Pat, the Editor

For your convenience in reading: Subject lines are printed in RED and Moderator replies when issued appear in BROWN.
Previous Issue (just one)
TD Extra News
Add this Digest to your personal   or  

 
TELECOM Digest     Mon, 19 Sep 2005 19:23:00 EDT    Volume 24 : Issue 428

Inside This Issue:                             Editor: Patrick A. Townson

    Cyber Cons, Not Hackers Now Behind Viruses (Michael Kahn)
    Mac Users Should Quit Deluding Themselves (Matthew Broersma)
    Microsoft Alleges Retailers Selling Counterfeit Software (Reuters Newswire)
    Sprint to Offer Rhapsody Radio Service (Reuters Newswire)
    The Front Lines - September 19, 2005 (Jonathan Marashlian)
    Verizon Wireless, Dell Ink Wireless Broadband (USTelecom dailyLead)
    Re: When it Rains, it Pours  .... (Rich Greenberg)
    Re: When it Rains, it Pours  .... (William Warren)
    Re: When it Rains, it Pours  .... (Robert Bonomi)
    Re: Use of Bell Logo; Qwest? SBC? (Tony P.)
    Re: Roaming Charges (J Kelly)

Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet.  All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote.  By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
email.

               ===========================

Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent.  Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.

We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime.   Geoffrey Welsh

               ===========================

See the bottom of this issue for subscription and archive details
and the name of our lawyer; other stuff of interest.  

----------------------------------------------------------------------

From: Michael Kahn <reuters@telecom-digest.org>
Subject: Cyber Cons, Not Vandals Now Behind Viruses
Date: Mon, 19 Sep 2005 16:10:25 -0500


By Michael Kahn

Computer hackers seeking financial gain rather than thrills or
notoriety are increasingly flooding the Internet with malicious
software code, according to a semi-annual report issued on Sunday.

Symantec Corp.'s Internet Security Threat Report said during the first
half of 2005 the number of new viruses targeting Microsoft Windows
users jumped 48 percent to nearly 11,000 compared to the previous six
months as hackers used new tools and a growing sophistication to
create malicious code.

The latest report by the world's biggest security software maker also
found that viruses exposing confidential information made up
three-quarters of the top 50 viruses, worms and Trojans, up from 54
percent in the last six months of 2004.

It also said an increasing amount of menacing software allowed spam to
be relayed automatically from computer to computer. These so-called
"Trojan" programs can download and install adware to display pop-up
ads in a user's Web browser.

More so-called robot, or "bot" networks, which are created when a
hacker illegally gains control of a large number of computers, are now
available for sale or rent in the underworld of the Internet, Symantec
said.

"As financial rewards increase, attackers will likely develop more
sophisticated and stealthier malicious code that will attempt to
disable antivirus, firewalls, and other security concerns," the report
said.

Vincent Weafer, a security expert at Symantec, said early generations
of cybervandals tended to unleash viruses as a way to bolster their
reputations in the murky hacker world but now the motivation has
turned to financial gain using more targeted malicious software.

The number of headline-grabbing viruses has slowed since the Blaster
worm outbreak in 2003, which targeted Microsoft software and
devastated hundreds of thousands of computers worldwide.

Instead, there is now a surge in people trying to gain control over a
network of computers to launch attacks as well as a growing number of
phishing scams that trick users into clicking onto a Web site that
contains infected code, he said.

"We are seeing a very significant change where we are seeing far fewer
large pandemics," Weafer said. "However we are seeing a large volume
increase in cyberattacks, viruses and variants."

Indeed, Symantec saw an average of 10,532 active bot network computers
per day, an increase of more than 140 percent over the prior six
months.

It also said phishing messages grew to an average 5.70 million
messages a day from 2.99 million.

"What we are saying is that attackers are increasingly targeting your
assets and your private information," Weafer said.

Copyright 2005 Reuters Limited. 

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

------------------------------

From: Matthew Broersma <techworld@telecom-digest.org>
Subject: Mac Users Should Quit Deluding Themselves
Date: Mon, 19 Sep 2005 16:12:01 -0500


By Matthew Broersma, Techworld.com MacCentral
Symantec: Mac users deluding themselves over security

Mac users are "operating under a false sense of security", according
to Symantec, and Firefox users will have to recognize that the
open-source browser is currently a greater security risk than Internet
Explorer.

Symantec's latest Internet Security Threat Report, published Monday,
found evidence that attackers are beginning to organize for attacks on
the Mac operating system. Researchers also found that over the past
six months, nearly twice as many vulnerabilities surfaced in Mozilla
browsers as in Explorer.

"It is now clear that the Mac OS is increasingly becoming a target for
the malicious activity, contrary to popular belief that the Mac OS is
immune to traditional security concerns," the report said.

Symantec said OS X -- based on BSD Unix -- now shares many of the
security concerns affecting Unix users. "As Mac OS X users demand more
features and implement more ports of popular UNIX applications,
vulnerabilities and exploits targeting this operating system and its
underlying code base are likely to increase," Symantec said in the
report.

The number of security bugs confirmed by Apple has remained about the
same over the past two six-month reporting periods, with no widespread
exploits, Symantec said. But an analysis of a rootkit called Mac OS
X/Weapox -- based on the AdoreBSD rootkit -- indicates the situation
might not last much longer. "While there have been no reports of
widespread infection to date, this Trojan serves to demonstrate that
as Mac OS X increases in popularity so too will the scrutiny it
receives from potential attackers," the report said. "Mac users are be
operating under a false sense of security, and deluding themselves."

Twenty-five vulnerabilities were disclosed for Mozilla browsers,
including Firefox, in the first half of the year, compared with 13 for
Explorer, Symantec said. Eighteen of the Mozilla flaws were classified
as high severity, compared with eight high-severity Explorer flaws.

Symantec warned of other emerging threats, notably to increasingly
popular IP telephony systems, wireless networks and mobile
devices. Meanwhile, attack code is becoming more sophisticated, with
attackers deploying modular code that can avoid detection systems,
Symantec said.

Copyright 2005 Mac Central.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S.  Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, MacCentral and TechWorld.com 

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

------------------------------

From: Reuters News Wire  <reuters@telecom-digest.org> 
Subject: Microsoft Alleges Retailers Selling Counterfeit Software
Date: Mon, 19 Sep 2005 16:01:00 -0500


Microsoft Corp., the world's biggest software maker, on Monday said it
sued eight resellers, accusing them of distributing counterfeit copies
of its computer programs.

Many of the lawsuits, filed in Arizona, California, Illinois,
Minnesota and New York against privately held companies, allege that
the resellers sold counterfeit copies of software such as Office 2000
Professional and Windows XP, Microsoft said.

The companies named in the lawsuits are: BWT Industry Technology
Service Inc.; Data Day USA Inc.; MicroCity4Less.com; Winvtech
Solutions Inc.; Global Computing Inc.; Ion Technologies Corp.;
Compustar Co.; and Chips & Techs.

Microsoft said it previously filed suits against BWT Industry
Technology Service and Ion Technologies.

Copyright 2005 Reuters Limited. All rights reserved. Republication or
redistribution of Reuters content is expressly prohibited without the prior
written consent of Reuters. Reuters shall not be liable for any errors or
delays in the content, or for any actions taken in reliance thereon.

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

For more news headlines, go to:
http://telecom-digest.org/td-extra/newstoday.html

------------------------------

From: Reuters News Wire <reuters@telecom-digest.org> 
Subject: Sprint to Offer Rhapsody Radio Service
Date: Mon, 19 Sep 2005 16:00:01 -0500


Sprint Nextel Corp. on Monday said it will sell access to RealNetworks
Inc.'s Rhapsody radio service, allowing Sprint cellphone users to
listen to several radio stations and podcasts.

Rhapsody Radio will cost $6.95 a month on top of what Sprint users pay
for its Vision Multimedia Service, the wireless company's mobile
Internet package. It features stations devoted to alternative, pop,
country, R&B and hip hop.

It also allows users to watch music videos and listen to podcasts,
which are archived radio programs and audio features that users can
listen to on demand.

The new service comes at a time when wireless companies are leaning on
mobile Internet offerings to offset the competitive market for mobile
calls.  Wireless companies are betting music is ideal programming for
wireless data.

One of the more high profile music and wireless combinations is
Cingular's deal with Apple Computer Inc.'s iTunes, which allows
Cingular users to download songs from iTunes to the new Motorola ROKR
phones.

The Sprint-Rhapsody venture currently offers no download
service. Instead, users listen to the stations or podcasts by
"streaming" them from the wireless network.

"Downloading is interesting, but a lot of times people want
convenience," said Kevin Nakao, general manager of RealNetworks'
mobile business. "If you travel a lot, for example, you don't have
time to upload your music to your player. With this service, the
podcasts are there when you want them."

Another feature of the new service is called "Beats N Breaks," which
are instrumental hip hop beats that allow users to create their own
raps over the beats.

Ovum consultant Roger Entner called the service "a good first
step. The important difference is that, unlike the ROKR, you do not
need to sync your telephone to a PC to get your music. It's there on
your phone and it's convenient."


Copyright 2005 Reuters Limited. 

NOTE: For more telecom/internet/networking/computer news from the
daily media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra/more-news.html . Hundreds of new
articles daily.

Listen to BBC on the net while scanning news stories at:
http://telecom-digest.org/td-extra/BBC.html

------------------------------

From: Jonathan Marashlian <jsm@thlglaw.com>
Subject: The Front Lines - September 19, 2005
Date: Mon, 19 Sep 2005 16:08:08 -0400
Organization: The Helein Law Group


http://www.thefrontlines-hlg.com/  The FRONT LINES

Advancing The Cause of Competition in the Telecommunications Industry 

NOTICE: FOURTH QUARTER 2005 UNIVERSAL SERVICE FUND CONTRIBUTION FACTOR
UNCHANGED

The Wireline Competition Bureau of the FCC announced that the
Universal Service Fund contribution factor for the Fourth Quarter of
2005 will remain at the current 10.2% applicable to the Third
Quarter. The proposed 10.2% contribution factor will become effective
unless the FCC takes action in response to the proposed increase,
which is not anticipated.

Contributors are reminded that they may not mark up federal universal
service line-item amounts above the contribution factor.  Thus,
contributors may not, during the fourth quarter of 2005, recover from
end users through a federal universal service line item an amount that
exceeds the interstate telecommunications charges on a customer's bill
times 10.2%.

FCC RELEASES QWEST FROM SECTION 251 UNBUNDLING OBLIGATIONS IN OMAHA, NE

On September 16, 2005, the Federal Communications Commission ("FCC")
quietly took action on a Forbearance Petition filed by Qwest
Corporation ("Qwest") which is certain to have profound implications
for the future of ILEC network unbundling.

The FCC granted a Qwest Forbearance Petition in which Qwest requested
relief from Section 251 obligations that apply to it as the ILEC in
the Omaha-Council Bluffs, NE-IA Metropolitan Statistical Area ("Omaha
MSA").  The FCC granted the Forbearance Petition because the
particular market characteristics of the Omaha MSA, including the
substantial infrastructure investment made by Cox Communications,
supported the request to be relieved from legacy monopoly regulations.

With regard to section 251(c)(3) unbundling obligations for
transmission facilities, the FCC granted Qwest relief in targeted
areas where intermodal deployment is extensive.  Specifically, the FCC
relieved Qwest of the obligation to provide unbundled network elements
(UNEs) to competitors in 9 of Qwest's 24 wire center service areas in
the Omaha MSA.  The FCC left in place other section 251(c)
requirements, such as interconnection and interconnection-related
collocation obligations, as well as section 271 obligations to provide
wholesale access to local loops, local transport, and local switching
at "just and reasonable" prices.

For mass market telephone services, the Commission granted Qwest
relief from dominant carrier regulations that apply to it in the
entire Omaha MSA.  Specifically, the FCC granted Qwest's request to
forbear from applying price cap, rate of return, 15-day tariffing, and
60-day discontinuance regulations to Qwest for its provision of
interstate mass market exchange access services and broadband Internet
access services.

The Commission adopted a six-month transition period to permit
competing carriers that currently use UNEs in the 9 wire centers
receiving relief to migrate existing customers to alternative
facilities or arrangements, including self-provided facilities,
alternative facilities offered by other competitive carriers, or
services offered by Qwest.

The FCC's grant of Qwest's Forbearance Petition is likely to spawn
similar filings by RBOCs seeking similar relief in various markets
across the U.S.

UPDATE:  FEDERAL COMMUNICATIONS EXCISE TAX REFUND OPPORTUNITY

In the July 28, 2005, edition of The Front Lines, we advised readers
of the opportunity to obtain refunds of federal excise taxes paid to
the Internal Revenue Service ("IRS") for certain toll
telecommunications services.  The following is an update on the status
of the IRS' responses to the series of court cases that have held that
the toll telephone excise tax does not apply to long distance services
that are not based on distance.

1.  On August 5, 2005, the IRS lost its 8th straight court case, this
decision based on summary judgment by the U.S. District Court for the
Northern District of California for a $6,000,000 refund claim.

2.  According to information culled from earlier cases decided in
favor of taxpayers, the IRS has settled and made refunds for 100 cents
on the dollar, plus interest.

3.  The IRS has, however, recently reasserted its policy of suspending
other refund claims; meaning that it will not act on un-litigated
claims until the court cases that remain on appeal are decided.  The
IRS' strategy being to stonewall large refund claims in hopes of
winning one case on appeal and creating a conflict at the Appellate
court level, thus setting the stage for Supreme Court review.  All
intended to further delay its issuing refunds.

4.  There are currently four cases on appeal, three before the United
States Court of Appeals for the D.C. Circuit and one in the 6th
Circuit sitting in Ohio.

IRS STONEWALLING BACK IN PLAY

Contrary to indications made shortly after the United States Court of
Appeals for the 11th Circuit joined 6 other lower federal courts in
holding that the 3% federal excise tax does not apply to toll
telephone services the charges for which are not based on distance,
IRS has decided to reinstitute its policy of suspension of all FET
refund claims until (1) other court cases or appeals are decided or
(2) until Congress does something.  No timetable exists for how long
the IRS will wait for these court cases or appeals to be decided or
for Congress to address the issue with legislation.

IRS also claims to have heard "rumors" that Congress may repeal the
FET altogether, or may try and solve the problem by some form of
compromise based on the timing of FET payments or some other criteria.
We are not giving much credence to the "rumors" about Congress
becoming involved.  In our opinion, unless the IRS's hand is forced,
it will continue to stonewall dealing with the issue for as long as
possible because it knows that the court cases and their appeals could
take another two to five years or longer to be decided.

The IRS's position is indefensible.  Eight courts out of eight have
now ruled in favor of taxpayers.

The most recent case lost by the IRS is an August 5, 2005 decision out
of the Northern District of California where the court disposed of the
case, in favor of the taxpayer Hewlett-Packard, at the summary
judgment stage.  Notably, the refund at stake was the largest one yet
litigated -- over $6 million.

Presently, there are four appeals pending before the United States
Court of Appeals:

* National R.R. Passenger Corp. (Amtrak) v. United States..  Amtrak
filed its brief on June 1, 2005; there is no information on whether or
not oral argument has been scheduled yet.

* AOL v. United States.  IRS filed its appeal with the D.C. Circuit on
June 27, 2005.

* Honeywell International v. United States.  IRS filed its appeal with
the D.C. Circuit on July 12, 2005.

* Office Max v. United States.  Appeal pending before the 6th Circuit
sitting in Ohio.

We fully expect the appeals before the D.C. Circuit and the 6th
Circuit to have the same pro-taxpayer outcome as in the May 2005
decision by the 11th Circuit.  The bases for the pro-taxpayer rulings
are matters of applying basic principles of statutory construction and
the lack of IRS authority to change the statutory provision by its own
decisions or interpretations.  In other words, these cases do not
present a "close question" on which reasonable minds could differ as
to the result.  The result reached, now by eight courts, in favor of
taxpayers is unquestionably the right one in our opinion.  The recent
decision in California decided on summary judgment and for an amount
of over $6 million supports our optimism.

The IRS' position is unfortunate and can be challenged.  For example,
once a United States Court of Appeals denies IRS's appeal, as was done
for the first time in May of this year by the 11th Circuit, and the
IRS fails to seek review by the Supreme Court, the ruling in favor of
the taxpayer becomes "the law" of that Circuit.  Such is the case in
the 11th Circuit.  In short, the toll telephone excise tax does not
apply any longer in the three states that are located in the 11th
Circuit -- Alabama, Georgia and Florida.

For both carriers and customers in these states, IRS's stonewalling
through its suspension policy is untenable.  Carriers have no legal
basis to bill and collect the excise tax any longer in these three
states and open themselves up to suits if they continue to bill and
collect the taxes from their customers.  Customers, unaware of the
law, would surely continue to pay the excise tax if billed for it.

Hence, in the 11th Circuit, it is now possible to explore the use of
the doctrine of mandamus to force the IRS to do that which the law
requires as decided by the 11th Circuit.  The mandamus doctrine
permits courts to issue orders instructing the IRS to conduct itself
(e.g., make refunds) in accordance with law.  When an agency is
required by law to do something that is not discretionary, it may be
compelled by court order (mandamus) to do it.  Taxpayers in the 11th
Circuit therefore are in position to seek mandamus against the IRS.

SEEK ADVICE OF COUNSEL

If you seek professional advice regarding the application of FET to
your business, we advise you to contact your legal counsel.  If you do
not have legal counsel or seek specific counsel on this issue, please
contact Charles H. Helein at 703-714-1301 or by e-mail:
chh@thlglaw.com.  Our firm has developed various strategies in
response to the legal developments affecting the FET and looks forward
to working with clients to implement the most appropriate strategy
given each client's unique circumstances.

                =======================

The Front Lines is a free publication of The Helein Law Group,
providing clients and interested parties with valuable information,
news, and updates regarding regulatory and legal developments
primarily impacting companies engaged in the competitive
telecommunications industry.

The Front Lines does not purport to offer legal advice nor does it
establish a lawyer-client relationship with the reader. If you have
questions about a particular article, general concerns, or wish to
seek legal counsel regarding a specific regulatory or legal matter
affecting your company, please contact our firm at 703-714-1313 or
visit our website:

http://www.thlglaw.com/ www.THLGlaw.com

The Helein Law Group
8180 Greensboro Drive, Suite 700
McLean, Virginia 22102

------------------------------

Date: Mon, 19 Sep 2005 13:17:50 EDT
From: USTelecom dailyLead <ustelecom@dailylead.com>
Subject: Verizon Wireless, Dell Ink Wireless Broadband


USTelecom dailyLead
September 19, 2005
http://www.dailylead.com/latestIssue.jsp?i=24715&l=2017006

		TODAY'S HEADLINES
	
NEWS OF THE DAY
* Verizon Wireless, Dell ink wireless broadband deal
BUSINESS & INDUSTRY WATCH
* P2P startup may buy Grokster
* Is wireless the next frontier for porn?
* Telos wins Pentagon deal
* Japan's experience with mobile music could hold clues
* The new Web
USTELECOM SPOTLIGHT 
* Presented by ILC:  Broadband Services: Network Provisioning Across Multiple Technologies
HOT TOPICS
* Fiber on the comeback trail
* EBay buys Skype for $2.6 billion
* Report: TV's future is IPTV
* Ethernet not ready for primetime
* Broadband bill addresses advanced services
EMERGING TECHNOLOGIES
* Cisco offers new IP networking products
REGULATORY & LEGISLATIVE
* Can Wi-Fi master disaster?

Follow the link below to read quick summaries of these stories and others.
http://www.dailylead.com/latestIssue.jsp?i=24715&l=2017006

------------------------------

From: richgr@panix.com (Rich Greenberg)
Subject: Re: When it Rains, it Pours  ....
Date: Mon, 19 Sep 2005 16:34:39 UTC
Organization: Organized?  Me?


> [TELECOM Digest Editor's Note: But I still do not understand _how_
> the network card, or PCMCIA or whatever is able to do that job without
> first itself getting installed by (for example) Windows or whatever OS
> is in the terminal/workstation. I mean, that would be great if I could
> just turn on the laptop and have its OS installed by the desktop Win
> 2000. But how?   PAT]

The BIOS, possibly assisted by some firmware in the LAN card, has
enough "smarts" to initiate the connection to the boot server, and to
receive the OS image.

Rich Greenberg Marietta, GA, USA richgr atsign panix.com    + 1 770 321 6507
Eastern time.  N6LRT  I speak for myself & my dogs only.   VM'er since CP-67
Canines:Val, Red & Shasta (RIP),Red, husky                   Owner:Chinook-L
Atlanta Siberian Husky Rescue. www.panix.com/~richgr/  Asst Owner:Sibernet-L

------------------------------

Date: Mon, 19 Sep 2005 14:31:32 -0400
From: William Warren <william_warren_nonoise@comcast.net>
Subject: Re: When it Rains, it Pours  ....


TELECOM Digest Editor noted when questioning William Warren:

>> [TELECOM Digest Editor's Note: On the older Think Pads (models 770
>> or 770x at least) F1 at time of booting brings up a BIOS menu and a
>> choice of options i.e. boot from CD, from hard drive, from floppy
>> (and other choices I do not understand, such as from 'network', from
>> 'PCMCIA card' and other places. Exactly how one boots from 'network'
>> or from 'PCMCIA card' when those devices do not come to life until
>> Windows turns them on confuses me. [snip]  PAT]

> Pat,

> It's asking if you want to start a bootp request from your Ethernet
> card, which would broadcast for a "boot" server to provide the
> operating system for you over the network.

> In other words, it's giving you the option that's used for "Diskless
> Workstations", which don't have a hard disk, to download your OS from
> another network node and start it in memory. It's the same process
> your BIOS performs during boot, except that the image that's loaded
> into your machine's ram comes from another computer on your LAN, not
> from your hard drive.
[snip]

> [TELECOM Digest Editor's Note: But I still do not understand _how_
> the network card, or PCMCIA or whatever is able to do that job without
> first itself getting installed by (for example) Windows or whatever OS
> is in the terminal/workstation. I mean, that would be great if I could
> just turn on the laptop and have its OS installed by the desktop Win
> 2000. But how?   PAT]

Pat, the network card is able to do that job because it contains a
small computer program stored on ROM, which tells it what to do. This
is the same process your computer goes through when it boots: a small
computer program, stored in your computer's ROM, tells the machine to
read the first (boot) sector from the first hard disk drive into RAM,
and to transfer control to it. From there, the boot code that was read
from the hard disk takes over and reads the operating system into RAM,
thus booting the OS.

With BOOTP, the ROM is on the Ethernet card: it's usually an extra
chip that you have to buy separately and plug in yourself. The
instructions in the rom tell the microcontroller on the Ethernet card
to issue a BOOTP broadcast, thus requesting a response from a BOOTP
server, and the server responds with the "bootstrap" code that the
computer uses to find an OS image and load it into memory.

It's the same result, just from a different source.

GIYF:

http://www.microsoft.com/mspress/books/sampchap/6163a.asp (General Information)
http://www.cis.njit.edu/~cis456/protected/lesson23/single23.html 
(Details of the protocol)

William

(Filter noise from my address for direct replies)

------------------------------

From: bonomi@host122.r-bonomi.com (Robert Bonomi)
Subject: Re: When it Rains, it Pours  ....
Date: Mon, 19 Sep 2005 21:16:17 -0000
Organization: Widgets, Inc.


In article <telecom24.427.13@telecom-digest.org>, TELECOM Digest
Editor noted:

> [TELECOM Digest Editor's Note: But I still do not understand _how_
> the network card, or PCMCIA or whatever is able to do that job without
> first itself getting installed by (for example) Windows or whatever OS
> is in the terminal/workstation. I mean, that would be great if I could
> just turn on the laptop and have its OS installed by the desktop Win
> 2000. But how?   PAT]

It is *simple*.  The 'minimum necessary' code for operating the
network card is included in the ROM BIOS.  this is *not* much.  it
includes the code to (1) do a "RARP" request to find out the ethernet
address it should use, (2) do a 'broadcast' query for a TFTP server,
(3) send a 'get IPADDRESS_IN_HEX' request to that server, and (4)
access the remote required file-system image (directory structure)
from a file-server, via some network file-sharing protocol (NFS, SMB,
etc.).

Given that the 'network card' is built in to the machine, then 'how to
talk to it' can be "hard-coded" into the BIOS -- because it *is*
"known" what kind of a network card is installed, and thus the actual
code to communicate with the card is unchanging.  Thus, the amount of
code required to implement that necessary sequence of network commands
is *very* reasonable in size -- as in 'a few kbytes".

It's no different, in basic concept, from how a computer knows how to
load the O/S from a hard-disk -- *before* the hard-disk driver is
'installed' in the O/S.  This _is_ why, it is known as the 'bootstrap
loader' process.  It has 'just enough' smarts to talk to the boot
device (floppy, hard-disk, network card, cassette tape drive {remember
*those}, or 'whatever') to load in a bigger block of instructions that
provide the additional 'smarts' to load the next bigger piece of the
O/S in to memory.  "lather, rinse, repeat" as needed, until you have
the entire O/S loaded.

".. but how?"  requires setting up a machine to act as a 'boot
server'.

It has to have a table of Ethernet card _MAC_ addresses, along with
the IP address that should be assigned to that MAC address.  And be
running the server program that will dispense that information when
requested.

It has to be running a TFTP server process to deliver the boot image
when requested by the client machine.  this means that you also have
to have copies of the appropriate 'system' files under the appropriate
name(s) in the TFTP server's working directory.

The machine must also be running the programming that causes it to
identify itself as a boot server, when the 'broadcast' query is made.

Lastly, _some_ machine -- not necessarily the same machine as the
'boot' server -- must provide the "system" filesystem files, via a
network file- sharing protocol.

None of this is particularly 'rocket science', but it does require a
fair bit of "systems administration" and 'network administration'
knowledge, to set up all the requisite pieces, and have them play
nicely _together_.  request.

UNIX and Unix-like systems have known how to do this for 20+ years.
Novell "Netware" supported the concept from the later part of the
1980's, for Netware "client" machines.

Microsoft "didn't do networks" until 'Windows for Workgroups', and
"Microsoft Networking" did not support 'booting over the network'.

I don't know *if* it is possible to boot a MS O/S from the network,
although modern MS O/S's do have the required tools for being a 'boot
server' to 'diskless' clients.

------------------------------

From: Tony P. <kd1s@nospamplease.cox.reallynospam.net>
Subject: Re: Use of Bell Logo: Qwest? SBC?
Organization: ATCC
Date: Mon, 19 Sep 2005 17:17:30 -0400


In article <telecom24.427.8@telecom-digest.org>, 
shlichter@diespammers.com says:

> Allen Newman wrote:

>> Trademarks must remain in use to remain legally protected, so I'm
>> curious where and how Qwest ("my" Baby Bell) uses the Bell logo, if at
>> all.  In most cases Qwest has eliminated it since merging with US
>> West.  You can still make out the shadow of a Bell logo removed from
>> the wall of a Qwest building in Ankeny, Iowa, for example.

>> Last night on the way to a wedding reception I saw a Bell logo that
>> Qwest hasn't gotten rid of: a wooden pay phone kiosk inside the south
>> entrance of the Sioux Falls VFW Lounge still has a Bell sign on top,
>> with the blue Bell logo to the left of the word "phone".  Except for
>> Qwest signs tacked to the sides of the kiosk it looked a couple
>> decades old.  Does Qwest affixing new signs without taking down the
>> Bell sign count as current use for trademark purposes?  It seems
>> better than the example Qwest filed with the USPTO in 2003, which was
>> a couple photos of a US West payphone kiosk, which didn't even have
>> the Qwest identity.

>> Even without the logo, Qwest does try to connect less obviously to the
>> Bell identity.  Its Dex phone book is still blue and gold, the Qwest
>> logotype is in the Gill Sans font which has also been the corporate
>> font of AT&T (although the Bell System used Helvetica), and their
>> current slogan is "Spirit of Service", a long-time Bell System motto.
>> Arguably, Qwest's blue swoosh logo echos the circular blue Bell logo
>>  -- or would, at least, clash with it if the Bell logo were also
>> present.

>> Has anyone ever seen an example of Qwest intentionally adding the Bell
>> logo to anything anywhere?  I wonder what they'll come up with when
>> their next trademark filing is due.

>> The other RBOCs have filed their own claims of Bell logo usage:

>> In 2002, SBC submitted a photo of a white service truck with blue and
>> gold stripes and Southwestern Bell Telephone markings.  Do their
>> trucks still look like that?  It's about as convincing as Qwest's US
>> West phone booth.  It'll be interesting to learn what SBC does with
>> branding after their purchase of AT&T.

>> Also in 2002, Verizon submitted photos of new Verizon service trucks
>> and pay phones featuring the Bell logo.  IMO Verizon has cleverly
>> dealt with the Bell logo "problem", that is, keeping it alive and
>> meaningful but not letting it compete with their own created identity.

>> Finally, both of the Baby Bells that don't use the Bell logo
>> themselves license Bell names and logos to equipment manufacturers.
>> Qwest licenses Northwestern Bell to Unical and SBC licenses
>> Southwestern Bell to Conair.  This despite Northwestern Bell and
>> Southwestern Bell no longer being names Qwest or SBC use themselves,
>> and the fact that while Qwest and SBC sell phone equipment on their
>> websites, it's not their licensed Bell-branded equipment.

>> Bell logo trademark registrations can be found by searching for design
>> code 220324 260101 at the USPTO.

> I believe that all their old names such as Northwestern Bell Telephone 
> are still registered with the states in which they served as well as the 
> US Copyright office.

> I know that GTE is in California is still listed. And that was a 
> non-Bell before the merger.

> The only good spammer is a dead one!!  Have you hunted one down today?
> (c) 2005  I Kill Spammers, Inc.  A Rot in Hell Co.

For example:

http://www2.corps.state.ri.us/corporations/corp_search/index.php?
help=namechange&corp_id=25249&corpname=Name

------------------------------

From: J Kelly <jkelly@*newsguy.com>
Subject: Re: Roaming Charges
Date: Mon, 19 Sep 2005 14:11:23 -0500
Organization: http://newsguy.com
Reply-To: jkelly@*newsguy.com


On 16 Sep 2005 05:33:58 -0000, John Levine <johnl@iecc.com> wrote:

>> This raises a question I thought of recently, but had not bothered to
>> ask anyone about.  Suppose I start a cell call in local but move to a
>> roaming tower during the call?  Does the call get charged as roaming
>> or not?

> I doubt you'd get a handoff in a situation like that.  It'd drop the
> call and you'd call back.

I worked for a small cellular carrier about 7 years ago.  I would
routinely test handoffs from our network to the network adjacent to
us.  Calls can and do hand from one network to another.  The company I
worked for billed a call as it was originated.  I would make a call at
home, drive halfway across the state (though another carriers network)
and back into one of our service areas, the bill at the end of the
month would show a 2 hour call in my home area, no roaming.  I
received the same bills as a regular customer, the only difference was
instead of paying it I would send it to my supervisor and all the
charges mysteriously disappeared :) And they certianly hand from cell
to cell, I would often drive 400 miles in one day testing handoffs
between cellsites while talking to the performance engineer all the
while who was watching my signal stregths in the switch and making
tweaks to the system to make it handoff at just the right time.  I
don't miss that job as I hate being in a vehicle.

------------------------------


TELECOM Digest is an electronic journal devoted mostly to telecomm-
unications topics. It is circulated anywhere there is email, in
addition to various telecom forums on a variety of networks such as
Compuserve and America On Line, Yahoo Groups, and other forums.  It is
also gatewayed to Usenet where it appears as the moderated newsgroup
'comp.dcom.telecom'.

TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Patrick Townson. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.

Contact information:    Patrick Townson/TELECOM Digest
                        Post Office Box 50
                        Independence, KS 67301
                        Phone: 620-402-0134
                        Fax 1: 775-255-9970
                        Fax 2: 530-309-7234
                        Fax 3: 208-692-5145         
                        Email: editor@telecom-digest.org

Subscribe:  telecom-subscribe@telecom-digest.org
Unsubscribe:telecom-unsubscribe@telecom-digest.org

This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then.  Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!

URL information:        http://telecom-digest.org

Anonymous FTP: mirror.lcs.mit.edu/telecom-archives/archives/
  (or use our mirror site: ftp.epix.net/pub/telecom-archives)

RSS Syndication of TELECOM Digest: http://telecom-digest.org/rss.html
  For syndication examples see http://www.feedrollpro.com/syndicate.php?id=308
    and also http://feeds.feedburner.com/TelecomDigest

*************************************************************************
*   TELECOM Digest is partially funded by a grant from                  *
*   Judith Oppenheimer, President of ICB Inc. and purveyor of accurate  *
*   800 & Dot Com News, Intelligence, Analysis, and Consulting.         *
*   http://ICBTollFree.com, http://1800TheExpert.com                    *
*   Views expressed herein should not be construed as representing      *
*   views of Judith Oppenheimer or ICB Inc.                             *
*************************************************************************

ICB Toll Free News.  Contact information is not sold, rented or leased.

One click a day feeds a person a meal.  Go to http://www.thehungersite.com

Copyright 2004 ICB, Inc. and TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.

              ************************

DIRECTORY ASSISTANCE JUST 65 CENTS ONE OR TWO INQUIRIES CHARGED TO
YOUR CREDIT CARD!  REAL TIME, UP TO DATE! SPONSORED BY TELECOM DIGEST
AND EASY411.COM   SIGN UP AT http://www.easy411.com/telecomdigest !

              ************************

Visit http://www.mstm.okstate.edu and take the next step in your
career with a Master of Science in Telecommunications Management
(MSTM) degree from Oklahoma State University (OSU). This 35
credit-hour interdisciplinary program is designed to give you the
skills necessary to manage telecommunications networks, including
data, video, and voice networks.

The MSTM degree draws on the expertise of the OSU's College
of Business Administration; the College of Arts and Sciences; and the
College of Engineering, Architecture and Technology. The program has
state-of-the-art lab facilities on the Stillwater and Tulsa campus
offering hands-on learning to enhance the program curriculum.  Classes
are available in Stillwater, Tulsa, or through distance learning.

Please contact Jay Boyington for additional information at
405-744-9000, mstm-osu@okstate.edu, or visit the MSTM web site at
http://www.mstm.okstate.edu

              ************************

   ---------------------------------------------------------------

Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list. 

All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
organization.

End of TELECOM Digest V24 #428
******************************

Return to Archives**Older Issues