From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission by Huahong Tu a Dissertation Presented I

Total Page:16

File Type:pdf, Size:1020Kb

From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission by Huahong Tu a Dissertation Presented I From Understanding Telephone Scams to Implementing Authenticated Caller ID Transmission by Huahong Tu A Dissertation Presented in Partial Fulfillment of the Requirement for the Degree Doctor of Philosophy Approved November 2017 by the Graduate Supervisory Committee: Adam Doupé, Co-chair Gail-Joon Ahn, Co-chair Dijiang Huang Yanchao Zhang Ziming Zhao ARIZONA STATE UNIVERSITY December 2017 ABSTRACT The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls. In this dissertation, we study what causes the users to fall victim to telephone scams and demonstrate that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, we propose a novel architecture and method to authenticate the transmission of the caller ID that enables the possibility of a security indicator, which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information. ACKNOWLEDGEMENTS Reviewing upon the last few years, I would never have been able to finish my dissertation without the guidance of my advisors and the support of my family. First of all, I would like to express my sincere gratitude to my advisor Dr. Adam Doupé. Dr. Adam Doupé has been a mentor, a colleague, and a friend. His continuous support of my Ph.D. study has made this work possible. It has been an exciting and rewarding journey to finally be able to finish this dissertation under his guidance. I have learned many valuable lessons from him in research and teaching. Without his support and guidance, this dissertation would not have been possible. I would like to thank Prof. Gail-Joon Ahn, who gave me the opportunity to work with the brilliant people in SEFCOM. I had a turbulent relationship with my ex-advisor and without his lab, I would not have the opportunity to continue my Ph.D. study. He has been monumental in attracting talents and acquiring industry sponsors at our lab. As a young faculty aspiring to establish my own lab, Prof. Ahn is someone I look to as a shining example. I would like to thank Dr. Ziming Zhao, for his advice and for being a friend. He has always encouraged me with his best wishes. Our similar cultural backgrounds made it easy for us to share our thoughts and aspirations. We are both young and hungry to make an impact in our world. It would have been a lonely lab without him. I would like to thank my fellow labmates in SEFCOM, for the stimulating discussions and for all the fun we have had in the last four years. It was not only fun to talk about our work, but also interesting to talk about things other than just our papers. Finally, I would like to thank my beloved mother, for raising me and supporting me throughout my life. Despite the struggles that come with the process of growing up with my mother, we over- came the problems in our lives and achieved many things worthwhile in life through surmounting the struggles that life throws at us. I would not have been who I am today without my mother. Thank you all. iii TABLE OF CONTENTS Page LIST OF TABLES . viii LIST OF FIGURES . ix CHAPTER 1 Introduction. 1 1.1 Dissertation Outline . 6 2 Background . 7 2.1 Public Switched Telephone Network . 7 2.1.1 PSTN Call Setup Signaling. 9 2.2 How Telephone Spam Works . 13 2.2.1 Spammer Operation . 15 2.2.2 Telephone Spam Samples . 20 2.3 Overview of the Caller ID . 22 2.3.1 How Caller ID Spoofing Works . 23 3 Understanding Why Telephone Scams Work . 25 3.1 Background and Insights . 26 3.2 Study Design . 27 3.2.1 Attributes . 28 3.2.2 Experiments . 31 3.2.3 Population . 32 3.2.4 Procedure . 34 3.2.5 Ethical compliance . 43 3.2.6 Dissemination . 44 3.3 Results and Analysis. 45 3.4 Survey Responses . 56 iv CHAPTER Page 3.5 Limitations . 58 3.6 Discussion . 60 3.7 Related Work . 61 3.8 Conclusion . 62 4 Surveying Key Challenges and Existing Countermeasures . 64 4.1 Key Challenges . 65 4.1.1 Immediacy Constraint . 65 4.1.2 Difficulty of Working with Audio Streams . 66 4.1.3 Lack of Useful Header Data . 66 4.1.4 Hard to Gain User Acceptance. 66 4.1.5 Caller ID Spoofing . 66 4.1.6 Difficulty of Tracing Spam Calls . 67 4.1.7 Entrenched Legacy Systems . 68 4.1.8 Lack of Effective Regulations . 68 4.1.9 Lack of Globalized Enforcement . 69 4.2 Basic Techniques and Countermeasures . 70 4.2.1 Call Request Header Analysis . 70 4.2.2 Voice Interactive Screening . 76 4.2.3 Caller Compliance . 78 4.3 Assessment Criteria . 82 4.3.1 Usability Criteria . 83 4.3.2 Deployability Criteria . 84 4.3.3 Robustness Criteria . 85 4.4 Combining Techniques. 86 v CHAPTER Page 4.5 Related Work . 88 4.6 Conclusion . 92 5 Proposing Authenticated Caller ID Transmission . 94 5.1 The Rise of Caller ID Spoofing . 95 5.2 Solution: Security Indicators . 98 5.3 The Underlying Caller ID Authentication Scheme . 100 5.3.1 Caller ID Verification . 105 5.3.2 Authenticated Call Request . 107 5.3.3 Security Considerations . 111 5.3.4 Local Deployment Considerations . 112 5.4 Related Works . 114 5.5 Conclusion . 115 6 Implementing Prototypes With Evaluations . 116 6.1 Prototype Design . 117 6.1.1 Caller ID Verification . 118 6.1.2 Authenticated Call Request . 120 6.2 Performance Analysis . ..
