wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

A-B-C of Networking: Part-1 (Basics)

profile
THAKUR CHANDAN KUMAR
Nov 05, 2022
0 Likes
0 Discussions
117 Reads

"Before Learning any new concept, make sure that we get the answer of the basic rhetorical questions such as 'WHAT is it?', 'WHY do we need it?' and 'HOW it works?'."

 

- An ideal way for understanding new concept for beginners!!!.

 

This blog and subsequent blogs aims to answer these basic questions regarding networking.

 

NETWORKING, the term seems familiar as we use it in our day to day life but the meaning of networking must be known along with its usage. Networking as in "NET + WORK + ing" (kindly see the note below for the reason of word-distribution), can be co-related with the simple "mosquito net" that we use at our residence. The concept remains same i.e consider a mosquito net and place computers (often referred to as 'systems') at every intersection point of the net. Thus all systems are placed in the NET, but hold on, its NOT NETWORKING yet. This is the state where the system are just connected to each other. Now when these computers are in a state of EXCHANGING INFORMATION, i.e the system are in WORKing condition with respect to the network, then the NETWORK is ultimately created.

 

MERITS

 

There are several benefits of networking because of which we need it for our day to day life. The benefits include:

 

I. DATA and KNOWLEDGE SHARING (eg: blogging, e-mail)

 

II. RESOURCE SHARING (eg: printers in Cyber cafe [usually there is just one printer and all system can send the print command to the single printer, one at a time])

 

III. STORAGE CAPACITY (eg: google drive or google photos help to upload the documents and photos respectively in the google account which reduces the storage space consumption on the physical device)

 

DEMERITS

 

Along with benefits, there are demerits for any concept. Thus Demerits must also be taken into account such as:

 

I. SECURITY RISK (eg: Backdoor Trojans, Viruses etc may enter the system as the system is connected in network)

 

II. COST (Building a network is costly affair)

 

III. NETWORK FAILURE (The connection can get disrupted at any point of time due to various natural or man-made interventions)

 

Having stated all the demerits, there are no demerits of the concept of Networking as such, it all depends on the person using it and the purpose of the usage.

 

Thus answering "WHAT is networking" and "WHY do we need networking"...

 

Note: A suggestion for all knowledge-seekers reading my blog, for any term that you come across which seems difficult, try to break-down the term to the lowest level possible and then try to find out its relevant meaning in day to day life and then relate it with the subject content. Might be helpful.

 

Thank You all.


Comments ()


Sign in

Read Next

IO Buffers

Blog banner

child Labour

Blog banner

What is thread and alse multithreading

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

INTRANET

Blog banner

Cache Memory in Operating Systems

Blog banner

Facebook marketing

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

RAID - LEVELS OF RAID

Blog banner

Consumer to consumer Business model

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Deadlock and Starvation

Blog banner

Data Security must be your Priority!

Blog banner

IoT Evolution

Blog banner

Direct Memory Access

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Scheduling

Blog banner

Memory Management

Blog banner

Importance Of Time

Blog banner

Deadlock

Blog banner

Self defence

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Cache Memory(142)

Blog banner

Explaining Buffer Overflow with Example

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Microsoft Windows Overview

Blog banner

indian premier league

Blog banner

Routers

Blog banner

Different Types of Data

Blog banner

Synchronization

Blog banner

IT service level agreement

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Risk management in IT

Blog banner

Benefits of yoga and meditation

Blog banner

Rain bow

Blog banner

IT Service Continuity Management

Blog banner

My First Dream Bike

Blog banner