`ait
`‘DICTIONARY
`
`Edition
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`e IP Telephony * LANs & Intranets * Call Centers & Computer Telephony
`
`e Fiber Optics, SONET and DWDM « Satellites
`NTMICM ECR MUTTutenTier
`
`andWirelessTelecom*VolP«7-1,T-3,1-4, E-1,
`
`Se DYE caeMere eMC Sion el
`PCS & GSM © Windows 95, 98, NT, NetWare,
`Apple, Sun & Unix Networking * Ecommerce
`
`Updated
`
`|Bin
`
`Expanded
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 001
`Page 001
`
`
`
`
`
`——s.ies—_— _—
`
`ireGe
`———————————
`
`NEWTON’s TELECOM DICTIONARY
`
`copyright © 1999 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,including the right to reproducethis
`book or portions thereof in any form whatsoever.
`
`Publishedin the United States by
`Miller Freeman, Inc.
`Tenth floor
`12 West 21 Street
`;
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-031-8
`
`February, 1999
`
`Manufactured in the United States of America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Roldan and Regula Hoffman
`Matt Kelsey, Publisher
`Christine Kern, Manager
`
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 002
`Page 002
`
`
`
`
`
`LTT'™'’CTTTT??CZCTCT
`
`NEWTON'S TELECOM DICTIONARY
`
`International service which provides cablegram communica-
`tion to International destinations through the use of a com-
`puterized message switching center in New YorkCity,
`Calbleheaed The point where a marine cable connects to ter-
`restrial facilities.
`CableLalbs Cable Television Laboratories, Inc. A research
`and development consortium of cabletelevision system oper-
`alors established in 1988. CableLabs plans and funds
`research and developmentprojects to help member compa-
`nies and the cable industry take advantage of opportunities
`and meet challenges in the telecommunications industry. A
`good deal of emphasis is placed on digital cable and cable
`modem technologies. www.cablelabs.com
`Cuhleport
`Inte! Corporation's new technology, which
`brings high speed multimedia-rich interactive services to per-
`sonal computers in the homevia cable,
`Cablesjan A Tellabs Operations, Inc, product which deliv-
`er two-way voice and data services over coaxial cable used by
`cable TV operators.Tellabsis in Lisle, Illinois.
`Calbleway An opening in a work surface that allows access
`to cords or cables from below, or mounting of an electrical
`receptacle or telephone jack. Cablewaystypically cone with
`removable plastic grommets.
`Cabling The combination of all cables, wire, cords, and
`connecting hardware installed. A term used to refer collec-
`tively to the installed wiring in a given space.
`CABS Carrier AccessBilling Specifications
`CABS BOS Carrier Access Billing Specifications - Billing
`Output Specifications
`in
`CAC 1. Carrier Access Code. The digits you must dial
`North America to reach the long distance carrier of your
`choice. Those digits fit the following format 101XXXX.
`2, Customer Administration Center. A typeof terminal used by
`a PBX user to maintain and troubleshoot his PBX.
`3. Connection Admission Control
`is defined as the set of
`actions taken by the network during the call setup phase (or
`during call re-negotiation phase) in order to determine whether
`a connection request can be accepted or should berejected (or
`whether a requestforre-allocation can be accomplished).
`CACH Call Appearance Call Handling.
`Calne From the French “cacher,”whichtranslates “to press or
`hide,”especially in termsof tools or provisions, In the context
`of computer systems and networks, information is cached by
`placing it closer to the user or userapplication in order to make
`it more readily and speedily accessible, and transparently so.At
`the same time,information whichis cached placeslessstain on
`limited computer 1/0 (Input/Output) resourcesand limited net-
`work resources.Let's consider two specific definitions, the first
`of whichrelates to computer systems and the second of which
`relates to computer networks. Let's also consider a combination
`ofthefirst two, in the context of the Internet.
`1. In the context of a computer system, cache memory gener-
`ally is a partition of SRAM (Static Random Access Memory).
`Since much of computing |s highly repetitive or predictable in
`nature, and since solid state components(silicon chips) are
`muchfaster than mechanical disk drives, the speed of infor-
`mation access can be enhancedif certain information can be
`stored in RAM. That information typically is in the form of
`program information, memory addresses, or data. Thereby,
`the information can be stored in anticipation of your needfor
`it, and can be presented to you faster than if the computer
`needed to access the hard drive through the execution of an
`/0 function, The cache memorysits (logically and, perhaps
`physically) between the CPU and the main memory (RAM),
`
`|
`
`Caching works because of a phenomenon knownasthe local-
`ity principle which’states that a von Neumann CPU (i.¢., one
`that performs instructions and makes database calls sequen-
`tially, one after another) tends to access the same memor
`locations over and over again. A cache workslike this. When
`the CPU needs data from memory, the system checksto see
`if the information is already in the cache. If itis, it grabs thal
`information; this is called a cache hit.
`If it isn't,it's called a
`. cache miss and the computer has tofetch the information by
`accessing the main memory or hard disk, which is slower
`Dala retrieved during a cache miss is often written into the
`cachein anticipation of further needfor it. Let's assumethat
`you open a CD-ROM application with hyperlinks. As the sys-
`tem can reasonably assume that you will exercise the hyper-
`link options, the information associated with them can be
`stored in cache memory.
`If you do,
`indeed, exercise those
`options,its a cache hit and the data is there waiting for you.
`The cache also will hold information that you recently
`accessed,
`in anticipation of your wanting to back up, or
`accessit again. Caching can take place through partitioned or
`segmented cache memory, which can be in the form of Li
`(Level 1) primary cache and L2 (Level 2) secondary cache.L1
`cache memory is accessedfirst, L2 second, the main memo-
`ry (RAM) and then hard drive last. Also, one cache might hold
`program instructions and the other might hold data, Generally
`when the cacheis exhausted,it is flushed and the data is writ-
`ten back to main memory, to be replaced with the next cache
`according to a replacement algorithm. Cache freshing and
`flushing mechanism is designed differently by different ven-
`dors. It behavesslightly different. Howeverit mainly depends
`on main memory type,
`like write back or WB, write through
`WT, write protected or WT, write combining or WC and
`uncached or UC. See also Cache Memory.
`2.In the context of a computer network such as a LAN,or the
`combination of the Internet and World Wide Web,data can be
`cached in a server which is close to you.
`In anticipation of
`your imminent requestfor that data in a logical sequenceof
`data access,it will be transmitted frorn the main server to the
`remote server. Thereby, the data is accessible to you more
`quickly than if it had to be transmitted across the entire net-
`work each time you had a need for it. Should you access 4
`certain set of data frequently,
`it might be permanently stored
`on a server in proximity, and refreshed by the main server
`from time to time in order to ensure its currency (i.e. that it
`remains up to date),
`3.
`In the context of an Internet client/server application,
`caching really showsits stuff. First, the network uses distrib-
`uted cache servers to house the WWW information that users
`in your region use frequently. As you access a Website, your
`speed of access and response is improved because the data
`is housed on a server closer to you, The data then is loaded
`into cache memory on your client computer workstation. AS
`you move forward, from page to page andlink to link, your
`client caches the information provided by the cache serve,
`with all of this happening in anticipation of your next move.
`As you move backward, the samething happens,in anticipa-
`tion of that next move, as well. Just in case you don’t believe
`the client side of
`this story, go to Internet Explorer of
`Netscape, and click on cache.(Thefastest wayto regain space
`on yourhard diskis to flush the cache which these programs
`dump
`to your hard disk.)
`Cache Coherency Managing a cache so that data is nol
`lost or overwritten. See also Cache.
