wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

Key to success in Sports

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Security issues

Blog banner

Security Issues and Countermeasures

Blog banner

Fashion design

Blog banner

Direct Memory Access

Blog banner

All you need to know about “On-page SEO”

Blog banner

Types Of Interrupt

Blog banner

Virtualisation

Blog banner

Linux Memory Management

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Service design process in ITSM

Blog banner

File management

Blog banner

VIRTUAL MACHINE

Blog banner

An Overivew Of Cache Memory

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Deadlock Prevention

Blog banner

Latest Email Marketing Techniques

Blog banner

Security Issues

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

What is M-commerce and how it's work

Blog banner

MODERN OPERATING SYSTEM

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

File Management

Blog banner

BITCOIN WALLET

Blog banner

Understanding Business Layer in Data Science

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

Marvel Cinematic Universe

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Privacy in Social Media and Online Services

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Harsh Rathod

Blog banner

SPEM

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Virtual memory

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Getting into anime My anime suggestions

Blog banner

Cyber Security Standards

Blog banner

Blog on Smartsheet.

Blog banner