wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
1 Discussions
1322 Reads

'A' of "Networking"

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

- An ideal way for understanding new concept for beginners!!!.

This blog and subsequent blogs aims to answer these basic questions regarding networking.



NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.



MERITS

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)



DEMERITS

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

II. COST (Building a network is costly affair)

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)



Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

Thus answering "WHAT is networking" and "WHY do we need networking"...



Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

Thank You all.

Comments ()


Sign in

Read Next

Deadlock in operating system

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Types of Threads

Blog banner

IoT Evolution

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

GIS

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Paginng In OS

Blog banner

Ubiquitous Computing

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Python as a tool for Data science task & project

Blog banner

Self-love: Being the reason of your own smile

Blog banner

What is Packet Filtering?

Blog banner

Memory management and virtual memory

Blog banner

Memory Management

Blog banner

Self managing devices

Blog banner

Cyber Security in Data Breaching

Blog banner

Modern operating system

Blog banner

Threads

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Race Condition

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Characteristics of Etherum

Blog banner

MAILFENCE

Blog banner

Basic Security For SOAP Services

Blog banner

Why Friendship at Work is Important

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

VIRUS

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

KASHMIR TRIPS

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

ZOHO

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Development Of Modern Operating System

Blog banner

semaphores in os

Blog banner

Operating system evolution

Blog banner