wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-2 (Components)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
0 Discussions
680 Reads

'B' of "Networking"

"A-B-C of Networking: Part-1" dealt with the 'A' of "Networking" i.e the concept of networking. Next we move on to "B" which is the *COMPONENT of networking. Components of networking are SENDER, MESSAGE, MEDIUM, PROTOCOL, RECEIVER.



5 components of Networking

Source: Data Communication, Kwangwoon University



I. SENDER (often referred to as 'transmitter') is the party that sends the message.

II. RECEIVER is the party that receives the message.

III. MESSAGE is any data that is been transmitted from sender to receiver.

IV. {MEDIUM, PROTOCOL} often not considered as single entity but it can be because each of them has a relation. The medium (2 types: wired & wireless (will be discussed later in depth)) is the channel that is used and protocol is the set of rules that are defined for that medium. For example, BLUETOOTH falls under the category of wireless MEDIUM but it implements the PROTOCOL of IEEE 802.15. Thus answering HOW the network is functioning.



These 5 components when placed together to form a network, it becomes important to checkout their arrangements and positioning in the network. In technical terms, the schematic representation of the network must also be taken into consideration and this schematic representation, in networking terms is called as TOPOLOGY of the network (topology description in "A-B-C of Networking: Part-3").

   

*Component: it implies to the entities or the participants involved in the exchange of data


Comments ()


Sign in

Read Next

What is Spyware? and examples of them.

Blog banner

GIS

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Compromising Mobile Platforms

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Life of an army person

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

GIS Mapping

Blog banner

Mumbai famous street food

Blog banner

Principles of Concurrency

Blog banner

What is E-commerce

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Hacking of web server and application

Blog banner

What is thread and alse multithreading

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Ethical Hacking

Blog banner

Hey Aryan here

Blog banner

Virtual machine

Blog banner

SQL Injection

Blog banner

Data Mapping

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Cyber Laws In India and Around the World

Blog banner

Multicore CPUs

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Memory management

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Deadlock and Starvation

Blog banner

Process Creation

Blog banner

CyberSecurity Color Wheel

Blog banner

Characteristics of Etherum

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

IT GOVERNANCE

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Apache Kafka

Blog banner

Evolution of the Microprocesor

Blog banner

Direct Memory Access

Blog banner

Service Operation

Blog banner

JIRA SOFTWARE

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner