Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-v5vhk Total loading time: 0 Render date: 2024-06-27T17:23:15.816Z Has data issue: false hasContentIssue false

P - Packet switching and circuit switching to Public key-private key

Published online by Cambridge University Press:  17 May 2010

Robert Plant
Affiliation:
University of Miami
Stephen Murrell
Affiliation:
University of Miami
Get access

Summary

Foundation concept: Networks.

Overview

The standard model for a voice telephone system is a circuit switching network. When two users or end-stations wish to communicate, a direct connection must be made between them, and dedicated to that call for its duration. The connection may be through copper wires, fiber-optic cables, or even radio or microwave transmissions. It may pass though any number of switching stations, staffed by human operators with plug-boards, or electronically operated. It is even possible, using frequency shifting, for many conversations to be carried by the same wire at the same time. The key concept is that a complete connection must be made, then the conversation can happen, and then the connection may be dismantled.

Circuit switching allows very simple telephony equipment built on nineteenth-century technology to operate effectively (the first telephone exchange was working in 1877), but it does not allow very efficient use of the high-cost infrastructure (long-distance cables and transmitters).

The alternative is a Packet-switching network, and requires that all communications are in digital form. In a packetswitched network, every end-station has a permanent connection to at least one switching station; each switching station has a number of permanent connections to other switching stations. The connectivity does not change during use: connections are not made before data is transmitted or broken thereafter; there is a path (perhaps a very long path, through dozens of switching stations) from any end-station to any other.

Type
Chapter
Information
An Executive's Guide to Information Technology
Principles, Business Models, and Terminology
, pp. 250 - 276
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Peterson, L. and Davie, B. (2003). Computer Networks: A Systems Approach (San Francisco, CA, Morgan Kaufmann).Google Scholar
Associated terminology: IP (internet protocol), Voice over IP.
Wilkinson, B. and Allen, M. (2004). Parallel Programming: Techniques and Applications Using Networked Workstations and Parallel Computers (Englewood Cliffs, NJ, Prentice-Hall).Google Scholar
I. Foster (1995). Designing and Building Parallel Programs (New York, Addison-Wesley).
Gara, A. M.Blumrich, A., Chen, D.et al., “Overview of the Blue Gene/L system architecture,” IBM Journal of Research and Development49, 195–213.
Associated terminology: Algorithm, Complexity.
Smith, R. (2001). Authentication: From Passwords to Public Keys (New York, Addison-Wesley).Google Scholar
Associated terminology: Encryption, Hacking, Cracking.
http://www.wipo.int.
http://www.uspto.gov.
http://www.european-patent-office.org.
http://www.patent.gov.uk/.
http://www.jpo.go.jp/.
http://www.sipo.gov.cn.
Brooks, F. (1995). The Mythical Man-Month: Essays on Software Engineering (New York, Addison-Wesley).Google Scholar
Boehm, B. (1981). Software Engineering Economics (Englewood Cliffs, NJ, Prentice-Hall).Google Scholar
Boehm, B. (2000). Software Cost Estimation with COCOMO-II (Englewood Cliffs, NJ, Prentice-Hall).
Associated terminology: Software development.
Whitman, M. and Mattord, H. (2004). Principles of Information Security (Boston, MA, Course Technology).Google Scholar
Peterson, L. and Davie, B. (2003). Computer Networks: A Systems Approach (San Francisco, CA, Morgan Kaufmann).Google Scholar
Associated terminology: Cracking, Hacking, Law cross-reference.
Groth, D. (2003). A+ Complete (Hoboken, NJ, Sybex–John Wiley and Sons).Google Scholar
Gralla, P. (2004). How the Internet Works (Indianapolis, IN, Que).Google Scholar
Peterson, L. and Davie, B. (2003). Computer Networks: A Systems Approach (San Francisco, CA, Morgan Kaufmann).Google Scholar
Associated terminology: Network devices, Cables and connectors, TCP/IP.
Solove, D. and Rotenberg, M. (2003). Information Privacy Law (New York, Apsen).Google Scholar
Rotenberg, M. (2003). Privacy Law Sourcebook 2003 (Washington, DC, Electronic Privacy Information Center).Google Scholar
5 USC §522a (2000).
Associated terminology: Database, Law cross-reference.
Solove, D. and Rotenberg, M. (2003). Information Privacy Law (New York, Apsen).Google Scholar
Rotenberg, M. (2003). Privacy Law Sourcebook 2003 (Washington, DC, Electronic Privacy Information Center).Google Scholar
Associated terminology: Encryption, ISP.
Wexelblat, R. (1981). History of Programming Languages, Volume 1 (New York, Elsevier).Google Scholar
Bergin, T., Gibson, R., and Gordon, P. (1986). History of Programming Languages, Volume 2 (New York, Addison-Wesley).Google Scholar
Memo: “Command, Control, Communications and Intelligence,” Assistant Secretary of Defense, 6000 Defense, Pentagon, Washington D. C. 20301–6000 April 29, 1997.
Associated terminology: Compiler, C++, Java, Fortran, Cobol, Logic programming.
Gralla, P. (2004). How the Internet Works (Indianapolis, IN, Que).Google Scholar
Peterson, L. and Davie, B. (2003). Computer Networks: A Systems Approach (San Francisco, CA, Morgan Kaufmann).Google Scholar
Associated terminology: Internet protocol, DHCP, Firewall, Network-address translation.
Schneier, B. (1996). Applied Cryptography (New York, John Wiley and Sons).Google Scholar
Schmen, K. (2003). Cryptography and Public Key Infrastructure on the Internet (New York, John Wiley and Sons).Google Scholar
Associated terminology: Encryption, Password, One-way hash.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×