Feeds

What did the Romans ever do for us? Packet switching...

And the railways, morse code. Sort of

The essential guide to IT transformation

Crisp packets

Packet switching makes better use of the shared resource. A packet of data carries with it a header that denotes its destination. The network does not predetermine the entire path the packet will take. Instead any node in the network that receives a packet simply routes the packet in a direction that gets it closer to that destination. This is known as a connectionless protocol.

Network patchbay ports

Digital networking still needs patchbays

In a given hop the packet would use the same link as innumerable other packets, but at the next node or switch the packets would go their separate ways. The packets neither know nor care how a given hop is implemented. There is strong analogy with the use of containers for delivery of goods. A given container may find itself on a ship, a train or a truck in the course of its journey.

Using self-routing packets, the network only has to make simple local decisions, such as “Do I route this packet this way or that way” on the basis that one direction gets the packet to its destination sooner than another. In the case of a link failure the device at the head of the failed link would simply route incoming packets onto the next best route. In the case of link congestion some packets might also be so diverted. Essentially when a packet sets off, it is not known how it is going to get to its destination, anymore than a vehicle setting off on a road journey knows if it will meet a diversion.

The greatest efficiency is obtained when the packets have exactly the same size. A data link then becomes a time-multiplex of packets which all take the same time to transmit and so can easily be separated on receipt. A data file can be broken into packets for transmission and re-assembled on receipt. That re-assembly is assisted by a further code in the header that is a contiguous count of the packet number in the file. As packets do not necessarily take the same route they will not necessarily arrive in the same order and the sequence code allows them to be re-ordered. Missing packets can also be detected.

The action to be taken in the case of a missing packet depends on how time-critical the message is. In many cases a re-transmit of the missing packet may be enough. If the application does not allow time for re-transmission then the packets must be protected by forward error correction (FEC) that allows a lost packet to be re-constructed from the adjacent packets that did arrive. Without the ability to transmit error-free data the Internet would be a complete flop. You could forget software downloads and updates. And MPEG coding relies on error-free transmission, so no YouTube either.

Optical profusion

One of the most significant developments in optical communications was the single mode fibre. The illustration below shows that earlier fibres worked by bouncing the light pulses internally within the fibre. The reflections were not well controlled, with the result that some light travelled nearly parallel to the axis of the fibre and arrived soonest, whereas some light reflected many times on an oblique path and arrived later. This spread of propagation times due to multiple modes of propagation led to sharp transmitted edges between bits becoming indistinct at the receiver, which set a limit on the length of the link.
Optical fibre propagation

Early optical fibres allowed the light to bounce around inside (a) so that the effective distance travelled was not constant. This had the effect of smearing sharp edges in the signal. Single mode fibres (b) overcome that problem as the light can only take one route

In single mode fibre, the diameter of the glass fibre is so small in comparison to the wavelength of the light that the only propagation mode that can take place is that of a plane wave front travelling parallel to the axis. With only one propagation mode, the smearing of pulse edges is dramatically reduced. Clearly this represents the ultimate communication medium and it is difficult to see what would improve on it. The final flourish is the use of multiple light sources having different wavelengths sharing the same fibre. This is known as WDM or wavelength division multiplexing.

Boost IT visibility and business value

Next page: Reading the signals

More from The Register

next story
Pay to play: The hidden cost of software defined everything
Enter credit card details if you want that system you bought to actually be useful
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
HP busts out new ProLiant Gen9 servers
Think those are cool? Wait till you get a load of our racks
Silicon Valley jolted by magnitude 6.1 quake – its biggest in 25 years
Did the earth move for you at VMworld – oh, OK. It just did. A lot
VMware's high-wire balancing act: EVO might drag us ALL down
Get it right, EMC, or there'll be STORAGE CIVIL WAR. Mark my words
Forrester says it's time to give up on physical storage arrays
The physical/virtual storage tipping point may just have arrived
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.