You are on page 1of 21

TITLE PAGE

GATEWAY POLYTECNIC SAAPADE

DEPARTMENT OF COMPUTER ENGINEERING

MATH ASSIGNMENT

MTH411

BY

NWEBOYI SUNDAY 21010131010

OKEAGBA SESEDE FEYISAYO 21010131011

ABIOLA AZEEZS OLAMILAKAN 2101013012

SUBMITED TO

THE DEPARTMENT OF COMPUTER ENGINEERING TECHNOLOGY

SCHOOL OF ENGINEERING & ENVIRONMENTAL STUDIES THE


GATEWAY (ICT), POLYTECHNIC SAAPADE

OGUN STATE, NIGERIA.

IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF


HIGHER NATIONAL DIPLOMA (HND) IN COMPUTER ENGINEERING
TECHNOLOGY

i
JANUARY, 2023

CERTIFICATION

This is to certify that this is an approved project done and defended by; AKASE TERKUMA
THEOPHILUS with matric number: 21010131006

In partial fulfillment for the requirement of the award of degree in electrical/electronic engineering.

_________________________ ________________________

SUPERVISOR SIGNATURE AND DATE

__________________________ ________________________

HEAD OF DEPARTMENT SIGNATURE AND DATE

ii
DEDICATION

This seminar is dedicated to Him who is able to do exceedingly, abundantly above all that we ask
or imagine. To Him be all the glory.

iii
ACKNOWLEDGEMENT

First of all, I acknowledge the presence and power of God which propelled and strengthened me
throughout the period of writing this project.

I am most grateful and highly indebted to my supervisor, for his ceaseless, helpful, constructive
criticisms, encouragement and comments on this work.

My sincere thanks go to my parents for their tireless efforts and support towards the successful
completion of my studies.

iv
TABLE OF CONTENTS
TITLE PAGE................................................................................................................................................................ i
CERTIFICATION.........................................................................................................................................................ii
DEDICATION............................................................................................................................................................iii
ACKNOWLEDGEMENT.............................................................................................................................................iv
ABSTRACT...............................................................................................................................................................vii
CHAPTER ONE...........................................................................................................................................................1
1.0 Introduction....................................................................................................................................................1
1.1 Background.....................................................................................................................................................2
1.2Significance of The Report...............................................................................................................................2
1.3Aim of the research work................................................................................................................................2
CHAPTER TWO..........................................................................................................................................................3
Literature Review.....................................................................................................................................................3
2.1 History of the subscriber identity module (SIM).............................................................................................3
2.2 SIM Format.....................................................................................................................................................3
2.2.1 Full-size SIM.................................................................................................................................................4
2.2.2 Mini-SIM......................................................................................................................................................4
2.2.2 Mini-SIM......................................................................................................................................................4
2.2.3 Micro-SIM....................................................................................................................................................4
2.2.4 Nano-SIM.....................................................................................................................................................5
2.2.5 Embedded-SIM (eSIM).................................................................................................................................5
2.3 Device categories...........................................................................................................................................6
2.3.1 Handsets/smartphones...............................................................................................................................6
2.3.2 Machine-to-machine (M2M).......................................................................................................................6
2.3.3 Removable SIM with Remote Provisioning..................................................................................................7

v
CHAPTER THREE.......................................................................................................................................................8
3.0 The Design......................................................................................................................................................8
3.1 What is an eSIM..............................................................................................................................................8
3.2 How eSIM work..............................................................................................................................................8
3.2 M2M eSIM Architecture.................................................................................................................................9
3.3 KEY FEATURES OF eSIM..................................................................................................................................9
3.4Potential Impact of eSIM on IoT....................................................................................................................10
3.5 Applications and Use cases for eSIM............................................................................................................10
CHAPTER FOUR.......................................................................................................................................................12
4.0 Conclusion....................................................................................................................................................12
REFERENCES...........................................................................................................................................................13

vi
ABSTRACT
An eSIM (embedded-SIM) is a form of programmable SIM card that is embedded directly into a device.
Instead of an integrated circuit located on a removable universal integrated circuit card (UICC),
typically made of PVC, an eSIM consists of software installed onto an eUICC chip permanently attached
to a device.

Every GSM (Global System for Mobile Communications) phone, also called 2G mobile phone and every
UMTS (Universal Mobile Telecommunications System) phone, also called 3G mobile phone requires a
smart card to connect and function in the mobile network. This smart card is called SIM, which stands
for Subscriber Identity Module. In fact, this module contains the International Mobile Subscriber
Identity (IMSI) and credentials that are necessary for the identification and authentication of the
subscriber. Without the SIM the user will not be allowed to connect to themobile network and hence not
able to make or receive phone calls.

As a smart card the SIM is a tampered resistant microprocessor card with its own operating system,
storage and built-in security features that prevent unauthorized individual to access, retrieve, copy or
modify the subscriber IMSI and credentials. Abuses of subscriber’s account and fraudulent accesses to
the mobile network can hence be avoided. Furthermore, as a removable and autonomous module the
SIM introduces great flexibility since the user can easily move the SIM to other mobile phones or
replace a SIM with another one. So far, the smart card and its content, the SIM are bound together and
called SIM.

With the advances in wireless and storage technology, new demands have arisen. Because of
cumbersome task of opening machines and installing the removable SIM, the M2M applications are
designed with pre-installed SIM application. The M2M applications based on the cellular networks with
the ability of installing the user subscription have advantages and disadvantages for a certain
stakeholder.

This seminarshow the multiple alternative solutions to this installation and also describe the SIM
evolutions i.e. eUICC and soft SIM to give a comprehensive view of the SIM’s situation. The thesis also
presents the security assessment of these evolutions which are different with the current removable SIM.

vii
CHAPTER ONE
1.0 Introduction
In an IoT use case, eSIM refers to the software component and the ability to switch carrier/MNO
(mobile network operator) profiles over the air (OTA).

Understandably, the confusion comes from the “e” in eSIM as it refers to the “embedded” nature of the
physical SIM card.

A subscriber identity module or subscriber identification module (SIM), widely known as a SIM card, is
an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI)
number and its related key, which are used to identify and authenticate subscribers on mobile telephony
devices (such as mobile phones and computers).
It is also possible to store contact information on many SIM cards. SIM cards are always used on SM
phones; for CDMA phones, they are only needed for newer LTE-capable handsets.
SIM cards can also be used in satellite phones, smart watches, computers or cameras.

The SIM circuit is part of the function of a universal integrated circuit card (UICC) physical smart card,
which is usually made of PVC with embedded contacts and semiconductors. SIM cards are transferable
between different mobile devices. The first UICC smart cards were the size of credit and bank cards;
sizes were reduced several times over the years, usually keeping electrical contacts the same, so that a
larger card could be cut down to a smaller size.
A SIM card contains its unique serial number (ICCID), international mobile subscriber identity (IMSI)
number, security authentication and ciphering information, temporary information related to the local
network, a list of the services the user has access to, and two passwords: a personal identification
number (PIN) for ordinary use, and a personal unblocking code (PUC) for PIN unlocking.

1
1.1 Background
The SIM was initially specified by the European Telecommunications Standards Institute inthe
specification with the number TS 11.11. This specification describes the physical and logical behaviour
of the SIM. With the development of UMTS, the specification work was partially transferred to 3 PP. 3
PP is now responsible for the further development of applications like SIM (TS 51.011) and USIM (TS
31.102) and ETSI for the further development of the physical card UICC.

1.2Significance of The Report


A SIM card can be switched easily from one phone to another and this portability of data offers a
number of benefits. For example, a user that buys a new phone can install the current SIM card to
associate the new phone with the same number and user preferences as the old one. In another common
situation, if a phone's battery runs out of power, the user can easily install the card to another
subscriber's phone to borrow it without running up that user's minutes. Some vendors offer prepaid SIM
cards that can provide travelers with local numbers, as long as their cell phones are not locked to a
specific carrier.

1.3Aim of the research work

Since extract, modify, or insert content in the SIM module in the removable SIM and tamper resistant
devices are almost impossible for unauthorized user, hence the subscriber identity and credentials (e.g.,
secret key for the authentication) are very well protected and the fraud probability is very low. With the
original removable SIM the user’s IMSI and credentials are very well protected and with the newer
version of the authentication algorithms it is almost impossible to extract the secret key for
authentication.

2
CHAPTER TWO

Literature Review
2.1 History of the subscriber identity module (SIM)
The sim card was first invented and manufactured in Munich, by smart card maker Giesecke and
Devrient in 1991. The SIM card was originally designed was similar in size to a credit card. The primary
role of the SIM card was two folds, both of these benefits remain valid today:

1. Identity: the SIM card contains a unique reference number that identifies the SIM card and therefore
the subscription that accompanies that SIM card. The mobile network can recognise the reference
number and ensure that associated costs incurred are allocated correctly
2. Authentication: in order to ensure that the identity is valid, the mobile network uses a security
mechanism to allow access to the network. This is achieved by the network issuing a challenge (similar
to a security question) that only that particular SIM card can answer from the information it has stored in
its memory. Once validated, access to the network is granted.
Additionally, if the SIM card becomes damaged or the security compromised, it can easily be removed
and replaced with a new SIM card. Therefore, the secure connectivity can be restored without replacing
the entire handset. Similarly, if a consumer wishes to change network provider, they can do so through
replacing the relatively inexpensive SIM card rather than the entire handset (assuming the device is not
locked to a particular operator). The SIM card also brings secondary benefits for the end user:

1. Portability: as the identity is stored on the SIM card, it can easily be moved to a new device when the
consumer upgrades or replaces their handset.
2. Memory: the SIM card provides memory for additional services such as storing contact details/SMS.
As these are stored in the SIM card memory, they can be retained if the SIM card is moved to another
device. Over time, some of this functionality such as SMS storage and the address book has moved from
the SIM card to the device memory.

2.2 SIM Format


The physical SIM card itself has significantly reduced in size — driven by a combination of smaller
devices and the requirement to use the available space within a device for an increasingly complex set of
features and functionality. The 4FF SIM is the smallest possible size whilst retaining the ability for users

3
to confidently insert and remove them. At the same time, the SIM itself has developed to take on more
complex functions.

SIM cards have been made smaller over the years; functionality is independent of format. Full-size SIM
were followed by mini-SIM, micro-SIM, andnano-SIM. SIM cards are also made to embed in devices.

2.2.1 Full-size SIM

The full-size SIM (or 1FF, 1st form factor) was the first form factor to appear. It has the size of a credit
card (85.60 mm × 53.98 mm × 0.76 mm). Later smaller SIMs are often supplied embedded in a full-size
card from which they can be removed.

2.2.2 Mini-SIM
The mini-SIM (or 2FF) card has the same contact arrangement as the full-size SIM card and is normally
supplied within a full-size card carrier, attached by a number of linking pieces. This arrangement
(defined in ISO/IEC 7810 as ID-1/000) lets such a card be used in a device that requires a full-size card
– or in a device that requires a mini-SIM card, after breaking the linking pieces. As the full-size SIM is
no longer used, some suppliers refer to the mini-SIM as a "standard SIM" or "regular SIM".2.2.1 Full-
size SIM The full-size SIM (or 1FF, 1st form factor) was the first form factor to appear. It has the size of
a credit card (85.60 mm × 53.98 mm × 0.76 mm). Later smaller SIMs are often suppliedembedded in a
full-size card from which they can be removed.

2.2.2 Mini-SIM

The mini-SIM (or 2FF) card has the same contact arrangement as the full-size SIM card and is normally
supplied within a full-size card carrier, attached by a number of linking pieces. This arrangement
(defined in ISO/IEC 7810 as ID-1/000) lets such a card be used in a device that requires a full-size card
– or in a device that requires a mini-SIM card, after breaking the linking pieces. As the full-size SIM is
no longer used, some suppliers refer to the mini-SIM as a "standard SIM" or "regular SIM".

2.2.3 Micro-SIM

The micro-SIM (or 3FF) card has the same thickness and contact arrangements, but reduced length and
width as shown in the table above. The micro-SIM was introduced by the European

4
Telecommunications Standards Institute (ETSI) along with SCP, 3 PP (UTRAN/ ERAN), 3 PP2
(CDMA2000), ARIB, SM Association ( SMASCa and SMNA), lobalPlatform, Liberty Alliance, and the
Open Mobile Alliance (OMA) for the purpose of fitting into devices too small for a miniSIM card.

