On Distributed Communication Networks
On Distributed Communication Networks
September
1962
ON DISTRIBUTED
COMMUNICATIONS
NETWORKS
INTRODUCTION The previous paper** described how redundancy of coding can be used to build efficient digital data links out of transmission links of variable and often less than presently useful quality. An arbitrarily low over-all
error rate can be purchased with a modest redundancy of coding and clever terminal equipment. But even links with
low error rates can have less than perfect reliability. We should like to extend the remarks of the previous paper and address ourselves to the problem of building
*Any views expressed in this paper are those of the author. They should not be interpreted as reflecting the views of The RAND Corporation or the official opinion or policy of any of its governmental or private research sponsors. Papers are reproduced by The RAND Corporation as a courtesy to members of its staff. This paper was prepared for presentation at the First Congress of the Information Systems Sciences~ sponsored by The MITRE Corporation and the USAF Electronic Systems Division~ November, 1962. The writer is indebted to John Bower for his suggestions that switching in any store-and-forward system can be described by a model of a postmaster at a blackboard. Programming assistance provided by SharI a Boehm, John Derr, and Joseph Smith is gratefully acknowledged. **A prior paper was presented by Paul Rosen and Irwin Lebow of MIT Lincoln Laboratories, discussing redundancy of coding on a single link, "Low Error Efficient Digitial Communications Links," First Congress on the Information Systems Sciences~ McGraw-Hill, New York~ 1962.
-2-
digital communication networks using links with less than perfect reliability. We shall again trade in the currency
of redundancy, but instead of redundancy of coding we shall make use of redundancy of connectivity. This thing called redundancy is a powerful tool. But
the systems planner must choose that form of redundancy so that the form of the "noise" or interference appears to be somewhat statistically independent for each redundant element added. If this goal is completely met, there can
be an exponential payoff for a linear increase of added elements. As an example, we shall consider in some detail
the synthesis of a system where the form of the disturbance or "noisell 1s the simultaneous destruction of many geographically separated installations. The system in particular
is to be a very high-speed digital data transmission network composed of unreliable links, but which exhibits any arbitrarily desired level of system reliability or survivability. DEFINITION OF SURVIVABILITY
This communications network shall be composed of several hundred stations which must intercommunicate with one another. Survivability as herein defined is the percentage
of stations surviving a physical attack and remaining in electrical connection with the largest single group of surviving stations. This criterion is a measure of the ability
-3TYPES OF NETWORKS Although one can draw a wide variety of networks, they all factor into two components: centralized (or (Types (a) and
The centralized network is basically vulnerable. Destruction of the central node destroys intercommunication between the end stations. In practice, a mixture of
star and mesh components is used to form communications networks. For example, type (b) in Fig. 1 shows a hier-
archial structure to a set of stars connected in the form of a larger star with an additional link forming a loop. Such a network is sometimes called a lIdecentralizedllnetwork, because complete reliance upon a single point is not always required. But, as destruction of a small number
of nodes in a decentralized network can destroy communications, we shall turn to consider the properties, problems, and hopes of building communications networks that are as "distributed" as possible. The unstandardized terms
centralized, decentralized, and distributed are often and conveniently used as relative adjectives when referring to real-world networks. DEFINITION OF REDUNDANCY LEVEL Figure 2 defines the term IIredundancy level," which is used in this paper as a measure of connectivity. A
-4-
CJ W f-
::>
If)
CD 0::f-
-u
(r,
..>C
~ ~ ..._
<l.J "'0
Z
<l.J ......
_Q
1-
If)
(3
"'0
W N
_.J
0
"'0 <l.J N
c:
Cl::CO f-Z W U W
er
0
+-Q.J
.....
U QJ
0
"'0
QJ N
..... ......
