LEADER 05596nam 2200721Ia 450 001 9910141339103321 005 20200520144314.0 010 $a1-280-59135-8 010 $a9786613621184 010 $a1-118-18081-X 010 $a1-118-18082-8 010 $a1-118-18080-1 035 $a(CKB)2670000000159945 035 $a(EBL)818520 035 $a(SSID)ssj0000631676 035 $a(PQKBManifestationID)11392409 035 $a(PQKBTitleCode)TC0000631676 035 $a(PQKBWorkID)10600304 035 $a(PQKB)11721350 035 $a(Au-PeEL)EBL818520 035 $a(CaPaEBR)ebr10538697 035 $a(CaONFJC)MIL362118 035 $a(OCoLC)784136969 035 $a(CaSebORM)9780470499030 035 $a(MiAaPQ)EBC818520 035 $a(EXLCZ)992670000000159945 100 $a20111202d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAdvanced Internet protocols, services, and applications$b[electronic resource] /$fEiji Oki ... [et al.] 205 $a1st edition 210 $aHoboken, N. J. $cJohn Wiley & Sons, Inc.$dc2012 215 $a1 online resource (262 p.) 300 $aDescription based upon print version of record. 311 $a0-470-49903-6 320 $aIncludes bibliographical references and index. 327 $aAdvanced Internet Protocols, Services, and Applications; CONTENTS; Preface; Acknowledgments; About the Authors; 1 Transmission Control Protocol/Internet Protocol Overview; 1.1 Fundamental Architecture; 1.2 Internet Protocol Basics; 1.2.1 Packet Header; 1.2.2 Internet Protocol Address; 1.2.3 Internet Protocol Classification; 1.2.4 Subnet and its Masking; 1.2.5 Subnet Calculation; 1.3 Routing; 1.3.1 Routing across Providers; 1.3.2 Routing within Edge Networks; 1.3.3 Routing Scalability; References; 2 Transport-Layer Protocols; 2.1 Transmission Control Protocol 327 $a2.1.1 Transmission Control Protocol Header Structure2.1.2 Three-Way Handshake; 2.1.3 Transmission Control Protocol Flow Control and Congestion Control; 2.1.4 Port Number; 2.2 User Datagram Protocol; 2.2.1 User Datagram Protocol Header Structure; 2.3 Stream Control Transmission Protocol; 2.3.1 Stream Control Transmission Protocol Packet Structure; 2.3.2 Security: Prevention of SYN Attacks; 2.4 Real-Time Transport Protocol; 2.4.1 Real-Time Transport Protocol Header Structure; References; 3 Internet Architecture; 3.1 Internet Exchange Point; 3.2 History of Internet Exchange Points 327 $a3.3 Internet Service Provider Interconnection Relationships3.4 Peering and Transit; References; 4 IP Routing Protocols; 4.1 Overview of Routing Protocols; 4.1.1 Interior Gateway Protocol; 4.1.2 Exterior Gateway Protocol; 4.2 Routing Information Protocol; 4.2.1 Routing Information Protocol Header Format; 4.2.2 Update of Routing Table in Routing Information Protocol; 4.2.3 Maintenance of Routing Table in Routing Information Protocol; 4.2.4 Split Horizon; 4.2.5 Limitations of Routing Information Protocol; 4.3 Open Shortest Path First; 4.3.1 Shortest-Path Algorithm; 4.3.2 Hierarchical Routing 327 $a4.3.3 Open Shortest Path First Packet Format4.3.4 Comparison of Routing Information Protocol and Open Shortest Path First; 4.4 Border Gateway Protocol; 4.4.1 Border Gateway Protocol Message Flows; 4.4.2 Border Gateway Protocol Policy Selection Attributes; References; 5 Multiprotocol Label Switching; 5.1 Overview; 5.2 Functions and Mechanisms; 5.3 Applicabilities; References; 6 IP Quality Of Service; 6.1 Introduction; 6.2 Quality of Service in IP Version 4; 6.3 Integrated Services; 6.3.1 Packet Scheduler; 6.3.2 Packet Classifier; 6.3.3 Admission Control 327 $a6.3.4 Resource Reservation Protocol (RSVP)6.4 Differentiated Services; 6.5 Quality Of Service with Nested Differentiated Services Levels; 6.5.1 Drawbacks of Explicit Endpoint Admission Control with Path Selection; 6.5.2 OSPF-Based Adaptive and Flexible Quality of Service Provisioning; 6.5.3 Combination of Security and Quality of Service; 6.5.4 Path Selection Algorithm Analysis; References; 7 IP Multicast and Anycast; 7.1 Addressing; 7.1.1 Multicast Addressing; 7.1.2 Differences between Multicasting and Multiple Unicasting; 7.2 Multicast Routing; 7.2.1 Optimal Routing: Shortest-Path Trees 327 $a7.2.2 Unicast Routing 330 $aToday, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking 606 $aComputer network protocols 606 $aComputer networks 615 0$aComputer network protocols. 615 0$aComputer networks. 676 $a004.6 686 $aCOM043000$2bisacsh 700 $aOki$b Eiji$f1969-$0868761 701 $aRojas-Cessa$b Roberto$0936868 701 $aTatipamula$b Mallikarjun$01240614 701 $aVogt$b Christian$c(Marketing executive)$0563600 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910141339103321 996 $aAdvanced Internet protocols, services, and applications$92878177 997 $aUNINA LEADER 03825oam 2200733I 450 001 9910779039303321 005 20200520144314.0 010 $a1-136-32821-1 010 $a1-136-32822-X 010 $a0-203-12158-9 024 7 $a10.4324/9780203121580 035 $a(CKB)2550000000097864 035 $a(OCoLC)787851163 035 $a(CaPaEBR)ebrary10545497 035 $a(SSID)ssj0000686747 035 $a(PQKBManifestationID)12284124 035 $a(PQKBTitleCode)TC0000686747 035 $a(PQKBWorkID)10734799 035 $a(PQKB)10810495 035 $a(SSID)ssj0000694778 035 $a(PQKBManifestationID)11447961 035 $a(PQKBTitleCode)TC0000694778 035 $a(PQKBWorkID)10675102 035 $a(PQKB)11670861 035 $a(MiAaPQ)EBC957060 035 $a(Au-PeEL)EBL957060 035 $a(CaPaEBR)ebr10545497 035 $a(CaONFJC)MIL761126 035 $a(OCoLC)798532582 035 $a(OCoLC)759491787 035 $a(FINmELB)ELB143505 035 $a(EXLCZ)992550000000097864 100 $a20180706d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAct your age! $ea cultural construction of adolescence /$fNancy Lesko 205 $a2nd ed. 210 1$aNew York :$cRoutledge,$d2012. 215 $a1 online resource (246 p.) 225 1 $aCritical social thought 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-415-88761-5 311 $a0-415-88762-3 320 $aIncludes bibliographical references and index. 327 $a1. Up and down the great chain of being : progress and degeneration in children, race, and nation -- 2. Making adolescence at the turn of the century : romancing and administering youth -- 3. Back to the future : model middle schools recirculate fin-de-siecle ideas -- 4. Time matters in adolescence -- 5. Cold War containments : freedom, youth, and identity in the 1950s -- 6. "Before their time" : teenage mothers violate the order of proper development -- 7. Our guys/good guys : playing with high school athletic privilege and power -- 8. When the romance is gone.youth development in new times -- 9. Cutting free from the great chain of being : toward untimely teenagers. 330 $a"Are our current ways of talking about "the problem of adolescence" really that different than those of past generations? For the past decade, Act Your Age! has provided a provocative and now classic analysis of the accepted ways of viewing teens. By employing a groundbreaking "history of the present" methodology that resists traditional chronology, author Nancy Lesko analyzes both historical and present social and political factors that produce the presumed "natural adolescent." This resulting seminal work in the field of youth study forces readers to rethink the dominant interpretations on the social construction of adolescence from the 19th century through the present day. This new edition is updated throughout and includes a full new chapter on 1950s-era assumptions about adolescence and the corresponding connections to teens today. As in all chapters, Lesko provides careful examination of the concerns of nationalism, sexuality, and social order in terms of how they are projected onto the definitions of adolescents in the media, in schools, and in the home"--$cProvided by publisher. 410 0$aCritical social thought. 606 $aAdolescence 606 $aPuberty 615 0$aAdolescence. 615 0$aPuberty. 676 $a305.235 686 $aEDU000000$2bisacsh 700 $aLesko$b Nancy.$0911129 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910779039303321 996 $aAct your age$93801595 997 $aUNINA LEADER 01659nam 2200505 450 001 9910830356003321 005 20230124183013.0 010 $a3-527-80266-5 010 $a3-527-62548-8 035 $a(CKB)1000000000792882 035 $a(SSID)ssj0000354053 035 $a(PQKBManifestationID)11249814 035 $a(PQKBTitleCode)TC0000354053 035 $a(PQKBWorkID)10302239 035 $a(PQKB)11219814 035 $a(MiAaPQ)EBC4107809 035 $a(OCoLC)441894218 035 $a(EXLCZ)991000000000792882 100 $a20180118h20092009 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aComputational methods in catalysis and materials science /$fedited by Rutger A. van Santen and Philippe Sautet 210 1$aWeinheim, [Germany] :$cWiley-VCH,$d2009. 210 4$dİ2009 215 $a1 online resource (526 pages) $cillustrations (some color), tables, graphs 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-527-32032-6 320 $aIncludes bibliographical references at the end of each chapters and index. 606 $aCatalysis$xComputer simulation 606 $aMaterials science$xComputer simulation 615 0$aCatalysis$xComputer simulation. 615 0$aMaterials science$xComputer simulation. 676 $a541.395 702 $aSanten$b Rutger A. van 702 $aSautet$b Philippe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830356003321 996 $aComputational methods in catalysis and materials science$94083542 997 $aUNINA