2.2.4 Nano-SIM

The nano-SIM (or 4FF) card was introduced on 11 October 2012, when mobile service providers in
various countries started to supply it for phones that supported the format. The nano-SIM measures 12.3
mm × 8.8 mm × 0.67 mm (0.484 in × 0.346 in × 0.026 in) and reduces the previous format to the contact
area while maintaining the existing contact arrangements. A small rim of isolating material is left around
the contact area to avoid short circuits with the socket. The nano-SIM is 0.67 mm (0.026 in) thick,
compared to the 0.76 mm(0.030 in) of its predecessor. 4FF can be put into adapters for use with devices
designed for 2FF or 3FF SIMs, and is made thinner for that purpose, and telephone companies give due
warning about this.The iPhone 5, released in September 2012, was the first device to use a nano-SIM
card, followed by other handsets.

2.2.5 Embedded-SIM (eSIM)

An embedded-SIM (eSIM) or embedded universal integrated circuit card (eUICC) is a form of


programmable SIM that is embedded directly into a device. The surface mount format provides the same
electrical interface as the full size, 2FF and 3FF SIM cards, but is soldered to a circuit board as part of
the manufacturing process. In M2M applications where there is no requirement to change the SIM card,
this avoids the requirement for a connector, improving reliability and security. An eSIM can be
provisioned remotely; end-users can add or remove operators without the need to physically swap a SIM
from the device

5
ESIM is a global specification by the SMA which enables remote SIM provisioning of any mobile
device, and SMA defines eSIM as the SIM for the next generation of connected consumer device, and
networking solution using eSIM technology can be widely applicable to various IoT scenarios, including
connected cars (smart rearview mirror, OBD, vehicle hotspot), AI translator, Mi-Fi device, smart
earphone, smart metering, tracker, DTU, bike-sharing, advertising player, and video surveillance
devices, etc.

Apple implemented eSIM support in its Apple Watch series 3 and second generationiPad Pro devices. In
October 2017, oogle unveiled the Pixel 2, which added eSIM support for use with its oogle Fi service.
One year later in September 2018, Apple released the iPhone XS and in October 2018 iPhone XR with
eSIMsupport. eSIM support on iPhone requires iOS 12.1 or later. In May 2019 oogle released the Pixel
3a and Pixel 3a XL with eSIM support for carriers other than oogle Fi.

2.3 Device categories


We will now look at the different device segments to understand how the current SIM deployments are
being used:

2.3.1 Handsets/smartphones

Handsets and Smartphones currently use a traditional SIM card model i.e. a physical SIM card that
stores a single operator profile. The SIM card itself can be removed from the device and placed into
another device, transferring the identity and authentication functionality.
Alternatively, the SIM can be swapped for a new SIM card in the original device (for example, if the
handset changes ownership or the SIM card becomes damaged).

2.3.2 Machine-to-machine (M2M)

Whilst many M2M devices use the traditional SIM card approach, M2M devices presentunique
challengesto the role of the traditional SIM card. The devices are often located acrossvery diverse,
unsupervisedlocations and subject to external influences such as weather (e.g. remote sensors / vending
machines), and temperature and vibration (e.g. automobiles).

In such cases the SIM card needs to be protected and kept in a secure part of the device where it will not
be damaged or open to theft.

6
Furthermore, the lifespan of M2M devices is often tens of years and, for various reasons, the owner may
wish (or be forced) to change the operator providing the cellular connectivity.
Replacing the SIM card would be impractical and expensive, for example:
1. Many devices in diverse geographical locations

2.The SIM card being embedded in a hard to reach, protected part of a vehicleThe SMA has worked
with leading operators and SIM hardware providers from around the world to develop a practical
solution to the unique challenges in the M2M market.
The resulting SMA Embedded SIM Specification4 enables a SIM card to be fully embedded in an M2M
device but also have Remote Provisioning functionality.
This specification ensures that the SIM card is protected from theft and external elements by being
physically integrated within the device. The Remote Provisioning aspect allows the mobile network
provider to be changed without removing the SIM (i.e. it cannot be removed from the device, but a user
can change to a new network provider if needed, orhold multiple operator profiles if the user needs to
swap between networks).
Initially designed for the automotive sector, the SMA Embedded SIM Specification has been widely
adopted and become the de-facto approach for embedded SIMs in M2M devices.

2.3.3 Removable SIM with Remote Provisioning

With the launch of the most recent iPad Air and iPad Mini models, Apple also introduced the Apple
SIM which uses Remote Provisioning, rather than the traditional SIM card approach.
It is important to note that the Apple SIM is a physical, removable SIM (in the same way that traditional
SIM’s can be removed from handsets or smartphones). This is not a ‘SoftSIM’ — a ‘Soft SIM’
wouldhave no hardware layer and all functions would be performed atthe software layer (more details of
whatis meant by the term Soft SIM can be found later in this report).
Apple SIM reduces the barriers for consumers to purchase and use cellular connectivity when the device
is purchased through non-operator retail. It could encourage consumers to purchase the, higher priced,
cellular enabled tablets (rather than the versions that only have Wi-Fi connectivity)

The consumer can purchase prepaid data packages from more than one operator for use at different
times or locations and then select which package to use through the device settings.

7
CHAPTER THREE
3.0 The Design
3.1 What is an eSIM
eSIMs go by several names including Soft SIM, Virtual SIM, Embedded SIM, Electronic SIM, or
Remote SIM, but they all refer to an Embedded Universal Integrated Circuit Card (eUICC) capable of
supporting multiple network carrier profiles virtually embedded into it.

Unlike the regular SIM card, eSIMs are Software re-programmable. This means you can change the
entire contents of the SIM, including the international mobile subscriber identity (IMSI) and network
carrier profiles, via software over the air, eradicating the need to swap SIM cards.

3.2 How eSIM work


A basic explanation of how eSIMs work is that the SIMs are deployed along with the device and the
user/manufacturer is provided with an interface through which they can remotely add, update, extend or
delete multiple network operators

For a technical description, however, according to the eSIM specifications by GSMA, there are two
main components to eSIMs: the embedded UICC (hardware) which is embedded in the device during
manufacturing and a Subscription Management platform (SM). The subscription Management platform
(SM) is made up of two key elements; the SM-SR (Subscription Management Secure Routing) and the
SM-DP (subscription Management Data Preparation).

During the manufacturing or deployment process, the manufacturer or vendor (MNO, M2M Device, or
Consumer electronics manufacturer, etc.) of the eUICC registers the SIMs with the SM-SR, which then
maintains a secure connection with the eUICC to manage subscriptions. Through the SM-SR, the eUICC
can be reached with commands from the vendor or SM-DP, which is responsible for formating the
profiles of MNOs into a format that is compatible with the eUICC.

To activate an MNO on the eUICC, a command, initiated one way (typically via barcode scanning) or
the other by the user, is sent by the MNO to the SM-DP, which processes the command and downloads
the MNO profile to the eUICC, while also providing an interface that allows the MNO to
enables/disables a profile.

There was some level of debate on the applications of eSIMs in the early days with organizations like
Motorola believing it was geared towards M2M industrial applications while organizations like Apple
believed there was no reason why it shouldn’t feature in consumer products. Presumably, as a result of
this, to create something that suits both applications, the consortium (GSMA) approved two
architectures for eSIMs;

8
3.2 M2M eSIM Architecture
Consumer Electronics eSIM Architecture

While both architectures support the reprogrammable features of eSIMs, the approach to realizing it
(among other things) is different in both stacks. For the Consumer electronics architecture, a client-
controlled model is implemented, such that, the end-user of the device has control over remote network
provisioning and management of operator profiles. For the M2M architecture, however, a server-
controlled model that allows remote provisioning and management of mobile network operators from a
backend infrastructure/Central server is implemented. This makes sense as human interaction on the
M2M level is reduced and the remote upgrades and changes are the key features that fit IoT use cases.

3.3 KEY FEATURES OF eSIM


Most people will definitely agree that the most appealing feature of eSIMs is the flexibility with which it
allows users to switch between MNOs without having to change physical hardware, thanks to its over-
the-air re-programmability, and its ability to navigate multiple profiles from different operators on the
same device. This, however, translates into several other features that affect (positively, I believe) the
device in a number of ways. Some of these features include;

1. Cost Reduction

From the cost of the hardware like the SIM Tray and its supporting circuits to the cost of the SIMs
themselves among others, the classical SIM Cards present a total cost that of ownership that is far
greater than eSIMs.

2. Interoperability

All accredited partners in the GSMA ecosystem are expected to comply with the released standards and
architecture, thus ensuring interoperability.

3. Small Form Factor

The shape, size, and need for an opening are requirements of classical SIM Cards that influences the
form factor of the device in which they are used. With the chip-like nature of eSIMs, about half the size
of Nano SIMs and don’t require a socket, designers will have more flexibility with the size and form
factor of devices.

4. Power Efficiency

Even though they implement cellular communication which is not very power-friendly, eSiMs operate
on less power compared to the Classical SIM Cards.

5. Security

9
One other obvious feature of eSIMs is their physical security. Having the chip embedded in the device
makes it nearly impossible to tamper with or remove for misuse. Asides this, a comprehensive security
accreditation scheme (SAS) is shipped along with the eSIM framework.

3.4Potential Impact of eSIM on IoT


While eSIMs are going to revolutionize everything about the telecommunication industry from
operations to service rendering, it will also have a significant impact on IoT.

There are three main areas of cellular IoT that can be potentially impacted byeSIMs;

1. Flexibility

This is probably the biggest problem with cellular IoT via classical SIM Cards. While the coverage via
cellular connectivity, in general, is vast, the quality of coverage by each MNO differs from location to
location. For this reason, to fully leverage the connectivity features of Cellular communications, users
have to go through the difficult and operationally intensive tasks of switching between SIM cards which
puts a limitation on IoT solutions. However, with eSIMs, IoT solution providers can switch device
profiles quickly and securely Over-the-air or even automate the process, so connectivity changes can be
implemented based on criteria like signal strength, tariffs, etc.

2. Scalability

Deploying Cellular IoT across multiple devices can be quite the hassle as sim managements could get
really complex quite fast as the number of devices increases. With the flexibility interoperability offered
by eSIMs, this can be better managed.

3. Reliability/Durability

Using a single SIM from the network provider with the largest coverage or Physically swapping SIM
cards for improved coverage, introduces reliability challenges. The provider with the largest coverage
area may not have coverage in your deployment location, and sim cards get damaged or fail during the
swapping process. With eSIMs and Over-the-air “SIM swaps” the system becomes more reliable and
durable as the mechanical design considerations for the device are simplified.

3.5 Applications and Use cases for eSIM


While the impact of eSIMs is expected across every IoT application area, some sectors are expected to
be huge beneficiaries. Some of these sectors include-

1. Automotive Industry

With the “connected car” Paradigm rapidly becoming mainstream, eSIMs have the potential to provide
the seamless in-car Connectivity needed to allow users to enjoy all the features of the vehicles. Asides
for connectivity, quick OTA updates could also potentially revolutionize how ownership transfer is
implemented.

10
2. Object Tracking

Sensors that track and monitor the conditions of different moving objects like cars, trucks, shipments,
etc. can be made smaller have longer battery life, and unlimited coverage area (Switching between
multiple MNOs), thanks to eSIMs.

Technically, every single IoT application that is better implemented with cellular IoT will experience
performance increase, thanks to eSIMs.

ADVANTAGES OF ESIM
1. It is impossible to damage or lose an esim
2. Its size is small
3. It is compatible with the sim
4. It allows you to have as many profiles as possible

DISADVANTAGES OF ESIM
1. It takes longer to restore on new phone, i.e it is not as easy to quickly switch devices
2. Users can easily be tracked by network providers (no where to hide since you can’t remove it
from a device)

11
CHAPTER FOUR
4.0 Conclusion
While there is still tons of work to do for eSIMs to become mainstream, it has the potential to build the
bridge that allows IoT solutions to fully leverage the massive coverage of cellular networks. With 5G
Networks in the works, and the slow rate with which different providers might attain maximum
coverage across different cities, eSIMs will definitely come in handy in ensuring IoT solutions leverages
unreservedly on the speed, it is poised to bring. Asides improving connectivity, eSIMs will also
introduce new business models that will contribute to how the development of IoT solutions is
approached.

12
REFERENCES
Floyd, T.L. (1997). SIM Digital Fundamental, Prentice-Hall International Inc, New Delhi, 6 thEdition.

Horowitz, P, Klinfield, H. (1995). The Art of Electronics. Cambridge University Press, London. Maxda,
F.F. (1984).Discrete SIM Component Cambridge University Press, London.

Richards C. (

13
1973). Electronic SIM and Data. Systems.Mc Graw-Hill, New York.

14

You might also like