throbber
#1 Best Seller
`ATERte mec!
`
`
`neo
`
`
`utLECOM
`
`Jasett
`
`‘4theOfficialDictionary 16fa
`
`' of Telecommunications
`Gnu ayptt
`Atmaaa
`ah
`
`BY HARRY NEWTON_anti
`
`IPR2021-00574
`
`RingCentral Ex-1015, p. 1
`RingCentral Ex-1015,p.
`1
`RingCentral v. Estech
`RingCentral v. Estech
`IPR2021-00574
`
`

`

`IIEWTOII'S TELECOM DICTIONARY
`copyright 0 2000 Harry Newton
`Email: Harry Newton@Technologylnvestor.com
`Personal web site: www.HarryNewton.com
`All rights reserved under International and Pan-American Copyright conventions
`Including the right to reprOduce this book or portions thereof in any form whatsoever.
`Published by Telecom Books
`An Imprint of CMP Media Inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN I 1-57820·053-9
`
`Sixteenth Ed~ion, Expanded and Updated. February 2000
`For individual orders, and for Information on special discounts for quantity orders,
`please contact:
`
`Telecom Books
`6600 Sllaccl Way
`Gilroy, CA 95020
`Tel: SQO.LIBRARYor 408-848-3854
`FAX: 408-848-5784
`Email: telecom@ rushorder.com
`Distributed to the book trade In the u.s. and canada by
`~ Publishers Group West
`,
`1700 Fourth St., Berkeley, CA. 94710
`Manufactured in the United States Of America
`
`RingCentral Ex-1015, p. 2
`RingCentral v. Estech
`IPR2021-0057 4
`
`

`

`
`
`NEWTON’s
`TELECOM
`DICTIONARY
`The Official Dictionary of
`Telecommunications & the Internet
`
`
`
`16th Updated, Expanded and Much
`Improved Edition
`
`—_
`
`RingCentral Ex-1015, p. 3
`RingCentral Ex-1015, p.3
`RingCentral v. Estech
`RingCentralv. Estech
`IPR2021-00574
`IPR2021-00574
`
`

`

`NEWTON 'S TELECO M DICTIO NARY
`
`...,..eric Dlstarbance An Increase 111 the ionJZalion
`~ihe 0 reg1on of the ionosphere, caused by solar activity,
`.nteh resulls in greatly increased radio wave absorption. See
`"" eric Foe••'•• A variat1on in the curvature of the
`~·
`layers can grve rise to a focusing/defocusing
`11111::1 a1 a reauVIng antenna. Th1s may prodlx:e eithef an
`mwx;emeot or anenuahon in the received held shengttl due
`10 Sl~l phase vanations.
`ltH~pherlc Refraction The cha11ge in the prOjlagalion
`- ' of a s.gnal as 11 passes through the ionosphere.
`toP 1. ~put Processor
`2 lnler~hty The ablt1ty of eQUijminl from dittenn
`manutacture!S (or different implementatiOns) to operate
`lcgelher.
`lOPS Internet OPerators Group. On May 20, 1997 Nineollhe
`nahon~ major Internet service providers announced the for(cid:173)
`~ of lOPS ORG, a gro~ of Internet service providers
`(lSI'$) dedated to ma~1ng the commercial lriemet more
`roWs! cW1d reliable. IOPS.ORG wlll focus primarily on resolv(cid:173)
`Ing and preventmg network integrity problems, addressing
`Issues that require technical coordination and technical infor(cid:173)
`matiOO·sharing across and among ISPs. These issues include
`,oonl problem resolulton. technology assessment. and global
`~nel scaling and 1ntegnty. lOPS ORG will pr<Mde a point·
`ol-cootact lor these tndustry-w1de techn1cal issues.
`IOPS.ORG are ANS
`founding members of
`The
`Communications, AT&T, BBN Corporation. Earth Link
`N!tilork, GTE, MCI, NET COM, PSINet, and UUNET, and It Is
`txlleded thai add11tonal national and in1emalional Internet
`operalors Will jo1n IOPS.ORG will work Wl1h other Interne!
`organrzahons, w1th Internet equipment vendors, and wilh
`businesses that rely on lhe Internet. IOPS.ORG members lndi·
`Yidually will continue to support other Internet organizations
`such as the Internet Engineering Task Force (IETF), the North
`Mler1C3n Network Operators Group (NANOG), and the
`lrtemel Sooety
`"' Corporal on for National Research ln~iatives (CNRI). a
`Reston, VA-based not-for-profit organization which works
`w~t~ industry, academia, and government on national-level
`ln1llal1ves 1n mformatlon tochnotogy, wlll host the initial oper·
`•Ions of lOPS ORG "IOPS.ORG w111 play a key rote In the
`ltal1hy tml1C31 and operational eYOiution of the Internet as
`an 111Cteas1rgly important componen1 of the economy; said
`CNRI Pres1dent Robert Kahn. www.lops.org
`lOS 1. The InternatiOnal Organization for Standardization
`based in Geneva. Switzerland. The lOS develops and publish·
`es hundleds of International ISO standards svch as ISD-9!m
`b QUality assurance or ISO 14000 for enwonrnerGI penor(cid:173)
`mne The lOS is ~ised of more than 90 member stan(cid:173)
`~ bod1es W()(ldwlde plus other International assoclaions,
`OOvernment and non-government bodies. The U.S. member
`ol the lOS is ANSI See ANSI and ISO.
`2 lntemetwort< Operat1ng System from Clsoo. This operating
`S)'St8n runs the vast maJority of routers now deployed in the
`of the Internet See also Jooos Code.
`:
`TP See Internet Open Tradmg Protocol.
`1P 1. The Internet Protocol. IP is the most important of the
`Plotocols on which the Internet is based. The IP Protocol is a
`~d descl1b1ng software that keeps track olthe Internet'S
`-.esses for d1Heren1 no<Es. routes outgoing messages. and
`~'les n:oo11ng messages. It allows a packet to lmefSe
`lll!Or llple networks on the way to 1ts final desttnahon
`101nally developed by the Department of Defense to stlppor1
`453
`
`interworklng of dissimilar corn~ across a network. Wilde
`its roots are in the ARPAnet ~lopment, IP was first stan(cid:173)
`dardil2d in RFC 791, published in 1981, and updated in RFC
`1349. This protocol works in conjunction with TCP and is
`usually idelt•lil!d as TCPIIP It is a connechontess protocol
`Ita operates a1 the network layef (layer 3) of the OSI roodel.
`See IP Address.IPY4, IPvS, iPY6, the Interne!, nl TAPI3.0.
`2. Intelligent Peripheral. A device in an IN (Intelligent
`N~rk) or AJN (~IN) that provides capabilities sldl
`as VOice announcements. voice recognition. voice printing
`and help gu1dance. By way of ~le. MCI's 1-aoo.COL·
`!fCT makes use cA IPs, wlllch are specialiled VOICe process(cid:173)
`lllg systems. The IP Jli'001)Is the caller to enter the target tele(cid:173)
`phone number and speak h1s or her name. The system then
`instructs the network to connect the call. Based on a spoken
`acceptance ol the call by the called party, the system aulho(cid:173)
`ri~es call COflllle!ion.
`3. lrlformat1011 Provider. A customer thai offers recorded infor·
`mallon on itS hsled runbers
`IP Atlclress See Internet Address
`IP Allllre11 ••k Internet Protocol address mask. A
`range of IP addresses defined so that only mines with IP
`addresses within the range are allowed ~s to an Internet
`service. To mask a portion cA the IP address. replace d w1th
`the asteriSk wild card chn:tlf ("). For ~le. 192 44 • •
`represents fMlfY computer on the Internet With an IP address
`beginning wHh 192.44. See IP Addressing.
`IP Aclclre111111 A networking term. IP (Internet Protocol)
`addressing Is a system for assigning numbers to network
`subdivisions. domains, and nodes in TCP/IP networks. IP
`addresses ate fiQUied as 32-llit (lour-byte) nooters The h1~
`bytes constitute the ·ctass A' and ·class B' portions olthe
`address, which denote network and subnetwork. The low
`bytes (·Class C' address segments) identity unique nodes(cid:173)
`individual machines or (in the case of multi-addressing) indi·
`vidual node processes. The Class C address segment (two
`bytes) can represelt 65,536 oorque values- enough so thai
`in most COIM!flllonal TCPIIP LANs, suff.::1eri values 318
`available to afford each mactune Its own "fixed" IP address. In
`public lnternet-aocess, however, the number of f1~8d address(cid:173)
`es available to a provider may not be sufficient to provide
`each dialup client with a permanent IP address. In 5Vch sce(cid:173)
`narios. available Class C addlesses can be 3SSigned dynam(cid:173)
`ically, as mact11nes log into network access ports -
`on the
`pres~ion thai no more 11m N clltnls will ~ to log
`on. simultaneously (where N denotes the number of absolute
`addresses In the pool). Thus·
`"Fixed. or "SID:. IP address. a lour-byte TCPIIP network
`address permnliJy ass.gned to an Individual machine or
`accotrll
`•OynamiC3fly-assigned' IP address a four-byje TCPIIP net·
`work address asSigned to a machine or acaull for the dura(cid:173)
`tion of a single session
`,.. The fundamental urut of inlormaiiOil passed
`IP Dll
`CorialiiS scme nl desiiMIOII address-
`across the
`es a1oo;1 1'111h ditl and a runber ol ftelds which dellne such
`things as the lenglh olthe dalapn, the l1edr cheC:tsl.m.
`and flags to S¥f whelrer the datagram can be (or has been)
`fragmented
`1P Dmce c .. trot IPDC See Simple Gateway Control
`Protocol
`IP llaltkctstfat The transrllr$$IOII of an IP daUpn to a
`rosa group a se1 cA mo or rrore hoslS ideriltled by a sqlt
`IP destination address. A munrcast dal3pn deli\rlnd to all
`
`RingCentral Ex-1015, p. 4
`RingCentral v. Estech
`IPR2021-0057 4
`
`

`

`NEWTON ' S TE LECOM DI CTIONARY
`
`members of its destination host group with the same 'best
`efforts' reliability as regular unicast IP datagrams, i.e., the
`datagram is not guaranteed to arrive intact at all members of
`the destination group or in the same order relative to other
`datagrams.
`IP Ro•ter A computer connected to a multiple physical
`TCP/IP networks that can route or deliver IP packets between
`networks. See also Gateway.
`IP Sflurlty See IPsec.
`IP Spoof! .. An anack whereby a system anempts to illicit·
`ly impersonate another system by using its IP network
`address. See IP, IP Address and IP Router.
`IP S.IM!ot All devices which share the same network
`address. Routers are boundaries between subnets so each
`connection to a router has a diHerent network address.
`IP Swhchl .. A term coined by lpsilon Networks to describe
`a new class of switch it developed, combining intelligent IP
`routing with high-speed ATM switching hardware in a single,
`scalable planorm. The IP switch implements the IP protocol
`stack on ATM hardware, allowing the device to dynamically
`shill between store-and-forward and cut -through switching
`based on lhe flow requirements of the traffic as defined in the
`packet header. Data flows of long duration, thereby, can be
`optimized by cut-through switching, with the balance of the
`traffic afforded the defaun ATM treatment, wtlich is hop-by·
`hop, store-and-forward routing. lpsilon suggests that first(cid:173)
`generation IP Switches can achieve rates of up to 5.3 million
`PPS (packets per second) by avoiding ATM cell segmentation
`and reassembly, ATM overhead, and ATM switch processing of
`each cell header. Clearly, one of the advantages oiiP Switching
`is the use oiiP (Internet Protocol), wtlich protocol is mature.
`well-understood, and widely deployed iiCfOSS a wide range of
`networks. Contrast with Tag Switching.
`IP TolophHy Here is Microsoft's definition. excerpted
`from their white paper on TAP I 3.0: IP Telephony is an emerg(cid:173)
`ing set of technologies that enables voice. data. and video
`collaboration over existing IP-based LANs. WANs, and the
`Internet. Specifically, IP Telephony uses open IETF and ITU
`standards to move multimedia traffic over any network that
`uses IP (the Internet Protocol). This offers users both flexibil(cid:173)
`ity in physical media (for example, POTS lines, AOSL, ISDN,
`leased lines. coaxial cable. satellite. and twisted pair) and
`flexibility of physical location. As a result, the same ubiqui(cid:173)
`tous networks lhat carry Web, e-mail and data traffic can be
`used to connect lo individuals. businesses, schools and gov(cid:173)
`ernments worldwide.
`What are the benefits of IP Telephony? IP Telephony allows
`organizations and individuals to lower the costs of existing
`services, such as voice and broadcast video, wtlile at the
`same lime broadening their means of communication to
`include modern video conferencing, application sharing, and
`whiteboarding tools. In the past, organizations have deployed
`separate networks to handle traditional voice, data, and video
`traffic. Each with different transport requirements. these net(cid:173)
`works were expensive to install, maintain, and reconfigure.
`Furthermore. since these networks were physically distinct.
`Integration was difficult if not impossible. limiting their poten(cid:173)
`tial usefulness.
`IP Telephony blends voioe. video and data by specilying a
`common transport. IP, for each, effectively collapsing three
`networks into one. The result is increased manageability,
`lower support costs, a new breed of collaboration tools, and
`Increased productivity. Possible applications for IP TelephOny
`include telecommuting, real-time document collaboration.
`
`distance learning, employee training, video conferencing
`video mail, and video on demand. See the Internet tP
`Telephony Algorithms, TAPI, TAPI3.0 and TCP/IP.
`'
`IP Toloplto•y lltorlthm• The major IP Telepho
`Algorithms in the market today (fall ol1997) according to~
`white paper, called 'IP Telephony powered by Fusion· trom
`Natural MicroSystems (www.nmss.com). include:
`• MS-GSM: This algorithm, marketed by MiCiosoft runs at
`13kbps and is a derivative of the ITU (International
`Telecommunications Union) standard GSM work. GSM is
`used in 85 countries around the world as the standard f01 dio(cid:173)
`ital cellular communications. Microsoft's implementatiOII
`varies from the standard in several ways including how the
`encoded data is represented and what aspects ol the encooer
`are supported. Natural MicroSystems provides an MS-GSM
`encoder that is compatible with MiCiosoft's Win95/WinNT
`embedded product.
`• ITU G.723.1: This algorithm runs at 6.3 or 5.4 kbps and uses
`linear predictive coding and dictionaries wtlich help Jrovide
`smoothing. The smoothing process is CPU-intensive, howev!!l
`(30Mips on an Intel Pentium), so don't expect a PC~
`implementation to work well for lots of real-time <Givity.
`• VoxWare: This is a proprietary encoder that has been burt(cid:173)
`died by Netscape with their Browser. It delivers 53:1 com(cid:173)
`pression and very low jitter. VoxWare presents very tow net·
`work bandwidth requirements; however. it also has lower
`speech quality.
`Most speech encoder algorithms have a set of rules concern·
`ing packet delivery and disposition management. This is often
`called jitter buffer management. ·Jitter' in this case reters to
`when the signal is put into frames. The decoding algorithm
`must decompress and sequence data and make 'smoothing'
`decisions (when to discard packets versus waiting for an out(cid:173)
`of-sequence packet to arrive). Given the real· time nature of a
`live connection. jitter buller management policies have a large
`affect on voice quality. Actual sound losses range from a syt·
`fable to a word, depending on how much data is in a given
`packet. The first buffer size is often a quarter-second, large
`enough to be a piece of a word or a short word- similar to
`drop-outs on a cellular connection in a poor coverage area
`I PI Intellectual Property Attorney.
`I P•clrat• Installation Package.
`.
`IPARS The International Passenger Airline Reserval1on
`System. An IBM-originated term.
`I·PASS An alliance oiiSPs (Internet Service Pr~ders) af_1d
`lAPs (Internet lvxess Providers) to provide roam10g capabt~
`ities for travelers. Based on proprietary standards. roamers
`are authenticated before being afforded Internet access: usage
`is CIOSS-billed through the I-PASS clearinghouse. w1th tees
`being set by each ISP for use of its f~ilities by _roamers.~
`PASS includes over 100 member ISPs 1n approx1male~ 1
`countries. and includes over 1,000 POPs (Points of
`Presence). I-PASS competes with GRIC (Global Reach
`Internet Connection). The IETF's Roamops work1ng grou&1~
`developing a standard for roaming, as well. See also
`and ROAMOPS.
`IPC lnterprocess Communications. A system that lets threadS
`and processes transfer data and messages amo~g litem(cid:173)
`selves· used to offer services to and rece1ve serviC8S from
`other programs. Supported fPC mechanisms under MS OS/2
`are semaphores. signals. pipes, queues. shared memory. and
`dynamic data exchange.
`by
`IPCH Initial Paging CHannel is the channel number ~
`your cellular provider to 'page' the phones on the ,, •• ~··
`454
`
`RingCentral Ex-1015, p. 5
`RingCentral v. Estech
`IPR2021-0057 4
`
`

`

`NEWTON ' S TELECOM DICTI ONARY
`
`~ trtm 'paglll!l" referS to nobfymg a parllcUiar Jmnf! lila ~
`liS 11 wn11mng call. AU idle. turned-on phones on a system
`1101.;or the data stream on the IPCM. Noo-wireline cellular
`camer$ use channel 0333 as the IPCH. while wueline
`provrders (those operated by a telephone company use chan-
`11110334
`IP<I see Integrated Personal Computer Interlace.
`IP<' IP Control Protocol: protocol for transporting IP traffic
`f1ffl a PPP connection
`1P0C Internet Protocol Devace Control See MGCP and
`SI!I'C)Ie Ga'.eway Control Protocol
`.. s lrtelligent Pnntet Data Stream. It\! IBM's host-IOi)rint(cid:173)
`• page descnphon protocol for printing. You Cir1 now buy
`us which let you use your present prinlet to emulate an IBM
`prllltel "I Intelligent Peripheral Equipment Northern Telecom's
`~ermtor being able to extend all the leatures of its PBX O'ler
`drstances longer than a normal extension In a building. See
`f,ber Remote.
`IHI tntemallonat Portable Equipment ldentrties A wireless
`1m
`IHM H the Product Ever Materalizes.
`IK kl t~l Program Load
`IKC lnterrallonat Private Leased Circuit.
`,,. Interruptions Per Minute or Impulses Per Minute.
`I,..G IPng IP Next Generation. Collectrve term used to
`desclrbe the elforts of the Internet Engineering Task Ioree to
`deflllll the next generation of the Internet Protocol (IP) v.ilich
`tocludes secunty measures, as well as larger IP addresses to
`!XIPe Ylrth the explosive growth ol the Internet. The were three
`m!ldt.e protocols for IPng (CATNIP, TUBA and SIPP). were
`blended into IPY6, v.ilich is in trial stages at the bme of thts
`ITt ng See IPY6.
`1P1U lnlernahonal Private NelviOI1< Sefvice. It a::tually inter(cid:173)
`r<t10113t prrvate line service and it's typiCally a clrru" from 9.6
`KM/sec up to T-1 or E-1. Domestically you would sunplycall
`rt 'Prrvate hne data service.·
`I" IPP rs the Internet Print Protocol, a collection of IETF
`standards developed through the Printer Wot1< Group,
`'IIWW pwg org, that will make It as easy to print over the
`~as d tS to print from your PC tPP uses the HTTP pro(cid:173)
`tocols to "POST" a supported MIME Page Oiscriptoo
`l.quage lie to a printet. Prinlefs are gtven 1n1eme1 address(cid:173)
`es SUCh as WWN mydoolain.COITI/i~ .. Pnnter, so they can
`be loca~ed on the lntemet.IPP has the support of all the maJOr
`Pl•nter companres including, Xerox, HP, Lexmark, IBM as well
`as Novell and Microsoft. Since lax, at a suftrcient level of
`abstraction. is ·remote printing," wot1< is under way to create
`a Fax Profrle lor IPP as well, so that IPP can duplicate the
`legal. as well as common practices ol fax transmissions.
`Rdlard Sln:key. Rshockey01x netcom.com contnbuted this
`del1rnt on. Thank you.
`IPO lnJt.al Pubhc Olle!ing. Start a COf1'llmY Some years lalel,
`1ai.e 4 lklllllc Come out a s 12. A week ~ yw stodds at
`S24 You re a success. and rich. IPOs are a•tal N1 sayrng
`"Thanlc You' to all your hatdwot1<rng employees
`IPOD tP (Internet Protocol) Phone O'ler Data. There tend to
`emulatron and dnving. The emulation
`be two varratrons -
`•POD connects directly to digital station ports on a PBX and
`emulsolates a digital PBX feature phone. The emulation iPOD
`a enables the new PC IP PBX vendors to intemperate~
`enterpnse PBXs. The clriVing rPOO dnves d1Q!!al PBX phones
`111he ana lashlon as 11 the phone were conneded d redly to
`a PBx saatoo Clrrurt card. The dnving 11'00 can enable lhe
`455
`
`new PC PBX vendln to use ex•sttllQ desi m 111 the enrs(cid:173)
`ll'ISe ~ versions ollhe 1POD prOVIde a TCP/IP rier1ace
`for .the purpose of transporiJng the VOice em call control Sig(cid:173)
`naling 3SSOCialed v.ith a PBX drgttal stJtion call over a pack(cid:173)
`et network. Protocols, DSP algonthms. densitres and drfferent
`form factors all constitute possible platform variattons.
`IPR Intellectual Property Rights
`IPRS Internet Protocol Routing Service Oelrned by Bell
`Allantrc as "a low-iXISI access seMce for lSI's Th1s serviCe
`supports basiC drat, ISDN and dediCaled reQUifernerb for
`transpareri C01118:tivity from the end-user to the ISP"
`IPS Internet Protocol Su1te.
`IPsec A collecllon oiiP secur1ty measures that ~se an
`opt ronal ttmehng protocol lor 1M IPsec st.WOrts authenll(cid:173)
`catron lhrough an "authenllcatron header'" which is used to
`venfy the validity of the origrnat•ng address in the header of
`every pacJ<et of a packet stream. An "encapsulating security
`payload" header encrypts the entire datagram. based on the
`enctyptlon algorithm chosen by the Implementer see also
`AuthentiCation. Encryption, tPv6. and Tunneling
`IPT IP Teie4lhOOY
`IPT ......, IP Telephony Galeway lmilgllll! yoo em I
`wort lor a~ whiCh has a PBX- a letephone system.
`You drat 234 to reach Harry You dral 9 and a long dlslance
`number to dtal your biggest client In Los Angeles Now imaq(cid:173)
`lne you want to call your the company's branch office 1n
`London. You dial 22. You hear a dial tone. You then piKICh in
`689. You hear another dial tone Then you punch 123 Bingo,
`the boss ol the London offiCe answers Here's Y!ili!l all those
`numbers mean. Dialing 22 dials yoo Into a PC called the IP
`Telephony Gateway, which, on the one side, IS connected to
`your PBX and on the other s1de rs connected to a dati hne
`yw COflllillY has llSween yw ott~te em your London
`olttce OlallllQ 689 is you ltlllllg the IPT Galew3y lila you
`Wi!/'11 to speak to the PBX rn your London oftrce Oia'•no 123
`tells the London PBX to drat extensron 123
`Thai connection between your PBX and your London off~te\1
`PBX mlghl be anything from a dedicated prrvale data line (e.g.
`part ol your company's Intranet). to a virtual clrruil on a
`Vlrtual Private Network (VPN) or rt mrght be the public
`lnterr-et The IPT ~ majOr lunctton IS to convert the
`analog Y01C8 corlllng oul ol Y0t1 PBX Into VoiP (VOice over
`tn~errWJt Protocol) em then send • on a pacQt s. rk:h!d c111a
`Circuit which conforms 1o the I~ In shcll1. an IPT Galeway
`allows use1$ lo use the Internet (or most I kely 4rl trmnet or
`Vrrtual Prrvate Network) to talk with remote sites us1ng (Voice
`over Internet ProtocOl).
`IPTC On April30, 1998, Encsson InC released a press release
`which contained. inter alia. 'Encsson Inc has developed a new
`tP telephony platfonn called Internet Telephony Sofutronlor
`Gafners (IPTC) lila ra1ses the standard lor IP lelepllorrf sys(cid:173)
`IPTC olfefs Jilone4o-phone. lax·to-lax nl PC-Io(cid:173)
`tems
`phone seMC8S over a TCPIIP networ1c. k prov'rdes a~
`operahons nl ~ (o&MI facl ty tt.l rll(M!SIP tele(cid:173)
`phony to a 1M Gmif~ COIJI'IUli(2IOO syslem. IPTC
`wor1cs by tahlQ phone em lax calls N OOQINie 11 Ole Plb(cid:173)
`lic SWitched telephony neiWOrk (PSTN) and JZSI!lQ them to
`the IPTC ptarorm. which cames them over the TCP~P netwot1<
`to their destination v.ilere they are led bade to the PSTN net(cid:173)
`work PC-to-phone calls are taken d11edly lrom the TCP~P
`neiWOrk 300 carried to their deslrnauon 111 the Saflle way IPTC
`software fillS on rWstry stllliWd ~ tta 11e based on
`Intel PsWn p-ocessors nl Mcosoll Wn:kMS NLIPTC
`U3eS a WeiKJised nalajjtlrll!l• pr~ to I.Cid* n con-
`
`~
`
`RingCentral Ex-1015, p. 6
`RingCentral v. Estech
`IPR2021-0057 4
`
`

`

`NEWTON 'S TELECOM DICTIONARY
`
`Colporal1on. it equates to appromlalety 1,500 addresses per
`trot rrufttple gateways. No looger is rt neceswy to change lhe
`square angstrom, with an angstrom be1ng one ten-mllli<Wt!
`parameters in indivtdual gateways when IPTC CCWl u~e all
`of a millimeter. Another way of looking at this Is thall1"16
`gateways within a network through one "netkeepef" applica·
`yields about 32 addresses per square inch of dry land on tl1e
`lions program. The call and traffic control for individual gate(cid:173)
`earth's surface- in othef words, we are not likely to run Oli
`'WfS in a network is handled by sitekeepefs The sitekEepers
`of 1Pv6 addresses. (Donl be surprised to see your telephcre
`connect to lhe netkeeper, which acts as a su1Qie point of con(cid:173)
`assigned an IP address tn the luture.)
`trol fOf llle O&M functions of lhe whole IPTC p a!Offfi The
`Autoconflguration Protocol. an rntnnsc part oi1Pv6. allows a
`nelkeeper rs not tll't'OIYed 111 the prDCeSSJilO ol calls but slllres
`deviCe to assign itseH a untque IP address ~t~1th!U t11e ner(cid:173)
`lhe ptafoon topology lnformabon. routtng conf!OIRion em
`mron ol a server. The self-ass1gned address IS based 1n pat
`alalm 1nfomlatron. ()her features irduded m the IPTC pia·
`on the un1que LAN MAC (Media Access Control) address ot
`form are least-cost routing, dynamic route allocation, multiple
`the device, which might be in the form of laptop computer.
`IP networks support, and the ability to handle validated and
`This leature allows the user the same fuii1Pv6 capability When
`un-validated traffic. Real-time billing with fraud prevention and
`on the road as he m1ght enJOY in the office when the~ IS
`call d\Jialion ~ICe wtlh 1nt~ated voice response softwMe is
`Inserted IntO a !AN-attached 00c(lnQ sla!IOil. 1Pv6 SliCUrtly 1$
`also provided ••
`provtded in several 'WfS Da!a 1ntegrrty and user a.c11ertQ.
`IPU lnefligent Processing Unit. ArQher ~ ol sayrng CPU.
`See CPU. Also Intelligent Peripheral UnH, the hardware asro(cid:173)
`tioo are provided by any of a number of atihen!IC3!101l
`schemes. Second, the Encapsulatrng Serurity Payload leature
`cial!d Wlth an intelligent peripheral. Also Alcatel~ parlance for
`provides for confidenliallty of data through encryptloo alger
`an actual workstation that~ associated mostly with one ot
`rlthms such as DES (Data Encryption Standard). Se...eral dif·
`Alcalel's applications called the local applications platform or
`ferent types of 1Pv6 addresses support var1ous types of com(cid:173)
`LAP and a software applicatioos package called the mooilor
`munications. Unicasl supports point-to-point transmrSSIOII,
`reset controller-2 or MRC-2. In short, everyone is using IPU
`Anycasl allows communrcatioos Y.lth the closes! member d a
`to mean whaleYeJ cool thing they want tllo mean. Certainly
`device gr~. and MultiCaSt supports commontCatiOilS
`sooods cool.
`multrple members of a deviCe group
`lh4 Internet Protocol Verston 4. The current vers1011 ollhe
`!PI Internet Packet eXchange Novell NeiWare~ natrve LAN
`Internet Protocol, which Is the fundamental protocol on which
`communications protocol, used to move data between server
`the Internet is based. Although its roots are in lhe initial
`and/or workstation programs running on different network
`developmenl work lor ARPAnet, 1Pv4 was first formalized as a
`nodes. IPX packets are encapsulated and earned by the pack·
`standard in 1981. Sioce that hme, H has been widely deployed
`ets used rn Ethernet and the Stmrlar frames used rn Tolifn(cid:173)
`In all vanely ol data necworks, including LANs and LAN Inter(cid:173)
`networts. Whrle 1Pv4 served rts purpose fOf some 25 years, it
`Ring networks. IPX supports padlet sizes up to 64 b)1eS
`Novetl~ NCP and SPX both use IPX. See also IPX COM
`has lately proved to be 1~e. largely In terms of secun(cid:173)
`IPI Autodlscowery The ab1iity of a network manager m
`ty and limitations ollhe address field The address f1eld is
`d1scover the node address and functiooallty of netwoa
`limited to 32 bits; although 2to the 32nd power IS a very large
`number, we are running out of IP addresses just as we have
`dev1ces.
`IPX/SPX (Internetwork Packet
`run out of 800 numbers and traditional area codes Hence. the
`IPX.COM The Novell
`eXchange/Sequenced Packet eXchange) communication pro(cid:173)
`development of 1Pv6. See IP
`tocol thai creates maintains and termrnales connedtons
`lhS intemet Protocol Verston 5.1Pv5 IS not exactly a miss(cid:173)
`between networ!( devices (worl<slaltons. file servers rOiiln.
`rng hnk, although .t mtght appear so Ralher. IPvS was
`etc.). IPX.COM uses a LAN dnver rout111e to control them(cid:173)
`asstgned to ST2, lntlimel Stream Protocol Vers100 2 whiCh is
`hon·s network board and address and to route outgotng dal3
`documented 1n RFC 1819. ST2 is an experiiTlelltal protocol
`packets for delivery on the network. IPX/SPX reads tile
`developed as an adjunct to IP for support of real-time trans(cid:173)
`assigned addresses of returning data and directs the data to
`port of multimedia data. See IP and 1Pv6.
`the proper area within a workstation~ shell or the file server's
`IPY6 Internet Protocol Version 6. The new proposed Internet
`opera1ng system. See also Nelwale.
`Prctocol designed to replace and enhance the present prot~r
`IPI/SPI Intemetwork Packet Exl:hange/Sequenced ~
`col whiCh is called TCP/IP or offiCially 1Pv4 1Pv6 has 128-b~
`Exchange. Two networ!( protocols IPX IS Ne!Ware protoccl D
`address1ng, auto configuration, new seQJ!rty features and
`movrng mformation cw:ross the network: SPX workS on top of
`supports real-time convnunicahons and multicastrng 1Pv6 IS
`IPX and ~ds extra commands. In the OSI model. IPX COO'
`descnbed in RFC f752, The Recommendation for IP Next
`forms to the network layer and SPX 1s the transport layel
`Generation Protocol, Including the strengths and weaknesses
`IPICP IPX Control Protocol; protocol for transporting IPX
`of each of the proposed prctocols which were blended to form
`traffic over a PPP connection
`the final proposed solution. N. the lime ol this writing, tPv6 is
`standardized, but net widely deployed II requ;res upgrm
`IPIWU A Novell specrftcahon deScribing the protocol to
`be used tor exclmgtng router-to-r DUB informal ton to Matte
`thai are expensrie They wiU be 1011<-hft upgrades II\ rrmy
`the transmiSSion ol NO\'eliiPX dala traffiC cw:ross WAH (Wile
`cases Therefore, 1Pv6rs being deployed pretty rruch only in
`the Nex!Gen camer networks. which are being bui~ from lhe
`Area Network) linf<s.
`II 1. Infrared. The band of electromagnetiC wavelen9lfl$
`ground up. 1Pv6 offers 128-bit addressmg, auto configura(cid:173)
`between the extreme of the visible part of the spectrum (abOii
`tion, new security features and supports real-lime communi(cid:173)
`0 75 um) and the shortest microwaves (ab0ut1 00 um.l.:.......
`cations and multicasting. The 128-bil addressing scheme will
`relieve pressure on the current 32-bit scheme, which is near(cid:173)
`2 Internet Reg1stry. See also Internet Assigned N .. , .....
`ly exhausted due to the widespread use of IP rn the Internet
`Authonty
`IIWI Intelhgent RAM The idea IS to put a miCfliPI,~
`and a Wde vanely of LAN, MAN and WAN networ1ts Clearly,
`rnto a memory chip -a move that dramatically., .......
`2 to the 128th power IS a 0008 number )'leld1ng a slaogering
`oomber of IP addresses According to Mark Miller of Diginet
`computer performance
`456
`
`~
`RingCentral Ex-1 015, p. 7
`RingCentral v. Estech
`IPR2021-00574
`
`

`

`NEWTON 'S TELECOM DICTIONARY
`
`829
`
`RingCentral Ex-1 015, p. 8
`RingCentral v. Estech
`IPR2021-0057 4
`
`

`

`NEWTON'S TElECOM DICTIONARY
`
`RingCentral Ex-1015, p. 9
`RingCentral v. Estech
`IPR2021-0057 4
`
`

`

`method of the
`
`CCEE:~=~:‘~~
`NEWTON’S TELECOM DICTIONARY
`are four major components to TAPI 3.0:
`Objects on a machine (for
`\
`example, networkcards, modems,
`asISDN lines),
`(for
`1 7AP13.0 COM API
`ver
`toe Service Providers
`. Enumerate the supported addresstypesof each Addr
`
`object (forexample, aphone number, aides and so y
`1 Media Stream Providers
`Wi
`4. Choose an Address object based on
`queries
`fo
`for support for
`JOTESS
`OD/e
`queries
`to TAP! 2.1, the TAPI 3.0 APIis implemented as a
`appropriate media (audio, video, and so on) and address types.
`aie of Component Object Model (COM) objects. Moving
`5. Use the CreateCall() method of the Address object to cre-
`ipl to the object-oriented COM model allows component
`ate a Call object associated with a particular address.
`es of TAPIfeatures. It also allows developers to write
`’ oroe Temionhe Call object.
`jPenabled applications in any language, such as Java,
`Call object
`to
`C4
`.
`jonnect()
`To Answera Call:
`ra peenoed.
`visual Basic, or C/C++. The TAPI Server process
`MPISRV-EXE) abstracts the TSPI
`(TAPI Service Provider
`1. Create and initialize a TAPI object.
`inertace) from TAP! 3.0 and TAPI 2.1, allowing TAPI 2.1
`2. Use the TAPI object to enumerate all available Address
`TeohonyService Providers to be used with TAPI3.0, main-
`objects on a machine (for example, network cards, modems,
`ining the internal state of TAPI. Telephony Service Providers
`and ISONlines).
`(ISPs) are responsible for resolving the protocol-indepen-
`3. Enumerate the supported address types of each Address
`dent call model of TAP!
`into protocol-specific call contro!
`object (e.g. a phone number, IP address,etc.).
`mechanisms. TAPI 3.0 provides backward compatibility with
`4. Choose an Address object based on queries fo

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket