`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 1 of 7
`
`
`
`
`
`EXHIBIT C
`EXHIBIT C
`
`
`
`
`
`
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 2 of 7
`
`WEBSTER’S
`
`Telecom Dictionary
`
`Ray Horak
`
`BICENTENNIAL
`
`BICENTENNIAL
`
`Wiley Publishing,Inc.
`
`GOOG-PA-00001200
`
`GOOG-PA-00001200
`
`
`
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 3 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 3 of 7
`
`Webster’s New World® Telecom Dictionary
`
`Published by
`Wiley Publishing, Inc.
`10475 Crosspoint Boulevard
`Indianapolis, IN 46256
`www,wiley,com
`
`Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana
`
`Published simultaneously i Canada
`ISBN; 978-0-471-77457-0
`
`Manufactured in the United States of America
`
`10987654321
`
`Library of Congress Cataloging-in-Publication Data
`
`Horak, Ray.
`Webster’s New World telecom dictionary / Ray Horak.
`p.m.
`ISBN 978-0-471-77457-0 (pbk.)
`1. Telecommunication—Dictionaries.
`TK5102.H65 2007
`621.38203—dce22
`
`[. Title.
`
`2007024232
`
`Nopart of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
`electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of
`the 1976 United States Copyright Act, without either the prior written permission ofthe Publisher, or authorization through
`payment ofthe appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,
`(978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department,
`Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at
`hetp://www.wiley.com/go/permissions.
`
`Limit of Liability/Disclaimer ofWarranty: The publisher and the author make no representations or warranties with respect
`to the accuracy or completeness of the contents of this work andspecifically disclaimall warranties, including without
`limitation warranties offitness for a particular purpose. No warranty may be created or extended bysales or promo-
`tional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold
`with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.If
`professional assistance is required, the services of a competent professional person should be sought. Neither the publisher
`nor the authorshall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this
`work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses
`the information the organization or Website may provide or recommendations it may make. Further, readers should be
`aware that Internet Websites listed in this work may have changed or disappeared between whenthis work was written
`and when it is read.
`
`For general information on our other products andservices please contact our Customer Care Department within the
`United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
`
`Trademarks: Wiley, the Wiley logo, Webster’s New World, the Webster’s New World logo, We Define Your World, and
`related trade dress are trademarks or registered trademarks ofJohn Wiley & Sons, Inc. and/or its affiliates, in the United
`States and other countries, and may not be used without written permission, All other trademarks are the property of
`their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
`
`Wileyalso publishes its books in a variety of electronic formats. Some content that appears in print may not beavailable
`in electronic books.
`
`GOOG-PA-00001201
`
`GOOG-PA-00001201
`
`
`
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 4 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 4 of 7
`IOR (Index Of Refraction)
`250
`
`It is extremely important to know the IOR ofa givencable in order to calculate latency, i.e., the delay
`imposed onthe signal, from end-to-end, by the medium. Latency has significant impact on the synchro-
`mization of transmitters, repeaters, multiplexers, and other active devices in a digital transmission system,
`and particularly in a high speed system such as a FOTSthatruns at signaling speeds up to 40 Gbps.
`The IORalso has considerable impact on the physical constructionof a glass optical fiber, which con-
`sists of an inner core surrounded by one or morelayers ofcladding. The optical signal is intended to travel
`throughthe inner core, and the cladding serves in various ways to ensure that happens. Step-index fiberis
`characterized by a sharp decrease in the [OR between the core and cladding,i.e., the cladding is sharply
`lower in TOR than the core material. This sharp step of approximately one percent in IOP. at
`the
`core/cladding interface causes any errant light rays to reflect back into the core in a phenomenon known
`as total internalreflection. Graded-index fiber is characterized by a gradual decrease in the refractive index
`of the cladding through a great many layers of glass. The approach causes the errant light rays to gradually
`gain in velocity and bend back towards the core. Step-index construction is used largely in single-mode
`fiber (SMF) and graded-index in multimode fiber (MMF). Seealso core, cladding, graded-indexfiber, latency,
`MMF, SMF,step-indexfiber, and Vp.
`
`In the advanced intelligent network (AIN) architecture, a separate com-
`IP (Intelligent Peripheral)
`puting device that enhancesthe delivery of certain services by offloading processing demands froma serv-
`ice control point (SCP) and providing a basic set of services to the SCP. The role of the IP typically
`includes collection of digits, collection and playing of voice prompts, collection of voice responses and
`their conversion to digits, menu services, and database lookups. As examples, voice processing and voice
`recognition can be implemented on an IP in supportofthe processing ofcollect calls. Because the abbre-
`viation IP is used so extensively to identify the Internet Protocol, the term special resource function (SKF)
`often is used to describe these peripherals and the functions they perform. See also AINand SCP.
`
`In the context of the OSI Reference Model, a Network Layer (Layer 3) con-
`IP (Internet Protocol)
`nectionless protocol for the routing of datagrams through gateways connecting networks and subnetworks,
`[Pv4, the first version to be deployed,is defined in IETF RFC 791 and is the basic block ofthe Internet.
`IP can be characterized as datagram-oriented because each [P packet works its way through the network
`independently, with no thoughtof an individual packet belonging to a larger streamofpackets. IP also can
`be characterized as a best effort protocol, as it offers no guarantees ofdelivery, no sequencing, and no error
`detection and correction mechanism. IP provides for packet segmentation and reassembly and provides
`specific addressing conventionsin the formof dotted decimal notation. IP supports routing control, as well
`as status translation and communications. Although IP has no conceptof the specific content of the packet
`orofits service requirements, it supports multiple service types, including low-delay, high-bandwidth, and
`high-reliability paths. Dial-up IP access protocols include Ethernet over Point-to-Point Protocol (Enet
`over PPP) Serial Line Internet Protocol (SLIP), and Point-to-Point Protocol (PPP).There are two versions
`of IP. The legacy version is [Pv4, which is widely deployed. The most current version is IPv6, which is
`deployed sparingly, largely due to the fact that it is not compatible with olderrouters. Although [P can be
`used on a standalone basis, it more typically is used in conjunction with higher layer protocols in the
`TCP/IP protocolsuite. See also bandwidth, best effort, connectionless, datagram, dial-up access, dotted decimal nota-
`tion, IETF, [Pv4, [Pv6, gateway, Internet, network, Network Layer, OSI Reference Model, packet, PPP, protocol,
`router, segmentation, SLIP, and TCP/IP protocol suite,
`
`IP address (Internet Protocol address) A binary numberthat uniquely identifies a host computer
`connected to the Internet, The IP packet header provides an originating address field so that a host can
`identify itself as the originator of a packet. The IP packet header also provides a destination address field
`so that an originating host can identity the target host for which a packet is intended. Based on that infor-
`mation, the Internet routers can act to deliver the packet to the target host, which can respond to the orig-
`inating host, as appropriate. All IP addresses are written in dotted decimal notation. An [Pv4 address, for
`example, comprises 4 fields separated by dots and expressed as xxx.xxx.xxx.xxx, with each field given a
`
`GOOG-PA-00001 202
`
`GOOG-PA-00001202
`
`
`
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 5 of 7
`
`251
`
`IP-enabled PBX(Internet Protocol-enabled Private Branch eXchange)
`
`value in decimal notation of0-255, the range expressed by a single octet in binary notation. See also binary,
`hinary notation, computer, dotted decimal notation, header, host, Internet, [Pv4 address, [Pv6 address, octet, and packet.
`IPBX (Internet Protocol Private Branch eXchange) Synonymous with IP PBX. A pure [PBX is
`based onaclient/server architecture that generally is implemented on a switched Ethernet LANplatform
`running at 100 Mbps or more in support ofVoIP. Client software residing onintelligent IP hardphones
`andsoftphones runs against one or more servers that can be distributed across an enterprise, perhaps in
`geographically diverse locations connected over the public Internetor, preferably, a private [P-based net-
`work. One or more telephonyservers are responsible for all call control functions(e.g., call setup and tear-
`down), telephony applications (e.g., feature content andclass of service (CoS) assignments), andassociated
`databases (e.g., IP and station numbering schemes and assignments, and directory information). Although
`the switched Ethernet LAN infrastructure is shared between voice and data, and perhaps video, each IP
`phone has a dedicated physical port on an Ethernet switch in order to minimize anyissues of congestion
`at the port level, Further, VoIP generally runs in a logical virtual LAN (VLAN)partition to maintain an
`acceptable level of quality of service (QoS).A digital signal processor (DSP) embedded in each IP phone
`digitizes the analog voice signals in pulse code modulation (PCM) format and may compress the resulting
`voice data. Application software then forms VoIP packets, which are then inserted into Ethernet frames,
`andpresented to the switch.
`There are several hybrid IPBX approaches that allow a user organization variously to maximize the
`embeddedinvestmentin conventional TDM-based PBX equipment and ease into a pure IPBX mode. An
`IP-enabled PBX is a conventional TDM PBXcircuit switch platform with a VoIP module. A hybrid
`TDM/IP PBX has both TDM and IP components co-existing, side by side. The TDM component com-
`prises TDM line and trunk cards and ports and a TDM bus.The IP component comprises Ethernetports,
`an Ethernet switch, a router, and IP trunk ports. A gateway interconnects the TDM and IP components,
`both of whichare underthe control of a telephony server running a commercial operating system (OS).
`See also client/server, CoS, DSP, Ethernet,gateway, IP, IP Centrex, IP-enabled PBX, LAN, PCM, QoS, VLAN,
`and VoIP.
`
`IP Captioned Telephone Service A hybrid Telecommunications Relay Service (TRS) that involves a
`special telephone witha text display. Rather than using TTY or computer technology for text entry, the
`called partys speech is re-voiced by the communications assistant (CA), converted into text by a voice
`recognition system, and transmitted directly to the hearing-impaired callers display telephone over the
`Internet.The CA cansimultaneouslylisten to one party and read the text of the otherparty. See also Inter-
`net, TRS, TTY, and voice recognition.
`IP Centrex Synonymous with hosted PBX and virtual Centrex. Centrex service provided froma net-
`work-based carrier-class IPBX platform to which the user organization connects over the public Internet
`or a private IP network as though it were a remote Centrex central office (CO). See also carrier-class, Cen-
`trex, Internet, and [PBX.
`IP-enabled Frame Relay Also known as Private [P.A frame relay variant that employs virtual routers
`to route frames at the Network Layer of the OSI Reference Model. [P-enabled Frame Relay typically
`makes use of MultiProtocol Label Switching (MPLS) to speed frame processing and support quality of
`service (QoS). See alsoframerelay, IP,MPLS, Network Layer, OSI Reference Model, QoS, androuter.
`IP-enabled PBX (Internet Protocol-enabled Private Branch eXchange) A PBX that couples
`VoIP (Voice over Internet Protocol) onto a conventional PBX based on time division multiplexing
`(TDM). The intelligent IP phones can take the form ofeither hardphones or softphones that connect
`either over a switched Ethernet LAN. The LAN-attached data terminals interconnect as usual. The IP
`phones connect to the PBX through an Ethernet port ona line card that includes an IP gateway that
`resolves the interface issues between the TDM bus andthe switched Ethernet LAN that supports VoIP.
`Calls between the LAN-attached IP phonesare conducted on a peer-to-peer basis using their LAN
`
`GOOG-PA-00001203
`
`GOOG-PA-00001203
`
`
`
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 6 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 6 of 7
`upgrade
`
`512
`
`upgrade A new, enhanced, or more powerful version or release of a product. A software upgrade gen-
`erally is denoted by a new version number, such as 7.0 as an upgrade to 6.0), See also bug, bugfix, patch, and
`update.
`
`1. 'The microwave radio link from theterrestrial transmit antenna tothesatellite. See also down-
`uplink
`link. 2. Ia cellular network,the radiolink from the mobile station (MS) to the base station (BS). See also
`downlink.
`
`upload Totransfer a file copy from a local computer to a remote computer over a network. See also
`dounload,
`
`A Microsoft initiative that extends the PnP specification to networks.
`UPnP (Universal Plug and Play)
`UPnPenables a PC to automatically recognize the presence of a newperipheral hardware device as it
`is connected to a network, locate the necessary support software(e.g., driver), and configure the device
`interface. UPnPis aimed primarily at home and small office users who need to network devices such as
`personal digital assistants (PDAs) and digital cameras. See also PuP.
`
`UPS (Uninterruptible Power Supply) A device or system that provides electrical power without
`interruption in the event that commercial power drops to an unacceptable voltage level. A UPS comprises
`circuitry and batteries that may provide power just long enough to shut down a computeror othersystem
`gracefully, without loss of data, or perhaps for many hours of normal operation in the event of a cata-
`strophic commercial powerfailure. A typical UPS system operates in a hot standby, or offline, mode, contin-
`uously charging its batteries from a commercial power source and constantly prepared to assume
`responsibility within a few milliseconds for powering the client system. A more expensive online UPS
`actively filters commercial power, running it through the battery packs and an inverter, smoothing out the
`electrical waveforms and correcting for any power spikes and dips. See also inverter and waveforni.
`
`upstream Thesignal direction from the customer premises to the network edge. See also downstream.
`
`uptime The time during which a machineor systemis functioning properly. See also downtime,
`
`URI (Uniform Resource Identifier)
`
`See URL.
`
`<A type of uniform resource identifier (URI) that consists ofa
`URL (Uniform Resource Locator)
`uniform address that both identifies an abstract or physical resource on the World Wide Web (WWW) and
`indicates howto locate it. As specified in IETF RFC 3986, the syntax follows a standard convention:
`
`scheme://authority/path?query#tragment
`
`Consider the example:
`
`http://info.cern.ch/hypertext/WWW/MarkUp/MarkUp.html
`
`where http = hypertext transport protocol and html = hypertext markup language.
`The method, or scheme name, indicates the network protocol used to assign identifiers. Examples of
`schemes includethe following:
`
`* http: Hypertext Transfer Protocol (HTTP)
`
`* https: Hypertext Transfer Protocol (HTTP) over Secure Sockets Layer (SSL)
`
`*
`
`ftp: File Transfer Protocol (FTP)
`
`* news: Usenet newsgroups
`
`* Telnet: Telecommunications Network protocol (TELNET)
`
`GOOG-PA-00001204
`
`GOOG-PA-00001204
`
`
`
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 7 of 7
`
`513
`
`USDC(United States Digital Cellular)
`
`Theauthority is preceded by a double slash (//) and is terminated by the nextslash (/), question mark
`(2), or numbersign (#), or the end of the URL. The authority can contain user information followed by a
`commercial at sign (e.g., ray@) and host informationin the formofan Internet Protocol(IP) address(e.g.,
`IPv4 dotted decimal notation) or registered domain name(e.g., contextcorporation.com). The authority
`also may contain an optional port number, whichis unnecessary if the numberis the same as the scheme’s
`default (e.g., 80 would be redundant withhttp).
`The path componentcontains data, usually organized in a hierarchical form that serves to identify a
`resource within the scope of the URIs scheme and naming authority. Within the path,a slash (/) is used
`as a delimiter between components.Thepathis terminated by thefirst question mark (?), numbersign (#),
`or the end of the URL.
`The query component contains non-hierarchical data that, along with data in the hierarchical path
`component,servesto identify a resource within the scope of the URIs scheme and naming authority.
`The fragment componentallows the indirect identification of a secondary resource that may be some
`portion or subset ofthe primary resource, some viewsor representations ofthe primary resource, or some
`other resource defined or described by those representations. See also domain name, dotted decimal notation,
`HTML, HTTP, IETF,IP, IPaddress, [Pv4, port, protocol, SSL, TELNET, and WWW.
`USAC (Universal Service Administrative Company) A subsidiary of the National Exchange Car-
`rier Association (NECA), USAC administers programs that provide support for incumbentlocal exchange
`carriers (ILECs) companies in high-cost areas, assistance for low-incomesubscribers, discounts for telecom-
`munications service to schools andlibraries, and discounts to rural health care providers. USAC accepts
`funds collected by the [LECsandthe interexchange carriers (IXCs) and distributes designated fundsin sup-
`port of the following programs andorganizations set up under the Telecommunications Act of 1996:
`* Schools and Libraries Program: Also known as the E-rate Program. Administered by the Schools
`and Libraries Corporation (SLC) to make telecommunicationsservice, Internet access, and internal
`connections affordable for eligible schools and libraries.
`* Rural and High Cost Program: Subsidizes basic telephone service in high-cost areas ofthe
`United States and its territories,
`
`* Rural Health Care Program: Administered by the Rural Health Care Corporation (RHC) to
`subsidize telecommunications andInternet service for eligible rural health care providers in high-
`cost areas.
`
`* Low Income Program: Lifeline subsidies to reduce the installation and monthly costs ofbasic
`telephone service for low-income consumers.
`See also ILEC, IXC, LEC, Telecommunications Act of 1996, universal service, and USF.
`USB (Universal Serial Bus) A serial bus with a data transfer rate of 12 Mbps for connecting a micro-
`computerto peripherals such as keyboards, mice,printers, and digital cameras through a single, general pur-
`pose port. USB isa considerable improvement over the RS-232 interface, but does not compare favorably
`with IEEE 1394,also knownas FireWire in the Apple computer domain. See also 1394, bus, FireWire,
`IEEE, microcomputer, peripheral, port, RS-232, and sertal.
`US-CERT (United States Computer Emergency Readiness Team) A team within the Depart-
`ment of Homeland Security charged with protecting the nation’s Internetinfrastructure by coordinating
`defense against and response from cyberattacks. See also CERT, cyberspace, and Internet.
`USDC (United States Digital Cellular) A digital cellular radio standard better knownas Digital
`Advanced Mobile Phone Service (D-AMPS). See D-AMPS.
`
`GOOG-PA-00001205
`
`GOOG-PA-00001205
`
`