throbber
Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 1 of 8
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 1 of 8
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`
`
`
`

`

`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 2 of 8
`
`NEWTON’s
`TELECOM
`DICTIONARY
`
`26th Expanded and Updated Edition
`
`Harry Newton
`
`Steve Schoen, Contributing Editor
`
`
`
`New York
`
`GOOG-PA-00001 187
`
`GOOG-PA-00001187
`
`

`

`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 3 of 8
`:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 3 of 8
`
`NEWTON’s TELECOM DICTIONARY
`26th Expanded and Updated Edition
`
`copyright © 2011 Horry Newton
`
`email: Hory@HorryNewton.com
`book site: www.NewtonsTelecomDictionary.com
`personal web site: www.HarryNewton.com
`investment web site: www.InSearchOffhePerfectInvestment.com
`
`
`
`All rights reserved under International and Pan-American Copyright conventions,including the right to reproduce this book
`of portions thereof in any form whatsoever.
`
`Published in the United States by Flatiron Publishing
`50 Central Pork West, Suite 5C
`New York, NY 10023
`wwwFlatitonBooks.com
`
`Printed by United BookPress
`1807 White Head Road
`Baltimore, MD 212074104
`800-726-0120 410-944-4044Cell phone 410-340-7878
`Represented by Lory Davis
`
`Steve Schoen, Contributing Editor
`Gail Saari, Artist, Loyout, Production and Cover Design
`
`ISBN 13 digit Number 978-0-9793873-5-7
`
`GOOG-PA-00001 188
`
`GOOG-PA-00001188
`
`

`

`F i | ed 12/16/12 This material may be protected byCopyright law (Title 17 U.S.Code)
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 4 of 8
`6:2 BANADOSERADAniMocuitent 25-2
`
`
`
`These pieces ore called packets. When on application sends a message to TCP
`for transmission, TCP breaks the messageinto packets, sized appropriately far
`the nefwork, ond sends them over the network. Becouse a single message
`is offen broken into many packets, TCP marks these pockets with sequence
`numbers before sending them. The sequence numbers allow the receiving sys-
`fem to properly reassemble the packets info the original order, i.e. the original
`message. TCP checks for errors. And finally, TCP uses port Ds to specify which
`application running on the system is sending or receiving the dato. The port 1D,
`checksum, ond sequence number ore inserted into the TCP packet in a special
`section called the header. The header is ot the beginning of the packet contain-
`ing this andother “control” information for TCP
`How IP Works: IP is the messenger protocol of TCP/IP. the IP protocol,
`much simpler than TCP, basically addresses and sends packets.IP relies on three
`pieces of information, which you provide, to receive and deliver packets suc-
`cessfully: IP address, subnet mask, and default gateway. The IP address identi-
`fies your system on the TCP/IP network. IP addresses ore 32-bit addresses
`thot are globally unique on o network. There’s much more on TCP/IP in my
`definition on TCP/IP and on Intemet Addressesin that definition,
`Here’s howthe Internet is used: As a computer network joining two (ar
`mote) computers together in a session, it is basically transparent to whot it
`cotties. If doesn’t core if it carries electronic mail, research material, shopping
`requests, video, images, voice phone calls, requests for information, foxes...
`or onything that can be digitized, placed in a pocket of information ond sent. A
`packet-switched network like the Internet injects short delays into its communi:
`colionsas it disossembles and assembles the packets of information it sends.
`And while these short delays ore not 0 prablemfor non-teal time communica-
`fions, like emcil, they present o problem for “realtime” information such as
`voice ond video, The Internet con inject a delay of os much as half a second
`between speaking and being heard at the other end. This makes conversation
`difficult. Internet telephony, osit’s called when it runs on theInternet, is getting
`better, however, as the Internet improves ond voice coding ond compression
`techniques improve. I've enjoyed somerelatively decent conversations to dis-
`tont places.
`Probably the most famous quote about the Intemet is one from John
`Dost, one ofSilicon Valley's most famous venture capitalists, He soid, “The
`Internet is the greatest legal creation of wealth in the history of the planet.”
`Later, after the dot com bust he came to regret his words, By hyping wealth
`rather than invention, he has confessed, he distractedthe industry from pursu-
`ing revolutionory technologies,
`In the eorly 1990s the Internet
`Now for a little history on the Internet,
`was runl by ondfor the United Stotas government, There was no public use of
`the Intemet. There were no commercial applications.
`In fact it wasn’t even
`clear to the Federal Government what the Internet actually was. So an organi:
`zotion culled the Federal Networking Council (FNC), which actually managed
`networking for the Federal Government, on October 24, 1995, unanimously
`possed o resolution defining the term Internet. This definition was developed in
`consultation with the lendership of the Internet and Intellectual Property Rights
`(IPR) Communities, RESOLUTION:
`(FNC) agrees that the following lan-
`“The Federal Networking Council
`quogereflects our definition of the term “Internet.” “Intemet” refers to the
`globalinformation system that ~
`(i) is logically linked together by a globally unique address space based on
`the Internet Protocol (IP) or its subsequent extensions/follow-ons;
`(ii) is able to support communications using the Transmission Control Pro-
`tocol/Internet Protocol (TCP/IP) suite orits subsequentextensions/fallow-ans,
`and/or other |P-compotible protacols; and
`(ili) provides, uses or mokes accessible, either publicly or privately, high
`level services layered on the communications and related infrastructure de-
`scribed herein.”
`ACL Mail wos thefirst commercial application attached to the Internet,
`Once it got on, oll the other email services wanted on...and the rest is history,
`See the various Internet definitions following. See also Berners-Lee, Domain,
`Domain Noming System, Grid Computing, gILD,
`ICANN, Internet2, Internet
`
`:
`
`IP Telephony, Sut
`Appliance, Internet Protocol, Internet Telephony, Intranet,
`i
`TCP/IP. Web Browserand Web Services,
`internet access The method by which users connect to the Interngp
`usually through the service of on Internet Service Provider (ISP),
`Internet access providerSee IAP
`Internet address When you trovel the Internet or its World Wide Web
`area, you need an address to get fo where you want to. go—ust like you neo
`an address on a letter you mail or a phone number you wish to reach. Al Inter.
`net addresses are expressed in dotted decimal notation of four fields of gj
`bits. In binary code, each bit has two possible values, O or 1. Therefore, enc)
`B-hit field yield two to the eighth power, or 256 possible combinations, Since
`one of the possible combinations is 000, which means nothing, itis not seq
`thereby leaving 255 possible numbers in each field. IP addresses are Witten
`os XXX.KXX.XXX.AXX, where X is any number between O ond 9, ond where
`each S-ligit field hos o value between 001 (ie. 1) ond 256. Interne} ot
`dresses curently are based on the IPv4 (Intemet Protocol version 4 protocol)
`which uses 0 32-bit code in the 20-octet IP header to identify host addressas”
`A 32-bit address field yields 2 to the 32nd power possible addresses—thar’s
`4,294,967,296 addresses. that seems like a lot of addresses, but it’s nop
`enough in the context ofthe commercialized Internet. Note that 1P¥é hos beeq
`stondardized by the IETF (Internet Engineering Tosk Force), but hos yet to hq
`widely implemented, os equipment upgrades generally are required. Among the
`advantages of IPVé is an address field exponded to 128 bits. A 1 28:bit address.
`field yields 2 to the 128 power addresses—that's 340,282,366,920,939,
`463,463,374,607,431,768,211,456 distinct addresses. That's enough for
`approximately 32 addresses for every squareinch of dry land on the Earth's sy.
`face, which should be enough for a while. No one wants fo remember oll those
`numbers when they go checking out their favorite site, So they came up with q
`neat ideo of naming sites and having o bunch of computers do the translation,
`very similar to what hoppens with 800 toll-free numbers in North Ametica, As
`a result Web URLs (Uniform Resource Locators) and e-mail addresses (such as
`www.horrynewton.com ond hary@harrynewton.com) ore textual addresses
`thot ore transloted into correlating IP addresses through DNSs (Domain Nome,
`Servers, i.e. dedicated translation computers), which maintain tables of bott
`domain names ond IP addresses. For example, if you wish to reach wwwiloe
`vonet.com, you can fype www.Javanet.com in your browser or you can simply
`type 209.94.128.8. But wiww.lavanet.com is easier to remember, Intemet
`addresses are organized into hierarchical “classes,” as follows:
`Class A Addresses: Begin with o “O” bit. Of o possible 128 Closs A net:
`works, only 51 networks exist. Examples include General Electric Company,
`IBM Cotporotion, AT&T, Hewlett-Packard Company, Ford Motor Company, and
`the Defense Information Systems Agency, They all are huge organizations, and
`require the highest possible categorization,
`Closs B Addresses: Begin with a "10" bit sequence. Of o possible 65,536
`Closs B networks, only about 12,000exist.
`Class C Addresses: Begin with 0 “110° binary bit sequence. Mast ap
`pliconts are assigned Class C addresses in blocks of 255 IP addressas. As of
`Jonuory 1998, about 800,000 Closs C addresses wereassigned.
`Closs D Addresses: Begin with a 1110” bit sequence. They are intended
`for multicast purposes.
`Closs E Addresses: Begin with a "1111" bit sequence. They are reserved
`for future use,
`Now, the term “Intemet Address” con be a bit misleading. As we have
`seen, it actuallyrefers to an “IP Address,” unless it’s a URL, of course, Even if
`it’s 0 URL, it’s tronslated into on IP address. IP addresses offen ore used in the
`LAN(Local Area Network), as well os in the Internet ond other public packet
`dota networks, In such a cose, one IP address often is used internal to the LAN
`domain, ond another in the Intemet domain,
`in order to mask the in
`IP subnet address from the outside world. Masking the internal IP address:
`essentially “mosks,” or hides, the tue IP address of your workstation from the
`outside world. You moy dothis for one simple reason—you don’t wont the
`outside world fo be able to get to your PC. The internal IP address might be et
`ther Pv4 or IPvé, while the Intemnet “outside world” address currently is always
`
`GOOG-PA-00001189
`
`GOOG-PA-00001189
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 5 of 8
`
`Internet appliance * Internet control message protocol | 625
`
`Internet backboneThis superfast network spanning the world from
`one mojor metropolitan area to another is provided by 0 hondful of national
`Internet Backbone Providers (IBPs). These companies ond orgonizotions use
`connections running ot on ¥-3 lines and above linked up at specified intercon-
`nection points called national access points. Local [SPs connect tothis backbone
`through routers so that data can be carried though the backbone to its final
`destination. The largest backbone operators include AT&T and WorldCom's
`UUNET Interconnection between these backbone operators is done through
`peering arrangements. Tele? (based in Sweden) is one of few Pon-European
`fixed line operators thot re-sell voice and Internet services fo residential users,
`withaut owning o backbone network (but leases itinsted). See also Internet
`bockbone provider.
`Internet backbone provider Courtesy the FCC: “As the market
`has evolved, Internet backbone providers fol into ane of two tiers. The first fier
`consists of core Internet backbone providers that own ond control their own
`networks; maintain nodes with defoultree routers; exchange traffic with all
`other core backbone providers on a settlementsfree basis (essentially 0 “ilk
`ond:keen” system); interconnect at a minimum of five mojor notional access
`points (NAPs) and on a privote bilateral basis with other backbone providers
`and ISPs; and offer high-speed transmission faciifies that connect their nodes
`and thot transmit high volumesof Internet trafic both nationwide and globally.
`Under the so-called “peering arrangements” among core Internet backbone
`providers, these providers will only deliver traffic to each other thatis destined
`for the core provider's end users or ISPs’ customers. Access to any one of the
`core backboneproviders offers ubiquitous Internet connectivity. The second tier
`of backbone providers also maintains nodes with defaulHfree routers and offers
`transmission facilities—albeit ot lower speeds than those of core providers—
`connecting their nodes. However, they typicaly rely on facilities obtained from
`core backbone providers to transmit traffic throughout the United States and
`to other countries, Because the core backbone providers offer services to them
`that ore costly to provide,the secondtierproviders must poy forinterconnection
`io the core providers’ networks.” See also Internet.
`Internet Base Transmitter Site Soc I18S.
`Internet cable access A general term used to describe accessing
`the Internet using the cable TV cooxial cable for inbound Internet access (i.e.
`downstream) ond the phone line for up sending commonds and requests (i.e,
`upstream information). The cable TV is very fast—as much os six million bits
`per second. The phoneis relatively slow—no more thon fifty thousond bits per
`second, But it works because most information from the Internet flows at you,
`not oway from you. The cable ond telecom industry is working on standards
`to makedisparate cable systems and TV set-top boxes work with each other.
`The industry hos developed Dota Over Cable Service Interface Specification
`(DOCSIS), which sefs standards for both two-way and coblesplusphone speci
`fications. See DOCSIS.
`Internet cache protocolSee Cf.
`Internet call waiting Imagine you hove one phone line of your
`house, You're presently using that one line to surf the Internet. Someone calls
`you. You have installed call forwarding. Their incoming call gets forwarded to
`another phone line, which is onswered by a sewvice provider whois providing
`the Internet call waiting service. Their machine answers: “The number you
`called is presently surfing the Internet. Would you like to tell them you're
`calling? Do you have a message? Record now.” the machine picks up the
`incoming phone line from callerlD, records the message ond then sends an
`email fo you, soying this phone numberis trying to reach you.And here's, their
`message.” It then plays the message.
`Internet Content Adaptation ProtocolSee ICAP
`Internet content providerICP. A company thot will design and
`deliver content for your Web site.
`Internet control message protocolICMP. An integral portof
`IP (Internet Protocol), ICMP iso mechanism by which IP softwore on a host oF
`goteway can communicate with its peers on other machines to report errors ancl
`poss other information (e.g. time stamps) relevant to IP pocket processing. As
`specified in RFC-792,ICIAP also provides o number of diagnostic functions. One
`
`GOOG-PA-00001 190
`
`ipv4:Ineither event,the IP addresses ore translated, one to the other, through
`-g process of NAT (Network Address Translation), which is accomplished in an
`occess router. On the outbound side, your true IP addressis. fronsloted into an
`
`- Internet IP address associated with the router. Responses to your transmissions
`-qve oddressed to the router, which then translates them back into your tue IP
`addeess for successful delivery. This translation and mosking process secures
`and protects your identity. See NAT for a full explanation of this process. Sea
`‘so Subnet Mosk.
`See also strict source, loase source and record route.
`Internet appliance A sub-$500 machine specially designed for In-
`feinet browsing and first proposed in the late Fall of 1995 by Lory Elison,
`heod ofdatabase software company Oracle. Part ofits appeal to people outside
`Niccosoft ond Intel is thot the Inteinet Appliance would not have to be bosed on
`stondaid PC technology. It need have an Intel chip ond need not run Windows,
`This deviceis also called an Internet Terminal, o Network Computer ot an IPC,
`an Interpersonal computer. The original description of the Internet Appliance
`wos that it would come with 4mb of RAM, 4mbof flosh memory, processor,
`monitor, keyboord ond mouse—all for under $500.
`Internet Architecture Board The Intemet Architecture Boord
`BY is 0 technical advisory group of the Intemet Society. tts responsibilities
`-incide:
`@-1ESG Selection: The 1AB oppoints a new JETF choir and oll other IESG
`condidates, from a list provided by the IETF nominating committee.
`© Architectural Oversight: The IAB provides oversight of the architecture for
`the protocols ond procedures used by the Internet.
`© Stondards Process Oversight ond Appeol: The IAB provides oversight
`of the process used to create Intemet Standards. The IAB serves as an
`
`appeal board far complaintsof improper execution of the standards
`process.
`
`© RFC Series ond IANA: The IAB is responsible for editorial management
`and publication of the Request for Comments (RFC) document series,
`
`ond for administration of the various Internet assigned numbers.
`
`© External Lioison: The IAB acts os representative of the interests of the In-
`temet Society in livison relationships with other organizations concerned
`
`with stondards ond other technical and organizational issues relevant to
`the world-wide Internet.
`
`© Advice to ISOC: The IAB acts as a source of advice ond guidance fo the
`Board of Trustees ond Officers of the Internet Society concerning techni-
`
`cal, architectural, procedural, and (where appropriate) policy matters
`pertaining fo the Internet ond its enabling technologies.
`
`Internet Assigned Numbers Authority IANA. This group
`istesponsible for the assignment of unique Internet parameters (e.g. TCP port
`Humbers, and ARP hardwore types), ond manoging domain names. It also
`Ws responsible for administration and ossignment of IP (Internet Protocol)
`
`‘Numbers within the geographic oreos of North America, South America, the
`Coibbeon and sub-Saharan Aftica; on December 22, 1997, thot responsibility
`Wos shifted to ARIN (American Registryfor Internet Numbers). wiww.orin.net.
`
`The IANA has well-established working relationships with the US Government,
`
`the Internet Society (ISOC), and the IntertlIC. SOC provides coordination of
`A ‘activities with the Intemet Engineering Tosk Force (IETF) through the
`
`‘lotticipation of IANA in the Internet Architecture Boord (IAB). IANA responsibil
`ity Was assigned by DARPA (Defense Advanced Research Project Agency) to
`the Informotion Sciences Institute (ISI) of the University of Southern Colifor-
`
`: - IS\ hosdiscretionary authority to delegate portions of its functions to an
`Meme Registry (IR), previously performed by SRI International and currently
`
`-Patformed by Network Solutions Inc. (NSI), o subsidiary of SAIC. Beginning
`Motch 1998, that function is shared with the Council of Registrars (CORE).
`NORE contracted (November 1997) with Emergent Corporation to build ond
`Serote the new Internet Name Shoted Registry System (SRS), which is a
`
`Neutral, shared database repository that coordinates registrations from CORE
`
`n Plopagotes those names to the global Internet Domoin Name System
`NS). wwnw.isi.edu/div7/iona/ See also ARIN, CORE, DNS, Internet, In
`SINIC, ond SRS.
`
`GOOG-PA-00001190
`
`

`

`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 6 of 8
`:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 6 of 8
`634 | IOR « IP datagram
`
`based notfor-profit organization which works with industry, academia, and
`government on nationa-evel initiatives ininformation jechnology, will host the
`intial operations of 1OPS.ORG. “IOPS.ORGwill play a key role in the healthy
`technical and operational evolution of the Internet as an increasingly important
`component of the economy,” said CNRI President Robert Kahn. www.iops.org.
`IOR 1. Index of Refraction. The ratio of ight velocity in a vacuum to its veloc:
`ity in-a given transmission rmedium, such os an optical fiber.
`2. Indian Ocean Region. See acean region.
`10S1.105 is the operating systemfor Apple's iPhone, iPod touch, ond iPad. If
`used to be colled the iPhone OS but it was renamed i05 in June 2010. 105 is
`based on Apple’s Mac OS X operating system.
`2.Internetwork Operating System from Cisco. This operoting system runs the
`vost mojority of routers now deployed in the core ofthe Internet. The 105 operat:
`ing system is now being replaced by the newer 10S XR. See also Junos Code,
`2. See 150.
`10S XRSee10S.
`LOTA loto, written as i or sometimes | in electrical engineering is the square
`root of -1. The concept of iota wasintroduced by Leonhard Euler, Swiss Math-
`ematician. The important property of i (or j) is that it mops any kind ofdif
`ferential, whether application in differential amplifier of differential dense wave
`multiplexing or diffetentiol time division moliplexing. To understand i (or j)
`more deeply, one has to atempt a conjecture of number theory......0 simply
`‘apply intuition,
`TOTA DMI |P-bosed overthe-air device management. See also 1OTA,
`TOTP See Internet Open Trading Protacol.
`IP 1. The Internet Protocol. IPis the most important ofthe software pratocals
`on which the Internet is based, The IP Pratocal keeps track of the Internet's ad
`dresses for different nodes, routes outgoing messages, and recognizes incom-
`ing messages.It ollows o packef fo traverse multiple networks on the wayto its
`final destination. It was originally developed by the Department of Defense to
`support interworking of dissimilar computers across a network, While its roots
`ate in the ARPAnet development,
`IP was first stondardized in RFC 791, pub
`lished in 1981, and updated in RFC 1349. This protocol works in conjunction
`with TCP. (Transmission Control Protocol) and is usually identified os TCP/IP. It
`is-0 connectionless protocol that operates at the netwark layer (layer 3) ofthe
`OSI model, See IP Address,IPv4, \Pv5, IPv6,the Internet, and TAPI 3.0.
`4. Intelligent Peripheral. A device in on IN (Intelligent Network) or AIN
`(Advanced IN)
`thot provides copabilities such os voice announcements, voice
`recognition, voice printing ond help guidance. By way of example, MCI's
`1-B00-COLLECT makes use of IPs, which ore specialized voice processing sys-
`tems. The IP prompts the caller to enter the target telephone number ond
`speak his or her nome. The system then instructs the network to connect the
`call, Bosed on o spoken acceptance of the call by the called party, the system
`authorizes call completion.
`3. Information Provider. A customer that offers recorded information on its
`listed numbers.
`4,Intellectual Property. A legal term that refers to originalcreative work
`(a book, 0 movie, software code, etc,) manifested in a tangible form that con
`be legally protected, for example, by 0 potent, trademark, or copyright,
`5,Illustrative Paragraph. A term dictionary writers (olso called lexicogar-
`phers) use to explain the meaning ofa term. Often they use their friends.
`IP AddressSeeInternet Address.
`IP Address Confirmation Also called |P Confirmation. Here’s how
`it works. In order to send electronic mail over the Internet, you need whot's
`called a SMTP (Simple Moil Tonsfer Protacol) serves, a specialized computer to
`send your moil. fyou haveyour own domain nome, like www.technologyinves:
`tor.com, then it’s eosy to set up your own mail server. Most of us, however,
`don’t. We need to use someone else’. In the good old days you could pretty
`well anyone's SMIP server. Simply tell your emeil cient. These days many
`awners of SHIP mail servers got unhoppy with people using their servers to
`spam (i.e.send zillions of unvanted email). So they set up o system to check
`the IP address from where you were coming before they allowed your email
`through.
`If your IP Address wos one of the company’s addresses, 8.9. one
`
`you'd been assigned temporarily while yau were on line, then they let yoy,
`email through. If it wasn’t, your email would be stopped. This process is calla
`IP Address Confirmation.
`IP Address Mask Internet Protocol address mask. A ronge of IP g¢.
`dresses defined so that only machines with IP oddresses within the range gy,
`allowed access to on Internet service. To mask o portion of the IP address
`replace it with the osterisk wild cord character ("), For example, 192,44.* «
`represents every computer on the Internet with on IP address beginning With
`192.44. See IP Addressing.
`IP address managementIPAIA. The ollocation, deallocation
`documentation, ond auditing of IP addresses so os to support IP address moves,
`adds, ond changes. The documentation portion of IPAM involves storing fot
`each IP address the following information: IP subnet and mask, owner ong
`contact information, subnet porent, subnet location, subnet description, ang
`subnet function, IPAM also involves developing and maintoining on IP address
`plan to model IP address ond subnet assignments. When completed, the ip
`address plan quides IPAM activifies.
`IP addressing A networking term. IP (Internet Protocol) addressingis g
`systein for ossigning numbers to network subdivisions, domains, and nodes jp
`TCP/IP networks. IP addresses ore figured as 32-bit (fourbyte) numbers, The
`high bytes constitute the “Class A” ond “Class B” portions of the address, which
`denote network and subnetwork. The low bytes ("Class C” address segments)
`identify unique nodes—individuol machines or (in ihe case of multiaddress.
`ing) individual node processes. The Class C address segment (two bytes) con
`represent 65,536 unique values—enought so that in most conventional TCP/
`IP LANs, sufficient volues are available to afford each machine its own “fixed”
`IP address.In public internet-access, however, the number of fixed addresses
`avoilable to 0 provider may not be sufficient to provide each dialup client with
`a permanent IP address. In such scenarios, avilable Class C addresses con
`be assigned dynamically, os machines log into network access ports—on the
`presumption thot no more than N clients will attempt to log on, simultaneously
`(where N denotes the number of obsolute addressesin the pool). Thus:
`Eiyed” ot “Static” IP address: a fourbyte TCP/IP network address par
`manently assigned to an individual machine or account.
`“Qynamicallyassigned” IP address: a fourbyte TCP/IP network addiess
`assigned to a machine or account for the duration of o single session,
`IP call centerA call center that uses Internet Protocol
`(IP) telephony
`instead of traditional time-division multiplexing (TOM) telephony for call center
`telephoneoperations. See TDM.
`IP Centrex An IP (Internet Protocol) telephony service wherein Centrex
`sarvice is offered ta 0 customer over o broadband connection between the
`telephone company’s central office and the customer premises. Voice hati
`ver the broadband link is carried os packetized voice,ie. VolP (voice over
`IP), The central office has either 0 softswitch that switches VolP traffic notively,
`orit has a traditional closs 5 end office switch that connects fo 0 carrier rode
`media gatewoy (sometimes called o trunking gateway) that hondles the VolF
`traffic to and from the customer ond does the protocol conversions necessary 10 '
`exchonge IP traffic with the class 5 switch. The customer has its own IP com
`
`munications systemwhich sends VoIP troffic to the CO over the broadband oc
`cess line. If the customerhas traditional anolog telephones onits premisesand
`
`wants to use them withIP Centrex, then it will need its own analog telephone
`adapters (ATA) or media gateway to cory tratfic to/from those phones vid
`the broadband link. There are a voriety of equipment, fine, and LAN scennigs
`
`on the customer side: the main thing i thot the customer will need to send
`receive pocketized voice on the broadband link to the CO (central office). 528
`class 5 office, softswitch, Vol.
`IP communications Dato, yoice and video communications ove!®
`single, converged IP network.
`IP Confirmation Also called IP Addiess Confirmotion, See [P Address
`
`Confirmation.
`:
`IP datagram The fundamental unit of information possed acshe
`Internet. Contains source ond destination addresses along with dota ond.d
`number of fields which define such things as the length of the datagram, the
`
`GOOG-PA-00001191
`
`!
`
`GOOG-PA-00001191
`
`

`

`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 7 of 8
`}:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 7 of 8
`796 | network address * network balancing
`
`network address Every node—computer, PDA, iPhone—on on
`Ethernet network has ot lenst two addresses associated with it. One is called a
`MAC (Media Access Control) address. It’s a fixed hordwore address such as “ae
`34-2¢1d-69-41" ondit’s assigned by the device’s manufacturer, It’s the unique
`number assigned to the network adapter inside your computer or gadget. No
`one else con have your number, Additionally,on oll Ethemet networks, there's
`on IP (Internet Protocol) address. That address is typically assigned to your
`device on the fly by o router connected to the Intemet. Think of this address
`which looks like this—192.168.10.108—vs your postal address. It enables
`the postal service (i.e. the Intemet) to find you. Without your IP address you
`wouldn't be able to receive email or surf the Intemet. There are hwo ways you
`acquire on IP address when you attempt to log into the Internet. Your (SP (In-
`ternet Service Provider) con assign you one, This is culled dynamic assignment.
`Thereis alsa o static IP address. Essentially you choose the IP Address you
`want, You organize this thus. You have a router ot your homeor office, It-con-
`nects to the Internet. Your rowler gets its IP address from your ISP. But then it
`hos softwore inside which translates thot IP Address to the addresses demanded
`by the computers attached to it. Choosing between dynamic ond static is done
`in the software in your computer. It’s easier to select dynamic—letthe Internet
`do oll the work. Thot’s called DHCP—Dynomic Host Configuration Protocol.
`See HOW TO SET UP AHOME OR SIMALL OFFICE NETWORK in the Introduction
`ond Internet address,
`network address translation NAT. Network Address Tronslo-
`tion. A Cisco version of Port Address Translation (PAT), NAT enables o local area
`network (LAN) to use one set of IP addresses for internal traffic and a second
`set of addresses for external traffic, This allows 0 company to shield internal
`addresses from the public Intemet. According to Cisco, NAT has several applica-
`tions. You wont to connect to the Internet, but not all your hosts have globally
`unique |P addresses, NAT enables privote IP internetworks (i.e. Intranets) thot
`use nonregistered IP addresses to connect to the Internet, or another public IP-
`bosed network, NAT is configured on the router ot the border of a stub domain
`(referred to as the inside network) ond o public network such os the Internet
`(referred to 0s the outside network). NAT tronslotes the internal locol addresses
`to globally unique IP addresses before sending pockets to the outside network.
`You must change your internal addresses. Instead of changing them, which can
`be o considerable amount of work, you con translate them by using NAT. You
`wantfo do basic lood sharing of TCP traffic. You con map o single global IP
`address to many local IP addressesby using the TCP load distribution feature, As
`a solution to the connectivity problem, NATis practical only when relatively few
`hosts in a stub domain communicate outside of the doniain at the same time.
`When this is the cose, only a small subset of the IP addresses in the domain
`must be translated into globally unique IP addresses when outside communica-
`tion is necessary, and these addresses con be reused when no longer in use.
`A significant advantage of NAT, according to Cisco, is that it con be con-
`figured without requiring changes to hosts or routers other than those few
`routers on which NAT will be configured. NAT may not be practicel if large
`numbers of hosts in the stub domoin communicofe outside of the domain.
`Furthermore, some applications use embedded IP addresses in such o woy
`thot it is impractical foro NAT device to translate. These applications may not
`work transparently or at all through o NAT device. NAT also hides the identity
`of hosts, which may be an advantage or a disadvantage. A router configured
`with NAT will hove ot leost one interfoce to the inside ond one to the outside,
`Ino typical environment, NAT is configured at the exit router between a stub
`domain and backbone. When a pocketis leaving the domain, NAT translates the
`locally significant source address into a globally unique address. When o pac

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket