LEADER 05246nam 2200625Ia 450 001 9910143699303321 005 20170809164703.0 010 $a1-280-24180-2 010 $a9786610241804 010 $a0-470-09122-3 010 $a0-470-09121-5 035 $a(CKB)1000000000356565 035 $a(EBL)241141 035 $a(OCoLC)475955518 035 $a(SSID)ssj0000211108 035 $a(PQKBManifestationID)11169147 035 $a(PQKBTitleCode)TC0000211108 035 $a(PQKBWorkID)10291584 035 $a(PQKB)11243530 035 $a(MiAaPQ)EBC241141 035 $a(EXLCZ)991000000000356565 100 $a20040622d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNext generation SDH/SONET$b[electronic resource] $eevolution or revolution? /$fHuub van Helvoort 210 $aChichester $cWiley$dc2005 215 $a1 online resource (256 p.) 300 $aDescription based upon print version of record. 311 $a0-470-09120-7 320 $aIncludes bibliographical references and index. 327 $aNext Generation SDH/SONET; Contents; Preface; Acknowledgements; 1 Introduction; 1.1 History; 1.2 Conventions; 2 Concatenation; 2.1 Payload container concatenation; 2.2 Contiguous concatenation; 2.2.1 CCAT of VC-4 and STS-1 SPE; 2.2.2 CCAT of VC-2; 2.3 Virtual concatenation; 2.3.1 Payload distribution and reconstruction; 2.3.2 VCAT of VC-n; 2.3.3 VCAT of VC-m; 2.3.4 VCAT of PDH; 2.4 Applications of concatenation; 2.4.1 Contiguous to virtual to contiguous conversion; 2.4.2 VCAT and data transport; 2.4.3 VCAT and OTN signal transport; 3 Link capacity adjustment scheme; 3.1 Introduction 327 $a3.2 LCAS for virtual concatenation3.2.1 Methodology; 3.2.2 Control packet; 3.3 Changing the size of a virtual concatenated group; 3.3.1 Planned addition of member(s); 3.3.2 Planned deletion of member(s); 3.3.3 Temporary removal of member; 3.4 LCAS to non-LCAS interworking; 3.4.1 LCAS Source and non-LCAS Sink; 3.4.2 Non-LCAS Source and LCAS Sink; 3.5 LCAS control packet details; 3.5.1 The higher order VLI; 3.5.2 The lower order VLI; 3.5.3 The OTN VLI; 3.5.4 The PDH VLI; 4 The LCAS protocol; 4.1 Introduction; 4.1.1 Asymmetric connections; 4.1.2 Symmetric connections 327 $a4.1.3 Unidirectional operation4.2 The size of a VCG; 4.3 The LCAS protocol described using SDL; 4.3.1 Used SDL symbols; 4.3.2 LCAS state machines; 4.3.3 LCAS events used in the SDL diagrams; 4.3.4 The SDL diagrams; 5 LCAS time sequence diagrams; 5.1 Introduction; 5.2 Provisioning a member; 5.3 VCG state transition examples; 5.3.1 An increase of the bandwidth of a VCG; 5.3.2 A decrease of the bandwidth of a VCG; 5.3.3 Decrease of bandwidth due to a network problem; 6 Generic framing procedure; 6.1 Introduction; 6.2 Common aspects of GFP for octet-aligned payloads 327 $a6.2.1 Basic signal structure for GFP client frames6.2.2 GFP client frames; 6.2.3 GFP control frames; 6.2.4 GFP frame-level functions; 6.3 Client specific aspects for frame-mapped GFP; 6.3.1 Ethernet MAC payload; 6.3.2 IP/PPP payload; 6.3.3 RPR payload; 6.3.4 Fibre Channel payload via FC-BBW; 6.3.5 Direct mapping of MPLS; 6.3.6 Error handling in frame-mapped GFP; 6.4 Client specific aspects for transparent-mapped GFP; 6.4.1 Common aspects of GFP-T; 6.4.2 Client-specific signal fail aspects; 6.5 Server specific aspects of GFP; 6.6 GFP PDU examples; 6.6.1 GFP-F PDU; 6.6.2 GFP-T PDU 327 $a6.6.3 GPT CMF PDU7 Functional models for LCAS and GFP; 7.1 Virtual concatenation functions; 7.1.1 Sn-Xv Trail Termination function; 7.1.2 Sn-Xv/Sn-X adaptation function; 7.1.3 Sn-X Trail Termination function; 7.1.4 Sn Trail Termination function; 7.2 S4-Xc to S4-Xc interworking function; 7.3 LCAS-capable VCAT functions; 7.3.1 Sn-Xv-L Layer Trail Termination function; 7.3.2 Sn-Xv/Sn-X-L adaptation function; 7.3.3 Sn-X-L Trail Termination function; 7.3.4 Sn Trail Termination function; 7.3.5 Sn-X-L to Client adaptation function; 7.4 GFP adaptation functions 327 $a7.4.1 Source side GFP adaptation processes 330 $aSince the turn of the twentieth century, telecommunications has shifted from traditional voice transport to data transport, although digitized voice is still a large contributor. Instead of an evolution of existing transport standards, a revolution was necessary in order to enable additional data-related transport. Next Generation SDH/SONET provides a detailed description of the enablers of efficient data transport over any synchronous network. These include virtual concatenation (VCAT), the operation to provide more granularity, and the link capacity adjustment scheme (LCAS), an exte 606 $aSynchronous digital hierarchy (Data transmission) 606 $aSONET (Data transmission) 608 $aElectronic books. 615 0$aSynchronous digital hierarchy (Data transmission) 615 0$aSONET (Data transmission) 676 $a621.3821 676 $a621.38216 700 $aHelvoort$b Huub van$0845569 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143699303321 996 $aNext generation SDH$92171182 997 $aUNINA LEADER 03542nam 2200649Ia 450 001 9910780427903321 005 20230721023448.0 010 $a1-282-35167-2 010 $a9786612351679 010 $a0-300-15603-0 024 7 $a10.12987/9780300156034 035 $a(CKB)2420000000001380 035 $a(OCoLC)646846919 035 $a(CaPaEBR)ebrary10343516 035 $a(SSID)ssj0000299280 035 $a(PQKBManifestationID)11947434 035 $a(PQKBTitleCode)TC0000299280 035 $a(PQKBWorkID)10238091 035 $a(PQKB)10495265 035 $a(MiAaPQ)EBC3420469 035 $a(DE-B1597)486574 035 $a(OCoLC)1024056375 035 $a(DE-B1597)9780300156034 035 $a(Au-PeEL)EBL3420469 035 $a(CaPaEBR)ebr10343516 035 $a(CaONFJC)MIL235167 035 $a(OCoLC)923593144 035 $a(EXLCZ)992420000000001380 100 $a20090106d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIdeology and inquisition$b[electronic resource] $ethe world of the censors in early Mexico /$fMartin Austin Nesvig 210 $aNew Haven $cYale University Press$dc2009 215 $a1 online resource (380 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-300-14040-1 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$tAcknowledgments --$tNote on Orthography and Names --$tIntroduction --$t1. Longue Durée Concerns --$t2. Medieval and Early Modern Precedents --$t3. Theories of Adjudication --$t4. The Salamanca Connection --$t5. The Early Inquisitions, 1525-71 --$t6. The Holy Office Established, 1571-90 --$t7. The Ebb of the Holy Office, 1591-1640 --$t8. Lucre and Connections --$t9. Cordon Sanitaire: Efforts and Failures of Book Censorship --$tConclusion --$tAppendix 1: Inquisitional Trials --$tAppendix 2: Censors --$tAppendix 3: Inquisitors --$tNotes --$tBibliography --$tIndex 330 $aThis book is the first comprehensive treatment in English of the ideology and practice of the Inquisitional censors, focusing on the case of Mexico from the 1520's to the 1630's. Others have examined the effects of censorship, but Martin Nesvig employs a nontraditional approach that focuses on the inner logic of censorship in order to examine the collective mentality, ideological formation, and practical application of ideology of the censors themselves. Nesvig shows that censorship was not only about the regulation of books but about censorship in the broader sense as a means to regulate Catholic dogma and the content of religious thought. In Mexico, decisions regarding censorship involved considerable debate and disagreement among censors, thereby challenging the idea of the Inquisition as a monolithic institution. Once adapted to cultural circumstances in Mexico, the Inquisition and the Index produced not a weapon of intellectual terror but a flexible apparatus of control. 606 $aInquisition$zMexico 606 $aCensorship$xReligious aspects$xCatholic Church 606 $aCensorship$zMexico 615 0$aInquisition 615 0$aCensorship$xReligious aspects$xCatholic Church. 615 0$aCensorship 676 $a272/.20972 700 $aNesvig$b Martin Austin$f1968-$01467712 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910780427903321 996 $aIdeology and inquisition$93678496 997 $aUNINA