a private Internet
`HTTP
`Browsing
`reserved for use by people who have been given the authori-
`NFS
`File Service
`ty and passwords necessary to use that nelwark. Those peo-
`IMAP4/SMTP
`Mail Service
`ple ate typically employeesandoften customers of a compa-
`DNS/NIS+
`Naming Service
`ling
`ny. An Intranet mightusecircuits also used by the Internet or
`DNS/LDAP
`Directory Services
`it might not. Companies are increasingly using Intranets —
`nce
`Bootp/DHCP
`Booting Services
`internal Web servers — to give their employees easy access
`Network Administration©SNMP
`sig-
`to corporate information.
`vith
`Object Services
`HOP (CORBA)
`According to my friends at Strategic Networks Consulting,
`See also Extranet and Intranet.
`Boiled down to its simplest, an Intranet is: a private network
`Intvanodal Service Intranodal service is a feature of
`environment built around Internet technologies and standards
`some central office switches and smaller remote switches. it
`— predominantly the World Wide Web. The primary user
`meansthat it will continue to switch in which
`interface, called a Web browser, accesses Webservers locat-
`Intranode Communications path which originates and ter-
`ed locally, remotely or on the Internet. The Web server is the
`minates in the same node.
`heart of an Intranet, making selection of Web server software
`a crucial decision, even though muchfanfare has focused on
`lntvaoffice Call A call involving only one switching system.
`Interaoffice Trunk A telephone channel between two
`browsers (Netscape's Navigator vs. Microsoft's Explorer).
`At
`its core, a Web server handies two arcane languages
`pieces of equipment within the same central office.
`lutvaprenevr An entrepreneur who works inside a big
`(HTML and CGI) thatare the meat and potatoes of generating
`company, Hence,
`intra, as in inside. It's hard to imagine it
`Web pages dynamically, making connections and responding
`actually happening. But the word has became popular as a
`to user requests. But in the rush lo dominate the patenlially
`way for large companies to motivate their employees to lake
`lucrative Intranet market,
`these simple Web functions are
`personal careerrisks and introduce new products.
`being bundled into operating systems and vendors are now
`Intrastate Services, traffic or facilities that originate and
`touting pricey “Intranet suites” which encompass everything
`terminate within the same state. Therefore,
`if related to tele-
`from database and application
`interfaces, to e-mail and news-
`phone,falling under the jurisdiction of that state's telephone
`groups, to the kitchen sink.
`regulatory procedures.
`Most medium-or larger-sized companieswill need more than
`intrastructure A term coined by “Data Communications”
`just a handful of simple Web servers to deploy a reasonably
`and referring to the software, hardware, and Internet services
`robust Intranet. To help a company post currentjob openings,
`or make up-to-date product specs and available inventory
`underlying a corporate intranet.
`Intrinsi¢ Joi? Loss Thalloss in optical power transmis-
`accessible by traveling sales reps, an Intranet needsthe fol-
`sion, Intrinsic to the optical fiber, caused byfiber parameters,
`lowing capabilities:
`8.g., dimensions, profile parameter, modefield diameter, mis-
`® Database access. Getting at critical data housed in corpo-
`matches when two nonidentical fibers are joined.
`rate databases can be accomplished via generic, universal
`tical
`ODBC linking or based on “native” links directly to Sybase,
`lntrinsics Intrinsics are a component of many windows
`toolkits. The windowstoolkit intrinsics definition has been
`Oracleet al. allowing use of al! the database's features.
`f the
`\ver-
`developed by the MIT X Consortium. The intrinsics define the
`® Application hooks. Used by developers, a standard pro-
`lures
`function of specific graphical user
`interface and window
`gramming interface (API) allows outside applications like
`Lotus Notes to interact with Web data and vice versa.Inaddi-
`objects. They do not define any particular lookorfeel, just the
`houruar-
`function. Example: A pull down menu intrinsic would define
`tion, proprietary APIs exist — most notably Microsoft's ISAPI
`the
`the function of a pull down menu within a toolkit but not the
`(lor “Internet Server API") which lets developers link directly
`appearanceofit.
`\o Microsoft applications.
