`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 1 of 8
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 2 of 8
`
`NEWTON’s
`TELECOM
`DICTIONARY
`
`26th Expanded and Updated Edition
`
`Harry Newton
`
`Steve Schoen, Contributing Editor
`
`
`
`New York
`
`GOOG-PA-00001 187
`
`GOOG-PA-00001187
`
`
`
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 3 of 8
`:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 3 of 8
`
`NEWTON’s TELECOM DICTIONARY
`26th Expanded and Updated Edition
`
`copyright © 2011 Horry Newton
`
`email: Hory@HorryNewton.com
`book site: www.NewtonsTelecomDictionary.com
`personal web site: www.HarryNewton.com
`investment web site: www.InSearchOffhePerfectInvestment.com
`
`
`
`All rights reserved under International and Pan-American Copyright conventions,including the right to reproduce this book
`of portions thereof in any form whatsoever.
`
`Published in the United States by Flatiron Publishing
`50 Central Pork West, Suite 5C
`New York, NY 10023
`wwwFlatitonBooks.com
`
`Printed by United BookPress
`1807 White Head Road
`Baltimore, MD 212074104
`800-726-0120 410-944-4044Cell phone 410-340-7878
`Represented by Lory Davis
`
`Steve Schoen, Contributing Editor
`Gail Saari, Artist, Loyout, Production and Cover Design
`
`ISBN 13 digit Number 978-0-9793873-5-7
`
`GOOG-PA-00001 188
`
`GOOG-PA-00001188
`
`
`
`F i | ed 12/16/12 This material may be protected byCopyright law (Title 17 U.S.Code)
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 4 of 8
`6:2 BANADOSERADAniMocuitent 25-2
`
`
`
`These pieces ore called packets. When on application sends a message to TCP
`for transmission, TCP breaks the messageinto packets, sized appropriately far
`the nefwork, ond sends them over the network. Becouse a single message
`is offen broken into many packets, TCP marks these pockets with sequence
`numbers before sending them. The sequence numbers allow the receiving sys-
`fem to properly reassemble the packets info the original order, i.e. the original
`message. TCP checks for errors. And finally, TCP uses port Ds to specify which
`application running on the system is sending or receiving the dato. The port 1D,
`checksum, ond sequence number ore inserted into the TCP packet in a special
`section called the header. The header is ot the beginning of the packet contain-
`ing this andother “control” information for TCP
`How IP Works: IP is the messenger protocol of TCP/IP. the IP protocol,
`much simpler than TCP, basically addresses and sends packets.IP relies on three
`pieces of information, which you provide, to receive and deliver packets suc-
`cessfully: IP address, subnet mask, and default gateway. The IP address identi-
`fies your system on the TCP/IP network. IP addresses ore 32-bit addresses
`thot are globally unique on o network. There’s much more on TCP/IP in my
`definition on TCP/IP and on Intemet Addressesin that definition,
`Here’s howthe Internet is used: As a computer network joining two (ar
`mote) computers together in a session, it is basically transparent to whot it
`cotties. If doesn’t core if it carries electronic mail, research material, shopping
`requests, video, images, voice phone calls, requests for information, foxes...
`or onything that can be digitized, placed in a pocket of information ond sent. A
`packet-switched network like the Internet injects short delays into its communi:
`colionsas it disossembles and assembles the packets of information it sends.
`And while these short delays ore not 0 prablemfor non-teal time communica-
`fions, like emcil, they present o problem for “realtime” information such as
`voice ond video, The Internet con inject a delay of os much as half a second
`between speaking and being heard at the other end. This makes conversation
`difficult. Internet telephony, osit’s called when it runs on theInternet, is getting
`better, however, as the Internet improves ond voice coding ond compression
`techniques improve. I've enjoyed somerelatively decent conversations to dis-
`tont places.
`Probably the most famous quote about the Intemet is one from John
`Dost, one ofSilicon Valley's most famous venture capitalists, He soid, “The
`Internet is the greatest legal creation of wealth in the history of the planet.”
`Later, after the dot com bust he came to regret his words, By hyping wealth
`rather than invention, he has confessed, he distractedthe industry from pursu-
`ing revolutionory technologies,
`In the eorly 1990s the Internet
`Now for a little history on the Internet,
`was runl by ondfor the United Stotas government, There was no public use of
`the Intemet. There were no commercial applications.
`In fact it wasn’t even
`clear to the Federal Government what the Internet actually was. So an organi:
`zotion culled the Federal Networking Council (FNC), which actually managed
`networking for the Federal Government, on October 24, 1995, unanimously
`possed o resolution defining the term Internet. This definition was developed in
`consultation with the lendership of the Internet and Intellectual Property Rights
`(IPR) Communities, RESOLUTION:
`(FNC) agrees that the following lan-
`“The Federal Networking Council
`quogereflects our definition of the term “Internet.” “Intemet” refers to the
`globalinformation system that ~
`(i) is logically linked together by a globally unique address space based on
`the Internet Protocol (IP) or its subsequent extensions/follow-ons;
`(ii) is able to support communications using the Transmission Control Pro-
`tocol/Internet Protocol (TCP/IP) suite orits subsequentextensions/fallow-ans,
`and/or other |P-compotible protacols; and
`(ili) provides, uses or mokes accessible, either publicly or privately, high
`level services layered on the communications and related infrastructure de-
`scribed herein.”
`ACL Mail wos thefirst commercial application attached to the Internet,
`Once it got on, oll the other email services wanted on...and the rest is history,
`See the various Internet definitions following. See also Berners-Lee, Domain,
`Domain Noming System, Grid Computing, gILD,
`ICANN, Internet2, Internet
`
`:
`
`IP Telephony, Sut
`Appliance, Internet Protocol, Internet Telephony, Intranet,
`i
`TCP/IP. Web Browserand Web Services,
`internet access The method by which users connect to the Interngp
`usually through the service of on Internet Service Provider (ISP),
`Internet access providerSee IAP
`Internet address When you trovel the Internet or its World Wide Web
`area, you need an address to get fo where you want to. go—ust like you neo
`an address on a letter you mail or a phone number you wish to reach. Al Inter.
`net addresses are expressed in dotted decimal notation of four fields of gj
`bits. In binary code, each bit has two possible values, O or 1. Therefore, enc)
`B-hit field yield two to the eighth power, or 256 possible combinations, Since
`one of the possible combinations is 000, which means nothing, itis not seq
`thereby leaving 255 possible numbers in each field. IP addresses are Witten
`os XXX.KXX.XXX.AXX, where X is any number between O ond 9, ond where
`each S-ligit field hos o value between 001 (ie. 1) ond 256. Interne} ot
`dresses curently are based on the IPv4 (Intemet Protocol version 4 protocol)
`which uses 0 32-bit code in the 20-octet IP header to identify host addressas”
`A 32-bit address field yields 2 to the 32nd power possible addresses—thar’s
`4,294,967,296 addresses. that seems like a lot of addresses, but it’s nop
`enough in the context ofthe commercialized Internet. Note that 1P¥é hos beeq
`stondardized by the IETF (Internet Engineering Tosk Force), but hos yet to hq
`widely implemented, os equipment upgrades generally are required. Among the
`advantages of IPVé is an address field exponded to 128 bits. A 1 28:bit address.
`field yields 2 to the 128 power addresses—that's 340,282,366,920,939,
`463,463,374,607,431,768,211,456 distinct addresses. That's enough for
`approximately 32 addresses for every squareinch of dry land on the Earth's sy.
`face, which should be enough for a while. No one wants fo remember oll those
`numbers when they go checking out their favorite site, So they came up with q
`neat ideo of naming sites and having o bunch of computers do the translation,
`very similar to what hoppens with 800 toll-free numbers in North Ametica, As
`a result Web URLs (Uniform Resource Locators) and e-mail addresses (such as
`www.horrynewton.com ond hary@harrynewton.com) ore textual addresses
`thot ore transloted into correlating IP addresses through DNSs (Domain Nome,
`Servers, i.e. dedicated translation computers), which maintain tables of bott
`domain names ond IP addresses. For example, if you wish to reach wwwiloe
`vonet.com, you can fype www.Javanet.com in your browser or you can simply
`type 209.94.128.8. But wiww.lavanet.com is easier to remember, Intemet
`addresses are organized into hierarchical “classes,” as follows:
`Class A Addresses: Begin with o “O” bit. Of o possible 128 Closs A net:
`works, only 51 networks exist. Examples include General Electric Company,
`IBM Cotporotion, AT&T, Hewlett-Packard Company, Ford Motor Company, and
`the Defense Information Systems Agency, They all are huge organizations, and
`require the highest possible categorization,
`Closs B Addresses: Begin with a "10" bit sequence. Of o possible 65,536
`Closs B networks, only about 12,000exist.
`Class C Addresses: Begin with 0 “110° binary bit sequence. Mast ap
`pliconts are assigned Class C addresses in blocks of 255 IP addressas. As of
`Jonuory 1998, about 800,000 Closs C addresses wereassigned.
`Closs D Addresses: Begin with a 1110” bit sequence. They are intended
`for multicast purposes.
`Closs E Addresses: Begin with a "1111" bit sequence. They are reserved
`for future use,
`Now, the term “Intemet Address” con be a bit misleading. As we have
`seen, it actuallyrefers to an “IP Address,” unless it’s a URL, of course, Even if
`it’s 0 URL, it’s tronslated into on IP address. IP addresses offen ore used in the
`LAN(Local Area Network), as well os in the Internet ond other public packet
`dota networks, In such a cose, one IP address often is used internal to the LAN
`domain, ond another in the Intemet domain,
`in order to mask the in
`IP subnet address from the outside world. Masking the internal IP address:
`essentially “mosks,” or hides, the tue IP address of your workstation from the
`outside world. You moy dothis for one simple reason—you don’t wont the
`outside world fo be able to get to your PC. The internal IP address might be et
`ther Pv4 or IPvé, while the Intemnet “outside world” address currently is always
`
`GOOG-PA-00001189
`
`GOOG-PA-00001189
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 5 of 8
`
`Internet appliance * Internet control message protocol | 625
`
`Internet backboneThis superfast network spanning the world from
`one mojor metropolitan area to another is provided by 0 hondful of national
`Internet Backbone Providers (IBPs). These companies ond orgonizotions use
`connections running ot on ¥-3 lines and above linked up at specified intercon-
`nection points called national access points. Local [SPs connect tothis backbone
`through routers so that data can be carried though the backbone to its final
`destination. The largest backbone operators include AT&T and WorldCom's
`UUNET Interconnection between these backbone operators is done through
`peering arrangements. Tele? (based in Sweden) is one of few Pon-European
`fixed line operators thot re-sell voice and Internet services fo residential users,
`withaut owning o backbone network (but leases itinsted). See also Internet
`bockbone provider.
`Internet backbone provider Courtesy the FCC: “As the market
`has evolved, Internet backbone providers fol into ane of two tiers. The first fier
`consists of core Internet backbone providers that own ond control their own
`networks; maintain nodes with defoultree routers; exchange traffic with all
`other core backbone providers on a settlementsfree basis (essentially 0 “ilk
`ond:keen” system); interconnect at a minimum of five mojor notional access
`points (NAPs) and on a privote bilateral basis with other backbone providers
`and ISPs; and offer high-speed transmission faciifies that connect their nodes
`and thot transmit high volumesof Internet trafic both nationwide and globally.
`Under the so-called “peering arrangements” among core Internet backbone
`providers, these providers will only deliver traffic to each other thatis destined
`for the core provider's end users or ISPs’ customers. Access to any one of the
`core backboneproviders offers ubiquitous Internet connectivity. The second tier
`of backbone providers also maintains nodes with defaulHfree routers and offers
`transmission facilities—albeit ot lower speeds than those of core providers—
`connecting their nodes. However, they typicaly rely on facilities obtained from
`core backbone providers to transmit traffic throughout the United States and
`to other countries, Because the core backbone providers offer services to them
`that ore costly to provide,the secondtierproviders must poy forinterconnection
`io the core providers’ networks.” See also Internet.
`Internet Base Transmitter Site Soc I18S.
`Internet cable access A general term used to describe accessing
`the Internet using the cable TV cooxial cable for inbound Internet access (i.e.
`downstream) ond the phone line for up sending commonds and requests (i.e,
`upstream information). The cable TV is very fast—as much os six million bits
`per second. The phoneis relatively slow—no more thon fifty thousond bits per
`second, But it works because most information from the Internet flows at you,
`not oway from you. The cable ond telecom industry is working on standards
`to makedisparate cable systems and TV set-top boxes work with each other.
`The industry hos developed Dota Over Cable Service Interface Specification
`(DOCSIS), which sefs standards for both two-way and coblesplusphone speci
`fications. See DOCSIS.
`Internet cache protocolSee Cf.
`Internet call waiting Imagine you hove one phone line of your
`house, You're presently using that one line to surf the Internet. Someone calls
`you. You have installed call forwarding. Their incoming call gets forwarded to
`another phone line, which is onswered by a sewvice provider whois providing
`the Internet call waiting service. Their machine answers: “The number you
`called is presently surfing the Internet. Would you like to tell them you're
`calling? Do you have a message? Record now.” the machine picks up the
`incoming phone line from callerlD, records the message ond then sends an
`email fo you, soying this phone numberis trying to reach you.And here's, their
`message.” It then plays the message.
`Internet Content Adaptation ProtocolSee ICAP
`Internet content providerICP. A company thot will design and
`deliver content for your Web site.
`Internet control message protocolICMP. An integral portof
`IP (Internet Protocol), ICMP iso mechanism by which IP softwore on a host oF
`goteway can communicate with its peers on other machines to report errors ancl
`poss other information (e.g. time stamps) relevant to IP pocket processing. As
`specified in RFC-792,ICIAP also provides o number of diagnostic functions. One
`
`GOOG-PA-00001 190
`
`ipv4:Ineither event,the IP addresses ore translated, one to the other, through
`-g process of NAT (Network Address Translation), which is accomplished in an
`occess router. On the outbound side, your true IP addressis. fronsloted into an
`
`- Internet IP address associated with the router. Responses to your transmissions
`-qve oddressed to the router, which then translates them back into your tue IP
`addeess for successful delivery. This translation and mosking process secures
`and protects your identity. See NAT for a full explanation of this process. Sea
`‘so Subnet Mosk.
`See also strict source, loase source and record route.
`Internet appliance A sub-$500 machine specially designed for In-
`feinet browsing and first proposed in the late Fall of 1995 by Lory Elison,
`heod ofdatabase software company Oracle. Part ofits appeal to people outside
`Niccosoft ond Intel is thot the Inteinet Appliance would not have to be bosed on
`stondaid PC technology. It need have an Intel chip ond need not run Windows,
`This deviceis also called an Internet Terminal, o Network Computer ot an IPC,
`an Interpersonal computer. The original description of the Internet Appliance
`wos that it would come with 4mb of RAM, 4mbof flosh memory, processor,
`monitor, keyboord ond mouse—all for under $500.
`Internet Architecture Board The Intemet Architecture Boord
`BY is 0 technical advisory group of the Intemet Society. tts responsibilities
`-incide:
`@-1ESG Selection: The 1AB oppoints a new JETF choir and oll other IESG
`condidates, from a list provided by the IETF nominating committee.
`© Architectural Oversight: The IAB provides oversight of the architecture for
`the protocols ond procedures used by the Internet.
`© Stondards Process Oversight ond Appeol: The IAB provides oversight
`of the process used to create Intemet Standards. The IAB serves as an
`
`appeal board far complaintsof improper execution of the standards
`process.
`
`© RFC Series ond IANA: The IAB is responsible for editorial management
`and publication of the Request for Comments (RFC) document series,
`
`ond for administration of the various Internet assigned numbers.
`
`© External Lioison: The IAB acts os representative of the interests of the In-
`temet Society in livison relationships with other organizations concerned
`
`with stondards ond other technical and organizational issues relevant to
`the world-wide Internet.
`
`© Advice to ISOC: The IAB acts as a source of advice ond guidance fo the
`Board of Trustees ond Officers of the Internet Society concerning techni-
`
`cal, architectural, procedural, and (where appropriate) policy matters
`pertaining fo the Internet ond its enabling technologies.
`
`Internet Assigned Numbers Authority IANA. This group
`istesponsible for the assignment of unique Internet parameters (e.g. TCP port
`Humbers, and ARP hardwore types), ond manoging domain names. It also
`Ws responsible for administration and ossignment of IP (Internet Protocol)
`
`‘Numbers within the geographic oreos of North America, South America, the
`Coibbeon and sub-Saharan Aftica; on December 22, 1997, thot responsibility
`Wos shifted to ARIN (American Registryfor Internet Numbers). wiww.orin.net.
`
`The IANA has well-established working relationships with the US Government,
`
`the Internet Society (ISOC), and the IntertlIC. SOC provides coordination of
`A ‘activities with the Intemet Engineering Tosk Force (IETF) through the
`
`‘lotticipation of IANA in the Internet Architecture Boord (IAB). IANA responsibil
`ity Was assigned by DARPA (Defense Advanced Research Project Agency) to
`the Informotion Sciences Institute (ISI) of the University of Southern Colifor-
`
`: - IS\ hosdiscretionary authority to delegate portions of its functions to an
`Meme Registry (IR), previously performed by SRI International and currently
`
`-Patformed by Network Solutions Inc. (NSI), o subsidiary of SAIC. Beginning
`Motch 1998, that function is shared with the Council of Registrars (CORE).
`NORE contracted (November 1997) with Emergent Corporation to build ond
`Serote the new Internet Name Shoted Registry System (SRS), which is a
`
`Neutral, shared database repository that coordinates registrations from CORE
`
`n Plopagotes those names to the global Internet Domoin Name System
`NS). wwnw.isi.edu/div7/iona/ See also ARIN, CORE, DNS, Internet, In
`SINIC, ond SRS.
`
`GOOG-PA-00001190
`
`
`
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 6 of 8
`:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 6 of 8
`634 | IOR « IP datagram
`
`based notfor-profit organization which works with industry, academia, and
`government on nationa-evel initiatives ininformation jechnology, will host the
`intial operations of 1OPS.ORG. “IOPS.ORGwill play a key role in the healthy
`technical and operational evolution of the Internet as an increasingly important
`component of the economy,” said CNRI President Robert Kahn. www.iops.org.
`IOR 1. Index of Refraction. The ratio of ight velocity in a vacuum to its veloc:
`ity in-a given transmission rmedium, such os an optical fiber.
`2. Indian Ocean Region. See acean region.
`10S1.105 is the operating systemfor Apple's iPhone, iPod touch, ond iPad. If
`used to be colled the iPhone OS but it was renamed i05 in June 2010. 105 is
`based on Apple’s Mac OS X operating system.
`2.Internetwork Operating System from Cisco. This operoting system runs the
`vost mojority of routers now deployed in the core ofthe Internet. The 105 operat:
`ing system is now being replaced by the newer 10S XR. See also Junos Code,
`2. See 150.
`10S XRSee10S.
`LOTA loto, written as i or sometimes | in electrical engineering is the square
`root of -1. The concept of iota wasintroduced by Leonhard Euler, Swiss Math-
`ematician. The important property of i (or j) is that it mops any kind ofdif
`ferential, whether application in differential amplifier of differential dense wave
`multiplexing or diffetentiol time division moliplexing. To understand i (or j)
`more deeply, one has to atempt a conjecture of number theory......0 simply
`‘apply intuition,
`TOTA DMI |P-bosed overthe-air device management. See also 1OTA,
`TOTP See Internet Open Trading Protacol.
`IP 1. The Internet Protocol. IPis the most important ofthe software pratocals
`on which the Internet is based, The IP Pratocal keeps track of the Internet's ad
`dresses for different nodes, routes outgoing messages, and recognizes incom-
`ing messages.It ollows o packef fo traverse multiple networks on the wayto its
`final destination. It was originally developed by the Department of Defense to
`support interworking of dissimilar computers across a network, While its roots
`ate in the ARPAnet development,
`IP was first stondardized in RFC 791, pub
`lished in 1981, and updated in RFC 1349. This protocol works in conjunction
`with TCP. (Transmission Control Protocol) and is usually identified os TCP/IP. It
`is-0 connectionless protocol that operates at the netwark layer (layer 3) ofthe
`OSI model, See IP Address,IPv4, \Pv5, IPv6,the Internet, and TAPI 3.0.
`4. Intelligent Peripheral. A device in on IN (Intelligent Network) or AIN
`(Advanced IN)
`thot provides copabilities such os voice announcements, voice
`recognition, voice printing ond help guidance. By way of example, MCI's
`1-B00-COLLECT makes use of IPs, which ore specialized voice processing sys-
`tems. The IP prompts the caller to enter the target telephone number ond
`speak his or her nome. The system then instructs the network to connect the
`call, Bosed on o spoken acceptance of the call by the called party, the system
`authorizes call completion.
`3. Information Provider. A customer that offers recorded information on its
`listed numbers.
`4,Intellectual Property. A legal term that refers to originalcreative work
`(a book, 0 movie, software code, etc,) manifested in a tangible form that con
`be legally protected, for example, by 0 potent, trademark, or copyright,
`5,Illustrative Paragraph. A term dictionary writers (olso called lexicogar-
`phers) use to explain the meaning ofa term. Often they use their friends.
`IP AddressSeeInternet Address.
`IP Address Confirmation Also called |P Confirmation. Here’s how
`it works. In order to send electronic mail over the Internet, you need whot's
`called a SMTP (Simple Moil Tonsfer Protacol) serves, a specialized computer to
`send your moil. fyou haveyour own domain nome, like www.technologyinves:
`tor.com, then it’s eosy to set up your own mail server. Most of us, however,
`don’t. We need to use someone else’. In the good old days you could pretty
`well anyone's SMIP server. Simply tell your emeil cient. These days many
`awners of SHIP mail servers got unhoppy with people using their servers to
`spam (i.e.send zillions of unvanted email). So they set up o system to check
`the IP address from where you were coming before they allowed your email
`through.
`If your IP Address wos one of the company’s addresses, 8.9. one
`
`you'd been assigned temporarily while yau were on line, then they let yoy,
`email through. If it wasn’t, your email would be stopped. This process is calla
`IP Address Confirmation.
`IP Address Mask Internet Protocol address mask. A ronge of IP g¢.
`dresses defined so that only machines with IP oddresses within the range gy,
`allowed access to on Internet service. To mask o portion of the IP address
`replace it with the osterisk wild cord character ("), For example, 192,44.* «
`represents every computer on the Internet with on IP address beginning With
`192.44. See IP Addressing.
`IP address managementIPAIA. The ollocation, deallocation
`documentation, ond auditing of IP addresses so os to support IP address moves,
`adds, ond changes. The documentation portion of IPAM involves storing fot
`each IP address the following information: IP subnet and mask, owner ong
`contact information, subnet porent, subnet location, subnet description, ang
`subnet function, IPAM also involves developing and maintoining on IP address
`plan to model IP address ond subnet assignments. When completed, the ip
`address plan quides IPAM activifies.
`IP addressing A networking term. IP (Internet Protocol) addressingis g
`systein for ossigning numbers to network subdivisions, domains, and nodes jp
`TCP/IP networks. IP addresses ore figured as 32-bit (fourbyte) numbers, The
`high bytes constitute the “Class A” ond “Class B” portions of the address, which
`denote network and subnetwork. The low bytes ("Class C” address segments)
`identify unique nodes—individuol machines or (in ihe case of multiaddress.
`ing) individual node processes. The Class C address segment (two bytes) con
`represent 65,536 unique values—enought so that in most conventional TCP/
`IP LANs, sufficient volues are available to afford each machine its own “fixed”
`IP address.In public internet-access, however, the number of fixed addresses
`avoilable to 0 provider may not be sufficient to provide each dialup client with
`a permanent IP address. In such scenarios, avilable Class C addresses con
`be assigned dynamically, os machines log into network access ports—on the
`presumption thot no more than N clients will attempt to log on, simultaneously
`(where N denotes the number of obsolute addressesin the pool). Thus:
`Eiyed” ot “Static” IP address: a fourbyte TCP/IP network address par
`manently assigned to an individual machine or account.
`“Qynamicallyassigned” IP address: a fourbyte TCP/IP network addiess
`assigned to a machine or account for the duration of o single session,
`IP call centerA call center that uses Internet Protocol
`(IP) telephony
`instead of traditional time-division multiplexing (TOM) telephony for call center
`telephoneoperations. See TDM.
`IP Centrex An IP (Internet Protocol) telephony service wherein Centrex
`sarvice is offered ta 0 customer over o broadband connection between the
`telephone company’s central office and the customer premises. Voice hati
`ver the broadband link is carried os packetized voice,ie. VolP (voice over
`IP), The central office has either 0 softswitch that switches VolP traffic notively,
`orit has a traditional closs 5 end office switch that connects fo 0 carrier rode
`media gatewoy (sometimes called o trunking gateway) that hondles the VolF
`traffic to and from the customer ond does the protocol conversions necessary 10 '
`exchonge IP traffic with the class 5 switch. The customer has its own IP com
`
`munications systemwhich sends VoIP troffic to the CO over the broadband oc
`cess line. If the customerhas traditional anolog telephones onits premisesand
`
`wants to use them withIP Centrex, then it will need its own analog telephone
`adapters (ATA) or media gateway to cory tratfic to/from those phones vid
`the broadband link. There are a voriety of equipment, fine, and LAN scennigs
`
`on the customer side: the main thing i thot the customer will need to send
`receive pocketized voice on the broadband link to the CO (central office). 528
`class 5 office, softswitch, Vol.
`IP communications Dato, yoice and video communications ove!®
`single, converged IP network.
`IP Confirmation Also called IP Addiess Confirmotion, See [P Address
`
`Confirmation.
`:
`IP datagram The fundamental unit of information possed acshe
`Internet. Contains source ond destination addresses along with dota ond.d
`number of fields which define such things as the length of the datagram, the
`
`GOOG-PA-00001191
`
`!
`
`GOOG-PA-00001191
`
`
`
`Case 6:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 7 of 8
`}:21-cv-00569-ADA Document 25-2 Filed 12/16/21 Page 7 of 8
`796 | network address * network balancing
`
`network address Every node—computer, PDA, iPhone—on on
`Ethernet network has ot lenst two addresses associated with it. One is called a
`MAC (Media Access Control) address. It’s a fixed hordwore address such as “ae
`34-2¢1d-69-41" ondit’s assigned by the device’s manufacturer, It’s the unique
`number assigned to the network adapter inside your computer or gadget. No
`one else con have your number, Additionally,on oll Ethemet networks, there's
`on IP (Internet Protocol) address. That address is typically assigned to your
`device on the fly by o router connected to the Intemet. Think of this address
`which looks like this—192.168.10.108—vs your postal address. It enables
`the postal service (i.e. the Intemet) to find you. Without your IP address you
`wouldn't be able to receive email or surf the Intemet. There are hwo ways you
`acquire on IP address when you attempt to log into the Internet. Your (SP (In-
`ternet Service Provider) con assign you one, This is culled dynamic assignment.
`Thereis alsa o static IP address. Essentially you choose the IP Address you
`want, You organize this thus. You have a router ot your homeor office, It-con-
`nects to the Internet. Your rowler gets its IP address from your ISP. But then it
`hos softwore inside which translates thot IP Address to the addresses demanded
`by the computers attached to it. Choosing between dynamic ond static is done
`in the software in your computer. It’s easier to select dynamic—letthe Internet
`do oll the work. Thot’s called DHCP—Dynomic Host Configuration Protocol.
`See HOW TO SET UP AHOME OR SIMALL OFFICE NETWORK in the Introduction
`ond Internet address,
`network address translation NAT. Network Address Tronslo-
`tion. A Cisco version of Port Address Translation (PAT), NAT enables o local area
`network (LAN) to use one set of IP addresses for internal traffic and a second
`set of addresses for external traffic, This allows 0 company to shield internal
`addresses from the public Intemet. According to Cisco, NAT has several applica-
`tions. You wont to connect to the Internet, but not all your hosts have globally
`unique |P addresses, NAT enables privote IP internetworks (i.e. Intranets) thot
`use nonregistered IP addresses to connect to the Internet, or another public IP-
`bosed network, NAT is configured on the router ot the border of a stub domain
`(referred to as the inside network) ond o public network such os the Internet
`(referred to 0s the outside network). NAT tronslotes the internal locol addresses
`to globally unique IP addresses before sending pockets to the outside network.
`You must change your internal addresses. Instead of changing them, which can
`be o considerable amount of work, you con translate them by using NAT. You
`wantfo do basic lood sharing of TCP traffic. You con map o single global IP
`address to many local IP addressesby using the TCP load distribution feature, As
`a solution to the connectivity problem, NATis practical only when relatively few
`hosts in a stub domain communicate outside of the doniain at the same time.
`When this is the cose, only a small subset of the IP addresses in the domain
`must be translated into globally unique IP addresses when outside communica-
`tion is necessary, and these addresses con be reused when no longer in use.
`A significant advantage of NAT, according to Cisco, is that it con be con-
`figured without requiring changes to hosts or routers other than those few
`routers on which NAT will be configured. NAT may not be practicel if large
`numbers of hosts in the stub domoin communicofe outside of the domain.
`Furthermore, some applications use embedded IP addresses in such o woy
`thot it is impractical foro NAT device to translate. These applications may not
`work transparently or at all through o NAT device. NAT also hides the identity
`of hosts, which may be an advantage or a disadvantage. A router configured
`with NAT will hove ot leost one interfoce to the inside ond one to the outside,
`Ino typical environment, NAT is configured at the exit router between a stub
`domain and backbone. When a pocketis leaving the domain, NAT translates the
`locally significant source address into a globally unique address. When o pac