Protocolos de acceso m’ultiple

Vicente González Ruiz

November 25, 2013

Contents

1 Utilidad
2 Protocolos de acceso aleatorio

1 Utilidad

2 Protocolos de acceso aleatorio

References

[1]   James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach Featuring the Internet (2nd Edition). Addison Wesley, 2003.