Tags

, ,

In this chapter we assume that the network under consideration is placed in a black box in the sense that our only access to it is through its terminals.

(Behrouz Peikari, Fundamentals of Network Analysis and Synthesis 2.1)

Advertisements