Recommended publications
  • DOCUMENT RESUME ED 327 163 AUTHOR Mason, Robin TITLE The
    DOCUMENT RESUME ED 327 163 IR 014 788 AUTHOR Mason, Robin TITLE The Use of Computer Networks for Education and Training. Report to the Trainii Agency. INSTITUTION Open Univ., Walton, Bletchley, Bucks (England). Inst. of Educational Technology. PUB DATE 89 NOTE 206p. PUB TYPE Reports Research/Technical (143) EDRS PRICE MF01/PC09 Plus Postage. DESCRIPTORS Community Education; *Computer Networks; Distance Education; Elementary Secondary Education; Foreign Ccuntries; Job Training; Military Training; Open Universities; Postsecondary Education; *Teleconferencing; Vocational Education IDENTIFIERS Europe (West); United States ABSTRACT The objective of this study has been to prepare a report which identifies the major issues concerning the use of computer networks, and particularly computer conferencing, in eaucation and training. The report is divided into four sections: (1) a discussion of the major themes and issues as they apply in education, training, and community networking, including reasons for using teleconferencing, provision of hardware and software, costs and funding, organizational impact, introducing networking, and obstacles to use;(2) case studies that describe the issues in contexts such as vocational education and training in Denmark, training for the United States Armed Forces, networking in primary and secondary schools, networking in the corporate sector and the community, teachers and computer networking, technology based training, and computer confelencing in university education;(3) a complete listing of all European applications including projectc in the United Kingdom, Belgium, Denmark, Finland, France, Germany, Italy, The Netherlands, Norway, and Spain with references for obtaining further details; and (4) appendices consisting of a glossary of technical terms, an overview of technological choices for learning networks, a report on computer networking in France, descriptions of nine currently used computer conferencing systems, and a 29-item bibliography.
    [Show full text]
  • Telecommunication Switching Networks
    TELECOMMUNICATION SWITCHING AND NETWORKS TElECOMMUNICATION SWITCHING AND NffiWRKS THIS PAGE IS BLANK Copyright © 2006, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to [email protected] ISBN (10) : 81-224-2349-3 ISBN (13) : 978-81-224-2349-5 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE This text, ‘Telecommunication Switching and Networks’ is intended to serve as a one- semester text for undergraduate course of Information Technology, Electronics and Communi- cation Engineering, and Telecommunication Engineering. This book provides in depth knowl- edge on telecommunication switching and good background for advanced studies in communi- cation networks. The entire subject is dealt with conceptual treatment and the analytical or mathematical approach is made only to some extent. For best understanding, more diagrams (202) and tables (35) are introduced wherever necessary in each chapter. The telecommunication switching is the fast growing field and enormous research and development are undertaken by various organizations and firms. The communication networks have unlimited research potentials. Both telecommunication switching and communication networks develop new techniques and technologies everyday. This book provides complete fun- damentals of all the topics it has focused. However, a candidate pursuing postgraduate course, doing research in these areas and the employees of telecom organizations should be in constant touch with latest technologies.
    [Show full text]
  • Routing Management in the PSTN and the Internet: a Historical Perspective
    Routing Management in the PSTN and the Internet: A Historical Perspective Deep Medhi1 1 University of Missouri–Kansas City, Kansas City, Missouri, USA Abstract. Two highly visible public communication networks are the public- switched telephone network (PSTN) and the Internet. While they typically pro- vide different services and the basic technologies underneath are different, both networks rely heavily on routing for communication between any two points. In this paper, we present a brief overview of routing mechanisms used in the PSTN and the Internet from a historical perspective. In particular, we discuss the role of management for the different routing mechanisms, where and how one is similar or different from the other, as well as where the management aspect is heading in an inter-networked environment of the PSTN and the Internet where voice over IP (VoIP) services are offered. 1 Introduction Two highly visible public communication networks are the public-switched telephone (PSTN) and the Internet. The PSTN provides voice services while the Internet provides data-oriented services such as the web and email (although voice communication over the Internet is now possible). In both these networks, information units need to be routed between two points. In the PSTN, the unit of information is a call, while in the Internet the unit is a datagram (packet). Thus, in each network, routing plays a significant role so that information units can be delivered efficiently. To accomplish efficient routing, various supporting management functions also play critical roles. Routing in both the PSTN and the Internet has evolved over the years; for details on routing, refer to books such as [1, 9, 8, 16, 19, 24].
    [Show full text]
  • Sophie Toupin
    Repositorium für die Medienwissenschaft Paolo Bory, Gianluigi Negro, Gabriele Balbi u.a. (Hg.) Computer Network Histories. Hidden Streams from the Internet Past 2019 https://doi.org/10.25969/mediarep/13576 Veröffentlichungsversion / published version Teil eines Periodikums / periodical part Empfohlene Zitierung / Suggested Citation: Bory, Paolo; Negro, Gianluigi; Balbi, Gabriele (Hg.): Computer Network Histories. Hidden Streams from the Internet Past, Jg. 21 (2019). DOI: https://doi.org/10.25969/mediarep/13576. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.33057/chronos.1539 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0/ Attribution - Non Commercial - No Derivatives 4.0/ License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0/ https://creativecommons.org/licenses/by-nc-nd/4.0/ PAOLO BORY, GIANLUIGI NEGRO, GABRIELE BALBI (EDS.) COMPUTER NETWORK HISTORIES COMPUTER NETWORK HISTORIES HIDDEN STREAMS FROM THE INTERNET PAST Geschichte und Informatik / Histoire et Informatique Computer Network Histories Hidden Streams from the Internet Past EDS. Paolo Bory, Gianluigi Negro, Gabriele Balbi Revue Histoire et Informatique / Zeitschrift Geschichte und Informatik Volume / Band 21 2019 La revue Histoire et Informatique / Geschichte und Informatik est éditée depuis 1990 par l’Association Histoire et Informatique et publiée aux Editions Chronos. La revue édite des recueils d’articles sur les thèmes de recherche de l’association, souvent en relation directe avec des manifestations scientifiques. La coordination des publications et des articles est sous la responsabilité du comité de l’association.
    [Show full text]
  • Computer Networking : Principles, Protocols and Practice Release 0.25
    Computer Networking : Principles, Protocols and Practice Release 0.25 Olivier Bonaventure October 30, 2011 Saylor URL: http://www.saylor.org/courses/cs402/ The Saylor Foundation Saylor URL: http://www.saylor.org/courses/cs402/ The Saylor Foundation Contents 1 Preface 3 2 Introduction 5 2.1 Services and protocols........................................ 11 2.2 The reference models ........................................ 20 2.3 Organisation of the book ....................................... 25 3 The application Layer 27 3.1 Principles ............................................... 27 3.2 Application-level protocols ..................................... 32 3.3 Writing simple networked applications ............................... 55 3.4 Summary ............................................... 61 3.5 Exercises ............................................... 61 4 The transport layer 67 4.1 Principles of a reliable transport protocol .............................. 67 4.2 The User Datagram Protocol ..................................... 87 4.3 The Transmission Control Protocol ................................. 89 4.4 Summary ...............................................113 4.5 Exercises ...............................................114 5 The network layer 127 5.1 Principles ...............................................127 5.2 Internet Protocol ...........................................140 5.3 Routing in IP networks ........................................170 5.4 Summary ...............................................195 5.5 Exercises ...............................................195
    [Show full text]
  • Proposed Rulemaking
    Federal Communications Commission FCC 04-28 Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) IP-Enabled Services ) WC Docket No. 04-36 ) NOTICE OF PROPOSED RULEMAKING Adopted: February 12, 2004 Released: March 10, 2004 Comment date: [60 Days After Federal Register Publication of this Notice] Reply Comment date: [90 Days After Federal Register Publication of this Notice] By the Commission: Chairman Powell, Commissioners Abernathy and Martin issuing separate statements; Commissioner Copps concurring and issuing a statement; Commissioner Adelstein approving in part, concurring in part and issuing a separate statement. TABLE OF CONTENTS Paragraph No. I. INTRODUCTION............................................................................................................. 1 II. BACKGROUND ............................................................................................................... 7 A. TECHNOLOGICAL AND MARKET EVOLUTION OF IP-ENABLED SERVICES ............................. 8 1. Internet Voice............................................................................................................... 10 2. Other New and Future IP-Enabled Services................................................................. 16 B. LEGAL BACKGROUND ........................................................................................................ 23 1. Statutory Definitions and Commission Precedent ........................................................ 24 2. Commission Consideration of VoIP
    [Show full text]
  • Telecom Networks and Switching: by Topology  Point-To-Point Link
    Telecom Networks & Switching Telecom Networks & Switching Classification of Communication Networks • Telecom Networks and Switching: By topology point-to-point link one-way (simplex) or two-way (duplex) Network Architecture point-to-multipoint or star all traffic goes through Base node which performs switching e.g. cellular Base Station, VSAT network Dr. Bhaskar Ramamurthi Professor, Remote Department of Electrical Engineering, Base ( IIT Madras, Chennai. ( Remote Base Remote Star VSAT (Very Small Aperture Satellite) network Dr Bhaskar Ramamurthi TNS/Set1 1 Dr Bhaskar Ramamurthi TNS/Set1 2 Telecom Networks & Switching Telecom Networks & Switching Classification of Communication Networks (contd.) Classification of Communication Networks (contd.) ring all nodes perform repeater function mesh fully connected vs. partially connected bus only one pair communicate at a time, but signal is broadcast to all nodes. e.g. multiple telephone instruments on a single rural line X traffic routed by each node connected to an exchange, C − nodes also perform repeater function for other nodes not directly linked H Ethernet LAN segment e.g. trunk exchanges in telecom network tree like partially-connected mesh, but only one route between any node pair Dr Bhaskar Ramamurthi TNS/Set1 3 Dr Bhaskar Ramamurthi TNS/Set1 4 Telecom Networks & Switching Telecom Networks & Switching Classification of Communication Networks (contd.) Classification of Communication Networks (contd.) • By scope of connectivity PBX • By type of switching local area e.g.
    [Show full text]
  • India Mini-Case Study: Dealing with Interconnection and Access Deficit Contributions in a Multi-Carrier Environment
    IInnddiiaa MMiinnii--CCaassee SSttuuddyy 22000033 DDeeaalliinngg wwiitthh IInntteerrccoonnnneeccttiioonn aanndd AAcccceessss DDeeffiicciitt CCoonnttrriibbuuttiioonnss iinn aa MMuullttii--CCaarrrriieerr EEnnvviirroonnmmeenntt International Telecommunication Union This mini case study was conducted by Robert Bruce and Rory Macmillan of Debevoise & Plimpton, London U.K. with the active participation of country collaborators Rajendra Singh and Rakesh Kumar Bhatnagar. The views expressed in this paper are those of the authors, and do not necessarily reflect the views of ITU, its members or the government of India. The authors wish to express their sincere appreciation to the Telecommunication Regulatory Authority of India for its support in the preparation of this mini case study. This is one of five mini case studies on interconnection dispute resolution undertaken by ITU. Further information can be found on the web site at http://www.itu.int/ITU-D/treg. India Mini-Case Study: Dealing with Interconnection and Access Deficit Contributions in a Multi-Carrier Environment I. Introduction: Indian Telecom Sector in Transition to Full Competition With a population of over 1 billion and a GDP of around US$ 500 billion, India has about 40 million fixed lines, about 16 million GSM cellular subscribers and about 4 million mobile CDMA wireless loop (WLL(M)) subscribers. The country’s combined tele -density rate, therefore, is around 6 lines per 100 inhabitants. India’s National Telecom Policy of 1999 calls for attaining a fixed line teledensity rate of 7 by 2005 and 15 by 2010. To help meet this goal, India has actively pursued a competitive multi-operator environment. It has allowed open competition in the fixed, cellular, national long distance and international long distance service sectors.
    [Show full text]
  • Handbook on New Technologies and New Services Has Been Prepared Taking Into Account These Two Statements of the Valletta Conference Held in 1998
    *19165* Printed in Switzerland Geneva, 2001 ISBN 92-61-09291-8 q-16-2-fasc_2.indd 1 11.05.2001, 14:50 THE STUDY GROUPS OF THE ITU-D The ITU-D Study Groups were set up in accordance with Resolution 2 of World Telecommunication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 1998-2002, Study Group 1 is entrusted with the study of eleven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of seven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information Please contact: Ms. Fidélia AKPO Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 5439 Fax: +41 22 730 5484 E-mail: [email protected] Placing orders for ITU publications Please note that orders cannot be taken over the telephone. They should be sent by fax or e-mail. ITU Sales Service Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6141 English Telephone: +41 22 730 6142 French Telephone: +41 22 730 6143 Spanish Fax: +41 22 730 5194 Telex: 421 000 uit ch Telegram: ITU GENEVE E-mail: [email protected] The Electronic Bookshop of ITU: www.itu.int/publications ITU 2001 All rights reserved.
    [Show full text]
  • Communications Networks
    barrett02 9/21/04 4:18 AM Page 59 CHAPTER 2 Communications Networks After reading this chapter you will be able to: I Understand the benefits of networking I Understand what telephony networking is I Identify the layers of the OSI reference model and know what part each one plays in networking I Discuss how the Internet communicates I Understand the basics of ATM networks I Apply knowledge of different networking components I Explain how network topologies influence planning decisions barrett02 9/21/04 4:18 AM Page 60 60 CHAPTER 2 Communications Network In today’s complex world, most companies have networks. In fact, most companies have a Web presence as well. A network can range from simply two computers that are linked together to the complexity of computers that can access data across continents. Networks are used to improve communi- cation between departments, foster customer relationships, and share data throughout the world. As a network administrator, it is your job to manage the network. To do this, you must understand the fundamental networking principles. Having this knowledge will help develop your planning and troubleshooting skills. This chapter provides you with those fundamental principles on which you will build knowledge and experience. It also focuses on the concept of a network, what makes it possible for devices to communicate, and what types of medium are used for communication. 2.1 Introducing Networking A network is a group of computers that can communicate with each other to share information. This can range, in its simplest form, from two com- puters in a home that are connected by one cable to the most complex net- work that includes many computers, cables, and devices spanning across continents.
    [Show full text]
  • Computer Networking 7.1 What Is Computer Networking?
    Page 1 of 7 Computer Networking 7.1 What Is Computer Networking? A computer network consists of several computers that are connected to one another using devices that allow them to communicate. Computer networks may be connected using network cables called Cat5 cables and network cards. Your network may also be wireless and connected using wireless routers. If your computer network is wireless, it would not require that they be connected using hardware. When the computers are connected via a computer network they are able to transmit files from one computer to another. These computers are also able to connect to the internet using one connection. What Are the Types of Computer Networks? There are several types of networks, such as a LAN(local area network), a CAN(Campus area network), MAN(metropolitan area network) and a VPN(virtual private network. A LAN is a network that is made up of computers that cover a small areas, such as a home network or a small office. The network can be connected using a router. A CAN network is a computer network that is made up of several LANS. This type of network is used on college campuses. A MAN computer network is made up of several CAN computer networks. This type of network would use routers and hubs to connect it. A VPN network does not use wires or cable to connect it. This type of connection is also secure and is mainly used in larger environments. How Are computer Networks Connected? Computer networks are connected using network interface cards(NIC), hubs, routers and bridges or switches.
    [Show full text]
  • Networks (ISDN): Implications for Future Global Communications
    NTIA Report 83.. 138 p'..:..: r·'·I·m'-'·.'··· e/-~·-·,~. 'r' 0'''· n"~' n··<···t·e- g"--- r"'a'< ·t··e/~~ S'--- e''''···r'~V''I~c·-···e-··~s:':''~,,-,.O.·-.• ~t"··a··~~··.I" A: .. I' . -"-: ..<-d···· --" . ·I' g_.•-.".':, I '. Networks (ISDN): Implications for Future Global Communications ITS S'taff ...,,-'O'C'G , , Mj+~, , \\nuI \ ~'~ •...........•.*......•.....<.•.•..•:.. x.'.• ' 6.. \ :A '" .,. ,_. ". .. ..•If} '-''-'.10' f U.S. DEPARTMENT OF COMMERCE Malcolm Baldrige, Secretary David J. Markey, Assistant Secretary for Oommunlcatlonss,nd Information September 1983 I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I PREFACE This report describes the Integrated Services Digital Network (ISDN) concepts and issues in terms understandable to persons not working directly in this technical area. It has been prepared by staff members from the Systems and Networks Division of the Institute for Telecommunication Sciences. These persons have been working directly in the field by conducting studies on ISDN and by contributing to organizations engaged in developing ISDN standards. iii TABLE OF CONTENTS Page LIST OF FIGURES vi LIST OF ACRONYMS viii 1. INTRODUCTION 2. WHY AN ISDN? 4 2.1 Merging of Two Technologies 4 2.2 Technology Advancements 6 2.3 Market Size 9 2.4 Users of Communications Services 11 3. TELECOMMUNICATIONS PRIMER 12 3.1 Basic Communication Concepts 14 3.2 Communication Systenl Elements 23 4.
    [Show full text]