Details

Multimedia Multicast on the Internet


Multimedia Multicast on the Internet


, Band 107 1. Aufl.

von: Abderrahim Benslimane

248,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 05.01.2010
ISBN/EAN: 9780470394687
Sprache: englisch
Anzahl Seiten: 366

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

This book examines multicast technology and will be a key text for undergraduate engineering students and master students in networks and telecoms. However, it will be equally useful for a wide range of professionals in this research field. <p>Multicast routing was introduced with the advent of multiparty applications (for example, videoconferencing on the Internet) and collaborative work (for example, distributed simulations). It is related to the concept of group communication, a technique introduced to reduce communication costs.</p> <p>The various problems of multicast routing on the Internet are examined in detail. They include: group membership management, quality of service, reliability, safety, scalability and transport. Throughout the text, several protocols are introduced in order to analyze, compare and cover the various aspects of multicast routing.</p>
<p><i>Preface xvii</i></p> <p><b>Chapter 1. Multicast Routing on the Internet 1</b><br /> <i>Jean-Jacques PANSIOT</i></p> <p>1.1. Introduction and definitions 1</p> <p>1.2. Multicast addressing 4</p> <p>1.2.1. Limited scope addressing 5</p> <p>1.2.2. GLOP global addressing 5</p> <p>1.2.3. Dynamic addressing: MALLOC 6</p> <p>1.3. Structure of a multicast router 7</p> <p>1.3.1. The unicast routing base for multicasting (MRIB) 7</p> <p>1.3.2. Tree information base (TIB) 8</p> <p>1.3.3. Multicast forwarding information base (MFIB) 8</p> <p>1.4. Relationship with the other protocol layers 10</p> <p>1.4.1. Relationship with the lower layer 10</p> <p>1.4.2. Relationship with the upper layers 12</p> <p>1.5. Belonging to groups: IGMP 12</p> <p>1.5.1. IGMP version 1 13</p> <p>1.5.2. IGMP version 2 13</p> <p>1.5.3. IGMP version 3 14</p> <p>1.6. Routing in flood-and-prune mode and the RPF 15</p> <p>1.6.1. Reverse path forwarding or RPF check 15</p> <p>1.6.2. Pruning 16</p> <p>1.6.3. Protocol cost 17</p> <p>1.6.4. DVMRP 17</p> <p>1.6.5. Mbone 18</p> <p>1.6.6. PIM dense mode: PIM-DM 18</p> <p>1.7. Link-state routing and MOSPF 18</p> <p>1.7.1. MOSPF principle 18</p> <p>1.7.2. MOSPF inter-areas 19</p> <p>1.7.3. Cost of MOSPF 20</p> <p>1.8. Routing with explicit construction: PIM-SM and CBT 20</p> <p>1.8.1. PIM sparse-mode principles: PIM-SM 21</p> <p>1.8.2. Discovery of RPs: boot strap routers (BSR) 24</p> <p>1.8.3. Maintenance of the PIM-SM tree 24</p> <p>1.8.4. Core based trees: CBT 25</p> <p>1.8.5. Bidirectional PIM 25</p> <p>1.8.6. Cost of explicit methods 26</p> <p>1.9. Inter-domain multicast routing 27</p> <p>1.9.1. MASC/BGMP architecture 27</p> <p>1.9.2. BGP multiprotocol extensions 28</p> <p>1.9.3. Interaction with intra-domain routing 29</p> <p>1.9.4. BGMP 29</p> <p>1.9.5. PIM-SM and MSDP solution 30</p> <p>1.10. Model of multicasting with a single source: SSM 32</p> <p>1.10.1. Express 32</p> <p>1.10.2. The SSM and PIM-SM model 33</p> <p>1.10.3. Limitations of PIM-SSM 33</p> <p>1.11. Multicasting and IPv6 34</p> <p>1.11.1. IPv6 multicast addressing 34</p> <p>1.11.2. Protocol for group subscription: MLD 35</p> <p>1.11.3. RP-embedded mechanism 35</p> <p>1.12. Other multicast routing