Professional Documents
Culture Documents
Dr. Farid Farahmand, Ph.D, Central Connecticut State University Introduction Basic Ideas in Message Switching Message Switching Characteristics Message-Switched Networks Network Elements Store-and-Forward Switches Message-based Protocols and the OSI Model Message-Switched Networks and their Applications Store-and-Forward Networks 1 1 2 2 2 3 4 5 6 Message-Switched Protocols Performance of Message-Switched Networks Delay Performance Node Delay Comparison of Message, Packet, and Circuit Switching Conclusion Glossary References Further Reading 7 9 9 9 11 12 12 12 13
INTRODUCTION
A communication network consists of a collection of devices (or nodes) that wish to communicate and interconnect together. The primary objective in any communication network is simply moving information from one source to one or more destination nodes. Based on the techniques used to transfer data, communication networks can be categorized into broadcast and switched networks. In broadcast networks, data transmitted by one node is received by many, sometimes all, of the other nodes. In switched-communication networks, however, the data transferred from source to destination is routed through the switch nodes. The way in which the nodes switch data from one link to another as it is transmitted from source to destination node is referred to as a switching technique. Three common switching techniques are circuit switching, packet switching, and message switching. In circuit switching, the end-users are interconnected using dedicated paths. The most common example of a circuit-switched communications network is the plain old telephone service (POTS) network. One major issue with circuit switching is that it can be rather inefcient, particularly in data communications (Stallings, 2004). This is because in a circuit-switched network the channel capacity is dedicated for the entire duration of a connection, even if no information is being transferred. Furthermore, in a circuit-switched network, the actual time to setup and tear down the path may in fact be longer than the data transfer time between end-users. Refer to Chapter 73 for a complete discussion on circuit switching. In packet switching, data is divided into smaller units, called packets, and then transmitted through the network. The minimum length of the packet is determined by the network and varies from network to network. Packets are transported over the network between nodes. Each intermediate node queues the packet for a brief time while it determines the route the packet should take to reach the next node. For this reason, a packet-switched network is sometimes called hold-and-forward network (Tomasi, 2004). Please refer to Chapter 72 for a complete discussion on packet-switched networks.
Prior to advances in packet switching, message switching was introduced as an effective alternative to circuit switching. In message switching, end-users communicate by sending each other a message, which contains the entire data being delivered from the source to destination node. As a message is routed from its source to its destination, each intermediate switch within the network stores the entire message, providing a very reliable service. In fact, when congestion occurs or all network resources are occupied, rather than discarding the trafc, the message-switched network will store and delay the trafc until sufcient resources are available for successful delivery of the message (Davis, 1973). The message storing capability can also lead to reducing the cost of transmission; for example, messages can be delivered at night when transmission costs are typically lower. Message switching techniques were originally used in data communications. Early examples of message switching applications are paper tape relay systems and telex networks. Electronic mail (e-mail) and voice mail are also examples of message switching systems. Today, message switching is used in many networks, including ad hoc sensor networks, satellite communications networks, and military networks.
bid44608_ch70.indd 1
5/19/07 8:23:48 PM
MESSAGE SWITCHING
toward its destination. Hence, to ensure proper delivery, each intermediate switch may maintain a copy of the message until its delivery to the next hop is guaranteed. In case of message broadcasting, multiple copies may be stored for each individual destination node. The store-and-forward property of message-switched networks is different from queuing, in which messages are simply stored until their preceding messages are processed. With store-and-forward capability, a message will only be delivered if the next hop and the link connecting to it are both available. Otherwise, the message is stored indenitely. For example, consider a mail server that is disconnected from the network and cannot receive the messages directed to it. In this case, the intermediary server must store all messages until the mail server is connected and receives the e-mails. The store-and-forward technology is also different from admission control techniques implemented in packet-switched or circuitswitched networks. Using admission control, the data transmission can temporarily be delayed to avoid overprovisioning the resources. Hence, a message-switched network can also implement an admission control mechanism to reduce networks peak load. The message delivery in message-switched networks includes wrapping the entire information in a single message and transferring it from the source to the destination node. The message size has no upper bound; although some messages can be as small as a simple database query, others can be very large. For example, messages obtained from a meteorological database center can contain several million bytes of binary data. Practical limitations in storage devices and switches, however, can enforce limits on message length. Each message must be delivered with a header. The header often contains the message routing information, including the source and destination, priority level, expiration time. Figure 1 shows an example of a message datagram with possible information embedded in the message header. It is worth mentioning that while a message is being stored at the source or any other intermediary node in the network, it can be bundled or aggregated with other messages going to the next node. This is known as message interleaving. One important advantage of message interleaving is that it can reduce the amount of overhead generated in the network, resulting in higher link utilization.
regulation, and message storage when messages cannot be delivered. However, there are several drawbacks associated with message switching techniques. For example, since messages are entirely processed and stored indenitely at each intermediate node, switches require large storage capacity (Davis, 1973). In general, message-switched networks are relatively slow. This is because all messages must be entirely stored, processed, and retransmitted. This slow switching scheme may lead to poor performance, particularly in wide area networks (WAN). Although, using various scheduling techniques, time critical messages can be given higher transmission priority, it is always possible that a short message falls in line behind a very long one. Consequently, in message switching, messages initiated by different users can expect large delay variance. Large overall delay and high delay variations make message-switched networks less suitable for real-time and interactive applications, such as voice communications or multimedia games. Instead, message-switched networks are very attractive for supporting applications which can tolerate high delays, yet very little loss. Furthermore, message switching can be an alternative solution for networks where continuous end-to-end connectivity cannot be guaranteed, such as ad hoc sensor networks. A detailed discussion on advantages and disadvantages of message switching compared to circuit switching and packet switching can be found in Subsection Comparison of Message, Packet, and Circuit Switching in this chapter.
MESSAGE-SWITCHED NETWORKS
In this section we rst describe different elements of a message-switched network and examine their basic functionalities. Then we focus on store-and-forward switch node architecture and explain its building blocks.
Network Elements
Figure 2 shows a generic message-switched network allowing message transport from one end-user to another. This network consists of transmission links (channels), store-and-forward switch nodes, and end stations (Tomasi, 2004). The transmission links differ depending on the transmission technology and the physical transmission media over which the communications take place. The store-and-forward switch nodes provide end stations with access to transmission links and other switch nodes. They allow data storage and transport of messages from one node to another until they reach their destination
Message Expiration Time Message Arrival Time Message Id Error Control (e.g., Checksum or CRC)
bid44608_ch70.indd 2
5/19/07 8:23:49 PM
MESSAGE-SWITCHED NETWORKS
Terminal (1) Terminal (2)
SW A
Message
SW B
Store-&Forward Switch
SW C
SW D
Email Server
Mainframe
Figure 2: A message-switched network nodes. The end stations can be individual computer terminals, servers, and mainframes. Many networks may be equipped with message gateways, which can convert one message protocol to another. The input processing controller can also check for any errors in the message. Upon detection of any errors, it requests message retransmission. Examples of message errors include transmission errors and invalid addressing. Accepted messages with valid headers are stored in storage devices. Any stored message can be accessed or requested for retransmission using a specic id or serial number. After delivery, a copy of the message will be stored for future retransmission. These messages may be retained for many hours, days, or even weeks. The lookup table maintains the forwarding information and keeps track of which messages are waiting for delivery or have already been delivered. When the output phase begins, the output processing controller retrieves the proper message from the storage device and after assigning a header, passes it to the output buffer queue and line coder block for appropriate formatting and transmission. The output buffer queue can be used to control the message transmission rate. The output processing controller is also responsible for deciding how to forward the message to the next hop. In general, forwarding decisions used in message-switched networks are similar to routing schemes implemented in packet-switched networks. For example, forwarding decisions can be based on the least congested link, or shortest end-to-end path (Tanenbaum, 2002). A number of routing techniques in packet-switched networks are discussed in Chapter 72.
Input Buffer Queue Input Processing Controller
Store-and-Forward Switches
In general, a switch is a connectivity device that makes forwarding decisions. A store-and-forward switch performs forwarding functionalities similar to a switch in a packet-switched network. However, a store-and-forward switch forwards a message only if sufcient resources are available and the next hop is accepting new data. Hence, the switching strategy in store-and-forward switches is different from the common switching strategy used in packet-switched networks in which the incoming data is forwarded as soon as its destination address is determined. Figure 3 shows the basic functional blocks of a generic store-and-forward switch node (Shafritz, 1964). In the following paragraphs we briey outline the basic functionalities of each block. The message received by a store-and-forward switch is rst decoded and queued. When the input processing controller becomes available, it receives the message and analyzes its header for its destination, associated id, and priority level.
Message in Line Decoder RX
Statistics
Storage Devices
Message out
Line Coder TX
bid44608_ch70.indd 3
5/19/07 8:23:49 PM
MESSAGE SWITCHING
The exact characteristics of message-switched networks vary depending on features supported by the store-andforward switch nodes in the network. In the following paragraphs, we elaborate on storage requirements and other features commonly provided by store-and-forward switch nodes. The storage devices used in a store-and-forward switch node have large storage capacities. This is because messages delivered to each switch are often long and may be stored in the switch indenitely until sufcient resources are available in order to forward them to the next node. In cases where a message has to be delivered to multiple destination nodes, multiple copies of the messages may be stored for a potentially long duration. A copy of the transmitted message may be stored for possible retransmission until message delivery to the next hop is conrmed. Moreover, the storage capacity must be large enough to avoid any types of data overow and therefore data loss. The actual storage capacity of the switch is based on the desired performance and can be estimated through statistical analyses. Clearly, as the message arrival rate increases, the amount of data stored in the switch becomes greater, leading to larger storage requirement. Larger storage capacity, on the other hand, leads to requiring faster processors and more efcient search algorithms. Each store-and-forward switch node is typically programmed to detect, report, and record any fault conditions, including presence of excessive noise, system tampering, and link failure. Switch nodes must also become aware of each others status. For example, in order to notify its neighboring nodes that the node is alive, each node can periodically send each neighboring node the serial number of the last message it received from that node. A common capability of store-and-forward switches is supporting message priority. Based on parameters such as delay (or loss) tolerance or message length, every message can have a particular priority level. Messages with higher priority must be treated rst and forwarded in minimum time. Supporting message priority can add considerable complexity to message storage strategies, requiring separate listing for each priority group. Furthermore, the system must allow high-urgency messages to interrupt others during their transmission. The interrupted messages will be automatically retransmitted as soon as possible, with no further action by the sender. A system that does not support message priority can simply handle incoming messages on a rst-in-rst-out basis. A store-and-forward switch can also perform various statistical analysis, billing operations, and status reports. For example, it can examine each message for its number of characters in order to charge the sending party. It may also analyze message headers to gather statistical information on various network links. The status report can include the status of facilities, error statistics, and message counts. An important function of a store-and-forward switch is that it can intercept a message for various reasons. For example, if the destination node is temporarily unavailable, the switch can store the message until the destination
is working again. The switch can also reroute the message to other alternative recipients acquiring the same message. Message interception can also be considered for cases where the destination node has moved and it is no longer in its previous location. In such cases, assuming the system can locate the user, the message will be redirected to the new location. A store-and-forward switch that can also act as a message gateway is often called a transactional switch (Tomasi, 2004). In addition to storing messages and performing message routing, a transactional switch can change the message format and bit rate and then convert it to an entirely different form. Hence, through message reformatting, message switching can effectively allow for translating messages between dissimilar high-level applications and protocols.
bid44608_ch70.indd 4
5/19/07 8:23:49 PM
Message
Message
Figure 4: Store-and-forward technology can be implemented at different layers of the OSI model
In general, message-switched networks do not require an ofcial transport protocol. In such networks, each pair of interconnected store-and-forward switch node can negotiate the use of any desired transport protocol (or none at all), as long as the underlying communication is reliable. Because in message switching the entire message is delivered and stored at the next hop, message-based protocols can offer features beyond the transport layer. These protocols are typically application-aware and hence, they can operate in various transmission environments. For example, they are capable of tolerating temporary node unavailability or converting message format. Two common examples of message-based protocols are X.400 and SMTP, which will be discussed in Store-and-Forward Electronic Mail later in this chapter. The store-and-forward technology can also be implemented in middleware. Middleware is a software that provides a translation mechanism, interconnecting application software across a network, such as a server/ client network, and creating a single-system image. One category of middleware that utilizes store-and-forward technology and provides program-to-program communications by message passing is called Message-Oriented Middleware (MOM). We discuss MOM in Message-Based Client/Server Systems later in this chapter. Figure 4 shows that an incoming message into the store-and-forward switch node can be entirely reformatted prior to its retransmission. In many systems a copy of each message will be stored until its reception by the next hop is acknowledged. Message storage can be performed at different layers, including the network layer or application layer. Data-link and possibly other higher layer protocols are responsible to provide message status information. Note that middleware mediates between top layers of the OSI reference model.
bid44608_ch70.indd 5
5/19/07 8:23:50 PM
MESSAGE SWITCHING
codes (e.g., Morse code). The telex, short for teleprinter exchange, was introduced as a public service using teleprinters connected through automatic exchanges (telex switching facilities). Using the telex network a subscriber can type out the telex number or code for the called party, wait for an acknowledgment from the called machine, and then transmit. The printed message is often stored at the other end even if the called teleprinter is not staffed. Advancements in digital computers and digital storage devices made radical improvements in message switching systems. During the 60s and 70s, the store-andforward technology was largely promoted by Western Union, which traditionally was a message carrying organization. Due to long distances between cities in the United States, Western Union primarily was focusing on store-and-forward techniques to maximize line utilization in order to offer telex and telegraph, as well as variety of computer-based services. Today, although many major networks and systems are packet-switched or circuit switched networks, their delivery processes can be based on message switching. For example, in most electronic mail systems the delivery process is based on message switching, while the network is in fact either circuit-switched or packet-switched.
statement, and a subject line. A very important aspect of AUTODIN was providing highly secure communications. Hence, all external connections to the network from telephone lines were subject to strong encryption techniques. For the past several decades, AUTODIN has been regarded as a highly sophisticated message-switched network. It also had major contributions in advancing data communications. For example, in 1966 AUTODIN was one of the rst systems that allowed electronic text messages to be transferred between users on different computers. In 1982 an enhanced program, known as AUTODIN II, aiming to improve the system performance and security, was terminated in favor of using packet-based ARPANET technology. As of 2003, many AUTODIN switching sites have been shut down. The intention is to replace the old system with the Defense Message System (DMS). DMS is based on implementations of the OSI X.400 e-mail, which provides message services, through supporting multimedia messaging, directory services, and different grades of services, to all Department of Defense users.
Store-and-Forward Networks
Message switching technology has been the forerunner of todays advanced data communications. It set the trends for packet switching technology and more sophisticated networks of the twenty-rst century. In fact, many of the early data networks and communications services were actually built upon the message-switched concept and store-and-forward technology. In the remainder of this section, we rst discuss a few of such networks, which are considered as major breakthroughs in development of current complex data communications networks. Then, we examine some of the common communications protocols that are designed based on store-and-forward technology.
AUTODIN Network
The Automatic Digital Network (AUTODIN), developed in the mid-1960s, is one of the largest and most complex message switching systems. Using store-and-forward switching technology, AUTODIN provided a messagebased worldwide communication network for the U.S. military, handling the data communication needs for the Department of Defense and other Federal organizations (the alternative system to handle voice communications was AUTOVON) (FAS, 2003). AUTODIN has also been used by other major agencies including the NSA (National Security Agency), the DIA (Defense Intelligence Agency), and NATO (North Atlantic Treaty Organization). AUTODIN was originally considered as a dedicated backbone network serving primarily for secret data transmission. All switches and routers in the network were controlled by a system called the AUTODIN Switching Center. The system was designed to run at 2400 bits-per-second (bps); however, speeds up to 9600 bps were possible. The header of each message sent by AUTODIN included source, destination, security classication, priority
USENET Network
USENET (USEr NETwork) began in 1979 as a bulletin board between two universities in North Carolina. It is basically a public access network on the Internet and other TCP/IP-based networks that provides user news and group e-mail.
bid44608_ch70.indd 6
5/19/07 8:23:50 PM
USENET provides a set of protocols for generating, storing, retrieving, and exchanging news articles among a widely distributed user group. The format of news messages and e-mail messages are structurally the same. Hence, USENET permits news messages to be carried the same way as e-mail messages. The only difference is the additional header elds indicating which newsgroups (a repository of articles posted by the users) the message belongs to. USENET is considered as one of the rst peer-to-peer applications. In this case the peers are the servers and can be accessed by the users. A major advantage of USENET is that it reduces network trafc and eliminates the need to store a copy of each article on every subscribers system. This is done by putting all articles in a central database and allowing users to access the database to get the articles they need (Tanenbaum, 2002). Originally, USENET relied on a message exchange system called UUCP (UNIX-to-UNIX Copy Program). UUCP is a ood broadcast mechanism. Hosts send news articles they receive to other hosts, which in turn forward the news on to other hosts that they feed. Usually, a host receives duplicates of articles and must discard those duplicates. This can be a time-consuming process, resulting in waste of bandwidth. Today, message delivery in USENET is primarily handled by an Internet protocol called NNTP (network news transport protocol). NNTP uses an interactive command and response mechanism that lets hosts determine which articles are to be transmitted. A host acting as a client contacts a server host using NNTP, and then inquires if any new newsgroups have been created on any of the serving host systems.
hence reducing the number of packets being routed through the network (Fall, 2002). Aggregated messages are often stored, scheduled, and eventually forwarded toward the destination node. The other benet of implementing message switching is that it does not require pre-established end-to-end state of the network. Using store-and-forward technology, each node discovers its available neighboring nodes and forwards them the messages. Research in challenged networks is a relatively new area and is still being investigated.
Message-Switched Protocols
In this subsection we look at some of the most common protocols that are based on store-and-forward technology. As a result of their vast applications, we only focus on three specic systems: electronic mail systems, messagebased client/server systems, and wireless messaging systems.
Performance-Challenged Networks
Performance-challenged networks (or simply challenged networks) are interconnected networks in which end-toend latency, bandwidth asymmetry, and/or path stability are substantially worse compared to typical Internet environments. Such network environments are particularly common in space or ocean (acoustic underwater) communications, sensor networks, and military tactical communications, all of which lack an infrastructure. In challenged networks the signal propagation time is comparatively long as a result of either long physical separation of end nodes, as in space, or because of slow transmission speed, as in water. Consequently, the total transmission time in such networks can take literally hours or perhaps days. Protocols such as TCP/IP that expect acknowledgments may not be appropriate for such environments. This is mainly because too many timeouts can occur because of heavy congestions in the low capacity links. Another issue with challenged networks is path instability, which is generally the result of short node lifetime or mobility. For example, in sensor networks many of the sensors may run out of battery power after some period of time (Fall, 2003). One approach to support interconnecting challenged networks and their interoperability is called delay tolerance networking (DTN), which is based on message switching. The use of message switching for these networks allows all the small request/responses to be aggregated,
X.400. The main motivation in development of X.400 was to create a common standard that would allow different electronic mail systems to communicate together. X.400 (also referred to as message-oriented text interchange systems [MOTIS]) is a set of standards developed by ITU-T (the International Telecommunications UnionTelecommunications, formerly known as CCITT), which includes protocols dealing with message handling systems (MHS). These standards are designed to exchange messages (e-mails) between different store-and-forward servers and networks. In its original form, X.400 outlines a set of basic message-handling characteristics that establish functionalities including the following:
Store-and-forward delivery of messages to multiple recipients Conversion of message content to allow message transfer between dissimilar sending and receiving devices (fax, telex, PC) Delivery-time control
X.400 was rst published in 1984 (Red Book) and a substantially revised version, known as X.400/88, was published in 1988 (Blue Book). In 1992, new features and updates were added (White Book) (Betanov, 1992). Although X.400 was originally designed to accommodate OSI model transport services, today it is typically run over TCP/IP.
bid44608_ch70.indd 7
5/19/07 8:23:50 PM
MESSAGE SWITCHING
A network model dened by X.400 consists of a number of basic elements including user agent (UA), message transfer agent (MTA), and message store (MS), as shown in Figure 5. The UA is a program that allows the user to compose, send, and receive mail. The MTA is the electronic post ofce, accepting the e-mail from user agents and making sure it is delivered. MS, which often co-resides with MTA, maintains electronic mailboxes for each user. When a message is delivered, it may pass through multiple MTAs, each of which reads the message address and passes it to another message transfer agent, until the message reaches its destination. As indicated by Figure 5, messages can be transmitted directly by MTA to the UA recipient or, alternatively, they can be passed on to MS (the equivalent of a mailbox) which makes it possible to store the message. Incoming messages can be stored in these mailboxes until the user logs in. A collection of all message transfer agents cooperating to relay the messages until their destinations is called the message transfer system (MTS). Figure 5 also shows some of main protocols of X.400. These are P1, dening the communication between MTAs; P3, standardizing the connection between the user agent and MTA; P2 standardizing the (virtual) protocol between the UAs; and P7, describing the interaction between the user agent and message store (Tanenbaum, 2002). At its early development, X.400 was widely implemented, especially in Europe. However, as e-mails became more popular, many of X.400 features, such as structured addressing and central control, made it more complex for everyday usage. On the other hand, advances in the Internet-based e-mail protocols, in particular simple mail transfer protocol (SMTP), made X.400 less popular. Ironically, the same features which made X.400 less popular, made it attractive for special networks such as military and aviation. In fact, extended versions of X.400, such as military message handling systems (MMHS) and aviation message handling systems (AMHS), are still under research and development. These protocols employ integrated security capabilities, including message routing, password management, and provisioning of public key infrastructure (PKI).
Sender P2 UA P3 P7 MS MTA P1
Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
SMTP. Simple mail transfer protocol (SMTP) is considered an application-level protocol, which runs over packet-based TCP/IP. SMTP was developed by IETF (Internet Engineering Task Force) and has become the de facto standard for mail transfer on the Internet. Virtually all e-mail systems that send mail via the Internet use SMTP to send their messages. SMTP is used for forwarding messages from one host to the other and writes them to a message store (e.g., mbox or Maildir). However, SMTP does not provide the functionality of allowing users to retrieve mail. The post ofce protocol (POP) has been developed for retrieving messages from the massage store. Although SMTP is the most prevalent of the e-mail protocols, it lacks some of the rich features of X.400. A primary weakness of SMTP is the lack of support for non-text messages. Multipurpose Internet mail extensions (MIME) has been introduced to supplement SMTP allowing the encapsulation of multimedia (non-text) messages inside of a standard SMTP message (Parker, 2002). X.400 and SMTP have similar features but also unique features in themselves. Generally speaking, X.400 is a more complex protocol and it makes it harder for users to fake e-mail addresses and contents, compared with the situation in SMTP. For a complete discussion on SMTP protocol, please refer to Chapter 88.
UA
P3 MTA MTS
P7 MS MTA P1
User Agent (UA) Message Transfer Agent (MTA) Message Store (MS) Message Transfer System (MTS)
bid44608_ch70.indd 8
5/19/07 8:23:51 PM
taking message from queues. Note that the queue can be a part of the client or a dedicated server. Message storage and queuing can be persistent (logged on disk) or nonpersistent (in memory). Persistent messages are slower but they can be recovered in case of power failures. The message ow in MOM messaging products can have different types, including send-and-pray (no response about the message is required), send-and-nay (a response is required if there is something wrong with the message), and send-and-say (response is mandatory).
satellites, as opposed to communications between a single satellite and Earth stations (Charles, 1999). Message switching is also being considered for interplanetary networks, a high-bandwidth infrastructure designed to link Earths Internet to other parts of our solar system. Research suggests that store-and-forward technology can also enhance the wireless range of low-cost short-range technologies, such as WiFi (IEEE 802.11). One approach is simply relaying the data between multiple wireless devices over long distance. A more costeffective approach is to transmit data over short pointto-point links between mobile storage devices called mobile access points (MAP). Through the use of lowcost WiFi radio transceivers, the data carried by the MAP is automatically and wirelessly transferred at highbandwidth for each point-to-point connection (Pentland, 2002). The motivation in utilizing this approach is providing a very low-cost and affordable solution to resolve the last mile connectivity problem, particularly in poor rural areas.
Delay Performance
Figure 6 depicts the transmission of a message across four nodes. Three types of delays can be identied on the diagram: (a) propagation delaythe time it takes a signal to propagate from one node to the next; (b) transmission delaythe time it takes for a transmitter to send out a message (e.g., it takes 0.1 sec. to transmit a 10,000 bit message onto a 100 kbps line); (c) node delaythe time it takes for a node to perform the necessary processing as it switches data plus the message storage time. Hence, the total delay will be the sum of all propagation and transmission delays at each node plus the sum of node delays at each switch node (Rosner, 1982). As Figure 6 indicates, prior to retransmission, the entire message must be received at each switch node. This results in a large end-to-end delay, particularly if the message size is very large. In fact, under heavy load, when the node delay is not negligible, the total delay using message switching can be signicantly longer than for circuit switching, which requires time to setup and tear-down a connection.
Node Delay
An important factor impacting node delay is unavailability of the next hop or the destination node. The store-andforward switches in a message-switched network avoid repeated attempts to send messages to the next hop. Hence, if the next node is not available, the message retransmission is simply delayed. Clearly, as the total number of messages in the network increases, the average node delay through the network will become longer until no storage resources are available and message dropping occurs. This is illustrated in Figure 7a.
bid44608_ch70.indd 9
5/19/07 8:23:51 PM
10
MESSAGE SWITCHING
An Example: Given: L (Link length) = 10 Km M (Message size) = 1 M Byte H (Header size) = 32 Byte C (Link rate) = 320 kbps S (Prop. speed) = 200 Km/s Dn(i) (Node (i) delay) = 0 s Calculated: Dp (Prop. delay) = L/S = 0.05 s Dt (Trans. delay = (M + H)/C = 25.001 s DT (Total delay) = 3(Dt + Dp) + Dn(i) = 75.153 s
i
Terminal (1) Dt
Me ssa ge
SW A
SW B
Terminal (2)
Dp
Dn (A) DT
Me ssa ge
Dn(B)
Me
ssa ge
Time
Figure 6: Event timing diagram in message-switched networks (the example assumes all the link speeds and lengths are the same; node delays are assumed to be negligible)
Peak Load Spread due to Storage Total available network resources Network Load (A)
1
1- Traffic load into the network 2- Traffic load delivered through the network
Figure 7: (a) Delay in message-switched networks as the load increases; (b) trafc characteristic as a result of store-and-forward switches result is an increase in the message delivery time through the network. Another way of looking at a network with store-andforward switches is to regard it as a large distributed set of storage facilities, which gradually ll as the load on the network increases. Consequently, the peak load is shifted in time by an amount depending on the available storage (Davis, 1973). Figure 7b illustrates this point by showing how a peak load is reduced, but at the expense of being delayed. The area under each of the two curves represents the total number of messages delivered. Clearly, this area will be the same for both curves.
Another important factor affecting the node delay in a store-and-forward switch is network congestion. That is the case where switches cannot deliver as fast as messages are arriving. When congestion occurs, the system continues to accept new messages, as long as its storage capacity allows. In message switching new messages will be stored until free resources are available and the delivery is ensured; hence, no message blocking occurs as long as sufcient storage capacity is available. As the load of the network increases, more messages will have to wait for available processing resources and free links. The
bid44608_ch70.indd 10
5/19/07 8:23:51 PM
11
any required line code, transmission speed, or protocol conversions between incompatible nodes. Therefore, message switching can be a potential solution for less robust communication environments. In circuit switching, protocol conversion is only possible through protocol gateways. In message-switched networks, unlike circuit switching, simultaneous availability of sender and receiver is not required and the network can store the message pending the availability of the receiver. Moreover, features such as broadcasting, data auditing, and data rerouting can be supported by message-switched networks much more easily and typically require no major architectural modications. The difference between message switching and packet switching begins with the characteristics of messages and packets themselves. Messages are units of information with unrestricted lengths, whereas packets have maximum length size. Furthermore, in a message-switched network the network is responsible for the message and typically no responses or feedbacks exist. Consequently, in message switching, rather than minimizing transit time of the message, its guaranteed delivery is emphasized. On the other hand, packet-switched networks aim to deliver packets with minimum delay and do not hold packets for delayed delivery. Table 1 compares the main characteristics of message, packet, and circuit-switching technologies. Figure 8 illustrates the transmission of data across four nodes using circuit-switched and packet-switched networks. An important characteristic of circuit switching
Table 1: Comparison of Message, Packet, and Circuit Switching (Stallings, 2004; Martin, 1985) Circuit-Switched Networks Communication is performed through a dedicated path. Provides real-time or continuous transmission of data. No data storing is required. The switch path is established for the entire connection time. For small messages, the data transmission time is negligible compared to the time required to setup and tear-down the connection. The connection is blocked if the end-user is busy or not available. Once the connection starts, no blocking may occur. As the network load increases, more blocking can occur. Message-Switched Networks No dedicated path exists. Too slow for real-time or interactive data transmission. Messages are stored for later retrieval. The route is established for each message. The message delivery time can be substantially long. Packet-Switched Networks No dedicated path exists. Provides near real-time data transmission. Packets are queued for delivery; they are not stored. The route is established for each packet. The packet delivery time is very short.
No message blocking can occur as long as the storage capacity is sufciently large. As the load increases, messages on average experience longer delivery delay. Messages have no theoretical maximum length and can be very long.
Packet blocking can occur, however, the blocked packets will be retransmitted to the end-user. As the load increases, packets on average experience longer queuing delay, although still very short compared to message switching. Packets have a maximum length.
bid44608_ch70.indd 11
5/19/07 8:23:51 PM
12
Terminal (1) SW A SW B
MESSAGE SWITCHING
Terminal (2) Terminal (1) SW A SW B Terminal (2)
Dp
Dn Dn Accept Signal
Dp
Packe t Packe t Packe t
Packe
t Packe t Packe t
DT
Dt
DT
Message
Time
Terminate Signal
Time
(A)
(B)
Figure 8: Event timing diagram in (a) a circuit-switched network and (b) a packet-switched network; we assume no loss of data occurs
is the need to setup an end-to-end path. During this time interval (setup time), depicted in Figure 8a, the system is ensuring path availability. In packet switching, shown in Figure 8b, no physical path is established in advance between sender and receiver. Hence, unlike message switching (Figure 6), each node along the route may begin transmission of a packet as soon as it arrives.
CONCLUSION
In this chapter we examined the basic concepts of messageswitched networks. We surveyed their advantages and disadvantages and demonstrated their applications. We also described different elements of a message-switched network and examined their basic functionalities. Although packet switching is becoming the dominant switching scheme, message switching is still considered for many dedicated networks.
GLOSSARY
ARPANET: The Advanced Research Project Agency Network created by the U.S. Department of Defense. This organization is credited with creating the Internet in 1969. CCITT: Short for Comit Consultatif International Tlphonique et Tlgraphique, an organization based in Geneva, Switzerland, that sets international communications standards. CCITT changed its name to International Telecommunications Union (ITU), the parent organization, on March 1, 1993. Datagram: A sequence of bytes that constitutes the unit of transmission in the network layer. Exchange: A room or building equipped with manual or automatic switching equipments that can interconnect incoming communication lines as required.
IETF: Internet Engineering Task Force is a large, open international community of network designers, operators, vendors, and researchers, which sets standards for the Internet. It is also responsible for much of the work done on TCP/IP. Peer-to-Peer Architecture (P2P): It is a type of network architecture in which each workstation has equivalent capabilities and responsibilities. Protocol: A formal and pre-agreed set of rules that govern the communications between two or more entities. The protocol determines the meaning of specic values occurring in specic positions in the stream, the type of error checking to be used, the data compression method, how the sender will indicate that it has nished sending a message, and how the receiver will indicate that it has received a message. Teleprinter: A typewriter-like terminal with a keyboard and built-in printer. It was used to communicate typed messages between terminals through a simple pointto-point electrical communication channel, often just a pair of wire. A teleprinter terminal is also called teletype or TTY machine. Telegram: A message transmitted by telegraph system.
REFERENCES
Stallings, William. 2004. Data and Computer Communications, 7th ed. Upper Saddle River, NJ: Prentice Hall. Tomasi, Wayne. 2004. Introduction to Data Communications and Networking, 1st ed.. Upper Saddle River, NJ: Prentice Hall. Davis, Donald Watts and Derek Leslie Barber. 1973. Communication Networks for Computers. New York: John Wiley & Sons. Tanenbaum, Andrew S. 2002. Computer Networks, 4th ed. New York: Prentice Hall.
bid44608_ch70.indd 12
5/19/07 8:23:52 PM
FURTHER READING
13
Shafritz, Arnold B. 1964. The use of computers in message switching networks. Proceedings of the 1964 19th ACM national conference pp. 142.301142.306. Federation of American Scientists. 2003. Automatic Digital Network (AUTODIN). http://www.fas.org (accessed March 1, 2006). Martin, James. 1985. Telecommunications and the Computer. Englewood Cliffs, NJ: Prentice Hall. Bush, David. 2003. The AFTN Message Switch Case Study. http://www.ascolto.co.uk/Resources/ (accessed February 1, 2006). Fall, Kevin. 2003. A delay tolerant networking architecture for challenged Internets. Proc. SIGCOMM 2003. August 2529, 2003. Pages: 2734. Fall, Kevin. 2002. A message-switched architecture for challenged Internets. http://www.intel-research.net/ Publications/Berkeley/120520021026_66.pdf (accessed December 1, 2006). Middleware Resource Center. 2004. http://www. middleware.org/ (accessed December 1, 2006). Betanov, Cemil. 1992. Introduction to X.400. Norwood, MA: Artech House. Parker, Tim, and Karanjit B. Siyan. 2002. TCP/IP Unleashed (Unleashed), 3rd ed. Indianapolis, IN: Sams. Taylor, Mark, Mohsen Banan, and William Waung. 1996. Internetwork Mobility: The CDPD Approach. Upper Saddle River, NJ: Prentice Hall. Zhao, Feng, and Leonidas Guibas. 2005. Wireless Sensor Networks: An Information Processing Approach. San Francisco, CA: Morgan Kaufmann. Charles, John. 1999. Interplanetary Network Aims for the Stars. IEEE Computer Society, 32(9):168, 21. Pentland, Alex (Sandy), Richard Fletcher, and Amir A. Hasson. 2002. A Road to Universal Broadband Connectivity. http://www.itu.int/council/wsis/080_Annex4. pdf (accessed February 1, 2006). Rosner, Roy, D. 1981. Packet Switching. Belmont, CA: Lifetime Learning Pub. MobileIN Web Resources. 2004. http://www.mobilein. com /sms.htm (accessed January 1, 2007).
1960s and 1970s. Several comprehensive discussions on these topics are found in Davis (1973) and Martin (1985). A basic analytical model for a message-switched network in terms of data loss and delay is provided by Rosner (1982). Stallings (2004), Tomasi (2004), and Martin (1985) offer a list of advantages and disadvantages of message switching and compare the performance between message, packet, and circuit switching. One of the rst detailed tutorials on store-and-forward switch node functionalities can be found in Shafritz (1964). Routing techniques in message-switched and packetswitched networks are very similar. Various routing techniques are described in Tanenbaum (2002). Examples of message-switched networks, including SITA and AUTODIN, along with detailed discussions of their technical specications and evolutions, are provided in Martin (1985). FAS (2003) is specically dedicated to the history of AUTODIN. Bush (2003) offers background information on AFTN. Introductory information about USENET, including its commands and protocols, can be found in Tanenbaum (2002). Betanov (1992) and Parker (2002) offer a comprehensive discussion on X.400 and SMTP protocols and their differences. More information about middleware and MOM can be found in MRC (2004). Recent investigation on implementing message switching in challenged networks and satellite communications can be found in Fall (2003), Fall (2002), and Charles (1999). More information regarding the paging systems and wireless sensor networks can be found in Taylor (1996) and Zhao (2005), respectively. A number of books about short message services are listed in MWR (2004). Moreover, an interesting work demonstrating how storeand-forward technology can be used to provide a lowcost solution to resolve the last mile continuity problem in rural areas can be found in Pentland (2002).MessageSwitched Networks
FURTHER READING
Many of the original publications on message switching and store-and-forward technology belong to early
bid44608_ch70.indd 13
5/19/07 8:23:52 PM