`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`• IP Telephony • LANs & Intranets • Call Centers & Computer Telephony
`• Fiber Optics, SONET and DWDM • Satellites
`• Voice, Data, Image & Video Networking • Wired
`and Wireless Telecom • VoIP • T-1, T-3, T-4, E-1, ,
`►
`E-3 • ISDN & ADSL • Cable Modems • Cellular, <
`PCS & GSM • Windows 95, 98, NT, NetWare,
`Apple, Sun & Unix Networking • Ecommerce
`
`Updatedih (
`
`Expanded
`, Edition ,
`
`by Harry Newton
`
`Adobe - Exhibit 1027, cover
`
`
`
`i1
`1i
`
`I t
`
`:i
`
`1
`ii
`
`I
`
`I
`
`1
`
`NEWTON’S
`TELECOM
`DICTIONARY
`
`The Official Dictionary of
`Telecommunications & the Internet
`
`15th Updated, Expanded and Much
`Improved Edition
`
`&
`
`a
`
`*
`
`I 4 ?
`
`l •
`
`A
`
`Adobe - Exhibit 1027, page i
`
`
`
`I
`
`'{
`
`I
`
`NEWTON'S TELECOM DICTIONARY
`copyright © 1999 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved under International and Pan-American Copyright conventions, including the right to reproduce this
`book or portions thereof in any form whatsoever.
`Published in the United States by
`Miller Freeman, Inc.
`Tenth floor
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1191
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-031-8
`
`February, 1999
`
`Manufactured in the United States of America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Roldan and Regula Hoffman
`Matt Kelsey, Publisher
`Christine Kern, Manager
`
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`L
`
`Adobe - Exhibit 1027, page ii
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`International service which provides cablegram communica- Caching works because of a phenomenon known as the
`nages f
`tion to International destinations through the use of a com-
`ity principle which states that a von Neumann CPU (j.e ^
`menf
`puterized message switching center in New York City.
`that performs instructions and makes database calls sen'Ue„ ,(0' itper of
`Cablehead The point where a marine cable connects to ter- tially, one after another) tends to access the same me .
`'|,e i
`restrial facilities.
`locations over and over again. A cache works like this,
`•'
`] dedi
`CableLabs Cable Television Laboratories, Inc. A research
`the CPU needs data from memory, the system checks to Z
`,rhing ar
`and development consortium of cable television system oper-
`if the information is already in the cache. If it is, it grabs \u
`,rhe en|
`ators established in 1988. CableLabs plans and funds
`information; this is called a cache hit. If it isn’t, it’s called*
`Sf* Whet)
`research and development projects to help member compa- . cache miss and the computer has to fetch the informations I Intent i
`nies and the cable industry take advantage of opportunities
`accessing the main memory or hard disk, which is slowJ
`f“oroves
`and meet challenges in the telecommunications industry. A
`Data retrieved during a cache miss is often written into k Leonthi
`good deal of emphasis is placed on digital cable and cable
`cache in anticipation of further need for it. Let’s assume Um Ln Cise
`modem technologies, www.cablelabs.com
`you open a CD-ROM application with hyperlinks. As the Sy$
`!U? Tl!
`Cableport Intel Corporation’s new technology, which
`tern can reasonably assume that you will exercise the hypet.
`^jch red
`brings high speed multimedia-rich interactive services to per-
`link options, the information associated with them can t»
`y/eb Cal
`sonal computers in the home via cable.
`stored in cache memory. If you do, indeed, exercise those
`of Cisco I
`Cablespan A Tellabs Operations, Inc. product which deliv-
`options, it’s a cache hit and the data is there waiting for yCll M of traf
`er two-way voice and data services over coaxial cable used by
`The cache also will hold information that you recently f tolerant, '
`cable TV operators. Tellabs is in Lisle, Illinois.
`accessed, in anticipation of your wanting to back up, 0I
`caching?
