`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`• IP Telephony • LANs & Intranets • Call Centers & Computer Telephony
`• Fiber Optics, SONET and DWDM • Satellites
`• Voice, Data, Image & Video Networking • Wired
`and Wireless Telecom • VoIP • T-1, T-3, T-4, E-1, ,
`►
`E-3 • ISDN & ADSL • Cable Modems • Cellular, <
`PCS & GSM • Windows 95, 98, NT, NetWare,
`Apple, Sun & Unix Networking • Ecommerce
`
`Updatedih (
`
`Expanded
`, Edition ,
`
`by Harry Newton
`
`
`
`i1
`1i
`
`I t
`
`:i
`
`1
`ii
`
`I
`
`I
`
`1
`
`NEWTON’S
`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`15th Updated, Expanded and Much
`Improved Edition
`
`&
`
`a
`
`*
`
`I 4 ?
`
`l •
`
`A
`
`
`
`I
`
`'{
`
`I
`
`NEWTON'S TELECOM DICTIONARY
`copyright © 1999 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved under International and Pan-American Copyright conventions, including the right to reproduce this
`book or portions thereof in any form whatsoever.
`Published in the United States by
`Miller Freeman, Inc.
`Tenth floor
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-031-8
`
`February, 1999
`
`Manufactured in the United States of America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Roldan and Regula Hoffman
`Matt Kelsey, Publisher
`Christine Kern, Manager
`
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`L
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`International service which provides cablegram communica- Caching works because of a phenomenon known as the
`nages f
`tion to International destinations through the use of a com-
`ity principle which states that a von Neumann CPU (j.e ^
`menf
`puterized message switching center in New York City.
`that performs instructions and makes database calls sen'Ue„ ,(0' itper of
`Cablehead The point where a marine cable connects to ter- tially, one after another) tends to access the same me .
`'|,e i
`restrial facilities.
`locations over and over again. A cache works like this,
`•'
`] dedi
`CableLabs Cable Television Laboratories, Inc. A research
`the CPU needs data from memory, the system checks to Z
`,rhing ar
`and development consortium of cable television system oper-
`if the information is already in the cache. If it is, it grabs \u
`,rhe en|
`ators established in 1988. CableLabs plans and funds
`information; this is called a cache hit. If it isn’t, it’s called*
`Sf* Whet)
`research and development projects to help member compa- . cache miss and the computer has to fetch the informations I Intent i
`nies and the cable industry take advantage of opportunities
`accessing the main memory or hard disk, which is slowJ
`f“oroves
`and meet challenges in the telecommunications industry. A
`Data retrieved during a cache miss is often written into k Leonthi
`good deal of emphasis is placed on digital cable and cable
`cache in anticipation of further need for it. Let’s assume Um Ln Cise
`modem technologies, www.cablelabs.com
`you open a CD-ROM application with hyperlinks. As the Sy$
`!U? Tl!
`Cableport Intel Corporation’s new technology, which
`tern can reasonably assume that you will exercise the hypet.
`^jch red
`brings high speed multimedia-rich interactive services to per-
`link options, the information associated with them can t»
`y/eb Cal
`sonal computers in the home via cable.
`stored in cache memory. If you do, indeed, exercise those
`of Cisco I
`Cablespan A Tellabs Operations, Inc. product which deliv-
`options, it’s a cache hit and the data is there waiting for yCll M of traf
`er two-way voice and data services over coaxial cable used by
`The cache also will hold information that you recently f tolerant, '
`cable TV operators. Tellabs is in Lisle, Illinois.
`accessed, in anticipation of your wanting to back up, 0I
`caching?
`Cableway An opening in a work surface that allows access
`access it again. Caching can take place through partitioned o, f on overb
`to cords or cables from below, or mounting of an electrical
`segmented cache memory, which can be in the form of Lt
`benefits
`receptacle or telephone jack. Cableways typically come with
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li
`benefits
`removable plastic grommets.
`cache memory is accessed first, L2 second, the main me®,
`usage ar
`Cabling The combination of all cables, wire, cords, and
`ry (RAM) and then hard drive last. Also, one cache might hold
`users. It
`connecting hardware installed, A term used to refer collec-
`program instructions and the other might hold data. Generally , with a s
`tively to the installed wiring in a given space.
`when the cache is exhausted, it is flushed and the data is writ- 1
`through
`CABS Carrier Access Billing Specifications
`ten back to main memory, to be replaced with the r- ■
`,
`(0(he
`CABS BOS Carrier Access Billing Specifications - Billing
`according to a replacement algorithm. Cache freshing and
`Thus yo
`Output Specifications ,
`flushing mechanism is designed differently by different ven-
`puling i
`CAC 1. Carrier Access Code. The digits you must dial
`in dors. It behaves slightly different. However it mainly i i.
`(ache
`North America to reach the long distance carrier of your
`on main memory type, like write back or WB, write through |
`or SRAI
`choice. Those digits fit the following format 101XXXX.
`WT, write protected or WT, write combining or WC and \
`er to “r
`2. Customer Administration Center. A type of terminal used by uncached or UC. See also Cache Memory.
`| wants tl
`a PBX user to maintain and troubleshoot his PBX.
`2. In the context of a computer network such as a LAN, or the f
`searchi
`3. Connection Admission Control is defined as the set of
`combination of the Internet and World Wide Web, data can be i
`process
`actions taken by the network during the call setup phase (or
`cached in a server which is close to you. In anticipation ol | wait st
`during call re-negotiation phase) in order to determine whether
`your imminent request for that data in a logical sequence of )
`copy o'
`a connection request can be accepted or should be rejected (or
`data access, it will be transmitted from the main server to the i
`the CP
`whether a request for re-allocation can be accomplished).
`remote server. Thereby, the data is accessible to you more ;■
`the ca
`NetWa
`CACH Call Appearance Call Handling.
`quickly than if it had to be transmitted across the entire net- (
`server
`Cache From the French “cacher,” which translates “to press or
`work each time you had a need for it. Should you access a |
`direct!
`hide,” especially in terms of tools or provisions. In the context
`certain set of data frequently, it might be permanently stored -
`i
`Table)
`of computer systems and networks, information is cached by
`on a server in proximity, and refreshed by the main server |
`other
`placing it closer to the user or user application in order to make
`from time to time in order to ensure its currency ■ ■ ! 1
`it more readily and speedily accessible, and transparently so. At
`remains up to date).
`the same time, information which is cached places less stain on
`3. In the context of an Internet client/server application, | andy
`readii
`i
`limited computer I/O (Input/Output) resources and limited net-
`caching really shows its stuff. First, the network uses distrib- f
`Hitai
`work resources. Let’s consider two specific definitions, the first
`uted cache servers to house the WWW information that users
`;
`Cock
`of which relates to computer systems and the second of which
`in your region use frequently. As you access a Web site, your
`;
`ory c
`relates to computer networks. Let’s also consider a combination
`speed of access and response is improved because the data |
`Seel
`of the first two, in the context of the Internet.
`is housed on a server closer to you. The data then
`_
`_
`1. In the context of a computer system, cache memory gener-
`into cache memory on your client computer workstation. As r Jj™
`ally is a partition of SRAM (Static Random Access Memory),
`you move forward, from page to page and link to link, your J-
`ware
`Since much of computing is highly repetitive or predictable in
`client caches the information provided by the cache server
`•
`migl
`nature, and since solid state components (silicon chips) are
`with all of this happening in anticipation of your next move.
`|
`com
`much faster than mechanical disk drives, the speed of infor-
`As you move backward, the same thing happens, in anticipa- |
`mation access can be enhanced if certain information can be
`tion ot that next move, as well. Just in case you don’t believe » n
`stored in RAM. That information typically is in the form of
`the client side of this story, go to Internet Expjorer or |
`program information, memory addresses, or data. Thereby,
`Netscape, and click on cache. (The fastest way to regain space
`.
`the information can be stored in anticipation of your need for
`on your hard disk is to flush the cache which these program|
`it, and can be presented to you faster than if the computer
`dump to your hard disk.)
`, ,
`needed to access the hard drive through the execution of an Cache Coherency Managing a cache so that data is no1
`I/O function. The cache memory sits (logically and, perhaps lost or overwritten. See also Cache.
`physically) between the CPU and the main memory (RAM). Cache Controller A chip, such as the Intel 823£
`126
`
`wor
`ofte
`ext
`
`fl
`^
`i
`\
`
`1
`
`
`
`1
`
`NEWTON’S TELECOM DICTIONARY
`
`■
`M DICTIONARY
`Caching works because of a phenomenon known as the local,' manages the retr'hepai’Cache co'mrollers^ay're^ide CAM Calling Area Data Base. An MCI definition An MCI
`ty principle which states that a von Neumann CPU (i.e.,
`Memory or the hat • , c h
`System that stores reference data for various MCI Systems
`hat performs instructions and makes database calls sequ
`clients orserve e“° ^a carrier-class, high-
`and reconciles MCI Calling Areas with those of Bell,
`tally, one after another) tends to access the same memo,'
`Sm1"? inCPt ln ian e that oerforms Web content
`Caddy The shell of an optical disc. Protects it from grubby
`ocations over and over again. A cache works like this. When, cneed dedicated Int PP accesses a yveb page, the fingerprints, and includes write protection devices. AKA case,
`he CPU needs data from memory, the system checks to Se{ 1 -g,ing and re rieval. Who ^
`hics anpd sHjML
`Cadeiue In voice processing, cadence is used to refer to the
`f the information is already in the cache it is it grabs tiiat JJe engine tol y stores hi pages grapn
`of tones and siience intervals generated by a given
`nformation; this is called a cache hit If i isn’t its called,, g When ano her user laterequests tn same vveo pa e^ m
`s, naL Examp|es are busy and ringing tones. A typical
`ache miss and the computer has to feteh the information by Jtent is pu M g ‘he cache J'guces bandwidth
`cadence pattern is the US ringing tone, which is one second
`accessing the main memory or hard disk, which is s owe| JproVes downtoad time to the ur an“
`Qf tope £llowed by three seconds of silence. Some other
`Data retrieved during a cache miss is often written into g* Jon the netwo k- Here is a an expla
`cache
`$uch as ,he ^ use a double r,ng wrtuch is two
`cache in anticipation of further need for it. Lets assume that,
`|rom Cisco, which ™npcommutateswith a Cisco router,
`short tones within about a second, followed by a little over
`you open a CD-ROM application with hyperlinks. As the sys.
`;;°ork? The
`engine using the
`two seconds of silence,
`tern can reasonably assume that you will exercise the hym . .l|licb redirects Web requ ne icac^ ^^
`CAD$ Code Abuse Detection system,
`link options, the information associated with them can be. Web Cache Control Prot
`aenables |oad ba|anc_ CAI Computer Aided Engineering,
`stored in cache memory. If you do, indeed, exercise those' 0f Cisco I0S software P, hp pnaines and ensures fau|t- Cage Antenna An antenna having conductors arranged
`options, it’s a cache hit and the data is there waiting for you,, ing of traffic acros ,P , ar„ ,b„ benefjts of Web cylindrically.
`The cache also will hold information that you recently ' tolerant fail-safe operate ^ ha^are^the^bComp0und Annua| Growth Rate,
`accessed, in anticipation of your wanting to back up, 0!'
`caChing? BVedHC«ph servers cachina provides significant
`CA11. Computer Assisted Instruction. Commonly known as
`access it again. Caching can take place through partitioned o,
`on overburdened
`md users Those
`CBT (Computer Based Training). See CBT. See also CAD for
`segmented cache memory which can be in the form of Li ;
`benefits to ISPs, en‘arPavinas due to a reduction on WAN
`a discussion on telecom needs.
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li -
`benefits intMetjost sawigs duein) a rea ^ for gn(j
`2 Common Air |nterface. A standard
`,or the interface
`cache memory is accessed first, L2 second, the main memo- >
`usage and dramatic ™pT nrovides network administrators
`between a radio network and equipment. A CAI allows mul-
`ry (RAM) and then hard drive last. Also, one cache might hold t
`users. The cache wre alM pr™*® 2?2 access policy
`tiple vendors to develop equipment, such as radio terminal
`program instructions and the other might hold data. Gene- ;
`a simple method to enforce a S!te wide access policy upie^ cord,esspphMon^Si ce||u|ar ph0nes and PCS
`when the cache is exhausted, it is flushed and the data is writ-"
`through URL 1 f ngthp Itf un1,2rit is artuallv in cache
`terminals) and base stations (e.g„ cellular antenna sites),
`ten back to main memory, to be replaced with the next cache
`£«<he
`ShTch will interoperate. The 'yield is a competitive (mad
`according to a replacement algorithm. Cache freshing and
`Thus you dori have taccesMemory.
`less expensive) market for equipment. The British
`flushing mechanism is designed differently by different. auWIS
`£aiiab|e RAm (Random Access Memory) CT2/Telepoint system incorporated one of the first CAI
`dors. It behaves slightly different. However 1 mainly depends: £«he
`la vou^set up to allow your compute standards See also CT2.
`,
`.
`,
`on main memory type, like write back or WB, write through or SRAM (Static RAM t y P y computer CALC Customer Access Line Charge. Also known variously
`WT, write protected or WT, write combining or WC and er to remember tuff sa
`jnstePad of as Access Charge, EUCL (End User Line Charge), and SLC
`uncached or UC. See also Cache Memory.
`; wants hat Inf°r[™tl0n'' hard disk I/O (Input/Output) (Subscriber Line Charge). See Access Charge,
`2. in the context of a computer network such as a LAN, or the, searching through a slower nara aisK
`v 1 k Communications Assistance for Law Enforcement Act
`combination of the Internet and World Wide Web, data can he .
`: process This higSP«ed <cache^me™r^'™atea ‘
`"4
`cached in a server which is close to you. In anticipation ot . wait state. When thie (DPU reads data from ™in
`Calendar Routing A call center term for directing calls
`your imminent request for that data in a logical sequence of
`copy oh,s at 'SQS °Jpd'SKsKd frX
`according to the day of the week and time of day. See also
`data access, it will be transmitted from the main server to the
`he CF>U reads the same address the dataIS “rr J
`SOURCE/DEST1NATI0N ROUTING, SKILLS BASED ROUTING
`remote server. Thereby, the data is accessible to you more the cache memory nstead of from main memory- ;™vei s FNn-nF-SHIFT ROUTING.
`quickly than ii it had to be transmitted across the entim - NetWare, for examp e, us® cac e
`contains the Calibrate To test and reset a measuring or timing device
`work each time you had a need for it. Should you ac
`serve access t m . 11 NetWare, cache memo y conans n w mraie
`functioning correct]
`certain set of data frequently, it might be permanently stored tetory an file each«s along wj th'FAT (Fife Al ocation
`a djfferent definition for «cal|; My defini-
`on a server in proximity, and refreshed by the main server
`- Tablie). the(,turb° FAT, the Hlashta , P P
`tion is simplest Two people or two machines are on a phone
`from time to time in order to ensure its currency (i.e. ■ „ ■
`2SS Staf’when caching software guesses wrongly
`line speaking to each other. That’s a call. Bellcore’s definition
`remains up to date).
`, „ anri von havp tn road vour data off vour hard disk rather than of a call: An arrangement providing for a relation between two
`3. In the context of an Internet client/server applirahm. j
`if f mm t hp rarhp i n memorv See al so Cache Cache or more simultaneously present users for the purpose of
`caching really shows its stuff. First, the network uses distrib- ! reading \\ from the: cache in memory, bee 0
`,
`exchanging information. The ATM Forum’s definition: A call is
`uted cache servers to house the WWW information that use
`. Hrt«|ICache Memory,
`. js stored in mem-
`an association between two or more users or between a user
`in your region use frequently. As you access a Web site your ™^"3 A Pocesa^ ™J'ch nt0J 1 st for information.
`and a network entity that is established by the use of network
`speed ot access and response is improved because the da
`: y«m w hcipationio\(next q
`capabilities. This association may have zero or more connec-
`is housed on a server closer to you. The data then s loaded ,
`™
`JJ,,
`tions. Here are some more formal definitions:
`into cache memory on your client computer;m ks at ion Jj t Compute?A ded Desion A^computer and its related soft-
`1. In communications, any demand to set up a connection,
`you move forward, from page to page and link to link j waXd'fe mina s usS to d2 th ngs A CAD system 2. A unit of traffic measurement,
`client caches the information provided by the cache servej
`jJana
`‘ draftinqtools or as 3. The actions performed by a call originator.
`S/i'reteffirsSXTappe” »a»5 t ito “ SIS IvuS“legraW p?,cults. CAD
`4. The operations required to establish, maintain, and release
`
`the client side of this story, go to Internet Explore | g® |erm:n ,p {t p i Ams (|oca| area net- 6 The action of bringing a computer program, a routine, or a
`
`on
`C«he° Coherenry Managing a cacho so that data is * I
`
`- a LAN a phonn system - is MJb^Also «W»A»ONED CALLS.^
`
`C«S°StS«“SpCaS as the Intel 823! ' '
`
`Compote, Aided Design/Computer Aided belore their intended transaction is completed. The call may
`
`!6
`
`127
`
`