`
`
`
`,1.”.wuwmm
`
`mum
`
`
`
`e Offic
`
`1al Diet
`
`EXHIBIT 1010
`
`lonary
`icatlons
`
`Telecom
`
`mun
`
`
`
`
`
`
`
`MICROSOFT CORP.
`
`
`
`N
`T
`DI !
`
`Th~
`Teleconi
`
`16th J
`
`NEWTON'S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`Email: Harry Newton@Technologylnvestor.com
`Personal web site: www.HarryNewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by Telecom Books
`An imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN # 1-57820-053-9
`
`Sixteenth Edition, Expanded and Updated, February 2000
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`Telecom Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: BOO-LIBRARY or 408-848-3854
`FAX: 408-848-5784
`Email: telecom@rushorder.com
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`
`
`l
`
`1
`
`NEWTON'S TELECOM DICTIONARY
`
`lnstabus 1080 and lnstabus 1480 Trademarks for
`MICOM's direct host attachment products.
`lnstallnk 1. An MCI International service that allows access
`to a host computer in the U.S.A. from a Telex machine any(cid:173)
`where overseas. This allows easier retrieval of information
`from a U.S. database.
`2. A trademark for MICOM's data-over-voice products.
`Installation The physical hook-up and diagnostic testing
`of a PBX switch, cabinet, or peripheral item prior to a cutover
`and maintenance acceptance by the maintaining vendor.
`Installed Base How many of whatever are in and working.
`Installed base is often confused with annual shipments.
`They're very different. Shipments is what goes out the factory.
`Installed base is what's out there. The equation Is: Installed
`base at beginning of year plus annual shipments less equip(cid:173)
`ment taken out of service during the year is equal to the
`installed base at the end of the year.
`Installer's Tone Also called test tone. A small box that runs
`on batteries and puts an RF tone on a pair of wires. If the techni(cid:173)
`cian can't find a pair of wires by color or binding post, they attach
`a tone at one end and use an inductive amplifier (also called a
`banana or probe) at the other end to find a beeping tone.
`Instance ID An ATM term. A subset of an object's attributes
`which serve to uniquely identify a MIB instance.
`lnstanet Trademark for MICOM's family of local data distri(cid:173)
`bution and data private automatic branch exchange (PABX)
`products.
`Instant Messaging I'm logged into the Internet. I load
`some software. It shows me that you're also logged into the
`Internet. I type you a message. You see it on your screen the
`moment I hit "send." You type your reply and send it. I see it.
`Bingo, a new Internet service that has come to be called
`"instant messaging." Instant messaging is essentially real(cid:173)
`time, on-line electronic mail. Instant Messaging started with
`software called ICQ, then America Online introduced its huge(cid:173)
`ly-popular variation (AOL Instant Messenger), then Microsoft
`introduced its software called MSN Messenger. As of writing,
`none of these softwares is compatible with the other. But there
`was talk in the trade press of eventual standards. There are
`serious reasons we need standards. Instant messaging is
`evolving into much more than a tool for sending typed mes(cid:173)
`sages to buddies online. Just as the original Web browsers
`revolutionized the way average users connect to Internet con(cid:173)
`tent, today's instant message screens are evolving into easy(cid:173)
`to-use connections for linking people at any given moment on
`the Internet via text, voice and video. All the new capabilities
`will be built on a single critical assumption: knowing that a
`person is onllne. That, in turn, makes it possible for electron(cid:173)
`ic merchants and providers of online services to reach Internet
`users with information or incentives -at the precise time they
`are able to react, namely when they are online in front of their
`screen, an easy target. Tools are being integrated Into instant
`messaging software that permit the immediate delivery of an
`increasing array of data that does not come from friends or
`family. America Online has unveiled a versiori of its Instant
`messaging software that automatically delivers tailored news
`headlines and stock quotes.
`Instant On Buy a PC (Personal Computer). Turn it on.
`Bingo, it's already loaded with Windows or OS/2. Instant On is
`a new term for preloading software onto hard disks of new
`computers and shipping those computers already pre-loaded
`with that software.
`Instantaneous Override Energy Function IOEF. A
`feature of the AT&T PBX Dimension Energy Communications
`435
`
`Service Adjunct (ECSA), which allows the user to turn all the
`ECSA energy functions ON or OFF. IOEF is most often used for
`periodic maintenance, or to adjust to sudden changes in
`weather.
`Institute for Telecommunications Sciences ITS is
`the research and engineering branch of the National
`Telecommunications and Information Administration (NTIA),
`which is part of the U.S. Department of Commerce (DoC).
`www.ntia.doc.gov See NTIA
`Instruction Register The register which contains the
`instruction to be executed and functions as the source for the
`subsequent operations of the arithmetic unit.
`Instructional Television Fixed Service ITFS. A ser(cid:173)
`vice provided by one or more fixed microwave stations oper(cid:173)
`ated by an educational organization and used mainly to trans(cid:173)
`mit instructional, cultural and other educational information to
`fixed receiving stations.
`Insulated Wire Wire which has a nonconducting covering.
`Insulating Materials Those substances which oppose
`the passage of an electric current through them.
`Insulation A material which does not conduct electricity but
`is suitable for surrounding conductors to prevent the loss of
`current.
`Insulation Displacement Connection IDC. The IDC
`has replaced wire wrap and solder and screw post terminations
`as the way for connecting conductors (I.e. wires carrying tele(cid:173)
`Insulation
`jacks, patch panels and blocks.
`to
`com)
`Displacement Connections are typically two sharp pieces of
`metal in a slight V. As the plastic-covered wire is pushed into
`these metal teeth, the teeth pierce the plastic jacket (the insu(cid:173)
`lation) and make connection with the inside metal conductor.
`This saves the installer having to strip off the conductor's insu(cid:173)
`lation. This saves time. Since IDCs are very small, they can be
`placed very close together. This reduces the size of jacks,
`patch panels and blocks. lDCs are the best termination for high
`speed data cabling since a gas-tight, uniform connection is
`made. The alternate method of connecting wires is with a
`screw-down post. There are advantages and disadvantages to
`both systems. The IDC system, obviously, is faster and uses
`less space. But it requires a special tool. The screw system
`takes more time, but may produce a longer-lasting and
`stronger, more thorough (more of the wire exposed) electrical
`connection. The most common IDC wiring scheme is the 66-
`block, invented by Western Electric, now Lucent. But there are
`from other telecom manufacturers. See
`other systems -
`Punchdown Tool.
`Insulation Resistance That property of an insulating
`material which resists electrical current flow through the insu(cid:173)
`lating material when a potential difference is applied.
`Insulators Some atoms hold onto their electrons tightly.
`Since electrons cannot move freely these material can't easily
`conduct electricity and are know as non-conductors or insula(cid:173)
`tors. Cammon insulators include glass, ceramic, plastics,
`paper and air. Insulators are also called dielectrics.
`INT Induction Neutralizing Transformer. A specially designed
`multipair longitudinal inductor that is spliced into a wireline
`facility to substantially reduce low frequency steady-state or
`surge induced voltages and currents that may be causing
`noise, equipment malfunctions and/or damages or creating a
`personnel safety hazard. See TEN.
`IHfl 4 A software interrupt designed to communicate with the
`com (serial) port in a PC. Communications programs use
`interrupt 14h to talk to a modem physically attached to anoth(cid:173)
`er computer on the network.
`
`
`
`.:,f'?"
`:,.1
`
`·;:1
`
`.,
`
`ack
`
`It's
`ice,
`
`:ept
`the
`IDB
`1eir
`
`~e).
`ISS-
`
`: or
`
`ling
`
`nee
`lig-
`Nilh
`~- a
`
`unk
`
`)her
`
`I
`
`lime
`I I tale
`) as
`~ols,
`to
`go-
`1rom
`I
`I I
`,tate.
`
`lcell
`-ame
`
`f Ing
`
`on-
`~Ing
`
`~rical
`rhe
`ver-
`
`f.~ our
`
`uar-
`the
`
`rng
`ions
`rlM
`nge
`
`efers
`•ents
`!low
`ely, ·
`that
`
`. - - - - - - - - - - - - - - - - - - - - - - - - - -
`
`NEWTON'S TELECOM DICTIONARY
`
`compresses information within a single frame. Compare to
`lnterframe Coding.
`lntraLATA Telecommunications services that originate and
`terminate in the same Local Access and Transport Area. See
`also Local Access and Transport Area. This can be either
`Interstate or Intrastate service, traffic or facilities.
`lntramodal Distortion In an optical fiber, the distortion
`resulting from dispersion of group velocity of a propagating
`mode. It is the only form of multi mode distortion occurring
`in single-mode fibers.
`Intranet A private network that uses Internet software and
`Internet standards. In essence, an Intranet is a private Internet
`reserved for use by people who have been given the authori(cid:173)
`ty and passwords necessary to use that network. Those peo(cid:173)
`ple are typically employees and often customers of a compa(cid:173)
`ny. An Intranet might use circuits also used by the Internet or
`it might not. Companies are increasingly using lntranets -
`to give their employees easy access
`internal Web servers -
`to corporate information.
`According to my friends at Strategic Networks Consulting,
`Bolled down to its simplest, an Intranet is: a private network
`environment built around Internet technologies and standards
`predominantly the World Wide Web. The primary user
`-
`interface, called a Web browser, accesses Web servers locat(cid:173)
`ed locally, remotely or on the Internet. The Web server is the
`heart of an Intranet, making selection of Web server software
`a crucial decision, even though much fanfare has focused on
`browsers (Netscape's Navigator vs. Microsoft's Explorer).
`At its core, a Web server handles two arcane languages
`(HTML and CGI) that are the meat and potatoes of generating
`Web pages dynamically, making connections and responding
`to user requests. But in the rush to dominate the potentially
`lucrative Intranet market, these simple Web functions are
`being bundled into operating systems and vendors are now
`touting pricey "Intranet suites" which encompass everything
`from database and application interfaces, to e-mail and news(cid:173)
`groups, to the kitchen sink.
`Most medium- or larger-sized companies will need more than
`just a handful of simple Web servers to deploy a reasonably
`robust Intranet. To help a company post current job openings,
`or make up-to-date product specs and available inventory
`accessible by traveling sales reps, an Intranet needs the fol(cid:173)
`lowing capabilities:
`• Database access. Getting at critical data housed in corpo(cid:173)
`rate databases can be accomplished via generic, universal
`ODBC linking or based on "native" links directly to Sybase,
`Oracle et al. allowing use of all the database's features.
`• Application hooks. Used by developers, a standard pro(cid:173)
`gramming interface (API) allows outside applications like
`Lotus Notes to interact with Web data and vice versa. In addi(cid:173)
`tion, proprietary APls exist- most notably Microsoft's ISAPI
`(for "Internet Server API") which lets developers link directly
`to Microsoft applications.
`• User publishing. In addition to dialogues via chaVnews(cid:173)
`group/bulletin board features, users will want to post their
`own content on Web servers without having to attain
`Webmaster status.
`• Search vehicles. How does an engineer find the current
`specs on Project #686-2 among thousands of pages spread
`across a bunch of Web servers? The answer: an indexing and
`search engine that creates an internal Yahoo! for your own
`Web sites.
`• Admin/management. A catch-all for loads of important, but
`still ill-conceived features for managing access, users, con-
`
`HTTP
`NFS
`IMAP4/SMTP
`DNS/NIS+
`DNS/LDAP
`Bootp/DHCP
`SNMP
`IIOP (CORBA)
`
`tent and the servers themselves. Intranet administrators are
`currently fascinated with analyzing Web server logs which
`contain data of some sort, including user connections and
`page activity.
`According to a while paper released by Sun Microsystems in
`the summer of 1996, the basic infrastructure for an intranet
`consists of an internal TCP/IP network connecting servers
`and desktops, which may or may not be connected to the
`Internet through a firewall. The Intranet provides services to
`desktops via standard open Internet protocols. In addition to
`TCP/IP for basic network communication, these also include
`protocols for:
`Browsing
`File Service
`Mail Service
`Naming Service
`Directory Services
`Booting Services
`Network Administration
`Object Services
`See also Extranet and Intranet.
`lntranodal Service lntranodal service is a feature of
`some central office switches and smaller remote switches. It
`means that it will continue to switch in which
`lntranode Communications path which originates and ter(cid:173)
`minates in the same node.
`Intraoffice Call A call involving only one switching system.
`Intraoffice Trunk A telephone channel between two
`pieces of equipment within the same central office.
`lntrapreneur An entrepreneur who works inside a big
`company. Hence, intra, as in inside. It's hard to imagine it
`actually happening. But the word has became popular as a
`way for large companies to motivate their employees to take
`personal career risks and introduce new products.
`Intrastate Services, traffic or facilities that originate and
`terminate within the same state. Therefore, if related to tele(cid:173)
`phone, falling under the jurisdiction of that state's telephone
`regulatory procedures.
`lntrastructure A term coined by "Data Communications"
`and referring to the software, hardware, and Internet services
`underlying a corporate Intranet.
`Intrinsic Joint Loss That loss in optical power transmis(cid:173)
`sion, intrinsic to the optical fiber, caused by fiber parameters,
`e.g., dimensions, profile parameter, mode field diameter, mis(cid:173)
`matches when two non identical fibers are joined.
`Intrinsics Intrinsics are a component of many windows
`toolkits. The windows toolkit intrinsics definition has been
`developed by the MIT X Consortium. The intrinsics define the
`function of specific graphical user interface and window
`objects. They do not define any particular look or feel, just the
`function. Example: A pull down menu intrinsic would define
`the function of a pull down menu within a toolkit but not the
`appearance of it.
`Intrusive Test Breaking a circuit in order to test its func(cid:173)
`tionality. Testing intrusively will drop service on the circuit.
`IHTUG International Telecommunications Users Group.
`lntumescent Firestop A firestopping material
`expands under the influence of heat.
`Inverse ARPA See Reverse DNS.
`Inverse Fourier Transform Inversion of Fourier trans(cid:173)
`form to convert frequency representation of signal to time rep(cid:173)
`resentation.
`Inverse Multiplexer 1-Mux. An inverse multiplexer per(cid:173)
`forms the inverse function of a multiplexer. "Multiplexer"
`
`that
`
`451
`
`
`
`1e point in time a
`, computer tele(cid:173)
`,a lly be no more
`, 3 seconds 99%
`1sed to illustrate
`load. Wt1en the
`r than the above
`1city. Ot'course
`y mimic the reai
`s largely mean(cid:173)
`one, president
`iuter telephony
`
`•ing is the tech-
`1rocessing nor(cid:173)
`itworking, load
`1en connecting
`nd Token Ring
`·k) link such as
`es the need for
`each serving a
`
`he goal of load
`1xceed its busy
`ng conditions,
`ll steps until it
`the system is
`1yond its load?
`-low is service
`acefu/ or must
`1 system reset
`inderstand the
`osl significant
`oad testing. II
`Jhony system
`1e system will
`ins. See also
`
`loading coils
`le distortion.
`
`ty of a phone
`I lines. What
`I loop circuit
`ding "tunes"
`500 Hz) and
`I bandwidth.
`I removed if
`;/usive/y on
`
`local loops
`les for wire
`1s. Loading
`ces, as dis-
`se used for
`
`A group of
`1d similarly
`
`r loading a
`t) program
`lnder DOS,
`device dri-
`Y memory
`
`NEWTON'S TELECOM DICTIONARY
`
`managers use their own routines to load high, though they
`can sometimes borrow DOS commands.
`Lo!ldlng Pl,m A telep/1one company term. A Loading Plan
`is a systematic scheme for fully utilizing all existing capacity
`in a given switching entity; Utilizing and coordinating the
`capabilities and capacity limitations of various entities in a
`multi-entity wire center and maintaining objective service lev(cid:173)
`els al all times. A Loading Plan is the basis for achieving and
`retaining good Load Balance.
`LO( An ATM term. Loss of Cell Delineation: A condition al the
`receiver or a maintenance signal transmitted in the PHY over(cid:173)
`head indicating that the receiving equipment has lost cell
`delineation. Used to monitor the performance of the PHY layer.
`Local Pertaining to a system or device that resides within a
`subject device's switching domain.
`Local Access The connection between a customer's premis(cid:173)
`es and a point of presence of the Exchange Carrier.
`Local t\.uess and Transport Area LATA. The MFJ
`(Modified Final Judgement), which broke up the Bell System,
`also defined 196 distinct geographical areas known as LATAs.
`Tile LATA boundaries generally were drawn in consideration
`of SMSAs (Standard Metropolitan Statistical Areas), which
`were defined by the Census Bureau lo identify "communities
`of interest" in economic terms. Generally speaking, the LATA
`boundaries also were coterminous witl1 state lines and exist(cid:173)
`ing area code boundaries, and generally included the territo(cid:173)
`ry served by only a single RBOC. The basic purpose of the
`LATA concept was to delineate the serving areas reserved for
`LEC (Local Exchange Carrier) activity. In other words,
`lntraLATA traffic (ie., local and local long distance) became
`the sole right and responsibility of the LECs. lnterLATA traffic,
`on ttie other hand, became the sole right and responsibility of
`the IXCs. Over time, a number of stale PUCs allowed the IXCs
`to compete for lntraLATA long distance; they also allowed
`CAPs (Competitive Access Providers) to provided limited
`the LECs. The
`in competition with
`local service
`Telecommunications Act of 1996 (The Act) opened the flood(cid:173)
`gates for competition with the LATA boundaries. The Act also
`allows the RBOCs to provide lnterLATA service outside the
`states in wt1ich they provide local service. Additionally, The
`Act contains provisions for the RBOCs to offer lnterLATA ser(cid:173)
`vice within the stale in which they provide local service, once
`they have satisfied a 14-point checklist, the most significant
`conditions of which relate to significant, demonstrated levels
`of competition within their respective local exchange serving
`areas. California is divided into 10 LATAs. Sparsely populat(cid:173)
`ed states such as South Dakota comprise only a single LATA
`local Airtime Detail Tl1is cellular le/epl1one carrier
`option (which means it costs money) provides a line-item(cid:173)
`ized, detailed billing of all calls, including call attempts and
`incoming calls lo the mobile. Whal you get for free is gener(cid:173)
`ally a non-detailed, total summary of all calls.
`Local Area And Transport Area See LATA.
`Local Area Data Transport LADT. A service of your
`local phone company which provides'you, the user, with syn(cid:173)
`chronous data communications.
`Local Area Network LAN. A short distance data commu(cid:173)
`nications network (typically within a building or campus) used
`to link computers and peripheral devices (such as printers, CD(cid:173)
`ROMs, modems) under some form of standard control. Older
`data communications networks used dumb terminals (devices
`with no computing power) to talk to distant computers. Bui the
`economics of computing changed with the invention of the per(cid:173)
`sonal computer which l1ad "intelligence" and which was cheap.
`501
`
`and
`after PCs -
`LANs were invented as an afterthought
`were originally designed to let cheap PCs share peripherals -
`like laser printers - which were too expensive to dedicate to
`individual PCs. And as lime went on, what LANs were used for
`got broader and broader. Today, LANs have four main advan(cid:173)
`tages: 1. Anyone on the LAN can use any of the peripheral
`devices connected to the LAN. 2. Anyone on the LAN can
`access databases and programs running on client servers
`(super powerful PCs) attached to the LAN; and 3. Anyone on
`the LAN can send messages to and work jointly with others on
`the LAN. 4. While a LAN does not use common carrier circuits,
`it may have gateways and/or bridges to public telecommunica(cid:173)
`tions networks. See LAN Manager, Token Ring and Ethernet.
`local Areu Slgnallng Services LASS is a group of cen(cid:173)
`tral office features provided now by virtually all central office
`switch makers that uses existing customer lines to provide
`some extra features lo the end user (typically a business user).
`They are based on delivery of calling party number via the local
`signaling network. LASS can be implemented on a standalone
`single central office basis for intra office calls or on a multiple
`central office grouping in a LATA (what the local phone compa(cid:173)
`nies are allowed to serve) for interoffice calls. Local CCS7
`(Common Channel Signaling Seven) is required for all config(cid:173)
`urations. The following features typically make up LASS:
`Automatic Callback: Lets the customer automatically call the
`last incoming call directory number associated with the cus(cid:173)
`tomer's phone when both phones become idle. This feature
`gives the customer the ability lo camp-on to a line.
`Automatic Recall: Lets the customer automatically call the last
`outgoing call currently associated with the customer's station
`when bot11 stations become idle. This feature gives the cus(cid:173)
`tomer the ability lo camp-on lo a line.
`Customer-Originated Trace: Lets the terminating party request
`an automatic trace of the last call received. The trace includes
`the calling line directory number and time and date of the call.
`This information is transmitted via an AM IOP channel to a
`designated agency, such as the telephone company or law
`enforcement agency.
`Individual Calling Line Identification: Consists of two distinct
`features:
`1. Calling Number Delivery which transmits data on an
`incoming call lo the terminating phone. 1. Directory Number
`Privacy which prevents delivery of the directory number to lhe
`terminating phone.
`Also, LASS has some selective features:
`Selective Cal I Acceptance: Allows users to restrict which
`identity
`incoming voice calls can terminate, based on the
`attribute of the calling party. Only calls from parties identified
`on a screening lists are allowed to terminate. Calls from parties
`not specified on a screening /Isl are rerouted to an appropriate
`announcement or forwarded to an alternate directory number.
`Selective Call Forwarding: Allows a customer to pre-select
`which calls are forwarded based on the identity attribute of the
`calling party.
`Selective Call Rejection: Allows a customer lo reject incoming
`voice calls from identity attributes which are on the customer's
`rejection /isl. Call attempts from parties specified on the rejec(cid:173)
`tion list are prevented from terminating lo the customer and are
`routed to an announcement which informs the caller that
`his/her cal I is not presently being accepted by the called party.
`Selective Distinctive Alert: Allows a customer to pre-select
`which voice calls are lo be provided distinctive alerting treat(cid:173)
`ment based on the identify attributes of lhe calling party.
`Users can, al their convenience, activate or modify any of
`
`
`
`I,
`
`NEWTON'S TELECOM DICTIONARY
`
`Social Computing A term that emerged in the summer of
`1993. Defined by Peter Lewis in the New York Times of
`September 19, 1993, social computing is a "communica(cid:173)
`tions-rich brew," which is "expected to create new ways for
`businesses and their customers to communicate, over new
`types of wireless as well as wired pathways, using new types
`of computers called personal communicators." According to
`Peter Lewis, "The rise of social computing is expected to shift
`the emphasis of computing devices away from simple num(cid:173)
`ber crunching and data base management to wider-ranging
`forms of business communications .. .Where client server
`broke away from mainframe-based systems and distributed
`computing power to everyone in the organization, social com(cid:173)
`puting goes the next step and extends the distribution of com(cid:173)
`puting power to a company's customers."
`Social Contract An arrangement between the local tele(cid:173)
`phone company and its local regulatory authority whereby the
`telephone company's services are detariffed, .but cannot be
`priced at less than cost. Quality of service standards apply.
`Social Engineering Gaining privileged information about
`a computer system (such as a password) by skillful lying -
`usually via a phone call. Often done by impersonating an
`authorized user.
`Socket 1. A synonym for a port.
`2, A technology that serves as the endpoint when computers
`communicate with each other.
`3. The socket in a PC which is responsible for accepting a
`PCMCIA Card and mapping the host's internal bus signals to
`the PCMCIA interface signals.
`4. An operating system abstraction which provides the capa(cid:173)
`bility for application programs to automatically access com(cid:173)
`munications protocols. Developed as part of the early work on
`TCP/IP.
`Socket Interface The Sockets Interface, introduced in the
`early 1980s with the release of Berkeley UNIX, was the first
`consistent and well-defined application programming inter(cid:173)
`face (API). It is used at the transport layer between
`Transmission Control Protocol (TCP) or User Datagram
`Protocol (UDP) and the applications on a system. Since 1980,
`sockets have been implemented on virtually every platform.
`Socket Number In TCP/IP, the socket number is the join(cid:173)
`ing of the sender's (or receiver's) IP address and the port
`numbers for the service being used. These two together
`uniquely identifies the connection in the Internet.
`Socket Services The software layer directly above the
`hardware that provides a standardized interface to manipulate
`PCMCIA Cards, sockets and adapters. Socket Services is a
`BIOS level software interface that provides a method for
`accessing the PCM CIA slots of a computer, desktop or laptop
`(but most typically a laptop). Ideally, socket services software
`should be integrated into the notebook's BIOS, but few man(cid:173)
`ufacturers have done so to date. For PCMCIA cards to oper(cid:173)
`ate correctly you also need Card Services, which is (not are)
`a software management interface that allows the allocation of
`system resources (such as memory and interrupts) automati(cid:173)
`cally once the Socket Services detects that a PC Card has
`been inserted. You can, however, happily operate PCMCIA
`cards in your laptop without using socket and card services.
`You simply load the correct device drivers for those cards.
`Such drivers always come with PCM CIA cards when you buy
`the cards. You will, however, have to load new drivers every
`lime you change cards and allocate the correct memory exclu(cid:173)
`sions. You will have to reboot if you disconnect your network
`card. Theoretically, with socket and card services loaded, you
`
`do not have to reboot every time you change cards. My expe(cid:173)
`rience is that this works, except with network cards, which
`cannot be hotswapped. See PCMCIA.
`Sockets An application program interface (API) for commu(cid:173)
`nications between a user application program and TCP/IP.
`See Socket and Socket Number.
`SOCKS A circuit-level security technology developed by
`David Koblas in 1990 and since made publicly available by
`the IETF (Internet Engineering Task Force. SOCKSv5, the cur(cid:173)
`rent version, provides security in a client/server environment,
`running at the Session Layer, Layer 5 of the OSI Reference
`Model. SOCKSv5 supports multiple means of authentication,
`negotiated between client and server over a virtual circuit, and
`on a session-by-session basis. SOCKSv5 also supports the
`transfer of UDP data as a stream, avoiding the need to treat
`each packet of UDP data as an
`independent message.
`SOCKSv5 also allows protocol filtering, which offers
`enhanced access control on a protocol-specific basis. For
`example, a network administrator can add a SMTP (Simple
`Mail Transfer Protocol) filter command to prevent hackers
`from extracting from a mail message information such as a
`mail alias. Reference implementations exist for most UNIX
`platforms, as well as Windows NT. The cross-platform nature
`of SOCKS offers portability to Macintosh and other operating
`systems and browsers. According
`to Network World
`Magazine, September 27, 1999, "the latest version of
`SOCKSv5 offers network managers an easier way to run
`videoconferencing and video and audio streaming through
`firewalls, which has been difficult and time-consuming.
`Socksv5 does this by providing a single and powerful method
`of authenticating users and managing security policies for all
`Internet applications, including multimedia." SOCKSv5 also
`interoperates on top of IPv4, IPsec, PPTP, L2TP and other
`lower-level protocols.
`SOF Start Of File
`Soft Copy 1. A copy of a file or program which resides on
`magnetic medium, such as a floppy disk, or any form that is
`not a hard copy - which is paper.
`2. Old legacy systems term reapplied to distributed comput(cid:173)
`ing in which reports are created on-screen from data residing
`within different applications.
`Soft Decision See SISO.
`Soft Ferrite Ferrite that is magnetized only while exposed
`to a magnetic field. Used to make cores for inductors, trans(cid:173)
`formers, and other electronic components. See Barium
`Ferrite, Ferrite and Hard Ferrite.
`Soft Font A font.usually provided by a font vendor, that
`must be installed on your computer and sent to the printer
`before text formatted in that font can be printed. Also known
`as downloadable font.
`Soft Handoff A cellular radio term. A soft handoff is a
`handoff between cell sites that involves first making the con(cid:173)
`nection with the new cell site before breaking the connection
`with the previous cell site. A hard handoff, or "break and
`make" handoff, is not noticeable in a voice conversation, but
`has disastrous impact on a data communication. See also
`Hard Handoff.
`Soft Input-Soft Output See SISO.
`Soft Key There are three types of keys on a telephone: hard,
`programmable and soft. HARD keys are those which do one
`thing and one thing only, e.g. the touchtone buttons 1, 2, 3, *
`and # etc. PROGRAMMABLE keys are those which you can
`program to do produce a bunch of tones. Those tones might
`be "dial mother." They might be "transfer this call to my home
`
`783
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`• Dealing with the various vendors and providers, including
`verifying and paying the bills.
`• Preparing and managing the Telecommunications budget.
`• Keeping abreast of changes in technology, services, indus(cid:173)
`try structure, and rates.
`• Assisting company management in developing a corporate
`telecommunications policy that meets business objectives.
`• Developing and implementing company telephone and
`telecommunications procedures for efficient and cost effective
`use, and training company employees in these procedures.
`• Upgrading, procurement, selecting,· contracting, or pur(cid:173)
`chasing a system, new system, equipment, or services.
`• Planning and analyzing for growth, new requirements, or
`future functionality.
`The goal of the TCM is to provide good telecommunications
`services for an organization and its employees at the lowest
`possible cost. This definition courtesy, Robert J. Perillo,
`Perillo@dockmaster.ncsc.mil.
`ICN Collective Number Group Table.
`ICNS Thomas Conrad Networking System is a