`
`iE mT TETCTE:Lat
`Telecommunications & the Internet
`Seeemm ECO RAULCas Telephony
`BAacmeRCts
`@ Me Data, Image & Video Networking
`RATUmsemaLY
`CSSAee Reese ee
`SE eR aa a
`ASLa NetWare, Apple,.
`
`SAMSUNG 1058
`SAMSUNG 1058
`SAMSUNG v. SMART MOBILE
`SAMSUNGv. SMART MOBILE
`IPR2022-01004
`IPR2022-01004
`
`1
`
`
`
`NEWTON’s TELECOM DICTIONARY
`
`copyright © 1998 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved underInternational and Pan-American Copyright conventions,includingthe right to
`book orportions thereof in any form whatsoever.
`
`Published in the United States by
`Telecom Books,
`An Imprint of Miller Freeman,Inc.
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1011
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-023-7
`
`October, 1998
`
`Manufactured in the United States of America
`
`Fourteenth Considerably Expanded and Updated Edition
`Cover Design by Saul Roldan
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`2
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`ig the first town to aggressively ensure that the bulk of citi-
`don't wantouractivities to cut someoneelse’s cabLe. There are
`enty could and would haveaccesstoelectronic mail and to
`expensive implications to doing this. So what we do is we
`the various resources on the Internet. It has apparently made
`hand dig pot holes every so often along what's known as the
`a major difference to how people live and communicate in
`running line — wheretheutilities are meant to be buried. The
`Blacksburg. www.bev.net
`idea is that our potholes will locate the existing underground
`BLAM Binary Logarithmic Access Method.A proposed alter-
`cables and thus makeit safer to bore our owncable. Blind bor-
`native to the IEEE 802.3 backoff algorithm.
`ing occurs when we bore underground without digging pot
`BlamestormingBlamestorming occurs when peoplesit
`holes. The reason we might do this? Some states and some
`around in a group and discuss whya deadline was missedor
`cities simply don't allow pot holing. They trade the risk of hit-
`a project failed, and mostimportantly, who was responsible.
`ting a utility line against creating a holein the middleofstreet.
`Blank A characteron teletype terminals that does not punch
`They don't wantpotholesin their street, since an asphalt patch
`holes in paper tape (except for feed holes to push the paper
`has never the sameintegrity as a total overlay and they don’t
`through). Also the character between words, usually called a
`wanttheir streets messed up. See BLUE STAKE.
`“Space” is referredto in IBM jargon asa Blank.
`Blind Dialing All modemsare programmed
`Blank and Burst Onthe AMPScellular telephone net-
`Blind Transfer Someonetransfers a call to someone else
`work, certain administrative messages are sent on the voice
`without
`telling the person who's calling. Also called
`channel by blocking the voice signal (blanking) and sending
`Unsupervised or Cold Transfer. Contrast with Screened Transfer.
`ashort high speed data message(burst). The blank and burst
`Blinking Anintentional periodic changein the intensity of
`technique is one that causes a momentary dropout of the
`one or more display elements or display segments.
`audio connection (and sometimes disconnection of cellular
`Blister Pack A pocketed polyvinyl chloride shipping con-
`modem connections) when a powerlevel messageis trans-
`tainer with a snap-on cover.
`mitted to the cellular phone.
`Blitz A call center/marketing term. Used to describetele-
`Blank Cell The hollow spaceofa cellular metal or cellular
`phonesales or prospecting activity of intense, high volume
`concrete floor unit withoutfactory installedfittings.
`accomplishedin a short period of time.
`Blanking The suppression of the display of one or more
`Bloatware Ever-fatter packages of “upgraded” software
`display elements or display segments.
`that, with each upgrade, come with dozens and dozens of new
`Blanking IntervalPeriod during the television picture for-
`features. With each upgrade, the customer hasless need to
`mation when the electron gun returns from right to left after
`look elsewhere.At least that’s the theory. See also hyperware
`each line (horizontal blanking) or from top to bottom after each
`and vaporware.
`field (vertical blanking) during which the picture is suppressed.
`BLOBBinary Large OBjects. When a database includes not
`Blanking Pulses The processoftransmitting pulses that
`only the traditional character, numeric, and memofields but
`extinguish or blank the reproducing spot during the horizon-
`also pictures or other stuff consuming of large space, a data-
`lal and vertical retrace intervals.
`baseis said to include BLOBs — binary large objects.
`Blast BLocked ASynchronousTransmission.
`Block In data communications,a groupofbits transmitted as
`BlathererA Internet user who takes four screens to say
`a unit and treated as a unit of information. Usually consists of
`something where four words would worka lot better.
`its own starting and ending control deliminators, a header, the
`text to be transmitted and check characters at the end used for
`BlendTo have outbound and inboundphonecalls answered
`error correction. Sometimescalled a Packet.
`bythe sameagents. See the next two definitions.
`Blended AgentA call center person who answers both
`Block Character Check BCC. Theresult of transmission
`incoming and makes outgoing calls. This idea of a blended
`verification algorithm accumulated overa transmission block,
`and normally appended at the end, e.g. CRC, LRC.
`agent is a new conceptin a Call Center. In the pastcall cen-
`Block Cipher A digital encryption method which ciphers
`ters have typically kept their inbound and outbound agents
`long messages by segmenting them into blocks of fixed
`Separate. The reason? Management felt that the necessary
`skills were very different and no one could master both.
`length, prior to encryption. Each block, which typically is 64
`Blended Call CenterAtelephone call center whose
`bits in length,
`is encrypted individually. The blocks may be
`sent as individual units, or they may be linked in a method
`agents both receive and makecalls.In other words, a call cen-
`knowsas Cipher-Block-Chaining. See also ENCRYPTION.
`ler whose phone system acts both as an automatic call dis-
`Block Diagram A graphic way to showdifferent elements
`{ributor and a predictive dialer.
`Blended Floor System A combination of cellular floor
`of a program or process by the use of squares, rectangles,
`diamonds and various shapes connected by lines to show
`units with raceway capability and otherfloor units with race-
`what must be done, when it must be done and what happens
`Waycapability systematically arranged in a modularpattern.
`if it's done this way orthat. In short, it shows howall the small
`BLER Block Error Ratio. The ratio of the blocks in error
`decision points add up to the whole process.
`feceived in a specified time period to the total number of
`Block Error Ratio BLER.Theratio of the blocksin error
`blocks received in the sameperiod.
`received in a specified time period to the total number of
`BLERT-BLock Error Rate Test.
`blocks received in the sameperiod.
`BLF The Busy LampFieldis a visual display of the status of
`Block Misdelivery Probability The ratio of the num-
`all or some of your phones. Your BLFtells you if a phoneis
`ber of misdelivered blocksto the total numberofblock trans-
`busy or on hold. Your Busy Lamp Field is typically attached
`fer attempts during a specified period.
`to or part of your operator's phone. See BUSY LAMPFIELD.
`Block Mode Terminal Interface BMTI. A device used
`Blind Bore Imagine you wantto lay fiber cable along the
`to create (and break down) packetsto be transmitted through
`side of a highway. You know from blue staking and from the
`a ITU-T X.25 network. This device is needed if block-mode
`City mapsthat there are otherutility cables along the highway
`terminals (such as IBM bisync devices) are to be connected
`you want. Thefirst thing we know is that we can’ttrust the
`to the network without an intermediate computer.
`Maps or the blue staking. The second thing we know is that we
`
`101
`
`3
`
`