Featured Post

14 Top Data Pipeline Key Terms Explained

Image
 Here are some key terms commonly used in data pipelines 1. Data Sources Definition: Points where data originates (e.g., databases, APIs, files, IoT devices). Examples: Relational databases (PostgreSQL, MySQL), APIs, cloud storage (S3), streaming data (Kafka), and on-premise systems. 2. Data Ingestion Definition: The process of importing or collecting raw data from various sources into a system for processing or storage. Methods: Batch ingestion, real-time/streaming ingestion. 3. Data Transformation Definition: Modifying, cleaning, or enriching data to make it usable for analysis or storage. Examples: Data cleaning (removing duplicates, fixing missing values). Data enrichment (joining with other data sources). ETL (Extract, Transform, Load). ELT (Extract, Load, Transform). 4. Data Storage Definition: Locations where data is stored after ingestion and transformation. Types: Data Lakes: Store raw, unstructured, or semi-structured data (e.g., S3, Azure Data Lake). Data Warehous...

Protocols: Top 6 Key Parts

In telecommunications, a protocol is a system of rules that allow two or more entities of a communications system to transmit information. The medium can be any kind of entity.

 iot protocols
 What is PROTOCOL
  1. Important aspects of networks that are neither devices nor media are rules or protocols. These rules are the standards and protocols that specify how the messages are sent, how they are directed through the network, and how they are interpreted at the destination devices. 
  2. For example, in the case of Jabber instant messaging, the XMPP, TCP, and IP protocols are all important sets of rules that enable our communication to occur.
  3. These are the rules or standard that defines the syntax, semantics, and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both.

Communicating systems

They use well-defined formats (protocol) for exchanging messages. 
  • Each message has an exact meaning intended to elicit a response from a range of possible responses pre-determined for that particular situation. 
  • The specified behavior is typically independent of how it is to be implemented. Communications protocols have to be agreed upon by the parties involved. 
  • To reach an agreement, a protocol may be developed into a technical standard. A programming language describes the same for computations, so there is a close analogy between protocols and programming languages: protocols are to communications as programming languages are to computations.

Most commonly used devices in a networking

  1. Switch - the most common device for interconnecting local area networks 
  2. Firewall - provides security to networks 
  3. Router - helps direct messages as they travel across a network 
  4. Wireless Router - a specific type of router often found in home networks 
  5. Cloud - used to summarise a group of network devices, the details of which may be unimportant to the discussion at hand 
  6. Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line 

Comments

Popular posts from this blog

How to Fix datetime Import Error in Python Quickly

SQL Query: 3 Methods for Calculating Cumulative SUM

Big Data: Top Cloud Computing Interview Questions (1 of 4)