What did the Romans ever do for us? Packet switching...

And the railways, morse code. Sort of

HP ProLiant Gen8: Integrated lifecycle automation

Feature These days, it would be hard to find anyone who doesn't take networking for granted given the ubiquity of the Internet. Yet without some clever coding and data management techniques the Internet would crawl, if it worked at all. Digital video guru and IT author John Watkinson examines the various applications for networks and gets into the noughts and ones of what we have today and what the future may bring.

Morse code relies on the statistics of English. The most common letters are E and T, denoted by a single dot and a single dash respectively. Compare that with J, Q, Y and Z, which are uncommon and get long patterns. Sending languages other than English in Morse code may be unrewarding.

Networks came in to being for the wielding of political power. The road network created by the Roman Empire was probably the first example that showed any scientific input. The roads were dead straight wherever possible and it was found that a horse pulling a light carriage was faster than one carrying a rider. A map of Great Britain still shows political main roads radiating from London and a scarcity of circumferential routes.

Morse code relies on the statistics of English. The most common letters are E and T, denoted by a single dot and a single dash respectively. Compare that with J, Q, Y and Z, which are uncommon and get long patterns. Sending languages other than English in Morse code may be unrewarding.

The next generation of network was the railway, whose requirements for signalling and timekeeping were met by emerging telegraph technology that led to the changeover to the country-wide use of Greenwich Mean Time rather than local solar time from sundials. The telegraph also led to an early example of compression. As the adjacent image shows, Morse code is a variable length binary code in which the most common letters in English text are allocated the shortest symbols. The principle is still in use, in, for example, MPEG coding.

It is hard to give a brief definition of a network. One of the identifying features is that it is a shared and distributed resource. Sharing and distribution has benefits and drawbacks and the success of networks illustrates that the benefits by and large outweigh the drawbacks. Etymologically networks share the same roots as fishing nets. The catch from fishing nets is shared and a broken strand does not stop the whole net working.

Suppose that two people need to communicate occasionally. They can do that with a single piece of wire between them which lies unused a lot of the time. That this is not a scalable solution can be seen by considering instead 16 people. Each one must radiate 15 lengths of wire that lie unused even more of the time. The traditional telephone networks overcame that problem by using less wire that was shared and used more often. The cost for each person to be connected to a shared network is clearly less.

BT Network Records database

It's a wired world: BT Network Records is PDF database showing every access point in the country
Click for a larger image

The down side is that the shared system assumes diversity, which is the distribution of demand. It could not necessarily allow eight simultaneous conversations. The up side is that if the network was intelligently laid out, it would not be crippled by single point failures because there could be more than one connection between two points; so called redundancy or fault tolerance.

Different resources can be shared in a network. In the traditional telephone it was communication, whereas in an electricity system it is power. The UK National Grid is a true shared and distributed network with redundancy that comfortably pre-dates all IT networks. It was put to the test during WWII and contributed to the country’s ability to function despite heavy bombing.

In today’s different world that same grid continues to work well when supplanted by distributed inputs from photo-voltaics and wind power. It is hardly surprising that the Internet has its roots in networks developed for the US military that were also required literally to be bomb-proof. But then the whole of IT has its roots in military requirements, just as aviation does.

GEC PABX 3 switchboard and operator

Network switching the old fashioned way
Source: BritishTelephones.com

Whilst the traditional telephone used analogue signals, the development of digital technology led to methods to send data over communication channels. The hardware, or physical layer, could be copper, optical fibre or a microwave link. It was found that optical fibres have a number of advantages for long distance data transmission. They neither cause nor suffer from electrical interference and can thus be run alongside railway tracks and suspended with electricity supply cables.

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story


Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.