facebook linkedin twitter

Technology Basics: Bits and Bytes

Technology Basics: Bits and Bytes

In business, everything is measured. Every minute is quantified in order to run the most profitable business possible. When measuring data the measurements you’ll most hear are in bits and bytes. Today, we’ll get into the various ways bits and bytes are used to describe the technology we all use.

When you go to buy a computer, some of the first information you’ll see are the size of the hard drive and the measure of random access memory (RAM). You’ll see numbers like 500GB or 2TB, and if you don’t know about computers, or more specifically, data, you would have trouble really understanding what those numbers mean.

The easiest way to begin to understand the measurements of data is to start with the bit; and the best way to think about the bit is as the smallest increment of data on a computer. Computers use binary (or base two) math which presents every would-be digit as a bit. Every bit can have a value of 0 or of 1, that’s it. Today’s computers generate bits through fluctuations of electric current that run through a computer’s components. These fluctuations in voltage into the ones and zeros that are used to transmit bits, process calculations, and relay data across your network.

The methods used of network message encoding include:

  • Wi-Fi carries bits using radio signals
  • Ethernet connections carry bits using electric signals of varying voltages
  • Fiber connections use pulses of light to carry bits

(Hopefully these bits are encrypted so others can’t interpret them without permission.)

The byte, then, is just simply a fixed-length sequence of bits. Today’s technology organizes data into bytes to improve speed and efficiency of data processing. Since bits are such a small data figure, a byte (being eight times larger) is often thought of as the base measure for data.

Furthermore, since the rate at which data travels through a computer network connection is typically measured in time, the units that are used are bits per second (bps). Today’s computing networks are capable of transmitting millions (or billions) of bits per second (called megabits{Mbps}/gigabits{Gbps}, respectively), and the speed in which data is transferred, from machine to machine, keeps growing as both file sizes, and computing components rely on and can handle more data.

This is why you’ve probably heard of gigabit network switches and other devices. If a device supports 1 Gbps, it can transfer a single gigabit per second. Depending on your network requirements, your business might need more for traffic to flow smoothly across the network. Everything else on your network from the cables to the routers and access points, to the PCs themselves could also play a role in the maximum speed of your overall network.

By the Numbers
Every byte is made up of eight bits. A kilobyte, then, would be 1,000 bytes, right? Not so fast. Since computers are based on the binary system, it means that hard drives, memory, and bandwidth are measured in powers of two; and, 2 ^ 10 equals 1,024, not 1,000.

For most people, looking at the numbers in this way can be mightily confusing.

The best way is to give examples of where bits and bytes come into play in day-to-day computing. One example is that of an IP address. IP addresses in Internet Protocol (IP) consist of 32 bits (or four bytes). The IP address 192.168.1.1 has values of 192, 168, 1, and 1 for each of its bytes. The encoding of that IP address in bits looks like this:

11000000 10101000 00000001 000000001

This means that:

  • 192 = 1100000
  • 168 = 1010100
  • 1 = 00000001

Convert Bits to Bytes (and Beyond)
If you (for some reason) need to convert bit and byte, here is the conversion table:

  • 8 bits = 1 byte
  • 1,024 bytes = kilobyte
  • 1,024 kilobytes = megabyte
  • 1,024 megabytes = gigabyte
  • 1,024 gigabytes = terabyte

If you were to convert 4 kilobytes into bits, you’d have to convert kilobytes to bytes (4 x 1,024) and then use that total (4,096) to convert to bits (8 x 4,096 = 32,768).

So for consumers, when you purchase a hard drive that has 1 terabyte of data, it actually has about 8 trillion bits. Why do we use the term “about?” Hard drive manufacturers are assuming a rounded 1000 megabytes per gigabyte, while most computers use the 1,024 number. This means when you purchase a 1 terabyte hard drive, you’ll immediately notice about 35 gigs aren’t available. Plus, your operating system will require a small amount of space for the disk.

Computing isn’t magic, as it must sometimes seem to the layman. It is a structured system with very static rules. If you would like to learn more about computers, technology, and how it is deployed for business and personal use, look around our blog. We produce a lot of useful and interesting technology-based content that can help you understand the often-confusing technology world.

To talk to one of our technology professionals, call us at (703) 821-8200.

Automation Helps Deliver Secure Networks and Infra...
Technology Addiction is a Problem in Children and ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Network Security Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips User Tips Mobile Devices Smartphones Gadgets Business Continuity Innovation Disaster Recovery Android Microsoft Office Social Media Mobile Office Virtualization Network VoIP Data Backup Communication Smartphone Server Mobile Device Management Collaboration Miscellaneous Productivity Data Recovery Windows 10 Upgrade Tech Term Ransomware Windows IT Support Unified Threat Management Remote Monitoring Passwords communications Facebook Operating System Holiday Vendor Management Managed IT services Mobile Computing Apps Cybersecurity BYOD Remote Computing BDR Phishing Users WiFi Mobile Device Analytics Marketing The Internet of Things Automation Firewall History Outsourced IT Apple Artificial Intelligence Save Money Data Management Internet of Things Browser Managed IT Services Alert IT Consultant Encryption Big data App Going Green Spam Bring Your Own Device Antivirus Maintenance Printer Gmail Bandwidth Office Health Content Filtering Best Practice Information Technology Cloud Computing Cybercrime Lithium-ion Battery Windows 10 Cost Management Windows 8 Help Desk Outlook Office 365 Wireless Technology Hiring/Firing Search Budget Hard Drives Two-factor Authentication Saving Time Tech Support Virus Business Technology Managed IT Employer-Employee Relationship Phone System Update IBM Hacking Money Training Document Management Access Control Computers VPN Travel Blockchain Recovery Data storage Risk Management Networking Legal Save Time Information Regulations Administration Healthcare SaaS Running Cable Humor Proactive IT Customer Service Hard Drive It Management Applications Law Enforcement Mobility Website Twitter Government Intranet Managed Service Compliance Education Scam Flexibility Excel Black Market Word Data Breach Current Events Cryptocurrency Password Cortana Customer Relationship Management Laptop Value Project Management Business Intelligence Digital Business Growth Augmented Reality Hacker Digital Payment PowerPoint Websites Machine Learning Router Downtime Fax Server Telephone Systems Comparison Tablet Paperless Office Company Culture Sports User Computing Computer Repair Disaster File Sharing End of Support Social Networking Hosted Solution Social Robot Data Security Wireless Avoiding Downtime Google Maps DDoS Securty iPhone Patch Management Social Engineering Data Loss Solid State Drive Conferencing Bluetooth Streaming Media Chromebook Vendor Retail Computing Infrastructure Hack Redundancy How To eWaste Net Neutrality Co-managed IT Monitoring Private Cloud Evernote User Error Download Google Docs Experience Chrome Telephony Monitors Cleaning Gaming Console Start Menu Tech Terms Management Processors Microchip Taxes Office Tips Text Messaging Webcam Mobile Technology Lifestyle USB Distributed Denial of Service Computer Accessories YouTube Presentation Vulnerabilities Software as a Service Trending Uninterrupted Power Supply Public Cloud Unified Communications Settings Specifications Safety Virtual Desktop Mouse Identity Theft Bitcoin Statistics Inbound Marketing Data Protection Documents Programming Entertainment IT service Network Congestion Heating/Cooling Politics Storage Virtual Reality Emails Automobile Pain Points Organize Telephone System Scalability LiFi Google Play Analytic Assessment SharePoint Mobile Security Best Available Motion Sickness Keyboard Recycling Tip of the week Multi-Factor Security Cost Messenger Tracking Domains Processor Product Reviews Google Calendar Software License Trends Devices Rental Service Meetings Deep Learning Public Speaking Browsers VoIP Fraud Tactics Work/Life Balance Read Upselling Touchscreen News Video Surveillance Knowledge Visible Light Communication Cabling Memory Security Cameras Consultation UTM Content Web Server Shortcut User Tip Virtual Assistant Webinar Legislation Error Books IT consulting Troubleshooting Workers Navigation Saving ZTime Technology Tips IT Plan Enterprise Resource Planning Wi-Fi Administrator Entrepreneur Device Management Accountants A.I. HIPAA Supercomputer Data Analysis Business Managemenet Audit email scam Addiction Environment Content Management Fake News Debate Advertising Electronic Payment Worker Flash GDPR Harddrive Data Warehousing Multi-factor Authentication CIO Competition Emergency Hard Drive Disposal Wireless Headphones Telephone Reading Windows XP Business Owner Samsung Tech Access Migration Connected Devices Staffing Google Wallet online Currency GPS Equifax Fleet Tracking Employer Employee Relationship Displays IP Address Fileless Malware External Harddrive Computer Care Network Management G Suite Society Microsoft Excel LinkedIn Licensing Human Resources Modem Google Drive Windows Server 2008 Best Practives Device security MSP Hacks Physical Security Micrsooft Application Proxy Server 3D Ebay Vulnerability Nanotechnology Social Network Relocation Tablets Term Thin CLient Spyware Mobile Payment Desktop Finance Banking Botnet Drones Electronic Medical Records Startup Asset Tracking Directions Skype Smart Phones Electricity Printing Microserver Business Cards Service Level Agreement Sync Archive Dark Web Unified Threat Management Backup and Disaster Recovery Permissions Language SSID Windows 7 Username Notifications Digital Signature CCTV Adminstration Pirating Information Screen Reader Customer Resource management Reliable Computing Processing Point of Contact Leadership cache Television Get More Done Gamification Business Metrics Teamwork Computer Malfunction Health IT Printer Server Smart Tech Distribution switches Writing Managed IT Service WannaCry Downloads Turn Key Piracy Upload In Internet of Things Music Upgrades Bookmark Corporate Profile Fiber-Optic Database PDF Time Management Freedom of Information Trojan HTML Managing Stress CrashOverride Regulation Medical IT 3D Printing Capital Printers Productuvuty Cooperation

toner1