Academic literature on the topic 'Computer network protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer network protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer network protocols"

1

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Full text
Abstract:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted
APA, Harvard, Vancouver, ISO, and other styles
2

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirement
APA, Harvard, Vancouver, ISO, and other styles
3

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (June 22, 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Full text
Abstract:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
APA, Harvard, Vancouver, ISO, and other styles
4

Alfaresa, Yuansa, Bongga Arifwidodo, and Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library." Jurnal Online Informatika 8, no. 2 (December 28, 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Full text
Abstract:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This st
APA, Harvard, Vancouver, ISO, and other styles
5

Mardedi, Lalu Zazuli Azhar, and Khairan Marzuki. "Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 2 (May 29, 2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Full text
Abstract:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is
APA, Harvard, Vancouver, ISO, and other styles
6

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Full text
Abstract:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The arti
APA, Harvard, Vancouver, ISO, and other styles
7

Romaniuc, Alexandru-Gabriel, Vlad-Cosmin Vasile, and Elena-Monica Borda. "Study of Methods and Techniques for Manipulating the Time Synchronization Component of NTP Servers in Computer Networks." International conference KNOWLEDGE-BASED ORGANIZATION 29, no. 3 (June 1, 2023): 71–77. http://dx.doi.org/10.2478/kbo-2023-0078.

Full text
Abstract:
Abstract In computer networks as well as in many other domains, time synchronization is carried out by some dedicated devices called time servers that uses network protocols, such as NTP (Network Time Protocol), PTP (Precision Time Protocol) or SNTP (Simple Network Time Protocol). Many domains and applications, such as, computer networks, security protocols, telecommunications, network services, and many others, depend on accurate time synchronization. According to the CVE (Common Vulnerabilities and Exposures) databases, between 2001-2022, more than 150 time synchronization protocols vulnerab
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammad Shahzaib Saeed. "Survey of Network Protocols." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 2 (June 28, 2019): 15–19. http://dx.doi.org/10.54692/lgurjcsit.2019.030273.

Full text
Abstract:
IPv4 is the network protocols of the present Internet, which is characterized by the Internet Engineering Task Force (IETF). Network protocols characterize guidelines, polices and traditions for communication between system devices. Every advanced protocol for computer organization utilizer a packet switching system to send and get the message. The protocols are intended to conquer the activities of any enemy that can lose the sent message, discretionarily change the fields of the sent message, and replay old messages. In the web, the colossal measure of information and the immense number of v
APA, Harvard, Vancouver, ISO, and other styles
9

Deepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (June 25, 2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Full text
Abstract:
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible desig
APA, Harvard, Vancouver, ISO, and other styles
10

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connec
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer network protocols"

1

alyanbaawi, ashraf. "DESIGN OF EFFICIENT MULTICAST ROUTING PROTOCOLS FOR COMPUTER NETWORKS." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1775.

Full text
Abstract:
Multicasting can be done in two different ways: source based tree approach andshared tree approach. Shared tree approach is preferred over source-based treeapproach because in the later construction of minimum cost tree per source is neededunlike a single shared tree in the former approach. However, in shared tree approach asingle core needs to handle the entire traffic load resulting in degraded multicastperformance. Besides, it also suffers from „single point failure‟. Multicast is acommunication between one or multiple senders and multiple receivers, which used asa way of sending IP datagra
APA, Harvard, Vancouver, ISO, and other styles
2

Lu, Ching-sung. "Automated validation of communication protocols /." The Ohio State University, 1986. http://rave.ohiolink.edu/etdc/view?acc_num=osu148726702499786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zissopoulos, Athanassios. "On buffer allocation in transport protocols." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=66245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dahlgren, Jeremy. "Efficient failure detection protocols for point-to-point communication networks /." Online version of thesis, 2004. https://ritdml.rit.edu/dspace/handle/1850/2752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sundaresan, Latha. "Simple network management protocol /." Online version of thesis, 1995. http://hdl.handle.net/1850/12254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jayakeerthy, Arunkumar Thippur Lim Alvin S. "Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm." Auburn, Ala, 2009. http://hdl.handle.net/10415/1608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ford, Daniel Alexander. "Semi-automatic implementation of network protocols." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24665.

Full text
Abstract:
A compiler which achieves automatic implementation of network protocols by transforming specifications written in FDT into C programs is presented. A brief introduction to the the fundamentals of FDT, a standard language developed by ISO/TC97/SC 16/WG 1 Subgroup B for specifying network protocols, is given. We then present an overview of the compiler and discuss the problem of PASCAL to C translation. Transformation of a FDT specification into code is explained and illustrated by two implementation examples. The first example illustrates the implementation strategy by tracing the processing of
APA, Harvard, Vancouver, ISO, and other styles
8

Berglund, Anders. "On the understanding of computer network protocols." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86076.

Full text
Abstract:
How students learn about network protocols is studied in a project-centred, internationally distributed, university course in computer systems taught jointly by two universities. Insights into students' understanding of basic concepts within computer networks are gained through an empirical phenomenographic research approach. The use of phenomenography as a research approach makes it possible to learn about computer science, as it is experienced by the students. The context in which the research is carried out and issues concerning by whom the context is experienced, are investigated and form
APA, Harvard, Vancouver, ISO, and other styles
9

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Baronikian, Haig. "Modelling and analysis of a computer conferencing system." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=63756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer network protocols"

1

G, Naugle Matthew, ed. Network protocols. New York: McGraw-Hill, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spiropoulos, George. Computer network protocols and protocol proving. Birmingham: University of Birmingham, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

A, Sunshine Carl, ed. Computer network architecturesand protocols. 2nd ed. New York: Plenum, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marsden, Brian W. Communication network protocols. 2nd ed. Bromley, Kent, England: Chartwell-Bratt, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marsden, Brian W. Communication network protocols. [Bromley]: Chartwell-Bratt, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sunshine, Carl A., ed. Computer Network Architectures and Protocols. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

A, Sunshine Carl, ed. Computer network architectures and protocols. 2nd ed. New York: Plenum Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Naugle, Matthew G. Network protocol handbook. New York: McGraw-Hill, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hartpence, Bruce. Packet guide to core network protocols. Sebastopol, Calif: O'Reilly Media, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Black, Uyless D. TCP/IP and related protocols. 2nd ed. New York: McGraw-Hill, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer network protocols"

1

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 359–89. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 367–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38141-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 357–86. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kizza, Joseph Migga. "Computer Network Security Protocols." In Guide to Computer Network Security, 365–96. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kizza, Joseph Migga. "Computer Network Security Protocols." In Texts in Computer Science, 409–41. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-47549-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harrim, Muhannad, Mohamed El-Wakil, and Ala Al-Fuqaha. "Network Layer Protocols." In Handbook of Computer Networks, 40–62. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schwartz, Mischa, and Thomas E. Stern. "Routing Protocols." In Computer Network Architectures and Protocols, 239–71. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gerla, Mario, and Leonard Kleinrock. "Flow Control Protocols." In Computer Network Architectures and Protocols, 273–328. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ciubotaru, Bogdan, and Gabriel-Miro Muntean. "Network Communications Protocols and Services." In Computer Communications and Networks, 29–52. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5292-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bertine, H. V. "Physical Interfaces and Protocols." In Computer Network Architectures and Protocols, 39–80. Boston, MA: Springer US, 1989. http://dx.doi.org/10.1007/978-1-4613-0809-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer network protocols"

1

Geromel, Paulo A., and Sergio T. Kofuji. "Avaliação do U-Net em Clusters com Rede Myrinet." In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1998. http://dx.doi.org/10.5753/sbac-pad.1998.22667.

Full text
Abstract:
Clusters of computers and workstations interconnected by high speed networks are widely used in high performance computing. Although high speed networks have the best latency and throughput, these features are not properly used by conventional communication protocol implementations. A possible solution for such a problem is found in Light-Weight Protocols. These protocols are stated in a User-Level aproach, where the communication tasks are directly processed in user space, instead of being processed inside operating system kernel, using a communication library. This paper evaluates the perfon
APA, Harvard, Vancouver, ISO, and other styles
2

Youssef, M. W. "Securing computer networks communication by modifying computer network communication protocols." In 2011 11th International Conference on ITS Telecommunications (ITST). IEEE, 2011. http://dx.doi.org/10.1109/itst.2011.6060130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vakaliuk, Tetiana, Oleksii Chyzhmotria, Olena Chyzhmotria, Dmytro Antoniuk, Valerii Kontsedailo, and Viacheslav Kryvohyzha. "Simulator of Computer Networks and Basic Network Protocols." In 5th Workshop for Young Scientists in Computer Science & Software Engineering. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0012009800003561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kalai, Yael Tauman, Xin Li, Anup Rao, and David Zuckerman. "Network Extractor Protocols." In 2008 IEEE 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 2008. http://dx.doi.org/10.1109/focs.2008.73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Afek, Yehuda, Baruch Awerbuch, and Eli Gafni. "Applying static network protocols to dynamic networks." In 28th Annual Symposium on Foundations of Computer Science. IEEE, 1987. http://dx.doi.org/10.1109/sfcs.1987.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Teymourlouei, Haydar, and Vareva E. Harris. "Neural Networks and Network Protocols to Predict Network Behavior." In 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). IEEE, 2022. http://dx.doi.org/10.1109/iceccme55909.2022.9988685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Kuang-Yu J., and B. Keith Jenkins. "A Collisionless Wavelength-Division Multiple Access Protocol for Free-Space Cellular Hypercube Parallel Computer Systems." In Optical Computing. Washington, D.C.: Optica Publishing Group, 1995. http://dx.doi.org/10.1364/optcomp.1995.otha3.

Full text
Abstract:
The performance of a MIMD parallel computer is critically impacted by the interconnection network performance, which in turn is determined by the network topology, implementation hardware, and communication protocol. Cellular hypercube (CH) interconnection networks, with emphasis on a symmetric cellular hypercube (SCH) network, were studied for the system discussed in this paper because they can exploit the communication locality observed in parallel applications [1], are reasonably scalable due to their O(logN) connectivities, and can be implemented with moderate requirements on the number of
APA, Harvard, Vancouver, ISO, and other styles
8

Aslanyan, Levon, Hasmik Sahakyan, Vladimir Romanov, Georges Da Costa, and Rahim Kacimi. "Large Network Target Coverage Protocols." In 2019 Computer Science and Information Technologies (CSIT). IEEE, 2019. http://dx.doi.org/10.1109/csitechnol.2019.8895058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Godfrey, Brighten. "Session details: Network protocols." In SIGMETRICS '11: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. New York, NY, USA: ACM, 2011. http://dx.doi.org/10.1145/3253098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vinodh Kumar, B., and J. Ramesh. "Automotive in vehicle network protocols." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921836.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer network protocols"

1

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH
APA, Harvard, Vancouver, ISO, and other styles
2

LI, Zhendong, Hangjian Qiu, xiaoqian Wang, chengcheng Zhang, and Yuejuan Zhang. Comparative Efficacy of 5 non-pharmaceutical Therapies For Adults With Post-stroke Cognitive Impairment: Protocol For A Bayesian Network Analysis Based on 55 Randomized Controlled Trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, June 2022. http://dx.doi.org/10.37766/inplasy2022.6.0036.

Full text
Abstract:
Review question / Objective: This study will provide evidence-based references for the efficacy of 5 different non-pharmaceutical therapies in the treatment of post-stroke cognitive impairment(PSCI). 1. Types of studies. Only randomized controlled trials (RCTs) of Transcranial Magnetic Stimulation(TMS), Transcranial Direct Current Stimulation(tDCS), Acupuncture, Virtual Reality Exposure Therapy(VR) and Computer-assisted cognitive rehabilitation(CA) for PSCI will be recruited. Additionally, Studies should be available in full papers as well as peer reviewed and the original data should be clear
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!