wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

VIRTUAL MACHINES

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Elements and Principles of Photography

Blog banner

GraphQL

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Data Security must be your Priority!

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Deadlock

Blog banner

Hey Aryan here

Blog banner

Starvation

Blog banner

Some web vulnerabilities

Blog banner

Data Exfiltration

Blog banner

Facebook marketing

Blog banner

IP ADDRESS

Blog banner

security requirements for safe e-payment

Blog banner

Memory Management

Blog banner

Virtual memory

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Data Analytics in Data Science

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

OS ASSIGNMENT

Blog banner

Linux -V Server Virtual Machine

Blog banner

INTERNET

Blog banner

Deadlocks in Operating System

Blog banner

Number Guessing game --lisp

Blog banner

The War With Cold On Earth

Blog banner

Understanding Business Layer in Data Science

Blog banner

Process Description

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Sweet Mango Murabba

Blog banner

Functions of Operating System

Blog banner

Education: Key to your Prosperity

Blog banner

Importance Of Blockchain

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Buffering

Blog banner

E-learning in today's world

Blog banner

Some facts about Technology

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Save Environment

Blog banner