throbber

`
`NEWTON’s
`TELECOM
`DICTIONARY
`
`The Official Dictionary of Telecommunications
`Networking and Internet
`
`
`
`
`
`
`16th and a Half Updated, Expanded and Much
`Improved Edition
`
`Page 1
`
`
`
`CommScope Ex. 1032
`
`

`

`
`
`NEWTON’S TELECOM DICTIONARY
`copyright © 2000 Harry Newton
`email: Harry_Newton @ Technologyinvestor.com
`personal web site: www.HarryNewton.com
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form whatsoever.
`
`Published by CMP Books
`An Imprint of CMP Media inc.
`12 West 21 Street
`New York, NY 10010
`
`ISBN 1-57820-053-9
`
`July, 2000
`
`Sixteenth and a Half Edition, Expanded and Updated
`
`For individual orders, and for information on special discounts for quantity orders,
`please contact:
`
`CMP Books
`6600 Silacci Way
`Gilroy, CA 95020
`Tel: 800-LIBRARY or 408-848-3854
`Fax: 408-848-5784
`Email: telecom @ rushorder.com
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Distributed to the book trade in the U.S. and Canada by
`Publishers Group West
`1700 Fourth St., Berkeley, CA 94710
`
`
`
`Manufactured in the United States of America
`
`
`
`
`
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`SECORD SEcure voice CORD board. Now extinct,
`Secretarial Hunting The secretary's station number is
`Srogrammed as the last number in one or more hunt groups.
`‘fall phones within a hunt group are busy the call will hunt to
`the secretary.
`Secretarial Intercept A PBX feature, Causes calls for an
`axecutive to ring his/her secretary — even if the executive's
`direct extension number was dialed. The executive's phone
`vill ring only if the secretary's phone is placed on “Do Not
`Disturb" or the secretary transfers the call in.
`SECTEL Acronym for SECure TELephone.
`Sectional Center A contro! center connecting primary
`‘alco switching centers. A Class 2 office. The next to the high-
`3st rank (Class 2) Toll Switching Center which homes on a
`Aegional Center (Class 1).
`Sector A pie-shaped portion of a hard disk. A disk is divided
`‘to tracks and sectors. Tracks are complete circuits and are
`aivided into sectors. Under MS-DOS a sector is 512 bytes.
`Sectoring The process of dividing a mobile cellular radio
`zell into sectors, or smaller patterns of coverage. Traditionally,
`all cell antennae were omnidirectional: that is to say that they
`sfovided coverage in
`a 360-degree pattern. Sectoring is
`3pplied when either the capacity of the cell site is insufficient
`* when interference becomes a problem. Sectoring divides
`*e number of channels assigned to the cell
`into smaller
`2/oups of channels, which are assigned to a sector through
`"7e use of directional antennae. Commonly, the cell antenna
`3 divided into three sectors, each with a 120-degree coverage
`cattern. You probably have noticed that many contemporary
`all site antennae are very tall for better coverage and trian-
`qular in shape for purposes of sectoring.
`Secure Channel A technology that provides privacy,
`‘itegrity, and authentication in point-to-point communications
`such as a connection on the Internet between a Web browser
`2d a Web server. You can tell
`if you have @ secure channel
`with Netscape by checking out the key on the bottom left hand
`side of your screen. If the key is broken, your connection is
`ysecure. if it's together in one piece, then your Internet con-
`ersation is secure, which means it's encrypted and therefore
`“ard for someone to break into and make sense of, See Internet
`security, which details the problem of security on the internet.
`Secure
`Electronic
`Transaction SET.
`A system
`Jesigned for electronic commerce over the Internet that
`zromises to make stealing credit card numbers much more
`iifficult. See Digital Cash.
`Secure Kernel The core of a secure operating system.
`Secure Phone Lines There is no such animal as an
`20solutely secure phone line. There are only degrees of secu-
`“ly. Think of a continuum. At one extreme is a normal analog
`Thone line. It's totally unsecure. Anyone can attach a couple of
`alligator clips, join the circuit to a telephone and listen in on
`me call. At the other end of the continuum is a totally digital
`“reuit (end to end digital) which is being encrypted by the top-
`most military encryption tehcnology, In between, with varying
`cegrees of security, are phone cails that start as analog and
`men change to digital, e.g. those that pass through a digital
`“BX, those that pass over the Internet or a private IP network.
`Secure Public Dial A security term. Secure Public Dial is
`“lalup switching functionality that allows the service provider
`2 offer customers the security of a private connection with the
`=conomics of public dial. Also referred to as Virtual Private
`‘etworking (VPN) allows the service provider to support mul-
`“ple enterprises’ dial-in requirements, securely from the same
`slalup switch. Each separate customer has access to their own
`
`virtual network although they may share physical ports and
`access paths. The service provider manages the multicus-
`tomer net with the same ease as if
`it were one internetwork.
`Secure Sockets Layer SSL. SSL is the dominant securi-
`ty protocol for Internet
`/ Web monetary transactions and com-
`munications. Information being transmitted is encrypted, and
`only the user's Web browser and the computer server at the
`other end running the Web site have the key, and thus can
`understand what each other is saying. But no one else can.
`Most reputable Web sites use SSL for credit card transactions
`on the Web. For a longer explanation, see SSL.
`Secure Telephone Unit STU. A U.S. Government-
`approved telecommunication terminal designed to protect the
`transmission of sensitive or classified information — voice,
`data and fax.
`Secure Voice Voice signals that are encoded or encrypted
`to prevent unauthorized listening.
`Secure Voice Cord Board SECORD. A desk-mounted
`patch panel that provides the capability for controlling 16
`wideband (50 Kbps) or narrowband (2400 bps) user lines and
`five narrowband trunks to AUTOVON or other DCS narrow-
`band facilities.
`Security 1. See Secure Phone Lines.
`2, A way of insuring data on a network is protected from unau-
`thorized use. Network security measures can be software-based,
`where passwords resirict users’ access to certain data files or
`directories. This kind of security is usually implemented by the
`network operating system. Audit trails are another software-
`based security measure, where an ongoing journal of what users
`did what with what files is maintained. Security can also be
`hardware-based, using the more traditional lock and key.
`Security Accounts Manager Database Also called
`the Directory Services Database, stores information about
`user accounts, groups, and access privileges on a Microsoft
`Windows NT server.
`Security Blanking The ability of a switch to biank out the
`called digits for certain extensions so no called number detail!
`is printed. Senior executives in serious takeover negotiations
`find this feature useful. There have been instances of people
`figuring out which company another company is about to buy
`based on telephone calling records. if you have this informa-
`tion, you can buy the company’s stock before the bid
`is
`announced and make a lot of money. This feature — security
`blanking — is designed to avoid such occurrences.
`Security Cabinet A cabinet, usually on casters, used to
`Store confidential materials under lock and key prior to
`shredding.
`Security Code 1. A user identification code required by
`computer systems to
`protect information or information
`resources from unauthorized use. 2.
`A six-digit number used
`to prevent unauthorized or accidental alteration of data pro-
`grammed into cellular phones. The factory default is 000000.
`Security Dots The asterisks that appear onscreen as you
`type in your password.
`Security Equivalence A security equivalence allows one
`user to have the same rights as another. Use security equiva-
`lence when you need to give a user temporary access fo the
`same information or rights as another user. By using a secu-
`rity equivalence, you avoid having to review the whole direc-
`tory structure and determine which rights need to be assigned
`in which directories.
`Security Management Protects a network from invalid
`accesses. It is one of the management categories defined by
`the ISO (International Standards Organization).
`
`785
`
`CommScope Ex. I
`
`ne tecnotogyinvestor in te:~-
`vel domain names are ch:
`2 used increasingly to rec’:
`ymmercial concerns on
`*-
`e System. DNS.
`> of hope over experience.
`Used
`telecommunicatic::
`Certified, Refurbished 2°:
`
`=
`
`busir<::
`
`market for used
`fer equipment.
`a dey -:
`mary protection is
`vce between your phone
`~=
`: line going into and up yc_
`ig responsible for instali.-:
`protection sits on your fic:
`™. Secondary protection
`"8 equipment from spi=:
`might affect your phone [i-=.
`zownstairs and the seconce”
`sratection typically costs $_.
`any.
`“ermination system based :°
`Signals with
`radio signe :
`‘2 be determined.
`photer:
`articles (such
`as
`rays, secondary cosmic ra, :
`re produced by the action :
`
`CSA definition. Any resou":-
`the Group has been crea‘: :
`SCSA.
`;
`swo tings making up an FO-
`a!ly used in the event of f2
`
`-
`
`etWare, the secondary ser .-
`is activated after the pri-=
`red copy of the memory 2°:
`'g. The secondary server i
`‘age
`of
`the primary serv=
`: additional work (becaus=
`7g up with the primary sev
`‘as a router for the local r=
`‘ectly attached, In addition
`8 secondary server provic=.
`" may function as primary :
`tte of the system. You car >
`rver is primary or Seconda
`server's role, that is, when 7+
`ary server becomes the r=
`server is restored, it becom:
`‘so Server Mirroring.
`ne service area of a broadc:.
`ind not subject to object :~
`né signal is subject to ir-:
`
`communication network, >
`for performing unbalar:
`ted by the primary statior
`-
`gived commands and ger =
`
`relay '2
`inor winding on a
`on a transformer that is
`~
`
`Page 3
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket