networking & dbms

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:26 AM on 8/23/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

65 Terms

1
New cards

Network Topology

how devices in a computer network are connected

2
New cards

node

any device or point in the network crucial for transmitting and receiving data

3
New cards

link

connection between two nodes

4
New cards

types of topology

mesh, star, bus, ring, tree

5
New cards

mesh topology

every node has a dedicated link in every other node

6
New cards

Pros and Cons of mesh topology

pros: redundant links result in fault tolerance, easy fault identification and isolation
cons: each node must have an interface for every other node, limited number of I/O ports on each computer

7
New cards

star topology

every node is connected to a central server

8
New cards

Pros and Cons of star topology

pros: easy to install and wire
cons: more expensive cabling

9
New cards

bus topology

single link connects all nodes in the network and data is broadcast simultaneously

10
New cards

Pros and Cons of bus topology

pros: easy to implement and extend
cons: not scalable and expensive

11
New cards

Ring topology

nodes are situated in a circular fashion and data is transmitted in a unidirectional loop

12
New cards

pros and cons of ring topology

pros: fault tolerance builds into design, data packets move at higher speeds
cons: expensive and limited scalability

13
New cards

tree topology

hierarchical tree structure with parent nodes and children nodes

14
New cards

pros and cons of tree topology

pros: scalable, high security, reliable
cons: more expensive due to amount of cables

15
New cards

transmission modes

transferring of data between two devices

16
New cards

types of transmission modes

simplex, half duplex, full duplex mode

17
New cards

simplex mode

communication is a one way street

18
New cards

pros and cons for simplex mode

pros: cost-effective and reliable, used when feedback or response isn’t required
cons: no way to confirm whether transmitted data has been received correctly

19
New cards

half duplex mode

two nodes communicate bidirectionally but only one can receive and transmit at a time, similar to a walkie-talkie

20
New cards

pros and cons of half duplex mode

pros: more efficient mode of communication than simplex mode
cons: delay between transmission and reception, less reliable than full duplex and more expensive than simplex

21
New cards

full duplex mode

half duplex mode but can transmit and receive simultaneously

22
New cards

pros and cons of full duplex

pros: ideal for real time applications and provides highest level of reliability and security due to not needing to check for correctedness in data transmitted
cons: expensive, complex, and not needed for certain applications

23
New cards

ip address

numerical label assigned to a node that uses the Internet Protocol for communication; two types ipv4 and ipv6

24
New cards

difference between ipv4 and ipv6

ipv4 uses two 32 bit integers expressed in decimal notation for the network address and host address
ipv6 uses 128 bit addresses; other improvements include improved security (data authentication, encryption), simplified header format, better mobile device support, stronger and more reliable support for QoS features which aid in higher traffic and audio/video quality on pages

25
New cards

subnetting

a bigger network split into smaller ones to maintain security, scalability, reduce traffic for some structures, and maintain order and efficiency

26
New cards

disadvantages of subnetting

wasting ip addresses (two per subnet), costly due to internal network devices required to implement

27
New cards

OSI Model

Open system interconnection: 7 layer architecture that collaboratively works to transmit data globally

28
New cards

TCP/IP Model

Transmission Control Protocol/Internet Protocol which is a 4 layer architecture that defines how data is transmitted over networks; achieves it by dividing the data into packets at the sender’s end, then recombining them at the receiver’s end

29
New cards

Network Access Layer

generating data and requesting connections; error prevention and framing

30
New cards

Internet/Network Layer

responsible for routing packets of data from one device to another across a network

IP Protocol

31
New cards

Transport Layer

responsible for reliable data transfer between applications on different devices on network; segmentation, error detection and correction, and flow control

TCP and UDP are transport layer protocols

32
New cards

Application Layer

responsible for end-to-end communication and error-free delivery of data


HTTP/HTTPS, SSH are the application layer protocols

33
New cards

TCP

provides reliable, connection-oriented data transfer between two devices; guarantees a delivery of data in the right order and handles error correction and retransmission

34
New cards

UDP

offers connectionless, efficient data transfer; prioritizes speed over reliability

35
New cards

types of database keys

candidate, primary, alternate, super, foreign, composite

36
New cards

candidate key

uniquely identifies a row in a table without relying on other attributes; can have multiple in a table

37
New cards

primary key

chosen from the candidate keys as the main identifier for a table; only one primary key per table

38
New cards

alternate key

candidate keys that aren’t primary keys

39
New cards

super. key

set of attributes that uniquely identifies a row in a table

40
New cards

foreign key

links a table to another table, establishing a relationship; references the primary key of the other table

41
New cards

normalization

concept in database design that aims to organize data effectively to minimize redundancy and improve data integrity and maintainability through dividing the database into smaller, well-structured tables based on specific rules and principles (forms)

42
New cards

normal forms

series of guidelines to help achieve normalization, getting progressively stricter and reducing even more redundancy

43
New cards

pros and cons of normalization

pros: reduced data redundancy, improved data integrity, enhanced data retrieval and manipulation, simplified data administration
cons: increased complexity and potentially slower performance

44
New cards

1NF

eliminates repeating groups of values within a table; each cell should contain a single atomic value

45
New cards

2NF

no partial dependencies, every non-key attribute must depend on the entire primary key, not just a part of it

46
New cards

3NF

no transitive dependencies; no non-key attribute depends on another non-key attribute, only on the primary key

47
New cards

4NF

addresses multi-valued dependencies that cannot be resolved with 3NF

48
New cards

5NF

deals with higher order dependencies but rarely used in practice

49
New cards

dirty read problem

transaction reads uncommitted data written by another transaction which leads to inconsistencies and inaccurate results
scenario: transaction A starts and updates a data item (e.g. changes a customer’s balance) → transaction A doesn’t commit the change yet → transaction B reads the updated data item from transaction A, even though it’s not finalized → transaction A encounters an error and is rolled back, undoing its changes
problem: transaction B has “dirty data”- it read information that wasn’t final and now doesn’t exist which results in inconsistencies and errors
prevention: various concurrency control protocols to prevent dirty reads and ensure data consistency

50
New cards

dirty read prevention tactics

locking- locks are placed on data being modified by a transaction , preventing other transactions from reading or writing until the lock is released

transaction logging-changes are recorded in a log before being applied to in a database; in case of rollbacks, changes are undone based on the log

51
New cards

transaction

set of operations (read, write, update, delete) that are used for performing a set of logical work

52
New cards

attribute dependency

describes the relationship between two columns and how the values in one or more attributes affects the values in another
e.g. the employee id number would determine the employee name, address, email, etc. thus those other attributes are dependent on the id

53
New cards

conflict serializability & view serializability

concepts in dbms related to correctness of schedules (sequence of read and write operations) in concurrent transaction processing

54
New cards

conflict serializable

a schedule is so if it can be transformed into a serial schedule (a schedule where transactions are executed one after another without overlapping) by swapping non-conflicting operations

two operations are conflicting if they belong to two different transactions, at least one of them is a write, and they access the same data item

55
New cards

ACID properties

properties followed to maintain data consistency before and after a transaction

56
New cards

Atomicity (ACID)

entire transaction takes place at once or doesn’t happen at all

57
New cards

consistency (ACID)

database must be consistent before and after the transaction

58
New cards

Isolation (ACID)

multiple transactions occur independently without interference

59
New cards

durability (acid)

changes of a successful transaction occurs even if the system failure occurs

60
New cards

indexing

creating additional data structures that act as efficient references to the actual data stored in tables; significantly improve data retrieval performance by enabling faster locating of specific rows based on certain criteria

61
New cards

b-tree index

most common and versatile type of indexing method, organizes data in a tree like structure, suitable for various data types and query patterns

62
New cards

hash index

faster lookups for exact value matches, uses a hashing function to directly map values to row locations, not ideal for range queries or sorting as hash values themselves aren’t ordered

63
New cards

full-text index

used for searching text-based columns, stores word occurrences and their locations within the text

64
New cards

covering index

stores all columns needed for a specific query which eliminates the need to access the actual table data, offering exceptional performance on frequently used queries

65
New cards

composite index

combines multiple columns in a single index and useful for queries that involve conditions on multiple columns