wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
1 Discussions
1322 Reads

'A' of "Networking"

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

- An ideal way for understanding new concept for beginners!!!.

This blog and subsequent blogs aims to answer these basic questions regarding networking.



NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.



MERITS

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)



DEMERITS

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

II. COST (Building a network is costly affair)

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)



Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

Thus answering "WHAT is networking" and "WHY do we need networking"...



Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

Thank You all.

Comments ()


Sign in

Read Next

Discover The Top 3 Places To Stay in London

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

How to Run your First android App

Blog banner

GUIDE TO GIS

Blog banner

IoT Evolution

Blog banner

Cache Memory

Blog banner

Blog on health and fitness

Blog banner

Security Breaches in Stock market trading

Blog banner

I/O Buffering

Blog banner

Cache memory

Blog banner

Evolution of Operating system

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Uniprocessor Scheduling

Blog banner

15 Interesting Facts about India

Blog banner

Importance Of Education.

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

10 Interesting facts you should know!!!

Blog banner

Meshoo

Blog banner

Tools to support CSI activities

Blog banner

The application udemy

Blog banner

Indian Food

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

Deadlock and starvation

Blog banner

EdTech (Education Technology)

Blog banner

Getting into Anime

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Importance Of Time

Blog banner

Logical and physical address

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

A Journey By Train

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Mesh Topology

Blog banner

EMAIL INVESTIGATION

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner