throbber
NEWTON’s
`TELECOM
`DICTIONARY
`
`The Official Dictionary of Telecommunications
`Networking and Internet
`
`Improved Edition
`
`
`16th and a Half Updated, Expanded and Much
`
`Page 1
`
`CommScope Ex. 1032
`
`

`

`
`
`NEWTON’S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`email: Harry_Newton @ Technologyinvestor.com
`personal web site: www.HarryNewton.com
`
`All rights reserved underInternational and Pan-American Copyright conventions,
`including the right to reproduce this bookorportions thereof in any form whatsoever.
`
`Published by CMP Books
`An Imprint of CMP Media inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN 1-57820-053-9
`
`July, 2000
`
`Sixteenth and a Half Edition, Expanded and Updated
`
`Forindividual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARY or 408-848-3854
`Fax: 408-848-5784
`Email: telecom @ rushorder.com
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Distributed to the booktrade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`Manufactured in the United States of America
`
`
`
`

`

`
`
`NEWTON’S TELECOM DICTIONARY
`
`ne tecnologyinvestor in te:
`vel domain names are c*=
`2 used increasingly to rec’:
`ymmercial concerns on :-
`e Systam. DNS.
`> of hope over experience.
`Used telecommunicatic::
`Certified, Refurbished 2°:
`
`-
`
`for used busiré:
`market
`ter equipment.
`mary protection is a des -:
`re between your phone
`~=
`r line going into and up yc_
`$ responsible for instali.-:
`protection sits on your fic:
`™. Secondary protectior
`18 equipment
`from spi-<
`might affect your phone |i-=
`zownstalrs and the seconaz
`sratection typically costs $_.
`any.
`“ermination system based :”
`Sgnals with radio signe
`‘2 be determined.
`articles (such as photer:
`rays, secondary cosmicra, :
`re produced by the actior -
`
`SECORD SEcure voice CORD board. Now extinct,
`virtual network although they may share physical ports and
`Secretarial Hunting The secretary's station number is
`access paths. The service provider manages the mutticus-
`srogrammed as the last number in one or more hunt groups.
`tomer net with the sameeaseas if it were one internetwork.
`‘fall phones within a hunt group are busythe call will hunt to
`Secure Sockets Layer SSL. SSL is the dominantsecuri-
`the secretary.
`ty protocol for Internet / Web monetarytransactions and com-
`Secretarial Intercept A PBX feature. Causes calls for an
`munications.Information being transmitted is encrypted, and
`axecutive to ring his/her secretary — even if the executive's
`only the user's Web browser and the computerserver at the
`direct extension number was dialed. The executive's phone
`other end running the Website have the key, and thus can
`vill ring only if the secretary's phone is placed on “Do Not
`understand what each other is saying. But no one else can.
`Disturb" or the secretary transfers thecall in.
`Most reputable Websites use SSLfor credit card transactions
`SECTEL Acronym for SECure TELephone.
`on the Web. For a longer explanation, see SSL.
`Sectional Center A control center connecting primary
`Secure Telephone Unit STU. A U.S. Government
`‘alco switching centers. A Class 2 office. The next to the high-
`approved telecommunication terminal designed to protect the
`ast rank (Class 2) Toll Switching Center which homes on a
`transmission of sensitive or classified information — voice,
`*egional Center (Class 1).
`data and fax.
`Sector A pie-shaped portion of a hard disk. A disk is divided
`Secure Voice Voice signals that are encoded or encrypted
`nto tracks and sectors. Tracks are complete circuits and are
`to prevent unauthorized listening.
`aivided into sectors. Under MS-DOSa sectoris 512 bytes.
`Secure Voice Cord Board SECORD. A desk-mounted
`Sectoring The process of dividing a mobile cellular radio
`patch panel
`that provides the capability for controlling 16
`cell into sectors, or smaller patterns of coverage. Traditionally,
`wideband (50 Kbps) or narrowband (2400 bps) userlines and
`all cell antennae were omnidirectional; that is to say that they
`five narrowband trunks to AUTOVON or other DCS narrow-
`sfovided coverage in a 360-degree pattern. Sectoring is
`bandfacilities.
`3pplied when either the capacity of the cell site is insufficient
`Security 1. See Secure Phone Lines.
`“ when interference becomes a problem. Sectoring divides
`2, A way of insuring data on a networkis protected from unau-
`“e number of channels assigned to the cell
`into smaller
`thorized use. Network security measures can be software-based,
`2'oups of channels, which are assigned to a sector through
`where passwords resirict users’ access to certain data files or
`‘ne use of directional antennae. Commonly, the cell antenna
`directories. This kind of security is usually implemented by the
`3 dividedinto three sectors, each with a 120-degree coverage
`network operating system. Audit trails are another software-
`cattern. You probably have noticed that many contemporary
`based security measure, where an ongoingjournalof what users
`all site antennae are very tall for better Coverage and trian-
`did what with whatfiles is maintained. Security can also be
`qular in shapefor purposes of sectoring.
`hardware-based, using the moretraditional lock and key.
`Secure Channel A technology that provides privacy,
`Security Accounts Manager Database Also called
`‘tegrity, and authentication in point-to-point communications
`the Directory Services Database, stores information about
`such as a connection on the Internet between a Web browser
`user accounts, groups, and accessprivileges on a Microsoft
`zd a Web server. You can tell
`if you have @ secure channel
`Windows NTserver.
`with Netscape by checking out the key on the bottom left hand
`Security Blanking Theability of a switch to biank out the
`side of your screen. If the key is broken, your connection is
`called digits for certain extensions so no called numberdetail
`"secure. If it's together in one piece, then your Internet con-
`is printed. Senior executives in serious takeover negotiations
`‘erSation is secure, which meansit's encrypted and therefore
`find this feature useful. There have been instances of people
`“ard for someoneto break into and make senseof, See Internet
`figuring out which company another companyis aboutto buy
`security, which details the problem of security on the internet.
`based ontelephonecalling records. if you have this informa-
`Secure Electroni¢ Transaction SET. A system
`tion, you can buy the company’s stock before the bid is
`Jesigned for electronic commerce over the Internet
`that
`announced and makea lot of money. This feature — security
`zromises to make stealing credit card numbers much more
`blanking — is designed to avoid such occurrences.
`iifficult. See Digital Cash.
`Security Cabinet A cabinet, usually on casters, used to
`Secure Kernel The core of a secure operating system.
`Store confidential materials under
`lock and key prior to
`Secure Phone Lines There is no such animal as an
`shredding.
`20solutely secure phoneline. There are only degrees of secu-
`Security Code 1. A user identification code required by
`“ly. Think of a continuum. At one extreme is a normal analog
`computer systems to protect
`information or
`information
`Thoneline. It's totally unsecure. Anyone can attach a couple of
`resources from unauthorized use. 2. A six-digit number used
`2ligatorclips, join the circuit to a telephone andlisten in on
`to prevent unauthorized or accidental alteration of data pro-
`e call. At the other end of the continuum is a totally digital
`grammed into cellular phones. The factory default is 000000.
`“reuit (end to end digital) whichis being encrypted by the top-
`Security Dots The asterisks that appear onscreen as you
`most military encryption tehcnology, In between, with varying
`type in your password.
`cagrees of security, are phone cails that start as analog and
`Security Equivalence A security equivalence allows one
`“en changeto digital, e.g.those that pass through a digital
`user to have the samerights as another. Use security equiva-
`. communication network, :
`~BX,those that pass overthe Internet or a private IP network.
`lence when you needto give a user temporary accessto the
`for performing unbalar<:
`Secure Public Dial A security term. Secure Public Dial is
`same information or rights as another user. By using a secu-
`-
`ted by the primary statior
`“lalup switching functionality that allows the service provider
`rity equivalence, you avoid having to review the whole direc-
`gived commands and ger =
`2offer customersthe security of a private connection with the
`tory structure and determine whichrights need to be assigned
`=conomics of public dial. Also referred to as Virtual Private
`in which directories.
`‘etworking (VPN) allows the service providerto support mul-
`Security ManagementProtects a network from invalid
`“ple enterprises’ dial-in requirements, securely from the same
`accesses. It is one of the management categories defined by
`sialup switch. Fach separate customer has access to their own
`the ISO (International Standards Organization).
`
`CSA definition. Any resou":-
`the Group has been crea‘: :
`SCSA.
`;
`swo tings making up an FC
`a!ly used in the event of f2 -
`
`stWare, the secondary ser.
`1s activated after the pri- =
`red copy of the memory 2°:
`‘3. The secondary server
`‘age of
`the primary serv=
`: additional work (becaus=
`7g up with the primary sev
`‘as a routerfor the local r=
`‘ectly attached, In additior
`@ secondary server provic:
`" may function as primary :
`fe of the system. You care
`rver is primary or seconda
`server's role,that is, when ~
`ary server becomes the r:
`server is restored, it becom:
`‘so Server Mirroring.
`ne service area of a broad::
`ind not subject to object >
`né signal is subjectto ir-:
`
`inor winding on a relay ':
`on a transformer that is
`
`Page 3
`
`785
`
`CommScope Ex. 10,
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket