wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

Tomato Butter Sauce with Bucatini

Blog banner

Memory heirchy

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Mumbai famous street food

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Service stratergy principles

Blog banner

Processes : Process description and control

Blog banner

Operation system

Blog banner

Deadlocks

Blog banner

How to tie a Tie

Blog banner

MORDERN UNIX SYSTEM

Blog banner

INTERRUPTS

Blog banner

Harsh Rathod

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Virtual Machine

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Service design process in ITSM

Blog banner

Different Types of Data

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

What is Email? Uses of Emails

Blog banner

OPERATING SYSTEM

Blog banner

"Audit" In Data Science

Blog banner

Culture Of Ladakh

Blog banner

A small world of Sockets

Blog banner

Artical on FreshBooks

Blog banner

DNS Cache

Blog banner

Article on Fresh Book

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

What is metaverse?

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Europe Through My Lens

Blog banner

Concurrency and Deadlocks

Blog banner

Travelling blog

Blog banner

INTERNET

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Assignment 2

Blog banner

SAVE TREES

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Modern Operating System - Khush bagaria

Blog banner