wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Apple

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Hash password! Is it really secured?

Blog banner

Deadlock and Starvation

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Blog name

Blog banner

Operating Systems

Blog banner

History of Money

Blog banner

Concurrency and memory

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Multiple processor scheduling

Blog banner

INTRANET

Blog banner

Why is online marketing is important in current scenario

Blog banner

Bulk E-mail software

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Modern Operating System

Blog banner

Music

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Embaded operating system

Blog banner

Beatbox

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

OLA

Blog banner

Loneliness

Blog banner

Data Mapping

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Deadlock

Blog banner

Technical SEO : Total Guide

Blog banner

Data Security must be your Priority!

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Memory Management

Blog banner

Cycling

Blog banner

Zero-Day Attack

Blog banner

PHONE TECHNOLOGY

Blog banner

A small world of Sockets

Blog banner

STARVATION

Blog banner

File Organization and Access

Blog banner

Blockchain in IoT Applications

Blog banner

"Mahakali cave"

Blog banner