wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
THAKUR CHANDAN KUMAR
Nov 05, 2022
0 Likes
0 Discussions
117 Reads

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

 

- An ideal way for understanding new concept for beginners!!!.

 

This blog and subsequent blogs aims to answer these basic questions regarding networking.

 

NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.

 

MERITS

 

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

 

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

 

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

 

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)

 

DEMERITS

 

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

 

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

 

II. COST (Building a network is costly affair)

 

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)

 

Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

 

Thus answering "WHAT is networking" and "WHY do we need networking"...

 

Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

 

Thank You all.


Comments ()


Sign in

Read Next

Cache Memory

Blog banner

De-Coding Love

Blog banner

Game Theory in Blockchain

Blog banner

Never give up

Blog banner

History of Money

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Benefits of Yoga

Blog banner

Is Your Password Complex Enough?

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

"Mahakali cave"

Blog banner

Uniprocessor and Types

Blog banner

How to Conquer Depression ?

Blog banner

Memory input output management

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

CRISP-DM Methodology

Blog banner

PYTHON

Blog banner

Starvation and Deadlock.

Blog banner

DATA WRANGLING

Blog banner

E-Cash (Electronic Cash)

Blog banner

IT RISK

Blog banner

Security issues

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Memory management

Blog banner

Dangers of Using Public WiFis

Blog banner

Honeypot in cyber security

Blog banner

Natural Language Processing(NLP)

Blog banner

ASANA- A Management System.

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Smartsheet

Blog banner

Electronic Funds Transfer

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Memory management

Blog banner

Virtual Memory

Blog banner

WomenEmpowerment

Blog banner

SQL Injection practice on DVWA

Blog banner

SPEM

Blog banner

Modern operating systems (OS)

Blog banner

Types of Threads

Blog banner

Segmentation and paging concept

Blog banner

Virtual Machine

Blog banner

Loneliness

Blog banner

Types of Malware in Cyber Security

Blog banner