Figure 2:
A circular buffer is used to enable trick operations.
Back to Article