Figure 2: A circular buffer is used to enable trick operations.

Back to Article