throbber
Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 1 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 1 of 7
`
`
`
`
`
`EXHIBIT C
`EXHIBIT C
`
`
`
`
`

`

`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 2 of 7
`
`WEBSTER’S
`
`Telecom Dictionary
`
`Ray Horak
`
`BICENTENNIAL
`
`BICENTENNIAL
`
`Wiley Publishing,Inc.
`
`GOOG-PA-00001200
`
`GOOG-PA-00001200
`
`

`

`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 3 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 3 of 7
`
`Webster’s New World® Telecom Dictionary
`
`Published by
`Wiley Publishing, Inc.
`10475 Crosspoint Boulevard
`Indianapolis, IN 46256
`www,wiley,com
`
`Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana
`
`Published simultaneously i Canada
`ISBN; 978-0-471-77457-0
`
`Manufactured in the United States of America
`
`10987654321
`
`Library of Congress Cataloging-in-Publication Data
`
`Horak, Ray.
`Webster’s New World telecom dictionary / Ray Horak.
`p.m.
`ISBN 978-0-471-77457-0 (pbk.)
`1. Telecommunication—Dictionaries.
`TK5102.H65 2007
`621.38203—dce22
`
`[. Title.
`
`2007024232
`
`Nopart of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
`electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of
`the 1976 United States Copyright Act, without either the prior written permission ofthe Publisher, or authorization through
`payment ofthe appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923,
`(978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department,
`Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at
`hetp://www.wiley.com/go/permissions.
`
`Limit of Liability/Disclaimer ofWarranty: The publisher and the author make no representations or warranties with respect
`to the accuracy or completeness of the contents of this work andspecifically disclaimall warranties, including without
`limitation warranties offitness for a particular purpose. No warranty may be created or extended bysales or promo-
`tional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold
`with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.If
`professional assistance is required, the services of a competent professional person should be sought. Neither the publisher
`nor the authorshall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this
`work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses
`the information the organization or Website may provide or recommendations it may make. Further, readers should be
`aware that Internet Websites listed in this work may have changed or disappeared between whenthis work was written
`and when it is read.
`
`For general information on our other products andservices please contact our Customer Care Department within the
`United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
`
`Trademarks: Wiley, the Wiley logo, Webster’s New World, the Webster’s New World logo, We Define Your World, and
`related trade dress are trademarks or registered trademarks ofJohn Wiley & Sons, Inc. and/or its affiliates, in the United
`States and other countries, and may not be used without written permission, All other trademarks are the property of
`their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
`
`Wileyalso publishes its books in a variety of electronic formats. Some content that appears in print may not beavailable
`in electronic books.
`
`GOOG-PA-00001201
`
`GOOG-PA-00001201
`
`

`

`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 4 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 4 of 7
`IOR (Index Of Refraction)
`250
`
`It is extremely important to know the IOR ofa givencable in order to calculate latency, i.e., the delay
`imposed onthe signal, from end-to-end, by the medium. Latency has significant impact on the synchro-
`mization of transmitters, repeaters, multiplexers, and other active devices in a digital transmission system,
`and particularly in a high speed system such as a FOTSthatruns at signaling speeds up to 40 Gbps.
`The IORalso has considerable impact on the physical constructionof a glass optical fiber, which con-
`sists of an inner core surrounded by one or morelayers ofcladding. The optical signal is intended to travel
`throughthe inner core, and the cladding serves in various ways to ensure that happens. Step-index fiberis
`characterized by a sharp decrease in the [OR between the core and cladding,i.e., the cladding is sharply
`lower in TOR than the core material. This sharp step of approximately one percent in IOP. at
`the
`core/cladding interface causes any errant light rays to reflect back into the core in a phenomenon known
`as total internalreflection. Graded-index fiber is characterized by a gradual decrease in the refractive index
`of the cladding through a great many layers of glass. The approach causes the errant light rays to gradually
`gain in velocity and bend back towards the core. Step-index construction is used largely in single-mode
`fiber (SMF) and graded-index in multimode fiber (MMF). Seealso core, cladding, graded-indexfiber, latency,
`MMF, SMF,step-indexfiber, and Vp.
`
`In the advanced intelligent network (AIN) architecture, a separate com-
`IP (Intelligent Peripheral)
`puting device that enhancesthe delivery of certain services by offloading processing demands froma serv-
`ice control point (SCP) and providing a basic set of services to the SCP. The role of the IP typically
`includes collection of digits, collection and playing of voice prompts, collection of voice responses and
`their conversion to digits, menu services, and database lookups. As examples, voice processing and voice
`recognition can be implemented on an IP in supportofthe processing ofcollect calls. Because the abbre-
`viation IP is used so extensively to identify the Internet Protocol, the term special resource function (SKF)
`often is used to describe these peripherals and the functions they perform. See also AINand SCP.
`
`In the context of the OSI Reference Model, a Network Layer (Layer 3) con-
`IP (Internet Protocol)
`nectionless protocol for the routing of datagrams through gateways connecting networks and subnetworks,
`[Pv4, the first version to be deployed,is defined in IETF RFC 791 and is the basic block ofthe Internet.
`IP can be characterized as datagram-oriented because each [P packet works its way through the network
`independently, with no thoughtof an individual packet belonging to a larger streamofpackets. IP also can
`be characterized as a best effort protocol, as it offers no guarantees ofdelivery, no sequencing, and no error
`detection and correction mechanism. IP provides for packet segmentation and reassembly and provides
`specific addressing conventionsin the formof dotted decimal notation. IP supports routing control, as well
`as status translation and communications. Although IP has no conceptof the specific content of the packet
`orofits service requirements, it supports multiple service types, including low-delay, high-bandwidth, and
`high-reliability paths. Dial-up IP access protocols include Ethernet over Point-to-Point Protocol (Enet
`over PPP) Serial Line Internet Protocol (SLIP), and Point-to-Point Protocol (PPP).There are two versions
`of IP. The legacy version is [Pv4, which is widely deployed. The most current version is IPv6, which is
`deployed sparingly, largely due to the fact that it is not compatible with olderrouters. Although [P can be
`used on a standalone basis, it more typically is used in conjunction with higher layer protocols in the
`TCP/IP protocolsuite. See also bandwidth, best effort, connectionless, datagram, dial-up access, dotted decimal nota-
`tion, IETF, [Pv4, [Pv6, gateway, Internet, network, Network Layer, OSI Reference Model, packet, PPP, protocol,
`router, segmentation, SLIP, and TCP/IP protocol suite,
`
`IP address (Internet Protocol address) A binary numberthat uniquely identifies a host computer
`connected to the Internet, The IP packet header provides an originating address field so that a host can
`identify itself as the originator of a packet. The IP packet header also provides a destination address field
`so that an originating host can identity the target host for which a packet is intended. Based on that infor-
`mation, the Internet routers can act to deliver the packet to the target host, which can respond to the orig-
`inating host, as appropriate. All IP addresses are written in dotted decimal notation. An [Pv4 address, for
`example, comprises 4 fields separated by dots and expressed as xxx.xxx.xxx.xxx, with each field given a
`
`GOOG-PA-00001 202
`
`GOOG-PA-00001202
`
`

`

`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 5 of 7
`
`251
`
`IP-enabled PBX(Internet Protocol-enabled Private Branch eXchange)
`
`value in decimal notation of0-255, the range expressed by a single octet in binary notation. See also binary,
`hinary notation, computer, dotted decimal notation, header, host, Internet, [Pv4 address, [Pv6 address, octet, and packet.
`IPBX (Internet Protocol Private Branch eXchange) Synonymous with IP PBX. A pure [PBX is
`based onaclient/server architecture that generally is implemented on a switched Ethernet LANplatform
`running at 100 Mbps or more in support ofVoIP. Client software residing onintelligent IP hardphones
`andsoftphones runs against one or more servers that can be distributed across an enterprise, perhaps in
`geographically diverse locations connected over the public Internetor, preferably, a private [P-based net-
`work. One or more telephonyservers are responsible for all call control functions(e.g., call setup and tear-
`down), telephony applications (e.g., feature content andclass of service (CoS) assignments), andassociated
`databases (e.g., IP and station numbering schemes and assignments, and directory information). Although
`the switched Ethernet LAN infrastructure is shared between voice and data, and perhaps video, each IP
`phone has a dedicated physical port on an Ethernet switch in order to minimize anyissues of congestion
`at the port level, Further, VoIP generally runs in a logical virtual LAN (VLAN)partition to maintain an
`acceptable level of quality of service (QoS).A digital signal processor (DSP) embedded in each IP phone
`digitizes the analog voice signals in pulse code modulation (PCM) format and may compress the resulting
`voice data. Application software then forms VoIP packets, which are then inserted into Ethernet frames,
`andpresented to the switch.
`There are several hybrid IPBX approaches that allow a user organization variously to maximize the
`embeddedinvestmentin conventional TDM-based PBX equipment and ease into a pure IPBX mode. An
`IP-enabled PBX is a conventional TDM PBXcircuit switch platform with a VoIP module. A hybrid
`TDM/IP PBX has both TDM and IP components co-existing, side by side. The TDM component com-
`prises TDM line and trunk cards and ports and a TDM bus.The IP component comprises Ethernetports,
`an Ethernet switch, a router, and IP trunk ports. A gateway interconnects the TDM and IP components,
`both of whichare underthe control of a telephony server running a commercial operating system (OS).
`See also client/server, CoS, DSP, Ethernet,gateway, IP, IP Centrex, IP-enabled PBX, LAN, PCM, QoS, VLAN,
`and VoIP.
`
`IP Captioned Telephone Service A hybrid Telecommunications Relay Service (TRS) that involves a
`special telephone witha text display. Rather than using TTY or computer technology for text entry, the
`called partys speech is re-voiced by the communications assistant (CA), converted into text by a voice
`recognition system, and transmitted directly to the hearing-impaired callers display telephone over the
`Internet.The CA cansimultaneouslylisten to one party and read the text of the otherparty. See also Inter-
`net, TRS, TTY, and voice recognition.
`IP Centrex Synonymous with hosted PBX and virtual Centrex. Centrex service provided froma net-
`work-based carrier-class IPBX platform to which the user organization connects over the public Internet
`or a private IP network as though it were a remote Centrex central office (CO). See also carrier-class, Cen-
`trex, Internet, and [PBX.
`IP-enabled Frame Relay Also known as Private [P.A frame relay variant that employs virtual routers
`to route frames at the Network Layer of the OSI Reference Model. [P-enabled Frame Relay typically
`makes use of MultiProtocol Label Switching (MPLS) to speed frame processing and support quality of
`service (QoS). See alsoframerelay, IP,MPLS, Network Layer, OSI Reference Model, QoS, androuter.
`IP-enabled PBX (Internet Protocol-enabled Private Branch eXchange) A PBX that couples
`VoIP (Voice over Internet Protocol) onto a conventional PBX based on time division multiplexing
`(TDM). The intelligent IP phones can take the form ofeither hardphones or softphones that connect
`either over a switched Ethernet LAN. The LAN-attached data terminals interconnect as usual. The IP
`phones connect to the PBX through an Ethernet port ona line card that includes an IP gateway that
`resolves the interface issues between the TDM bus andthe switched Ethernet LAN that supports VoIP.
`Calls between the LAN-attached IP phonesare conducted on a peer-to-peer basis using their LAN
`
`GOOG-PA-00001203
`
`GOOG-PA-00001203
`
`

`

`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 6 of 7
`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 6 of 7
`upgrade
`
`512
`
`upgrade A new, enhanced, or more powerful version or release of a product. A software upgrade gen-
`erally is denoted by a new version number, such as 7.0 as an upgrade to 6.0), See also bug, bugfix, patch, and
`update.
`
`1. 'The microwave radio link from theterrestrial transmit antenna tothesatellite. See also down-
`uplink
`link. 2. Ia cellular network,the radiolink from the mobile station (MS) to the base station (BS). See also
`downlink.
`
`upload Totransfer a file copy from a local computer to a remote computer over a network. See also
`dounload,
`
`A Microsoft initiative that extends the PnP specification to networks.
`UPnP (Universal Plug and Play)
`UPnPenables a PC to automatically recognize the presence of a newperipheral hardware device as it
`is connected to a network, locate the necessary support software(e.g., driver), and configure the device
`interface. UPnPis aimed primarily at home and small office users who need to network devices such as
`personal digital assistants (PDAs) and digital cameras. See also PuP.
`
`UPS (Uninterruptible Power Supply) A device or system that provides electrical power without
`interruption in the event that commercial power drops to an unacceptable voltage level. A UPS comprises
`circuitry and batteries that may provide power just long enough to shut down a computeror othersystem
`gracefully, without loss of data, or perhaps for many hours of normal operation in the event of a cata-
`strophic commercial powerfailure. A typical UPS system operates in a hot standby, or offline, mode, contin-
`uously charging its batteries from a commercial power source and constantly prepared to assume
`responsibility within a few milliseconds for powering the client system. A more expensive online UPS
`actively filters commercial power, running it through the battery packs and an inverter, smoothing out the
`electrical waveforms and correcting for any power spikes and dips. See also inverter and waveforni.
`
`upstream Thesignal direction from the customer premises to the network edge. See also downstream.
`
`uptime The time during which a machineor systemis functioning properly. See also downtime,
`
`URI (Uniform Resource Identifier)
`
`See URL.
`
`<A type of uniform resource identifier (URI) that consists ofa
`URL (Uniform Resource Locator)
`uniform address that both identifies an abstract or physical resource on the World Wide Web (WWW) and
`indicates howto locate it. As specified in IETF RFC 3986, the syntax follows a standard convention:
`
`scheme://authority/path?query#tragment
`
`Consider the example:
`
`http://info.cern.ch/hypertext/WWW/MarkUp/MarkUp.html
`
`where http = hypertext transport protocol and html = hypertext markup language.
`The method, or scheme name, indicates the network protocol used to assign identifiers. Examples of
`schemes includethe following:
`
`* http: Hypertext Transfer Protocol (HTTP)
`
`* https: Hypertext Transfer Protocol (HTTP) over Secure Sockets Layer (SSL)
`
`*
`
`ftp: File Transfer Protocol (FTP)
`
`* news: Usenet newsgroups
`
`* Telnet: Telecommunications Network protocol (TELNET)
`
`GOOG-PA-00001204
`
`GOOG-PA-00001204
`
`

`

`Case 6:21-cv-00569-ADA Document 25-4 Filed 12/16/21 Page 7 of 7
`
`513
`
`USDC(United States Digital Cellular)
`
`Theauthority is preceded by a double slash (//) and is terminated by the nextslash (/), question mark
`(2), or numbersign (#), or the end of the URL. The authority can contain user information followed by a
`commercial at sign (e.g., ray@) and host informationin the formofan Internet Protocol(IP) address(e.g.,
`IPv4 dotted decimal notation) or registered domain name(e.g., contextcorporation.com). The authority
`also may contain an optional port number, whichis unnecessary if the numberis the same as the scheme’s
`default (e.g., 80 would be redundant withhttp).
`The path componentcontains data, usually organized in a hierarchical form that serves to identify a
`resource within the scope of the URIs scheme and naming authority. Within the path,a slash (/) is used
`as a delimiter between components.Thepathis terminated by thefirst question mark (?), numbersign (#),
`or the end of the URL.
`The query component contains non-hierarchical data that, along with data in the hierarchical path
`component,servesto identify a resource within the scope of the URIs scheme and naming authority.
`The fragment componentallows the indirect identification of a secondary resource that may be some
`portion or subset ofthe primary resource, some viewsor representations ofthe primary resource, or some
`other resource defined or described by those representations. See also domain name, dotted decimal notation,
`HTML, HTTP, IETF,IP, IPaddress, [Pv4, port, protocol, SSL, TELNET, and WWW.
`USAC (Universal Service Administrative Company) A subsidiary of the National Exchange Car-
`rier Association (NECA), USAC administers programs that provide support for incumbentlocal exchange
`carriers (ILECs) companies in high-cost areas, assistance for low-incomesubscribers, discounts for telecom-
`munications service to schools andlibraries, and discounts to rural health care providers. USAC accepts
`funds collected by the [LECsandthe interexchange carriers (IXCs) and distributes designated fundsin sup-
`port of the following programs andorganizations set up under the Telecommunications Act of 1996:
`* Schools and Libraries Program: Also known as the E-rate Program. Administered by the Schools
`and Libraries Corporation (SLC) to make telecommunicationsservice, Internet access, and internal
`connections affordable for eligible schools and libraries.
`* Rural and High Cost Program: Subsidizes basic telephone service in high-cost areas ofthe
`United States and its territories,
`
`* Rural Health Care Program: Administered by the Rural Health Care Corporation (RHC) to
`subsidize telecommunications andInternet service for eligible rural health care providers in high-
`cost areas.
`
`* Low Income Program: Lifeline subsidies to reduce the installation and monthly costs ofbasic
`telephone service for low-income consumers.
`See also ILEC, IXC, LEC, Telecommunications Act of 1996, universal service, and USF.
`USB (Universal Serial Bus) A serial bus with a data transfer rate of 12 Mbps for connecting a micro-
`computerto peripherals such as keyboards, mice,printers, and digital cameras through a single, general pur-
`pose port. USB isa considerable improvement over the RS-232 interface, but does not compare favorably
`with IEEE 1394,also knownas FireWire in the Apple computer domain. See also 1394, bus, FireWire,
`IEEE, microcomputer, peripheral, port, RS-232, and sertal.
`US-CERT (United States Computer Emergency Readiness Team) A team within the Depart-
`ment of Homeland Security charged with protecting the nation’s Internetinfrastructure by coordinating
`defense against and response from cyberattacks. See also CERT, cyberspace, and Internet.
`USDC (United States Digital Cellular) A digital cellular radio standard better knownas Digital
`Advanced Mobile Phone Service (D-AMPS). See D-AMPS.
`
`GOOG-PA-00001205
`
`GOOG-PA-00001205
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket