home *** CD-ROM | disk | FTP | other *** search
- =======================================
- T H E N E W F O N E E X P R E S S
- =======================================
-
- The newsletter of the Society for the Freedom of Information (SFI)
-
- Electronic Edition
- ---------------------------------------------------------------------------
-
- The publisher, SFI, distribution site(s), and authors contributing to the NFX
- are protected by the Bill of Rights in the U.S. Constitution, which
- specifically protects freedom of speech and freedom of the press. The
- information provided in this magazine is for informational purposes only, and
- the publisher, SFI, distribution site(s) and authors are not responsible for
- any problems resulting from the use of this information. Nor is SFI
- responsible for consequences resulting from authors' actions. This
- disclaimer is retroactive to all previous issues of the NFX.
-
- We accept article submissions of nearly any sort, about
- hack/phreak/anarchy/gov't/nets/etc. Send mail to the publisher (The
- Cavalier) at any of these addresses:
-
- Ripco [send mail to Silicon Avalanche]
- Project Phusion [send mail to Silicon Avalanche]
- Soul Pit [send mail to Daisy Farmer]
-
- The printed edition of the newsletter may be publicly available soon. The
- info will appear here as soon as possible. To be quite honest, the printed
- version looks a hell of a lot better; but as of now, only the members of SFI
- receive it.
-
- ---------------------------------------------------------------------------
-
-
-
- Highlights for Issue #2/July 1991
- =================================
-
- Q Phones Go Bye-Bye ... typed by Silicon Lightning, edited
- (see article # 1)
-
- Q Chemistry Lesson ... by Maelmord
- (see article # 2)
-
- Q A Pick Tutorial pt. 1 ... by Silicon Lightning
- (see article # 3)
-
- Q State of Surveillance pt. 2 ... by the Cavalier
- (see article # 4)
-
- Q T1 Dictionary ... by the Cavalier
- (see article # 5)
-
- Q T1: Digital Communications ... by the Cavalier
- (see article # 6)
-
- Q Trend Watcher ... by the Cavalier
- (see article # 7)
-
- Q Updated SS7 Area Table ... edited
- (see article # 8)
-
- Q Corrections ... edited
- (see article # 9)
-
- Q Editorial ... by the Cavalier
- (see article # 10)
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
-
- Phones Go Bye-Bye
-
- [Ed: One day before this issue was scheduled to go to press, we received this
- news from Silicon Lightning. We are nearly positive that this software is
- part of the Signaling System 7 mods.]
-
- ... Computer malfunction disrupts phone service ...
-
- WASHINGTON (AP) - Service disruptions blamed on computer trouble plagued
- millions of telephones in the nation's capital and three nearby states
- Wednesday and phone users across much of California had similar problems. In
- Washington, government agencies fared better than private homes and
- businesses. The White House said it felt no major impact and added that in
- a pinch President Bush could get through to any telephone in the country on
- special high-priority lines. But Bell Atlantic said 6.7 million telephone
- lines in Washington, Maryland, Virginia, and parts of West Virginia were hit
- with service disruptions. A software glitch disrupted Pacific Bell service
- in the Los Angeles area at midday Wednesday, interfering with phone calls in
- much of the 213, 818, 714, and 805 area codes. "It seems like our software
- just decided to take the day off," said Pacific Bell spokeswoman Linda
- Bonniksen in Orange County. Pacific Bell officials said most service was
- restored by midafternoon. Federal Communications Commission Chairman Alfred
- C. Sikes issued a statement vowing to "find out the cause of this problem."
- He said initial reports indicated the root of the trouble "may be both
- network and software problems." Jay Grossman, a spokesman for Bell Atlantic,
- said the problem affected most local calls and left outbound long-distance
- service sporadic. He said inbound calls appeared to be functioning normally.
- The disruption occurred about 11:40 a.m. EDT while workers for Bell
- Atlantic's Chesapeake & Potomac Telephone Co. in Baltimore were working on a
- computer that controlled the distribution of traffic in the calling network.
- Backup systems that were supposed to reroute calls in the event of a
- breakdown also malfunctioned. C&P is a subsidiary of Philadelphia-based
- Bell Atlantic, one of seven regional phone companies created by the 1984
- breakup of the Bell System. A disruption in the C&P system would not extend
- outside the mid-Atlantic states that Bell Atlantic serves. At early
- evening, officials said they were still not certain when service would be
- restored. "The network has come back up temporarily and then collapsed in
- places," said Michael Daley, a C&P spokesman. The disruption forced people
- to improvise. When office telephones malfunctioned, some workers tried the
- payphones on the street. "This is just terrible," said Dee Sibley, who
- works for a Washington legal firm. "We rely so heavily on the telephone to
- do our business. Right now I'm standing here at a payphone returning calls
- >from clients, some of whom we're working on important business for." Joseph
- Deoudes, vice president and owner of District Courier Services, Inc. in
- Washington, said telephone problems "paralyzed" his business. "It's really
- rough," he said. "I'm not making any money today."
-
- ...... Taken from The Potomac News, Thursday June 27, 1991. Pg A4. .....
- ............ Courtesy of Silicon Avalanche ...........
-
-
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
- Chemistry Lesson
-
- For this edition of the SFI newsletter, New Fone Express, the Cavalier
- has asked me to write an article about one of my favorite subjects,
- chemistry. This article will deal not with ordinary chemistry, but with a
- particularly explosive branch sometimes called pyrotechnics. The mixtures
- that will be described here are generally considered low explosives, but are
- in no way to be considered playthings! Use extreme caution when employing
- any chemicals! Also, work in an area free of anything that could fall on or
- cause to fall, your experiments. I know too many people who have failed to
- follow this simple advice and are unhappily the wiser. When first
- experimenting, use only minute portions of the chemicals. Simple advice, but
- important to follow. Now for some standard text here.
-
- YES! The DISCLAIMER! No member of SFI, or any person associated with
- this newsletter, New Fone Express, can accept or be found responsible in any
- shape or form for the content, consequences or actions resulting from
- information detailed in New Fone Express. Under the Constitution, this
- newsletter and the articles contained within are expressly protected. This
- disclaimer is in addition to that which is printed on the front page of the
- New Fone Express. Ok now that that's over, on to the real information.
-
- First, a description of the ingredients you will be using in the making
- of these explosives. Potassium nitrate and sodium nitrate: without a doubt
- one of the safest low explosives to handle. Especially good when packed into
- a container and exploded under pressure. Smokeless powder: this type of low
- explosive is much like the above, in the sense of stability, but it is also
- much more powerful. It too needs pressure to be set off. Potassium
- chlorates with sulfates: any mixture of potassium or sodium chlorates should
- be avoided at all costs. Most compounds will explode on formation. Ammonium
- nitrate with chlorates: similar to above, yet even more unstable. Potassium
- chlorate and red phosphorus: this will again explode immediately and
- violently upon formation. Don't mess with this. Aluminum with sodium
- peroxide, or potassium nitrate. This is a little more stable, but is still
- too dangerous to play with. Barium chlorate with shellac gums: any mixture
- containing either barium or barium nitrate and carbon, or barium chlorate and
- any other substance should be given great care. Barium and strontium nitrate
- with aluminum and potassium perchlorate: this combination is relatively safe,
- as is the combination of barium nitrate and sulfur, potassium nitrate, and
- most other powdered metals. Guanidine nitrate and a combustible: the
- combination of guanidine nitrate and a combustible (ie. powdered antimony)
- is one of the safest of all of the low explosives. Potassium bichromate and
- potassium permanganate: this compound is very unstable and too dangerous to
- work with.
-
- With that brief introduction to the effects of various chemicals you
- will be working with it's time to make some explosives: The following is a
- list of explosive compounds. The first chemical listed is the oxidating
- agent (the explosive) the second is the combustible (what sets off the
- explosive) In most of these plans you mix 3 parts oxidating agent and 1 part
- combustible. However, different mixtures will yield varying degrees
- efficiency.
- 1. nitric acid and resin
- 2. barium nitrate and magnesium
- 3. ammonium nitrate and powdered aluminum
- 4. barium peroxide and zinc dust
- 5. ammonium perchlorate and asphaltum
- 6. sodium chlorate and shellac gum
- 7. potassium nitrate (salt peter) and charcoal (basically gunpowder
- without the sulfur)
- 8. sodium peroxide and flowers of sulfur
- 9. magnesium perchlorate and woodmeal
- 10. potassium perchlorate and cane sugar
- 11. sodium nitrate and sulfur flour
- 12. potassium bichromate and antimony sulfide
- 13. guanidine nitrate and powdered antimony
- 14. potassium chlorate and red phosphorus
- 15. potassium permanganate and powdered sugar
- 16. barium chlorate and paraffin wax
- When employing the use of any high explosive, an individual must also
- use some kind of detonating device. Blasting caps are probably the most
- popular today, since they are very functional and relatively stable. The
- prime ingredient in most blasting caps and detonating devices in general is
- mercury fulminate. There are several methods for preparing fulminate.
-
-
- Method #1 for preparation of MF:
- --------------------------------
- 1) 5 grams of pure mercury and mixed with 35 ml. of nitric acid.
- 2) The mixture is slowly and gently heated. As soon as the solution
- bubbles and turns green, the silver mercury is dissolved.
- 3) After it is dissolved, the solution should be poured, slowly, into a
- small flask of ethyl alcohol and will result in red fumes.
- 4) After a half hour or so, the red fumes will turn white, indicating that
- the process is nearing its final stages.
- 5) After a few minutes, add distilled water to the solution.
- 6) The entire solution is now filtered, in order to obtain the small white
- crystals.
- These crystals are pure mercury fulminate, but should be washed many times,
- and tested with litmus paper for any remaining undesirable acid.
-
- Method #2 for preparation of MF:
- --------------------------------
- 1) Mix one part mercuric acid with ten parts ammonia solution. When
- ratios are described, they are always done according to weight rather than
- volume.
- 2) After waiting eight to ten days, the mercuric oxide will have reacted
- with the ammonia solution to produce the white fulminate crystals.
- 3) These crystals must be handled in the same way as the first method
- described, and must be washed many times and given several litmus paper
- tests. All fulminates are sensitive to shock and friction, and should be
- handled in a gentle manner.
-
- Now that you have a basic background in explosive chemistry, why not
- find out a few ways to use this knowledge. There are three different types
- of time-delay devices:
- 1) Metal strips under tension until breakage.
- 2) Chemical action that will produce enough heat to detonate an explosive
- 3) An alarm clock set for a certain time which when triggered, completes an
- electrical circuit, and detonates an electrical blasting cap.
-
- The first method, metal under tension until breakage, is hazardous and
- unreliable. There is little or no control over timing, and such devices are
- notorious for backfiring. Good luck! The chemical-action time-delay methods
- have proven to be reliable. Most of this action incorporates the amount time
- taken by certain solution of acid to eat its way through another substance.
- The time length can be determined by the concentration of the acid and by the
- substance to be eaten through.
-
- Chemical-Delay Time-Bomb
- ------------------------
- Obtain a short section of steel pipe and a cap for each end. Place
- inside the steel pipe a stick of dynamite, and drill a quarter-inch hole at
- on end of one cap. Into this hole, place a small measure of potassium
- chlorate and gunpowder. Prepare a small glass vial, filled with a
- concentrated sulfuric acid solution and stop up the end with a paper or cork
- stopper. To arm the bomb, place the vial of acid upside down in the hole at
- the top of the pipe. When the acid has eaten its way through the stopper, it
- will come in contact with the potassium chlorate and gunpowder. The mixture
- of these chemicals will cause a minor explosion, but it will be large enough
- to produce the heat necessary to detonate the dynamite. The detonation time
- is usually between three and six hours. If a solution of sulfuric acid and
- glycerin is used, rather than pure sulfuric acid, the time delay will be up
- to five or six days. And now, perhaps one of the oldest forms of bombs, one
- of the most unreliable, deadly, and treacherous.
-
- Letter bombs are very simple to make, but the difficult part is making
- sure it will detonate properly and that it is not obvious that it is a bomb.
-
- Mixtures:
- ---------
- About 75% aluminum powder with 25% iron powder is best. This is a light
- version of thermite. Mix the above well.
-
- The idea is this:
- -----------------
- Iron can burn, at a very high temperature, but it needs a little help. This
- is what the aluminum is for. Aluminum burns at a relatively low temperature,
- so it is used as a catalyst of sorts. Magnesium is used to flash-ignite
- the aluminum, which then burns the iron, at a suitable temperature. Since
- this is going off in an enclosed space, it will burn much hotter and slower
- and with more violence than a normal mix. Use an insulated (padded)
- envelope, the type that is double layered. Separate the layers. in the
- inner layer goes the light thermite. Keep this section separate, perhaps
- topping it off with some magnesium. The outer layer can be either
- magnesium, for a flash bomb, or possibly a material of your own choice.
-
- The fuse:
- ---------
- We can make a fuse from another set of chemicals: Iodine crystals, and
- ammonium hydroxide in liquid form. Mix these together, in about an equal
- amount. These form a new crystalline structure and are highly volatile with
- the impact power of an M-100 per teaspoon. Put these in a protective
- cardboard lining and place them at the top of the envelope. Rig this so it
- puts pressure on the crystals when the package is opened, but not from just
- squeezing the envelope. Take care in this step, for it is vital to properly
- set the fuse. Seal this up, and you have a working letter bomb. However,
- since the bulk of letter bombs is easily recognizable, they rarely make it
- past the post office.
-
- How to avoid letter bombs:
- --------------------------
- Since you made it this far, you might as well know how to avoid being
- detonated with a letter bomb that may be sent to you.
- 1) Never open a letter bomb the way it wants to be opened! This is the way
- of possibly avoiding the fuse. If it is set to detonate on contact with air,
- then you can kiss some air.
- 2) Don't squeeze, bend, or sneeze!
- 3) If it looks like a bomb, then don't even touch it! This is the best way
- to avoid meeting your maker!
-
- Hopefully, this information will be put to good use. Any response or
- request can be routed through the Cavalier to me. If this receives a good
- word from him, perhaps I will have to write a piece on high-explosives. Fun
- stuff indeed! Maelmord?.
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
- A Pick Tutorial
-
- [Ed: Pick is a database-oriented operating system that is rapidly gaining
- popularity with Unix. At last check there were over 250,000 Pick users worldwid
- e.]
- A Pick Tutorial - Courtesy of Silicon Avalanche of SFI
- Installment #1
-
-
- HOW DO I KNOW IT'S A PICK SYSTEM?
-
- Most Pick Computers (including Prime, McDonnell Douglas (Microdata),
- Sequoia, ADDS, and many others) have got a sort of standardized login prompt.
- Regardless of the information displayed, be it 2 or 3 pages of system
- identification, or merely a blank screen, 98% of the Pick computers prompt
- the user with either of 3 prompts.
- (1.) (2.) (3.)
- Logon Logon Please: Enter Account Name:
-
- These prompts may be in upper or lower case, or similar versions of the
- above prompts. If the user enters an invalid account, the system will display
- USER ID?
-
- and will rapidly scroll up the screen to do a refresh and clear - this
- restarts the logon message and returns the user to the logon prompt. This
- USER ID? error message is the 'trademark' of a Pick computer. I have never
- seen any other computer system use this error message, and I have never seen
- any Pick system that did not use that error message. If the user enters a
- valid account name, (a brief listing of defaults will be given shortly), and
- the account has a password on it, the password will be prompted for with a
- PASSWORD:
- prompt. This prompt is also pretty much a Pick standard prompt. If the
- incorrect password is entered, the user will get the same USER ID? error
- message, and will be returned to the logon prompt. Two or three (depending on
- the system) incorrect account name and/or passwords will result in a user
- lockout - this problem will be easily remedied by entering:
- HA
- and hitting Return twice. This should return you to the logon prompt for
- another round of account/password attempts.
-
- DEFAULT ACCOUNT NAMES AND PASSWORDS
-
- Pick has got 1 definite account, equivalent to the Root account in Unix,
- its name is SYSPROG.
- On new, or poorly designed systems, SYSPROG usually has no password - if
- that's what you've discovered, congratulations! Otherwise, good luck. Other
- Account & Password Defaults can include:
-
- Account Name / Password
- ------------------------/---------
- OBSOLETE / <-- None
- PREVIEW / <-- None
- TUTOR / LEARN
-
- and others. If you find an account, and you can get inside, great. I'm not
- going to discuss means of hacking in this series, there's enough information
- on that subject already. Pick passwords and account names can be just about
- any length. The passwords are encrypted in CRC-32 when they are stored on the
- disk, so a password of 180 characters requires the same storage space as one
- with only 1 or 2 characters. The passwords (not the encryption of them) is
- alphanumeric, can contain imbedded spaces and punctuation marks, control
- characters, etc. They are basically constructed of any combinations of ASCII
- characters ranging from decimal 001 to 251. (252 - 255 are used for other
- reasons to be discussed later.) The encryption of the password, as I have
- said, uses CRC-32, to produce an 8 digit hexadecimal code for storage.
-
-
- OTHER ACCOUNT NAME IDEAS
-
- Most of the Pick systems have accounts that are people's names, like
- Joan or Phil, and these fall prey to the stupidity of the 'owners' of those
- accounts. For example - these accounts commonly either have no password, or
- ones that are related to the accountname. As an illustration, one system I
- know has an account named 'PAUL' with the password of LUAP. (Paul backwards.)
- Upon noticing my presence, this password was changed to <CTRL-P> <CTRL-J>
- <CTRL-L>, the <CTRL> forms of the initials of the owner of that account.
- Other ideas for account names are the name of the company, (like XYZ might
- be a valid account on XYZ Incorporated's computer), or divisions of the
- company, (like ACCOUNTING or SHIPPING). There is no record kept of invalid
- logons, so essentially, you have as many tries as you may need or want.
-
-
- NEXT ISSUE
-
- The next issue of The New Fone Express will contain the next installment
- of the Pick tutorial. This next installment will include some basic things to
- do in a Pick system computer, a brief glossary of Pick terms, and how to
- create yourself a new account with your own password to insure future
- access.
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
-
- State of Surveillance (pt. 2)
-
- This second installment covers non-telephone audio bugs. First, we'll
- start out with passive audio bugs, or bugs that don't need to actively
- transmit a signal from the area being bugged. One such example is the
- window-reflection laser bug, which consists of a laser being aimed at a
- window pane in the room to be bugged. Since the laser emits a coherent beam
- of light that (if unobstructed) can travel long distances, the actual laser
- itself can be quite a distance away from the window to be bugged. It works
- because sound creates very slight vibrations in the window glass, and the
- laser beam is modulated or pulsed by the vibrating window. The beam is then
- reflected back to a photodiode, an electronic part that detects these
- vibrations. The electrical signal from the photodiode can then be amplified
- and fed through some sort of listening device. As for detecting this type
- of bug, it is extremely hard to do so. Since the chances are good that the
- laser is infrared, one way to detect it would be to use an infrared detector
- card, readily available at your nearest Radio Shack for about $5.95. After
- turning off the lights in the room, one would move the card around the
- outside of the window in question and observing the card. One way to counter
- the bug would be to generate an extremely high-frequency sound, which would
- piss off all the dogs in your area but would probably do a good job of
- countering the laser bug. Given a decent amount of electronics experience,
- one could probably build one for under $20, but you can buy one commercially
- that sticks on to the window w/ a suction cup for about $900, last I checked.
-
- Another example in the history of passive audio bugs is the device
- hidden in the American embassy in the Soviet Union in the '50s. Apparently,
- the Soviets had placed a tuned resonant cavity with a diaphragm and antenna
- inside a carefully-carved wooden presidential seal given as a gift to a new
- American ambassador, who mounted it in his office unknowingly. The Soviets
- aimed a high-power microwave beam at the antenna (as a matter of fact, the
- beam was powerful enough to injure some embassy personnel) and bounced it
- back to a receiver. The modulation of the beam caused by hitting the antenna
- picked up the sound in the room. The principle of the above two bugs is
- similar: if you have a substance that can act as a diaphragm, or something
- that will vibrate when sound waves hit it, you can bug it. A rather esoteric
- example invented in the '60s is going up to the roof of the building to bug
- and lowering a microphone into the toilet air pipe (no kidding). Since any
- sort of sound in the room would, of course, vibrate the water, and then
- vibrate the air in the pipe, it should actually work rather well. If the
- pipe is the right length, you might not even need the microphone, due to the
- principles of open-air resonance. The best way to counter this type of
- listener would be to simply go to the bathroom, which would disturb the water
- and mask whatever sort of conversation you're having in the bathroom.
- Probably not a bug that's used often. An even easier type of bug to build is
- a parabolic mike; the same principle is at work with satellite dishes. The
- dish focuses all the sound rays that hit it onto the focal point, where a
- microphone is conveniently located. Probably the best way to counter this
- type of bug would probably be to have your discussion in a noisy area,
- preferably if the noise is coming from a source near where the mike is
- pointed. However, some homebrew parabolic mikes out there have the problem
- that when extremely loud noises are encountered, the amplifier doesn't shut
- off, thereby blasting bloody hell out of the would-be listener's ears.
-
- However, the most common audio bug is the bug that does not record at
- all; it simply broadcasts the conversations to a receiver. There are an
- incredible amount of cases involving this type of bug. The problem with
- detecting this type of bug is that it can be incredibly small; I have
- personally seen wafer-thin FM bugs that clip onto the top of a 9 volt
- battery. This bug could transmit up to a half-mile, and could have been
- quite easily hidden in a plant, or perhaps behind a piece of furniture. The
- problem was that the bug transmitted over the FM radio band; any FM radio
- could have picked it up. This is why nearly all radio bugs in
- federal/commercial use today use frequencies that cannot be easily picked up;
- some transmit in the gigahertz range around the microwave band, which is
- quite beyond the range of most scanners. A good way to power this type of
- bug is to install it into an electric socket or light switch and hook it up
- to the power coming from the AC line. There is no really good way to shut
- off this type of bug short of jamming their frequency (requiring you to find
- the frequency it broadcasts on in the first place) or to shut off their power
- source. A fascinating idea in making this type of bug literally freak out is
- to aim a high-voltage stream of electrons at the bug; if the bug is even
- remotely electronic and non-shielded, it should affect the bug badly. But,
- this requires you to know the general location of the bug in the first place,
- so... my idea, though, is that if the stream is powerful enough, it should
- knock out the bug entirely, allowing you to do 'scans' without needing to
- actually know there is a bug there in the first place.
-
- Interestingly enough, it is legal to record a conversation you are
- having with someone else in a room if one of the two parties involved in the
- conversation is doing the recording. Commercially-made tricks for doing this
- include a cassette recorder small enough to fit somewhere else on your body,
- such as in an inside suit pocket. A wire runs to your shirt pocket, with the
- top half of a pen protruding from the pocket. Moving the pen up or down
- turns on or off the recorder. A common government trick is to hide the
- recorder in a briefcase; which is one way they bust big-time drug and arms
- dealers. A good way to screw up a non-shielded recording bug would be to
- generate an extremely powerful magnetic field in the area of the tape,
- thereby erasing the tape. But if the government wants you badly enough and
- the magnetic field wasn't all that strong, it is still possible to
- reconstruct a tape full of magnetic dropouts. But, it is doubtful whether
- such evidence would hold up in court. Also, if someone connects a recor
- der
- to the bug, it is not necessary to have wires leading to it - a technique
- which can be used is to buy a conductive-paint pen and literally draw the
- connections on. Look for bright silver traces on whatever surface you are
- looking at; the problem is, this type of trace can be easily painted over.
-
- The next installment will cover video bugs.
-
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
-
- T1 Dictionary
-
- This is the dictionary of terms and acronyms for the T1 article
- elsewhere in this issue.
-
- ACAMI - Alternate Channel Alternate Mark Inversion, a system of encoding
- data over a T1 channel, or a 'T1 line code.' In this line code, data is
- assigned to alternate DS0 channels, from the lowest to the highest (DS0 1, 3,
- 5..) The other DS0 channels (in this example, 2, 4, 6..) must have a fixed
- byte present on the channel. ACAMI is a relatively inefficient coding
- system, because it wastes half of the bandwidth -- it uses two DS0 channels
- to do the work of one. ACAMI is being phased out.
- ACCUNET - ACCUNET is AT&T's 'family of digital services,' also known as
- ASDS. ACCUNET T1.5 is a private line digital communication service running
- at 1.544 Mbps.
- AMI - Alternate Mark Inversion, another system of encoding data over a
- T1 channel, or a 'T1 line code.' In this line code, each logical one must
- have an opposite polarity as compared to the last logical one. Logical zero
- is equivalent to ground.
- ASDS - see ACCUNET.
- B8ZS - Binary 8 Zero Suppression, yet another system of encoding data
- over a T1 channel, or a 'T1 line code.' In this line code, pre-defined
- sequences of bipolar violations (BPVs) are generated to maintain the bit
- density, and at the other end of the T1 link, the BPVs are corrected and the
- correct data is passed along. The most efficient T1 line code in current
- use. ESF framing is required with B8ZS running at 64K Clear.
- CCC - Clear Channel Capability (no, not the Chaos Computer Club...), or
- the capability to use all 64Kbps of bandwidth of a DS0 link. Without CCC,
- only 56kbps is usable, because the extra 8Kbps is used to "keep the network
- running smoothly." Also known as 64K Clear.
- Cloud - the public telephone network, "called a cloud because user can
- connect at one point on it and expect data/voice input to pass-through to the
- other side and emerge in the proper sequence and format."
- CPE - Customer Premises Equipment. A fancy way of describing the phone
- company equipment that resides at the business that uses T1, and that encodes
- and decodes signaling and channel information.
- D4 - a T1 framing system dividing a T1 pipe into 24 channels, with a
- single D4 frame being equal to a DS0.
- DACS - Digital Access and Cross-Connect Systems, (in this article) a
- standard for devices connecting DS0 and DS1 links into the public network.
- DACS uses D4 framing, which specifies that each 193rd bit be used for
- framing.
- DDS - Digital Data Service. A 56Kbps or 9.6Kbps digital link.
- DS0 - Digital Signal, Level 0 - a 64 Kbps link. A segment of a
- fractional T1 channel.
- DS1 - Digital Signal, Level 1 - a 1.544 Mbps link. A full T1 channel.
- DS3 - Digital Signal, Level 3 - a 44.736 Mbps link. A full T3 channel.
- ESF - Extended Superframe, the standard format for coding network
- information in T1 channels. ESF groups every 24 frames and uses the framing
- bits as a byte used for error correction, diagnostics, and network
- synchronization, and is non-disruptive. Only 2,000 bits are used with ESF
- for synchronization, and the remaining 6,000 are used for monitoring network
- performance. ESF formatting is DACS-compatible.
- SDM - Subrate Data Multiplexing, a technique used to multiplex data onto
- a DS0 on the public network. Common rates are 2.4 Kbps, 4.8 Kbps, or 9.6Kbps
- (2400, 4800, 9600 bps)
- T1 - a digital link using a DS1 channel that can be made up of 24 DS0
- links, used for transmitting large amounts of digital data quickly.
- T3 - a digital link using a DS3 channel, equivalent to 28 T1 links. See
- T1 and DS3.
-
- ------------------------------------------------------------------------------
- ------------------------------------------------------------------------------
-
- T1: Digital Communications
-
- T1 is a high-speed digital link operating on the public phone network
- allowing large volumes of data to mo