wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

CONCURRENCY

Blog banner

A Heartfelt Act of Kindness

Blog banner

Data carving - using hex editor

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Technological Advancement

Blog banner

Teamwork

Blog banner

SIEM Empowering Security

Blog banner

Uniprocessor scheduling

Blog banner

Busted : Common Web Security Myths

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

IT Service as as Value Creation

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Password Generator - Lisp

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

What is Network Security?

Blog banner

Introduction to GIS

Blog banner

Balance

Blog banner

E-learning in today's world

Blog banner

"Games and the future"

Blog banner

Question

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

MACHINE LEARNING

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Development Of Modern Operating System

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Virtual memory

Blog banner

Network Forensics

Blog banner

Risk factors in service transistion

Blog banner

What is Amazon?

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Multicore and multithreading 171

Blog banner

VIRTUAL MACHINES

Blog banner

Deadlock and starvation

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Importance of Education

Blog banner

"Life as a Part-time Student"

Blog banner

internet email and it's applications

Blog banner

Atlantis - The Lost Island.........

Blog banner