`
`
`
`e Offic
`
`131 Die
`
`tionary ‘
`Telecommunications
`
`
`
`e
`
`tworking and
`
`w
`
`
`
`Facebooks Exhi
`
`it No. 1024
`
`Page 1
`
`Facebook's Exhibit No. 1024
`Page 1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`copyright © 2000 Harry Newton
`Email: Harry Newton @Technologylnvestor.com
`Personal web site: www.HarryNewton.com
`
`All
`
`rights reserved under international and Pan-American Copyright conventions,
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN # 1-57820-053-9
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`Telecom Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: BOO—LIBRARY or 408~848-3854
`FAX: 408-848-5784
`
`Email: telecom@rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`
`
`l
`
`16m 3]
`
`S
`
`l
`
`1
`
`
`
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`
`
`
`Facebook's Exhibit No. 1024
`
`Page 2
`
`Facebook's Exhibit No. 1024
`Page 2
`
`
`
`are
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`lnstuhuleBO and lnstabusl480 Trademarks for
`MICOM‘s direct host attachment products.
`Instalink 1. An MCI International service that allows access
`to a host computer in the USA. from a Telex machine any—
`where overseas. This allows easier retrieval of
`information
`from a US. database.
`2. A trademark for MlCOM’s data—over—voice products.
`Installation The physical hook~up and diagnostic testing
`of a PBX switch, cabinet, or peripheral item prior to a cutover
`and maintenance acceptance by the maintaining vendor.
`Installed Base How many of whatever are in and working.
`installed base is often confused. with annual shipments.
`They’re very different. Shipments is what goes out the factory.
`Installed base is what's out there. The equation is: Installed
`base at beginning of year plus annual shipments less equip—
`ment
`taken out of service during the year is equal
`to the
`installed base at the end of the year,
`Installer's Tone Also called test tone. A small box that runs
`on batteries and puts an RF tone on a pair ofwires. if the techni-
`cian can’t find a pair of wires by color or binding post, they attach
`a tone at one end and use an inductive amplifier (also called a
`banana or probe) at the other end to find a beeping tone.
`Instance ID An ATM term. A subset of an object's attributes
`which serve to uniquely identify a MIB ins ance.
`Instunet Trademark for MICOM’s family of local data distri-
`button and data private automatic branct exchange (PABX)
`products.
`load
`I
`Instant Messaging I'm logged Into the lnternet.
`some sofware.
`It shows me that you‘re a so logged into the
`Internet. I type you a message, You see it on your screen the
`moment I hit “send." You type your reply and send it.
`I see it.
`Bingo, a new Internet service that has come to be caled
`“instant messaging.” instant messaging 's essentially real—
`time, on— the electronic mail.
`instant Messaging started with
`software called ICQ, then America Online introduced its huge—
`ly-popular variation (AOL Instant Messenger), then Microsoft
`introduced its soitware called MSN Messeiger. As of writ ng,
`none at tiese softwares is compatible with the other. But item
`was talk in the trade press of eventual standards. There are
`serious reasons we need standards.
`Ins ant messaging is
`evolving ‘nto much more than a tool for sending typed rres—
`sages to buddies online, Just as the original Web browsers
`revolutionized the way average users connect to Internet con-
`tent, today‘s Instant message screens are evolving into easy-
`to—use connections for linking people at any given momen on
`the Internet via text, voice and video. All the new capabilities
`will be built on a single critical assumption: knowing that a
`person is online. That, in turn, makes it possible for electron—
`ic merchants and providers of online services to reach Inte net
`users with intormation or incentives —at the precise time they
`are able to react, namely when they are online in front of their
`screen, an easy target. Tools are being integrated into ins ant
`messaging software that permit the immediate delivery 0 an
`increasing array of data that does not come from Iriends or
`family. America Online has unveiled a version of its Instant
`messaging software that automatically delivers tailored news
`headlines and stock quotes.
`Instant On Buy a PC (Personal Computer). Turn it on.
`Bingo, it's already loaded with Windows or 08/2. instant On is
`a new term for preloading soitware onto hard disks of new
`computers and shipping those computers already pro—loaded
`with that soitware.
`Instantaneous Override Energy Function iOEF. A
`feature of the AT&T PBX Dimension Energy Communications
`
`
`
`
`
`
`
`
`
`ka;
`
`
`
`
`Service Adjunct (ECSA), which allows the user to turn all the
`ECSA energy functions ON or OFF. IOEF is most often used for
`periodic maintenance, or to adjust
`to sudden changes in
`weather.
`Institute for Telecommunications Sciences ITS is
`the research and engineering branch of
`the National
`Telecommunications and Information Administration (NTIA),
`which is part of the US. Department of Commerce (000).
`www.ntia.doc.gov See NTIA
`Instruction Register The register which contains the
`Instruction to be executed and functions as the source tor the
`subsequent operations of the arithmetic unit.
`Instructional Television Fixed Service ITFS. A ser—
`vice provided by one or more tixed microwave stations oper—
`ated by an educational organization and used mainly to trans—
`mit instructional, cultural and other educational information to
`fixed receiving stations,
`Insulated Wire Wire which has a nonconducting covering.
`Insulating Materials Those substances which oppose
`the passage of an electric current through them.
`Insulation A material which does not conduct electricity but
`is suitable for surrounding conductors to prevent the loss of
`current.
`Insulation Displacement Connection IDC. The lDC
`has replaced wire wrap and solder and screw post terminations
`as the way for connecting conductors (i.e. wires carrying tele—
`com)
`to jacks, patch panels
`and blocks.
`Insulation
`Displacement Connections are typically two sharp pieces of
`metal in a slight V. As the plastic—covered wi e is pushed Into
`these metal teeth, the teeth pierce the plastic 'acket (the insu—
`tattoo) and make connection with the inside metal conductor.
`
`This saves the installer having to strip off the conductors insu-
`lation. This saves time. Since IDCs are very s
`all. they can be
`placed very close together. This reduces the size of jacks,
`patch panels and blocks. IDCs are the best ter
`ination for high
`speed data cabling since a gas—tight, uniform connection is
`made. The alternate method of connecting wires is with a
`screwvdown post. There are advantages and d'sadvantages to
`both system. The lDC system, obviously, is faster and uses
`less space. But it requires a special tool. Tie screw system
`takes more time, but may produce a longer-lasting and
`stronger, more thorough (more of the wire exposed) electrical
`connectior. The most common lDC wiring scheme is the 66
`block, invented by Western Electric, now Lucent. But there are
`other systems — from other telecom manufacturers. See
`Punchdown Tool.
`Insulation Resistance That property of an insulating
`material Witch resists electrical current flow through the insu—
`lating material wher a potential difference is applied.
`Insulators Some atoms hold onto their electrons tightly.
`Since elec ions can of move Ireety these material can’t easily
`conduct electricity and are know as non-conductors or insula—
`tors. Common insulators include glass, ceramic, plastics,
`paper and air. Insulators are also called dielectrics.
`III'I' Induc ion Neut alizing Transformer. A specially designed
`multipair longitudinal
`inductor that is spliced into a wireiine
`facility to substantially reduce low frequency steady~state or
`surge induced voltages and currents that may be causing
`noise, equipment rratfunctions and/or damages or creating a
`personnel safety hazard. See TEN.
`III" 4 A software interrupt designed to communicate with the
`com (serial) port
`ii a PC. Communications programs use
`interrupt 14h to talk to a modem physically attached to anoth-
`er computer on the tetwork.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Facebook's Exhibit No. 1024
`
`Page 3
`
`Facebook's Exhibit No. 1024
`Page 3
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`compresses information within a single frame. Compare to
`Interframe Coding.
`IntruIATA Telecommunications services that originate and
`term'aate in the same Local Access and Transport Area. See
`also Local Access and Transport Area. This can be either
`Interstate or Intrastate service, traffic or facilities.
`lntrumodnl Distortion In an optical fiber, the distortion
`rasu t'ng rom dispersion of group velocity of a propagating
`mode. It is the only form of multi mode distortion occurring
`in single—mode fibers.
`Intranet A private network that uses Internet software and
`lnterret standards. In essence, an Intranet is a private Internet
`reserved or use by people who have been given the authori—
`ty ard passwords necessary to use that network. Those peo—
`ple are typically employees and often customers of a compa—
`ny Ar Int anet might use circuits also used by the Internet or
`if mght rot Companies are increasingly using Intranets —
`Inte rat Web servers —— to give lheiIr employees easy access
`to co porate information.
`Acco ding to my friends at Strategic Networks Consulting,
`Boi ed down to its simplest, an Intranet is: a private network
`env'ronment built around Internet technologies and standards
`~ predo ninanlly the World Wire Web. The primary user
`inte face, called a Web browser, accesses Web servers Iocat»
`ed ocally. remotely or on the Internet. The Web server is the
`bee t of ai Intranet, making selection of Web server software
`a metal decision, even though mIch fanfare has focused on
`A
`browsers Netscape‘s Navigator vs, Microsoft‘s Explorer).
`At
`'ts co e, a Web server hand es two arcane languages
`(HT Lard CGI) that are the meat and potatoes of generating
`Web pages dynamically, making connections and responding
`to user requests ButIn the rush o dominate the potentially
`lucrative Intranet market
`these simple Web functions are
`being burdled into operating systems and vendors are now
`touting pr‘cey “Intranet suites” witch encompass everything
`from database and applicalio inte faces, to e-matl and news—
`groups, to the kitchen sink,
`Most med'um— or larger-sized corrpanles will need more than
`just a handful of simple Web servers to deploy a reasonably
`robust Intranet. To help a comoany post current job openings,
`or make Lp—to-date product specs and available ‘nventory
`accessible by traveling sales reps, an Intranet needs the fol»
`lowing capabili les:
`0 Database access. Getting a critical data housed 'n corpo—
`rate databases can be accorrpiished via generic, In‘versal
`ODBC linking or based on “rative” links directly to Sybase,
`Oracle et at. allowing use of all the databases features.
`- Application nooks. Used by developers a stancard pro-
`grar ming this face (API) al ows outside applicators like
`Lotus Notes to ' nteract with Web data and vice versa |
`addi—
`tion, proprietary APIs exist — most notably Microsoft’s ISAPI
`(for "Internet Server API”) wh‘ch lets developers lin directly
`to Microsoft applications.
`' Lser publisl ing.
`In addition to dialogues via oral/news—
`group/bulletIn board features users will want to pos tIIeir
`ow
`content on Web servers without having
`0 attain
`Webmaster strm
`0 Search vehicles. How does an engineer find the chrent
`specs on Project #686—2 among thousands of pages spread
`across a bunch of Web servers? The answer: an indexirg and
`sea ch engine hat creates an internal Yahoot for your own
`We) sites.
`' Admin/management. A catchall for loads of important, but
`Stil i||conceived features for managing access users, con~
`
`
`
`
`
`
`
`
`
`ack
`
`it’s
`ice,
`
`:ept
`the
`IDB
`Ieir
`
`ne).
`ISS-
`
`I or
`
`ting
`nce
`sig-
`with
`g. a
`
`unk
`
`iher
`
`iime
`
`hate
`I as
`Lots,
`3 to
`Igo—
`Irom
`
`tale,
`
`cell
`ame
`
`jling
`con—
`ding
`
`‘rfcal
`I the
`Iver-
`titres
`hour
`uar—
`the
`,ffing
`ions
`
`.ding
`
`pnge
`fers
`”an"
`ents
`flow
`ely
`that
`
`.Aw,__m..4...‘me,,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`HTTP
`NFS
`IMAP4/SMTP
`DNS/NIS+
`DNS/LDAP
`BooIp/DHCP
`SNMP
`IIOP (CORBA)
`
`tent and the servers themselves. Intranet administrators are
`currently fascinated with analyzing Web server logs which
`contain data of some sort,
`including user connections and
`page activity.
`According to a white paper released by Sun Microsystems in
`the summer of 1996, the basic infrastructure for an intranet
`consists of an internal TCP/IP network connecting servers
`and desktops. which may or may not be connected to the
`Internet through a firewall, The intranet provides services to
`desktops via standard open Internet protocols, In addition to
`TCP/IP for basic network communication, these also Include
`protocols for:
`Browsing
`File Service
`Mail Service
`Naming Service
`Directory Services
`Booting Services
`Network Administration
`Object Services
`See also Extranet and Intranet.
`Intranodal Service Intranodal service Is a feature of
`some central office switches and smaller remote switches. It
`means that it will continue to switch in which
`Intranode Communications path which originates and ter—
`minates in the same node.
`lntruotfire Call A call involving only one switching system.
`lntruoflise Trunk A telephone channel between two
`pieces of equipment within the same central office.
`lntrnpreneur An entrepreneur who works Inside a big
`company. Hence,
`intra, as in inside.
`It’s hard to imagine it
`actually happening. But the word has became polear as a
`way for large companies to motivate their employees to take
`personal career risks and introduce new products.
`Intrastate Services,
`traffic or facilities that orig‘nate and
`terminate within the same state. Therefore,
`it related to tele-
`phone, falling under the jurisdiction of that state’s telephone
`regulatory procedures.
`Intrustrudure A term coined by “Data Commurications”
`and referring to the software, hardware, and Internet services
`underlying a corporate Intranet.
`Intrinsic Joint loss That loss in optical power transmis—
`sIon, Intrinsic to the optical fiber, caused by fiber pa ameters,
`e.g., dimensions, profile parameter, mode field diameter, mis—
`matches when two non identical fibers are joined.
`II‘III‘inSIts Intrinsics are a component of many windows
`toolkits The windows toolkit
`intrinsics detinitIon Ias been
`developed by the MIT X Consortium. The Intrinsics (1fine the
`function of specific graphical user
`interface and wndow
`objects They do not define any particular look or fee, just the
`function. Example: A pull down menu intrinsic would define
`the function of a pull down menu within a toolkit but rot the
`appearance of it.
`Intrusive Test Breaking a circuit In order to test its func—
`tionality. Testing intrusively will drop service on the circuit.
`INTlIG international Telecommunications Users Group.
`Intumestent Tirestop A firestopping materia
`expands under the influence of heat.
`Inverse ARPA See Reverse DNS.
`rans—
`Inverse Fourier Transform Inversion of Fourier
`form to convert lrequency representation of signal to time rep
`resentation.
`Inverse Multiplexer I—Mux. An Inverse multiplexer per—
`forms the inverse tunction of a multiplexer. ”Multip exer”
`
`
`
`that
`
`
`
`451
`
`Facebook's Exhibit No. 1024
`
`Page 4
`
`Facebook's Exhibit No. 1024
`Page 4
`
`
`
`
`
`re point in limea i
`a computer tale.
`rally be no more
`:3 seconds 99% _
`feed to illustrate ‘
`load. When the
`rlhan the abet/e _
`forty. Of course,
`-
`v mimic the real
`5 largely mean.
`one, president,
`)uter telephony
`
`‘ing is the tech-
`rrocessing ll0r-
`elworking, load
`ren connecting
`nd Token Ring
`it) link such as
`as the need for
`each serving a
`
`he goal of load
`lxceed its busy
`ng conditions.
`at steps until it
`the system is
`ryond its load?
`low is service
`aceful or must
`i system reset
`inderstand the
`pet significant
`ead testing. it
`ohony system
`re system will
`iflS. See also
`
`loading coils
`to distortion.
`
`ly of a phone
`i lines. What
`i loop circuit
`ding “tunes"
`500 Hz) and
`l bandwidth.
`r removed it
`:Iusively on
`
`local loops
`tes for wire
`is. Loading
`ces, as dis—
`so used for
`
`A group of
`rd similarly
`
`r loading a
`t) program ,
`lnder DOS,
`device dri—
`y memory
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`
`
`managers use their own routines to load high, though they
`can sometimes borrow DOS commands.
`,
`loading Plan A telephone company term. A Loading Plan
`is a systematic scheme ior fully utrlrzrng all exrsting capacrty
`in a given switching entity; Utilizing and coordrnairngthe
`capabilities and capac’ty limitations of various entities in a
`motif-entity wire center and maintaining objective service lev-
`ate at all times. A Load'ng Plan is the basis for achieving and
`retaining good Load Balance.
`‘
`.
`too An ATM term. Loss of Cell Delineation: A condition at he
`receiver or a maintenarce signal transmitted in the PHY over-
`head indicating that the receiving equipment has lost cell
`delineation. Used to monitor the performance of the PHY layer.
`Local Pertaining to a system or device that resides withir a
`subject device‘s switch'ng domain.
`local Access The connection between a customer's prem‘s—
`es and a point of presence of the Exchange Carrier.
`local Access and Transport Area LATA. The MFJ
`(Modified Final Judgement), which broke up the Belt Systen,
`also defined 196 distinct geographical areas known as LATAs.
`The LATA boundaries generally were drawn in consideration
`of SMSAs (Standard
`etropotitan Statistical Areas), which
`were defined by the Census Bureau to identify “communit'es
`of interest" in econom‘c terms. Generally speaking, the LATA
`boundaries also were coterminous with state lines and exist—
`ing area code boundaries, and generally included the terri or
`ry served by only a s'ngle RBOC. The basic purpose of the
`LATA concept was to delineate the serving areas reserved for
`LEC (Local Exchange Carrier) activity.
`in other words,
`intraLATA traffic (l.e.,
`local and local long distance) beca ne
`the sole right and responsibility of the LECs. InterLATA traffic,
`on the other hand, became the sole right and responsibility of
`the IXCs. Over time, a number of state PUCs allowed the IXCs
`to compete for lntraLATA long distance;
`they also allowed
`CAPs (Competitive Access Providers) to provided limited
`local
`service
`in
`competition with
`the LECs. The
`Telecommunications Act of 1996 (The Act) opened the flood-
`gates for competition with the LATA boundaries. The Act also
`atlovrs the HBDCs to provide InterLATA service outside the
`states in which they provide local service. Additionally, The
`Act contains provisions for the RBOCs to offer InterLATA ser—
`vice within the state in which they provide local service, once
`they have satisfied a 14-point checklist. the most significant
`conditions of which relate to significant, demonstrated levels
`of competition within their respective local exchange serving
`areas. California is divided into 10 LATAs. Sparsely populat-
`ed states such as South Dakota comprise only a single LATA.
`lacal Airtime Detail This cellular telephone carrier
`option (which means it costs money) provides a line—item—
`ized, detailed billing of all cells, including call attempts and
`incoming calls to the mobile. What you get for free is gener-
`ally a non—detailed, total summary of all calls.
`local Area And Transport Area See LATA.
`local Area Data Transport LADT, A service of your
`local phone company which provides‘you, the user, with syn-
`chronous data communications.
`local Area Network LAN. A short distance data commu—
`nications network (typically within a building or campus) used
`to link computers and peripheral devices (such as printers, CD—
`RDMs, modems) under some form of standard control, Older
`data communications networks used dumb terminals (devices
`with no computing power) to talk to distant computers. But the
`economics of computing changed with the invention of the per—
`sonal computer which had “intelligence” and which was cheap.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`LANs were invented as an afterthought — after PCs — and
`were originally designed to let cheap PCs share peripherals —
`like laser printers — which were too expensive to dedicate to
`individual PCs. And as time went on. what LANs were used for
`got broader and broader. Today, LANs have four main advan-
`tages: i. Anyone on the LAN can use any of the peripheral
`devices connected to the LAN. 2. Anyone on the LAN can
`access databases and programs running on client servers
`(super powerful PCs) attached to the LAN; and 3. Anyone on
`the LAN can send messages to and work jointly with others on
`the LAN. 4. While a LAN does not use common carrier circuits,
`it may have gateways and/or bridges to public telecommunicav
`lions networks. See LAN Manager, Token Ring and Ethernet.
`local Area Signaling Services LASS is a group of cen—
`tral office features provided now by virtually all central office
`switch makers that uses existing customer lines to provide
`some extra features to the end user (typically a business user),
`They are based on delivery of calling party number via the local
`slgnalirg network. LASS can be implemented on a standalone
`single central office basis for intra office calls or on a multiple
`central office grouping in a LATA (what the local phone compa—
`nies are allowed to serve) for interoffice calls. Local C087
`(Comr on Channel Signaling Seven) is required for all config-
`urations. The following features typically make up LASS:
`Automatic Callback: Lets the customer automatically call the
`last incoming call directory number associated with the cus—
`tomer’s phone when both phones become idle. This feature
`gives its customer the ability to campcn to a line.
`Automatic Recall: Lets the customer automatically call the last
`outgoing call currently associated with the customer's station
`when botlr stations become idle. This feature gives the cus-
`tomer he ability to camp—on to a line.
`Customer—Originated Trace: Lets the terminating party request
`an automatic trace of the last call received. The trace includes
`the cal ing line directory number and time and date of the call.
`This information is transmitted via an AM IOP channel to a
`designated agency, such as the telephone company or law
`enforcement agency.
`individual Calling Line Identification: Consists of two distinct
`features:
`1. Calling Number Delivery which transmits data on an
`incoming call to the terminating phone. 1. Directory Number
`Privacy which prevents delivery of the directory number to the
`terminating phone.
`Also, LASS has some selective features:
`Selective Call Acceptance: Allows users to restrict which
`incoming voice calls can terminate, based on the identity
`attribute of the calling party. Only calls from parties identified
`on a screening lists are allowed to terminate. Calls from parties
`not specified on a screening list are rerouted to an appropriate
`announcement or forwarded to an alternate directory number.
`Selective Call Forwarding: Allows a customer to pre—setect
`which calls are forwarded based on the identity attribute of the
`calling party.
`Selective Call Rejection: Allows a customer to reject incoming
`voice calls from identity attributes which are on the customer‘s
`rejection list. Call attempts from parties specified on the rejec—
`tion list are prevented from terminating to the customer and are
`routed to an announcement which informs the caller that
`his/her call is not presently being accepted by the called party.
`Selective Distinctive Alert: Allows a customer to preeselect
`which voice calls are to be provided distinctive alerting treat—
`ment based on the identity attributes of the calling party.
`Users can, at their convenience, activate or modify any of
`
`501
`
`Facebook's Exhibit No. 1024
`
`Page 5
`
`Facebook's Exhibit No. 1024
`Page 5
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`do not have to reboot every time you change cards. My expe—
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for commu—
`nications between a user application program and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuifelevel security technology developed by
`David Koblas in 1990 and since made publicly available by
`the IETF (Internet Engineering Task Force. SOCKSvS, the cur-
`rent version, provides security in a client/server environment,
`running at the Session Layer, Layer 5 of the OSI Reference
`Model. SOCKSv5 supports multiple means of authentication,
`negotiated between client and server over a virtual circuit, and
`on a session—by—session basis. SOCKSVS also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an independent message.
`SOCKSVS also allows protoco
`filtering, which offers
`enhanced access control on a protocol—specific basis. For
`example, a retwork administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter corrmand to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as Windows NT. The cross-platform nature
`of SOCKS of ers portability to Mac‘ntosh and other operating
`systems and browsers. Accorcing to Network World
`Magazine, September 27, 1999,
`“the latest version of
`SOCKSVS ofers network managers an easier way to run
`videoconfere cing and video and audio streaming through
`firewalls, wtich has been difficJIt and time-consuming.
`Socksv5 does this by providing a single and powerful method
`of authentica ing users and manag'ng security policies for all
`Internet appl'cations, including mJItimedia.” SOCKSv5 also
`interoperates on top of IPv4,
`lPsec, PPTP, L2TP and other
`lower-level p otocols.
`’
`30! Start Of File
`Soft Copy 1. A copy of a file or program which resides on
`magnetic medium, such as a floppy disk, or any form that is
`not a hard copy ~ which is paper.
`2. Old legacy systems term reapplied to distributed comput-
`ing in which reports are created on—screen from data residing
`within different applications.
`Soft Decision See SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans-
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft font A font,usually provided by a font vendor, that
`must be installed on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadable font.
`Soft llancloff A cellular radio term. A soft handoff is a
`handoff between cell sites that involves first making the con-
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or “break and
`make” handoff,
`is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft Key There are three types of keys on atelephone: hard,
`programmable and soft. HARD keys are those which do one
`thing and one thing only, e.g. the touchtone buttons 1, 2, 3, *
`and # etc. PROGRAMMABLE keys are those which you can
`program to do produce a bunch of tones. Those tones might
`be “dial mother." They might be “transfer this call to my home
`
`
`
`Social Computing A term that emerged in the summer of
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a “communica-
`tions-rich brew," which is “expected to create new ways for
`businesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators." According to
`Peter Lewis. “The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num-
`ber crunching and data base management to wider—ranging
`forms of business communications...Where client server
`broke away from mainframe-based systems and distributed
`computing power to everyone in the organization, social com—
`puting goes the next step and extends the distribution of com—
`puting power to a company‘s customers."
`Social Contract An arrangement between the local tele-
`phone company and its local regulatory authority whereby the
`telephone company’s services are detariffed, but cannot be
`priced at less than cost. Quality of service standards apply.
`Social Engineering Gaining privileged information about
`a computer system (such as a password) by skillful lying —
`usually via a phone call. Often done by impersonating an
`authorized user.
`\
`Socket 1. A synonym for a port.
`2, A technology that serves as the endpoint when computer
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PCMCIA Card and mapping the host's internal bus signals to
`the PCMCIA interface signals.
`4. An operating system abstraction which provides the capa-
`bility for application programs to automatically access com-
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The Socketslnterface, introduced in the
`early 19803 with the release of Berkeley UNIX, was the first
`consistent and well—defined application programming inter-
`face (API).
`It
`is used at
`the transport
`layer between
`Transmission Control Protocol
`(TCP) or User Datagram
`Protocol (UDP) and the applications on a system. Since 1980,
`sockets have been implemented on virtually every platform.
`Socket Number In TCP/IP, the socket number is the join-
`ing of the sender's (or receiver’s) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardware that provides a standardized interface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCMCIA slots of a computer, desktop or laptop
`(but most typically a laptop). Ideally, socket services software
`should be integrated into the notebooks BIOS, but few man-
`ufacturers have done so to date. For PCMCIA cards to oper—
`ate correctly you also need Card Services, which is (not are)
`a software management interface that allows the allocation of
`system resources (such as memory and interrupts) automati-
`cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCMCIA cards when you buy
`the cards. You will, however, have to load new drivers every
`time you change cards and allocate the correct memory exclu-
`srons, You will have to reboot if you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`
`
`Facebook's Exhibit No. 1024
`
`Page 6
`
`Facebook's Exhibit No. 1024
`Page 6
`
`
`
`NEWTON’S TELECOM DICTIOhARY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`' Dealing with the various vendors and providers, including
`verifying and paying the bills.
`0 Preparing and managing the Telecommunications budget.
`0 Keeping abreast of changes in technology, services, indus-
`try structure, and rates.
`0 Assisting company management In developing a corporate
`telecommunications policy that meets business objectives
`0 Developing and implementing company telephone and
`telecommunications procedures for efficient and cost effective
`use, and training company employees in these procedures
`- Upgrading, procurement, selecting, contracting, or pure
`chasing a system, new system, equipment, or services.
`- Planning and analyzing for growth, new requirements, or
`future functionality.
`The goal of the CM is to provide good telecommunications
`services tor an organization and its employees at the lowest
`possible cost. This definition courtesy, Robert J. Perillo,
`PerilIo@dockmaster.ncsc.mil.
`'I'CN Collective
`umber Group Table.
`TCNS Thomas Conrad Networking System is a 100 million
`bit per second p oprietary networking system (LAN) based on
`ARCnet that car use most standard AFICnet drivers on any
`network operatir g systems
`'I'CO Total Cost of Ownership. A term coined by The Gartner
`Group to br'ng attention to the actt,ual tottal cost to the enter—
`prise of owning a PC. The most tigrreIn 1997 was $29,353
`for owning a staIdard, networked, Windows 95 PC for a per—
`od of three yea s. Gartner cites the costtot a NetPC (T