proposals 36</p> <p>1.12.1. Simple multicast 37</p> <p>1.12.2. Logical addressing and routing: LAR 37</p> <p>1.12.3. Reunite 38</p> <p>1.12.4. Hop by hop multicast routing: HBH 39</p> <p>1.13. Comparison of various protocols 40</p> <p>1.13.1. Quality of the broadcast trees 40</p> <p>1.13.2. Cost of protocols 42</p> <p>1.14. Alternatives to multicast routing 43</p> <p>1.14.1. Multiple unicast connections 43</p> <p>1.14.2. Multicasting for small groups 43</p> <p>1.14.3. Application level multicast 43</p> <p>1.15. Conclusion 44</p> <p>1.16. Bibliography 44</p> <p>1.17. Glossary of acronyms 49</p> <p><b>Chapter 2. Hierarchical Multicast Protocols with Quality of Service 51</b><br /> <i>Abderrahim BENSLIMANE and Omar MOUSSAOUI</i></p> <p>2.1. Introduction 51</p> <p>2.2. Multicast principle 53</p> <p>2.2.1. Advantage of multicasting 53</p> <p>2.2.2. Technological constraints 55</p> <p>2.2.3. Main types of trees 56</p> <p>2.2.3.1. Shared tree/specific tree 56</p> <p>2.2.3.2. Shortest path tree (SPT) 57</p> <p>2.2.3.3. Steiner tree 57</p> <p>2.2.3.4. Centered tree (CBT) 58</p> <p>2.2.3.5. Summary 58</p> <p>2.3. Multicast routing protocols 59</p> <p>2.3.1. DVMRP 59</p> <p>2.3.2. PIM 60</p> <p>2.3.3. MOSPF 61</p> <p>2.3.4. IP multicast 62</p> <p>2.3.5. Limitations of the current multicast routing protocols 63</p> <p>2.3.5.1. DVMRP 63</p> <p>2.3.5.2. PIM 63</p> <p>2.4. Quality of service in multicast routing 64</p> <p>2.4.1. SJP 64</p> <p>2.4.2. QoSMIC 66</p> <p>2.4.3. QMRP 67</p> <p>2.4.4. Conclusion 68</p> <p>2.5. Hierarchical multicasting 69</p> <p>2.5.1. HDVMRP 70</p> <p>2.5.2. LGC 73</p> <p>2.5.3. HIP 74</p> <p>2.5.4. QHMRP 78</p> <p>2.5.5. Conclusion 81</p> <p>2.6. Hierarchical structure for multicasting 82</p> <p>2.6.1. Context of the system 82</p> <p>2.6.2. Construction of local groups 82</p> <p>2.6.2.1. Construction of the neighborhood 82</p> <p>2.6.2.2. Construction of transit groups 83</p> <p>2.6.2.3. Grouping and election 83</p> <p>2.6.3. Construction of hierarchical trees between servers 84</p> <p>2.6.3.1. Use of centered trees 85</p> <p>2.6.3.2. Use of SPT trees 87</p> <p>2.6.3.3. Comparison between the two methods 88</p> <p>2.6.4. Management of the hierarchical structure 89</p> <p>2.7. Conclusion 90</p> <p>2.8. Bibliography 90</p> <p><b>Chapter 3. A Transport Protocol for Multimedia Multicast with Differentiated Quality of Service 93</b><br /> <i>David GARDUNO, Ernesto EXPOSITO and Michel DIAZ</i></p> <p>3.1. Introduction 93</p> <p>3.1.1. Multimedia 93</p> <p>3.1.2. Partial QoS 93</p> <p>3.1.3. Multicast 95</p> <p>3.1.4. Text organization 96</p> <p>3.2. State of the art 96</p> <p>3.2.1. Point-to-point multimedia data transmission 96</p> <p>3.2.1.1. UDP and TCP 96</p> <p>3.2.1.2. SCTP 97</p> <p>3.2.1.3. DCCP 98</p> <p>3.2.1.4. Networking layer: IntServ 98</p> <p>3.2.1.5. Networking layer: DiffServ 99</p> <p>3.2.2. Multicast algorithms 100</p> <p>3.3. Network model, Tree and QoS oriented multicast service 102</p> <p>3.3.1. Introduction 102</p> <p>3.3.2. Hierarchized graph 104</p> <p>3.3.3. Degree Bounded Shortest Path Tree (DGBSPT) 107</p> <p>3.3.4. Model and simulations 116</p> <p>3.4. Fully Programmable Transport Protocol 118</p> <p>3.4.1. Introduction 118</p> <p>3.4.2. Design principles 119</p> <p>3.4.3. Contextual model of QoS 119</p> <p>3.4.3.1. QoS specification 119</p> <p>3.4.3.2. QoS mechanisms 120</p> <p>3.4.4. Protocol specification 121</p> <p>3.4.5. Implementation and evaluation 123</p> <p>3.5. Integration of multicast services and multimedia protocols 125</p> <p>3.5.1. Deployment of transport services by proxies 125</p> <p>3.5.1.1. Basic FPTP architecture and mechanisms 126</p> <p>3.5.2. The M-FPTP multimedia multicast service 128</p> <p>3.5.3. Tests and results 130</p> <p>3.6. Conclusion 131</p> <p>3.7. Bibliography 132</p> <p><b>Chapter 4. Reliability in Group Communications: An Introduction 135</b><br /> <i>Vincent ROCA</i></p> <p>4.1. Introduction 135</p> <p>4.2. Which reliability for which applications? 136</p> <p>4.2.1. Reliability levels 136</p> <p>4.2.2. Group models 137</p> <p>4.2.3. Transmission models 137</p> <p>4.2.4. Multiplicity of applications and their needs 138</p> <p>4.3. Challenges and big classes of solutions in the case of a reliable group communication service 139</p> <p>4.3.1. Challenges 139</p> <p>4.3.2. Reliable scaling and communications: problems 140</p> <p>4.3.3. Scaling of control traffic 140</p> <p>4.3.3.1. Use of removal mechanisms by recipients 140</p> <p>4.3.3.2. Use of FEC codes 141</p> <p>4.3.3.3. Use of assistance node trees 142</p> <p>4.3.4. Scaling of retransmissions 142</p> <p>4.3.4.1. Use of FEC 142</p> <p>4.3.4.2. Use of a retransmission server tree 142</p> <p>4.3.4.3. Local retransmissions 142</p> <p>4.3.5. Considering the heterogenity 143</p> <p>4.3.6. First assessment 144</p> <p>4.4. FEC codes 144</p> <p>4.4.1. Codes for packet erasure channels 144</p> <p>4.4.2. The concepts of systematic codes and MDS codes 145</p> <p>4.4.3. Classification of FEC codes 145</p> <p>4.4.4. Small block codes 146</p> <p>4.4.4.1. Principles 146</p> <p>4.4.4.2. Problem linked to block segmentation 146</p> <p>4.4.4.3. Use in the reliable communication systems 147</p> <p>4.4.5. Large block codes 147</p> <p>4.4.5.1. Introduction 147</p> <p>4.4.5.2. Operation mode of LDPC-staircase and LDPC-triangle codes 147</p> <p>4.4.6. Rateless codes (also known as extensible codes) 152</p> <p>4.4.6.1. Introduction 152</p> <p>4.4.6.2. Principles of online codes 152</p> <p>4.4.6.3. Comparison with the LDPC-staircase and triangle codes 153</p> <p>4.4.7. A few additional notes on the FEC rateless and large block codes 153</p> <p>4.5. Conclusion 154</p> <p>4.6. Bibliography 155</p> <p><b>Chapter 5. End-to-end Approaches for Reliable Communications 157</b><br /> <i>Vincent ROCA</i></p> <p>5.1. Introduction 157</p> <p>5.2. The main protocol classes and the block approach of the IETF 158</p> <p>5.3. The FEC building block 159</p> <p>5.3.1. The “FEC encoding ID” and “FEC instance ID” 159</p> <p>5.3.2. The FPI (FEC payload ID) 159</p> <p>5.3.3. The “FEC object transmission information” (FEC OTI) 160</p> <p>5.3.3.1. Block partitioning algorithm 161</p> <p>5.3.3.2. The n algorithm 162</p> <p>5.4. The NORM approach 163</p> <p>5.4.1. Operating principles 163</p> <p>5.4.1.1. General ideas 163</p> <p>5.4.1.2. Main types of packets 163</p> <p>5.4.1.3. Transmission window mechanism 164</p> <p>5.4.2. The building blocks used 165</p> <p>5.4.2.1. FEC block 165</p> <p>5.4.3. Scope 166</p> <p>5.5. ALC approach 166</p> <p>5.5.1. Operating principles 166</p> <p>5.5.1.1. General ideas 166</p> <p>5.5.1.2. Close-up on the layered transmission principle 167</p> <p>5.5.1.3. And if we used only one layer? 169</p> <p>5.5.2. The building blocks used 169</p> <p>5.5.2.1. The LCT block 170</p> <p>5.5.3. Scope 171</p> <p>5.6. The FLUTE file transfer application on ALC 172</p> <p>5.6.1. Operating principles 173</p> <p>5.6.2. An example of FDT instance 174</p> <p>5.6.3. Scope 175</p> <p>5.7. A few NORM and FLUTE/ALC available implementations 176</p> <p>5.8. Conclusion 177</p> <p>5.9. Bibliography 177</p> <p><b>Chapter 6. Router-assist Based Reliable Multicast 181</b><br /> <i>Prométhée SPATHIS and Kim THAI</i></p> <p>6.1. Introduction 181</p> <p>6.2. Motivations and objectives 183</p> <p>6.3. Protocol network architecture 186</p> <p>6.3.1. Active error recovery (AER) and light-weight multicast services (LMS) 186</p> <p>6.3.2. Pragmatic general multicast (PGM) 187</p> <p>6.3.3. Active reliable multicast (ARM) and multicast actiffiable (MAF) 187</p> <p>6.4. Classification 188</p> <p>6.4.1. Organizing the control tree 188</p> <p>6.4.2. Repair entities 190</p> <p>6.4.3. Local approaches 193</p> <p>6.4.3.1. Receiver-initiated approach 193</p> <p>6.4.3.2. Sender-initiated approach 194</p> <p>6.4.4. Buffer management 195</p> <p>6.4.4.1. Receiver-initiated approach 195</p> <p>6.4.4.2. Aggregated ACKs 196</p> <p>6.4.5. Exposure of receivers 197</p> <p>6.4.5.1. ARM and PGM 197</p> <p>6.4.5.2. MAF 199</p> <p>6.4.5.3. AER and LMS 199</p> <p>6.4.6. Feedback implosion 202</p> <p>6.4.6.1. Aggregation 202</p> <p>6.4.6.2. Optimization of aggregation 203</p> <p>6.4.7. Suppression 205</p> <p>6.4.7.1. Anticipation 205</p> <p>6.4.7.2. LMS and MAF 205</p> <p>6.4.8. Loss recovery burden 206</p> <p>6.4.8.1. ARM and PGM 206</p> <p>6.4.8.2. AER and LMS 207</p> <p>6.4.9. Standardization of router-assist based approaches 208</p> <p>6.5. Placement mechanisms 209</p> <p>6.5.1. Motivations and objectives of the placement of repair entities 210</p> <p>6.5.2. Location models 211</p> <p>6.5.3. Applications of the p-median problems to the placement of repair entities 212</p> <p>6.6. Performance analysis 213</p> <p>6.6.1. Large scale simulations and experiments 213</p> <p>6.6.2. Analytical models 214</p> <p>6.6.3. Precursory works 215</p> <p>6.6.4. Comparative analytical studies of router support approaches 215</p> <p>6.7. Conclusion 216</p> <p>6.8. Bibliography 217</p> <p><b>Chapter 7. Congestion Control in Multicast Communications 223</b><br /> <i>CongDuc PHAM and Moufida MAIMOUR-BOUYOUCEF</i></p> <p>7.1. Introduction 223</p> <p>7.2. Congestion control 225</p> <p>7.2.1. Congestion control: a bit of theory 225</p> <p>7.2.2. The congestion control in practice: example with TCP and the AIMD process 226</p> <p>7.3. The congestion control in group communications 229</p> <p>7.3.1. Information filtering and representativeness 229</p> <p>7.3.2. Scalability 231</p> <p>7.3.3. Heterogenity management 232</p> <p>7.3.4. In brief 233</p> <p>7.4. Single-rate approaches 233</p> <p>7.5. Multi-rate approaches 235</p> <p>7.6. Approaches with router assistance 239</p> <p>7.7. Conclusion 242</p> <p>7.8. Bibliography 242</p> <p>7.9. Appendix 1: summary table of the approaches quoted in this chapter 245</p> <p>7.10. Appendix 2: acronyms of the protocols presented 246</p> <p><b>Chapter 8. Approaches to Multicast Traffic Engineering 247</b><br /> <i>Christian JACQUENET</i></p> <p>8.1. Introduction 247</p> <p>8.2. The use of DiffServ mechanisms 249</p> <p>8.2.1. Reminder of the DiffServ architecture 249</p> <p>8.2.2. Risks of over-use of resources within the DiffServ domain 250</p> <p>8.2.3. Marking and signaling: establishment and maintenance of multicast distribution trees with differentiated qualities of service 250</p> <p>8.3. Multicast traffic engineering and MPLS networks 257</p> <p>8.3.1. The difficulty of activating multicast traffic processing capabilities in MPLS domains 257</p> <p>8.3.2. Multicast traffic engineering using the point-to-point LSP MPLS resources 258</p> <p>8.3.2.1. Establishment of multicast distribution trees at the edge of MPLS networks 258</p> <p>8.3.2.2. Construction of distribution trees according to the service classes supported in the MPLS domain 261</p> <p>8.3.3 Multicast traffic engineering using point-to-multipoint LSP MPLS tree structures 262</p> <p>8.3.3.1. Establishment of point-to-multipoint LSP 262</p> <p>8.3.3.2. Routing of multicast flows in traffic-engineered point-to-multipoint LSP trees 267</p> <p>8.4. Conclusion 268</p> <p>8.5. Bibliography 269</p> <p><b>Chapter 9. Towards New Protocols for Small Multicast Groups: Explicit Routing and Recursive Unicast 271</b><br /> <i>Ali BOUDANI and Abderrahim BENSLIMANE</i></p> <p>9.1. Introduction 271</p> <p>9.2. Explicit multicast routing protocols 273</p> <p>9.2.1. Xcast 273</p> <p>9.2.2. Xcast+ 275</p> <p>9.2.3. Advantages and disadvantages of the Xcast technique 276</p> <p>9.2.3.1. Advantages of the Xcast technique 277</p> <p>9.2.3.2. Disadvantages of the Xcast technique 277</p> <p>9.2.4. Generalization of the Xcast technique 279</p> <p>9.2.4.1. Description of the GXcast protocol 279</p> <p>9.2.4.2. Links between GXcast and the maximum transfer unit 281</p> <p>9.2.5. Incremental deployment of an Xcast protocol in a network 281</p> <p>9.2.5.1. Tunneling 281</p> <p>9.2.5.2. Premature X2U 283</p> <p>9.2.5.3. Semi-permeable tunneling (only with IPv6) 283</p> <p>9.2.6. Different explicit multicast propositions 284</p> <p>9.2.6.1. SGM 285</p> <p>9.2.6.2. CLM 285</p> <p>9.2.6.3. MDO6 286</p> <p>9.2.6.4. Somecast 286</p> <p>9.2.6.5. ERM 286</p> <p>9.2.6.6. MSC 286</p> <p>9.2.6.7. DCM 287</p> <p>9.2.7. Summary and limitations of the various explicit multicast routing protocols 287</p> <p>9.3. Recursive unicast 290</p> <p>9.3.1. REUNITE 292</p> <p>9.3.2. HBH 293</p> <p>9.3.3. SEM 295</p> <p>9.3.4. Comparison between HBH and SEM 297</p> <p>9.3.5. SREM 300</p> <p>9.4. Conclusion 304</p> <p>9.5. Bibliography 304</p> <p><b>Chapter 10. Secure Multicast Communications 307</b><br /> <i>Melek ÖNEN, Refik MOLVA and Alain PANNETRAT</i></p> <p>10.1. Introduction to multicast security 307</p> <p>10.1.1. Multicast applications and their characteristics 307</p> <p>10.1.2. Security requirements 309</p> <p>10.1.3. Limitations of the unicast solutions 310</p> <p>10.2. Multicast authentication 311</p> <p>10.2.1. Definition and requirements 311</p> <p>10.2.2. Techniques using symmetric algorithms 312</p> <p>10.2.2.1. Multicast message authentication codes (MMAC) 312</p> <p>10.2.2.2. TESLA 313</p> <p>10.2.3. Combination of asymmetric and symmetric algorithms 315</p> <p>10.2.3.1. Hash trees 315</p> <p>10.2.3.2. Hash chains 316</p> <p>10.2.3.3. The use of erasure codes 318</p> <p>10.2.4. Conclusion 320</p> <p>10.3. Multicast confidentiality 320</p> <p>10.3.1. Definition and requirements 320</p> <p>10.3.2. Re-encryption trees 322</p> <p>10.3.2.1. Iolus 322</p> <p>10.3.2.2. Cipher sequences 324</p> <p>10.3.3. LKH: Logical Key Hierarchy 326</p> <p>10.3.4. Conclusion 327</p> <p>10.4. Reliability of key distribution protocols 328</p> <p>10.4.1. Requirements 328</p> <p>10.4.2. Solutions based on replication techniques 329</p> <p>10.4.3. Solutions based on the use of FEC 330</p> <p>10.4.4. Conclusion 330</p> <p>10.5. General conclusion 331</p> <p>10.6. Bibliography 332</p> <p><b>Chapter 11. Scalable Virtual Environments 335</b><br /> <i>Walid DABBOUS and Thierry TURLETTI</i></p> <p>11.1. Introduction 335</p> <p>11.2. Specificities of the LSVE 337</p> <p>11.2.1. Scalability 337</p> <p>11.2.2. Interactivity 338</p> <p>11.2.3. Heterogenity 338</p> <p>11.2.4. Consistency 339</p> <p>11.2.5. Reliability 339</p> <p>11.3. Multipoint limitations 340</p> <p>11.3.1. Routing 340</p> <p>11.3.2. Subscriptions and unsubscriptions latency 341</p> <p>11.4. SCORE-ASM 342</p> <p>11.4.1. Assessment of the additional cost related to the use of multipoint 343</p> <p>11.4.2. The role of the agents 344</p> <p>11.4.2.1. Association of multipoint cells-groups 346</p> <p>11.4.2.2. Assignment of multipoint groups 346</p> <p>11.4.3. Communications in SCORE-ASM 347</p> <p>11.4.3.1. Communication between participants 348</p> <p>11.4.3.2. Participants-agent communication 349</p> <p>11.4.3.3. Communication between agents 350</p> <p>11.4.4. Connection to the virtual world 351</p> <p>11.4.5. Subscriptions update mechanism 351</p> <p>11.4.6. Clipping algorithm 352</p> <p>11.4.7. Conclusions regarding SCORE-ASM 353</p> <p>11.5. SCORE-SSM 354</p> <p>11.5.1. Problematic 355</p> <p>11.5.2. Choice of design 356</p> <p>11.5.3. SCORE-SSM structure 356</p> <p>11.5.3.1. Filtering 357</p> <p>11.5.3.2. Heterogenity and multimedia flow 358</p> <p>11.5.3.3. Correspondence with the network multipoint 359</p> <p>11.5.4. Prospects regarding SCORE-SSM 359</p> <p>11.6. Final comment 360</p> <p>11.7. Bibliography 361</p> <p><i>List of Authors 363</i></p> <p><i>Index 365</i></p>
<b>Abderrahim Benslimane</b> is Professor of Computer Science and Engineering at the University of Avignon, France. Currently, he is responsible for the Masters programme in networks, telecoms and multimedia. He is team leader of the computer networks and multimedia applications research group. His research and teaching interests are group communication protocols, quality of service in wired and mobile networks and inter-vehicular communication. He is also author of several refereed publications in these areas, as well as being involved in related scientific projects.
This book examines multicast technology and will be a key text for undergraduate engineering students and master students in networks and telecoms. However, it will be equally useful for a wide range of professionals in this research field.<br /> Multicast routing was introduced with the advent of multiparty applications (for example, videoconferencing on the Internet) and collaborative work (for example, distributed simulations). It is related to the concept of group communication, a technique introduced to reduce communication costs.<br /> The various problems of multicast routing on the Internet are examined in detail. They include: group membership management, quality of service, reliability, safety, scalability and transport. Throughout the text, several protocols are introduced in order to analyze, compare and cover the various aspects of multicast routing.

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
PDF ebook
171,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €