throbber

`
`
`
`Page 1
`
`tionary
`ELEN
`abit
`Telecommunications
`TEL
`ATKe
`
`|
`
`
`
`Facebook's Exhibit No. 1024
`
`Facebook's Exhibit No. 1024
`Page 1
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`copyright © 2000 Harry Newton
`Email: Harry Newton @ Technologyinvestor.com
`Personal web site: www.HarryNewton.com
`All
`rights reserved under international and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`
`
`|
`
`
`
`
`
`
`Telecom
`|
`
`:
`
`NEWTON'S TELECOM DICTIONARY
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN # 1-57820-053-9
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`For individual orders, and for information on specia! discounts for quantity orders,
`please contact:
`
`Telecom Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARY or 408-848-3854
`FAX: 408-848-5784
`
`Email: telecom@rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 947710
`
`Manufactured in the United States of America
`
`16th
`
`Facebook's Exhibit No. 1024
`Page 2
`
`Facebook's Exhibit No. 1024
`Page 2
`
`

`

`i,
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`coaein
`
`
`
`Peoccmmentyrmnrfiancee
`
`
`lnstabus1080 and Instabust480 Trademarks for
`Service Adjunct (ECSA), which allows the user to turn all the
`ECSA energy functions ON or OFF. {OFF is mostoften used for
`MICOM's direct host attachment products.
`
`lnstalink 1, An MCI International service that allows access
`periodic maintenance, or to adjust
`to sudden changes in
`
`weather.
`
`to a host computer in the U.S.A. from a Telex machine any-
`Institute for Telecommunications Sciences ITS is
`where overseas. This allows easier retrieval of
`information
`
`from a U.S. database.
`the research and engineering branch of
`the National
`
`Telecornmunications and Information Administration (NT/A),
`2. A trademark for MICOM's data-over-voice products.
`
`which is part of the U.S. Department of Commerce (DcC}.
`Installation The physical hook-up and diagnostic testing
`
`www.ntia.doc.gov See NTIA
`of a PBX switch, cabinet, or peripheral item prior to a culover
`
`Instruction Register The register which contains the
`and maintenance acceptance by the maintaining vendor.
`
`instruction to be executed and functions as the sourcefor the
`Installed Base How many of whateverare in and working.
`
`subsequent operations ofthe arithmetic unit.
`Installed base is offen confused. with annual shipments,
`
`Instructional Television Fixed Service (TFS. A ser-
`They're very different. Shipments is what goes out the factory.
`vice provided by one or morefixed microwave stations oper-
`Installed base is what's out there. The equation ts:Installed
`
`ated by an educational organization and used mainlyto trans-
`base at beginning of year plus annual shipments less equip-
`
`mit instructional, cultural and other educational information to
`ment
`taken out of service during the year is equal
`to the
`
`fixed receiving stations,
`installed base at the end ofthe year.
`
`Installer’s Tone Also called test tone. A small box that runs
`Insulated Wire Wire which has a nonconducting covering.
`
`insulating Materials Those substances which oppose
`on batteries and puts an RF tone on a pair of wires.If the techni-
`
`the passageof an electric current through them.
`cian can't find a pair of wires by color or binding post, they attach
`
`Insulation A material which does not conductelectricity but
`a tone at one end anduse an inductive amplifier (also called a
`
`is suitable for surrounding conductors to preventthe loss of
`banana or probe)at the otherend to find a beeping tone.
`current.
`
`Instance ID An ATM term. A subset of an object's attributes
`
`Insulation Displacement Connection IDC. The IDC
`which serve to uniquely identify a MIB instance.
`
`has replaced wire wrap and solder and screw post terminations
`Iustanet Trademark for MICOM's family of local data distri-
`
`as the way for connecting conductors(i.e. wires carrying tele-
`bution and data private automatic branch exchange (PABX)
`
`com)
`to jacks, patch panels
`and blocks.
`Insulation
`products.
`
`Displacement Connections are typically two sharp pieces of
`load
`|
`Instant Messaging I'm logged into the Internet,
`metal in a slight V. As the plastic-covered wire is pushed into
`some software,
`It shows me that you're also logged into the
`
`these metal teeth, the teeth pierce the plastic jacket (the insu-
`Internet. | ype you a message. You see it on your screen the
`
`lation) and make connection with the inside metal conductor.
`moment| hit “send.” You type your reply and sendit. | seeit.
`
`
`This saves the installer havingto strip off the conductor's insu-
`Bingo, a new Internet service that has come to be called
`
`lation. This savestime. Since IDCs are very small, they can be
`“inslant messaging.” Instant messaging is essentially real-
`
`placed very close together. This reduces the size of jacks,
`time, on-line electronic mail.
`instant Messaging staried with
`
`patch panels and blocks. IDCs are the best termination for high
`software called ICQ, then America Online introduced its huge-
`
`speed data cabling since a gas-tight, uniform connection is
`ly-popular variation (AOL Instant Messenger), then Microsoft
`
`made, The alternate method of connecting wires is with a
`introduced its software called MSN Messenger. As of writing,
`screw-down post. There are advantages and disadvantages to
`noneof these softwares is compatible with the other. But there
`
`both systems. The IDC system, obviously, is faster and uses
`was talk in the trace press of eventual standards. There are
`
`less space. Butit requires a special tool. The screw system
`serious reasons we need standards.
`Instant messaging is
`
`lakes more time, but may produce a longer-lasting and
`evolving into much more than a tool for sending typed mes-
`
`stronger, more thorough (more of the wire exposed)electrical
`sages to buddies online. Just as the original Web browsers
`
`connection. The most commonIDC wiring scheme is the 66-
`revolutionized the way average users connectto Internet con-
`
`block, invented by Western Electric, now Lucent. But there are
`tent, today's instant message screens are evolving into easy-
`
`other systems — from other telecom manufacturers. See
`to-use connectionsfor linking people at any given moment on
`
`PunchdownToo!.
`the Internet via text, voice and video, Al! the new capabilities
`
`Insulation Resistance Thal properly of an insulating
`will be built on a single critical assumption: knowing that a
`
`material which resists electrical currentflow through the insu-
`personis online, Thal, in turn, makesit possible for electron-
`
`lating material when a potential difference is applied.
`ic merchants and providers of online services to reach Internet
`
`Insulators Some atoms hold onto their electrons tightly.
`users with information or incentives — at the precise time they
`
`Since electrons cannot move {resly these material can't easily
`are able to react, namely when they are online in front of their
`
`conductelectricity and are know as non-conductors or insula-
`screen, an easy target. Tools ate being integrated into instant
`
`tors. Common insulators include glass, ceramic, plastics,
`messaging software that permit the immediate delivery of an
`
`paperandair. Insulators are also called dielectrics.
`increasing array of data that does not come from friends or
`
`INT Induction Neutralizing Transformer. A specially designed
`family. America Online has unveiled a version of its instant
`
`multipair longitudinal
`inductor that is spliced into a wireline
`messaging software that automatically delivers tailored news
`
`facility to substantially reduce low frequency steady-state or
`headlines and stock quotes.
`
`surge induced voltages and currents that may be causing
`Instant? On Buy a PC (Personal Gompuler). Turn it on.
`
`noise, equipment malfunctions and/or damages or creating a
`Bingo, it’s already loaded with Windows or OS/2. Instant On is
`
`personnel safety hazard. See TEN.
`a new term for preloading software onto hard disks of new
`
`INT14Asoftware interrupt designed to communicate with the
`corpulers and shipping those computers already pre-loaded
`
`with that software.
`com (serial) port
`in a PC. Communications programs use
`interrupt 14h to talk to a modem physically attached to anoth-
`Instantaneous Override Energy Function IOEF A
`er computer on the network.
`feature of the AT&T PBX Dimension Energy Communications
`
`
`
`
`
`
`
`
`
`
`
`
`
`Facebook's Exhibit No. 1024
`Page 3
`
`Facebook's Exhibit No. 1024
`Page 3
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`tent and the servers themselves. Intranet administrators are
`compresses information within a single frame. Compare to
`currently fascinated with analyzing Web server logs which
`Interirame Coding.
`contain data of some sort,
`including user connections and
`tntvaLATA Telecommunications services that originate and
`page activity,
`terminate in the sare Local Access and Transport Area. See
`According to a white paper released by Sun Microsystemsin
`also Local Access and Transport Area. This can be either
`the summer of 1996, the basic infrastructure for an intranet
`Interstate or Intrastate service, traffic orfacilities.
`consists of an internal TCP/IP network connecting servers
`Intramodal Distortion In an optical fiber, the distortion
`and desktops, which may or may not be connected to the
`resulting from dispersion of group velocity of a propagating
`Internet through a firewall. The intranet provides services to
`mode. It is the only form of multi modedistortion occurring
`desktops via standard open Internet protocols. In addition to
`in single-mode fibers.
`TCP/IP for basic network communication, these also include
`Intrenet A private network that uses Internet software and
`protocols for:
`Internet standards. In essence, an intranetis a private Internet
`HTTP
`Browsing
`reserved for use by people who have been given the authori-
`NFS
`File Service
`ty and passwords necessary to use that nelwark. Those peo-
`IMAP4/SMTP
`Mail Service
`ple ate typically employeesandoften customers of a compa-
`DNS/NIS+
`Naming Service
`ling
`ny. An Intranet mightusecircuits also used by the Internet or
`DNS/LDAP
`Directory Services
`it might not. Companies are increasingly using Intranets —
`nce
`Bootp/DHCP
`Booting Services
`internal Web servers — to give their employees easy access
`Network Administration©SNMP
`sig-
`to corporate information.
`vith
`Object Services
`HOP (CORBA)
`According to my friends at Strategic Networks Consulting,
`See also Extranet and Intranet.
`Boiled down to its simplest, an Intranet is: a private network
`Intvanodal Service Intranodal service is a feature of
`environment built around Internet technologies and standards
`some central office switches and smaller remote switches. it
`— predominantly the World Wide Web. The primary user
`meansthat it will continue to switch in which
`interface, called a Web browser, accesses Webservers locat-
`Intranode Communications path which originates and ter-
`ed locally, remotely or on the Internet. The Web server is the
`minates in the same node.
`heart of an Intranet, making selection of Web server software
`a crucial decision, even though muchfanfare has focused on
`lntvaoffice Call A call involving only one switching system.
`Interaoffice Trunk A telephone channel between two
`browsers (Netscape's Navigator vs. Microsoft's Explorer).
`At
`its core, a Web server handies two arcane languages
`pieces of equipment within the same central office.
`lutvaprenevr An entrepreneur who works inside a big
`(HTML and CGI) thatare the meat and potatoes of generating
`company, Hence,
`intra, as in inside. It's hard to imagine it
`Web pages dynamically, making connections and responding
`actually happening. But the word has became popular as a
`to user requests. But in the rush lo dominate the patenlially
`way for large companies to motivate their employees to lake
`lucrative Intranet market,
`these simple Web functions are
`personal careerrisks and introduce new products.
`being bundled into operating systems and vendors are now
`Intrastate Services, traffic or facilities that originate and
`touting pricey “Intranet suites” which encompass everything
`terminate within the same state. Therefore,
`if related to tele-
`from database and application
`interfaces, to e-mail and news-
`phone,falling under the jurisdiction of that state's telephone
`groups, to the kitchen sink.
`regulatory procedures.
`Most medium-or larger-sized companieswill need more than
`intrastructure A term coined by “Data Communications”
`just a handful of simple Web servers to deploy a reasonably
`and referring to the software, hardware, and Internet services
`robust Intranet. To help a company post currentjob openings,
`or make up-to-date product specs and available inventory
`underlying a corporate intranet.
`Intrinsi¢ Joi? Loss Thalloss in optical power transmis-
`accessible by traveling sales reps, an Intranet needsthe fol-
`sion, Intrinsic to the optical fiber, caused byfiber parameters,
`lowing capabilities:
`8.g., dimensions, profile parameter, modefield diameter, mis-
`® Database access. Getting at critical data housed in corpo-
`matches when two nonidentical fibers are joined.
`rate databases can be accomplished via generic, universal
`tical
`ODBC linking or based on “native” links directly to Sybase,
`lntrinsics Intrinsics are a component of many windows
`toolkits. The windowstoolkit intrinsics definition has been
`Oracleet al. allowing use of al! the database's features.
`f the
`\ver-
`developed by the MIT X Consortium. The intrinsics define the
`® Application hooks. Used by developers, a standard pro-
`lures
`function of specific graphical user
`interface and window
`gramming interface (API) allows outside applications like
`Lotus Notes to interact with Web data and vice versa.Inaddi-
`objects. They do not define any particular lookorfeel, just the
`houruar-
`function. Example: A pull down menu intrinsic would define
`tion, proprietary APIs exist — most notably Microsoft's ISAPI
`the
`the function of a pull down menu within a toolkit but not the
`(lor “Internet Server API") which lets developers link directly
`appearanceofit.
`\o Microsoft applications.
`fing
`Intrusive Test Breaking a circuit in ordertotestits func-
`® User publishing.
`In addition lo dialogues via chal/news-
`ions
`group/bulletin board features, users will want to post
`their
`tionality, Testing intrusively will drop service on the circuit.
`iding
`INTUGInternational Telecommunications Users Group.
`own
`content on Web servers without having
`to attain
`Webmasterstatus.
`Intumescent Firestep A firestopping material
`expands underthe influence ofheat.
`® Search vehicles. How does an engineerfind the current
`Inverse ARPA Sec Reverse DNS.
`specs on Project #686-2 among thousands of pages spread
`trans-
`Inverse Fourier Transform Inversion of Fourier
`across a bunch of Web servers? The answer: an indexing and
`form to convert frequency representation of signal to time rep-
`search engine that creates an internal Yahoo! for your own
`resentation.
`Web sites,
`inverse Multiplexer |-Mux. An inverse multiplexer per-
`® Admin/management. A catch-all for loadsof important, but
`forrns the inverse function of a multiplexer. “Multiplexer”
`Still
`ill-conceived features for managing access, users, con-
`
`
`
`
`
`
`
`
`
`ack
`
`its
`ice,
`
`‘ept
`the
`IDB
`relr
`
`ne).
`ISS-
`
`1 OF
`
`unk
`
`yher
`lime
`
`cate
`) as
`‘ols,
`j to
`\go-
`from
`
`tale.
`
`cell
`ame
`
`|lingcon-
`ding
`
`
`
`ange
`efers
`ents
`low
`ely.
`thal
`
`eeetttenenennenene499“
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that
`
`451
`
`Facebook's Exhibit No. 1024
`Page 4
`
`Facebook's Exhibit No. 1024
`Page 4
`
`

`

`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`LANs were invented as an afterthought — after PCs — and
`managers Use their own routines to load high, though they
`i¢ point in time a
`were originally designedto let cheap PCs share peripherals —
`3 computer telg:
`can sometimes borrow DOS commands.
`;
`like laser printers — which were too expensiveto dedicate to
`Loading PlanAtelephone company term. A Loading Plan
`tally be no more
`individual PCs, And as time went on, what LANs were usedfor
`isa systematic scheme for fully utilizing all existing capacity
`‘3 seconds 99%
`got broader and broader. Today, LANs have four main advan-
`in 2 given switching entity; Utilizing and coordinating the
`ised to illustrate
`tages: 1, Anyone on the LAN can use any of the peripheral
`capabilities and capacity limitations of various entities in a
`load. When the
`devices connected to the LAN. 2. Anyone on the LAN can
`multi-entity wire center and maintaining objective service lev-
`i than the aboyg._
`access databases and programs running on client servers
`els at all times. A Loading Planis the basis for achieving and
`icity. OF course:
`(super powerful PCs) attached to the LAN; and 3, Anyone on
`¥ Mimictheteal
`retaining good Load Balance.
`|
`the LAN can send messagesto and workjointly with others on
`LOC An ATM term.Loss of Cell Delineation: A condition at the
`5 largely mean:
`the LAN. 4. While a LAN does not use commoncarrlercircuits,
`receiver or a maintenance signal transmitted in the PHY over-
`one, president,
`it may have gateways and/orbridges to public telecommunica-
`head Indicating that the receiving equipment has lost cell
`juler telephony
`tions networks. Sea LAN Manager, Token Ring and Ethernet.
`delineation. Used to monitor the performance of the PHYlayer.
`o
`Local Area Signaling Services LASSis a group of cen-
`Local Pertaining to a sysiem or device that resides within
`tral office features provided now by virtually all central office
`subject device's switching domain.
`switch makers that uses existing customer lines to provide
`Local Access The connection between a customers premis
`some extra features to the end user (typically a business user).
`es and a point of presenceof the Exchange Carrier.
`They are based on delivery of calling party number via the locat
`Local Access and Transport Area LATA. The MFJ
`signaling network. LASS can be implemented on a standalone
`(Modified Final Judgement), which broke upthe Bell System
`single central office basis for intra office calls or on a multiple
`also defined 196 distinct geographicalareas known as LATAs.
`centraloffice grouping in a LATA (whatthe local phone compa-
`The LATA boundaries generally were drawn in consideration
`nies are allowed to serve) for interoffice calls. Local CCS7
`of SMSAs (Standard Metropolitan Statistical Areas), which
`(Common Channel Signaling Seven)is required forall config-
`were defined by the Census Bureau to identify “communities
`urations. The following features typically make up LASS:
`of interest” in economic terms. Generally speaking, the LATA
`Automatic Callback: Lets the customer automatically call the
`houndaries also were coterminous with state lines and exist-
`last incoming call directory number associated with the cus-
`ing area code boundaries, and generally included the territo-
`tomer’s phone when both phones become idle. This feature
`ry served by only a single RBOC. The basic purpose of the
`gives the customerthe ability to camp-onto a line.
`LATA concept wasto delineate the serving areas reserved for
`Automatic Recall: Lets the customer automatically call thelast
`LEC (Local Exchange Carrier) activity.
`In other words,
`outgoing call currently associated with the customer's station
`IntraLATAtraffic (i.e, local and local long distance) became
`when both stations become idle. This feature gives the cus-
`the sole right and responsibility of the LECs.InterLATA traffic,
`tomerthe ability to camp-on to a line.
`onthe other hand, becamethe sole right and responsibility of
`Customer-Originated Trace:Letsthe terminating parly request
`the XCs, Over time, a numberof state PUCs allowed the IXCs
`an automatic trace ofthe last call received. Thetrace includes
`to compete for IntraLATA long distance;
`they also allowed
`the calling line directory numberandtime and date of thecall.
`CAPs (Competitive Access Providers) to provided limited
`This information is transmitted via an AM IOP channel to a
`local
`service
`in
`competition with
`the LECs, The
`designated agency, such as the telephone company or law
`Telecommunications Act of 1996 (The Act) opened the flood-
`anforcement agency.
`gates for competition with the LATA boundaries. The Act also
`Individual Calling Line Identification: Consists of two distinct
`allows the RBOCs to provide InterLATA service outside the
`features:
`states in which they provide local service. Additionally, The
`1. Calling Number Delivery which transmits data on an
`Act contalns provisions for the RBOCsto offer InterLATA ser-
`incomingcall to the terminating phone. 1. Directory Number
`vice within the state in which they provide localservice, once
`Privacy which prevents deliveryof the directory numberto the
`they have satisfied a 14-point checklist, the mostsignificant
`terminating phone.
`conditions of which relate to significant, demonstrated levels
`Also, LASS has someselective features:
`of competition within their respective local exchange serving
`Selective Call Acceptance: Allows users to restrict. which
`areas. California is divided into 10 LATAs. Sparsely populat-
`incoming voice calls can terminate, based on the identity
`ed states such as South Dakota comprise only a single LATA.
`attribute of thecalling party, Only calls from parties identified
`Local Airtime Detail This cellular telephone carrier
`ona screening lists are allowedto terminate. Calls from parties
`option (which means it costs money) providesa line-item-
`not specified on a screening list are rerouted to an appropriate
`ized, detailed billing of all calls, including call attempts and
`announcementor forwarded to an alternate directory number.
`incomingcalls to the mobile. What you get for free is gener-
`Selective Call Forwarding: Allows a customer to pre-select
`ally a non-delailed, total summaryof all calls.
`whichcalls are forwarded based on the identity attribute of the
`Local Area And Transport Area See LATA.
`calling party.
`Local Area Duta Transport LADT. A service of your
`Selective Cail Rejection: Allows a customerto reject incoming
`local phone company which provides you, the user, with syn-
`voice calls from identityattributes which are on the customer's
`chronous data communications.
`rejection list. Cal! attempts from parties specified on the rejec-
`Local Area Network LAN, A short distance data commu-
`tion list are prevented from terminating to the customer and are
`nications network(typically within a building or campus) used
`routed to an announcement which informs the caller that
`to link computers and peripheral devices (suchas printers, CD-
`his/her call is not presently being accepted by thecalled party.
`ROMs, modems) under some form of standard control. Older
`Selective Distinctive Alert: Allows a customer to pre-select
`data communications networks used dumb terminals (devices
`which voice calls are to be provided distinctive alerting treat-
`with no computing power)to talk to distant computers. But the
`ment based on the identify attributes of the calling party.
`economics of computing changedwiththe inventionof the per-
`Users can, at their convenience, activate or modify any of
`sonal computer which had “intelligence” and which was cheap.
`
`
`
`‘ing is the tech:
`Irocessing nor-
`atworking, load
`Ten connecting
`nd Token Ring
`‘k) tink such ag
`as the need for
`each serving a
`
`he goal ofload
`xceadits busy
`nig conditions,
`ai steps until it
`the system is
`yondiis load?
`towis service
`aceful or must
`: system reset
`Inderstand the
`ost significant
`oadtesting. It
`ohony system
`e system will
`ins. See also
`
`loading coils
`Je distortion.
`
`ty of aphone
`i lines. What
`| loop circuit
`ding “tunes”
`500 Hz) and
`| bandwidth,
`+ removedif
`clusively on
`
`local foops
`tes for wire
`'s, Loading
`ces, as dis-
`se used for
`
`A group of
`:d similarly
`
`r loading a
`t) program
`Inder DOS,
`device dri-
`y memory
`
`501
`
`Facebook's Exhibit No. 1024
`Page 5
`
`Facebook's Exhibit No. 1024
`Page 5
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`
`
`do not have to rebootevery time you change cards. My expe-
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for commu-
`nications between a user application pragram and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuit-level ‘security technology developed by
`David Koblas in 4990 and since made publicly available by
`the IETF (Internet Engineering Task Force. SOCKSv5,the cur-
`rent version, provides security in a client/server environment,
`tunning at the Session Layer, Layer 5 of the OS! Reference
`Model. SOCKSv5 supports multiple meansof authentication,
`negotiated between client and server over a virtual circuit, and
`on a session-by-session basis. SOCKSv5 also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an independent message.
`SOCKSv5 also allows protocol
`filtering, which offers
`enhanced access control on a protocol-specific basis. For
`example, a network administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter command to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as WindowsNT. The cross-platform nature
`of SOCKSoffers portability to Macintosh and other operating
`systems and browsers. According to Network World
`Magazine, September 27, 1999,
`“the latest version of
`SOCKSv5 offers network managers an easier way to run
`videoconferencing and video and audio streaming through
`firewalls, which has been difficult and time-consuming.
`Socksv5 doesthis by providing a single and powerful method
`of authenticating users and managing security policies forall
`Internet applications, including multimedia.” SOCKSv5 also
`interoperates on top of IPv4,
`IPsec, PPTP, L2TP and other
`lower-level protocols.
`,
`SOFStart Of File
`Soft Copy 1. A copyofa file or program which resides on
`magnetic medium, such as a floppy disk, or any form that is
`not a hard copy — which |s paper.
`2. Old legacy systems term reapplied to distributed comput-
`ing in which reports are created on-screen from data residing
`within different applications.
`Soft Decision Sce SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans-
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft Font A font,usually provided by a font vendor, that
`must be instatled on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadablefont.
`Soft Handoff A cellular radio term. A soft handoff is a
`handoff between cell sites that involvesfirst making the con-
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or “break and
`make” handoff,
`is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft KeyThere are three types of keys ona telephone:hard,
`programmable and soit. HARD keys are those which do one
`thing and one thing only,e.g. the touchtone buttons1, 2, 3, *
`and # etc. PROGRAMMABLEkeys are those which you can
`program to do produce a bunch of tones. Those tones might
`be “dial mother.” They mightbe “transferthis call to my home
`
`Social ComputingA term that emerged in the summerof
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a “communica-
`tions-rich brew,” which is “expected to create new ways for
`ousinesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators.” According to
`Peter Lewis, “The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num-
`ber crunching and data base management to wider-ranging
`forms of business communications...Where client server
`broke away from mainframe-based systems and distributed
`computing powerto everyonein the organization, social com-
`puting goes the next step and extendsthe distribution of com-
`puting power to a company’s customers.”
`Social Contract An arrangement between the local tele-
`phone companyandits focal regulatory authority whereby the
`telephone company’s services are detariffed, but cannot be
`priced at less than cost. Quality of service standards apply.
`Social Engineering Gaining privileged information about
`a computer system (such as a password)by skillful lying —
`usually via a phone call. Often done by impersonating an
`authorized user.
`:
`Socket 1. A synonym for a port.
`2, A technology that serves as the endpoint when computer:
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PGMCIA Card and mapping the host's internal bus signals to
`the PCMCIAinterface signals.
`4. An operating system abstraction which provides the capa-
`bility for application programs to automatically access com-
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The SocketsInterface, introduced in the
`early 1980s with the release of Berkeley UNIX, wasthefirst
`consistent and well-defined application programming inter-
`face (API).
`It
`is used at
`the transport.
`layer between
`Transmission Control Protocol
`(TCP) or User Datagram
`Protocol (UDP) andthe applications on a system. Since 1980,
`sockets have been implemented onvirtually every platform.
`Socket Number [n TCP/IP. the socket numberis the join-
`ing of the sender's (or receiver's) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardwarethat provides a standardizedinterface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCMICIA slots of acomputer, desktop or faptop
`(but mosttypically a laptop). Ideally, socket services software
`Should be integrated into the notebook's BIOS, but few man-
`ufacturers have done so to date. For PCMCIA cards to oper-
`ate correctly you also need Card Services, which is (not are)
`a software managementinterface that allows the allocation of
`System resources (such as memory andinterrupts) automati-
`Cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCMCIA cards when you buy
`the cards. Youwill, however, have to load new drivers every
`time you changecards and allocate the correct memory exclu-
`Sions, You will have to rebootif you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`
`
`
`
`Facebook's Exhibit No. 1024
`Page 6
`
`Facebook's Exhibit No. 1024
`Page 6
`
`

`

`
`SESaSS
`
`c .
`
`K n
`
`
`
`
`
`
`A
`
`oeaa
`
`i a
`
`:
`¢ value of the subnet maskis deter,
`york (D bits of the IP addressto ong
`-pos. The result allows TCP/IP to de
`k IDs of the local workstation. Ha}
`address. For example:
`:
`en the IP address is 102.54.94.¢
`qd the subnet mask is 255.255,0.C
`e network ID is 102,54 (IP addre:
`pe host ID is 94.97(IP address anc
`ink
`0K. the above was Microsoft's def
`~qhich covers someareas Microsolt ;
`_
`yotocols developed by the Departrn}
`-
`gimilar computers across many kint
`-jgmeliable ones and ones connec
`“70P/IP is the protoco! used on the|
`-
`pe glue thal binds the Internet. Deve
`ys. Department of Defense's Ady
`gency (DARPA) as a military s
`ahe
`os
`ee of multi vendor connectivity
`10,
`commercial users as well, w
`Consequently, TCP/IP now is supr
`—
`ayers of minicomputers, personel
`/
`echnical workstations and data coi
`yo
`tis also the protocol commoni
`It,S
`LANs (as well as X.25) networks,
`averything from PC LANs to min
`TCP/IP currently divides networkir
`four layers:
`Tes
`ANetwork Interface Layerthat cor
`and Data Link Layers. This layer mat
`between a device and the networ
`qoutes data betweendevices onthe!
`An Internet Layer which correspo
`The Internet Protocol(IP) subse
`sit
`this layer. {P provides the addres
`:
`to forward packets across a multi
`cl
`EEE terms,
`it provides conne
`which meansit attempts to deliver
`provision for
`retransmitting lost
`leaves such error correction, if 1eq
`locols, such as TCP.
`P addresses are 32 bils in len
`att
`the
`letwork identifier (Net ID) and
`y.
`Assigned by a central authorit
`el,
`_ address, unique acrossthe Intern
`the
`| group of nelworks. Assigned by
`{or the Host ID specifies a particulat
`be
`+
`ina given network and needonly
`A Transport Layer, which correspy
`\f
`| Layer. The Transmission Contrc!
`F
`at this layer,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket