wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
Chayan Bhattacharjee
Mar 26, 2017
0 Likes
1 Discussions
1322 Reads

'A' of "Networking"

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

- An ideal way for understanding new concept for beginners!!!.

This blog and subsequent blogs aims to answer these basic questions regarding networking.



NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.



MERITS

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)



DEMERITS

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

II. COST (Building a network is costly affair)

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)



Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

Thus answering "WHAT is networking" and "WHY do we need networking"...



Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

Thank You all.

Comments ()


Sign in

Read Next

Types of threads

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Latest Email Marketing Techniques

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

OS assignment 3

Blog banner

SQL Injection practice on DVWA

Blog banner

The evolution of OS

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Virtual Machine

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Social media

Blog banner

Online Games

Blog banner

VIRTUAL MACHINES

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Impact of social media on the human life

Blog banner

Interesting fact about kangaroo.

Blog banner

Uniprocessor Scheduling

Blog banner

Brain wash of social media

Blog banner

Understanding Regression Analysis

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

What is OS and its overview

Blog banner

How to Run your First android App

Blog banner

Expert System In AI

Blog banner

Types of Hackers.

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Threads

Blog banner

semaphores

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Virtual Machine

Blog banner

Escape

Blog banner

child Labour

Blog banner

Deadlock and starvation

Blog banner

TRIGGERS IN DATABASE

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

virtual machine

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Processes : Process description and control

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Memory Hierarchy

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Tiranga - Abbas Haveliwala

Blog banner