`Cableway An opening in a work surface that allows access
`access it again. Caching can take place through partitioned o, f on overb
`to cords or cables from below, or mounting of an electrical
`segmented cache memory, which can be in the form of Lt
`benefits
`receptacle or telephone jack. Cableways typically come with
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li
`benefits
`removable plastic grommets.
`cache memory is accessed first, L2 second, the main me®,
`usage ar
`Cabling The combination of all cables, wire, cords, and
`ry (RAM) and then hard drive last. Also, one cache might hold
`users. It
`connecting hardware installed, A term used to refer collec-
`program instructions and the other might hold data. Generally , with a s
`tively to the installed wiring in a given space.
`when the cache is exhausted, it is flushed and the data is writ- 1
`through
`CABS Carrier Access Billing Specifications
`ten back to main memory, to be replaced with the r- ■
`,
`(0(he
`CABS BOS Carrier Access Billing Specifications - Billing
`according to a replacement algorithm. Cache freshing and
`Thus yo
`Output Specifications ,
`flushing mechanism is designed differently by different ven-
`puling i
`CAC 1. Carrier Access Code. The digits you must dial
`in dors. It behaves slightly different. However it mainly i i.
`(ache
`North America to reach the long distance carrier of your
`on main memory type, like write back or WB, write through |
`or SRAI
`choice. Those digits fit the following format 101XXXX.
`WT, write protected or WT, write combining or WC and \
`er to “r
`2. Customer Administration Center. A type of terminal used by uncached or UC. See also Cache Memory.
`| wants tl
`a PBX user to maintain and troubleshoot his PBX.
`2. In the context of a computer network such as a LAN, or the f
`searchi
`3. Connection Admission Control is defined as the set of
`combination of the Internet and World Wide Web, data can be i
`process
`actions taken by the network during the call setup phase (or
`cached in a server which is close to you. In anticipation ol | wait st
`during call re-negotiation phase) in order to determine whether
`your imminent request for that data in a logical sequence of )
`copy o'
`a connection request can be accepted or should be rejected (or
`data access, it will be transmitted from the main server to the i
`the CP
`whether a request for re-allocation can be accomplished).
`remote server. Thereby, the data is accessible to you more ;■
`the ca
`NetWa
`CACH Call Appearance Call Handling.
`quickly than if it had to be transmitted across the entire net- (
`server
`Cache From the French “cacher,” which translates “to press or
`work each time you had a need for it. Should you access a |
`direct!
`hide,” especially in terms of tools or provisions. In the context
`certain set of data frequently, it might be permanently stored -
`i
`Table)
`of computer systems and networks, information is cached by
`on a server in proximity, and refreshed by the main server |
`other
`placing it closer to the user or user application in order to make
`from time to time in order to ensure its currency ■ ■ ! 1
`it more readily and speedily accessible, and transparently so. At
`remains up to date).
`the same time, information which is cached places less stain on
`3. In the context of an Internet client/server application, | andy
`readii
`i
`limited computer I/O (Input/Output) resources and limited net-
`caching really shows its stuff. First, the network uses distrib- f
`Hitai
`work resources. Let’s consider two specific definitions, the first
`uted cache servers to house the WWW information that users
`;
`Cock
`of which relates to computer systems and the second of which
`in your region use frequently. As you access a Web site, your
`;
`ory c
`relates to computer networks. Let’s also consider a combination
`speed of access and response is improved because the data |
`Seel
`of the first two, in the context of the Internet.
`is housed on a server closer to you. The data then
`_
`_
`1. In the context of a computer system, cache memory gener-
`into cache memory on your client computer workstation. As r Jj™
`ally is a partition of SRAM (Static Random Access Memory),
`you move forward, from page to page and link to link, your J-
`ware
`Since much of computing is highly repetitive or predictable in
`client caches the information provided by the cache server
`•
`migl
`nature, and since solid state components (silicon chips) are
`with all of this happening in anticipation of your next move.
`|
`com
`much faster than mechanical disk drives, the speed of infor-
`As you move backward, the same thing happens, in anticipa- |
`mation access can be enhanced if certain information can be
`tion ot that next move, as well. Just in case you don’t believe » n
`stored in RAM. That information typically is in the form of
`the client side of this story, go to Internet Expjorer or |
`program information, memory addresses, or data. Thereby,
`Netscape, and click on cache. (The fastest way to regain space
`.
`the information can be stored in anticipation of your need for
`on your hard disk is to flush the cache which these program|
`it, and can be presented to you faster than if the computer
`dump to your hard disk.)
`, ,
`needed to access the hard drive through the execution of an Cache Coherency Managing a cache so that data is no1
`I/O function. The cache memory sits (logically and, perhaps lost or overwritten. See also Cache.
`physically) between the CPU and the main memory (RAM). Cache Controller A chip, such as the Intel 823£
`126
`
`wor
`ofte
`ext
`
`fl
`^
`i
`\
`
`1
`
`Adobe - Exhibit 1027, page 126
`
`
`
`1
`
`NEWTON’S TELECOM DICTIONARY
`
`■
`M DICTIONARY
`Caching works because of a phenomenon known as the local,' manages the retr'hepai’Cache co'mrollers^ay're^ide CAM Calling Area Data Base. An MCI definition An MCI
`ty principle which states that a von Neumann CPU (i.e.,
`Memory or the hat • , c h
`System that stores reference data for various MCI Systems
`hat performs instructions and makes database calls sequ
`clients orserve e“° ^a carrier-class, high-
`and reconciles MCI Calling Areas with those of Bell,
`tally, one after another) tends to access the same memo,'
`Sm1"? inCPt ln ian e that oerforms Web content
`Caddy The shell of an optical disc. Protects it from grubby
`ocations over and over again. A cache works like this. When, cneed dedicated Int PP accesses a yveb page, the fingerprints, and includes write protection devices. AKA case,
`he CPU needs data from memory, the system checks to Se{ 1 -g,ing and re rieval. Who ^
`hics anpd sHjML
`Cadeiue In voice processing, cadence is used to refer to the
`f the information is already in the cache it is it grabs tiiat JJe engine tol y stores hi pages grapn
`of tones and siience intervals generated by a given
`nformation; this is called a cache hit If i isn’t its called,, g When ano her user laterequests tn same vveo pa e^ m
`s, naL Examp|es are busy and ringing tones. A typical
`ache miss and the computer has to feteh the information by Jtent is pu M g ‘he cache J'guces bandwidth
`cadence pattern is the US ringing tone, which is one second
`accessing the main memory or hard disk, which is s owe| JproVes downtoad time to the ur an“
`Qf tope £llowed by three seconds of silence. Some other
`Data retrieved during a cache miss is often written into g* Jon the netwo k- Here is a an expla
`cache
`$uch as ,he ^ use a double r,ng wrtuch is two
`cache in anticipation of further need for it. Lets assume that,
`|rom Cisco, which ™npcommutateswith a Cisco router,
`short tones within about a second, followed by a little over
`you open a CD-ROM application with hyperlinks. As the sys.
`;;°ork? The
`engine using the
`two seconds of silence,
`tern can reasonably assume that you will exercise the hym . .l|licb redirects Web requ ne icac^ ^^
`CAD$ Code Abuse Detection system,
`link options, the information associated with them can be. Web Cache Control Prot
`aenables |oad ba|anc_ CAI Computer Aided Engineering,
`stored in cache memory. If you do, indeed, exercise those' 0f Cisco I0S software P, hp pnaines and ensures fau|t- Cage Antenna An antenna having conductors arranged
`options, it’s a cache hit and the data is there waiting for you,, ing of traffic acros ,P , ar„ ,b„ benefjts of Web cylindrically.
`The cache also will hold information that you recently ' tolerant fail-safe operate ^ ha^are^the^bComp0und Annua| Growth Rate,
`accessed, in anticipation of your wanting to back up, 0!'
