Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Cloud»Networking Basics
    Cloud

    Networking Basics

    ltieintern4By ltieintern419 September 2021Updated:20 September 2021No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The first computer network was used in 1950, they were generally used in few organizations to facilitate the exchange of information between different people and computers, this was more reliable method of transferring data. The other benefit of networks was the ability to share physical resources, these are relatively small networks of nearby computers called LAN.

    Illustration of a Network Topology

    LAN could be as close as computers in an office room or in a school with hundreds of computers connected. Most famous LAN is ETHERNET which transmits data to all computers connected in the network. When a computer transmits a data within a small network, it sends electrical signals onto the cable which is received by all the computers connected within that network which receives same information.

    To solve this problem, it had to find unique way to transmit data separately to every computer that is using unique media access control or MAC address. This has helped to share data to whom it is intended to. The general term for this approach is carrier sense multiple access or CSMA. The basic carrier of ETHERNET is copper wire, whereas WIFI carries data through radio waves. The rate at which a carrier can transmit data is Bandwidth.

    Due to many transfers at a time, this will lead to more collisions saying everyone is talking over one another. So, Ethernet had a surprisingly simple and effective fix when transmitting computers detector collision, they wait for a short period before attempting to retransmit for example one second of course, this doesn’t work in all the computers used the same way generation they just collide again one second later so random. Is added one computer might wait 1.3 seconds while another waits 1.5 seconds, the computer that waited 1.36 wake up find the carrier to be silent start transmitting when the 1.5 second computer wakes up a moment later it will see the carriers in use and will wait for the other computer to this helps but doesn’t totally solve the problem. So, an extra trick is used, if a computer detects a collision while transmitting it will wait one SEC plus some random extra time. However, if it collides again which suggests network congestion instead of waiting another one second. If it collides again it waits for seconds and so on until it is successful with computers backing off the rate of collision goes down and data starts moving again freeing up the network family saved this backing off behaviour using an exponentially growing wait time is called exponential back off. Both Ethernet and Wi-Fi use it and so do many transmission protocols but even with clever tricks like exponential back off you could never have an entire universities worth of computers on one shady and then cable churches collisions and improve efficiency we need to shrink the number of devices on any given shared carrier was called the collision domain.

    In our earlier Ethernet example, where we had six computers on one shared cable- one collision domain reduce the likelihood of collisions we can break this network into two collision domains by using a network switch it is between our two smaller networks and only passes data between them if necessary. It does this by keeping a list of Mac addresses on one side of the network so if a must transmit to see the switch doesn’t forward the data to the other network, there is no need this means if a computer wants to transmit to A and the same time the network is wide open and two transmissions can happen at once but if A wants to send data to B then the switch passes it through and the two networks are both briefly occupied. This is essentially how big computer networks are constructed including the biggest one of all the Internet which literally interconnects a bunch of smaller networks allowing internetwork communication was interesting about these big networks is that there is often multiple paths to get data from one location to another and this brings us to another fundamental networking topic, the simplest way to connect to distant computers or networks is why allocating a communication line for their exclusive use this is how early telephone systems worked. For example there might be 5 telephone lines running between Melbourne and New York if Sam picked up the phone wanting to call Henry in the 1910s Sam would tell a human operator where he wanted to call and then physically connect Sam’s phone line into an unused line running to New York for the length of that call that light was occupied and if all five lines were already in use Sam would have to wait for once it become free, this approach is called circuit switching because you’re literally switching whole circuits to route traffic to the correct destination. It works fine, but it is relatively inflexible and expensive because there’s often unused capacity on the outside once you have aligned to yourself spend all the money to buy one for private use, still buy dedicated circuits to connect their data centres. Another approach for getting data from one place to another is message switching which is sort of like how the postal system works instead of a dedicated route from messages are passed through several stops. Message switching is not that it can use different routes making communication more reliable tolerant sticking with our mail.

    Network routers the number of hops is message takes along the route to reach destination is called the hop count. Keeping track of the hop count issue SFL because it can help identify routing problems. For example, if Melbourne thinks the fastest route to Sydney is through Canberra but Sydney thinks the fastest route is through Melbourne plus five because both cities are going to look at the destination address and end up passing the message back and forth between them endlessly not only wasting bandwidth but there is a routing error that needs to be fixed. This kind of error can be detected because the hop count is stored with the message and updated along its journey. Hop limit a downside to message switching is that messages are sometimes big so they can clog up the network because the whole message must be transmitted from one stop to the next before continuing its way while a big file is transferring that whole.

    Even if you have a tiny one KB email through the big file transfer to finish or take a less official way that’s bad solution is to chop up big translations into many small pieces packet just like with message switching each packet contains a destination address on the network. So, readers know where to forward them this format is defined by the Internet Protocol more IP for sure a standard create 1970s every computer connected to a network it’s IP address for example 110.200.205.

    For more Business Networking Solutions, please visit https://www.benchmarkitservices.com.au

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleWhy Cloud Computing is the Future of All Businesses – Data Security and Advantages
    Next Article Network Connection Types
    ltieintern4

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    [email protected]

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: [email protected]

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.