`Cache Controller A chip, such as the Intel 82385, thal
`
`126
`
`<
`manages the retrieval,
`from memory or the har
`in either clients or serve
`Codhe Engime A ca
`speed dedicatedInternet
`caching and retrieval. W
`cache engine locally sti
`text, When another user|
`content
`is pulled from
`improves download time
`use on the network. Here
`from Cisco, which maki
`work? The cache engine
`which redirects Web rec
`Web Cache ControlProt
`of Cisco IOS software. 1
`ing of traffic across mult
`tolerant, fail-safe opera
`caching? By reducing th
`on overburdened Web :
`benefits to ISPs, enterp
`benefits include cost s
`usage and dramatic imp
`users. The cache engine
`with a simple method|
`through URLfiltering. S
`Cache Mit When the
`Thus you don't haveto ;
`puting is faster, See Cac
`Cache Memory Avai
`or SRAM (Static RAM) |
`er to “remember” stuff
`wants that information,
`searching through a s
`process. This high spe:
`wait state. When the C
`copyof this data is stort
`the CPU reads the same
`lhe cache memory ins
`NetWare, for example,
`server accesstime.In |
`directory andfile cache
`Table), the turbo FAT,
`tl
`other functions. See als
`Cache Miss Whentt
`and you haveto read yi
`reading it from the cact
`Hit and Cache Memory
`Caching A process by
`Ory or server in anticip
`See Cache for a full ext
`CAD 1, Computer Aide
`2. Computer Aided De:
`ware and terminals us
`might be as simple a
`COmplex as detailed |
`Systems offen haveter
`tral maxi-computer in
`D terminals are of
`Works) or through tel
`often moved, thus hav
`Switching system —
`extremely useful.
`CAD/CAM Comput
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 003
`Page 003
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`slient/server application,
`the network uses distrib-
`W information that users
`i access a Website, your
`proved because the data
`The data then is loaded
`omputer workstation. As
`ge and link to link, your
`jed by the cache server,
`ation of your next move,
`hg happens,in anticipa-
`in case you don't believe
`to Internet Explorer or
`stest way to regain space
`ye which these programs
`
`‘ache so that data is nol
`
`.al|
`Tenon known as the loca |
`mariages the retrieval, storage and delivery of data to and
`Manufacturing. See CAD.
`CADB Calling Area Data Base. An MCI definition. An MCI
`rom memory OF the hard disk. Cache controllers may reside
`Neumann CPU (j,2,, 9
`System that stores reference data for various MC! Systems
`in eilher clients or servers. See also Cache.
`28 database calls sequen,
`and reconciles MCI Calling Areas with those of Bell.
`ache Engine A cache engine is a carrier-class, high-
`iccess the same mem
`Caddy The shell of an optical disc. Protectsit from grubby
`he works like this, Whey
`ggeed dedicated Internet appliance that performs Web content
`fingerprints, and includes write protection devices, AKA case.
`ing and retrieval. When a user accesses aWeb page,the
`the system checks to ga,
`Cademee In voice processing, cadence is used to refer to the
`cache engine locally stores the page's graphics and HTML
`ache. If itis, it grabs tha
`pattern of tones and silence intervals generated by a given
`vit.
`If it isn't,
`it's called
`text, When anotheruser later requests the same Web page, the
`audio signal. Examples are busy andringing tones. A typical
`content
`is pulled from the cache engine. This process
`) fetch the information
`cadence pattern is the US ringing tone, which is one second
`improves download time for the user and reduces bandwidth
`rd disk, which is slow;
`of tone followed by three seconds of silence. Some other
`yse on the network. Here is a an explanation of a cache engine
`i
`ls often written into the
`countries, such as the UK, use a double ring, which is two
`1 for it. Let's assume tha
`om Cisco, which makes one. How doesthe cache engine
`short tones within about a second, followed byalittle over
`th hyperlinks,As the sys.
`work? The cache engine communicates with a Cisco router,
`two secondsofsilence.
`J will exercise the hyper.
`which redirects Web requests to the cache engine using the
`CADS Code Abuse Detection System.
`Web Cache Control Protocol (WCCP), a new standard feature
`siated with them can te
`CAE Computer Aided Engineering.