`caChing? BVedHC«ph servers cachina provides significant
`CA11. Computer Assisted Instruction. Commonly known as
`access it again. Caching can take place through partitioned o,
`on overburdened
`md users Those
`CBT (Computer Based Training). See CBT. See also CAD for
`segmented cache memory which can be in the form of Li ;
`benefits to ISPs, en‘arPavinas due to a reduction on WAN
`a discussion on telecom needs.
`(Level 1) primary cache and L2 (Level 2) secondary cache. Li -
`benefits intMetjost sawigs duein) a rea ^ for gn(j
`2 Common Air |nterface. A standard
`,or the interface
`cache memory is accessed first, L2 second, the main memo- >
`usage and dramatic ™pT nrovides network administrators
`between a radio network and equipment. A CAI allows mul-
`ry (RAM) and then hard drive last. Also, one cache might hold t
`users. The cache wre alM pr™*® 2?2 access policy
`tiple vendors to develop equipment, such as radio terminal
`program instructions and the other might hold data. Gene- ;
`a simple method to enforce a S!te wide access policy upie^ cord,esspphMon^Si ce||u|ar ph0nes and PCS
`when the cache is exhausted, it is flushed and the data is writ-"
`through URL 1 f ngthp Itf un1,2rit is artuallv in cache
`terminals) and base stations (e.g„ cellular antenna sites),
`ten back to main memory, to be replaced with the next cache
`£«<he
`ShTch will interoperate. The 'yield is a competitive (mad
`according to a replacement algorithm. Cache freshing and
`Thus you dori have taccesMemory.
`less expensive) market for equipment. The British
`flushing mechanism is designed differently by different. auWIS
`£aiiab|e RAm (Random Access Memory) CT2/Telepoint system incorporated one of the first CAI
`dors. It behaves slightly different. However 1 mainly depends: £«he
`la vou^set up to allow your compute standards See also CT2.
`,
`.
`,
`on main memory type, like write back or WB, write through or SRAM (Static RAM t y P y computer CALC Customer Access Line Charge. Also known variously
`WT, write protected or WT, write combining or WC and er to remember tuff sa
`jnstePad of as Access Charge, EUCL (End User Line Charge), and SLC
`uncached or UC. See also Cache Memory.
`; wants hat Inf°r[™tl0n'' hard disk I/O (Input/Output) (Subscriber Line Charge). See Access Charge,
`2. in the context of a computer network such as a LAN, or the, searching through a slower nara aisK
`v 1 k Communications Assistance for Law Enforcement Act
`combination of the Internet and World Wide Web, data can he .
`: process This higSP«ed <cache^me™r^'™atea ‘
`"4
`cached in a server which is close to you. In anticipation ot . wait state. When thie (DPU reads data from ™in
`Calendar Routing A call center term for directing calls
`your imminent request for that data in a logical sequence of
`copy oh,s at 'SQS °Jpd'SKsKd frX
`according to the day of the week and time of day. See also
`data access, it will be transmitted from the main server to the
`he CF>U reads the same address the dataIS “rr J
`SOURCE/DEST1NATI0N ROUTING, SKILLS BASED ROUTING
`remote server. Thereby, the data is accessible to you more the cache memory nstead of from main memory- ;™vei s FNn-nF-SHIFT ROUTING.
`quickly than ii it had to be transmitted across the entim - NetWare, for examp e, us® cac e
`contains the Calibrate To test and reset a measuring or timing device
`work each time you had a need for it. Should you ac
`serve access t m . 11 NetWare, cache memo y conans n w mraie
`functioning correct]
`certain set of data frequently, it might be permanently stored tetory an file each«s along wj th'FAT (Fife Al ocation
`a djfferent definition for «cal|; My defini-
`on a server in proximity, and refreshed by the main server
`- Tablie). the(,turb° FAT, the Hlashta , P P
`tion is simplest Two people or two machines are on a phone
`from time to time in order to ensure its currency (i.e. ■ „ ■
`2SS Staf’when caching software guesses wrongly
`line speaking to each other. That’s a call. Bellcore’s definition
`remains up to date).
`, „ anri von havp tn road vour data off vour hard disk rather than of a call: An arrangement providing for a relation between two
`3. In the context of an Internet client/server applirahm. j
`if f mm t hp rarhp i n memorv See al so Cache Cache or more simultaneously present users for the purpose of
`caching really shows its stuff. First, the network uses distrib- ! reading \\ from the: cache in memory, bee 0
`,
`exchanging information. The ATM Forum’s definition: A call is
`uted cache servers to house the WWW information that use
`. Hrt«|ICache Memory,
`. js stored in mem-
`an association between two or more users or between a user
`in your region use frequently. As you access a Web site your ™^"3 A Pocesa^ ™J'ch nt0J 1 st for information.
`and a network entity that is established by the use of network
`speed ot access and response is improved because the da
`: y«m w hcipationio\(next q
`capabilities. This association may have zero or more connec-
`is housed on a server closer to you. The data then s loaded ,
`™
`JJ,,
`tions. Here are some more formal definitions:
`into cache memory on your client computer;m ks at ion Jj t Compute?A ded Desion A^computer and its related soft-
`1. In communications, any demand to set up a connection,
`you move forward, from page to page and link to link j waXd'fe mina s usS to d2 th ngs A CAD system 2. A unit of traffic measurement,
`client caches the information provided by the cache servej
`jJana
`‘ draftinqtools or as 3. The actions performed by a call originator.
`S/i'reteffirsSXTappe” »a»5 t ito “ SIS IvuS“legraW p?,cults. CAD
`4. The operations required to establish, maintain, and release
`
`the client side of this story, go to Internet Explore | g® |erm:n ,p {t p i Ams (|oca| area net- 6 The action of bringing a computer program, a routine, or a
`
`on
`C«he° Coherenry Managing a cacho so that data is * I
`
`- a LAN a phonn system - is MJb^Also «W»A»ONED CALLS.^
`
`C«S°StS«“SpCaS as the Intel 823! ' '
`
`Compote, Aided Design/Computer Aided belore their intended transaction is completed. The call may
`
`!6
`
`127
`
`Adobe - Exhibit 1027, page 127
`
`
`
`I DICTIONARY
`
`3 the system address space. This means application«
`re will run directly from the card, start faster and not ren,? '
`cious RAM from the host computer.
`4Ulre
`3 key element of the PCMCIA software architecture -
`;ket Services and Card Services. Socket Services is a Rino
`3l software interface that provides a way to access th
`MCIA sockets (slots) of a computer. Socket Services ide7
`is how many sockets are in your computer system
`and
`3cts the insertion or removal of a PC Card while the
`is powered on. Socket Services is part of the PCMpia
`reification and interfaces with Card Services
`vices is a software management interface that allows tho
`cation of system resources (such as memory and inter
`:s) automatically, once the Socket Services detects that a
`Card has been added. Card Services also releases thei
`lurces when the PC Card has been removed. Cara
`rices also provides you with an interface to higher IpJ
`rvare to load any needed hardware drivers,
`combination of PC Card hardware, Card Services soft.
`) and Socket Services software provides an almost “niun
`■play” capability in the portable computing environment
`3 the software has been installed, it is theoretically poss _
`o add and remove PC Cards without powering off the svs
`But this is theory. And in practice, it has worked onlv
`mittently for this writer. It doesn’t work for network cardc''
`rieant to be possible, for example, to insert a modem
`ICIA Card to access another computer system, download
`mation into the portable computer’s memory, remove the
`3m
`'~i PCMCIA Card, replace it with a flash PCMCIA Card
`store the downloaded information — all while youi
`•ble computer is still powered on. Great theory.
`3CMCIA has around 300 members, including manufac-
`" of semiconductors, connectors, peripherals and sys-
`3
`, as well as BIOS and software developers and related
`dries. Members include Intel, IBM, Toshiba, Lotus
`n and Fujitsu. The association is based in Sunnyvale!
`108-720-0107. It has an electronic bulletin board —^
`'’20-9388. Its standards are also recognized by the
`lese
`Electronic Industry Development Association
`A). The Association publishes a free book listing all the
`facturers making cards which comply to their standards
`e in buying PCMCIA cards: PCMCIA standards are stili
`formed and are thus not truly standards. Check that
`you buy work in your machine. The manufacturer
`d have tested it in your machine. Don’t assume compat-
`Check your socket and card services supports that
`!t may not. Use “enabler” software instead. Avoid PCM-
`ards with “pigtails.” They break. You lose them. Use
`/IA cards with an “X-JACK." You can plug directly into
`ICIA card with an X-JACK, or equivalent. If you have to
`card with a pigtail, buy a second pigtail, just in case.
`)4, the PCMCIA started calling its specs, PC Card,
`people said it was because many people claimed that
`JA stood for “People Can’t Memorize Computer
`ry Acronyms.”.
`latter part of 1995, the PCMCIA came out with a new
`cation called CardBus which is a 32-bit bus, as against
`:sent 16-bit cards. CardBus is an extension of the PCI
`his means that new CardBus will support 132 Mb|
`aster than the present 8 Mbps. See CardBus for a full
`ition of that new standard. See also Card Servici
`IA standards, Socket Services, and Slot Sizf
`imcia.org
`Ifl Standards The complete set of all of the PCM-
`
`I
`
`f
`
`pi a pc Card Standards. It includes the PC Card Standard
`□please v2,01, Socket Services Specification Release v2.0,
`card Services Specification Release v2.0, ATA Specification
`Release v1.01, AIMS Specification Release v1.0, and the
`Recommended Extensions Release v1.0. Standard v3.0 has
`heen proposed. See PCMCIA, www.pcmcia.org
`p£N Personal Communications Network. A new type of wire-
`Ls telephone system that would use light, inexpensive
`handheld handsets and communicate via low-power anten
`nas. When it was originally conceived, PCN was primarily
`seen as an a city communications system, with far less range
`lhan cellular. Subscribers would be able to make and receive
`calls while they are traveling, as they can do today with cellu
`lar radio systems, but at a low price. Now PCN is seen as
`what Dr. Sorin Cohn of Northern Telecom calls an “enabler of
`unplanned growth." One idea for PCN is to locate a PCN cell
`site (transmitter/receiver) in a residential community. When
`someone wanted a new phone line, they’d simply drop down
`to their local phone store, pick up a PCN portable phone and,
`tjy the time, they got back home, their frequency would be
`•switched on” and they’d be “live.” The original plans for PCN
`never materialized fully. However, the concept has been
`Implemented in the forms of Personal Communications
`Service (PCS) and Wireless Local Loop (WLL). See also PCS,
`Personal Communications Network, Wireless Local Loop.
`PCO Point of Control and Observation: A place (point) with
`in a testing environment where the occurrence of test events
`is to be controlled and observed as defined by the particular
`abstract test method used.
`PCP1. Post Call Processing.
`2. Program Clock Reference: A timestamp that is inserted by
`the MPEG-2 encoder into the Transport Stream to aid the
`decoder in the recovering and tracking the encoder clock.
`PCR An ATM term. Peak Cell Rate: The Peak Cell Rate, in
`cells/sec, is the cell rate which the source may never exceed.
`PCS 1. the plural of PCs, i.e. PCc.
`2. Personal Communications Service. A new, lower powered,
`higher-frequency competitive technology to cellular. Whereas
`cellular typically operates in the 800-900 MHz range, PCS
`operates in the 1.5 to 1.8 Ghz range. The idea with PCS is that
`the phones are cheaper, have less range, are digital; the cells
`would be smaller and closer together and the airtime would be
`cheaper also. Several licenses have been awarded and sever-
`al systems have started in North America. The concept of PCS
`is evolving. It is not clear exactly where it will end up. So far,
`it looks like another cellular system with some digital mes
`saging on the phone’s larger screen, this is how the Federal
`Government awarded PCS licenses:
`• “C-Block” Carrier
`A 30 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1895-1910 MHz paired with 1975-1990 MHz.
`• “D-Block” Carrier
`A10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1865-1870 MHz paired with 1945-1950 MHz.
`• "E-Block” Carrier
`A10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1885-1890 MHz paired with 1965-1970 MHz.
`• “F-Block" Carrier
`A10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1890-1895 MHz paired with 1970-1975 MHz.
`
`NEWTON’S TELECOM DICTIONARY
`See PERSONAL COMMUNICATIONS NETWORKS and PER
`SONAL COMMUNICATION SERVICES.
`PCS Over Cable You run a CATV — cable TV company.
`You have a wires strung all over the neighborhood. On one of
`your wires you attach a six foot by four foot by four box of
`electronics and three two feet attennae. Bingo, you’re now a
`way station — also called a cell site — for a PCS cellular
`phone system. People who are PCS subscribers will talk and
`receive calls when they're close to your cell site. Calls come
`and go via your coax cable, up it to a landline connection
`point with the PCS carrier. You, the CATV company, get paid
`money for completing calls. See www.sanders.com/telecomm
`PCSA Personal Computing System Architecture. A PC imple
`mentation of DECnet, that lets PCs work in a DECnet environ
`ment. PCSA is a network architecture defined and supported
`by Digital Equipment Corporation for the incorporation of per
`sonal computers into server-based networks.
`PCT Personal Communications Technology. A security proto
`col developed by Microsoft for online Web commerce and
`financial transactions. Transparent to the user, PCT provides
`authentication and encryption routines that complement cred
`it-card based commerce on the World Wide Web. Internet
`Explorer, Microsoft's Web browser, makes use of PCT. See
`also AUTHENTICATION and ENCRYPTION.
`PCTA Personal Computer Terminal Adapter. A printed circuit
`card that slips into an IBM PC or PC compatible and allows
`that PC to be connected to the ISDN T-interface. See PER
`SONAL COMPUTER TERMINAL ADAPTER.
`PCTE Portable Common Tool Environment.
`PCTS Public Cordless Telephone Service. A Canadian digital
`cordless telephone service for residential, business and pub
`lic use. For other variations of digital cordless telephone ser
`vice, see CT1, CT2, CT2Plus, CT3, and DECT.
`PCWG Personal Conferencing Work Group
`(www.gogcwg.org/pcwg/)
`PCX Server Software PCX server software turns your
`PC into a graphics terminal front-end for Unix and X applica
`tions. Thus, your PC can display application output generat
`ed by remote X-based client applications.
`PDA Personal Digital Assistant. A consumer electronics gadget
`that looks like a palmtop computer. Unlike personal computers,
`PDAs will perform specific tasks — acting like an electronic
`diary, carry-along personal database, multimedia player, per
`sonal communicator, memo taker, calculator, alarm clock. The
`communications will take place through the phone or through
`wireless. Apple has announced a PDA, which it has named
`Newton. When I added this definition in the late fall of 1992,
`sales of PDAs weren’t doing well and some wag in Silicon Valley
`called them Probably Disappointed Again. IBM prefers to call
`them Personal Communicators. General Magic prefers to called
`them PICs, Personal Intelligent Communicators.
`PDAU Physical Delivery Access Unit. A gateway device that
`facilitates the delivery of messages (excluding probes and
`reports) in physical form. This is an X.400 term.
`PDC 1. Personal Digital Cellular. (Digital system used in
`Japan).
`2. See Primary Domain Controller
`PDF Portable Document Format. This is the file format for
`documents viewed and created by Adobe's Acrobat Reader,
`Capture, Distiller, Exchange and the Acrobat Amber Plug-in
`for Netscape Navigator. The PDF file format was developed to
`standardize Internet-based documents. One of the benefits of
`using Acrobat and the .pdf format is you can deliver business
`documents others without reauthoring them and read them
`
`593
`
`Adobe - Exhibit 1027, page 593
`
`
`
`ONARY
`
`u’re going the direction you want. It’s very easy
`weeks of work) if you make a mistake and con-
`3 and downloading. (Don’t laugh. We’ve done it
`Dumb!)
`an ATM term, it is the node that represents a
`outside neighbor in the common peer group,
`lust be a neighboring peer of one of the border
`ors.
`al Payment Preamble (UPP). The negotiation
`identifies appropriate payment methodology in
`Joint Electronics Payments Initiative (JEPI), a
`from the World Wide Web Consortium (W3C)
`;eNet for a universal payment platform to allow
`tnd consumers to transact E-Commerce
`immerce) over the Internet. UPP works in con-
`Protocol Extensions Protocol (PEP), an exten-
`iat sits on top of HTTP (HyperText Transfer
`ese protocols are intended to make payment
`automatic for end users, happening at the
`jrchase, based on browser configurations See
`c Commerce and JEPI.
`mory Area In an IBM compatible PC, upper
`e area between 640KB and 1 MB of RAM. This
`up of Upper Memory Blocks (UMBs) of various
`i to this area is possible only with a special
`> such as MS-DOS’s EMM386.EXE.
`mory Blocks See UPPER MEMORY AREA.
`JNINTERRUPTIBLE POWER SUPPLY.
`■cel Service, a package deliverer that regularly
`its self-imposed, relatively speedy delivery
`oring UPS monitoring allows a local area net-
`er to monitor an attached Uninterruptible Power
`). When a power failure occurs, NetWare noti
`ler a time out specified with SERVER.CFG and
`i, the server logs out any remaining users, clos-
`files, and shuts itself down. If you install a
`ved UPS, you must also install a printed circuit
`file server to monitor the UPS. If you have a file
`i microchannel bus (as compared to the more
`bus), the UPS is monitored through the mouse
`s not require a board.
`rectional Path-Switched Ring. A SONET term,
`d rings employ redundant fiber optic transmis-
`; in a pair configuration, with one fiber transmit-
`irection and with the backup fiber transmitting in
`he primary ring fails, the backup takes over. See
`WITCHED RING and SONET.
`According to Newsweek, upspeak is the annoy-
`agers speak.
`In a communications circuit, there are two cir-
`ling to you and going away from you. Upstream
`rm for the name of the channel going away from
`jroadband TV network, the definition of the
`annel or signal is different. It is the channel from
`tting stations to the CATV headend. See
`CHANNEL.
`i Channel In a communications circuit, there
`lits — coming to you and going away from you.
`another term for the name of the channel going
`:In a broadband TV network, the definition o
`ou.
`i channel or signal is different. It is the channel
`nsmitting stations to the CATV headend. n yei
`nition, in the cable TV industry, the upstream
`
`NEWTON’S TELECOM DICTIONARY
`
`address. Http is the default protocol of the Internet. But its
`channel is a collection of frequencies on a CATV channel
`not the only one. There are other protocols, including ftp (file
`reserved for transmission from the terminal next to the user’s
`transfer protocol), news (for Usenet news groups), and
`TV set to (upstream to) the CATV company's computer. Such
`“mailto (to send email to a specific address).
`siqnals miqht be requests for pay movies. See UPSTREAM.
`Upstream Operations Functions that provide a BCC The www.harrynewton.com is simply the name of my com-
`no
`(Bellcore Client Company) control of features and service
`puter. All Web addresses start as numbers. This one is
`configurations and subject to BCC control, some service
`different. You can reach my home W nbV 9™9
`management capabilities for subscribers. These functions
`browser the following command http.//209.94.129.207/.
`include Service Negotiation and Management, Service
`The Web’s own lookup tables do an instaneous translation to
`I Provisioning and Repair Service Answering/Work Force
`that number from www.harrynewton.com when you type in
`Administration. Definition from Bellcore in reference to its
`www.harrynewton.com. The translation mechani