World Library  



Literature


Literature is the art of written works, and is not bound to published sources. Literally translated, the word literature means 'acquaintance with letters' (as in the 'arts and letters'). The two most basic written literary categories include fiction and non fiction.

 
  • Cover Image

Polytechnisches journal

Supplemental catalog subcollection information: American Libraries Collection; Historical Literature; 329 and chart on 390-391 glued into gutter.; Imprint varies; Description based on: 67 Bd. (Jahrg. 1838); Volume paginations: v.67 xvi, 464 p., 7 leaves of plates; xii, v.68 xii, 476 p., 7 leaves of plates; v.70 xii, 496 p., 6 leaves of plates; v.71 xii, 484, 6 leaves of plates; v.72 xii, 468 p., 7 leaves of plates; v.73 xii, 468 p., 7 leaves of plates; v.74 xii, 480 p., ...

Read More
  • Cover Image

Polytechnisches journal

Supplemental catalog subcollection information: American Libraries Collection; Historical Literature; Imprint varies; Description based on: 67 Bd. (Jahrg. 1838); Volume paginations: v.67 xvi, 464 p., 7 leaves of plates; xii, v.68 xii, 476 p., 7 leaves of plates; v.70 xii, 496 p., 6 leaves of plates; v.71 xii, 484, 6 leaves of plates; v.72 xii, 468 p., 7 leaves of plates; v.73 xii, 468 p., 7 leaves of plates; v.74 xii, 480 p., 7 leaves of plates; v.75 xii, 496 p., 7 leave...

Read More
  • Cover Image

The Tao of Ietf a Guide for New Attendees of the Internet Engineer...

By: G. Malkin

Technical Reference Publication

Excerpt: The 1st IETF meeting was held in January, 1986 at Linkabit in San Diego with 15 attendees. The 4th IETF, held at SRI in Menlo Park in October, 1986, was the first at which non-government vendors attended. The concept of working groups was introduced at the 5th IETF meeting at the NASA Ames Research Center in California in February, 1987. The 7th IETF, held at MITRE in McLean, Virginia in July, 1987, was the first meeting with over 100 attendees. The 14th IETF me...

Read More
  • Cover Image

Control of Service Context Using Sip Request-Uri

By: B. Campbell

Technical Reference Publication

Introduction: A communication service should make use of the information it has at hand when being accessed. For example, in most current voice mail implementations, a subscriber retrieving messages from his own desk does not have to reenter his voice mailbox number - the service assumes that the store being accessed is the one associated with the endpoint being used to access the service. Some services allow the user to validate this assumption using IVR techniques befo...

Read More
  • Cover Image

Realm Specific Ip : Framework

By: M. Borella

Technical Reference Publication

Introduction: Network Address Translation (NAT) has become a popular mechanism of enabling the separation of addressing spaces. A NAT router must examine and change the network layer, and possibly the transport layer, header of each packet crossing the addressing domains that the NAT router is connecting. This causes the mechanism of NAT to violate the end-to-end nature of the Internet connectivity, and disrupts protocols requiring or enforcing end-to-end integrity of packets.

Read More
  • Cover Image

Reliable Delivery for Syslog

By: M. Rose

Technical Reference Publication

Introduction: The syslog protocol [1] presents a spectrum of service options for provisioning an event-based logging service over a network. Each option has associated benefits and costs. Accordingly, the choice as to what combination of options is provisioned is both an engineering and administrative decision. This memo describes how to realize the syslog protocol when reliable delivery is selected as a required service. It is beyond the scope of this memo to argue for,...

Read More
  • Cover Image

Hypertext Transfer Protocol (Http) Digest Authentication Using Aut...

By: A. Niemi

Technical Reference Publication

Excerpt: The Hypertext Transfer Protocol (HTTP) Authentication Framework, described in RFC 2617 [2], includes two authentication schemes: Basic and Digest. Both schemes employ a shared secret based mechanism for access authentication. The Basic scheme is inherently insecure in that it transmits user credentials in plain text. The Digest scheme improves security by hiding user credentials with cryptographic hashes, and additionally by providing limited message integrity. ...

Read More
  • Cover Image

Tcp Over Second (2.5G) and Third (3G) Generation Wireless Networks

By: H. Inamura

Technical Reference Publication

Introduction: The second generation cellular systems are commonly referred to as 2G. The 2G phase began in the 1990s when digital voice encoding had replaced analog systems (1G). 2G systems are based on various radio technologies including frequency-, code- and time- division multiple access. Examples of 2G systems include GSM (Europe), PDC (Japan), and IS-95 (USA). Data links provided by 2G systems are mostly circuit-switched and have transmission speeds of 10-20 kbps u...

Read More
  • Cover Image

Framework Policy Information Base for Usage Feedback

By: D. Rawlins

Technical Reference Publication

Introduction: The Framework of Common Open Policy Service with Policy Provisioning (COPS-PR) Usage Feedback describes the overall approach to policy usage monitoring and reporting. This document defines the specific Policy Information Base (PIB) framework for policy usage feedback. The policy classes for monitoring and reporting policy usage feedback, as well as policy classes for controlling reporting intervals, suspension, resumption and solicitation are defined.

Read More
  • Cover Image

Dynamic Authorization Extensions to Remote Authentication Dial in ...

By: M. Chiba

Technical Reference Publication

Introduction: The RADIUS protocol, defined in [RFC2865], does not support unsolicited messages sent from the RADIUS server to the Network Access Server (NAS). However, there are many instances in which it is desirable for changes to be made to session characteristics, without requiring the NAS to initiate the exchange. For example, it may be desirable for administrators to be able to terminate a user session in progress. Alternatively, if the user changes authorization l...

Read More
  • Cover Image

Radius (Remote Authentication Dial in User Service) Support for Ex...

By: B. Aboba

Technical Reference Publication

Introduction: The Remote Authentication Dial In User Service (RADIUS) is an authentication, authorization and accounting protocol used to control network access. RADIUS authentication and authorization is specified in [RFC2865], and RADIUS accounting is specified in [RFC2866]; RADIUS over IPv6 is specified in [RFC3162]. The Extensible Authentication Protocol (EAP), defined in [RFC2284], is an authentication framework which supports multiple authentication mechanisms. EAP...

Read More
  • Cover Image

Definitions of Supplemental Managed Objects for Atm Interface

By: F. Ly

Technical Reference Publication

Background: In addition to the MIB module defined in this memo, other MIB modules are necessary to manage ATM interfaces, links and cross-connects. Examples include MIB II for general system and interface management ([RFC2863]), the DS3 ([RFC2496]) or SONET MIBs ([RFC3592]) for management of SONET and DS3 physical interfaces, and, as appropriate, MIB modules for applications that make use of ATM, such as SMDS [RFC1694] and LAN Emulation [ATM Forum LANE]. These MIB module...

Read More
  • Cover Image

Generic Security Service Algorithm for Secret Key Transaction Auth...

By: S. Kwan

Technical Reference Publication

Introduction: The Secret Key Transaction Authentication for DNS (TSIG) [RFC2845] protocol was developed to provide a lightweight authentication and integrity of messages between two DNS entities, such as client and server or server and server. TSIG can be used to protect dynamic update messages, authenticate regular message or to off-load complicated DNSSEC [RFC2535] processing from a client to a server and still allow the client to be assured of the integrity of the answers.

Read More
  • Cover Image

Web Distributed Authoring and Versioning (Webdav) Ordered Collecti...

By: J. Whitehead

Technical Reference Publication

Introduction: This specification builds on the collection infrastructure provided by the WebDAV Distributed Authoring Protocol, adding support for the server-side ordering of collection members. There are many scenarios in which it is useful to impose an ordering on a collection at the server, such as expressing a recommended access order, or a revision history order. The members of a collection might represent the pages of a book, which need to be presented in order if ...

Read More
  • Cover Image

Wave and Equation Based Rate Control (Webrc) Building Block

By: M. Luby

Technical Reference Publication

Introduction: This document specifies Wave and Equation Based Rate Control (WEBRC). WEBRC is a congestion control building block that is designed to be massively scalable when used with the IP multicast network service. WEBRC is also suitable as the basis for unicast congestion control, but this is outside the scope of this document. WEBRC is designed to compete fairly with TCP and similar congestion-controlled sessions. WEBRC can be used as a congestion control protocol...

Read More
  • Cover Image

Internet X. 509 Public Key Infrastructure : Qualified Certificates...

By: S. Santesson

Technical Reference Publication

Introduction: This specification is one part of a family of standards for the X.509 Public Key Infrastructure (PKI) for the Internet. It is based on [X.509] and [RFC 3280], which defines underlying certificate formats and semantics needed for a full implementation of this standard. This profile includes specific mechanisms intended for use with Qualified Certificates. The term Qualified Certificates and the assumptions that affect the scope of this document are discussed in Section 2.

Read More
  • Cover Image

Joint Engineering Team (Jet) Guidelines for Internationalized Doma...

By: K. Konishi

Technical Reference Publication

Introduction: Domain names form the fundamental naming architecture of the Internet. Countless Internet protocols and applications rely on them, not just for stability and continuity, but also to avoid ambiguity. They were designed to be identifiers without any language context. However, as domain names have become visible to end users through Web URLs and e-mail addresses, the strings in domain-name labels are being increasingly interpreted as names, words, or phrases. ...

Read More
  • Cover Image

Unmanaged Networks Ipv6 Transition Scenarios

By: C. Huitema

Technical Reference Publication

Introduction: In order to evaluate the suitability of transition mechanisms from IPv4 [RFC791] to IPv6 [RFC2460], we need to define the environment or scope in which these mechanisms have to be used. One specific scope is the unmanaged networks, which typically correspond to home networks or small office networks.

Read More
  • Cover Image

Printer Finishing Mib

By: R. Bergman

Technical Reference Publication

Introduction: This document describes an SNMP Management Information Base (MIB) to provide for the management of in-line post-processing in a fashion that is currently provided for printers, using the Printer MIB [RFC3805]. The Printer Finishing MIB includes the following features...

Read More
  • Cover Image

Multiprotocol Label Switching (Mpls) Label Switching Router (Lsr) ...

By: C. Srinivasan

Technical Reference Publication

Introduction: This memo defines an portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it describes managed objects for modeling a Multiprotocol Label Switching (MPLS) [RFC3031] Label Switching Router (LSR).

Read More
 
Records: 764621 - 764640 of 764,706 - Pages: 



Copyright © World Library Foundation. All rights reserved. eBooks from Read Africa are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.