SS3 Data Processing Lesson Note Second Term
SS3 Data Processing Lesson Note Second Term
org
CLASS : SS 3
Parallel database
Where multiple processors share the main memory (RAM)space but each processor
has its own disk (HDD). If many processes run simultaneously, the speed is reduced,
the same as a computer when many parallel tasks run and the computer slows down.
Where each node has its own main memory, but all nodes share mass storage, usually
a storage area network. In practice, each node usually also has multiple processors.
Where each node has its own mass storage as well as main memory.
*. Higher Performance
*. Higher Availability
*. Greater Flexibility
*. More Users
schoolings.org
Higher Availability Nodes are isolated from each other, so a failure at one node does
not bring the whole system down.
Distributed Database
2) A user doesn’t know where the data is located physically. Database presents the
data to the user as if it were located locally.
4) Data can be joined and updated from different tables which are located on different
machines.
8) While recovering a failed system, the DBMS has to make sure that the recovered
system is consistent with other systems.
In a homogeneous distributed database, all the sites use identical DBMS and
operating systems.
Architectural Models
Networking
Networking is the practice of linking two or more computing devices together for the
purpose of sharing data. Networks are built with a mix of computer hardware and
computer software.
Network Design
schoolings.org
Computer networks also differ in their design. The two basic forms of network design
are called client/server and peer-to-peer. Client-server networks feature centralized
server computers that store email, Web pages, files and or applications.
A Network Topology
A network topology represents its layout or structure from the point of view of data
flow.
Network Protocols
Communication languages used by computer devices are called network protocol. Yet
another way to classify computer networks is by the set of protocols they support.
Networks often implement multiple protocols with each supporting specific
applications. Popular protocols include TCP/IP, the most common protocol found on
the Internet and in home networks.
The Internet
The Internet is the global system of interconnected computer networksthat use the
Internet protocol suite (TCP/IP) to link devices worldwide. It is anetwork of networks
that consists of private, public, academic, business, and government networks of local
to global scope, linked by a broad array of electronic, wireless, and optical networking
technologies. The Internet carries an extensive range of information resources and
services, such as the inter-linked hypertext documents and applications of the World
Wide Web(WWW), electronic mail, telephony, and peer-to-peer networks for file
sharing.
An intranet
An extranet
An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users
outside the company. It has also been described as a "state of mind" in which the
Internet is perceived as a way to do business with other companies as well as to sell
products to customers.
A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office building,
or closely positioned group of buildings. Each computer or device on the network is a
node.
A Metropolitan area network (MAN) is a large computer network that usually spans a
city or a large campus.
A wide area network (WAN) is a computer network that covers a large geographic
area such as a city, country, or spans even intercontinental distances, using a
communications channel that combines many types of media such as telephone lines,
cables, and air waves. A WAN often uses transmission facilities provided by common
carriers, such as telephone companies.
Client-Server Network
In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs
are connected and share resources without going through a separate server computer.
A P2P network can be an ad hoc connection—a couple of computers connected via a
Universal Serial Bus to transfer files.
Network Topology
There are four principal topologies used in LANs: bus, ring, star and mesh. The most
widely used of these is bus, because it is employed by Ethernet, which is the dominant
LAN architecture. In a bus topology all devices are connected to a central cable,
called the bus or backbone. This topology is relatively inexpensive and easy to install
for small networks.
schoolings.org
In a ring topology each device is connected directly to two other devices, one on
either side of it, to form a closed loop. This topology is relatively expensive and
difficult to install, but it offers high bandwidth and can span large distances. A
variation is the token ring, in which signals travel in only one direction around the
loop, carried by a so-called token from node to node.
In a star topology all devices are connected directly to a central computer or server.
Such networks are relatively easy to install and manage, but bottlenecks can occur
because all data must pass through the central device.
The mesh topology can be either a full mesh or a partial mesh. In the former, each
computer is connected directly to each of the others. In the latter, some computers are
connected to most of the others, and some are connected only to those other nodes
with which they exchange the most data.
The several basic network topologies can be combined in various ways to form hybrid
topologies, such as a ring-star network or a tree network. The latter consists of two or
more star networks connected to a linear bus.
The word topology comes from the Greek words topos meaning place and logos
meaning study. It is a description of any locality in terms of its layout. Topology is a
branch of mathematics concerned with properties of geometric figures that are
distorted without tearing or bonding together.
Internet security
Malware
Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems.
Malware is defined by its malicious intent, acting against the requirements of the
computer user, and does not include software that causes unintentional harm due to
some deficiency.
A botnet
Computer Viruses
schoolings.org
Computer Viruses are programs that can replicate their structures or effects by
infecting other files or structures on a computer. The common use of a virus is to take
over a computer to steal data.
*. Computer worms
*. Computer worms are programs that can replicate themselves throughout a computer
network, performing malicious tasks throughout.
*. Ransomware
*. Spyware
*.A Trojan horse, commonly known as aTrojan, is a general term for malicious
software that pretends to be harmless, so that a user willingly allows it to be
downloaded onto the computer.
Denial-of-service attacks
Phishing
Phishing occurs when the attacker pretends to be a trustworthy entity, either via email
or web page. Victims are directed to fake web pages, which are dressed to look
legitimate, via spoof emails, instant messenger/social media or other avenues. Often
tactics such as email spoofingare used to make emails appear to be from legitimate
senders
Application Vulnerability
schoolings.org