`TELECOM
`DICTIONARY
`
`The Official Dictionary of Telecommunications
`Networking and Internet
`
`Improved Edition
`
`
`16th and a Half Updated, Expanded and Much
`
`Page 1
`
`CommScope Ex. 1032
`
`
`
`
`
`NEWTON’S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`email: Harry_Newton @ Technologyinvestor.com
`personal web site: www.HarryNewton.com
`
`All rights reserved underInternational and Pan-American Copyright conventions,
`including the right to reproduce this bookorportions thereof in any form whatsoever.
`
`Published by CMP Books
`An Imprint of CMP Media inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN 1-57820-053-9
`
`July, 2000
`
`Sixteenth and a Half Edition, Expanded and Updated
`
`Forindividual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARY or 408-848-3854
`Fax: 408-848-5784
`Email: telecom @ rushorder.com
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Distributed to the booktrade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`
`
`
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`ne tecnologyinvestor in te:
`vel domain names are c*=
`2 used increasingly to rec’:
`ymmercial concerns on :-
`e Systam. DNS.
`> of hope over experience.
`Used telecommunicatic::
`Certified, Refurbished 2°:
`
`-
`
`for used busiré:
`market
`ter equipment.
`mary protection is a des -:
`re between your phone
`~=
`r line going into and up yc_
`$ responsible for instali.-:
`protection sits on your fic:
`™. Secondary protectior
`18 equipment
`from spi-<
`might affect your phone |i-=
`zownstalrs and the seconaz
`sratection typically costs $_.
`any.
`“ermination system based :”
`Sgnals with radio signe
`‘2 be determined.
`articles (such as photer:
`rays, secondary cosmicra, :
`re produced by the actior -
`
`SECORD SEcure voice CORD board. Now extinct,
`virtual network although they may share physical ports and
`Secretarial Hunting The secretary's station number is
`access paths. The service provider manages the mutticus-
`srogrammed as the last number in one or more hunt groups.
`tomer net with the sameeaseas if it were one internetwork.
`‘fall phones within a hunt group are busythe call will hunt to
`Secure Sockets Layer SSL. SSL is the dominantsecuri-
`the secretary.
`ty protocol for Internet / Web monetarytransactions and com-
`Secretarial Intercept A PBX feature. Causes calls for an
`munications.Information being transmitted is encrypted, and
`axecutive to ring his/her secretary — even if the executive's
`only the user's Web browser and the computerserver at the
`direct extension number was dialed. The executive's phone
`other end running the Website have the key, and thus can
`vill ring only if the secretary's phone is placed on “Do Not
`understand what each other is saying. But no one else can.
`Disturb" or the secretary transfers thecall in.
`Most reputable Websites use SSLfor credit card transactions
`SECTEL Acronym for SECure TELephone.
`on the Web. For a longer explanation, see SSL.
`Sectional Center A control center connecting primary
`Secure Telephone Unit STU. A U.S. Government
`‘alco switching centers. A Class 2 office. The next to the high-
`approved telecommunication terminal designed to protect the
`ast rank (Class 2) Toll Switching Center which homes on a
`transmission of sensitive or classified information — voice,
`*egional Center (Class 1).
`data and fax.
`Sector A pie-shaped portion of a hard disk. A disk is divided
`Secure Voice Voice signals that are encoded or encrypted
`nto tracks and sectors. Tracks are complete circuits and are
`to prevent unauthorized listening.
`aivided into sectors. Under MS-DOSa sectoris 512 bytes.
`Secure Voice Cord Board SECORD. A desk-mounted
`Sectoring The process of dividing a mobile cellular radio
`patch panel
`that provides the capability for controlling 16
`cell into sectors, or smaller patterns of coverage. Traditionally,
`wideband (50 Kbps) or narrowband (2400 bps) userlines and
`all cell antennae were omnidirectional; that is to say that they
`five narrowband trunks to AUTOVON or other DCS narrow-
`sfovided coverage in a 360-degree pattern. Sectoring is
`bandfacilities.
`3pplied when either the capacity of the cell site is insufficient
`Security 1. See Secure Phone Lines.
`“ when interference becomes a problem. Sectoring divides
`2, A way of insuring data on a networkis protected from unau-
`“e number of channels assigned to the cell
`into smaller
`thorized use. Network security measures can be software-based,
`2'oups of channels, which are assigned to a sector through
`where passwords resirict users’ access to certain data files or
`‘ne use of directional antennae. Commonly, the cell antenna
`directories. This kind of security is usually implemented by the
`3 dividedinto three sectors, each with a 120-degree coverage
`network operating system. Audit trails are another software-
`cattern. You probably have noticed that many contemporary
`based security measure, where an ongoingjournalof what users
`all site antennae are very tall for better Coverage and trian-
`did what with whatfiles is maintained. Security can also be
`qular in shapefor purposes of sectoring.
`hardware-based, using the moretraditional lock and key.
`Secure Channel A technology that provides privacy,
`Security Accounts Manager Database Also called
`‘tegrity, and authentication in point-to-point communications
`the Directory Services Database, stores information about
`such as a connection on the Internet between a Web browser
`user accounts, groups, and accessprivileges on a Microsoft
`zd a Web server. You can tell
`if you have @ secure channel
`Windows NTserver.
`with Netscape by checking out the key on the bottom left hand
`Security Blanking Theability of a switch to biank out the
`side of your screen. If the key is broken, your connection is
`called digits for certain extensions so no called numberdetail
`"secure. If it's together in one piece, then your Internet con-
`is printed. Senior executives in serious takeover negotiations
`‘erSation is secure, which meansit's encrypted and therefore
`find this feature useful. There have been instances of people
`“ard for someoneto break into and make senseof, See Internet
`figuring out which company another companyis aboutto buy
`security, which details the problem of security on the internet.
`based ontelephonecalling records. if you have this informa-
`Secure Electroni¢ Transaction SET. A system
`tion, you can buy the company’s stock before the bid is
`Jesigned for electronic commerce over the Internet
`that
`announced and makea lot of money. This feature — security
`zromises to make stealing credit card numbers much more
`blanking — is designed to avoid such occurrences.
`iifficult. See Digital Cash.
`Security Cabinet A cabinet, usually on casters, used to
`Secure Kernel The core of a secure operating system.
`Store confidential materials under
`lock and key prior to
`Secure Phone Lines There is no such animal as an
`shredding.
`20solutely secure phoneline. There are only degrees of secu-
`Security Code 1. A user identification code required by
`“ly. Think of a continuum. At one extreme is a normal analog
`computer systems to protect
`information or
`information
`Thoneline. It's totally unsecure. Anyone can attach a couple of
`resources from unauthorized use. 2. A six-digit number used
`2ligatorclips, join the circuit to a telephone andlisten in on
`to prevent unauthorized or accidental alteration of data pro-
`e call. At the other end of the continuum is a totally digital
`grammed into cellular phones. The factory default is 000000.
`“reuit (end to end digital) whichis being encrypted by the top-
`Security Dots The asterisks that appear onscreen as you
`most military encryption tehcnology, In between, with varying
`type in your password.
`cagrees of security, are phone cails that start as analog and
`Security Equivalence A security equivalence allows one
`“en changeto digital, e.g.those that pass through a digital
`user to have the samerights as another. Use security equiva-
`. communication network, :
`~BX,those that pass overthe Internet or a private IP network.
`lence when you needto give a user temporary accessto the
`for performing unbalar<:
`Secure Public Dial A security term. Secure Public Dial is
`same information or rights as another user. By using a secu-
`-
`ted by the primary statior
`“lalup switching functionality that allows the service provider
`rity equivalence, you avoid having to review the whole direc-
`gived commands and ger =
`2offer customersthe security of a private connection with the
`tory structure and determine whichrights need to be assigned
`=conomics of public dial. Also referred to as Virtual Private
`in which directories.
`‘etworking (VPN) allows the service providerto support mul-
`Security ManagementProtects a network from invalid
`“ple enterprises’ dial-in requirements, securely from the same
`accesses. It is one of the management categories defined by
`sialup switch. Fach separate customer has access to their own
`the ISO (International Standards Organization).
`
`CSA definition. Any resou":-
`the Group has been crea‘: :
`SCSA.
`;
`swo tings making up an FC
`a!ly used in the event of f2 -
`
`stWare, the secondary ser.
`1s activated after the pri- =
`red copy of the memory 2°:
`‘3. The secondary server
`‘age of
`the primary serv=
`: additional work (becaus=
`7g up with the primary sev
`‘as a routerfor the local r=
`‘ectly attached, In additior
`@ secondary server provic:
`" may function as primary :
`fe of the system. You care
`rver is primary or seconda
`server's role,that is, when ~
`ary server becomes the r:
`server is restored, it becom:
`‘so Server Mirroring.
`ne service area of a broad::
`ind not subject to object >
`né signal is subjectto ir-:
`
`inor winding on a relay ':
`on a transformer that is
`
`Page 3
`
`785
`
`CommScope Ex. 10,
`
`