`fing
`Intrusive Test Breaking a circuit in ordertotestits func-
`® User publishing.
`In addition lo dialogues via chal/news-
`ions
`group/bulletin board features, users will want to post
`their
`tionality, Testing intrusively will drop service on the circuit.
`iding
`INTUGInternational Telecommunications Users Group.
`own
`content on Web servers without having
`to attain
`Webmasterstatus.
`Intumescent Firestep A firestopping material
`expands underthe influence ofheat.
`® Search vehicles. How does an engineerfind the current
`Inverse ARPA Sec Reverse DNS.
`specs on Project #686-2 among thousands of pages spread
`trans-
`Inverse Fourier Transform Inversion of Fourier
`across a bunch of Web servers? The answer: an indexing and
`form to convert frequency representation of signal to time rep-
`search engine that creates an internal Yahoo! for your own
`resentation.
`Web sites,
`inverse Multiplexer |-Mux. An inverse multiplexer per-
`® Admin/management. A catch-all for loadsof important, but
`forrns the inverse function of a multiplexer. “Multiplexer”
`Still
`ill-conceived features for managing access, users, con-
`
`
`
`
`
`
`
`
`
`ack
`
`its
`ice,
`
`‘ept
`the
`IDB
`relr
`
`ne).
`ISS-
`
`1 OF
`
`unk
`
`yher
`lime
`
`cate
`) as
`‘ols,
`j to
`\go-
`from
`
`tale.
`
`cell
`ame
`
`|lingcon-
`ding
`
`
`
`ange
`efers
`ents
`low
`ely.
`thal
`
`eeetttenenennenene499“
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that
`
`451
`
`Facebook's Exhibit No. 1024
`Page 4
`
`Facebook's Exhibit No. 1024
`Page 4
`
`
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`LANs were invented as an afterthought — after PCs — and
`managers Use their own routines to load high, though they
`i¢ point in time a
`were originally designedto let cheap PCs share peripherals —
`3 computer telg:
`can sometimes borrow DOS commands.
`;
`like laser printers — which were too expensiveto dedicate to
`Loading PlanAtelephone company term. A Loading Plan
`tally be no more
`individual PCs, And as time went on, what LANs were usedfor
`isa systematic scheme for fully utilizing all existing capacity
`‘3 seconds 99%
`got broader and broader. Today, LANs have four main advan-
`in 2 given switching entity; Utilizing and coordinating the
`ised to illustrate
`tages: 1, Anyone on the LAN can use any of the peripheral
`capabilities and capacity limitations of various entities in a
`load. When the
`devices connected to the LAN. 2. Anyone on the LAN can
`multi-entity wire center and maintaining objective service lev-
`i than the aboyg._
`access databases and programs running on client servers
`els at all times. A Loading Planis the basis for achieving and
`icity. OF course:
`(super powerful PCs) attached to the LAN; and 3, Anyone on
`¥ Mimictheteal
`retaining good Load Balance.
`|
`the LAN can send messagesto and workjointly with others on
`LOC An ATM term.Loss of Cell Delineation: A condition at the
`5 largely mean:
`the LAN. 4. While a LAN does not use commoncarrlercircuits,
`receiver or a maintenance signal transmitted in the PHY over-
`one, president,
`it may have gateways and/orbridges to public telecommunica-
`head Indicating that the receiving equipment has lost cell
`juler telephony
`tions networks. Sea LAN Manager, Token Ring and Ethernet.
`delineation. Used to monitor the performance of the PHYlayer.
`o
`Local Area Signaling Services LASSis a group of cen-
`Local Pertaining to a sysiem or device that resides within
`tral office features provided now by virtually all central office
`subject device's switching domain.
`switch makers that uses existing customer lines to provide
`Local Access The connection between a customers premis
`some extra features to the end user (typically a business user).
`es and a point of presenceof the Exchange Carrier.
`They are based on delivery of calling party number via the locat
`Local Access and Transport Area LATA. The MFJ
`signaling network. LASS can be implemented on a standalone
`(Modified Final Judgement), which broke upthe Bell System
`single central office basis for intra office calls or on a multiple
`also defined 196 distinct geographicalareas known as LATAs.
`centraloffice grouping in a LATA (whatthe local phone compa-
`The LATA boundaries generally were drawn in consideration
`nies are allowed to serve) for interoffice calls. Local CCS7
`of SMSAs (Standard Metropolitan Statistical Areas), which
`(Common Channel Signaling Seven)is required forall config-
`were defined by the Census Bureau to identify “communities
`urations. The following features typically make up LASS:
`of interest” in economic terms. Generally speaking, the LATA
`Automatic Callback: Lets the customer automatically call the
`houndaries also were coterminous with state lines and exist-
`last incoming call directory number associated with the cus-
`ing area code boundaries, and generally included the territo-
`tomer’s phone when both phones become idle. This feature
`ry served by only a single RBOC. The basic purpose of the
`gives the customerthe ability to camp-onto a line.
`LATA concept wasto delineate the serving areas reserved for
`Automatic Recall: Lets the customer automatically call thelast
`LEC (Local Exchange Carrier) activity.
`In other words,
`outgoing call currently associated with the customer's station
`IntraLATAtraffic (i.e, local and local long distance) became
`when both stations become idle. This feature gives the cus-
`the sole right and responsibility of the LECs.InterLATA traffic,
`tomerthe ability to camp-on to a line.
`onthe other hand, becamethe sole right and responsibility of
`Customer-Originated Trace:Letsthe terminating parly request
`the XCs, Over time, a numberof state PUCs allowed the IXCs
`an automatic trace ofthe last call received. Thetrace includes
`to compete for IntraLATA long distance;
`they also allowed
`the calling line directory numberandtime and date of thecall.
`CAPs (Competitive Access Providers) to provided limited
`This information is transmitted via an AM IOP channel to a
`local
`service
`in
`competition with
`the LECs, The
`designated agency, such as the telephone company or law
`Telecommunications Act of 1996 (The Act) opened the flood-
`anforcement agency.
`gates for competition with the LATA boundaries. The Act also
`Individual Calling Line Identification: Consists of two distinct
`allows the RBOCs to provide InterLATA service outside the
`features:
`states in which they provide local service. Additionally, The
`1. Calling Number Delivery which transmits data on an
`Act contalns provisions for the RBOCsto offer InterLATA ser-
`incomingcall to the terminating phone. 1. Directory Number
`vice within the state in which they provide localservice, once
`Privacy which prevents deliveryof the directory numberto the
`they have satisfied a 14-point checklist, the mostsignificant
`terminating phone.
`conditions of which relate to significant, demonstrated levels
`Also, LASS has someselective features:
`of competition within their respective local exchange serving
`Selective Call Acceptance: Allows users to restrict. which
`areas. California is divided into 10 LATAs. Sparsely populat-
`incoming voice calls can terminate, based on the identity
`ed states such as South Dakota comprise only a single LATA.
`attribute of thecalling party, Only calls from parties identified
`Local Airtime Detail This cellular telephone carrier
`ona screening lists are allowedto terminate. Calls from parties
`option (which means it costs money) providesa line-item-
`not specified on a screening list are rerouted to an appropriate
`ized, detailed billing of all calls, including call attempts and
`announcementor forwarded to an alternate directory number.
`incomingcalls to the mobile. What you get for free is gener-
`Selective Call Forwarding: Allows a customer to pre-select
`ally a non-delailed, total summaryof all calls.
`whichcalls are forwarded based on the identity attribute of the
`Local Area And Transport Area See LATA.
`calling party.
`Local Area Duta Transport LADT. A service of your
`Selective Cail Rejection: Allows a customerto reject incoming
`local phone company which provides you, the user, with syn-
`voice calls from identityattributes which are on the customer's
`chronous data communications.
`rejection list. Cal! attempts from parties specified on the rejec-
`Local Area Network LAN, A short distance data commu-
`tion list are prevented from terminating to the customer and are
`nications network(typically within a building or campus) used
`routed to an announcement which informs the caller that
`to link computers and peripheral devices (suchas printers, CD-
`his/her call is not presently being accepted by thecalled party.
`ROMs, modems) under some form of standard control. Older
`Selective Distinctive Alert: Allows a customer to pre-select
`data communications networks used dumb terminals (devices
`which voice calls are to be provided distinctive alerting treat-
`with no computing power)to talk to distant computers. But the
`ment based on the identify attributes of the calling party.
`economics of computing changedwiththe inventionof the per-
`Users can, at their convenience, activate or modify any of
`sonal computer which had “intelligence” and which was cheap.
`
`
`
`‘ing is the tech:
`Irocessing nor-
`atworking, load
`Ten connecting
`nd Token Ring
`‘k) tink such ag
`as the need for
`each serving a
`
`he goal ofload
`xceadits busy
`nig conditions,
`ai steps until it
`the system is
`yondiis load?
`towis service
`aceful or must
`: system reset
`Inderstand the
`ost significant
`oadtesting. It
`ohony system
`e system will
`ins. See also
`
`loading coils
`Je distortion.
`
`ty of aphone
`i lines. What
`| loop circuit
`ding “tunes”
`500 Hz) and
`| bandwidth,
`+ removedif
`clusively on
`
`local foops
`tes for wire
`'s, Loading
`ces, as dis-
`se used for
`
`A group of
`:d similarly
`
`r loading a
`t) program
`Inder DOS,
`device dri-
`y memory
`
`501
`
`Facebook's Exhibit No. 1024
`Page 5
`
`Facebook's Exhibit No. 1024
`Page 5
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`do not have to rebootevery time you change cards. My expe-
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for commu-
`nications between a user application pragram and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuit-level ‘security technology developed by
`David Koblas in 4990 and since made publicly available by
`the IETF (Internet Engineering Task Force. SOCKSv5,the cur-
`rent version, provides security in a client/server environment,
`tunning at the Session Layer, Layer 5 of the OS! Reference
`Model. SOCKSv5 supports multiple meansof authentication,
`negotiated between client and server over a virtual circuit, and
`on a session-by-session basis. SOCKSv5 also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an independent message.
`SOCKSv5 also allows protocol
`filtering, which offers
`enhanced access control on a protocol-specific basis. For
`example, a network administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter command to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as WindowsNT. The cross-platform nature
`of SOCKSoffers portability to Macintosh and other operating
`systems and browsers. According to Network World
`Magazine, September 27, 1999,
`“the latest version of
`SOCKSv5 offers network managers an easier way to run
`videoconferencing and video and audio streaming through
`firewalls, which has been difficult and time-consuming.
`Socksv5 doesthis by providing a single and powerful method
`of authenticating users and managing security policies forall
`Internet applications, including multimedia.” SOCKSv5 also
`interoperates on top of IPv4,
`IPsec, PPTP, L2TP and other
`lower-level protocols.
`,
`SOFStart Of File
`Soft Copy 1. A copyofa file or program which resides on
`magnetic medium, such as a floppy disk, or any form that is
`not a hard copy — which |s paper.
`2. Old legacy systems term reapplied to distributed comput-
`ing in which reports are created on-screen from data residing
`within different applications.
`Soft Decision Sce SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans-
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft Font A font,usually provided by a font vendor, that
`must be instatled on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadablefont.
`Soft Handoff A cellular radio term. A soft handoff is a
`handoff between cell sites that involvesfirst making the con-
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or “break and
`make” handoff,
`is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft KeyThere are three types of keys ona telephone:hard,
`programmable and soit. HARD keys are those which do one
`thing and one thing only,e.g. the touchtone buttons1, 2, 3, *
`and # etc. PROGRAMMABLEkeys are those which you can
`program to do produce a bunch of tones. Those tones might
`be “dial mother.” They mightbe “transferthis call to my home
`
`Social ComputingA term that emerged in the summerof
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a “communica-
`tions-rich brew,” which is “expected to create new ways for
`ousinesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators.” According to
`Peter Lewis, “The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num-
`ber crunching and data base management to wider-ranging
`forms of business communications...Where client server
`broke away from mainframe-based systems and distributed
`computing powerto everyonein the organization, social com-
`puting goes the next step and extendsthe distribution of com-
`puting power to a company’s customers.”
`Social Contract An arrangement between the local tele-
`phone companyandits focal regulatory authority whereby the
`telephone company’s services are detariffed, but cannot be
`priced at less than cost. Quality of service standards apply.
`Social Engineering Gaining privileged information about
`a computer system (such as a password)by skillful lying —
`usually via a phone call. Often done by impersonating an
`authorized user.
`:
`Socket 1. A synonym for a port.
`2, A technology that serves as the endpoint when computer:
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PGMCIA Card and mapping the host's internal bus signals to
`the PCMCIAinterface signals.
`4. An operating system abstraction which provides the capa-
`bility for application programs to automatically access com-
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The SocketsInterface, introduced in the
`early 1980s with the release of Berkeley UNIX, wasthefirst
`consistent and well-defined application programming inter-
`face (API).
`It
`is used at
`the transport.
`layer between
`Transmission Control Protocol
`(TCP) or User Datagram
`Protocol (UDP) andthe applications on a system. Since 1980,
`sockets have been implemented onvirtually every platform.
`Socket Number [n TCP/IP. the socket numberis the join-
`ing of the sender's (or receiver's) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardwarethat provides a standardizedinterface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCMICIA slots of acomputer, desktop or faptop
`(but mosttypically a laptop). Ideally, socket services software
`Should be integrated into the notebook's BIOS, but few man-
`ufacturers have done so to date. For PCMCIA cards to oper-
`ate correctly you also need Card Services, which is (not are)
`a software managementinterface that allows the allocation of
`System resources (such as memory andinterrupts) automati-
`Cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCMCIA cards when you buy
`the cards. Youwill, however, have to load new drivers every
`time you changecards and allocate the correct memory exclu-
`Sions, You will have to rebootif you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`
`
`
`
`Facebook's Exhibit No. 1024
`Page 6
`
`Facebook's Exhibit No. 1024
`Page 6
`
`
`
`
`SESaSS
`
`c .
`
`K n
`
`
`
`
`
`
`A
`
`oeaa
`
`i a
`
`:
`¢ value of the subnet maskis deter,
`york (D bits of the IP addressto ong
`-pos. The result allows TCP/IP to de
`k IDs of the local workstation. Ha}
`address. For example:
`:
`en the IP address is 102.54.94.¢
`qd the subnet mask is 255.255,0.C
`e network ID is 102,54 (IP addre:
`pe host ID is 94.97(IP address anc
`ink
`0K. the above was Microsoft's def
`~qhich covers someareas Microsolt ;
`_
`yotocols developed by the Departrn}
`-
`gimilar computers across many kint
`-jgmeliable ones and ones connec
`“70P/IP is the protoco! used on the|
`-
`pe glue thal binds the Internet. Deve
`ys. Department of Defense's Ady
`gency (DARPA) as a military s
`ahe
`os
`ee of multi vendor connectivity
`10,
`commercial users as well, w
`Consequently, TCP/IP now is supr
`—
`ayers of minicomputers, personel
`/
`echnical workstations and data coi
`yo
`tis also the protocol commoni
`It,S
`LANs (as well as X.25) networks,
`averything from PC LANs to min
`TCP/IP currently divides networkir
`four layers:
`Tes
`ANetwork Interface Layerthat cor
`and Data Link Layers. This layer mat
`between a device and the networ
`qoutes data betweendevices onthe!
`An Internet Layer which correspo
`The Internet Protocol(IP) subse
`sit
`this layer. {P provides the addres
`:
`to forward packets across a multi
`cl
`EEE terms,
`it provides conne
`which meansit attempts to deliver
`provision for
`retransmitting lost
`leaves such error correction, if 1eq
`locols, such as TCP.
`P addresses are 32 bils in len
`att
`the
`letwork identifier (Net ID) and
`y.
`Assigned by a central authorit
`el,
`_ address, unique acrossthe Intern
`the
`| group of nelworks. Assigned by
`{or the Host ID specifies a particulat
`be
`+
`ina given network and needonly
`A Transport Layer, which correspy
`\f
`| Layer. The Transmission Contrc!
`F
`at this layer,