throbber
NEWTON’S
`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`• IP Telephony • LANs & Intranets • Call Centers & Computer Telephony
`• Fiber Optics, SONET and DWDM • Satellites
`• Voice, Data, Image & Video Networking • Wired
`and Wireless Telecom • VoIP • T-1, T-3, T-4, E-1, ,
`►
`E-3 • ISDN & ADSL • Cable Modems • Cellular, <
`PCS & GSM • Windows 95, 98, NT, NetWare,
`Apple, Sun & Unix Networking • Ecommerce
`
`Updatedih (
`
`Expanded
`, Edition ,
`
`by Harry Newton
`
`

`

`i1
`1i
`
`I t
`
`:i
`
`1
`ii
`
`I
`
`I
`
`1
`
`NEWTON’S
`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`15th Updated, Expanded and Much
`Improved Edition
`
`&
`
`a
`
`*
`
`I 4 ?
`
`l •
`
`A
`
`

`

`I
`
`'{
`
`I
`
`NEWTON'S TELECOM DICTIONARY
`copyright © 1999 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved under International and Pan-American Copyright conventions, including the right to reproduce this
`book or portions thereof in any form whatsoever.
`Published in the United States by
`Miller Freeman, Inc.
`Tenth floor
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-031-8
`
`February, 1999
`
`Manufactured in the United States of America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Roldan and Regula Hoffman
`Matt Kelsey, Publisher
`Christine Kern, Manager
`
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`L
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`International service which provides cablegram communica- Caching works because of a phenomenon known as the
`nages f
`tion to International destinations through the use of a com-
`ity principle which states that a von Neumann CPU (j.e ^
`menf
`puterized message switching center in New York City.
`that performs instructions and makes database calls sen'Ue„ ,(0' itper of
`Cablehead The point where a marine cable connects to ter- tially, one after another) tends to access the same me .
`'|,e i
`restrial facilities.
`locations over and over again. A cache works like this,
`•'
`] dedi
`CableLabs Cable Television Laboratories, Inc. A research
`the CPU needs data from memory, the system checks to Z
`,rhing ar
`and development consortium of cable television system oper-
`if the information is already in the cache. If it is, it grabs \u
`,rhe en|
`ators established in 1988. CableLabs plans and funds
`information; this is called a cache hit. If it isn’t, it’s called*
`Sf* Whet)
`research and development projects to help member compa- . cache miss and the computer has to fetch the informations I Intent i
`nies and the cable industry take advantage of opportunities
`accessing the main memory or hard disk, which is slowJ
`f“oroves
`and meet challenges in the telecommunications industry. A
`Data retrieved during a cache miss is often written into k Leonthi
`good deal of emphasis is placed on digital cable and cable
`cache in anticipation of further need for it. Let’s assume Um Ln Cise
`modem technologies, www.cablelabs.com
`you open a CD-ROM application with hyperlinks. As the Sy$
`!U? Tl!
`Cableport Intel Corporation’s new technology, which
`tern can reasonably assume that you will exercise the hypet.
`^jch red
`brings high speed multimedia-rich interactive services to per-
`link options, the information associated with them can t»
`y/eb Cal
`sonal computers in the home via cable.
`stored in cache memory. If you do, indeed, exercise those
`of Cisco I
`Cablespan A Tellabs Operations, Inc. product which deliv-
`options, it’s a cache hit and the data is there waiting for yCll M of traf
`er two-way voice and data services over coaxial cable used by
`The cache also will hold information that you recently f tolerant, '
`cable TV operators. Tellabs is in Lisle, Illinois.
`accessed, in anticipation of your wanting to back up, 0I
`caching?
`Cableway An opening in a work surface that allows access
`access it again. Caching can take place through partitioned o, f on overb
`to cords or cables from below, or mounting of an electrical
`segmented cache memory, which can be in the form of Lt
`benefits
`receptacle or telephone jack. Cableways typically come with
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li
`benefits
`removable plastic grommets.
`cache memory is accessed first, L2 second, the main me®,
`usage ar
`Cabling The combination of all cables, wire, cords, and
`ry (RAM) and then hard drive last. Also, one cache might hold
`users. It
`connecting hardware installed, A term used to refer collec-
`program instructions and the other might hold data. Generally , with a s
`tively to the installed wiring in a given space.
`when the cache is exhausted, it is flushed and the data is writ- 1
`through
`CABS Carrier Access Billing Specifications
`ten back to main memory, to be replaced with the r- ■
`,
`(0(he
`CABS BOS Carrier Access Billing Specifications - Billing
`according to a replacement algorithm. Cache freshing and
`Thus yo
`Output Specifications ,
`flushing mechanism is designed differently by different ven-
`puling i
`CAC 1. Carrier Access Code. The digits you must dial
`in dors. It behaves slightly different. However it mainly i i.
`(ache
`North America to reach the long distance carrier of your
`on main memory type, like write back or WB, write through |
`or SRAI
`choice. Those digits fit the following format 101XXXX.
`WT, write protected or WT, write combining or WC and \
`er to “r
`2. Customer Administration Center. A type of terminal used by uncached or UC. See also Cache Memory.
`| wants tl
`a PBX user to maintain and troubleshoot his PBX.
`2. In the context of a computer network such as a LAN, or the f
`searchi
`3. Connection Admission Control is defined as the set of
`combination of the Internet and World Wide Web, data can be i
`process
`actions taken by the network during the call setup phase (or
`cached in a server which is close to you. In anticipation ol | wait st
`during call re-negotiation phase) in order to determine whether
`your imminent request for that data in a logical sequence of )
`copy o'
`a connection request can be accepted or should be rejected (or
`data access, it will be transmitted from the main server to the i
`the CP
`whether a request for re-allocation can be accomplished).
`remote server. Thereby, the data is accessible to you more ;■
`the ca
`NetWa
`CACH Call Appearance Call Handling.
`quickly than if it had to be transmitted across the entire net- (
`server
`Cache From the French “cacher,” which translates “to press or
`work each time you had a need for it. Should you access a |
`direct!
`hide,” especially in terms of tools or provisions. In the context
`certain set of data frequently, it might be permanently stored -
`i
`Table)
`of computer systems and networks, information is cached by
`on a server in proximity, and refreshed by the main server |
`other
`placing it closer to the user or user application in order to make
`from time to time in order to ensure its currency ■ ■ ! 1
`it more readily and speedily accessible, and transparently so. At
`remains up to date).
`the same time, information which is cached places less stain on
`3. In the context of an Internet client/server application, | andy
`readii
`i
`limited computer I/O (Input/Output) resources and limited net-
`caching really shows its stuff. First, the network uses distrib- f
`Hitai
`work resources. Let’s consider two specific definitions, the first
`uted cache servers to house the WWW information that users
`;
`Cock
`of which relates to computer systems and the second of which
`in your region use frequently. As you access a Web site, your
`;
`ory c
`relates to computer networks. Let’s also consider a combination
`speed of access and response is improved because the data |
`Seel
`of the first two, in the context of the Internet.
`is housed on a server closer to you. The data then
`_
`_
`1. In the context of a computer system, cache memory gener-
`into cache memory on your client computer workstation. As r Jj™
`ally is a partition of SRAM (Static Random Access Memory),
`you move forward, from page to page and link to link, your J-
`ware
`Since much of computing is highly repetitive or predictable in
`client caches the information provided by the cache server
`•
`migl
`nature, and since solid state components (silicon chips) are
`with all of this happening in anticipation of your next move.
`|
`com
`much faster than mechanical disk drives, the speed of infor-
`As you move backward, the same thing happens, in anticipa- |
`mation access can be enhanced if certain information can be
`tion ot that next move, as well. Just in case you don’t believe » n
`stored in RAM. That information typically is in the form of
`the client side of this story, go to Internet Expjorer or |
`program information, memory addresses, or data. Thereby,
`Netscape, and click on cache. (The fastest way to regain space
`.
`the information can be stored in anticipation of your need for
`on your hard disk is to flush the cache which these program|
`it, and can be presented to you faster than if the computer
`dump to your hard disk.)
`, ,
`needed to access the hard drive through the execution of an Cache Coherency Managing a cache so that data is no1
`I/O function. The cache memory sits (logically and, perhaps lost or overwritten. See also Cache.
`physically) between the CPU and the main memory (RAM). Cache Controller A chip, such as the Intel 823£
`126
`
`wor
`ofte
`ext
`
`fl
`^
`i
`\
`
`1
`
`

`

`1
`
`NEWTON’S TELECOM DICTIONARY
`
`■
`M DICTIONARY
`Caching works because of a phenomenon known as the local,' manages the retr'hepai’Cache co'mrollers^ay're^ide CAM Calling Area Data Base. An MCI definition An MCI
`ty principle which states that a von Neumann CPU (i.e.,
`Memory or the hat • , c h
`System that stores reference data for various MCI Systems
`hat performs instructions and makes database calls sequ
`clients orserve e“° ^a carrier-class, high-
`and reconciles MCI Calling Areas with those of Bell,
`tally, one after another) tends to access the same memo,'
`Sm1"? inCPt ln ian e that oerforms Web content
`Caddy The shell of an optical disc. Protects it from grubby
`ocations over and over again. A cache works like this. When, cneed dedicated Int PP accesses a yveb page, the fingerprints, and includes write protection devices. AKA case,
`he CPU needs data from memory, the system checks to Se{ 1 -g,ing and re rieval. Who ^
`hics anpd sHjML
`Cadeiue In voice processing, cadence is used to refer to the
`f the information is already in the cache it is it grabs tiiat JJe engine tol y stores hi pages grapn
`of tones and siience intervals generated by a given
`nformation; this is called a cache hit If i isn’t its called,, g When ano her user laterequests tn same vveo pa e^ m
`s, naL Examp|es are busy and ringing tones. A typical
`ache miss and the computer has to feteh the information by Jtent is pu M g ‘he cache J'guces bandwidth
`cadence pattern is the US ringing tone, which is one second
`accessing the main memory or hard disk, which is s owe| JproVes downtoad time to the ur an“
`Qf tope £llowed by three seconds of silence. Some other
`Data retrieved during a cache miss is often written into g* Jon the netwo k- Here is a an expla
`cache
`$uch as ,he ^ use a double r,ng wrtuch is two
`cache in anticipation of further need for it. Lets assume that,
`|rom Cisco, which ™npcommutateswith a Cisco router,
`short tones within about a second, followed by a little over
`you open a CD-ROM application with hyperlinks. As the sys.
`;;°ork? The
`engine using the
`two seconds of silence,
`tern can reasonably assume that you will exercise the hym . .l|licb redirects Web requ ne icac^ ^^
`CAD$ Code Abuse Detection system,
`link options, the information associated with them can be. Web Cache Control Prot
`aenables |oad ba|anc_ CAI Computer Aided Engineering,
`stored in cache memory. If you do, indeed, exercise those' 0f Cisco I0S software P, hp pnaines and ensures fau|t- Cage Antenna An antenna having conductors arranged
`options, it’s a cache hit and the data is there waiting for you,, ing of traffic acros ,P , ar„ ,b„ benefjts of Web cylindrically.
`The cache also will hold information that you recently ' tolerant fail-safe operate ^ ha^are^the^bComp0und Annua| Growth Rate,
`accessed, in anticipation of your wanting to back up, 0!'
`caChing? BVedHC«ph servers cachina provides significant
`CA11. Computer Assisted Instruction. Commonly known as
`access it again. Caching can take place through partitioned o,
`on overburdened
`md users Those
`CBT (Computer Based Training). See CBT. See also CAD for
`segmented cache memory which can be in the form of Li ;
`benefits to ISPs, en‘arPavinas due to a reduction on WAN
`a discussion on telecom needs.
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li -
`benefits intMetjost sawigs duein) a rea ^ for gn(j
`2 Common Air |nterface. A standard
`,or the interface
`cache memory is accessed first, L2 second, the main memo- >
`usage and dramatic ™pT nrovides network administrators
`between a radio network and equipment. A CAI allows mul-
`ry (RAM) and then hard drive last. Also, one cache might hold t
`users. The cache wre alM pr™*® 2?2 access policy
`tiple vendors to develop equipment, such as radio terminal
`program instructions and the other might hold data. Gene- ;
`a simple method to enforce a S!te wide access policy upie^ cord,esspphMon^Si ce||u|ar ph0nes and PCS
`when the cache is exhausted, it is flushed and the data is writ-"
`through URL 1 f ngthp Itf un1,2rit is artuallv in cache
`terminals) and base stations (e.g„ cellular antenna sites),
`ten back to main memory, to be replaced with the next cache
`£«<he
`ShTch will interoperate. The 'yield is a competitive (mad
`according to a replacement algorithm. Cache freshing and
`Thus you dori have taccesMemory.
`less expensive) market for equipment. The British
`flushing mechanism is designed differently by different. auWIS
`£aiiab|e RAm (Random Access Memory) CT2/Telepoint system incorporated one of the first CAI
`dors. It behaves slightly different. However 1 mainly depends: £«he
`la vou^set up to allow your compute standards See also CT2.
`,
`.
`,
`on main memory type, like write back or WB, write through or SRAM (Static RAM t y P y computer CALC Customer Access Line Charge. Also known variously
`WT, write protected or WT, write combining or WC and er to remember tuff sa
`jnstePad of as Access Charge, EUCL (End User Line Charge), and SLC
`uncached or UC. See also Cache Memory.
`; wants hat Inf°r[™tl0n'' hard disk I/O (Input/Output) (Subscriber Line Charge). See Access Charge,
`2. in the context of a computer network such as a LAN, or the, searching through a slower nara aisK
`v 1 k Communications Assistance for Law Enforcement Act
`combination of the Internet and World Wide Web, data can he .
`: process This higSP«ed <cache^me™r^'™atea ‘
`"4
`cached in a server which is close to you. In anticipation ot . wait state. When thie (DPU reads data from ™in
`Calendar Routing A call center term for directing calls
`your imminent request for that data in a logical sequence of
`copy oh,s at 'SQS °Jpd'SKsKd frX
`according to the day of the week and time of day. See also
`data access, it will be transmitted from the main server to the
`he CF>U reads the same address the dataIS “rr J
`SOURCE/DEST1NATI0N ROUTING, SKILLS BASED ROUTING
`remote server. Thereby, the data is accessible to you more the cache memory nstead of from main memory- ;™vei s FNn-nF-SHIFT ROUTING.
`quickly than ii it had to be transmitted across the entim - NetWare, for examp e, us® cac e
`contains the Calibrate To test and reset a measuring or timing device
`work each time you had a need for it. Should you ac
`serve access t m . 11 NetWare, cache memo y conans n w mraie
`functioning correct]
`certain set of data frequently, it might be permanently stored tetory an file each«s along wj th'FAT (Fife Al ocation
`a djfferent definition for «cal|; My defini-
`on a server in proximity, and refreshed by the main server
`- Tablie). the(,turb° FAT, the Hlashta , P P
`tion is simplest Two people or two machines are on a phone
`from time to time in order to ensure its currency (i.e. ■ „ ■
`2SS Staf’when caching software guesses wrongly
`line speaking to each other. That’s a call. Bellcore’s definition
`remains up to date).
`, „ anri von havp tn road vour data off vour hard disk rather than of a call: An arrangement providing for a relation between two
`3. In the context of an Internet client/server applirahm. j
`if f mm t hp rarhp i n memorv See al so Cache Cache or more simultaneously present users for the purpose of
`caching really shows its stuff. First, the network uses distrib- ! reading \\ from the: cache in memory, bee 0
`,
`exchanging information. The ATM Forum’s definition: A call is
`uted cache servers to house the WWW information that use
`. Hrt«|ICache Memory,
`. js stored in mem-
`an association between two or more users or between a user
`in your region use frequently. As you access a Web site your ™^"3 A Pocesa^ ™J'ch nt0J 1 st for information.
`and a network entity that is established by the use of network
`speed ot access and response is improved because the da
`: y«m w hcipationio\(next q
`capabilities. This association may have zero or more connec-
`is housed on a server closer to you. The data then s loaded ,
`™
`JJ,,
`tions. Here are some more formal definitions:
`into cache memory on your client computer;m ks at ion Jj t Compute?A ded Desion A^computer and its related soft-
`1. In communications, any demand to set up a connection,
`you move forward, from page to page and link to link j waXd'fe mina s usS to d2 th ngs A CAD system 2. A unit of traffic measurement,
`client caches the information provided by the cache servej
`jJana
`‘ draftinqtools or as 3. The actions performed by a call originator.
`S/i'reteffirsSXTappe” »a»5 t ito “ SIS IvuS“legraW p?,cults. CAD
`4. The operations required to establish, maintain, and release
`
`the client side of this story, go to Internet Explore | g® |erm:n ,p {t p i Ams (|oca| area net- 6 The action of bringing a computer program, a routine, or a
`
`on
`C«he° Coherenry Managing a cacho so that data is * I
`
`- a LAN a phonn system - is MJb^Also «W»A»ONED CALLS.^
`
`C«S°StS«“SpCaS as the Intel 823! ' '
`
`Compote, Aided Design/Computer Aided belore their intended transaction is completed. The call may
`
`!6
`
`127
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket