throbber
NEWTON’S
`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`• IP Telephony • LANs & Intranets • Call Centers & Computer Telephony
`• Fiber Optics, SONET and DWDM • Satellites
`• Voice, Data, Image & Video Networking • Wired
`and Wireless Telecom • VoIP • T-1, T-3, T-4, E-1, ,
`►
`E-3 • ISDN & ADSL • Cable Modems • Cellular, <
`PCS & GSM • Windows 95, 98, NT, NetWare,
`Apple, Sun & Unix Networking • Ecommerce
`
`Updatedih (
`
`Expanded
`, Edition ,
`
`by Harry Newton
`
`Adobe - Exhibit 1025, cover
`
`

`

`i1
`1i
`
`I t
`
`:i
`
`1
`ii
`
`I
`
`I
`
`1
`
`NEWTON’S
`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`15th Updated, Expanded and Much
`Improved Edition
`
`&
`
`a
`
`*
`
`I 4 ?
`
`l •
`
`A
`
`Adobe - Exhibit 1025, page i
`
`

`

`I
`
`'{
`
`I
`
`NEWTON'S TELECOM DICTIONARY
`copyright © 1999 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved under International and Pan-American Copyright conventions, including the right to reproduce this
`book or portions thereof in any form whatsoever.
`Published in the United States by
`Miller Freeman, Inc.
`Tenth floor
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-031-8
`
`February, 1999
`
`Manufactured in the United States of America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Roldan and Regula Hoffman
`Matt Kelsey, Publisher
`Christine Kern, Manager
`
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`L
`
`Adobe - Exhibit 1025, page ii
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`International service which provides cablegram communica- Caching works because of a phenomenon known as the
`nages f
`tion to International destinations through the use of a com-
`ity principle which states that a von Neumann CPU (j.e ^
`menf
`puterized message switching center in New York City.
`that performs instructions and makes database calls sen'Ue„ ,(0' itper of
`Cablehead The point where a marine cable connects to ter- tially, one after another) tends to access the same me .
`'|,e i
`restrial facilities.
`locations over and over again. A cache works like this,
`•'
`] dedi
`CableLabs Cable Television Laboratories, Inc. A research
`the CPU needs data from memory, the system checks to Z
`,rhing ar
`and development consortium of cable television system oper-
`if the information is already in the cache. If it is, it grabs \u
`,rhe en|
`ators established in 1988. CableLabs plans and funds
`information; this is called a cache hit. If it isn’t, it’s called*
`Sf* Whet)
`research and development projects to help member compa- . cache miss and the computer has to fetch the informations I Intent i
`nies and the cable industry take advantage of opportunities
`accessing the main memory or hard disk, which is slowJ
`f“oroves
`and meet challenges in the telecommunications industry. A
`Data retrieved during a cache miss is often written into k Leonthi
`good deal of emphasis is placed on digital cable and cable
`cache in anticipation of further need for it. Let’s assume Um Ln Cise
`modem technologies, www.cablelabs.com
`you open a CD-ROM application with hyperlinks. As the Sy$
`!U? Tl!
`Cableport Intel Corporation’s new technology, which
`tern can reasonably assume that you will exercise the hypet.
`^jch red
`brings high speed multimedia-rich interactive services to per-
`link options, the information associated with them can t»
`y/eb Cal
`sonal computers in the home via cable.
`stored in cache memory. If you do, indeed, exercise those
`of Cisco I
`Cablespan A Tellabs Operations, Inc. product which deliv-
`options, it’s a cache hit and the data is there waiting for yCll M of traf
`er two-way voice and data services over coaxial cable used by
`The cache also will hold information that you recently f tolerant, '
`cable TV operators. Tellabs is in Lisle, Illinois.
`accessed, in anticipation of your wanting to back up, 0I
`caching?
`Cableway An opening in a work surface that allows access
`access it again. Caching can take place through partitioned o, f on overb
`to cords or cables from below, or mounting of an electrical
`segmented cache memory, which can be in the form of Lt
`benefits
`receptacle or telephone jack. Cableways typically come with
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li
`benefits
`removable plastic grommets.
`cache memory is accessed first, L2 second, the main me®,
`usage ar
`Cabling The combination of all cables, wire, cords, and
`ry (RAM) and then hard drive last. Also, one cache might hold
`users. It
`connecting hardware installed, A term used to refer collec-
`program instructions and the other might hold data. Generally , with a s
`tively to the installed wiring in a given space.
`when the cache is exhausted, it is flushed and the data is writ- 1
`through
`CABS Carrier Access Billing Specifications
`ten back to main memory, to be replaced with the r- ■
`,
`(0(he
`CABS BOS Carrier Access Billing Specifications - Billing
`according to a replacement algorithm. Cache freshing and
`Thus yo
`Output Specifications ,
`flushing mechanism is designed differently by different ven-
`puling i
`CAC 1. Carrier Access Code. The digits you must dial
`in dors. It behaves slightly different. However it mainly i i.
`(ache
`North America to reach the long distance carrier of your
`on main memory type, like write back or WB, write through |
`or SRAI
`choice. Those digits fit the following format 101XXXX.
`WT, write protected or WT, write combining or WC and \
`er to “r
`2. Customer Administration Center. A type of terminal used by uncached or UC. See also Cache Memory.
`| wants tl
`a PBX user to maintain and troubleshoot his PBX.
`2. In the context of a computer network such as a LAN, or the f
`searchi
`3. Connection Admission Control is defined as the set of
`combination of the Internet and World Wide Web, data can be i
`process
`actions taken by the network during the call setup phase (or
`cached in a server which is close to you. In anticipation ol | wait st
`during call re-negotiation phase) in order to determine whether
`your imminent request for that data in a logical sequence of )
`copy o'
`a connection request can be accepted or should be rejected (or
`data access, it will be transmitted from the main server to the i
`the CP
`whether a request for re-allocation can be accomplished).
`remote server. Thereby, the data is accessible to you more ;■
`the ca
`NetWa
`CACH Call Appearance Call Handling.
`quickly than if it had to be transmitted across the entire net- (
`server
`Cache From the French “cacher,” which translates “to press or
`work each time you had a need for it. Should you access a |
`direct!
`hide,” especially in terms of tools or provisions. In the context
`certain set of data frequently, it might be permanently stored -
`i
`Table)
`of computer systems and networks, information is cached by
`on a server in proximity, and refreshed by the main server |
`other
`placing it closer to the user or user application in order to make
`from time to time in order to ensure its currency ■ ■ ! 1
`it more readily and speedily accessible, and transparently so. At
`remains up to date).
`the same time, information which is cached places less stain on
`3. In the context of an Internet client/server application, | andy
`readii
`i
`limited computer I/O (Input/Output) resources and limited net-
`caching really shows its stuff. First, the network uses distrib- f
`Hitai
`work resources. Let’s consider two specific definitions, the first
`uted cache servers to house the WWW information that users
`;
`Cock
`of which relates to computer systems and the second of which
`in your region use frequently. As you access a Web site, your
`;
`ory c
`relates to computer networks. Let’s also consider a combination
`speed of access and response is improved because the data |
`Seel
`of the first two, in the context of the Internet.
`is housed on a server closer to you. The data then
`_
`_
`1. In the context of a computer system, cache memory gener-
`into cache memory on your client computer workstation. As r Jj™
`ally is a partition of SRAM (Static Random Access Memory),
`you move forward, from page to page and link to link, your J-
`ware
`Since much of computing is highly repetitive or predictable in
`client caches the information provided by the cache server
`•
`migl
`nature, and since solid state components (silicon chips) are
`with all of this happening in anticipation of your next move.
`|
`com
`much faster than mechanical disk drives, the speed of infor-
`As you move backward, the same thing happens, in anticipa- |
`mation access can be enhanced if certain information can be
`tion ot that next move, as well. Just in case you don’t believe » n
`stored in RAM. That information typically is in the form of
`the client side of this story, go to Internet Expjorer or |
`program information, memory addresses, or data. Thereby,
`Netscape, and click on cache. (The fastest way to regain space
`.
`the information can be stored in anticipation of your need for
`on your hard disk is to flush the cache which these program|
`it, and can be presented to you faster than if the computer
`dump to your hard disk.)
`, ,
`needed to access the hard drive through the execution of an Cache Coherency Managing a cache so that data is no1
`I/O function. The cache memory sits (logically and, perhaps lost or overwritten. See also Cache.
`physically) between the CPU and the main memory (RAM). Cache Controller A chip, such as the Intel 823£
`126
`
`wor
`ofte
`ext
`
`fl
`^
`i
`\
`
`1
`
`Adobe - Exhibit 1025, page 126
`
`

`

`1
`
`NEWTON’S TELECOM DICTIONARY
`
`■
`M DICTIONARY
`Caching works because of a phenomenon known as the local,' manages the retr'hepai’Cache co'mrollers^ay're^ide CAM Calling Area Data Base. An MCI definition An MCI
`ty principle which states that a von Neumann CPU (i.e.,
`Memory or the hat • , c h
`System that stores reference data for various MCI Systems
`hat performs instructions and makes database calls sequ
`clients orserve e“° ^a carrier-class, high-
`and reconciles MCI Calling Areas with those of Bell,
`tally, one after another) tends to access the same memo,'
`Sm1"? inCPt ln ian e that oerforms Web content
`Caddy The shell of an optical disc. Protects it from grubby
`ocations over and over again. A cache works like this. When, cneed dedicated Int PP accesses a yveb page, the fingerprints, and includes write protection devices. AKA case,
`he CPU needs data from memory, the system checks to Se{ 1 -g,ing and re rieval. Who ^
`hics anpd sHjML
`Cadeiue In voice processing, cadence is used to refer to the
`f the information is already in the cache it is it grabs tiiat JJe engine tol y stores hi pages grapn
`of tones and siience intervals generated by a given
`nformation; this is called a cache hit If i isn’t its called,, g When ano her user laterequests tn same vveo pa e^ m
`s, naL Examp|es are busy and ringing tones. A typical
`ache miss and the computer has to feteh the information by Jtent is pu M g ‘he cache J'guces bandwidth
`cadence pattern is the US ringing tone, which is one second
`accessing the main memory or hard disk, which is s owe| JproVes downtoad time to the ur an“
`Qf tope £llowed by three seconds of silence. Some other
`Data retrieved during a cache miss is often written into g* Jon the netwo k- Here is a an expla
`cache
`$uch as ,he ^ use a double r,ng wrtuch is two
`cache in anticipation of further need for it. Lets assume that,
`|rom Cisco, which ™npcommutateswith a Cisco router,
`short tones within about a second, followed by a little over
`you open a CD-ROM application with hyperlinks. As the sys.
`;;°ork? The
`engine using the
`two seconds of silence,
`tern can reasonably assume that you will exercise the hym . .l|licb redirects Web requ ne icac^ ^^
`CAD$ Code Abuse Detection system,
`link options, the information associated with them can be. Web Cache Control Prot
`aenables |oad ba|anc_ CAI Computer Aided Engineering,
`stored in cache memory. If you do, indeed, exercise those' 0f Cisco I0S software P, hp pnaines and ensures fau|t- Cage Antenna An antenna having conductors arranged
`options, it’s a cache hit and the data is there waiting for you,, ing of traffic acros ,P , ar„ ,b„ benefjts of Web cylindrically.
`The cache also will hold information that you recently ' tolerant fail-safe operate ^ ha^are^the^bComp0und Annua| Growth Rate,
`accessed, in anticipation of your wanting to back up, 0!'
`caChing? BVedHC«ph servers cachina provides significant
`CA11. Computer Assisted Instruction. Commonly known as
`access it again. Caching can take place through partitioned o,
`on overburdened
`md users Those
`CBT (Computer Based Training). See CBT. See also CAD for
`segmented cache memory which can be in the form of Li ;
`benefits to ISPs, en‘arPavinas due to a reduction on WAN
`a discussion on telecom needs.
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li -
`benefits intMetjost sawigs duein) a rea ^ for gn(j
`2 Common Air |nterface. A standard
`,or the interface
`cache memory is accessed first, L2 second, the main memo- >
`usage and dramatic ™pT nrovides network administrators
`between a radio network and equipment. A CAI allows mul-
`ry (RAM) and then hard drive last. Also, one cache might hold t
`users. The cache wre alM pr™*® 2?2 access policy
`tiple vendors to develop equipment, such as radio terminal
`program instructions and the other might hold data. Gene- ;
`a simple method to enforce a S!te wide access policy upie^ cord,esspphMon^Si ce||u|ar ph0nes and PCS
`when the cache is exhausted, it is flushed and the data is writ-"
`through URL 1 f ngthp Itf un1,2rit is artuallv in cache
`terminals) and base stations (e.g„ cellular antenna sites),
`ten back to main memory, to be replaced with the next cache
`£«<he
`ShTch will interoperate. The 'yield is a competitive (mad
`according to a replacement algorithm. Cache freshing and
`Thus you dori have taccesMemory.
`less expensive) market for equipment. The British
`flushing mechanism is designed differently by different. auWIS
`£aiiab|e RAm (Random Access Memory) CT2/Telepoint system incorporated one of the first CAI
`dors. It behaves slightly different. However 1 mainly depends: £«he
`la vou^set up to allow your compute standards See also CT2.
`,
`.
`,
`on main memory type, like write back or WB, write through or SRAM (Static RAM t y P y computer CALC Customer Access Line Charge. Also known variously
`WT, write protected or WT, write combining or WC and er to remember tuff sa
`jnstePad of as Access Charge, EUCL (End User Line Charge), and SLC
`uncached or UC. See also Cache Memory.
`; wants hat Inf°r[™tl0n'' hard disk I/O (Input/Output) (Subscriber Line Charge). See Access Charge,
`2. in the context of a computer network such as a LAN, or the, searching through a slower nara aisK
`v 1 k Communications Assistance for Law Enforcement Act
`combination of the Internet and World Wide Web, data can he .
`: process This higSP«ed <cache^me™r^'™atea ‘
`"4
`cached in a server which is close to you. In anticipation ot . wait state. When thie (DPU reads data from ™in
`Calendar Routing A call center term for directing calls
`your imminent request for that data in a logical sequence of
`copy oh,s at 'SQS °Jpd'SKsKd frX
`according to the day of the week and time of day. See also
`data access, it will be transmitted from the main server to the
`he CF>U reads the same address the dataIS “rr J
`SOURCE/DEST1NATI0N ROUTING, SKILLS BASED ROUTING
`remote server. Thereby, the data is accessible to you more the cache memory nstead of from main memory- ;™vei s FNn-nF-SHIFT ROUTING.
`quickly than ii it had to be transmitted across the entim - NetWare, for examp e, us® cac e
`contains the Calibrate To test and reset a measuring or timing device
`work each time you had a need for it. Should you ac
`serve access t m . 11 NetWare, cache memo y conans n w mraie
`functioning correct]
`certain set of data frequently, it might be permanently stored tetory an file each«s along wj th'FAT (Fife Al ocation
`a djfferent definition for «cal|; My defini-
`on a server in proximity, and refreshed by the main server
`- Tablie). the(,turb° FAT, the Hlashta , P P
`tion is simplest Two people or two machines are on a phone
`from time to time in order to ensure its currency (i.e. ■ „ ■
`2SS Staf’when caching software guesses wrongly
`line speaking to each other. That’s a call. Bellcore’s definition
`remains up to date).
`, „ anri von havp tn road vour data off vour hard disk rather than of a call: An arrangement providing for a relation between two
`3. In the context of an Internet client/server applirahm. j
`if f mm t hp rarhp i n memorv See al so Cache Cache or more simultaneously present users for the purpose of
`caching really shows its stuff. First, the network uses distrib- ! reading \\ from the: cache in memory, bee 0
`,
`exchanging information. The ATM Forum’s definition: A call is
`uted cache servers to house the WWW information that use
`. Hrt«|ICache Memory,
`. js stored in mem-
`an association between two or more users or between a user
`in your region use frequently. As you access a Web site your ™^"3 A Pocesa^ ™J'ch nt0J 1 st for information.
`and a network entity that is established by the use of network
`speed ot access and response is improved because the da
`: y«m w hcipationio\(next q
`capabilities. This association may have zero or more connec-
`is housed on a server closer to you. The data then s loaded ,
`™
`JJ,,
`tions. Here are some more formal definitions:
`into cache memory on your client computer;m ks at ion Jj t Compute?A ded Desion A^computer and its related soft-
`1. In communications, any demand to set up a connection,
`you move forward, from page to page and link to link j waXd'fe mina s usS to d2 th ngs A CAD system 2. A unit of traffic measurement,
`client caches the information provided by the cache servej
`jJana
`‘ draftinqtools or as 3. The actions performed by a call originator.
`S/i'reteffirsSXTappe” »a»5 t ito “ SIS IvuS“legraW p?,cults. CAD
`4. The operations required to establish, maintain, and release
`
`the client side of this story, go to Internet Explore | g® |erm:n ,p {t p i Ams (|oca| area net- 6 The action of bringing a computer program, a routine, or a
`
`on
`C«he° Coherenry Managing a cacho so that data is * I
`
`- a LAN a phonn system - is MJb^Also «W»A»ONED CALLS.^
`
`C«S°StS«“SpCaS as the Intel 823! ' '
`
`Compote, Aided Design/Computer Aided belore their intended transaction is completed. The call may
`
`!6
`
`127
`
`Adobe - Exhibit 1025, page 127
`
`

`

`I DICTIONARY
`
`3 the system address space. This means application«
`re will run directly from the card, start faster and not ren,? '
`cious RAM from the host computer.
`4Ulre
`3 key element of the PCMCIA software architecture -
`;ket Services and Card Services. Socket Services is a Rino
`3l software interface that provides a way to access th
`MCIA sockets (slots) of a computer. Socket Services ide7
`is how many sockets are in your computer system
`and
`3cts the insertion or removal of a PC Card while the
`is powered on. Socket Services is part of the PCMpia
`reification and interfaces with Card Services
`vices is a software management interface that allows tho
`cation of system resources (such as memory and inter
`:s) automatically, once the Socket Services detects that a
`Card has been added. Card Services also releases thei
`lurces when the PC Card has been removed. Cara
`rices also provides you with an interface to higher IpJ
`rvare to load any needed hardware drivers,
`combination of PC Card hardware, Card Services soft.
`) and Socket Services software provides an almost “niun
`■play” capability in the portable computing environment
`3 the software has been installed, it is theoretically poss _
`o add and remove PC Cards without powering off the svs
`But this is theory. And in practice, it has worked onlv
`mittently for this writer. It doesn’t work for network cardc''
`rieant to be possible, for example, to insert a modem
`ICIA Card to access another computer system, download
`mation into the portable computer’s memory, remove the
`3m
`'~i PCMCIA Card, replace it with a flash PCMCIA Card
`store the downloaded information — all while youi
`•ble computer is still powered on. Great theory.
`3CMCIA has around 300 members, including manufac-
`" of semiconductors, connectors, peripherals and sys-
`3
`, as well as BIOS and software developers and related
`dries. Members include Intel, IBM, Toshiba, Lotus
`n and Fujitsu. The association is based in Sunnyvale!
`108-720-0107. It has an electronic bulletin board —^
`'’20-9388. Its standards are also recognized by the
`lese
`Electronic Industry Development Association
`A). The Association publishes a free book listing all the
`facturers making cards which comply to their standards
`e in buying PCMCIA cards: PCMCIA standards are stili
`formed and are thus not truly standards. Check that
`you buy work in your machine. The manufacturer
`d have tested it in your machine. Don’t assume compat-
`Check your socket and card services supports that
`!t may not. Use “enabler” software instead. Avoid PCM-
`ards with “pigtails.” They break. You lose them. Use
`/IA cards with an “X-JACK." You can plug directly into
`ICIA card with an X-JACK, or equivalent. If you have to
`card with a pigtail, buy a second pigtail, just in case.
`)4, the PCMCIA started calling its specs, PC Card,
`people said it was because many people claimed that
`JA stood for “People Can’t Memorize Computer
`ry Acronyms.”.
`latter part of 1995, the PCMCIA came out with a new
`cation called CardBus which is a 32-bit bus, as against
`:sent 16-bit cards. CardBus is an extension of the PCI
`his means that new CardBus will support 132 Mb|
`aster than the present 8 Mbps. See CardBus for a full
`ition of that new standard. See also Card Servici
`IA standards, Socket Services, and Slot Sizf
`imcia.org
`Ifl Standards The complete set of all of the PCM-
`
`I
`
`f
`
`pi a pc Card Standards. It includes the PC Card Standard
`□please v2,01, Socket Services Specification Release v2.0,
`card Services Specification Release v2.0, ATA Specification
`Release v1.01, AIMS Specification Release v1.0, and the
`Recommended Extensions Release v1.0. Standard v3.0 has
`heen proposed. See PCMCIA, www.pcmcia.org
`p£N Personal Communications Network. A new type of wire-
`Ls telephone system that would use light, inexpensive
`handheld handsets and communicate via low-power anten­
`nas. When it was originally conceived, PCN was primarily
`seen as an a city communications system, with far less range
`lhan cellular. Subscribers would be able to make and receive
`calls while they are traveling, as they can do today with cellu­
`lar radio systems, but at a low price. Now PCN is seen as
`what Dr. Sorin Cohn of Northern Telecom calls an “enabler of
`unplanned growth." One idea for PCN is to locate a PCN cell
`site (transmitter/receiver) in a residential community. When
`someone wanted a new phone line, they’d simply drop down
`to their local phone store, pick up a PCN portable phone and,
`tjy the time, they got back home, their frequency would be
`•switched on” and they’d be “live.” The original plans for PCN
`never materialized fully. However, the concept has been
`Implemented in the forms of Personal Communications
`Service (PCS) and Wireless Local Loop (WLL). See also PCS,
`Personal Communications Network, Wireless Local Loop.
`PCO Point of Control and Observation: A place (point) with­
`in a testing environment where the occurrence of test events
`is to be controlled and observed as defined by the particular
`abstract test method used.
`PCP1. Post Call Processing.
`2. Program Clock Reference: A timestamp that is inserted by
`the MPEG-2 encoder into the Transport Stream to aid the
`decoder in the recovering and tracking the encoder clock.
`PCR An ATM term. Peak Cell Rate: The Peak Cell Rate, in
`cells/sec, is the cell rate which the source may never exceed.
`PCS 1. the plural of PCs, i.e. PCc.
`2. Personal Communications Service. A new, lower powered,
`higher-frequency competitive technology to cellular. Whereas
`cellular typically operates in the 800-900 MHz range, PCS
`operates in the 1.5 to 1.8 Ghz range. The idea with PCS is that
`the phones are cheaper, have less range, are digital; the cells
`would be smaller and closer together and the airtime would be
`cheaper also. Several licenses have been awarded and sever-
`al systems have started in North America. The concept of PCS
`is evolving. It is not clear exactly where it will end up. So far,
`it looks like another cellular system with some digital mes­
`saging on the phone’s larger screen, this is how the Federal
`Government awarded PCS licenses:
`• “C-Block” Carrier
`A 30 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1895-1910 MHz paired with 1975-1990 MHz.
`• “D-Block” Carrier
`A10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1865-1870 MHz paired with 1945-1950 MHz.
`• "E-Block” Carrier
`A10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1885-1890 MHz paired with 1965-1970 MHz.
`• “F-Block" Carrier
`A10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1890-1895 MHz paired with 1970-1975 MHz.
`
`NEWTON’S TELECOM DICTIONARY
`See PERSONAL COMMUNICATIONS NETWORKS and PER­
`SONAL COMMUNICATION SERVICES.
`PCS Over Cable You run a CATV — cable TV company.
`You have a wires strung all over the neighborhood. On one of
`your wires you attach a six foot by four foot by four box of
`electronics and three two feet attennae. Bingo, you’re now a
`way station — also called a cell site — for a PCS cellular
`phone system. People who are PCS subscribers will talk and
`receive calls when they're close to your cell site. Calls come
`and go via your coax cable, up it to a landline connection
`point with the PCS carrier. You, the CATV company, get paid
`money for completing calls. See www.sanders.com/telecomm
`PCSA Personal Computing System Architecture. A PC imple­
`mentation of DECnet, that lets PCs work in a DECnet environ­
`ment. PCSA is a network architecture defined and supported
`by Digital Equipment Corporation for the incorporation of per­
`sonal computers into server-based networks.
`PCT Personal Communications Technology. A security proto­
`col developed by Microsoft for online Web commerce and
`financial transactions. Transparent to the user, PCT provides
`authentication and encryption routines that complement cred­
`it-card based commerce on the World Wide Web. Internet
`Explorer, Microsoft's Web browser, makes use of PCT. See
`also AUTHENTICATION and ENCRYPTION.
`PCTA Personal Computer Terminal Adapter. A printed circuit
`card that slips into an IBM PC or PC compatible and allows
`that PC to be connected to the ISDN T-interface. See PER­
`SONAL COMPUTER TERMINAL ADAPTER.
`PCTE Portable Common Tool Environment.
`PCTS Public Cordless Telephone Service. A Canadian digital
`cordless telephone service for residential, business and pub­
`lic use. For other variations of digital cordless telephone ser­
`vice, see CT1, CT2, CT2Plus, CT3, and DECT.
`PCWG Personal Conferencing Work Group
`(www.gogcwg.org/pcwg/)
`PCX Server Software PCX server software turns your
`PC into a graphics terminal front-end for Unix and X applica­
`tions. Thus, your PC can display application output generat­
`ed by remote X-based client applications.
`PDA Personal Digital Assistant. A consumer electronics gadget
`that looks like a palmtop computer. Unlike personal computers,
`PDAs will perform specific tasks — acting like an electronic
`diary, carry-along personal database, multimedia player, per­
`sonal communicator, memo taker, calculator, alarm clock. The
`communications will take place through the phone or through
`wireless. Apple has announced a PDA, which it has named
`Newton. When I added this definition in the late fall of 1992,
`sales of PDAs weren’t doing well and some wag in Silicon Valley
`called them Probably Disappointed Again. IBM prefers to call
`them Personal Communicators. General Magic prefers to called
`them PICs, Personal Intelligent Communicators.
`PDAU Physical Delivery Access Unit. A gateway device that
`facilitates the delivery of messages (excluding probes and
`reports) in physical form. This is an X.400 term.
`PDC 1. Personal Digital Cellular. (Digital system used in
`Japan).
`2. See Primary Domain Controller
`PDF Portable Document Format. This is the file format for
`documents viewed and created by Adobe's Acrobat Reader,
`Capture, Distiller, Exchange and the Acrobat Amber Plug-in
`for Netscape Navigator. The PDF file format was developed to
`standardize Internet-based documents. One of the benefits of
`using Acrobat and the .pdf format is you can deliver business
`documents others without reauthoring them and read them
`
`593
`
`Adobe - Exhibit 1025, page 593
`
`

`

`ONARY
`
`u’re going the direction you want. It’s very easy
`weeks of work) if you make a mistake and con-
`3 and downloading. (Don’t laugh. We’ve done it
`Dumb!)
`an ATM term, it is the node that represents a
`outside neighbor in the common peer group,
`lust be a neighboring peer of one of the border
`ors.
`al Payment Preamble (UPP). The negotiation
`identifies appropriate payment methodology in
`Joint Electronics Payments Initiative (JEPI), a
`from the World Wide Web Consortium (W3C)
`;eNet for a universal payment platform to allow
`tnd consumers to transact E-Commerce
`immerce) over the Internet. UPP works in con-
`Protocol Extensions Protocol (PEP), an exten-
`iat sits on top of HTTP (HyperText Transfer
`ese protocols are intended to make payment
`automatic for end users, happening at the
`jrchase, based on browser configurations See
`c Commerce and JEPI.
`mory Area In an IBM compatible PC, upper
`e area between 640KB and 1 MB of RAM. This
`up of Upper Memory Blocks (UMBs) of various
`i to this area is possible only with a special
`> such as MS-DOS’s EMM386.EXE.
`mory Blocks See UPPER MEMORY AREA.
`JNINTERRUPTIBLE POWER SUPPLY.
`■cel Service, a package deliverer that regularly
`its self-imposed, relatively speedy delivery
`oring UPS monitoring allows a local area net-
`er to monitor an attached Uninterruptible Power
`). When a power failure occurs, NetWare noti­
`ler a time out specified with SERVER.CFG and
`i, the server logs out any remaining users, clos-
`files, and shuts itself down. If you install a
`ved UPS, you must also install a printed circuit
`file server to monitor the UPS. If you have a file
`i microchannel bus (as compared to the more
`bus), the UPS is monitored through the mouse
`s not require a board.
`rectional Path-Switched Ring. A SONET term,
`d rings employ redundant fiber optic transmis-
`; in a pair configuration, with one fiber transmit-
`irection and with the backup fiber transmitting in
`he primary ring fails, the backup takes over. See
`WITCHED RING and SONET.
`According to Newsweek, upspeak is the annoy-
`agers speak.
`In a communications circuit, there are two cir-
`ling to you and going away from you. Upstream
`rm for the name of the channel going away from
`jroadband TV network, the definition of the
`annel or signal is different. It is the channel from
`tting stations to the CATV headend. See
`CHANNEL.
`i Channel In a communications circuit, there
`lits — coming to you and going away from you.
`another term for the name of the channel going
`:In a broadband TV network, the definition o
`ou.
`i channel or signal is different. It is the channel
`nsmitting stations to the CATV headend. n yei
`nition, in the cable TV industry, the upstream
`
`NEWTON’S TELECOM DICTIONARY
`
`address. Http is the default protocol of the Internet. But its
`channel is a collection of frequencies on a CATV channel
`not the only one. There are other protocols, including ftp (file
`reserved for transmission from the terminal next to the user’s
`transfer protocol), news (for Usenet news groups), and
`TV set to (upstream to) the CATV company's computer. Such
`“mailto (to send email to a specific address).
`siqnals miqht be requests for pay movies. See UPSTREAM.
`Upstream Operations Functions that provide a BCC The www.harrynewton.com is simply the name of my com-
`no
`(Bellcore Client Company) control of features and service
`puter. All Web addresses start as numbers. This one is
`configurations and subject to BCC control, some service
`different. You can reach my home W nbV 9™9
`management capabilities for subscribers. These functions
`browser the following command http.//209.94.129.207/.
`include Service Negotiation and Management, Service
`The Web’s own lookup tables do an instaneous translation to
`I Provisioning and Repair Service Answering/Work Force
`that number from www.harrynewton.com when you type in
`Administration. Definition from Bellcore in reference to its
`www.harrynewton.com. The translation mechani

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket