wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
THAKUR CHANDAN KUMAR
Nov 05, 2022
0 Likes
0 Discussions
117 Reads

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

 

- An ideal way for understanding new concept for beginners!!!.

 

This blog and subsequent blogs aims to answer these basic questions regarding networking.

 

NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.

 

MERITS

 

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

 

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

 

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

 

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)

 

DEMERITS

 

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

 

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

 

II. COST (Building a network is costly affair)

 

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)

 

Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

 

Thus answering "WHAT is networking" and "WHY do we need networking"...

 

Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

 

Thank You all.


Comments ()


Sign in

Read Next

Digital Marketing

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Memory Management

Blog banner

Jira service Management

Blog banner

Internet of Things

Blog banner

Kafka - A Framework

Blog banner

Street foods

Blog banner

Privacy in Social Media and Online Services

Blog banner

Memory hierarchy

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Malware Defense

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Memory Hierarchy

Blog banner

Types of Threads

Blog banner

Multicore and multithreading 171

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Retiring ISS

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Security Issues and Countermeasures

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Memory Management

Blog banner

Understanding - Proof of Work!

Blog banner

Travelling blog

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Email Privacy

Blog banner

USES OF WHATSAPP

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Teenagers of Today

Blog banner

Man In The Middle Attack

Blog banner

What is Internet

Blog banner

Deadlocks

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Starting Android Activity Using Intent

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Fault Tolerance

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

FIREWALL

Blog banner

Crypto tax evasion

Blog banner

Theads

Blog banner

City of Mumbai (Bombay):

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner