Please enable JavaScript.
Coggle requires JavaScript to display documents.
Data Exchange System - Coggle Diagram
Data Exchange System
OSI Model
- Presentation - Handles translating data from application format to network fomat and vise-versa.
- Session - The construnction, direction, and conclusion of connection between devices occur. Responsible for authentication and reconnection is the even of disconnection
- Application - The user interface that provides the user with protocols such as HTTPS (Hypertext Transfer Protocol Secure)
- Transport - Responsible for transmission of data between network connnection, error recovery, data flow, and retransmission. Co-ordinates how much data to send, how fast, where to go, ect. Most common protocals are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
- Network - Handles the routing of the data, mapping of logical and physical addresses, concludes if data has reached ultimate target,
- Data Link - Made up of two sub layers: Media Access Control (MAC) and Logical Link Control (LLC). Checks for transmission errors and packages the bits into data frames. Manages physical addressing methods for MAC or LLC.
- Physical - The electrical or physical layer of the model. Encompasses the network cables, power plugs, cable pin outs, wireless radio frequences, connectors, tranceivers, repeaters, elevtric voltages, pulses of light ect. Transmitts the digital data bits from the sending device over network communications media to the recieving devices physical layer.
Components
API
An API (Application Programming Interface) uses web services to communicate using HTTPS (HyperText Transfer Protocol Secure) protocol.
-
-
-
Security Processes
Cypher Methods
Caesar cipher - a simple shift cipher, where the alphabets between the message and encryptions are shifted by the same amount
Vigenere cipher - a polyalphabetic cipher, which uses different shift sizes based on a key word
-
-
Polybius cipher - a cipher that involves using a two-dimensional grid as the key to encrypt and decrypt message
-
Existing Methods
-
-
RSA - an asymmetric cipher, which requires both a public key for encryption and a private key for decryption
Twofish - an advanced version of Blowfish, with more control of the level of encryption it can achieve
-
Considerations
-
Data Exchange Approach
Data Complexity
When the set of data to be transfered between systems has relating elements or unknown elements, direct database access may be more effective.
JSON and XML can represent more complex data models. Although REST architecture is designed to avoid complex query and result data.
Frequency of Data Update
APIs and Messaging system methods more easily support transactional updates to avoid constant bulk resynchronization and are likely better options if the data set is updated frequently.
Dataset Size
Data set size
The transfer of very large data sets often requires the use of a file transfer or direct database connection for performance reasons
Data Security
Data Security, both at rest and in transmission, are generally external to data exchange methods. See Security Process
Data Usage
If access to the most up-to-date data is required, synchronous procedures will be required. Is there a benifit to live data?
Data Flows
where a large number of data sources continuously send data to a single receiving system, a streaming method is likely the best approach.
-