`
`NEWTON’s
`TELECOM
`DICTIONARY
`
`The Official Dictionary of Telecommunications
`Networking and Internet
`
`
`
`
`
`
`16th and a Half Updated, Expanded and Much
`Improved Edition
`
`Page 1
`
`
`
`CommScope Ex. 1032
`
`
`
`
`
`NEWTON’S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`email: Harry_Newton @ Technologyinvestor.com
`personal web site: www.HarryNewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by CMP Books
`An Imprint of CMP Media inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN 1-57820-053-9
`
`July, 2000
`
`Sixteenth and a Half Edition, Expanded and Updated
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARY or 408-848-3854
`Fax: 408-848-5784
`Email: telecom @ rushorder.com
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`
`
`Manufactured in the United States of America
`
`
`
`
`
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`SECORD SEcure voice CORD board. Now extinct,
`Secretarial Hunting The secretary's station number is
`Srogrammed as the last number in one or more hunt groups.
`‘fall phones within a hunt group are busy the call will hunt to
`the secretary.
`Secretarial Intercept A PBX feature, Causes calls for an
`axecutive to ring his/her secretary — even if the executive's
`direct extension number was dialed. The executive's phone
`vill ring only if the secretary's phone is placed on “Do Not
`Disturb" or the secretary transfers the call in.
`SECTEL Acronym for SECure TELephone.
`Sectional Center A contro! center connecting primary
`‘alco switching centers. A Class 2 office. The next to the high-
`3st rank (Class 2) Toll Switching Center which homes on a
`Aegional Center (Class 1).
`Sector A pie-shaped portion of a hard disk. A disk is divided
`‘to tracks and sectors. Tracks are complete circuits and are
`aivided into sectors. Under MS-DOS a sector is 512 bytes.
`Sectoring The process of dividing a mobile cellular radio
`zell into sectors, or smaller patterns of coverage. Traditionally,
`all cell antennae were omnidirectional: that is to say that they
`sfovided coverage in
`a 360-degree pattern. Sectoring is
`3pplied when either the capacity of the cell site is insufficient
`* when interference becomes a problem. Sectoring divides
`*e number of channels assigned to the cell
`into smaller
`2/oups of channels, which are assigned to a sector through
`"7e use of directional antennae. Commonly, the cell antenna
`3 divided into three sectors, each with a 120-degree coverage
`cattern. You probably have noticed that many contemporary
`all site antennae are very tall for better coverage and trian-
`qular in shape for purposes of sectoring.
`Secure Channel A technology that provides privacy,
`‘itegrity, and authentication in point-to-point communications
`such as a connection on the Internet between a Web browser
`2d a Web server. You can tell
`if you have @ secure channel
`with Netscape by checking out the key on the bottom left hand
`side of your screen. If the key is broken, your connection is
`ysecure. if it's together in one piece, then your Internet con-
`ersation is secure, which means it's encrypted and therefore
`“ard for someone to break into and make sense of, See Internet
`security, which details the problem of security on the internet.
`Secure
`Electronic
`Transaction SET.
`A system
`Jesigned for electronic commerce over the Internet that
`zromises to make stealing credit card numbers much more
`iifficult. See Digital Cash.
`Secure Kernel The core of a secure operating system.
`Secure Phone Lines There is no such animal as an
`20solutely secure phone line. There are only degrees of secu-
`“ly. Think of a continuum. At one extreme is a normal analog
`Thone line. It's totally unsecure. Anyone can attach a couple of
`alligator clips, join the circuit to a telephone and listen in on
`me call. At the other end of the continuum is a totally digital
`“reuit (end to end digital) which is being encrypted by the top-
`most military encryption tehcnology, In between, with varying
`cegrees of security, are phone cails that start as analog and
`men change to digital, e.g. those that pass through a digital
`“BX, those that pass over the Internet or a private IP network.
`Secure Public Dial A security term. Secure Public Dial is
`“lalup switching functionality that allows the service provider
`2 offer customers the security of a private connection with the
`=conomics of public dial. Also referred to as Virtual Private
`‘etworking (VPN) allows the service provider to support mul-
`“ple enterprises’ dial-in requirements, securely from the same
`slalup switch. Each separate customer has access to their own
`
`virtual network although they may share physical ports and
`access paths. The service provider manages the multicus-
`tomer net with the same ease as if
`it were one internetwork.
`Secure Sockets Layer SSL. SSL is the dominant securi-
`ty protocol for Internet
`/ Web monetary transactions and com-
`munications. Information being transmitted is encrypted, and
`only the user's Web browser and the computer server at the
`other end running the Web site have the key, and thus can
`understand what each other is saying. But no one else can.
`Most reputable Web sites use SSL for credit card transactions
`on the Web. For a longer explanation, see SSL.
`Secure Telephone Unit STU. A U.S. Government-
`approved telecommunication terminal designed to protect the
`transmission of sensitive or classified information — voice,
`data and fax.
`Secure Voice Voice signals that are encoded or encrypted
`to prevent unauthorized listening.
`Secure Voice Cord Board SECORD. A desk-mounted
`patch panel that provides the capability for controlling 16
`wideband (50 Kbps) or narrowband (2400 bps) user lines and
`five narrowband trunks to AUTOVON or other DCS narrow-
`band facilities.
`Security 1. See Secure Phone Lines.
`2, A way of insuring data on a network is protected from unau-
`thorized use. Network security measures can be software-based,
`where passwords resirict users’ access to certain data files or
`directories. This kind of security is usually implemented by the
`network operating system. Audit trails are another software-
`based security measure, where an ongoing journal of what users
`did what with what files is maintained. Security can also be
`hardware-based, using the more traditional lock and key.
`Security Accounts Manager Database Also called
`the Directory Services Database, stores information about
`user accounts, groups, and access privileges on a Microsoft
`Windows NT server.
`Security Blanking The ability of a switch to biank out the
`called digits for certain extensions so no called number detail!
`is printed. Senior executives in serious takeover negotiations
`find this feature useful. There have been instances of people
`figuring out which company another company is about to buy
`based on telephone calling records. if you have this informa-
`tion, you can buy the company’s stock before the bid
`is
`announced and make a lot of money. This feature — security
`blanking — is designed to avoid such occurrences.
`Security Cabinet A cabinet, usually on casters, used to
`Store confidential materials under lock and key prior to
`shredding.
`Security Code 1. A user identification code required by
`computer systems to
`protect information or information
`resources from unauthorized use. 2.
`A six-digit number used
`to prevent unauthorized or accidental alteration of data pro-
`grammed into cellular phones. The factory default is 000000.
`Security Dots The asterisks that appear onscreen as you
`type in your password.
`Security Equivalence A security equivalence allows one
`user to have the same rights as another. Use security equiva-
`lence when you need to give a user temporary access fo the
`same information or rights as another user. By using a secu-
`rity equivalence, you avoid having to review the whole direc-
`tory structure and determine which rights need to be assigned
`in which directories.
`Security Management Protects a network from invalid
`accesses. It is one of the management categories defined by
`the ISO (International Standards Organization).
`
`785
`
`CommScope Ex. I
`
`ne tecnotogyinvestor in te:~-
`vel domain names are ch:
`2 used increasingly to rec’:
`ymmercial concerns on
`*-
`e System. DNS.
`> of hope over experience.
`Used
`telecommunicatic::
`Certified, Refurbished 2°:
`
`=
`
`busir<::
`
`market for used
`fer equipment.
`a dey -:
`mary protection is
`vce between your phone
`~=
`: line going into and up yc_
`ig responsible for instali.-:
`protection sits on your fic:
`™. Secondary protection
`"8 equipment from spi=:
`might affect your phone [i-=.
`zownstairs and the seconce”
`sratection typically costs $_.
`any.
`“ermination system based :°
`Signals with
`radio signe :
`‘2 be determined.
`photer:
`articles (such
`as
`rays, secondary cosmic ra, :
`re produced by the action :
`
`CSA definition. Any resou":-
`the Group has been crea‘: :
`SCSA.
`;
`swo tings making up an FO-
`a!ly used in the event of f2
`
`-
`
`etWare, the secondary ser .-
`is activated after the pri-=
`red copy of the memory 2°:
`'g. The secondary server i
`‘age
`of
`the primary serv=
`: additional work (becaus=
`7g up with the primary sev
`‘as a router for the local r=
`‘ectly attached, In addition
`8 secondary server provic=.
`" may function as primary :
`tte of the system. You car >
`rver is primary or Seconda
`server's role, that is, when 7+
`ary server becomes the r=
`server is restored, it becom:
`‘so Server Mirroring.
`ne service area of a broadc:.
`ind not subject to object :~
`né signal is subject to ir-:
`
`communication network, >
`for performing unbalar:
`ted by the primary statior
`-
`gived commands and ger =
`
`relay '2
`inor winding on a
`on a transformer that is
`~
`
`Page 3
`
`