1.3 Exchanging data Flashcards

How data is exchanged between different systems

You may prefer our related Brainscape-certified flashcards:
1
Q

Layering

Application

A

Definition: Divides complex tasks of networking into smaller simpler tasks that work in tandem with each other.

Layers:
- Application
- Transport
- Internet
- Link

Application Layer:
The application layer selects protocols relating to the application being used to transmit data over a network, usually the Internet. If this application is a browser, for example, then it would select an appropriate higher-level protocol for communication such as HTTP, POP3, or FTP.

Transport Layer:
Uses the TCP protocol to establish an end-to-end connection with the recipient computer. Protocols use port numbers to track sessions and add info to the header. Once the connection has been made, the data is split into packets. It will then add the Number/Sequence, the total number of packets, and the port number packets should use. The packets are numbered so that they can be reassembled in the correct order.

Internet
Uses the IP part of the stack and adds to each packet the destination IP address and the source IP address. All routers operate at this layer and use the IP address to find out where packets are heading. The addition of the IP address and port number forms a socket like 127.56.87.2:80. The socket specifies which device the packet must be sent to and the application being used on that device.

Link
This is the physical connection between the network nodes and the unique Media Access Control (MAC) addresses identifying the Network Interface Cards (NICs) of the source and destination computers. These mean that once the packet finds the correct network using the IP address, it can then locate the correct peice of hardware. The destination MAC address is that of the device that the packet is being sent to next. Unless the two computers are on the same network, the destination MAC address will initially be the MAC address of the first router that the packet will be sent to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Circuit switching

A

Creates a direct link between the two devices for the duration of the communication.

Advantages:
- Exclusive creation is created between the two devices for the duration of the communication, data segments arrive in the same order.

Disadvantages:
- Bandwidth is wasted when no data is being sent.
- The two connected devices must have the same transfer rate otherwise they cannot transfer any data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet switching

A

Breaks down streams of data into smaller blocks, each sent independently of one another.

Advantages:
- At each node, packets are sent via whichever route the node deems least congested, maximising bandwidth
- It is more affordable and efficient than circuit switching because all the bandwidth can be used at once, but requires less complex infrastructure and easily respond if parts of the network fail.

Disadvantages:
- Even though sending data down the least congested route maximises bandwidth, it may not guarantee the quality of the data being sent.
- The data may be out of order once sent, however, this can be eliminated using Cyclical Redundancy Checks or Checksums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNS

A

The DNS is a system used to name and organise internet resources. It is a hierarchy in which each smaller domain is separated from the larger domain by a full stop.

TLD = Top Level Domain
2LD = 2nd level domain.

Domain names are much easier to remember than IP addresses, which is why they are used to link servers across the world. The role of the DNS server is to translate these domain names into IP addresses when we wish to access a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Client Server

A

Client-server networks consist of terminals known as clients connected to a server.
- Controls access and security for a shared file store.
- Manages access to the internet.
- Manages printing jobs.
- Provides email services.
- Client can make a request to the server for data, connections and all other services.

Advantages:
- Easier to manage file security due to the centralized architecture. So access controls like login requirements ensure that authorised users can access data.
- Easier to backup shared data because they can be controlled centrally by the network administrator so the process of creating and managing backups is streamlined.
- Easier to install software updates to all computers on the network because of all the information and resources are stored on a central server, meaning that when it comes to software updates, the centralisation will simplify the process significantly,

Disadvantages:
- Can be expensive to set up and maintain as the servers, and the software which needs to be licensed can get quite expensive. As well as that, the cost of storage, RAM, processors which can handle multiple tasks at the same time is quite significant.
- IT specialists are required in order to maintain the server because of how much maintenance is required for all the parts in the server.
- As the server is the single point of failure, clients can risk losing network access if the server fails.

Client servers are mainly used by large organisations such as schools which have multiple clients as well as computers which need to access to the same information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Peer to Peer Server

A
  • Peer is connected to eachother through a logical connection.
  • There is no central server.
  • Each peer is responsible for their own files, backups and updates.
  • In the case of a printer,peers usually have their own printer, however, one peer can send print jobs to another peer to process but they must be switched on to communicate with the printer.

Advantages:
- Very easy to maintain because there is no central server, meaning no IT specialists are needed.
- Cheaper to set up as there is no expensive hardware.

Disadvantages:
- Network is less secure seeing as there is no central server which provides security to the computers connected to it.
- Users need to manage their own backups so if their client gets damaged and they have not backed it up, they risk losing files and important information.

Suitable for smaller organisations with fewer computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Relational databases

A

Recognises the differences between entities by creating different tables for each entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Flat file

A

Database that consists of a single file. Most likely based around a single entity and its attributes.

Usually written as: Entity1(Attribute1,Attribute2,Attribute3…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Primary Key

A

Unique identifier for each record in the table. Primary key is shown by underlining it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Foreign Key

A

Attribute which links two tables together. Exits in one table as the primary key, and acts as the foreign key in another. Shown using an asterik (*)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secondary key

A

Allows a database to be searched quickly. In a database full of names and ID Numbers for example, the patient may not know their ID but know their surname. Therefore a secondary index is set up on the surname attribute, making it possible to order and search by surname which makes it easier to find specific people in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Types of entity relationship models.

A
  • On-to-one: Each entity can only be linked to one other entity. E.g., One husband, one wife.
  • One-to-many: One table can be associated with many other tables. E.g., One mother, multiple children and can be done in vice versa (Many children to one mother).
  • Many to many: One entity can be associated with many other identities and the same applies to the other way around. E.g. One students can enrol into many courses and vice versa.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ways of capturing data

A
  • Manually entering data into a database: E.g., Amount of pedestrians participating in a survey.
  • Magnetic Ink Character Recognition (MCIR): E.g., Cheques. Banks use this to scan them, all the details excluding the amount are printed in a special magnetic ink recognised bt a computer but the amount must be entered manually.
  • Optical Mark Recognition: Used for multiple choice questions on a test.
  • Optical Character Recognition: Can also be used on multiple choice questions as well as convert images into a machine readable format.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Selecting and Managing Data

A

Selecting Data:
- Can be collected in SQL or QBE (Microsoft Access)
Managing Data:
- Can be managed in Database Management Language (DML).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Exchanging Data

A

Common Formats (NOT EXCHANGE METHOD):
- XML
- JSON - Has replaced XML largely.
- CSV - Comma-separated values
Manual Methods:
- Memory stick.
- Optical media.
- Removal hard disk.
- Email.
- Paper-based
Automatic methods:
- Electronic Data Interchange (EDI) - protocol between two systems to facilitate the exchange data.
- Uses: order placement system for when a shops stock is low.

17
Q

PageRank Algorithm

A
  • Used to help compile and rank website pages and the list of results is returned by a search engine.
  • At a high level, it works by checking the number and quality of links to a page in order to determine roughly how important that page is.
  • The assumption is that websites of greater importance are more likely to be linked to from other websites.
18
Q

Algorithm Breakdown (PageRank)

A

PR(A) = (1-d) + d (PR(T1)/C(T1) + … + PR(Tn) / C(Tn)).

  • PR(A) - Page Rank of A
  • C(Tn) - Total count of outbound links from Web Page n including the inbound link to Page A –> Each website has a notational vote of 1, shared between all the web pages it links to.
  • PR(Tn) / C(Tn) - The share of the vote page A gets from Pages T1 through Tn. Each of these vote fractions are added together and multiplied by d (dampening)
  • d (dampening) - Factor that prevents PR(Tn) / C(Tn) from having too much influence. –> Notationally set to 0.85 which equates to roughly 6 clickthrough links. The average user will then end their browsing sessions or enter a new web address rather than following another link.
19
Q

Search Engine Indexing

A

Crawling
Search engine will use automated software called crawlers or spiders to explore the internet. They visit web pages and follow links on those pages to discover new or updated content. By moving from one link to another, the crawler builds a vast network of pages. It also allows the search engine to understand structure of the website and identify new pages, ensuring content on the web is continuously mapped. Large search engines like Google will use multiple crawlers to cover as much of the internet as possible, as these crawlers visit websites regularly to keep up to date.

Indexing
Once a page is crawled, it moves to the indexing phase. Contents of the page is processed, analysed, and stored in a large database known as an index - which is a structured data repository where search engines store all information gathered from webpages in a way that makes it easy to retrieve later. During indexing, the search engine also extracts key data such as: text content, meta tags, images, and keywords, which are all associated with the URL of the page. It may also analyse page structure, looking for headings, internal and external links, and multimedia content. This structured information helps the search engine match pages to relevant queries accurately and efficiently.

Ranking and Algorithms
When a user types a query into a search engine, the system retrieves the relevant information from its index. However, because there are often thousands or millions of possible pages for a query, the search engine must rank them by relevance. This ranking process is determined by complex algorithms which consider various factors, including:
* Key words: Do the key words in a query match the content of the page
* Page authority: Is it reliable or linked to by other reputable sites
* User experience: Does the page load quickly, is it mobile friendly, and is the content easy to navigate.
* Freshness: Is the information up to date.
An example of a ranking algorithm is Google’s PageRank, and was one of the first to use link analysis to determine page relevance. However, today many search engines use machine learning models to improve their algorithms in order for a more precise and personalised results.

Serving Results
Search engine will then serve results to the user. This part is where the search engine delivers an (SERP) Search Engine Results Page that displays a list of links, descriptions, and other resources relevant to the query. Most search engines provide additional features such as rich snippets which give users more information on the SERP, such as images, videos, location maps, or even direct answers to factual queries. This enhances user experience by making it easier to find information without needing to click through various pages.

20
Q

Client Side Processing

A
  • Initial data validation using JavaScript.
  • Manipulates user interface elements
  • Applys website styles (CSS)
  • Anything done on client side reduces load on the server
  • Reduces the amount of web traffic that is having to leave the client and travel between them and the server.
21
Q

Server Side Processing

A
  • Provides further validation - Things which can’t be done on client side.
  • Queries and updates the server database.
  • Encodes data into readable HTML
  • Keeps organisational data structure secure.
  • Performs complex calculations.