throbber
NEWTON'S
`ait
`‘DICTIONARY
`
`Edition
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`e IP Telephony * LANs & Intranets * Call Centers & Computer Telephony
`
`e Fiber Optics, SONET and DWDM « Satellites
`NTMICM ECR MUTTutenTier
`
`andWirelessTelecom*VolP«7-1,T-3,1-4, E-1,
`
`Se DYE caeMere eMC Sion el
`PCS & GSM © Windows 95, 98, NT, NetWare,
`Apple, Sun & Unix Networking * Ecommerce
`
`Updated
`
`|Bin
`
`Expanded
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 001
`Page 001
`
`

`

`
`
`——s.ies—_— _—
`
`ireGe
`———————————
`
`NEWTON’s TELECOM DICTIONARY
`
`copyright © 1999 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,including the right to reproducethis
`book or portions thereof in any form whatsoever.
`
`Publishedin the United States by
`Miller Freeman, Inc.
`Tenth floor
`12 West 21 Street
`;
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-031-8
`
`February, 1999
`
`Manufactured in the United States of America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Roldan and Regula Hoffman
`Matt Kelsey, Publisher
`Christine Kern, Manager
`
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 002
`Page 002
`
`

`

`
`
`LTT'™'’CTTTT??CZCTCT
`
`NEWTON'S TELECOM DICTIONARY
`
`International service which provides cablegram communica-
`tion to International destinations through the use of a com-
`puterized message switching center in New YorkCity,
`Calbleheaed The point where a marine cable connects to ter-
`restrial facilities.
`CableLalbs Cable Television Laboratories, Inc. A research
`and development consortium of cabletelevision system oper-
`alors established in 1988. CableLabs plans and funds
`research and developmentprojects to help member compa-
`nies and the cable industry take advantage of opportunities
`and meet challenges in the telecommunications industry. A
`good deal of emphasis is placed on digital cable and cable
`modem technologies. www.cablelabs.com
`Cuhleport
`Inte! Corporation's new technology, which
`brings high speed multimedia-rich interactive services to per-
`sonal computers in the homevia cable,
`Cablesjan A Tellabs Operations, Inc, product which deliv-
`er two-way voice and data services over coaxial cable used by
`cable TV operators.Tellabsis in Lisle, Illinois.
`Calbleway An opening in a work surface that allows access
`to cords or cables from below, or mounting of an electrical
`receptacle or telephone jack. Cablewaystypically cone with
`removable plastic grommets.
`Cabling The combination of all cables, wire, cords, and
`connecting hardware installed. A term used to refer collec-
`tively to the installed wiring in a given space.
`CABS Carrier AccessBilling Specifications
`CABS BOS Carrier Access Billing Specifications - Billing
`Output Specifications
`in
`CAC 1. Carrier Access Code. The digits you must dial
`North America to reach the long distance carrier of your
`choice. Those digits fit the following format 101XXXX.
`2, Customer Administration Center. A typeof terminal used by
`a PBX user to maintain and troubleshoot his PBX.
`3. Connection Admission Control
`is defined as the set of
`actions taken by the network during the call setup phase (or
`during call re-negotiation phase) in order to determine whether
`a connection request can be accepted or should berejected (or
`whether a requestforre-allocation can be accomplished).
`CACH Call Appearance Call Handling.
`Calne From the French “cacher,”whichtranslates “to press or
`hide,”especially in termsof tools or provisions, In the context
`of computer systems and networks, information is cached by
`placing it closer to the user or userapplication in order to make
`it more readily and speedily accessible, and transparently so.At
`the same time,information whichis cached placeslessstain on
`limited computer 1/0 (Input/Output) resourcesand limited net-
`work resources.Let's consider two specific definitions, the first
`of whichrelates to computer systems and the second of which
`relates to computer networks. Let's also consider a combination
`ofthefirst two, in the context of the Internet.
`1. In the context of a computer system, cache memory gener-
`ally is a partition of SRAM (Static Random Access Memory).
`Since much of computing |s highly repetitive or predictable in
`nature, and since solid state components(silicon chips) are
`muchfaster than mechanical disk drives, the speed of infor-
`mation access can be enhancedif certain information can be
`stored in RAM. That information typically is in the form of
`program information, memory addresses, or data. Thereby,
`the information can be stored in anticipation of your needfor
`it, and can be presented to you faster than if the computer
`needed to access the hard drive through the execution of an
`/0 function, The cache memorysits (logically and, perhaps
`physically) between the CPU and the main memory (RAM),
`
`|
`
`Caching works because of a phenomenon knownasthe local-
`ity principle which’states that a von Neumann CPU (i.¢., one
`that performs instructions and makes database calls sequen-
`tially, one after another) tends to access the same memor
`locations over and over again. A cache workslike this. When
`the CPU needs data from memory, the system checksto see
`if the information is already in the cache. If itis, it grabs thal
`information; this is called a cache hit.
`If it isn't,it's called a
`. cache miss and the computer has tofetch the information by
`accessing the main memory or hard disk, which is slower
`Dala retrieved during a cache miss is often written into the
`cachein anticipation of further needfor it. Let's assumethat
`you open a CD-ROM application with hyperlinks. As the sys-
`tem can reasonably assume that you will exercise the hyper-
`link options, the information associated with them can be
`stored in cache memory.
`If you do,
`indeed, exercise those
`options,its a cache hit and the data is there waiting for you.
`The cache also will hold information that you recently
`accessed,
`in anticipation of your wanting to back up, or
`accessit again. Caching can take place through partitioned or
`segmented cache memory, which can be in the form of Li
`(Level 1) primary cache and L2 (Level 2) secondary cache.L1
`cache memory is accessedfirst, L2 second, the main memo-
`ry (RAM) and then hard drive last. Also, one cache might hold
`program instructions and the other might hold data, Generally
`when the cacheis exhausted,it is flushed and the data is writ-
`ten back to main memory, to be replaced with the next cache
`according to a replacement algorithm. Cache freshing and
`flushing mechanism is designed differently by different ven-
`dors. It behavesslightly different. Howeverit mainly depends
`on main memory type,
`like write back or WB, write through
`WT, write protected or WT, write combining or WC and
`uncached or UC. See also Cache Memory.
`2.In the context of a computer network such as a LAN,or the
`combination of the Internet and World Wide Web,data can be
`cached in a server which is close to you.
`In anticipation of
`your imminent requestfor that data in a logical sequenceof
`data access,it will be transmitted frorn the main server to the
`remote server. Thereby, the data is accessible to you more
`quickly than if it had to be transmitted across the entire net-
`work each time you had a need for it. Should you access 4
`certain set of data frequently,
`it might be permanently stored
`on a server in proximity, and refreshed by the main server
`from time to time in order to ensure its currency (i.e. that it
`remains up to date),
`3.
`In the context of an Internet client/server application,
`caching really showsits stuff. First, the network uses distrib-
`uted cache servers to house the WWW information that users
`in your region use frequently. As you access a Website, your
`speed of access and response is improved because the data
`is housed on a server closer to you, The data then is loaded
`into cache memory on your client computer workstation. AS
`you move forward, from page to page andlink to link, your
`client caches the information provided by the cache serve,
`with all of this happening in anticipation of your next move.
`As you move backward, the samething happens,in anticipa-
`tion of that next move, as well. Just in case you don’t believe
`the client side of
`this story, go to Internet Explorer of
`Netscape, and click on cache.(Thefastest wayto regain space
`on yourhard diskis to flush the cache which these programs
`dump
`to your hard disk.)
`Cache Coherency Managing a cache so that data is nol
`lost or overwritten. See also Cache.
`Cache Controller A chip, such as the Intel 82385, thal
`
`126
`
`<
`manages the retrieval,
`from memory or the har
`in either clients or serve
`Codhe Engime A ca
`speed dedicatedInternet
`caching and retrieval. W
`cache engine locally sti
`text, When another user|
`content
`is pulled from
`improves download time
`use on the network. Here
`from Cisco, which maki
`work? The cache engine
`which redirects Web rec
`Web Cache ControlProt
`of Cisco IOS software. 1
`ing of traffic across mult
`tolerant, fail-safe opera
`caching? By reducing th
`on overburdened Web :
`benefits to ISPs, enterp
`benefits include cost s
`usage and dramatic imp
`users. The cache engine
`with a simple method|
`through URLfiltering. S
`Cache Mit When the
`Thus you don't haveto ;
`puting is faster, See Cac
`Cache Memory Avai
`or SRAM (Static RAM) |
`er to “remember” stuff
`wants that information,
`searching through a s
`process. This high spe:
`wait state. When the C
`copyof this data is stort
`the CPU reads the same
`lhe cache memory ins
`NetWare, for example,
`server accesstime.In |
`directory andfile cache
`Table), the turbo FAT,
`tl
`other functions. See als
`Cache Miss Whentt
`and you haveto read yi
`reading it from the cact
`Hit and Cache Memory
`Caching A process by
`Ory or server in anticip
`See Cache for a full ext
`CAD 1, Computer Aide
`2. Computer Aided De:
`ware and terminals us
`might be as simple a
`COmplex as detailed |
`Systems offen haveter
`tral maxi-computer in
`D terminals are of
`Works) or through tel
`often moved, thus hav
`Switching system —
`extremely useful.
`CAD/CAM Comput
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 003
`Page 003
`
`

`

`NEWTON'S TELECOM DICTIONARY
`
`slient/server application,
`the network uses distrib-
`W information that users
`i access a Website, your
`proved because the data
`The data then is loaded
`omputer workstation. As
`ge and link to link, your
`jed by the cache server,
`ation of your next move,
`hg happens,in anticipa-
`in case you don't believe
`to Internet Explorer or
`stest way to regain space
`ye which these programs
`
`‘ache so that data is nol
`
`.al|
`Tenon known as the loca |
`mariages the retrieval, storage and delivery of data to and
`Manufacturing. See CAD.
`CADB Calling Area Data Base. An MCI definition. An MCI
`rom memory OF the hard disk. Cache controllers may reside
`Neumann CPU (j,2,, 9
`System that stores reference data for various MC! Systems
`in eilher clients or servers. See also Cache.
`28 database calls sequen,
`and reconciles MCI Calling Areas with those of Bell.
`ache Engine A cache engine is a carrier-class, high-
`iccess the same mem
`Caddy The shell of an optical disc. Protectsit from grubby
`he works like this, Whey
`ggeed dedicated Internet appliance that performs Web content
`fingerprints, and includes write protection devices, AKA case.
`ing and retrieval. When a user accesses aWeb page,the
`the system checks to ga,
`Cademee In voice processing, cadence is used to refer to the
`cache engine locally stores the page's graphics and HTML
`ache. If itis, it grabs tha
`pattern of tones and silence intervals generated by a given
`vit.
`If it isn't,
`it's called
`text, When anotheruser later requests the same Web page, the
`audio signal. Examples are busy andringing tones. A typical
`content
`is pulled from the cache engine. This process
`) fetch the information
`cadence pattern is the US ringing tone, which is one second
`improves download time for the user and reduces bandwidth
`rd disk, which is slow;
`of tone followed by three seconds of silence. Some other
`yse on the network. Here is a an explanation of a cache engine
`i
`ls often written into the
`countries, such as the UK, use a double ring, which is two
`1 for it. Let's assume tha
`om Cisco, which makes one. How doesthe cache engine
`short tones within about a second, followed byalittle over
`th hyperlinks,As the sys.
`work? The cache engine communicates with a Cisco router,
`two secondsofsilence.
`J will exercise the hyper.
`which redirects Web requests to the cache engine using the
`CADS Code Abuse Detection System.
`Web Cache Control Protocol (WCCP), a new standard feature
`siated with them can te
`CAE Computer Aided Engineering.
`of Cisco 10S software. The WCCP also enables load balanc-
`1, Indeed, exercise those
`Cage Antenna An antenna having conductors arranged
`i ls there waiting for yoy
`ing of traffic across multiple cache engines and ensuresfault-
`ation that you recently
`cylindrically.
`tolerant, fail-safe operation. What are the benefits of Web
`CAGR Compound Annual Growth Rate.
`caching? By reducing the amountof traffic on WAN links and
`wanting to back up, o-
`CAI 1. Computer Assisted Instruction. Commonly known as
`on overourdened Web servers, caching provides significant
`ice through partitioned o
`CBT (Computer Based Training). See CBT. See also CAD for
`benefits to ISPs, enterprise networks and end users. Those
`‘an be in the form of ly
`a discussion on telecom needs.
`benefits include cost savings due to a reduction on WAN
`3l 2) secondary cache, [4
`the interface
`2. Common Air
`Interface. A standard for
`usage and dramatic improvements in response times for end
`second, the main memo-
`between a radio network and equipment. A CAI allows mul-
`users. The cache enginealso provides network administrators
`so, one cache might hold
`tiple vendors to develop equipment, such as radio terminal
`right hold data. Generally
`with a simple method to enforce a site-wide access policy
`devices (e.g., cordless phones, cellular phones and PCS
`shed and the data is writ.
`through URLfiltering. See also Cache.
`terminals) and base stations (e.g., cellular antenna sites),
`Cache Hit When the data you want is actually in cache,
`laced with the next cache
`which will
`interoperate. The yield is a competitive (read
`hm. Cache freshing and
`Thus you don't have to access yourhard disk and your com-
`less expensive) market
`for equipment. The British
`ferently by different ven-
`puting is faster. See Cache, Cache Miss and Cache Memory.
`CT2/Telepoint system incorporated one of
`the first CAI
`yweverit mainly depends
`Cache Memory Available RAM (Random Access Memory)
`ick or WB,write through
`standards. See also CT2.
`or SRAM (Static RAM) that you set up to allow your comput-
`CALC Customer Access Line Charge. Also known variously
`combining or WC and
`er to “remember” stuff — so the next time your computer
`as Access Charge, EUCL (End User Line Charge), and SLC
`wants that information, it can find it fast from RAM,instead of
`amory.
`(Subscriber Line Charge). See Access Charge,
`ark such as a LAN,or the
`searching through a slower hard disk I/O (Input/Output)
`CALEA Communications Assistance for Law Enforcement Act
`d Wide Web, data can be
`process. This high speed cache memoryeliminates the CPU
`1994.
`Q you.
`In anticipation of
`wait state. When the CPU reads data from main memory, a
`Calendar Rowfing A call center term for directing calls
`in a logical sequenceof
`copy of this data is stored in the cache memory. The next time
`according to the day of the week and time of day. See also
`om the main server to the
`the CPU reads the same address, the data is transferred from
`SOURCE/DESTINATION ROUTING, SKILLS BASED ROUTING
`the cache memory instead of from main memory. Novell's
`accessible to you more
`and END-OF-SHIFT ROUTING.
`NetWare, for example, uses cache memory to improvefile
`ed across the entire nel-
`Calibrate To test and reset a measuring or timing device
`it, Should you access a
`server access time. In NetWare, cache memory contains the
`against a standard to make sure it is functioning correctly.
`it be permanently stored
`directory and file caches, along with the FAT (File Allocation
`€alll Everyone has a different definition for “call.” My defini-
`shed by the main server
`Table), the turbo FAT, the Hash table, and an open space for
`tion is simplest: Two people or two machines are on a phone
`3 its currency (i.e. thatil
`other functions. See also Cache.
`line speaking to each other. That's a call. Bellcore’s definition
`Cache Miss When the caching software guesses wrongly
`of a call: An arrangement providingfor a relation between two
`and you have to read your data off your hard disk rather than
`or more simultaneously present users for the purpose of
`reading it from the cache in memory. See also Cache, Cache
`exchanging information. The ATM Forum's definition: A call is
`Hit and Cache Memory.
`an association between two or more users or between a user
`Cachimg A process by which information is stored in mem-
`and a network entity that is established by the use of network
`ory or server In anticipation of next request for information.
`capabilities. This association may have zero or more connec-
`See Cache for a full explanation.
`tions. Here are some more formal definitions:
`CAD 1. Computer Aided Dispatch.
`1. In communications, any demandto set up a connection.
`2. Computer Aided Design. A computer andits related soft-
`2, A unit of traffic measurement.
`ware and terminals used to design things. A CAD system
`.
`3. The actions performed by a call originator,
`might be as simple as computerized drafting tools or as
`4. The operations required to establish, maintain, and release
`complex as detailed layouts of
`integrated circuits. CAD
`a connection,
`systems offen have terminals on peoples’ desks and a cen-
`5, To use a connection between two stations.
`tral maxi-computer in the company's main computer room.
`6. The action of bringing a computer program, a routine, or a
`CAD terminals are often run over LANs (local area net-
`subroutine into effect, usually by specifying the entry condi-
`works) or through telephone systems. The terminals are
`often moved, thus having universal wiring and a universal
`tions and the entry point.
`Call Abwnedoms Also called ABANDONED CALLS. Call
`switching system — a LAN or a phone system — is
`Abandons are calls that are dropped by the calling party
`extremely useful.
`CAD/CAM Computer Aided Design/Computer Aided
`before their intended transaction is completed. The call may
`
`as the Intel 82385,thal
`
`127
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 004
`Page 004
`
`

`

`ee
`
`NEWTON'S TELECOM DICTIONARY
`
`computer system
`
`neans application soft.
`rtfasterand not requis
`ftware architectyr
`Cket Services igabi0g
`ia Way lO access the
`: — Servicesiden.
`>C Card while the oe
`IS part of the PCMCIA
`Card Services, Card
`iterface that allowsthe
`as memory andinter.
`Services detects that a
`ies alsO releases these
`been removed. Carq
`iterface to higher lave!
`drivers,
`e, Card Services soft.
`vides an almost “plug-
`mputing environment,
`- Is theoretically possi-
`it powering off the sys-
`ie,
`It has worked only
`/ork for network cards.
`é, to insert a modem
`Jter system, download
`§ Memory, removethe
`a flash PCMCIA Card,
`in — all while your
`Great theory,
`S, including manutac-
`peripherals and sys-
`evelopers and related
`BM, Toshiba, Lotus,
`based in Sunnyvale,
`lic bulletin board —
`0 recognized by the
`opment Association
`ee booklistingallthe
`ply to their standards,
`3IA standardsarestill
`itandards. Check that
`ie. The manufacturer
`Jon't assume compat-
`3rvices supports that
`instead. Avoid PCM-
`You lose them. Use
`can plug directly into
`ivalent. If you have to
`pigtall, just in case.
`its specs, PC Card.
`/ people claimed that
`viemorize Computer
`
`|
`
`|
`
`See PERSONAL COMMUNICATIONS NETWORKSand PER-
`SONAL COMMUNICATION SERVICES.
`PCS Over Cable You run a CATV — cable TV company.
`You have a wires strung all over the neighborhood. On oneof
`your wires you attach a six foot by four foot by four box of
`electronics and three two feet attennae. Bingo, you're now a
`way station — also called a cell site — for a PCScellular
`phone system. People who are PCS subscribers will talk and
`receive calls when they're close to your cell site. Calls come
`and go via your coax cable, up it to a landline connection
`point with the PCS carrier. You, the CATV company, get paid
`money for completing calls. See www.sanders.com/telecomm
`PCSA Personal Computing System Architecture. A PC imple-
`mentation of DECnet, that lets PCs work in a DECnet environ-
`ment, PCSA is a network architecture defined and supported
`by Digital Equipment Corporationfor the incorporation of per-
`sonal computers into server-based networks.
`PCT Personal Communications Technology. A security proto-
`col developed by Microsoft for online Web commerce and
`financial transactions. Transparent to the user, PCT provides
`authentication and encryption routines that complement cred-
`it-card based commerce on the World Wide Web. Internet
`Explorer, Microsoft's Web browser, makes use of PCT. See
`also AUTHENTICATION and ENCRYPTION.
`PCA Personal Computer Terminal Adapter. A printed circuit
`card that slips into an IBM PC or PC compatible and allows
`that PC to be connected to the ISDN T-interface. See PER-
`SONAL COMPUTER TERMINAL ADAPTER,
`CTE Portable Common Tool Environment.
`PCTS Public Cordless Telephone Service. A Canadian digital
`cordless telephone service for residential, business and pub-
`lic use. For other variations of digital cordless telephone ser-
`vice, see OT1, CT2, CT2Plus, C13, and DECT,
`PCWG
`Personal
`Conferencing
`Work
`(www.gogcwg.ora/pcwg/)
`PCX Server Software PCXserver software turns your
`PC into a graphics terminal front-end for Unix and X applica-
`tions, Thus, your PC can display application output generat-
`ed by remote X-basedclient applications.
`PDA Personal Digital Assistant. A consumer electronics gadget
`that looks like a palmtop computer. Unlike personal computers,
`PDAs will perform specific tasks — acting like an electronic
`diary, carry-along personal database, multimedia player, per-
`sonal communicator, memo taker, calculator, alarm clock. The
`communications will take place through the
`phone or through
`wireless, Apple has announced a PDA, which it has named
`Newton.
`| added this definition inthe late fall of 1992,
`sales ofPDAsweren'tdoingwellandsomewag inSilicon a
`called them Probably Disappointed Again. IBM prefers to
`call
`them Personal Communicators. General Magic prefers to called
`them PICs, PersonalIntelligent Communicators.
`PDAW Physical Delivery Access Unit. A gateway device that
`facilitates the delivery of messages (excluding probes and
`reports) in physical form, This is an X.400 term.
`PDC . Personal Digital Cellular. (Digital system used in
`
`Group
`
`It includes the PC Card Standard
`old PC Card Standards.
`aelease V2.01, Socket Services Specification Release v2.0,
`card Services Specification Release v2.0, ATA Specification
`release v1.01, AIMS Specification Release v1.0, and the
`recommended Extensions Release v1.0. Standard v3.0 has
`heen proposed. See PCMCIA. www.pemcia.org
`PCN Personal Communications Network, A new type ofwire-
`less telephone system that would use light,
`inexpensive
`handheld handsets and communicate via low-power anten-
`nas. When it was originally conceived, PCN was primarily
`seen as an a city communications system, with far less range
`than cellular, Subscribers would be able to makeand recelve
`calls while theyare traveling, as they can do today with cellu-
`far radio systems, but at a low price. Now PCN is seen as
`what Dr. Sorin Cohn of Northern Telecom calls an “enablerof
`unplanned growth." One idea for PCNis to locate a PCN cell
`site (transmitter/receiver) in a residential community. When
`someone wanted a new phoneline, they'd simply drop down
`to their local phonestore, pick up a PCN portable phoneand,
`bythe time, they got back home, their frequency would be
`“switched on” and they'd be“live.” The original plans for PCN
`never materialized fully. However,
`the concept has been
`implemented in the forms of Personal Communications
`Service (PCS) and Wireless Local Loop (WLL). See also PCS,
`Personal Communications Network, Wireless Local Loop.
`PCO Point of Control and Observation: A place (point) with-
`in a testing environment where the occurrenceof test events
`is to be controlled and observed as defined by the particular
`abstract test method used.
`PCP 1. Post Call Processing.
`2. Program Clock Reference: A timestamp that is inserted by
`the MPEG-2 encoder into the Transport Stream to aid the
`decader in the recovering and tracking the encoder clock,
`in
`PCR An ATM term. Peak Cell Rate: The Peak Cell Rate,
`cells/sec, is the cell rate which the source may never exceed,
`PCS 1. the plural of PCs,i.e. PCc.
`2. Personal Communications Service. A new, lower powered,
`higher-frequency competitive technology to cellular. Whereas
`cellular typically operates in the 800-900 MHz range, PCS
`operates in the 1.5 to 1.8 Ghz range. The idea with PCSis that
`the phones are cheaper, have less range, are digital; the cells
`would be smaller and closer together andtheairtime would be
`cheaperalso. Several licenses have been awarded and sever-
`al systems havestarted in North America. The concept of PCS
`is evolving.It is not clear exactly where it will end up. So far,
`it looks like another cellular system with some digital mes-
`saging on the phone's larger screen.this is how the Federal
`Government awarded PCSlicenses:
`¢ “C-Block” Carrier
`A 30 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1895-1910 MHz paired with 1975-1990 MHz.
`© "D-Block" Carrier
`A 10 MHz PCScarrier serving a Basic Trading Area (BTA) in
`the frequency
`came out with a new
`block 1865-1870 MHz paired with 1945-1950 MHz,
`Japan).
`32-bit bus, as agains!
`© “E-Block" Carrier
`2. See Primary Domain Controller
`extension of the PC!
`A 10 MHz PCScarrier serving a Basic Trading Area (BTA)in
`PDF Portable Document Format. This is the file format for
`| support 132 Mbps,
`the frequency
`documents viewed and created by Adobe's Acrobat Reader,
`ee CardBusforafull
`block 1885-1890 MHz paired with 1965-1970 MHz.
`Capture, Distiller, Exchange and the Acrobat Amber Plug-in
`also Card Services,
`for Netscape Navigator. The PDF file format was developed to
`© "F-Block" Carrier
`§, and Slot Sizes,
`A 10 MHz PCScarrier serving a Basic Trading Area (BTA)in
`standardize Internet-based documents. Oneof the benefits of
`the frequency
`using Acrobat and the .pdf format is you can deliver business
`block 1890-1895 MHz paired with 1970-1975 MHz,
`documents others without reauthoring them and read them
`
`et ofall of the PCM-
`
`[
`
`993
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 005
`Page 005
`
`

`

`is a collection of frequencies on a CATV channel
`“channel
`address, Hitp is the “default” protocolof the Internet. Butit's
`not the only one. There are other protocols,including ftp(file
`reserved for transmission from the terminal next to the user's
`transfer fea news (for
`Usenet news groups), and
`TV set to (upstream to) the CATV company's computer. Such’
`signals might be requests for pay movies. See UPSTREAM.
`“mailto” (to send email to a specific address).
`Upstream Operations Functions that provide a BCC
`The www.harrynewton,com is simply the name of my com-
`(Bellcore Client Company) contro! of features and service
`puter. All Web addresses start as numbers. This one is no
`configurations and subject
`to BCC control, some service
`different. You can reach my home page by giving your
`browser the following command http://209.94.129.207/.
`management capabilities for subscribers. These functions
`include Service Negotiation and Management, Service
`The Web's own lookup tables do an instaneoustranslation to
`Provisioning and Repair Service Answering/Work Force
`that number from www.harrynewton.com when you type in
`Administration. Definition from Bellcore in reference to Its
`www.harrynewton.com. The translation mechanism is very
`concept of the AdvancedIntelligent Network,
`muchlike the translation the phone industry does when you
`WPT Universal Personal Telecommunications. According to
`dial any 800 number, e.g. 1-800-LIBRARY — translate it to
`L.M.Ericsson, Swedish telecom manufacturer, UPTis a “new
`a real number,i.e. 212-691-8215.
`service concept
`in the field of telecommunications which
`The /fantasy/ means that there’s a folder or subdirectory on
`a website's computer disk called fanstasy and inside that
`aims at making telecommunications both universal and per-
`folder there's a documentcalled
`happy.html. And that’s what
`sonal. instead of calling a telephoneline or a mobile termi-
`nal, you call the person you wish to get in touch with and
`we're looking for. See also Web address.
`leave it to the network to locate the line or terminal where
`URIM User request manager.
`he/she can be reached.” There was an article on UTP in the
`WS West One of the seven Regional Holding Companies
`1993 No.4 issue of the Ericsson Review. An article in the
`formed at divestiture.
`It
`includes Mountain Telephone,
`June, 1996 issue of
`IEEE Communications Magazine
`Northwestern Bell and Pacific Northwest Bell among other
`ompatible PC, upper
`described UPT as a service that enables users to access var-
`service entities and entrepreneurial adventures.
`d iMB of RAM.This
`ious services through personal mobility. It enables each UPT
`USACII See ASCII. The name change was a result of the
`«s (UMBs)of various
`user to participate in a user-defined set of subscribed ser-
`name change of the standards organization. When the name
`only with a special
`vices, andtoinitiate and receive calls on the basis of a per-
`changed again to ANSI, most people simply reverted to ASCII.
`6.EXE
`sonal, network transparent UPT number across multiple net-
`Usage A measurement of the load carried by a server or
`R MEMORYAREA.
`works on any fixed or mobile terminal, irrespective of geo-
`group of servers, usually expressed in CCS, Usage may also
`3 SUPPLY.
`graphical location. This service is limited only by terminal
`be expressed in erlangs.
`liverer that regularly
`Wsage Based Usage-Based refers to a rate or price for
`and network capabilities and restrictions imposedby the net-
`aly speedy delivery
`work operator. In short, UPTisstill not totally defined and is
`telephone service based on usage rather thanaflat, fixed
`under discussion by the world's major standards bodies. For
`monthly fee. Until a few years ago, mostlocal phoneservice
`ows a local area net-
`more information on UPT, see ITU-T Recommendation F.850,
`in the United States was charged on a flat
`rate basis,
`Ininterruptible Power
`Principles for Universal Personal Telecommunications,
`Increasingly, phone companies are switching their
`local
`ccurs, NetWare noti-
`Geneva, 1993.
`charging over to usage-based. Flat-rate calling will probably
`th SERVER.CFG and
`the uninterrupted
`Uptime Colloquial expression for
`disappear within a few years. Allegedly, usage based phone
`maining users, clos-
`amountof time that network or computer resources are work-
`service pricing is fairer on those phone subscribers who
`wn.
`If you install a
`ing and available to a user. In short, time betweenfailures or
`don't use their phone much, Usage basedpricing is not con-
`stall a printed circuit
`periods of nonavailability (as for maintenance).
`sistent throughout the U.S. Typically, you get charged for
`>S.
`If you have a file
`Upward Compatible Any device that can be easily
`each call. And the charging is very muchlike that for long
`mpared to the more
`organized, fixed or configured to work in either a different,
`distance — by length ofcall, by time of day and by distance
`1 through the mouse
`expanded operating environment or some enhanced mode.
`called. See also FLAT RATE.
`Software is said to be upward compatible if a computer larg-
`Usuye Sensitive A form of Measured Rale Service. See
`er than the one for whichit was written can run the program.
`USAGE BASED.
`Urban Service Anyof the grades of service regularly fur-
`Synchronous/Asynchronous
`USART
`Universal
`nished inside base orlocality rate areas, or outside base or
`Recelver/Transmitter. An integrated circuit chip that handles
`locality rate areas at base or locality rates plus zone connec-
`the |/0 (input/output) functions of a computer port. It con-
`tion charges or incremental rates. Another way of saying
`verls data coming in parallel form from the CPU into serial
`expanded metropolitan phone service.
`form suitable for transmission, and vice versa.
`WRI Universal Resource Locator. An Internet t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket