wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

Why Does Hierarchy Still matter in Organizations?

Blog banner

RAID

Blog banner

I Personally

Blog banner

Introduction to Virtual Memory - 080

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Uniprocessor scheduling

Blog banner

Cache memory

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Hash password! Is it really secured?

Blog banner

I/O Management and Disk Scheduling

Blog banner

VIRTUAL MEMORY

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

What is Amazon?

Blog banner

Cyber Security Control

Blog banner

LINUX

Blog banner

Life of an army person

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

A Short History of GIS

Blog banner

Video games

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Types of Hackers.

Blog banner

GIS info about Bermuda Triangle

Blog banner

MEMORY MANAGEMENT

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Save Environment

Blog banner

Mumbai famous street food

Blog banner

Operating Systems

Blog banner

Threat management

Blog banner

Game via listing method

Blog banner

Concept and definition of m-commerce

Blog banner

PHONE TECHNOLOGY

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

DBMS and various career options related to it.

Blog banner

History of Money

Blog banner

Meshoo

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Memory Management

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

GIS REMOTE SENSING

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Optimization of operating system design

Blog banner