Sie sind auf Seite 1von 3

Data transmission on the Internet

All types of information - whether a text, a conversation, or a photograph - are transmitted in the
form of bits (1s and 0s of computer code). As data enters the network, the stream of bits
representing a message is divided into a series of short sections or "packets".
A "label" is attached to each packet indicating its final destination, and its place in the message
as a whole. As it travels through the network, each packet passes through a series of specialised
computers known as "routers". Each router decides which is the most efficient path for the
packet to take on the next stage of its journey. This decision is taken on the basis of the router's
understanding of network connections and loading patterns at the moment of the packet's arrival
at the router. The process is then repeated at each router the packet passes through. This decision
that the router takes will change over time as the router's knowledge changes. As a result, the
thousands of packets which comprise a particular message may each take different paths through
the network. They are only re-assembled in the proper order at their final destination. The
destination will acknowledge the receipt of each packet to the sending system. The sending
system will resend any lost information.
Packets are also acknowledged across the communications paths that link the
routers.
The key point is that routers must make a copy of each packet in order to read and direct it. The
life-span of these copies is limited to a fraction of a second. The routers also copy each packet as
they send it on, so that the packet can be retransmitted if it is lost. This copy is retained until the
packet's receipt is acknowledged, which could be up to a
few seconds. These copies represent only an unintelligible fragment of a whole message. They
are nevertheless essential for the functioning of the Internet

A very basic rule of data (files, e-mails, web pages et-cetera) transmission across the Internet,
and actually a distinctive feature of the TCP/IP protocols used to move data, is that data is
never transmitted “as such”. Instead, it is subdivided in so-called “packets” before transmission.
The number of the packets depends on the size of the data. For simplicity, let us think about the
transmission of a text file. The bigger the file, the more packets will be needed to “represent”
the file.
If we picture a file as a train, the packets would be the individual wagons. Big train: several
wagons, small train: few, maybe just one wagon.

Each packet is like an envelope sent by normal mail, with the actual data, part of the original file,
inside. Outside, we have information that will allow TCP/IP to process the packet by extracting
and merging it’s inside data with the data from the other packets from the same file, in the
correct order, in order to rebuild the file from it’s packets. A scheme of a TCP/IP packet is
shown in Figure 1-1-1)

Each packet, or envelope if we follow on the previous example, contains the following
information: the source of the data (sender), the destination of the data (receiver), information on
the source file and on the position of the packet in this file (say packet 3 of 123 from file X).
With this information, once all the packets for a file have reached the intended destination, they
can be used by TCP/IP to rebuild the original file.

We could summarize the journey of a file such as an e-mail message or a web page, from
computer A to computer B, as follows.

File in computer A –> Subdivided in packets by TCP/IP –> Packets travel, individually, to
destination –> TCP/IP “remounts” the packets to re-create the original file in computer B –>File
in computer B

You may notice, in the scheme above, that the fact that packets travel individually is underlined.
As we mentioned, communication paths (most often constituted by physical wires) between
computer A and computer F (Figure 1-1) on the Internet are often redundant. Also, these paths
are often not direct (unless A and F are in the same room or the same building), but rather
contain a number or “relays”. That is, in order for data to travel from A to F, they might be
relayed through B, C, and D (Figure 1-1). Physically, on the hardware level, there relays are
constituted by Routers. As the name implies, routers allow packets to find the best route between
two computers that do not belong to the same network. Data are generally relayed through
several such routers before they reach their final destination.

The crucial thing to understand here, is that at any given time (we re talking about milliseconds),
the best route between 2 computers may change. Routers are able to determine, at the moment of
sending a particular packet, the best route at this time. When sending the next packet, the best
route may be different. Therefore, each packet from the same file could take a different route in
order to reach the intended destination.

While files are being transferred between 2 PCs, a dialogue goes on between the TCP/IP
software of the sender computer and the TCP/IP software on the receiving computer, aimed at
ensuring that the file transfer will be successful. If for instance a packet is missing on the
receiving side, TCP/IP from this computer will send a message to TCP/IP on the sender
computer, asking to re-send a particular packet (this is specifically true for the TCP protocol –
other protocols such a UDP work differently). The dialogue will end when all the packets have
reached the destination.

Although this packet organization might seem complex, it has a number of advantages, with
respect to an hypotetical model based on sending entire unfragmented files. First, with a “send
entire file” model, if something goes wrong, you have to start over. Bandwidth is limited, so this
would be highly inefficient and would clutter the network. With packets, if something goes
wrong with a packet, you just have to re-send this packet, not the whole file. This illustrates well
the concept of a “fault-tollerant” system. Second, maybe sending a small file, could take a very
long time, if there is a big file being transferred “before it”. Let’s go back to the image of the
train, in which the packets are the wagons. The bandwidth is finite (imagine you only have one
rail). In order to send a small one packet file (a one wagon train), you have to wait until the big
file (a 20 wagon train for example) has passed. If you fragment the 20 wagon train into the
individual packets, and send one at a time, then the one packet train has a fair chance to go
through together with the packets of the 20 wagons train.

As it works now, you can download your e-mail (50K) while you download this big video file
(700GB). You don’t have to wait for the video to download before you can read your mail. Isn’t
this great?

Das könnte Ihnen auch gefallen