AfterAcademy Tech
•
04 Feb 2020

Have you ever wondered what is the mechanism behind the video calls on Skype and WhatsApp? How our voice is sent over the earlier telephone calls? These facilities are provided to us by the various message switching techniques. Different massage techniques are used according to our requirements like the earlier telephone calls used circuit switching. In this blog, we will get the answers to all the above questions as we go through this blog. So, let's get started.
For transferring the message from the sender to the receiver we use various message switching techniques. The technique we use, depends upon the factors like kind of message we want to transfer, quality of the message, etc. In this blog, we will see all these techniques in detail.
There are three types of message switching techniques used:
Circuit Switching is a switching technique method that establishes a dedicated path between the sender and the receiver to send the data. The example of a circuit-switch network is a telephone network.
A communication through circuit switching has 3 phases:
Example: Suppose we want to send the data from the A to B, we will first have to establish the connection in the switching nodes. These nodes establish a link such that there is a dedicate path from A to B. When the link is established the date is transferred. Once the data sharing takes place, the links are broken and are free to be used by some other systems.

There are a number of paths available from a sender to a receiver. The sender can select any of the paths from the available paths.
In-circuit switching when the source does not have enough data to transmit, the resources are unnecessarily kept idle. To avoid such situation Message switching is used. Message switching is a connectionless network in which the data from the source to destination is sent in the form of message units. A message is a logical unit of the information that can be of any length. The sender and the receiver are not directly connected. There are many intermediate nodes which ensure the delivery of the message to the destination. The message switching was used in sending telegrams.
It has two main characteristics:
Example: Suppose we have to send two messages i.e Message 1 and Message 2 from the sender to the receiver. We will directly send the message without establishing any connection.

Packet switching is a message switching technique in which the data is divided into packets. These packets contain a header that contains the information of the destination. The packets find the route with the help of this information.
The biggest packet-switched network is the internet.
A packet contains header and payload. The header contains the routing information and the payload contains the data to be transferred. The packet switching is also based on the Store and Forward method. Each packet contains the source and destination information so, they can independently travel in the network. The packet belonging to the same file may take different paths depending upon the availability of the path. At the destination, these packets are re-assembled. It the responsibility of the receiver to re-arrange the received packet to the original data.
Example: Suppose the data to be sent is divided into three packets i.e. 1, 2, 3. Now, these packets travel independently in the network. The intermediate nodes forward the nodes according to the availability of the channel. At the receiver side, the order of packets can be different. It is the duty of the receiver to re-arrange the received packets.

The path taken by the packet 1 is S → F → A → D → E →R. Similarly, the path taken by the packet 2 is S → F → A → B → E → R. Similarly, the path taken by the packet 3 is S → F → C → D → E → R.
Packet switching was originally designed to overcome the weakness of circuit switching. The circuit switching is inefficient for sending small messages. Also, the analogous(continuos) circuit makes it prone to noise and errors.
This is how various message switching techniques simplify the data transfer. Hope you learned something new today.
Do share this blog with your friends to spread the knowledge. Visit our YouTube channel for more content. You can read more blogs from here.
Keep Learning 🙂
Team AfterAcademy!
AfterAcademy Tech
In this blog, we will learn about the Context Switching in the Operating System. We will learn all the steps involved in Context Switching and in the end, we will see the advantages and disadvantages of Context Switching also.

AfterAcademy Tech
In this blog, we will learn what is a deadlock situation, what are various deadlock handling techniques like deadlock prevention, deadlock avoidance, deadlock detection, and deadlock ignorance.

AfterAcademy Tech
In this blog, we'll learn about the networking devices such as Routers, Hubs, Switches, and Bridges. We'll also learn about the functionality, advantages, and disadvantages of these devices.

AfterAcademy Tech
In this blog, we will learn various types of constraints that can be applied on a table. These constraints can be used to validate the data present in the table. We will learn about NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, CHECK, and DEFAULT
