wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
1 Discussions
1322 Reads

'A' of "Networking"

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

- An ideal way for understanding new concept for beginners!!!.

This blog and subsequent blogs aims to answer these basic questions regarding networking.



NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.



MERITS

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)



DEMERITS

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

II. COST (Building a network is costly affair)

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)



Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

Thus answering "WHAT is networking" and "WHY do we need networking"...



Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

Thank You all.

Comments ()


Sign in

Read Next

File Systems in OS.

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Multiprocessor

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

MUTUAL EXCLUSION

Blog banner

Twisted world

Blog banner

Creating Digitally Signed Document

Blog banner

Deadlock

Blog banner

How return on investment is defined in IT services

Blog banner

Types of Threads

Blog banner

TRIGGERS IN DATABASE

Blog banner

Flipkart

Blog banner

Mutual exclusion

Blog banner

Understanding Mobile Device Forensics

Blog banner

Retiring ISS

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Making Money through Instagram

Blog banner

Firewall

Blog banner

Google classroom

Blog banner

File Organization and Access

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Deadlock and starvation

Blog banner

Hypothesis Testing in Data Science

Blog banner

child Labour

Blog banner

Blog name

Blog banner

Process states

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

BENIFITS OF YOGA

Blog banner

I/O Management and Disk Scheduling

Blog banner

Traditional Unix System

Blog banner

computer security

Blog banner

Direct Memory Access

Blog banner

Operating system evolution

Blog banner

Virtual machine

Blog banner

A Heartfelt Act of Kindness

Blog banner

Concurrency and Deadlocks

Blog banner

Music helps reduce stress

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Embedded Operating System

Blog banner

ONLINE NEWSROOMS

Blog banner

Linker

Blog banner

Memory Management - operating system

Blog banner