C
QJ
_oJ
19 u,
0
If)
W N
_j
<l<:l f-
0::-
W U
-5of links possible~ is chosen as a reference point, and is called "a network of redundancy level one.1I If two times
as many links are used in a gridded network than in a minimum span network, the network is said to have a reI
ASSUMPTION OF PERFECT SWITCHING Each node and link in the array of Fig. 2 has the capacity and the switching flexibility to allow transmission between any ith station and any jth station,
.
provided a path can be drawn from the ith to the jth station. Starting with a network composed of an array of stations connected as in Fig. 3, an assigned percentage of nodes and links are destroyed. If, after this operation,
it is still possible to draw a line to connect the ith station to the jth station, the ith and jth stations are said to be connected. RATIONALE FOR DESTRUCTION PATTERNS Figure 4 indicates network performance as a function of the probability of destruction for each separate node. If the expected IInoise was destruction
ll
caused by con-
ventional hardware failure, the failures would be randomly distributed through the network. But, if the disturbance
-6-
o
o
.0
o o o
R ;: 1.5
o
R :: I
o
R::2
R=3
R=4
o o o
o
o
R':: 3
o o
o o
o
R':: 4
R': 6
R':: 8
FiG. 2 - Definition
of Redundancy Level
-7-
FIG. 3 -
An Array
of Stet ions
-8-
- - - - - - - - - - - - - - - - - r ~-. ---~-.VI C
w o ~
.<::_
"0
!;:!
s
C
...., 0
>. 0.
'" c
O.
II}
":: 0 wu
~E oE
a.
~
z
0
f<I U
.n
""''0 0 '0 c
'"
o
v
0
U
~ ~
::::>
'" o
0'0
o~
E~
0'
Q
c '
I")
EO"
....
...., o
'" ~
" o E n."':
30
....J'O-
______ L
R=I
>f-(})
-z
:::!O
>(}) a:::
(j)
co-
---~------r
• I
i
-
::::>
I
I
0 Z 0
:-
f=
u
<I u, f(})
CT'
a:::
'" ~ - ....
0'"
::J-
0 '" u >- -
C>
cr
"!2'"
We Cl:o
"''0
<l
-'
01
0.2
0.3
SINGLE
04
NODE
0.5
PROBABI LlTY
0.6
OF
0.7
DESTRUCT
08
ION
FIG. 4 - Perfect
Sensitivity
to Node
-9were caused by enemy attack there are two possible casesll to be considered. requires of kill, direction Pk IIworst
0.5 ,
or 160 with a
group would still have an expected percent of the initial stations this raid misjudges complete knowledge
surviving
complete availability
of weapons,
the effects of the weapons against each and every link, the raid fails. highly parallel The high risk o'f such raids against structures causes examination of alteruniform
Consider
the following
against a 1000-station spaced that destruction weapon 1s unlikely. equal 1,000 weapon struction
i
The stations
of two stations
Divide salvos.
less than
of destroying
its target.
;weapon of the second salvo has only a 0.25 probability, , since one-half the targets have already attack been destroyed. a worst-case
is felt to represent
-10-
ne tw or-kmodel of 324 nodes w i.t h varying probabillevel~ with results shown in Fig.
4.
The probability
of kill was varied frem zero to unity while the ordinate marks survi vabili t: used is the percenta~e and remaining in of
c •
of survivability
destroyed
of var-y ; Ln
line It marks the upper bound of Lo ss due to the phy sical failure component underwent alone.
'.
then only 50 per cent of its nodes would be of how perfect its interested in the of in netof
to survive--regardless
'v-Je
communications.
are primarily
caused
by . failure
Low redundancy
additional
Los s to communications.
the survivability
-11-
A network
an increasing
attack
rapidly deteriorates.
of redundancy
redundancy
level required
is not great--on
SIMULATION RESULTS--LINK
In the previous formance
FAILURE ONLY
network per-
as a function
of the nodes
(which are better targets examine the same network, particular, be without work.
Figure 5 shows the results for the case of perfect nodes; only the links fail. radation There is little system degunreliable links-all nodes
down-time--assuming
Figure
having 40 percent
garded as an unreliable
-12-
W Zl?
-4
U1w
04 ---'
\_
I_j
cr: Z>
~Z
1.J...4 ill 0 I-
tn 9 IU1 0.5
t;
wu
:!:<l
<II--
I-Z
FIG. 5 -
Perfect Switching in a Distributed Network - Sensitivity Link Destruction, 100% of Nodes Operative.
to
-13-
•
0
Z
0.8 0.6
40%
destroyed
of
Nodes at outset
~ <:( u
z
~ ~
::> 0
: Z
)-
_j~
coO
<t
-
0.4
~ u
0:::
u, IU)
<:(
R=4
<[ .....J
w <..? cr
0.2
R=1.5
OO~--~~::::=OI.2~::::~~~0~.4;;~~~;;;;;0~.6~~~~~~0~.
SINGLE LINK PROBABILITY OF DESTRUCTION
FIG. 6
Perfect Switching· in a Distributed Network Destruction After 40% Nodes Are Destroyed.
Sensitivity
to Link
the result of 100 trial cases density distribution of node and link of cases for 20 per-
link damage.
There redundancy
is another and more common technique than in the method is assumed described
for using
each station
to have perfect
approach
of assignment,
a number
of independent
in a network
differences
in performance of assignment
and redundancy
by the following
Monte Carlo simulation. In the matrix is connected of N separate stations, each ith station but
to every jth station by three shortest independent paths (i=1,2,3, ... ,N;
totally separate
the network.
paths from the ith station If one or more of the is said to exist of
communication
The criterion
-15-
/
/ I
c
°
-r
u._
0
c> ::I'_
CO
e
:J
c c·_ ._ ...J
10 I"-
u~
CO 0
o(f)
tf>:::-!?
zO::
..;:.(0 +- -
olD
o·zl- 0 2z
I
r- Lf):r:
-w
(1)0
a ,_
Q.J
"""'-L
-,
~«
zt::
::I c(/)
uu
00
"-
~z
+-:::-!? (,1)0
0
o~
I-
I..D U Z
o 0::_ <fo
l.L.1(/l-
~@ .....
Q)
...JJ
"_(,I)
r-U
°0 0
\ \
\
U"")
wZ l')~
0:::2:
eU
<f:!
...JO
"-; 8 .000::
+._
(,I)
au +.--.::
'.0
+-
:>o.~ (/)
o:j
ou
L&.. U1
U"")
S3S'i1J
~o
o
NOI1J';1~j
The difference
by remembering the
switching
of paths.
day net-
network we are
The greater
switching.
switching
for a gridded
of switched
of assignment.
is useful for short paths, but requires element survivin long haul
and reliability
circuits passing
-17-
___ '_~7'
Perfect Switching
0.1
0.2
0.3
0.4
0.5
0.6
0.7
OF KILL
O.S
0.9
1.0
vs. Perfect
Switching
In
a Distributed
are usual.
We will soon be living in an era in which we cannot guarantee survivability of any single point. in which However,
systems
system destruction n of
n stations.
it can be can be
In order to build
of elements.
We are interested
Lnexpe ns Lve these elerr.entsmay be and still permit syste[!ito operate reliably. between element There is a strong reliability.
relationship To design of
a sy::::tem thE.t must antiCipate both enemy attack, combine together problems, and normal failures
a worst-case
the expected
caused by norm2l
the enemy does not know which elements Our future systems design problem is
very reliable
systems
set of unreliable
elements
at lowest
of the future,
attractive
cost switching
if "perfect
-19switching" tandem without Further, flexible FUTURE is used, digital of many errors links are mandatory connected to permit links magnitude.
connection cu~ulative
separately reaching
an irreducible
the signalling
measures
to implement require
highly
always
digits.
an entire
today.
of new routes
yet allows
processed
Reliability
The network
anyway ,
construction
methods
that
line,
microwave,
digital
transmission,and
non-synchronous
Pu..se Re cene r-a tive Repea ter Line I--------~~----------~~~~~~~ Samuel B. Morse's regenerative amplifying weak telegraphic
repeater
invention been
for
-20-
resurrected
and transistorized.
Morse's electrical
relay
,permits amplification
signals organizahave
Laboratories)
shown that digi tal da ta rate s on the orde r of 1. 5 mi IIi on bits per second can be transmitted line at repeater over ordinary telephone
problems.
reason why either lines of lower loss spacing, or more powerful link w8uld
Such distances
distributed transist8r
netw8rk. amplifier
the miniature
Poor-Bov"
major savings.
of reliability However,
-21-
crystal
receiverjklystron
oscillator commercial
units power.
Further
economies
equipment
the spectrum
availability
has not been fully examined, that this may be the of the type to
suggest
way of building
large networks
be described. T.
v.
With-proper television
stations
high data rate links in emergencies. Non-Synchronous The problem synchronous building Satellites of building a reliable network using non-
satellites
is somewhat network
similar
a communications
with unreliable
is overhead,
is not overhead,
-22-
paper,* it was seen that in order to make link the post-error-removal data
rate would have to vary as it is a function The problem then is to build a communication
up of links of variable
in nature, with each potential demand from instant to instant. transmitted a high-data
network
For example,
bits per
*See footnote,
p.
1.
-23-
COMMON USER
In cornmunications~ as in transportation, it is most economic for many users to share a common resource rather than each to build his own system--particularly when supplying intermittent or occasional service. This inter-
mittency of service 1s highly characteristic of digital communication requirements. Therefore, we would like to
consider the interconnection, one day, of many all digital links to provide a resource optimized for the handling of data for many potential intermittent users--a new commonUSer system. Figure 9 demonstrates the basic notion. A wide
mixture of different digital transmission links 1s combined to form a common resource divided among many potential users. But, each of these communications links How can links
could possibly have a different data rate. of different data rates be interconnected?
USE GF STANDARD MESSAGE BLOCK
Present common carrier communications networks, used for digital transmission, use links and concepts originally designed for another purpose--voice. These systems
are built around a frequency division multiplexing linkto.link interface standard. is that of data rate. The standard between links
-24-
....... o
<V ::J
><
...
.._
o
r.n
"'0 Cl.J
02 -0 lIl_
We::!
_j"_
o E
o
0..
Wlll I-
o .....
o
<r
I Q)
en
<..9
-::J
o
e::!
l1..
Ww
1->
0t_?
~~-.~
0..2
LU
IW
~
W_j..-J
I-
-25-
consider an alternative approach--a standardized message block as a network interface standard. While a standard-
ized message block is common in many computer-communications applications, no serious attempt has ever been made to use it as a universal standard. A universally standardized
message block would be composed of perhaps 1024 bits. Most of the message block would be reserved for whatever type data is to be transmitted, while the remainder would contain housekeeping information such as error detection and routing data, as in Fig. 10. As we move to the future, there appears to be an increasing need for a standardized message block for our all-digital communications networks. As data rates in-
crease, the velocity of propagation over long links becomes an increasingly important consideration.
* We
soon reach a pOint where more time is spent setting the switches in a conventional circuit switched system for short holding-time messages transmission of the data. Most importantly, standardized data blocks permit !many simultaneous users each with widely different bandwidth requirements to economically share a broadband network made up of varied data rate links. than is required for actual
*3000 miles at ~ 150,000 miles/sec. ~ 50 milliseconds transmission time, T. 1024-bit message at 1,500,000 bits/sec. ~ 2/3 millisecond message time, M.
~T>~
-26-
-----0 Q)
(l)
.::.: u
(/')
r-
a::
u;
CD V N
u,
rW
ex:::
u, u,
::)
r~
C\I
Ol
til
(l)
en
<
::) Q)
r-
:::?:
CD
r-
:::!
I
0
t.:>
u;
<
>
1
}
}
~lf)
WW
(/')I.fl
4'
If)t:.
wCD ~O
If)
-27-
The standardized message block simplifies construction of very high speed switches. Every user connected to the net-
work can feed data at any rate up to a maximum value. :The user's traffic is stored until a full data block is received by the first station. This block is rubber
stamped with a heading and return address, plus additional housekeeping information. the network. SWITCHING In order to build a network with the survivability properties shown in Fig. 4, we must use a switching scheme able to find any possible path that might exist after heavy damage. The routing doctrine should find the or "ringThen, it is transmitted into
of building a
"real-time" data transmission system using store and forward techniques. The high data rates of the future carry and cir-
us into a hybrid zone between store-and-forward cuit switching. store-and-forward node singularly.
The system to be described is clearly if one examines the operations at each But, the network user who has called up
a "Virtual connection" to an end station and ha-stransmitted messages across the United States in a fraction of °a second might also view the system as a black box providing
-28-
There are
,two requirements that must be met to build such a quasireal time system. First, the in-transit storage at each
node should be minimized to prevent undesirable time delays. Secondly, the shortest instantaneously available
path through the network should be found with the expectation that the status of the network will be rapidly changing. Microwave would be subject to fading inter-
ruptions and there would be rapid moment-to-moment variations in input loading. These problems place difHowever, the
development of digital computer technology has advanced so rapidly that it now appears possible to satisfy these requirements by a moderate amount of digital equipment. What is envisioned i6 a network of unmanned digital switches implementing a self-learning policy at each node so that overall traffic is effectively routed in a changing environment--without control point. need for a central and possibly vulnerable One particularly simple routing scheme
ll
heuristic routing
doctrine and will be described in detail. Torn-tape telegraph repeater stations and our mail system provide examples of conventional store-and-forward switching systems.
In these systems, messages are reand stacked until the I1best" The key feature of store-and-
-29forward transmission is that it allows a high line occupancy 'factor by storing so many messages at each node that there is a backlog of traffic awaiting transmission. But, the
price for link efficiency is the price paid in storage capacity and time delay. However, it was found that most switching could be
obtained with extremely little storage at the nodes. Thus, in the system to be described, each node will attempt to get rid of its messages by choosing alternate routes if its preferred route is busy or destroyed. Each
message is regarded as a "hot potato," and the nodes are not wearing gloves. Rather than hold the "hot potato,1I
the node tosses the message to its neighbor, who will now try to get rid of the message. THE POSTMAN The switching process in any store-and-forward is analogous to a postman sorting mail. at each switching node. from all links. system
A postman sits
the traffic loading status for each of the outgoing links. With proper status information, the postman is able to determine the best direction to send out any letters. So
far, this mechanism is general and applicable to all storeand-forward communication systems.
-30-
HOT-POTATO HEURISTIC
ROUTING DOCTRINE
To achieve real-time operation it is desirable to respond to change in network status as quickly as possible so we shall seek to derive the network status information directly into each message block. Each standardized message block contains a "toU address, a "from" address, a handover number tag, and error detecting bits together with other housekeeping data. The message block is analogous to a letter. The
11
from"
address is equivalent to the return address of the letter. The handover number is a tag in each message block set to zero upon initial transmission of the message block into the network. Every time the message block is passed The handover
number tag on each message block indicates the length of time in the network or path length. This tag is somewhat
analogous to the cancellation date of a conventional letter. INDUCTIVE DETERMINATION OF BEST PATH links, the post-
man can infer the "best" paths to transmit mail to any station merely by looking at the cancellation time or the equivalent handover number tag. If the postman sitting
in the center of the United States received letters from San Francisco, he would find that letters from San Francisco arriving from channels to the west would come in with later cancellation dates than if such letters had
-31-
Each letter
carries an implicit indication of its length of transmisSion path. The astute postman can then deduce that the
best channel to send a message to San Francisco is 'probably the link associated with the latest cancellation dates of messages ~ San Francisco. By observing the
cancellation dates for all letters in transit~ information 1s derived to route future traffic. The return address
and cancellation date of recent letters is sufficient to determine the best direction to which to send subsequent letters.
THE HANDOVER NUMBER TABLE
While cancellation dates could conceivably be used on digital messages~ it is more convenient to think in terms of a simpler digital analogy--a tag affixed to each message and incremented every time the message is relayed. Figure 11 shows the handover table located in the memory of a single node. A row is reserved for each major station A column is As
it was shown that redundancy levels on the order of four can create extremely "toughll networks and additional redundancy brought little, only about eight columns are really needed.
l ..
-32-
I -W U ,1-
s:
u r(/)
"""u
0::0 WI ClJU v
"Ow
II"'
en
------r<l
"U
"0 "-
20 ::.c:: (/)
~ =>z
~~-r
N W
I
I
I
". ,
,
_-
",
00
'':
I
.0·
I\_
i\
I~
",
00
10
V
r<l
!
I
I
to
OJ
I"-
I"i
-- f--~~
10
I
I
i
I
I
I
(
I"i
N 1---
If)
ZU
::i~
I"-
I"-
10
I"-
,.,.,
:-10
._
OJ .D :J
E .....
Z
OJ
OJ
r<l
w
r0::
(/)
CO
en
a:: w
z
::.c:: 2
...J
:2: :::>
en
a::
ill
en
V N
z
w
0 Z
~ :::>
0
N
--1-
I0 10
> o u
:c
c o
CO
I
I
en
i-V IN-
et:
> r
ro
-----l~
eniN!N
:
I,- r<l
t
~j-~~
)I
\
I
1-i-+--.-+-~-.---~~"
!
I'-
c:r
~
N N
I"i
CO
r<l N
I I
-I
I
0
N
10
I'-
I'-
I 10 N
c:r
CO
-33PERFECT LEARNING If the network used perfectly reliable, error free links, we might fill out our table in the following manner. Initially, set entries on the table to high values. amine the handover number of each message arriving on each line for each station. If the observed handover Ex-
number is less than the value already entered on the handover number table, change the value to that of the observed handover number. If the handover number of the message After
a short time this procedure will shake down the table to indicate the path length to each of the stations over each of the links connected to neighboring stations. table can now be used to route new traffic. This
For example,
if one wished to send traffic to station C, he would examine the entries for the row listed for station C based on traffic from C. Select the link corresponding to the This is the
-34-
DIGITAL
SIMULATION
condition where no station knew the location of Within ~ second of simulated real of all
world time, the network had learned the locations connected manner. favorably
stations and was routing traffic in an efficient The mean measured to the absolute path length compared very shortest possible path length Preliminary
under various traffic loading conditions. results indicate that network loadings
on the order of
locally generated
from entering
would accept full traffic up to 1.5 million bits per second. But, if every station had heavy traffic and the loaded, the total allowable input
Baran and Sharla Boehm, Simulation of a Hot Potato Routing Doctrine (U), The RANIT Corporation, RM-3103, (In preparation).
* Paul
-35-
guaranteed
is a function redundancy
of the station
the network,
level, and the mean path length The "choking in the network noted.
II
in the network.
of and no
signs of instability
of store-and-forward
The network
AND IMPERFECT
considered
behavior
while others
responsive
and transmission
fades by a slight modification the values on the handover the lowest handor
In the previous
example,
and over each link., was the value recorded number table. But, if some links had
to the change.
to recent
measurements
-36-
is positive,
This procedure
a "forgetting"
procedure--placing
more belief
This device would, in the case of network modify the handover and asymptotically If the difference value is negative, only a fractional ference. This implements Learning a form of sceptical
number table entry so as to exponentially approach the true shortest path value. value minus the table
between measured
the new table value would change by portion of the recently measured dif-
learning. errors.
Thus, by the simple device of using only two separate lIlearning constants,tI depending is greater a mechanism whether the measured value
or less than the table value, we can provide that permits the network routing to be reThis for
sponsive to varying
and repairs.
-37ADAPrATION TO ENVIRONMENT
This simple slrnultaneous learning and forgetting mechanism implemented independently at each node causes the entire network to suggest the appearance of an adaptative system responding to gross changes of environment in several respects, without human intervention. For example, consider self-adaptation to station location. A station, Able, normally transmitted from one location
in the network, as shown in Fig. 12 (a).
If Able moved
to the location shown in Fig. 12 (b), all he need do to announce his new location is to transmit a few seconds of dummy traffic. The network will quickly relearn the new
location and direct traffic toward Able at his new location. The links could also be cut and altered, yet the network would relearn. Each node sees its environment through
myopic eyes by only having links and link status information to a few neighbors. There is no central control;
only a Simple local routing policy is performed at each node, yet the overall system adapts.
LOWEST COST PATH
We seek to provide the lowest cost path for data to be transmitted between users. When we consider complex
networks, perhaps spanning continents, we encounter the problem o£ building networks with links o~ widely different data rates. How can paths be taken to encourage
-38-
:
.... N
....
w ~
co
-_j
0 0
c:
--
:::>
Q..> V>
....
0
Q.J
c; 0 .c; U
+-
0'>
>. .._
:..c 0
+-
CL
<l
I :
-0
....w :!
<l
l::>
u,
r-
,-39-
of incrementing the handover by a fixed amount, each time ia message is relayed, set the increment to correspond to link costjDit of the transmission link. ThUS, instead of
the "instantaneously shortest non-busy path" criterion, the path taken will be that offering the cheapest transportation cost from user to user that is available. The
technique can be further extended by placing priority and cost bounds in the message block itself, permitting certain users more of the communication resource during periods of heavy network use. WHERE WE STAND TODAY Although it is premature at this time to know all the problems involved in such a network and understand all costs, there are reasons to suspect that we may not wish to build future digital communication networks exactly the same way the nation has built its analog telephone plant. There is an increasingly repeated statement made that :one day we will require more capacity for data transmission than needed for voice. If this statement is correct, then
it would appear prudent to broaden our planning consideration to include new concepts for future data network directions. Otherwise, we may stumble into being boxed in with the
originally
designed
transmission. dundancy
New digital
computer
Of course, we could use our existing techniques. But, a system with greater
circuit
capacity
short blocks of data from a large number taneously with intermittent Considering large volumes
set of points.
plant designed
of digital
the detailed
format of a of
block as a possible