throbber

`
`
`
`e Offic
`
`131 Die
`
`tionary ‘
`Telecommunications
`
`
`
`e
`
`tworking and
`
`w
`
`
`
`Facebooks Exhi
`
`it No. 1024
`
`Page 1
`
`Facebook's Exhibit No. 1024
`Page 1
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`copyright © 2000 Harry Newton
`Email: Harry Newton @Technologylnvestor.com
`Personal web site: www.HarryNewton.com
`
`All
`
`rights reserved under international and Pan-American Copyright conventions,
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN # 1-57820-053-9
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`Telecom Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: BOO—LIBRARY or 408~848-3854
`FAX: 408-848-5784
`
`Email: telecom@rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`
`
`l
`
`16m 3]
`
`S
`
`l
`
`1
`
`
`
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`
`
`
`Facebook's Exhibit No. 1024
`
`Page 2
`
`Facebook's Exhibit No. 1024
`Page 2
`
`

`

`are
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`lnstuhuleBO and lnstabusl480 Trademarks for
`MICOM‘s direct host attachment products.
`Instalink 1. An MCI International service that allows access
`to a host computer in the USA. from a Telex machine any—
`where overseas. This allows easier retrieval of
`information
`from a US. database.
`2. A trademark for MlCOM’s data—over—voice products.
`Installation The physical hook~up and diagnostic testing
`of a PBX switch, cabinet, or peripheral item prior to a cutover
`and maintenance acceptance by the maintaining vendor.
`Installed Base How many of whatever are in and working.
`installed base is often confused. with annual shipments.
`They’re very different. Shipments is what goes out the factory.
`Installed base is what's out there. The equation is: Installed
`base at beginning of year plus annual shipments less equip—
`ment
`taken out of service during the year is equal
`to the
`installed base at the end of the year,
`Installer's Tone Also called test tone. A small box that runs
`on batteries and puts an RF tone on a pair ofwires. if the techni-
`cian can’t find a pair of wires by color or binding post, they attach
`a tone at one end and use an inductive amplifier (also called a
`banana or probe) at the other end to find a beeping tone.
`Instance ID An ATM term. A subset of an object's attributes
`which serve to uniquely identify a MIB ins ance.
`Instunet Trademark for MICOM’s family of local data distri-
`button and data private automatic branct exchange (PABX)
`products.
`load
`I
`Instant Messaging I'm logged Into the lnternet.
`some sofware.
`It shows me that you‘re a so logged into the
`Internet. I type you a message, You see it on your screen the
`moment I hit “send." You type your reply and send it.
`I see it.
`Bingo, a new Internet service that has come to be caled
`“instant messaging.” instant messaging 's essentially real—
`time, on— the electronic mail.
`instant Messaging started with
`software called ICQ, then America Online introduced its huge—
`ly-popular variation (AOL Instant Messenger), then Microsoft
`introduced its soitware called MSN Messeiger. As of writ ng,
`none at tiese softwares is compatible with the other. But item
`was talk in the trade press of eventual standards. There are
`serious reasons we need standards.
`Ins ant messaging is
`evolving ‘nto much more than a tool for sending typed rres—
`sages to buddies online, Just as the original Web browsers
`revolutionized the way average users connect to Internet con-
`tent, today‘s Instant message screens are evolving into easy-
`to—use connections for linking people at any given momen on
`the Internet via text, voice and video. All the new capabilities
`will be built on a single critical assumption: knowing that a
`person is online. That, in turn, makes it possible for electron—
`ic merchants and providers of online services to reach Inte net
`users with intormation or incentives —at the precise time they
`are able to react, namely when they are online in front of their
`screen, an easy target. Tools are being integrated into ins ant
`messaging software that permit the immediate delivery 0 an
`increasing array of data that does not come from Iriends or
`family. America Online has unveiled a version of its Instant
`messaging software that automatically delivers tailored news
`headlines and stock quotes.
`Instant On Buy a PC (Personal Computer). Turn it on.
`Bingo, it's already loaded with Windows or 08/2. instant On is
`a new term for preloading soitware onto hard disks of new
`computers and shipping those computers already pro—loaded
`with that soitware.
`Instantaneous Override Energy Function iOEF. A
`feature of the AT&T PBX Dimension Energy Communications
`
`
`
`
`
`
`
`
`
`ka;
`
`
`
`
`Service Adjunct (ECSA), which allows the user to turn all the
`ECSA energy functions ON or OFF. IOEF is most often used for
`periodic maintenance, or to adjust
`to sudden changes in
`weather.
`Institute for Telecommunications Sciences ITS is
`the research and engineering branch of
`the National
`Telecommunications and Information Administration (NTIA),
`which is part of the US. Department of Commerce (000).
`www.ntia.doc.gov See NTIA
`Instruction Register The register which contains the
`Instruction to be executed and functions as the source tor the
`subsequent operations of the arithmetic unit.
`Instructional Television Fixed Service ITFS. A ser—
`vice provided by one or more tixed microwave stations oper—
`ated by an educational organization and used mainly to trans—
`mit instructional, cultural and other educational information to
`fixed receiving stations,
`Insulated Wire Wire which has a nonconducting covering.
`Insulating Materials Those substances which oppose
`the passage of an electric current through them.
`Insulation A material which does not conduct electricity but
`is suitable for surrounding conductors to prevent the loss of
`current.
`Insulation Displacement Connection IDC. The lDC
`has replaced wire wrap and solder and screw post terminations
`as the way for connecting conductors (i.e. wires carrying tele—
`com)
`to jacks, patch panels
`and blocks.
`Insulation
`Displacement Connections are typically two sharp pieces of
`metal in a slight V. As the plastic—covered wi e is pushed Into
`these metal teeth, the teeth pierce the plastic 'acket (the insu—
`tattoo) and make connection with the inside metal conductor.
`
`This saves the installer having to strip off the conductors insu-
`lation. This saves time. Since IDCs are very s
`all. they can be
`placed very close together. This reduces the size of jacks,
`patch panels and blocks. IDCs are the best ter
`ination for high
`speed data cabling since a gas—tight, uniform connection is
`made. The alternate method of connecting wires is with a
`screwvdown post. There are advantages and d'sadvantages to
`both system. The lDC system, obviously, is faster and uses
`less space. But it requires a special tool. Tie screw system
`takes more time, but may produce a longer-lasting and
`stronger, more thorough (more of the wire exposed) electrical
`connectior. The most common lDC wiring scheme is the 66
`block, invented by Western Electric, now Lucent. But there are
`other systems — from other telecom manufacturers. See
`Punchdown Tool.
`Insulation Resistance That property of an insulating
`material Witch resists electrical current flow through the insu—
`lating material wher a potential difference is applied.
`Insulators Some atoms hold onto their electrons tightly.
`Since elec ions can of move Ireety these material can’t easily
`conduct electricity and are know as non-conductors or insula—
`tors. Common insulators include glass, ceramic, plastics,
`paper and air. Insulators are also called dielectrics.
`III'I' Induc ion Neut alizing Transformer. A specially designed
`multipair longitudinal
`inductor that is spliced into a wireiine
`facility to substantially reduce low frequency steady~state or
`surge induced voltages and currents that may be causing
`noise, equipment rratfunctions and/or damages or creating a
`personnel safety hazard. See TEN.
`III" 4 A software interrupt designed to communicate with the
`com (serial) port
`ii a PC. Communications programs use
`interrupt 14h to talk to a modem physically attached to anoth-
`er computer on the tetwork.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Facebook's Exhibit No. 1024
`
`Page 3
`
`Facebook's Exhibit No. 1024
`Page 3
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`compresses information within a single frame. Compare to
`Interframe Coding.
`IntruIATA Telecommunications services that originate and
`term'aate in the same Local Access and Transport Area. See
`also Local Access and Transport Area. This can be either
`Interstate or Intrastate service, traffic or facilities.
`lntrumodnl Distortion In an optical fiber, the distortion
`rasu t'ng rom dispersion of group velocity of a propagating
`mode. It is the only form of multi mode distortion occurring
`in single—mode fibers.
`Intranet A private network that uses Internet software and
`lnterret standards. In essence, an Intranet is a private Internet
`reserved or use by people who have been given the authori—
`ty ard passwords necessary to use that network. Those peo—
`ple are typically employees and often customers of a compa—
`ny Ar Int anet might use circuits also used by the Internet or
`if mght rot Companies are increasingly using Intranets —
`Inte rat Web servers —— to give lheiIr employees easy access
`to co porate information.
`Acco ding to my friends at Strategic Networks Consulting,
`Boi ed down to its simplest, an Intranet is: a private network
`env'ronment built around Internet technologies and standards
`~ predo ninanlly the World Wire Web. The primary user
`inte face, called a Web browser, accesses Web servers Iocat»
`ed ocally. remotely or on the Internet. The Web server is the
`bee t of ai Intranet, making selection of Web server software
`a metal decision, even though mIch fanfare has focused on
`A
`browsers Netscape‘s Navigator vs, Microsoft‘s Explorer).
`At
`'ts co e, a Web server hand es two arcane languages
`(HT Lard CGI) that are the meat and potatoes of generating
`Web pages dynamically, making connections and responding
`to user requests ButIn the rush o dominate the potentially
`lucrative Intranet market
`these simple Web functions are
`being burdled into operating systems and vendors are now
`touting pr‘cey “Intranet suites” witch encompass everything
`from database and applicalio inte faces, to e-matl and news—
`groups, to the kitchen sink,
`Most med'um— or larger-sized corrpanles will need more than
`just a handful of simple Web servers to deploy a reasonably
`robust Intranet. To help a comoany post current job openings,
`or make Lp—to-date product specs and available ‘nventory
`accessible by traveling sales reps, an Intranet needs the fol»
`lowing capabili les:
`0 Database access. Getting a critical data housed 'n corpo—
`rate databases can be accorrpiished via generic, In‘versal
`ODBC linking or based on “rative” links directly to Sybase,
`Oracle et at. allowing use of all the databases features.
`- Application nooks. Used by developers a stancard pro-
`grar ming this face (API) al ows outside applicators like
`Lotus Notes to ' nteract with Web data and vice versa |
`addi—
`tion, proprietary APIs exist — most notably Microsoft’s ISAPI
`(for "Internet Server API”) wh‘ch lets developers lin directly
`to Microsoft applications.
`' Lser publisl ing.
`In addition to dialogues via oral/news—
`group/bulletIn board features users will want to pos tIIeir
`ow
`content on Web servers without having
`0 attain
`Webmaster strm
`0 Search vehicles. How does an engineer find the chrent
`specs on Project #686—2 among thousands of pages spread
`across a bunch of Web servers? The answer: an indexirg and
`sea ch engine hat creates an internal Yahoot for your own
`We) sites.
`' Admin/management. A catchall for loads of important, but
`Stil i||conceived features for managing access users, con~
`
`
`
`
`
`
`
`
`
`ack
`
`it’s
`ice,
`
`:ept
`the
`IDB
`Ieir
`
`ne).
`ISS-
`
`I or
`
`ting
`nce
`sig-
`with
`g. a
`
`unk
`
`iher
`
`iime
`
`hate
`I as
`Lots,
`3 to
`Igo—
`Irom
`
`tale,
`
`cell
`ame
`
`jling
`con—
`ding
`
`‘rfcal
`I the
`Iver-
`titres
`hour
`uar—
`the
`,ffing
`ions
`
`.ding
`
`pnge
`fers
`”an"
`ents
`flow
`ely
`that
`
`.Aw,__m..4...‘me,,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`HTTP
`NFS
`IMAP4/SMTP
`DNS/NIS+
`DNS/LDAP
`BooIp/DHCP
`SNMP
`IIOP (CORBA)
`
`tent and the servers themselves. Intranet administrators are
`currently fascinated with analyzing Web server logs which
`contain data of some sort,
`including user connections and
`page activity.
`According to a white paper released by Sun Microsystems in
`the summer of 1996, the basic infrastructure for an intranet
`consists of an internal TCP/IP network connecting servers
`and desktops. which may or may not be connected to the
`Internet through a firewall, The intranet provides services to
`desktops via standard open Internet protocols, In addition to
`TCP/IP for basic network communication, these also Include
`protocols for:
`Browsing
`File Service
`Mail Service
`Naming Service
`Directory Services
`Booting Services
`Network Administration
`Object Services
`See also Extranet and Intranet.
`Intranodal Service Intranodal service Is a feature of
`some central office switches and smaller remote switches. It
`means that it will continue to switch in which
`Intranode Communications path which originates and ter—
`minates in the same node.
`lntruotfire Call A call involving only one switching system.
`lntruoflise Trunk A telephone channel between two
`pieces of equipment within the same central office.
`lntrnpreneur An entrepreneur who works Inside a big
`company. Hence,
`intra, as in inside.
`It’s hard to imagine it
`actually happening. But the word has became polear as a
`way for large companies to motivate their employees to take
`personal career risks and introduce new products.
`Intrastate Services,
`traffic or facilities that orig‘nate and
`terminate within the same state. Therefore,
`it related to tele-
`phone, falling under the jurisdiction of that state’s telephone
`regulatory procedures.
`Intrustrudure A term coined by “Data Commurications”
`and referring to the software, hardware, and Internet services
`underlying a corporate Intranet.
`Intrinsic Joint loss That loss in optical power transmis—
`sIon, Intrinsic to the optical fiber, caused by fiber pa ameters,
`e.g., dimensions, profile parameter, mode field diameter, mis—
`matches when two non identical fibers are joined.
`II‘III‘inSIts Intrinsics are a component of many windows
`toolkits The windows toolkit
`intrinsics detinitIon Ias been
`developed by the MIT X Consortium. The Intrinsics (1fine the
`function of specific graphical user
`interface and wndow
`objects They do not define any particular look or fee, just the
`function. Example: A pull down menu intrinsic would define
`the function of a pull down menu within a toolkit but rot the
`appearance of it.
`Intrusive Test Breaking a circuit In order to test its func—
`tionality. Testing intrusively will drop service on the circuit.
`INTlIG international Telecommunications Users Group.
`Intumestent Tirestop A firestopping materia
`expands under the influence of heat.
`Inverse ARPA See Reverse DNS.
`rans—
`Inverse Fourier Transform Inversion of Fourier
`form to convert lrequency representation of signal to time rep
`resentation.
`Inverse Multiplexer I—Mux. An Inverse multiplexer per—
`forms the inverse tunction of a multiplexer. ”Multip exer”
`
`
`
`that
`
`
`
`451
`
`Facebook's Exhibit No. 1024
`
`Page 4
`
`Facebook's Exhibit No. 1024
`Page 4
`
`

`

`
`
`re point in limea i
`a computer tale.
`rally be no more
`:3 seconds 99% _
`feed to illustrate ‘
`load. When the
`rlhan the abet/e _
`forty. Of course,
`-
`v mimic the real
`5 largely mean.
`one, president,
`)uter telephony
`
`‘ing is the tech-
`rrocessing ll0r-
`elworking, load
`ren connecting
`nd Token Ring
`it) link such as
`as the need for
`each serving a
`
`he goal of load
`lxceed its busy
`ng conditions.
`at steps until it
`the system is
`ryond its load?
`low is service
`aceful or must
`i system reset
`inderstand the
`pet significant
`ead testing. it
`ohony system
`re system will
`iflS. See also
`
`loading coils
`to distortion.
`
`ly of a phone
`i lines. What
`i loop circuit
`ding “tunes"
`500 Hz) and
`l bandwidth.
`r removed it
`:Iusively on
`
`local loops
`tes for wire
`is. Loading
`ces, as dis—
`so used for
`
`A group of
`rd similarly
`
`r loading a
`t) program ,
`lnder DOS,
`device dri—
`y memory
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`managers use their own routines to load high, though they
`can sometimes borrow DOS commands.
`,
`loading Plan A telephone company term. A Loading Plan
`is a systematic scheme ior fully utrlrzrng all exrsting capacrty
`in a given switching entity; Utilizing and coordrnairngthe
`capabilities and capac’ty limitations of various entities in a
`motif-entity wire center and maintaining objective service lev-
`ate at all times. A Load'ng Plan is the basis for achieving and
`retaining good Load Balance.
`‘
`.
`too An ATM term. Loss of Cell Delineation: A condition at he
`receiver or a maintenarce signal transmitted in the PHY over-
`head indicating that the receiving equipment has lost cell
`delineation. Used to monitor the performance of the PHY layer.
`Local Pertaining to a system or device that resides withir a
`subject device‘s switch'ng domain.
`local Access The connection between a customer's prem‘s—
`es and a point of presence of the Exchange Carrier.
`local Access and Transport Area LATA. The MFJ
`(Modified Final Judgement), which broke up the Belt Systen,
`also defined 196 distinct geographical areas known as LATAs.
`The LATA boundaries generally were drawn in consideration
`of SMSAs (Standard
`etropotitan Statistical Areas), which
`were defined by the Census Bureau to identify “communit'es
`of interest" in econom‘c terms. Generally speaking, the LATA
`boundaries also were coterminous with state lines and exist—
`ing area code boundaries, and generally included the terri or
`ry served by only a s'ngle RBOC. The basic purpose of the
`LATA concept was to delineate the serving areas reserved for
`LEC (Local Exchange Carrier) activity.
`in other words,
`intraLATA traffic (l.e.,
`local and local long distance) beca ne
`the sole right and responsibility of the LECs. InterLATA traffic,
`on the other hand, became the sole right and responsibility of
`the IXCs. Over time, a number of state PUCs allowed the IXCs
`to compete for lntraLATA long distance;
`they also allowed
`CAPs (Competitive Access Providers) to provided limited
`local
`service
`in
`competition with
`the LECs. The
`Telecommunications Act of 1996 (The Act) opened the flood-
`gates for competition with the LATA boundaries. The Act also
`atlovrs the HBDCs to provide InterLATA service outside the
`states in which they provide local service. Additionally, The
`Act contains provisions for the RBOCs to offer InterLATA ser—
`vice within the state in which they provide local service, once
`they have satisfied a 14-point checklist. the most significant
`conditions of which relate to significant, demonstrated levels
`of competition within their respective local exchange serving
`areas. California is divided into 10 LATAs. Sparsely populat-
`ed states such as South Dakota comprise only a single LATA.
`lacal Airtime Detail This cellular telephone carrier
`option (which means it costs money) provides a line—item—
`ized, detailed billing of all cells, including call attempts and
`incoming calls to the mobile. What you get for free is gener-
`ally a non—detailed, total summary of all calls.
`local Area And Transport Area See LATA.
`local Area Data Transport LADT, A service of your
`local phone company which provides‘you, the user, with syn-
`chronous data communications.
`local Area Network LAN. A short distance data commu—
`nications network (typically within a building or campus) used
`to link computers and peripheral devices (such as printers, CD—
`RDMs, modems) under some form of standard control, Older
`data communications networks used dumb terminals (devices
`with no computing power) to talk to distant computers. But the
`economics of computing changed with the invention of the per—
`sonal computer which had “intelligence” and which was cheap.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`LANs were invented as an afterthought — after PCs — and
`were originally designed to let cheap PCs share peripherals —
`like laser printers — which were too expensive to dedicate to
`individual PCs. And as time went on. what LANs were used for
`got broader and broader. Today, LANs have four main advan-
`tages: i. Anyone on the LAN can use any of the peripheral
`devices connected to the LAN. 2. Anyone on the LAN can
`access databases and programs running on client servers
`(super powerful PCs) attached to the LAN; and 3. Anyone on
`the LAN can send messages to and work jointly with others on
`the LAN. 4. While a LAN does not use common carrier circuits,
`it may have gateways and/or bridges to public telecommunicav
`lions networks. See LAN Manager, Token Ring and Ethernet.
`local Area Signaling Services LASS is a group of cen—
`tral office features provided now by virtually all central office
`switch makers that uses existing customer lines to provide
`some extra features to the end user (typically a business user),
`They are based on delivery of calling party number via the local
`slgnalirg network. LASS can be implemented on a standalone
`single central office basis for intra office calls or on a multiple
`central office grouping in a LATA (what the local phone compa—
`nies are allowed to serve) for interoffice calls. Local C087
`(Comr on Channel Signaling Seven) is required for all config-
`urations. The following features typically make up LASS:
`Automatic Callback: Lets the customer automatically call the
`last incoming call directory number associated with the cus—
`tomer’s phone when both phones become idle. This feature
`gives its customer the ability to campcn to a line.
`Automatic Recall: Lets the customer automatically call the last
`outgoing call currently associated with the customer's station
`when botlr stations become idle. This feature gives the cus-
`tomer he ability to camp—on to a line.
`Customer—Originated Trace: Lets the terminating party request
`an automatic trace of the last call received. The trace includes
`the cal ing line directory number and time and date of the call.
`This information is transmitted via an AM IOP channel to a
`designated agency, such as the telephone company or law
`enforcement agency.
`individual Calling Line Identification: Consists of two distinct
`features:
`1. Calling Number Delivery which transmits data on an
`incoming call to the terminating phone. 1. Directory Number
`Privacy which prevents delivery of the directory number to the
`terminating phone.
`Also, LASS has some selective features:
`Selective Call Acceptance: Allows users to restrict which
`incoming voice calls can terminate, based on the identity
`attribute of the calling party. Only calls from parties identified
`on a screening lists are allowed to terminate. Calls from parties
`not specified on a screening list are rerouted to an appropriate
`announcement or forwarded to an alternate directory number.
`Selective Call Forwarding: Allows a customer to pre—setect
`which calls are forwarded based on the identity attribute of the
`calling party.
`Selective Call Rejection: Allows a customer to reject incoming
`voice calls from identity attributes which are on the customer‘s
`rejection list. Call attempts from parties specified on the rejec—
`tion list are prevented from terminating to the customer and are
`routed to an announcement which informs the caller that
`his/her call is not presently being accepted by the called party.
`Selective Distinctive Alert: Allows a customer to preeselect
`which voice calls are to be provided distinctive alerting treat—
`ment based on the identity attributes of the calling party.
`Users can, at their convenience, activate or modify any of
`
`501
`
`Facebook's Exhibit No. 1024
`
`Page 5
`
`Facebook's Exhibit No. 1024
`Page 5
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`
`
`do not have to reboot every time you change cards. My expe—
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for commu—
`nications between a user application program and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuifelevel security technology developed by
`David Koblas in 1990 and since made publicly available by
`the IETF (Internet Engineering Task Force. SOCKSvS, the cur-
`rent version, provides security in a client/server environment,
`running at the Session Layer, Layer 5 of the OSI Reference
`Model. SOCKSv5 supports multiple means of authentication,
`negotiated between client and server over a virtual circuit, and
`on a session—by—session basis. SOCKSVS also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an independent message.
`SOCKSVS also allows protoco
`filtering, which offers
`enhanced access control on a protocol—specific basis. For
`example, a retwork administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter corrmand to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as Windows NT. The cross-platform nature
`of SOCKS of ers portability to Mac‘ntosh and other operating
`systems and browsers. Accorcing to Network World
`Magazine, September 27, 1999,
`“the latest version of
`SOCKSVS ofers network managers an easier way to run
`videoconfere cing and video and audio streaming through
`firewalls, wtich has been difficJIt and time-consuming.
`Socksv5 does this by providing a single and powerful method
`of authentica ing users and manag'ng security policies for all
`Internet appl'cations, including mJItimedia.” SOCKSv5 also
`interoperates on top of IPv4,
`lPsec, PPTP, L2TP and other
`lower-level p otocols.
`’
`30! Start Of File
`Soft Copy 1. A copy of a file or program which resides on
`magnetic medium, such as a floppy disk, or any form that is
`not a hard copy ~ which is paper.
`2. Old legacy systems term reapplied to distributed comput-
`ing in which reports are created on—screen from data residing
`within different applications.
`Soft Decision See SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans-
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft font A font,usually provided by a font vendor, that
`must be installed on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadable font.
`Soft llancloff A cellular radio term. A soft handoff is a
`handoff between cell sites that involves first making the con-
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or “break and
`make” handoff,
`is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft Key There are three types of keys on atelephone: hard,
`programmable and soft. HARD keys are those which do one
`thing and one thing only, e.g. the touchtone buttons 1, 2, 3, *
`and # etc. PROGRAMMABLE keys are those which you can
`program to do produce a bunch of tones. Those tones might
`be “dial mother." They might be “transfer this call to my home
`
`
`
`Social Computing A term that emerged in the summer of
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a “communica-
`tions-rich brew," which is “expected to create new ways for
`businesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators." According to
`Peter Lewis. “The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num-
`ber crunching and data base management to wider—ranging
`forms of business communications...Where client server
`broke away from mainframe-based systems and distributed
`computing power to everyone in the organization, social com—
`puting goes the next step and extends the distribution of com—
`puting power to a company‘s customers."
`Social Contract An arrangement between the local tele-
`phone company and its local regulatory authority whereby the
`telephone company’s services are detariffed, but cannot be
`priced at less than cost. Quality of service standards apply.
`Social Engineering Gaining privileged information about
`a computer system (such as a password) by skillful lying —
`usually via a phone call. Often done by impersonating an
`authorized user.
`\
`Socket 1. A synonym for a port.
`2, A technology that serves as the endpoint when computer
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PCMCIA Card and mapping the host's internal bus signals to
`the PCMCIA interface signals.
`4. An operating system abstraction which provides the capa-
`bility for application programs to automatically access com-
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The Socketslnterface, introduced in the
`early 19803 with the release of Berkeley UNIX, was the first
`consistent and well—defined application programming inter-
`face (API).
`It
`is used at
`the transport
`layer between
`Transmission Control Protocol
`(TCP) or User Datagram
`Protocol (UDP) and the applications on a system. Since 1980,
`sockets have been implemented on virtually every platform.
`Socket Number In TCP/IP, the socket number is the join-
`ing of the sender's (or receiver’s) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardware that provides a standardized interface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCMCIA slots of a computer, desktop or laptop
`(but most typically a laptop). Ideally, socket services software
`should be integrated into the notebooks BIOS, but few man-
`ufacturers have done so to date. For PCMCIA cards to oper—
`ate correctly you also need Card Services, which is (not are)
`a software management interface that allows the allocation of
`system resources (such as memory and interrupts) automati-
`cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCMCIA cards when you buy
`the cards. You will, however, have to load new drivers every
`time you change cards and allocate the correct memory exclu-
`srons, You will have to reboot if you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`
`
`Facebook's Exhibit No. 1024
`
`Page 6
`
`Facebook's Exhibit No. 1024
`Page 6
`
`

`

`NEWTON’S TELECOM DICTIOhARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`' Dealing with the various vendors and providers, including
`verifying and paying the bills.
`0 Preparing and managing the Telecommunications budget.
`0 Keeping abreast of changes in technology, services, indus-
`try structure, and rates.
`0 Assisting company management In developing a corporate
`telecommunications policy that meets business objectives
`0 Developing and implementing company telephone and
`telecommunications procedures for efficient and cost effective
`use, and training company employees in these procedures
`- Upgrading, procurement, selecting, contracting, or pure
`chasing a system, new system, equipment, or services.
`- Planning and analyzing for growth, new requirements, or
`future functionality.
`The goal of the CM is to provide good telecommunications
`services tor an organization and its employees at the lowest
`possible cost. This definition courtesy, Robert J. Perillo,
`PerilIo@dockmaster.ncsc.mil.
`'I'CN Collective
`umber Group Table.
`TCNS Thomas Conrad Networking System is a 100 million
`bit per second p oprietary networking system (LAN) based on
`ARCnet that car use most standard AFICnet drivers on any
`network operatir g systems
`'I'CO Total Cost of Ownership. A term coined by The Gartner
`Group to br'ng attention to the actt,ual tottal cost to the enter—
`prise of owning a PC. The most tigrreIn 1997 was $29,353
`for owning a staIdard, networked, Windows 95 PC for a per—
`od of three yea s. Gartner cites the costtot a NetPC (T

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket