throbber

`
`CMPBooks
`
`7‘
`
`:_-FLMH.
`
`Page 1 of 7
`
`Page 1
`
`Facebook's Exhibit No. 1033
`
`OVER 500,000 SOLD
`
`The Authoritative Resource for
`
`Telecommunications, Networking.
`
`the Internet and Information Technology
`
`UpdatedmndExpanded Edition
`bYJjBH’Y Newton
`
`"
`
`,
`
`__.
`
`
`
`Page 1 of 7
`
`Facebook's Exhibit No. 1033
`Page 1
`
`

`

`
`
`Page 2 of 7
`
`Facebook's Exhibit No. 1033
`
`Page 2
`
`
`
`Page 2 of 7
`
`Facebook's Exhibit No. 1033
`Page 2
`
`

`

`NEWTflN’s
`TELEBDIVI
`DIBTIIJNARY
`
`Page 3 of 7
`
`Facebook's Exhibit No. 1033
`
`Page 3
`
`
`
`Page 3 of 7
`
`Facebook's Exhibit No. 1033
`Page 3
`
`

`

`LU“: .r’” ’ ' UL
`
`73"} K
`
`,5 i 0:2
`
`«PM
`@001
`NIW'I'ON'S TELECOM DICTIONARY M
`copyright © 2002 Harry Newton
`(3:)
`Email: Harry@HarryNeMOn.com
`ersonol web site: www.HarryNewton.com
`Business web site: www.Techno|ogylnvestor.com
`
`All rights reserved under International and Pan-American Copyright conventions, including
`the right to reproduce this hook or portions thereof in any torn-r whatsoever.
`
`Published by CMP Books
`An imprint at CM? Media LLC.
`12 West 2] Street
`New York, NY 10010
`
`ISBN Number 1757820-1041-7
`
`February 2002
`
`Eighteenth Edition
`
`For individual orders, and tar intorrnation on special discounts tor quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 1600-1300-6875 or 408-848-3854
`Fax: 408-848-5784
`Web: www.cmpbooks.com
`Email: cmp@rushorder.com
`
`This book is also sold through wwqumazomcom, ww.Fatbrain.oom and
`www.BarnesAndNol3le.com
`
`Distributed to the book trade in the U.SA and Canada by Publishers Group West
`1700 Fourth 53., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`Page 4 Of7
`
`Facebook's Exhibit No. 1033
`
`Page 4
`
`
`
`Page 4 of 7
`
`Facebook's Exhibit No. 1033
`Page 4
`
`

`

`I/LWL'hLir/Igtgg
`r/;2,7eo7é
`
`{{ {-r :f
`
`7 m I! e C”? 2
`
`Table of Contents
`
`HELP MAKE THIS DICTIONARY EVEN BETTER
`- We offer a reel reward ............................................................. It
`
`I I9 BEST DOLLAR-SAVING TIPS
`- How To Save on Telecom, PC, Internet and Airline Expenses and Best Investment Tips ................... VII
`
`WHY IS IT SO HARD TO BUY?
`- The logic of call centers! customer cores, and buying on the Internet .............................. XII
`
`WHERE'S THE TECHNOLOGY GOING?
`- Cheaper, foster and more reliable ore obvious trends but there are other less obvious important ones also.
`
`.
`
`.
`
`.
`
`. XVII
`
`DISASTER RECOVERY PLANNING
`— How to Make Sure Your Computing and Telecommunications Still Run ............................. XIX
`
`RULES FOLLOWED IN THIS DICTIONARY
`- How to figure our ordering of terms and our spellings ....................................... XXI
`
`ABOUT THE AUTHOR
`- Harry Newton does hove o life outside this dictionow ....................................... XXV
`
`ABOUT THE CONTRIBUTING EDITOR
`- Roy Horok teaches, consults and lives in Porodise ......................................... XXVII
`
`DICTIONARY
`
`Dictiononr begins with Numbers then goes onto Letters ......................................... I
`
`APPENDIX
`— Industry Stondards Organizations and their contoct information ................................. 850
`- Internotionol {oiling Codes ......................................................... 856
`- Standard Plugs and Connectors ..................................................... 858
`
`Page 5 of 7
`
`Facebook's Exhibit No. 1033
`
`Page 5
`
`
`
`Page 5 of 7
`
`Facebook's Exhibit No. 1033
`Page 5
`
`

`

`and Zilog 1-30. were installed in 8-bit computers such as the ripple II, the hlStlI 0050, and
`the Covtvnodore 64.
`.00 the first “area code' for what MET originally cohd IIIWIITS service. See 000
`Service artd fill".
`800 Peerlellellltyr 800 Portability! refers to the fact thatyoucan takequ 500 cum-
`ber to any long distance center. it rose example, once I ha
`lBUiHJBtihtit. For many
`yertrs,1ltut ncmrberwas provieded MET. When portabibty canoe along, we were able to
`itfram but to Ithl and
`keep l-BOll-UllllthY, rodich'Is 8005427271800
`Ityis
`byoseriesolcomplexdatofmeathelocalalmnecompartiesurtdu
`t’a
`FCC mandate, have brrilt. 000 t'ar‘fabiity started an Hay l, W93 See 000 Service.
`800 Service A roll call paid tar by the called p,erty mllIer than the rating puny. dgener-
`'Ic artd common term for InWI‘ITS (Wide Area ielecornrrtrnicotions Service) senior pravided
`
`byaphunepttatte,cannrcerywhetlteralECliacol ErrclrmgeCorrieNarthCllrttereltdetrge
`Carrier). tn tlortitrltmer‘coortdinorderoltheirirtrodrrction, cl these In’r'liITSIerviceslIave
`800 “967), 883 “996187? (rivet, 066 [2000], at 055 {200” as their 'atea
`code.‘ (Note: Future 500 nbmbers will follow the convention 8th where bill are specific
`numbers which are identical Sudt 000 sentice is typically used by merchants altering to sell
`sometl‘irgsudroshotelreservatiocts, clothes, ormntolcarstheideaoltl'tefceeseniceisto
`errticeotstornerstocoldteorrrrber, widtthethearybeiogtl'tatdrttecalttnsntalculmel
`thereforeeorsttheorslomersorneth'
`haorshenidItbalessinciredtocdSrrppliersai
`800 services use various ways to
`' are Ind bill their 000 services
`800 Service works like this: You're somewhere in North America. You dial 1000, i-BBB,
`l0”. tens or t-BSS and seven oi
`'ts. The [EC {Local Exchange Canier‘to the local
`pltactecarnponytceetcaloflicesoes
`'l’_agondrecIriresllteaellastong denture. tt
`alsarecagrizeelhefitltlareooudeaadcprenea acerrtroltzeddolabasebetoresprac
`the (all further, with the query generaltymtaking place over a SS? tSlg'IaingSysternwill
`link. the centrdhcod database resides on a Service Management System lSMSt, which is
`a centralized computing platform, The database identifies the LEC or lllC{lnterErrcharrt'ap
`Carrier] ptavidrtg the filth rnrrrrber. Based on that information and assumin thattlte
`heerrrmberisassoriotedwithaniili, IhelECsvv-itchtoutesthecetttothe roperp|.t(C
`Once the Ith has been tanned the call, hprocesses the 300 rtttrttber, pepsrhafltranslating
`itinto a 'real”telephone numberInorderto route itcorrectly. Illtentathrely, the tilt: hate
`
`lures the 300 ham or into on internal, nonstandard l0digit number for further roofing to
`the terminating Central tiltice (C0) and trunk or trunk group.
`its a realite example. the [sidebar at his book has an 500 number, BDOiJStiAltY (or
`800-54 2-7279”. When you {all that whither, MC] routes that number to the first available
`channel on the dedicated i—l circuit whid't leased from MCI's and connecting the MCI flew
`York Uty POP (Point Of Presence) to the Cth New ‘lar’crmy attire
`Because 000 long distance service is essentially a database aalarp and translation service
`lor'Incoming phone calls,,ttrpr: cue endlessflsegces you can amau can p3;
`on true
`routing patterns
`rampanyto
`pnnnanent instructions ‘urto
`day dayat week. number called, number calling. Saree long distance cornpariesallowyou
`to dtenge your routing instructions from one minute to another. For example, you might
`have two call centers into which 000 phone calls are pmflfip ltlhen one gets busy, you
`may tell your long distance companynyto route all the 300
`and phone calls to the call
`center, which isn't busy. See Erglttl'iundred Service and Due Plumber Calling for more,
`itspeciblly allthe feahrresyau can now tort 000 service.
`lrrtrtuy of 1993 the KC mandated that a 000 {and by exteroiarr Ill 8th numbers become
`portable. that means “110 dreamers can take their 000 tetophone number from one i
`distance company to another, and still keep the some 000. See else 000 Parlabiity.
`000 Services are known internationally as 'Freefone Services." In other correlates the riot-
`irtg srltarne may vary, with example: being 0-000 and 0500. Such serviceselso go wider
`the name ”Greenlone.‘ In intro rm, the "lit approved the E169 standard llriversal
`lntemotionot Freetocte Number lUlFNt numbers, also known as 'Giobal 300.” mm will
`work across national boundaries, based on a standard numbering scheme at 300, 880 or
`871' plus an Bdigit telephone nrtrnber, See also Him and Vanity Numbers.
`I01 See 002 Standards.
`802 Sleeved-eels 1119.302 Standards are a set of standout tor ltlil I{Local Area
`Network) and bull (Metropolitan Area Network) data con'ntunicatiors developed through
`the tEEE’s Protect 302. The two most important standards are 802st lb and 802.] i o. the
`standards also indude on overthrew of recommended networking ord'r‘tectares, approved ‘It
`1990. the 002 stardordstolow I] retinas numbering convention. A number followed by a
`capital letter denotes a standalone standard; a nrrmber followed by a lower case letter
`
`800 / 802.1“
`
`denotes either a supplement to a standard, or alpgrt at a nwltiple-nucnber standard leg.
`002.] 8 302.3). The 80? standards segment
`data link layer into two arblayers:
`i.AtItediaAcceer Cannot (MAD lfltfitthriir'tdrdesspea'iicmetttads tar gtiit'
`accessto
`the Lilli. these methods — such as Ettrerrtet’s random access method and T on liing's
`taken passictg procedure - are in the 802.3. 002.5 and 802.6 standards.
`2. it Logical link Control tttCt layer. described in the 802.2 standard, that provides for
`connection estottttshnrent, data transfer, and connection termination services. llC specifies
`tl'eee types of carrtrnunicatiam finks:
`" Art llnoctcnorrledged Cancrectirnless Link. where Ila sending and receiving devices do not
`set up a connection before transmitting. Instead. messages are sent on a 'best effort"
`basis, with rtn precision for ermr detection, error recovery. or message sequencing. This
`type of ink is best suited for applications where the higher layer protocols can provide the
`error conection and fractions, or where the loss at broadcast messages is not critical.
`*nCmmchmttIodeLmhwttereecannection betweenmeeeogesourceanddestinotion
`is established prior to amsmission. This type of but: works best in applications, suchoslile
`transfer, where large amounts of dIta are being transmitted at one time.
`* no hcknouvidedged [anmmgdrkismfln as itsnamedindicates,
`ravides for acknowl-
`edgecnent
`messages art
`II
`o
`evtces w maintaining a can-
`necion. Farttesreasrsn iisntostaftenusedfecaniicatiortsudmreacenhalpmcessar
`communicates with a let
`camber of devices with limited processirgcapacapabilitiea
`802.] IEEE standard or overall architecture at [hits and internetworking. See all the
`following definitions.
`802.] III 802.tio is actually an updated. big or, better, faster version of 001i lb
`(also oiled i‘r'iFil, which is now cannnortly icrstall
`in offices, airports, coffee shops, etc.
`Many laptops rtaw come with 002.?ib hit-in. the newer 002.] la, dso cet IIEE Sl'tltt-
`dord forwireless'ttttls, supportsspeedsupto 54 Mbps Bliltio ntrtsincr Sim-tritium
`cation in the 5 EH: range, which was olecuted by the FCC to support of UNII {the
`Unticensed National Information infrastructure). Specifically, 200 NIH: is allocated at 5. t 5-
`5.35MH1 for interiidrng applications, and 100 MHz at 5.72550 25 MHz ior outdoor use.
`ihisellocoted spectnrcn is divided mtothreewockingdomains. rlt 5.l55.25 MHz. maxi
`rrturn powerautput is restricted to 50thWintfiMatts).5.25-5.3510250ml'l, cmd 5.725
`5.825 to l
`Irilatt. Hittite has been dubbed iii-HS l't‘fireless Fidelity 5 MHz) by the
`Wireless Ethemet Compatittifity trllionce t‘t‘t'ECrtt.
`802.1 to Lees Coded Unhoganel Fteocancy Division Multiplexing tCOFDlrti as the s’ not
`modulation mdtrtiqcre. COFDMsendsastreentol data mars inarnassively parallel
`str-
`ion. with muitiple subcarriers (i.e.. smol slices of fit, or llodra Spectrum. vridtin the deaig
`noted carrier lreqrrency band. Each center channel is 20 MHZ wide. and is subdivided into
`52 subcarrier channels each of which is approximately 300 lift: wide; 43 of the subcor-
`tier channels are used tor data transmission. and the remaining foul for error cannot.
`Through the application of a coding technique. each symbol comprises multi datumbits.
`Thespec‘rftedcoding tecfetiquesareideiaratasspecilied llllflfxlitltlfllls‘l
`by802.llcocnpliontproducts, include ltt’SKlliinonPlaseShlttlfeyinglatl25lllrasllbpsppr
`channel for a total of 6 tribes across all 40 data channels OPSK {Quadrature Phase 5 ill
`Key'|ctgl at for 250 ltbpspar channel for a total at 12 hlbps. and loflhhl tldlevel
`Quadrature Amplitude Modulation] at 500 libps per channel tor a total at 24 Mbps. The
`standard Idso allows more camptex modulation schemes, that alter inueased data rates.
`Currently. the mostcomptetr actd fastest is 640er lad-level 0M1). at 1325 tribes per
`channel for a total at 54 Mbps.
`the symbol rate is slowed down enough that each symbol transmission is longer died the
`delayspread. The delay spreadIs the variationIn timing between receipt of the signals
`assacietedwithe
`ivensymlral withthedelayflspreadcarsedbymultipethfeding.
`Multipalhfodingis
`phenomenonvrherebytheltf sigmiscorryirtgopivendotusym
`ant-reel the receivecatsi‘rghttydrfierenttimes. This‘rsbecrntse the sigcra spreodsoutlram
`the transmitter, with certain portions attire signal reacting the receiver more or less direct-
`ly. while other portions of the signal bounce around all of walls. lumiture, your cowork-
`er's pointy bead, and such. flow. each at the
`bots contains multiple bits, vrlttdt are
`imposedanittltraughthecorhng pracecsesfien'
`abovehsthemaitiplesyrnbolsreodt
`ttrereceitrer, ttteyoresonedaotaretdecoded. withthedecading process pmviringsome
`addriionoi time for the receiver to adust for the delay spread and to get ready to receive
`the next symbol Both 302 tie and 002. I iii are designed to becompontrte with Ethemet
`[hits using the MAC Media tlcoess Control]
`techninue of [Slab/Cit
`(Carrier Sense
`Multiple Access with Collision Itvaidancel.
`ltdtissoundsgeamltot’sbecoaseitisgreat.tfttissavndstaagaodtobetme, that's
`
`l?
`
`Page 6 of 7
`
`Facebook's Exhibit No. 1033
`
`Page 6
`
`
`
`Page 6 of 7
`
`Facebook's Exhibit No. 1033
`Page 6
`
`

`

`302.1"! / 802.10
`
`because it gets a little more complicated. While the 5 Gil: spectrum is pretty clear in the
`05, it's not so readily available elsewhere. Military and govemmem installations use per-
`tions of this band overseas.
`in Japan, only the 5.15-5.25 MHz spectrum is Ivailable.
`in
`Europe, the 5725-5025 MHz spectrum is already allocated for atlter uses. In Europe, ETSI
`(European Telecommunications Standards Institute) requires that two additional protocols
`be used in coniunctian with 002.11o in order to protect incumbent applications and sys-
`tems running over previously allocated shared spectrum. DES (Dynamic Frequency
`Selection) allows inn 302.11a s stem to dynamically shift frequency channels and TPC
`Clmnsmissiun Pewer Camral) r
`aces the power level. In combination, these protocols
`serve to eliminate interference issues with incumbent signals. See also 302.1 lb,
`802.1 lg, BPSK, CSMA/Ch, MAC, DFDM, 0AM, OPSK, WECA and lift-Fl.
`802.1 111 802.11b is now the most common wireless local area network. 3021 lb
`lalso called Witt) is new commonly installed in offices, airports, coffee shops, etc. Many
`laptops now come with 802.11b built-in. 302.11b has been dubbed Wr-Fi (Wireless
`Fidelity) by the Wireless Ethentet Compatibility hlliance (WECA). 802.) 1b defines bath the
`Physical
`(PHY) and Medium Access Control (MAC) protocols. Specifically,
`the PHY spec
`includes three transmission options — one It (lntmred), and two RF (Radio Frequency).
`802.11b uses 0555 (Direct Sequence Spread Spectrum) madalationfor digital communi-
`cation. DSSS involves the transmission of a stream of ends and cards, which is modulat-
`ed with the llarker code chipping sequence. Barker code is an 1 11bit sequence [e.g.,
`101101 11000) that has advantages in wireless transmission. Each bit is encoded into on
`11-bit Barker code, with each resulting data ahiecr forming a “chip.“ The chip is put on a
`water frequency in the 2.4 EH: range (2.42.403 EH2), and the waveform is modulated
`using one of several techniques. 302.11 systems running at 1 Mbps make use of BPSIC
`(Dinuty Phase Shift Keying). Systems running at 2 Mbps make use of 0PStl (Quaternary
`Phase Shift lieying). Systems running at 1 1 Mbps make use of (Cit (Complementary Code
`Keying), which involves 64 unique code sequences, which technique supports six bits per
`code word. The CCII code word is then modulated onto the RF carrier using 0PSli, which
`allows another nvo bin to be encoded for each 6410 symbol. Therefore, each 6-bit s at-
`tel contains eight bits. Power output is limited by the FCC to 1 watt ElRP fErtuivallent
`lsohapically Radiated Power). At this low power level, the physical distance between the
`transmitting devices becomes an issue, with error performance suffering as the distance
`increases. literature, the devices adoptto longer distances by asin a less complex encod
`ing technique, and a resulting lower signaling speed, which trans
`tes into a lower data
`rate. For example, a system maning at 11 tribes using CCll and 0951i, might throttle back
`to 5.5 Mbps by halving the signaling rate as the distances increase and error pedarmance
`drops. is the sihretton gets worse, it might throttle back to 2 Mbps using only GPSIC, and
`1 Mbps using BPSK. Also to be considered in this equation is the fact that the 2.4 EH:
`mega is in the unlicensed 1510 (Industrial, Scientific and Medical) band, which is shared by
`garage door openers, microwave ovens, bar code scanners, cordless phones, Diuetooth
`LANs, and a wide variety of other devices. As a result, this slice of spectrum can be heavi-
`ly congested at times, and performance can drop considerably. 302.1 I divides the avail-
`able spectrum into 14 channels. lathe US, the HI allows the use of l 1 channels. Eaar
`drannels are available in France, 13 in the rest of Europe, and only one in Japan. There
`also is overlap between ad‘acent channels ie.g., channels one and two), which fact funher
`affects perfonnunce; therefore, any given system must maintain maximum channel sepa-
`ration from other systems in proximity.
`Bath 002.11g and 302.1 lb are designedto be compatible with Ethernet Ihtls. 302.1 lb uses
`a variation of the MAC (Media tlccess Control) technique of (Sikh/Ch (Carrier Sense Multiple
`hcces with Collision hvoidance), which iscoed iaseme wired Ethemets, aswell. hdevice seek-
`ing to transmit over the shared medium (in this case, a shared RF channel) listens to the net—
`work. If it senses no activity over the carrier frequency for a mirin'ram period of time known
`as the DIFS (DCF (Distributed Coordinated function) lnturfrarne Spa ‘
`), itrequests access
`byfirst transmitting a RIS lkequest la Send) packet. The R15 pocket in odes both the source
`li.e., transmitter) and destination (to, intended rece‘nrer) addresses, the dumtian afthe intend
`ed session lie, transmission), and theACli iriCltnowledgement) associated with it. If the net
`wads is available, the destination device responds with {15 (Clear To Send), repeating both the
`duration and the llCll. 101 other devices back off the network until the session is concluded. If
`the network, on the utter hand, is busy, the device waits a period of time equal to the DlES,
`plus a modem number of slot times, as calculated with several backafl timers. lire “listening”
`pmcess takes several loans. CAM [Constant hccess Metlvtd), the default method, involves cort-
`stant monitoring of the anionic. Since [MA creates a power consumption issue for battery
`powered devices, PM (Failed ticcess Made) can be substituted. PAM calls forah dient devices
`
`to go into sleep mode, (if awaking at regular intervals, at the exact same time, to Esten for
`network activity. On impary 3, 2000 the 802.11 technologyugot another boost when
`Microsoft and Stadroclcs announced that they were to ioin forces to
`er wireless access, using
`3021 lb among other standards, in most of Starbcnks‘ coffee outiets everthe nevi nrroycmrs.
`the deal, some analysts say, a a tunher sign that 802.1 lb raid becorrna serious compett
`tar to better known wireless technologies such as Bluetooth, HarneRF, or even neittgenemtion
`cellular networks. ripple was the list to launch on 802.1 lb product line (coiled hirPert). All
`Apple computers now include a bailtin antenna which, in coairmction with a networking card,
`can exchange data with a small base station plugged into a broadband imemetcanaection up
`to 45 metres (150 feet) away. Although same PC laptops rrowcome preeguipped with wire
`less hardware, most users buy a PCMClrl card, or PC card, that serves as a wireless modem
`and antenna. See also 002.101, 002.1 lg, Illuetoath, EPSIf, Chip, [SIM/CA, 055$, Ellii’,
`Ethernet, HomeRF, MAC, 0PSI(, Spread Specacrn, WECA and Witt.
`802.12 Standard for 1001'iiuhnytntl. Addresses 100 Mbps demandpriority access
`method physical-layer and repeater specifications. Approved in 1995.
`802.15 A developing lEEE standard for Wireless Personal Area Networks iWPllrttsl. the
`802.15 Working Group (190) comprises four task Gm
`(109.151 is denvin e WPrltl
`standard based on the Bluetooth specifications. 162 is
`evelopiag recommend
`practices
`to tecihtote the coexistence of 002.15 10?th and 002.11 Wlhtls (Wireless Local Area
`Networks). 103 is chartered to draft a new standard for high-rate )0?th running at 20
`Mbps or better. Development is focusing on the 2.4 GHz hand, using 00PSK (Orthogonal
`Quaternary Phase Shift Keying) as the modulation technique. 104 is charged with investi-
`gating a low data mte WPhN solution running atna more than 200 Kbps in support of appli-
`cations such as wireless interactive rays, serrson, automation, and smart tags and badges,
`802.16 it developing lEEE standard for broadband wireless access.
`lhe 302.16
`Woricing Group (WE) is working on a vadety affixed wireless standards intended to serve
`high-speed applicators.
`002.10 Standard for lhtlfllihll management, approved in 1992; along with 3021):,
`became the basis of ISO/IEC 15002-2.
`802.10 lEEE standard for interconnecting 1th thraa h MAC bridges (specifically
`between 002.3, 302.4, and 002.5 nenuarks). The standa was approved in 1990, and
`was incorporated into ISO/IEC 10033. Works at the Milt level.
`802.1! lEEE standard for LAN and Milli load protocols. Approved in 1990, leaned the
`basis for 150/IEC 15802-4.
`002." Standard for defining network mlnagement information specified in 302
`umbrella standards. Ihpproved in 1993.
`002.10 A developing standard for remote bridging at the MAC layer.
`802.111 lEEE pmctices recommended for bridging Ethernet Lhtls at the MAC layer.
`hpptoved in I995.
`002.11 iEEE standard for using FDDI (Fiber Distributed Data interface) as a MltC-layer
`bridge. Approved in 1992, the standard was incorpamred into lSU/‘lEC 10030.
`802.11 lEEE standard for bill connectivity using MAC-layer bridges. A supplement to
`802.10, it was approved in 1996.
`802.111 lEEE standard for the discovery and dynamic control of network management
`infornrotian. Approved in 1993.
`In conjunction with 302.10, was the basis for lSD/IEC
`158022.
`802.118 It conformance statement for 302.1 E, it addresses definitions and protocols for
`system land management. Approved in 1993, it was incorporated into lSD/lEC 15302-4.
`002.1 P lEEE extension of 802.10. Specification for the use of MAC-layer bad es in filter-
`ing and eraseditiag maiticast traffic. Prioritization at traffic is accomphshed throng the addi
`tion of a Erbit, priority value in the home header. Eight topalogyindependent priority values
`(07) are specified, with all eight values mapping directly into 3024 and 002.6. Switches
`that support 002.1P and 802.10 pmvide a homework for bandwidth prioritization.
`Essentially what all these words mean is that you can assign a priority to the type of traf-
`fic with lEEE 302.1p class-ef-servico ((eS) wines and these allow network devices along
`the way to recognize and deliver highpriority traffic in a predictable manner. When can-
`glesticérarzuclcurs, 09$ drops lawpriarity traffic to allow delivery of higlrpriority traffic. See
`a so
`. 0.
`802.10 lEEE specification for implementation of ‘rllfitls in layer 2 LAN switches, with
`emphasis an Ethernet. Similar to 802.1P, prioritization of traffic is accomplished through
`an additional four bytes of data in the frame header. Most data fields in this addition to
`the header are specific to llLAhl apemtion. Also included is a field which provides the same
`3-bit priority flog specified in 002.1 P’s priorityvnapping scheme.
`in addition to canven
`
`18
`
`Page 7 of 7
`
`Facebook's Exhibit No. 1033
`
`Page 7
`
`
`
`Page 7 of 7
`
`Facebook's Exhibit No. 1033
`Page 7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket