throbber
Rembrandt Wireless
`Ex. 2021
`Apple Inc. v. Rembrandt Wireless Technologies, LP, IPR2020-00034
`Page 1 of 9
`
`

`

`First edition published in 1989 as Data and Computer Communications
`Copyright © 1995, 1996, 1998 byJohn Wiley & Sons Ltd.
`Baffins Lane, Chichester
`West Sussex, PO 19 IUD, England
`
`National 01243 779777
`International (+44) 1234 779777
`e-mail (for orders and customer service enquiries): cs-books @wiley.co.uk
`
`Visit our Home Page on http://www.wiley.co.uk or http://‘www.wiley.com
`
`Designations used by companies to distinguish their products are often claimed as trademarks, In ali instances where John Wiley
`& Sons is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact
`the appropriate companies for more complete information regarding trademarks andregistration.
`
`All Rights Reserved. Nopart of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
`by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except underthe terms of the Copyright,
`Designs and Patents Act 1988 or under the termsof a licence issued by the Copyright Licensing Agency, 90 Tottenham Court
`Road, London W1P 9HE,UK,without the permission in writing of the Publisher.
`
`0 471 97517 6 (pbk)
`
`
`
`British Library Cataloguing in Publication Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN 0 471# 97516 8;
`
`

`

`lock was correctly received and that thereceiver
`eeady©accept
`toaccept thenext block.Also used as
`aready reply in other.communications proto-
`cols, such as Hewlett-Packard’s ENQ/ACKpro-
`tocol(see following diagram)and the ETX/ACK
`method of flow control.
`
`ACF/NCP
`
`ACF/NCP In IBM’s VTAM, Advanced Com-
`munications Function for the Network Control
`Program.
`
`In IBM’s VTAM, Advanced Com-
`ACEF/SSP
`munications Function for the System Support
`Programs. Synonym for SSP.
`
`ACR/TAP In IBM’s VTAM, Advanced,.Com-
`munications Function for the Trace Analysis
`Program. Synonym for TAP.
`
`ACF/TCAM In IBM’s VTAM, Advanced Com-
`munications Function for the Telecommunica-
`tions Access Method.
`
`ACF/VTAM In IBM’s VTAM, Advanced Com-
`munications Function for the Virtual Telecom-
`munications Access Method.
`
`IBM’s
`ACF/VTAM application program In
`VTAM,a program that has opened an ACB to
`identify itself to ACF/VTAM and can now issue
`ACF/VTAM macroinstructions.
`
`ACE/VTAM definition In IBM’s VTAM,the
`process of defining the user application network
`to ACF/VTAM and modifying IBM-defined
`characteristics to suit the needs of the user.
`
`ACF/VTAMdefinition library In IBM’s VTAM,
`the operating system files or data sets that contain
`the definition statements and start options filed
`during ACF/VTAM definition.
`
`ACF/VTAM operator A person or program
`authorized to issue ACF/VTAM operator com-
`mands.
`
`ACE/VTAM operator command A command
`used to monitor or control an ACF/VTAM
`domain.
`
`ACE/VTAME InIBM’s VTAM, Advanced Com-
`munications Function for the Virtual Telecom-
`munications Access Method Entry.
`
`ACI Access Control Information.
`
`
`
`
`
` HP3000\_- - S—¥. ACK--------- =--- Lrermminal
`
`|
`
`ENQ/ACKprotocol diagram
`
`ACM Association for Computing Machinery.
`
`ACOC Area Communications Operations Center.
`
`ACOnet Akademisches COmputer NEtz, a re-
`search network in Austria.
`
`ACONSOLE The name of a Novell NetWare 3.x
`utility program that allows a network supervisor
`to access a server via a modem connection and
`manage that server as if the user was at
`the
`server’s console.
`
`Acorn A trademark of AT&T for a network
`control system.
`acoustic coupler A device that converts electrical
`signals into audio signals, enabling data to be
`transmitted over the public telephone network
`via a conventional
`telephone handset;
`it also
`converts the audio signals back into electrical
`signals at the receiving end. A kind of modem.
`
`ACP Advanced Communications Package.
`
`ACP Allied Communication Publication.
`
`the operation in
`1.In IBM’s VTAM,
`acquire
`which an authorized ACF/VTAM application
`program initiates and establishes a session with
`anotherlogical unit; the application program acts
`as the primary end of the session. Note. The
`acquire process causes an Initiate request to be
`sent
`to the SSCP which causes the SSCP to
`return a CINIT request to the application pro-
`gram (the PLU); this in turn causes the PLU to
`send a BIND request to the SLU. Contrast with
`Accept. 2. In relation to ACF/VTAM resource
`
`
`
`
`
`
`

`

`
`
`marker
`
`condition. 2. In data communications, a mark
`represents a binary 1; the steady-state, no-traffic
`state for asynchronous transmission. 3. The idle
`condition. 4. In the context of the virtual termi-
`nal, a mark is a signal inserted into an output
`data stream by the virtual terminal, to acknowl-
`edge that an attention or interrupt input signal
`has been received.
`
`marker The common control device for a cross-
`bar switch.
`
`marker tape A tapelaid parallel to a conductor
`under the jacket in a cable. The tape is printed
`with the name of the manufacturer and specifi-
`cations about the cable.
`
`mark-hold The normal no-traffic line condition
`whereby a steady mark is transmitted.
`
`Markov constraint A constraint on the routing
`method according to which the future route of a
`packetis independentofits past history, such as
`its source or its route so far. This constraint is
`implied by directory routing.
`mark-to-space transition Thetransition, or swit-
`ching from a marking impulse to a spacing
`impulse.
`MarkVision The nameof a software productbuilt
`into some IBM laser printers which enables
`remote NetWare users to configure and monitor
`the status of the printer.
`
`MARS Military Affiliate Radio System.
`Marquis The name of a PC Card from Motorola
`of Schaumberg, IL that provides 28.8 kbps of
`data and fax communications, and functionsas a
`10Mbps Ethernet adaptor.
`MASER(Microwave Amplification by Simulated
`Emission of Radiation) A device that gener-
`ates signals in the microwave range, with low-
`noise characteristics.
`
`Pattern of bits (1s or Os) specified by the
`mask
`user that can be used with the trap mode of a
`communicationstest set.
`
`326
`
`masking A method of transforming one set of
`data into another while blocking or excluding
`some data from this process on the basis of code
`patterns or position.
`master antenna system A coaxialcable distribu-
`tion system which provides television to apart-
`ments, hotel rooms, hospitals and schools.
`
`master boot infector A virus that overwrites or
`replaces the master boot record of a physical
`drive.
`
`master clock The source of timing signals, or the
`signals themselves, which all network stations
`use for synchronization.
`In IBM’s SNA,a cryp-
`master cryptography key
`tographic key used to encipher operational keys
`that will be used at a node.
`
`master group In Frequency Division Multiplex-
`ing (FDM), an assembly of 10 supergroups
`occupying adjacent bands in the transmission
`spectrum for purposes of simultaneous modula-
`tion and demodulation.
`
`the
`system,
`master modem In a multipoint
`modem that transmits constantly in the outbound
`direction. Usually the modem at the central site.
`In a multitier system,
`the term represents
`remote master, or a master modem that is no
`located at the centralsite.
`master station
`1. In multipoint circuits, the uni
`which controls/polls the nodes. 2. In point-t
`point circuits, the unit which controls the slav
`station. 3.
`In LAN technology,
`the unit on
`token-passing ring that allows recovery fro
`error conditions, such as lost, busy, or duplica'
`tokens; a monitor station.
`MATE An asynchronous communications soft
`ware program from Concept Automation
`operates on Data General MV computers.
`mathematical model A mathematical descriptio
`or approximation of somerealevent.
`matrix In switch technology, that portion of
`switch architecture where any input leads
`any output leads meet.
`
`Rembrandt Wireless
`
`

`

` percent break
`
`
`Amplitude(dB)howdoS8SOo|
`
`
`ao
`
`ABCDEFGHIJKLMOP
`Frequency (Hz)
`
`A= 140.625 Hz
`B = 390.625
`C = 640.625
`D = 890.625
`
`E = 1140,625 Hz
`F = 1390.625
`G = 1640.625
`H = 1890.625
`
`| = 2140.625 Hz
`J = 2390.625
`K = 2640.625
`L = 2890,625
`P/AR test measurement
`
`peaklimiter
`
`Time (ms)
`
`M = 3140.625 Hz
`N = 3390.625
`O =3640.625
`P = 3890.625
`
`——SS
`—SS
`
`
`
`
`
`
`
`
`
`
`
`
`
`normal steady interferences or impairments on
`In IBM’s VTAM,thestate
`pending active session
`a channel such as non-linear distortion, noise,
`of an LU-LUsession recorded by the SSCP when
`and phase jitter. The measurement
`technique
`it finds both LUs available and has sent a CINIT
`employs the signal
`transmission of a complex
`request to the primary logical unit (PLU) of the
`frequency spectrum. The receiver of the analog
`requested session.
`test set performs a calculation based on the
`local area net-
`penetration tap In an Ethernet
`charges to the original signal and generates a
`work, a penetration tap is a device used to con-
`value of measurement called P/AR units. A
`
`nect a transceiver to the bus without requiring
`P/AR value of 100 would indicate a channel
`that
`the bus transmission be interrupted for the
`with excellent fidelity; however, 75 is more of a
`installation of fittings. This is accomplished by
`practical reading to expect onafairly good line.
`
`the use of a needle-like device which penetrates
`pedestal A device, usually mounted on a floor,
`
`the insulation of the coaxial cable bus to reach
`used to house voice or data jacks, or power
`
`the center of the coax conductor,
`outlets at the point of use.
`
`PentaScanner A trademark of Microtest, Inc. of
`
`PEEKAtrademark of Computronics of Addison,
`Phoenix, AZ, as well as the name ofa cable
`IL, as well as a terminal monitor program from
`tester from that vendor.
`that vendor which operates on Prime computers.
`peer
`In a communications environment, a device
`that
`is considered to be equal
`to another
`device with respect
`to their communications
`Capabilities,
`peer-to-peer A network in which two or moresta-
`tons can communicate with each other without
`first routing data to a server.
`Peg count The numberofcalls made or received
`MM a specific time period.
`Privacy Enhanced Mail.
`
`
`
`Pentium The name of an Intel microprocessor
`that operates on data internally, 64 bits at a time.
`Pentium Pro The nameof the Intel micropro-
`cessor designed as a successor to the vendor’s
`Pentium microprocessor.
`PEP 1. Packetized Ensemble Protocol. 2. Partitio-
`ned Emulation Program.
`3. Peak Envelope
`Power.
`
`percent break Theratio ofthe opencircuit time
`to the sum of the open andclosedcircuit times
`
`401
`
`
`
`
`

`

`polarity
`
`is represented by direct current flowing in one
`direction and the spacing signal
`is represented
`by an equalcurrentflowing in the opposite direc-
`tion. By extensionto tone signaling, polar trans-
`mission is a method of transmission employing
`three distinct states, two to represent a mark and
`a space and one to represent the absence of a
`signal. Also called bipolar.
`
`polarity Any condition in which. there are two
`opposing voltage levels or charges, such as
`positive and negative.
`
`1.A characteristic of electromag-
`polarization
`netic radiation that occurs whenthe electric-field
`vector of the energy wave is perpendicular to
`the main direction of the electromagnetic beam.
`2. The directional aspects of a signal. A signal
`can have a circular or planar polarization.
`
`acetate,
`polarizer Material made of polymer
`incorporating iodide molecules, which allows
`scattered light
`to enter one pane on a liquid-
`crystal display.
`
`in turn saying, “Terminal A: have you anyth
`to send?”If not, “Terminal B: have you anyth
`to send?” and so on. Each such messageis ca
`a poll.
`
`polling delay The elapsed time between sucd
`sive polls to a given station which becomes |
`maximum delay after an operatoris ready to s
`before transmission actually takes place.
`polling list The order in whichstations are po
`and maintained in a list associated with e
`channel. A line polling list can also be use
`provide priority in line service.
`
`polyethylene A family of insulating materi
`derived from polymerization of ethylene gas,
`provide good dielectric properties.
`polymorphic virus A virus that completely ma
`fies its appearance each timeit infects acomp
`program.
`
`
`
`
`
`Poly-STAR Terminal emulation software fr
`Polygon, Inc., of St Louis, MO, which ena
`an IBM PC or compatible personal comp
`Policy ManagementArchitecture (PMA)Anet-
`to communicate with any Digital Equipm
`working architecture developed by NetManage
`Co. VAX or other ASCII host computers.
`of Cupertino, CA, which enables mission-critical
`applications and multimedia tools to run on exist-
`Poly-STAR/240 Terminal emulation softwaref
`ing IP-based intranets.
`Polygon,
`Inc., which make a personal
`cc
`puter operate as a Digital Equipment Corporat
`Policy Management Architecture (PMA)Atool
`(DEC) VT240terminal.
`from NetManage Corporation of Cupertino, CA,
`which enables network managersand third-party
`PolyVinyl Chloride (PYC) A_flame-retard
`developers to create modules that control
`the
`thermoplastic insulation material
`that
`is co
`manner by which desktops use TCP/IP-based
`monly used in the jackets of building cables.
`applications. A PMA capability is included in the
`POP 1. Point Of Presence. 2. Post Office Pro’
`vendor’s Chameleon TCP/IP application suite.
`col.
`aoc whichacomp terasks a
`terminal associatSaitfettheentdnalhas
`anydata forthecomputer.
`poll character A unique character or sequence
`sent by the main computerto a device to check
`for availability for sending and receiving data.
`polling A means of controlling terminals on a
`multipoint
`line. The computer, acting as
`the
`masterstation, sends a message to each terminal
`
`PopNet A trademark of LAN shark Systems,I
`of Reynoldsburg, OH, as well as the name
`a memory-tesident program loader from
`vendor which operates on a VINESserver.
`port A computer interface capable ofattachi
`to a modem for communicating with a rem
`terminal;
`the logical entrance and exit throu
`which data traffic flows
`into and out of
`network,
`
`412
`
`
`
`

`

`skywave
`
`Theportion of a wavethat travels to the
`skywave
`ionosphere andis reflected or refracted back to
`the earth.
`
`slab on grade A concrete floor installed directly
`on the earth, without a basement or crawl space.
`
`slamming Theprocess of unauthorized switching
`of a subscriber from one long distance carrier to
`another.
`
`SLAR Side-Looking Airborne Radar.
`slave A called unit under the control of commands
`and signals from a master (calling) unit.
`
`In point-to-point circuits,
`slave station
`controlled by the master station.
`SLC Submarine Laser Communications.
`
`the unit
`
`SLCSAT Submarine
`SATellites.
`
`Laser
`
`Communications
`
`SLIC
`
`Subscriber Line Interface Card.
`
`slicing level A voltage or currentlevel ofa digital
`signal where a one or zero bit can be determined
`or not. Also threshold.
`
`slip A defect in timing that caused a single bit or
`a sequence of bits to be omitted or read twice.
`Slips are primarily caused by improper synchro-
`nization resulting from wander and improperdis-
`tribution of the network reference frequency.
`
`SLIP Serial Line IP.
`
`SLM
`
`System Logic Module.
`1, A unit of time in a TDM frame where a
`slot
`sub-channel bit or character is carried. 2. Basic
`information unit (an 18-bit pattern) sent on an
`IBM 3600 System Loop. Specifies a command,
`data, or a sync pattern. 3. A numbered division
`of an equipment rack or shelf into which an
`electronic card is inserted.
`
`slot sharing A procedure by which more than one
`terminal may contend for the same slot thereby
`increasing the numberof terminals that may be
`attached an IBM System 3600 Loop.
`slot
`time A local network parameter that des-
`cribes the contention behavior of a media access
`
`500
`
`control. Nominally equal to twice the propaga
`tion delay.
`
`slotted ALOHA A packet broadcast system li
`ALOHAin which packets are timed to arrive ¢
`the center in regular time slots, synchronized fe
`all stations.
`
`slotted frame A frame of information which
`shared by two or morestations by dividingtt
`frame into equal parts. This technologyis use
`by many TDMsand on some LANs with rir
`topologies.
`
`slotted ring A ring-based network that uses slo
`as the method for gaining access to the media;
`
`SLS Signaling Link Selection.
`
`SLU Secondary Logical Unit.
`
`SL/1
`
`A PBX manufactured by Northern Teleco:
`
`SM 1. Statistical Multiplexer. 2. Switching Mog
`ule. 3, System Management. 4. Service Modu
`SMA
`
`Search Mode Acquisition.
`
`SMAE Systems Management Application Entit
`Small Computer System Interface (SCSI)
`A
`industry standard interface for connecting perij
`heral devices and their controllers to a micr¥
`processor. The SCSI interface defines both harg
`ware and software standards for communicati@
`between a host computer and a peripheral.
`Small-Scale Integration (SSI) A term used
`describe a multifunction semiconductor devig
`with a sparse density (10 circuits or less)

`electronic circuitry contained on a single slice
`chip.
`SMAPSystems Management Application Proces}
`smart terminal A smart terminal has semicon
`uctor-based memory.
`Its
`features include @
`ability to be polled, to store data in blocks, af
`to perform error checking. Functions such §
`editing can be performed on a smart termina
`but specific capabilities are built into the termiml
`and cannot be changed. A smart terminal is
`user-programmable.
`
`
`
`
`
`
`

`

`the fiber so that its movementis limited. Tight
`buffers are commonly used in patch cords and
`other locations where a cable is likely to be
`moved or shaken.
`tightly coupled A term used to describe the
`interrelationship of processing units that share
`rea] storage and are controlled by the same
`control program.
`tilt The difference betweeninsertion losses. Sig-
`nals at higher frequencies weaken more dramat-
`ically than signals at lower frequencies.
`TIM Test Interface Module.
`timbre of sound A term used to express the
`quality of a particular sound which helps to
`identify the object, instrument, or personthat is
`its source,
`Time Assignment Speech Interpolation (TASI)
`A technique for making trunk circuits more
`efficient by combiningportions of conversations
`on the same circuit. This technique makes use
`of the fact that typical conversations have quiet
`periods during which the circuit can be used for
`other conversations.
`time bomb A destructive program that remains
`until a predefined event or time triggers its
`operation.
`
`time division multiplexers (TDMs)
`
`time call A call between two subscribers, where
`the called subscriber is within the caller’s area
`code butoutside the caller’s free calling area,
`Time Compression Multiplexing (TCM) A dig-
`ital
`transmission technique that permits full-
`duplex data transmission by sending compressed
`bursts of data in an alternating or “ping-pong”
`fashion.
`Time Division Multiple Access (TDMA) Refers
`to a form of multiple access where a single car-
`rier is time shared by many users. Signals from
`earth stations reaching the satellite consecutively
`are processedin time segments without overlap-
`ping.
`100 percent
`time division multiplexers (TDMs)
`digital, dividing high-speed digital channels,
`such as a modem RS-232C output,
`into digi-
`tal subchannels. TDMseither bit-interleave or
`character-interleave data.
`Bit-interleaving is used primarily for syn-
`chronous multiplexing of protocols
`(Bisync,
`HDLC, X.25, SDLC,ete.) Bit-interleaving main-
`tains the order and numberofbits from input at
`one end ofthe channelto outputat the other end.
`Synchronous protocols require maintaining the
`numberandorderofbits in each clock to ensure
`
`Time division
`multiplexer
`
`Low
`speed
`
`channels
`
`Time division
`multiplexer
`
`Low
`speed
`channels
`
`inal
`nals
`aph
`nals
`the
`
`qu-
`
`inel
`
`rice
`
`‘ion
`lers
`
`ons
`
`ch-
`be
`Dri-
`nch
`1et-
`tie
`an-
`
`wo
`
`Bes Channel 3
`=i,
`Channel1
`
`Channel 2 ~ [Cs|C2C11 G2 [Co] Ca |Cs/ Cx] Cs] C2 [Cg ese Channel 4
`
`
`
`
`Cc Cz|etc,c C3}
`
`
`
`Channel3
`Channel 4
`
`Channel 1
`Channel 2
`
`Bits or characters are inter leaved:
`
`time division multiplexers (TDMs)
`
`543
`
`
`
`

`

`|
`|
`
`hI
`
`
`
`ll
`
`
`
`NaNresteed
`
`
`
`BEeeRee Bridgesthegapbetweendefinitionandexplanation =
`PyettanaeeCRM eGELspecifictopics =
`eeeTeaa UyedaAULLLe
`if you have difficulty answering Re tag between IPARS and IRAC?
`the following make an
`PRUnUnCot
`Whatis the effect of a delay vector on a PeeaeCUNY ANUes
`Whatis a blue alarm?
`How is a ground loop used?
`NARMSUTUCRMUTaelttULLUL) Ato
`How do you use alternate access RROeseTESScee
`TieUCea eeeUL
`POUR Een LmLL id
`Can youidentify the use of different wire colors on the 50-pin punch
`CTT
`What are KEYview and KickSTART and who holds the Reecelamerced
`
`
`
`as
`
`!
`
`;
`
`
`
`a
`
`
`
`~
`
`=a
`
`|
`
`,
`
`SUaSeesa
`
`dictionary of
`
`communications
`technology
`
`Petr MC MOVECELCuterdd POeu ad PeeCUELe rereht
`and engineers. Wider ranging than a conventional dictionary,it enables you
`to check exact specifications, definitions, characteristics, options,relay
`diagrams, paths, allgnments, sources, codes, events, tables, sequences,
`tradenames, methods, and numerous PyTSMoh spell
`disasterif misinterpreted or incorrectly specified.
`In an area of technology where so many things can go wrong (and usually do)this ferets}1-1
`reference encourages maximum accuracy. WRCMSeUlecieLeehmelie ts esaOle
`
`BN 978-0-471-97516-8
`
`9 "780471°9
`
`and over 20 major
`international corporations
`(from AT&T to DEC) have
`contributed to the accuracy
`of this authoritative dictionary.
`
`————
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket