Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF

      Secure PDF Files

      Secure PDF files include digital rights management (DRM) software. DRM is included at the request of the publisher, as it helps them protect their copyright by restricting file sharing. In order to read a Secure PDF, you will need to install the FileOpen Plug-In on your computer. The FileOpen Plug-In works with Adobe Reader and other viewers. Visit FileOpen to see the full list.

        What you can do with a Secure PDF:
      • Print
      • Search
      • Highlight
      • Bookmark
      Please note that some publishers - including BOMA, IADC and ICML - do not allow printing of their documents.

    • 👥
    • Immediate download
    • $34.46
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $38.25
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $48.24
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

Provides a description of a means to permit an identification of a protocol in the network layer and provides a record of the structure and allowable ranges of protocol identifiers which can be assigned by JTC 1 and other authorities. This Standard is identical with and has been reproduced from ISO/IEC TR 9577:1993.
 

Document History

  1. AS/NZS 4093:1994

    👀currently
    viewing


    Information technology - Telecommunications and information exchange between systems - Protocol identification in the network layer

    • Most Recent
  2. AS/NZS 4093:1993


    Information technology - Telecommunications and information exchange between systems - Protocol identification in the network layer

    • Historical Version