`of Cisco 10S software. The WCCP also enables load balanc-
`1, Indeed, exercise those
`Cage Antenna An antenna having conductors arranged
`i ls there waiting for yoy
`ing of traffic across multiple cache engines and ensuresfault-
`ation that you recently
`cylindrically.
`tolerant, fail-safe operation. What are the benefits of Web
`CAGR Compound Annual Growth Rate.
`caching? By reducing the amountof traffic on WAN links and
`wanting to back up, o-
`CAI 1. Computer Assisted Instruction. Commonly known as
`on overourdened Web servers, caching provides significant
`ice through partitioned o
`CBT (Computer Based Training). See CBT. See also CAD for
`benefits to ISPs, enterprise networks and end users. Those
`‘an be in the form of ly
`a discussion on telecom needs.
`benefits include cost savings due to a reduction on WAN
`3l 2) secondary cache, [4
`the interface
`2. Common Air
`Interface. A standard for
`usage and dramatic improvements in response times for end
`second, the main memo-
`between a radio network and equipment. A CAI allows mul-
`users. The cache enginealso provides network administrators
`so, one cache might hold
`tiple vendors to develop equipment, such as radio terminal
`right hold data. Generally
`with a simple method to enforce a site-wide access policy
`devices (e.g., cordless phones, cellular phones and PCS
`shed and the data is writ.
`through URLfiltering. See also Cache.
`terminals) and base stations (e.g., cellular antenna sites),
`Cache Hit When the data you want is actually in cache,
`laced with the next cache
`which will
`interoperate. The yield is a competitive (read
`hm. Cache freshing and
`Thus you don't have to access yourhard disk and your com-
`less expensive) market
`for equipment. The British
`ferently by different ven-
`puting is faster. See Cache, Cache Miss and Cache Memory.
`CT2/Telepoint system incorporated one of
`the first CAI
`yweverit mainly depends
`Cache Memory Available RAM (Random Access Memory)
`ick or WB,write through
`standards. See also CT2.
`or SRAM (Static RAM) that you set up to allow your comput-
`CALC Customer Access Line Charge. Also known variously
`combining or WC and
`er to “remember” stuff — so the next time your computer
`as Access Charge, EUCL (End User Line Charge), and SLC
`wants that information, it can find it fast from RAM,instead of
`amory.
`(Subscriber Line Charge). See Access Charge,
`ark such as a LAN,or the
`searching through a slower hard disk I/O (Input/Output)
`CALEA Communications Assistance for Law Enforcement Act
`d Wide Web, data can be
`process. This high speed cache memoryeliminates the CPU
`1994.
`Q you.
`In anticipation of
`wait state. When the CPU reads data from main memory, a
`Calendar Rowfing A call center term for directing calls
`in a logical sequenceof
`copy of this data is stored in the cache memory. The next time
`according to the day of the week and time of day. See also
`om the main server to the
`the CPU reads the same address, the data is transferred from
`SOURCE/DESTINATION ROUTING, SKILLS BASED ROUTING
`the cache memory instead of from main memory. Novell's
`accessible to you more
`and END-OF-SHIFT ROUTING.
`NetWare, for example, uses cache memory to improvefile
`ed across the entire nel-
`Calibrate To test and reset a measuring or timing device
`it, Should you access a
`server access time. In NetWare, cache memory contains the
`against a standard to make sure it is functioning correctly.
`it be permanently stored
`directory and file caches, along with the FAT (File Allocation
`€alll Everyone has a different definition for “call.” My defini-
`shed by the main server
`Table), the turbo FAT, the Hash table, and an open space for
`tion is simplest: Two people or two machines are on a phone
`3 its currency (i.e. thatil
`other functions. See also Cache.
`line speaking to each other. That's a call. Bellcore’s definition
`Cache Miss When the caching software guesses wrongly
`of a call: An arrangement providingfor a relation between two
`and you have to read your data off your hard disk rather than
`or more simultaneously present users for the purpose of
`reading it from the cache in memory. See also Cache, Cache
`exchanging information. The ATM Forum's definition: A call is
`Hit and Cache Memory.
`an association between two or more users or between a user
`Cachimg A process by which information is stored in mem-
`and a network entity that is established by the use of network
`ory or server In anticipation of next request for information.
`capabilities. This association may have zero or more connec-
`See Cache for a full explanation.
`tions. Here are some more formal definitions:
`CAD 1. Computer Aided Dispatch.
`1. In communications, any demandto set up a connection.
`2. Computer Aided Design. A computer andits related soft-
`2, A unit of traffic measurement.
`ware and terminals used to design things. A CAD system
`.
`3. The actions performed by a call originator,
`might be as simple as computerized drafting tools or as
`4. The operations required to establish, maintain, and release
`complex as detailed layouts of
`integrated circuits. CAD
`a connection,
`systems offen have terminals on peoples’ desks and a cen-
`5, To use a connection between two stations.
`tral maxi-computer in the company's main computer room.
`6. The action of bringing a computer program, a routine, or a
`CAD terminals are often run over LANs (local area net-
`subroutine into effect, usually by specifying the entry condi-
`works) or through telephone systems. The terminals are
`often moved, thus having universal wiring and a universal
`tions and the entry point.
`Call Abwnedoms Also called ABANDONED CALLS. Call
`switching system — a LAN or a phone system — is
`Abandons are calls that are dropped by the calling party
`extremely useful.
`CAD/CAM Computer Aided Design/Computer Aided
`before their intended transaction is completed. The call may
`
`as the Intel 82385,thal
`
`127
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 004
`Page 004
`
`
`
`ee
`
`NEWTON'S TELECOM DICTIONARY
`
`computer system
`
`neans application soft.
`rtfasterand not requis
`ftware architectyr
`Cket Services igabi0g
`ia Way lO access the
`: — Servicesiden.
`>C Card while the oe
`IS part of the PCMCIA
`Card Services, Card
`iterface that allowsthe
`as memory andinter.
`Services detects that a
`ies alsO releases these
`been removed. Carq
`iterface to higher lave!
`drivers,
`e, Card Services soft.
`vides an almost “plug-
`mputing environment,
`- Is theoretically possi-
`it powering off the sys-
`ie,
`It has worked only
`/ork for network cards.
`é, to insert a modem
`Jter system, download
`§ Memory, removethe
`a flash PCMCIA Card,
`in — all while your
`Great theory,
`S, including manutac-
`peripherals and sys-
`evelopers and related
`BM, Toshiba, Lotus,
`based in Sunnyvale,
`lic bulletin board —
`0 recognized by the
`opment Association
`ee booklistingallthe
`ply to their standards,
`3IA standardsarestill
`itandards. Check that
`ie. The manufacturer
`Jon't assume compat-
`3rvices supports that
`instead. Avoid PCM-
`You lose them. Use
`can plug directly into
`ivalent. If you have to
`pigtall, just in case.
`its specs, PC Card.
`/ people claimed that
`viemorize Computer
`
`|
`
`|
`
`See PERSONAL COMMUNICATIONS NETWORKSand PER-
`SONAL COMMUNICATION SERVICES.
`PCS Over Cable You run a CATV — cable TV company.
`You have a wires strung all over the neighborhood. On oneof
`your wires you attach a six foot by four foot by four box of
`electronics and three two feet attennae. Bingo, you're now a
`way station — also called a cell site — for a PCScellular
`phone system. People who are PCS subscribers will talk and
`receive calls when they're close to your cell site. Calls come
`and go via your coax cable, up it to a landline connection
`point with the PCS carrier. You, the CATV company, get paid
`money for completing calls. See www.sanders.com/telecomm
`PCSA Personal Computing System Architecture. A PC imple-
`mentation of DECnet, that lets PCs work in a DECnet environ-
`ment, PCSA is a network architecture defined and supported
`by Digital Equipment Corporationfor the incorporation of per-
`sonal computers into server-based networks.
`PCT Personal Communications Technology. A security proto-
`col developed by Microsoft for online Web commerce and
`financial transactions. Transparent to the user, PCT provides
`authentication and encryption routines that complement cred-
`it-card based commerce on the World Wide Web. Internet
`Explorer, Microsoft's Web browser, makes use of PCT. See
`also AUTHENTICATION and ENCRYPTION.
`PCA Personal Computer Terminal Adapter. A printed circuit
`card that slips into an IBM PC or PC compatible and allows
`that PC to be connected to the ISDN T-interface. See PER-
`SONAL COMPUTER TERMINAL ADAPTER,
`CTE Portable Common Tool Environment.
`PCTS Public Cordless Telephone Service. A Canadian digital
`cordless telephone service for residential, business and pub-
`lic use. For other variations of digital cordless telephone ser-
`vice, see OT1, CT2, CT2Plus, C13, and DECT,
`PCWG
`Personal
`Conferencing
`Work
`(www.gogcwg.ora/pcwg/)
`PCX Server Software PCXserver software turns your
`PC into a graphics terminal front-end for Unix and X applica-
`tions, Thus, your PC can display application output generat-
`ed by remote X-basedclient applications.
`PDA Personal Digital Assistant. A consumer electronics gadget
`that looks like a palmtop computer. Unlike personal computers,
`PDAs will perform specific tasks — acting like an electronic
`diary, carry-along personal database, multimedia player, per-
`sonal communicator, memo taker, calculator, alarm clock. The
`communications will take place through the
`phone or through
`wireless, Apple has announced a PDA, which it has named
`Newton.
`| added this definition inthe late fall of 1992,
`sales ofPDAsweren'tdoingwellandsomewag inSilicon a
`called them Probably Disappointed Again. IBM prefers to
`call
`them Personal Communicators. General Magic prefers to called
`them PICs, PersonalIntelligent Communicators.
`PDAW Physical Delivery Access Unit. A gateway device that
`facilitates the delivery of messages (excluding probes and
`reports) in physical form, This is an X.400 term.
`PDC . Personal Digital Cellular. (Digital system used in
`
`Group
`
`It includes the PC Card Standard
`old PC Card Standards.
`aelease V2.01, Socket Services Specification Release v2.0,
`card Services Specification Release v2.0, ATA Specification
`release v1.01, AIMS Specification Release v1.0, and the
`recommended Extensions Release v1.0. Standard v3.0 has
`heen proposed. See PCMCIA. www.pemcia.org
`PCN Personal Communications Network, A new type ofwire-
`less telephone system that would use light,
`inexpensive
`handheld handsets and communicate via low-power anten-
`nas. When it was originally conceived, PCN was primarily
`seen as an a city communications system, with far less range
`than cellular, Subscribers would be able to makeand recelve
`calls while theyare traveling, as they can do today with cellu-
`far radio systems, but at a low price. Now PCN is seen as
`what Dr. Sorin Cohn of Northern Telecom calls an “enablerof
`unplanned growth." One idea for PCNis to locate a PCN cell
`site (transmitter/receiver) in a residential community. When
`someone wanted a new phoneline, they'd simply drop down
`to their local phonestore, pick up a PCN portable phoneand,
`bythe time, they got back home, their frequency would be
`“switched on” and they'd be“live.” The original plans for PCN
`never materialized fully. However,
`the concept has been
`implemented in the forms of Personal Communications
`Service (PCS) and Wireless Local Loop (WLL). See also PCS,
`Personal Communications Network, Wireless Local Loop.
`PCO Point of Control and Observation: A place (point) with-
`in a testing environment where the occurrenceof test events
`is to be controlled and observed as defined by the particular
`abstract test method used.
`PCP 1. Post Call Processing.
`2. Program Clock Reference: A timestamp that is inserted by
`the MPEG-2 encoder into the Transport Stream to aid the
`decader in the recovering and tracking the encoder clock,
`in
`PCR An ATM term. Peak Cell Rate: The Peak Cell Rate,
`cells/sec, is the cell rate which the source may never exceed,
`PCS 1. the plural of PCs,i.e. PCc.
`2. Personal Communications Service. A new, lower powered,
`higher-frequency competitive technology to cellular. Whereas
`cellular typically operates in the 800-900 MHz range, PCS
`operates in the 1.5 to 1.8 Ghz range. The idea with PCSis that
`the phones are cheaper, have less range, are digital; the cells
`would be smaller and closer together andtheairtime would be
`cheaperalso. Several licenses have been awarded and sever-
`al systems havestarted in North America. The concept of PCS
`is evolving.It is not clear exactly where it will end up. So far,
`it looks like another cellular system with some digital mes-
`saging on the phone's larger screen.this is how the Federal
`Government awarded PCSlicenses:
`¢ “C-Block” Carrier
`A 30 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1895-1910 MHz paired with 1975-1990 MHz.
`© "D-Block" Carrier
`A 10 MHz PCScarrier serving a Basic Trading Area (BTA) in
`the frequency
`came out with a new
`block 1865-1870 MHz paired with 1945-1950 MHz,
`Japan).
`32-bit bus, as agains!
`© “E-Block" Carrier
`2. See Primary Domain Controller
`extension of the PC!
`A 10 MHz PCScarrier serving a Basic Trading Area (BTA)in
`PDF Portable Document Format. This is the file format for
`| support 132 Mbps,
`the frequency
`documents viewed and created by Adobe's Acrobat Reader,
`ee CardBusforafull
`block 1885-1890 MHz paired with 1965-1970 MHz.
`Capture, Distiller, Exchange and the Acrobat Amber Plug-in
`also Card Services,
`for Netscape Navigator. The PDF file format was developed to
`© "F-Block" Carrier
`§, and Slot Sizes,
`A 10 MHz PCScarrier serving a Basic Trading Area (BTA)in
`standardize Internet-based documents. Oneof the benefits of
`the frequency
`using Acrobat and the .pdf format is you can deliver business
`block 1890-1895 MHz paired with 1970-1975 MHz,
`documents others without reauthoring them and read them
`
`et ofall of the PCM-
`
`[
`
`993
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 005
`Page 005
`
`
`
`is a collection of frequencies on a CATV channel
`“channel
`address, Hitp is the “default” protocolof the Internet. Butit's
`not the only one. There are other protocols,including ftp(file
`reserved for transmission from the terminal next to the user's
`transfer fea news (for
`Usenet news groups), and
`TV set to (upstream to) the CATV company's computer. Such’
`signals might be requests for pay movies. See UPSTREAM.
`“mailto” (to send email to a specific address).
`Upstream Operations Functions that provide a BCC
`The www.harrynewton,com is simply the name of my com-
`(Bellcore Client Company) contro! of features and service
`puter. All Web addresses start as numbers. This one is no
`configurations and subject
`to BCC control, some service
`different. You can reach my home page by giving your
`browser the following command http://209.94.129.207/.
`management capabilities for subscribers. These functions
`include Service Negotiation and Management, Service
`The Web's own lookup tables do an instaneoustranslation to
`Provisioning and Repair Service Answering/Work Force
`that number from www.harrynewton.com when you type in
`Administration. Definition from Bellcore in reference to Its
`www.harrynewton.com. The translation mechanism is very
`concept of the AdvancedIntelligent Network,
`muchlike the translation the phone industry does when you
`WPT Universal Personal Telecommunications. According to
`dial any 800 number, e.g. 1-800-LIBRARY — translate it to
`L.M.Ericsson, Swedish telecom manufacturer, UPTis a “new
`a real number,i.e. 212-691-8215.
`service concept
`in the field of telecommunications which
`The /fantasy/ means that there’s a folder or subdirectory on
`a website's computer disk called fanstasy and inside that
`aims at making telecommunications both universal and per-
`folder there's a documentcalled
`happy.html. And that’s what
`sonal. instead of calling a telephoneline or a mobile termi-
`nal, you call the person you wish to get in touch with and
`we're looking for. See also Web address.
`leave it to the network to locate the line or terminal where
`URIM User request manager.
`he/she can be reached.” There was an article on UTP in the
`WS West One of the seven Regional Holding Companies
`1993 No.4 issue of the Ericsson Review. An article in the
`formed at divestiture.
`It
`includes Mountain Telephone,
`June, 1996 issue of
`IEEE Communications Magazine
`Northwestern Bell and Pacific Northwest Bell among other
`ompatible PC, upper
`described UPT as a service that enables users to access var-
`service entities and entrepreneurial adventures.
`d iMB of RAM.This
`ious services through personal mobility. It enables each UPT
`USACII See ASCII. The name change was a result of the
`«s (UMBs)of various
`user to participate in a user-defined set of subscribed ser-
`name change of the standards organization. When the name
`only with a special
`vices, andtoinitiate and receive calls on the basis of a per-
`changed again to ANSI, most people simply reverted to ASCII.
`6.EXE
`sonal, network transparent UPT number across multiple net-
`Usage A measurement of the load carried by a server or
`R MEMORYAREA.
`works on any fixed or mobile terminal, irrespective of geo-
`group of servers, usually expressed in CCS, Usage may also
`3 SUPPLY.
`graphical location. This service is limited only by terminal
`be expressed in erlangs.
`liverer that regularly
`Wsage Based Usage-Based refers to a rate or price for
`and network capabilities and restrictions imposedby the net-
`aly speedy delivery
`work operator. In short, UPTisstill not totally defined and is
`telephone service based on usage rather thanaflat, fixed
`under discussion by the world's major standards bodies. For
`monthly fee. Until a few years ago, mostlocal phoneservice
`ows a local area net-
`more information on UPT, see ITU-T Recommendation F.850,
`in the United States was charged on a flat
`rate basis,
`Ininterruptible Power
`Principles for Universal Personal Telecommunications,
`Increasingly, phone companies are switching their
`local
`ccurs, NetWare noti-
`Geneva, 1993.
`charging over to usage-based. Flat-rate calling will probably
`th SERVER.CFG and
`the uninterrupted
`Uptime Colloquial expression for
`disappear within a few years. Allegedly, usage based phone
`maining users, clos-
`amountof time that network or computer resources are work-
`service pricing is fairer on those phone subscribers who
`wn.
`If you install a
`ing and available to a user. In short, time betweenfailures or
`don't use their phone much, Usage basedpricing is not con-
`stall a printed circuit
`periods of nonavailability (as for maintenance).
`sistent throughout the U.S. Typically, you get charged for
`>S.
`If you have a file
`Upward Compatible Any device that can be easily
`each call. And the charging is very muchlike that for long
`mpared to the more
`organized, fixed or configured to work in either a different,
`distance — by length ofcall, by time of day and by distance
`1 through the mouse
`expanded operating environment or some enhanced mode.
`called. See also FLAT RATE.
`Software is said to be upward compatible if a computer larg-
`Usuye Sensitive A form of Measured Rale Service. See
`er than the one for whichit was written can run the program.
`USAGE BASED.
`Urban Service Anyof the grades of service regularly fur-
`Synchronous/Asynchronous
`USART
`Universal
`nished inside base orlocality rate areas, or outside base or
`Recelver/Transmitter. An integrated circuit chip that handles
`locality rate areas at base or locality rates plus zone connec-
`the |/0 (input/output) functions of a computer port. It con-
`tion charges or incremental rates. Another way of saying
`verls data coming in parallel form from the CPU into serial
`expanded metropolitan phone service.
`form suitable for transmission, and vice versa.
`WRI Universal Resource Locator. An Internet t