TT Class 7- Connections, Clouds, and Backups
This course will explain the concepts around using hardware and software to connect multiple devices or datasets together. Learn how to move data from one device to another using a physical connection or a software linkage.
We will cover the basics of cloud data services as well as linking other physical devices or applications to each other. While there are other solutions apart from these listed in the course, this will cover the essentials to allow you to work out other solutions.
Session Summary
- Introduce the OSI model and learn how devices communicate
- Learn about the history and present of moving data around
- Storage media- SD Cards and USB drives are analogous to cassette Tapes or CDs
- Using different wires to move data
- Using different radios to move data (wirelessly)
- Casting to screens, printing on Wifi
- Note about data encryption
- Data Backup theory
- 321 rule
- Popular methods and tools
- Data cloud theory
- Cloud solutions
- peer-to-peer solutions
- IOT Internet of Things
- Smart devices
- AI Devices
- API Keys and Friend Codes
The OSI Model
The Open Systems Interconnection (OSI) model is a basis for troubleshooting issues as well as designing solutions.
Definition
The OSI model is a standardized summary describing how devices communicate over multiple complex systems.
Layers
The model is composed of layers from the hardware which translate into a user-facing response or view.
With each layer, consider the example of accessing your email account through a web browser on a desktop computer.
- Physical connection layer- This defines what parts of the computer are actually connected to each other and determines whether a data exchange is possible.
- EG, your desktop is physically plugged into the wall with an ethernet cable (as well as power to the socket, the monitor and mouse are also plugged in)
- Data Link- Defines "node-to-node" connections and confirms that physically connected devices can talk to each other
- EG, the ethernet is plugged into the router/modem on the other side of the wall, so these two devices can communicate through the physical layer.
- Network- The network layer is responsible for defining who is who when multiple devices are connected.
- EG, My computer is also attached to your modem/router, so it has to assign an identity to each uniquely linked data device.
- Transport- This layer causes packets of data to be moved across a the network layer. It creates, encrypts, and reassembles portions of data into manageable bytes.
- EG,You open the web browser on your computer, and the data for your email is 'transported' over the network to your device.
- Session- The session layer is where your data activity is being processed at the current time; it maintains that the right data is continuing to go to the right place.
- EG, Your browser is able to maintain a stream of the data transference process while you decide which email you want to open
- Presentation- The presentation layer converts data into the format required by the application, while also encrypting and compressing the data as needed.
- EG, When your computer receives data for your email, then your browsers knows what to display on the screen
- Application- The application layer is the ending interface where the data is finally presented and a user may be able to interact with it.
EG, Having logged into your email account, you can now open emails to read them and to reply.
OSI Usage
This model is primarily used for troubleshooting and building complex network systems, but it can also be adapted for troubleshooting simple connections as well.
While we might not need to dive into every layer, we can do the following as part of a troubleshooting process.
- Check physical connections and make sure all devices are powered on
- Confirm the network is operational by contacting the internet service provider
- Check the session- Check for logged in accounts
- Check for other application/software updates which may prevent info from displaying
Data Storage and Moving
Data storage is the concept of recording information of any type in a way that can be retrieved by the computer. All data exists as a file, usually with a specific file "type" based on how it is used, and which the computer can read and translate back to useful info.
Files are stored as virtual points on a virtual folder and can be moved in a variety of ways.
Comparing Legacy and New Media Storage Types
There are many ways to write something down, and the method is largely similar, and improving over the years.
Analog Data
The most rudimentary data storage can be written once and read over and over. Sometimes it is not easy or possible to overwrite or correct data once it has been recorded. In this way, the storage device is "consumable", because it cannot be replenished when used.
Examples of consumable analog storage solutions are cassette tapes, movie reels, and even floppy discs and CDs (which themselves are not far off from vinyl records). These methods are most similar to having a big piece of paper and an ink pen, where you can write onto the paper as much as consuming it's full surface area, but you cannot revert data after it has been written. (you can scribble it out or draw over it in some cases, but the space is still consumed)
Digital Data
This type of storage format allows data to be written, read, and also changed on the device. This is different than the analog examples because data can be deleted and the device can store entirely new data. Reusable drives are much more
Examples include hard drives and solid state drives- The SSD category can include devices like USB sticks, SD/Memory cards, and even the microchip on your debit card stores a tiny amount of data which is technically changed with each transaction.
With some exceptions (like a QR code), most new computers have digital data interfaces widely compatible with other devices.
Wired Connections
A wired cable connection is the most simple, secure, and reliable method to transfer data.
Wires create a physical copper-copper connection between devices so that electricity and signal (data) can travel through the wire between each device.
One downside of wired connections is the obvious fact that you must stay physically attached to transfer data.
To connect two devices by cable is usually as simple as finding a cable that fits ports on both devices- and assuming they are able to communicate with each other (OSI Data Link layer).
Wireless Connections
There are many different wireless connection types suitable for different purposes:
- Wi-fi: This type of connection allows devices to communicate with high bandwidths over medium distances and is mostly used for internet communication
- Bluetooth: A pairing process allows devices to communicate at fast transfer rates with efficient use of electrical power over. Regularly used in peripherals like computer mice and controllers, headphones and earbuds, and barcode scanners. The typical range is 10-30 feet, but unofficial records have blasted a signal as far as 1 full mile.
- Zigby and Zwave are a mesh networking system connecting multiple devices in an area up to 40 or 100 feet away. This is particularly useful in smarthome networks where there are many IoT devices which can share data to each other in a chain fashion to hop data from one device to another.
Data Encryption
Data encryption is the idea that a third party cannot read the contents of a file or package. In relation to networking or communications, being encrypted-in-transit means the data is protected while it is being moved from point a to point be (OSI Transport layer). Being encrypted-at-rest just means the data itself is scrambled at all times, and requires a key to open.
Data Backups
Backing up data is the process of creating copies of files if the need for data restoration arises. You should back up your data if:
- it is important
- and/or
- it may be lost or damaged
If you have a piece up data with a backup replacement, it will be easy to replace what has been lost.
3-2-1 Rule
Keeping backups of files should follower the 321 rule:
- Have THREE copies of data
- Have (at least) TWO different types of storage
- Have ONE copy off-site
Three copies of data ensures there is a backup for your backup. If one of them fails for any reason, the other will be there as well. Some admins opt for one (or another) of those copies to be a long-term backup (monthly or quarterly) and the other to be a daily or weekly updated backup.
Having two different storage mediums means that if one of your devices used to read the backup data fails, you can still access using the other interface- eg, if a hard drive fails where it attaches to the motherboard on a pc, you can use a USB drive having the same data as a backup.
Having one copy at a different location guarantees that if a disaster took out the entire facility including the main backups, a separate backup can be used to start rebuilding data.
Depending on the needs of your data security, your backup process may be more or less intense than the recommendations in the 321 rule. Perhaps you only need to copy photos off of your phone once a month, or maybe you need to upload pictures of receipts on a daily basis.
Tools and Methods
The simplest tools are often the best to use for your scenario.
- Use the file browser on your device to create a simple copy of a file or folder structure, and move it to another space where it is less likely to be changed or destroyed. This might be on a separate disk or saved in your Google Drive account.
- Some external drives are sold with backup software installed, or software may otherwise be available for purchase. The software can be configured so you can choose what folders get backed up and when.
- Cloud connection services can be installed and similarly configured to customize the backup content and frequency.
Set-and-forget
The best backup system is set up one time and is automated to continue to provide quality backup services. Most software tools follow this mindset, and custom solutions can be implemented depending on the use case.
If you would like to learn more about setting up an account with cloud backups on SCTG servers, please reach out to the team!(coming ~Q2 2026)
Data Clouds
The "cloud" is just somebody else's computer that you can access over the internet. Think of it like the ender chest from Minecraft, or like being able to collect sunlight from any point on Earth.
Most modern account providers like Google and Apple also bundle a small amount of cloud storage data as part of included services with the account. There are also standalone cloud storage services like Dropbox and Sync(.com).
Create an account, and pay a subscription for the amount of data storage that you need. Then, upload data (or use an available installed app) to make it available to any other device which is also able to access the cloud service.
The benefits of a managed service include setting up and maintaining the connection, and an extra set of eyes to watch for correct action, and also the assistance to correct any issues as they might arise.
Password Managers
Often included with cloud accounts and even web browsers is a sort of password manager, and there are specific password managing services. Similar to using files in the cloud, you create a small type of file which just holds your information including the website to login at and the username and password. This storage of multiple accounts and passwords is managed by one additional name and password- so you remember the one, and it remembers the rest.
Usage Examples
- iPhone users with a logged-in account can automatically sync pictures they take to their cloud. At any time, these can be reviewed in the cloud using the phone itself, or a laptop at home or at the library. (convenient)
- A work-from-home user receives a corporate-issue laptop with software installed that automatically connects to company resources and files- you can open the documents you need without having to download everything all the time. (secure)
- Your grocery list is stored in the cloud, so even though you are at home, your spouse sees it at the store. (shareable)
- As a system administrator, you use a private onsite company "cloud" to hold a copy of data used by the production machine in case it gets overloaded and resets itself. (reliable)
Peer-to-peer data
A peer-to-peer connection is similar to a cloud connection, but there is no middle man. This method connects devices directly to each other (through the network layer of the OSI model). This is sometimes more secure and faster, and usually easier to maintain.
Internet of Things (IoT)
The internet of things is a combination of peer to peer and cloud connections. An array of devices of any type is connected to one another, and the array itself is usually connected to the internet to access cloud services. The term IoT refers to how there is a growing prevalence of devices on the internet which collect and share data- in contrast to actual human users of the internet.
Smart (Home) Devices
The biggest consumer-focused array is the smart home system. This includes any device from thermostats and light bulbs to automatic sprinkler systems and cameras with alarms.
Most systems are installed with a hub device or a connection to an app on your phone. This allows you to access the devices and talk to them when they are on the same network, or connected to the cloud. You can change a lot of settings even when you are not at home.
Comfort
Lightbulbs and heaters can change house settings without leaving your chair or bed- or you can even set the temperature when you are on your way home from work- or some devices even have an artificial intelligence which learns what times to change to what temperatures based on your usage and the activities of users who are like you.
Productivity
Dishwashers and laundry machines don't have a huge application on the smarthome system, but notifications can alert your phone when laundry is finished on the other side of the house. Sprinkler systems can help you micromanage the amount of water per zone, and can estimate the cost of water (and plant-lights electricity) usage based on tracked data through an app.
Security
Home security focuses around a camera setup and microphones and speakers to watch your home at all times- even when away from the house. There are many doorbell systems which can watch and alert you when someone approaches, or other cameras with a live feed that you can talk through if someone is near your property.
AI Devices
There is a growing insertion of AI Helpers into the consumer home. These are tasked to listen for keywords and to help you automate your life by compiling shopping lists or playing music or changing the lights automatically, so you can focus on the things you want. While it can sometimes be difficult to get an AI to understand or cooperate, they are sometimes required to interact with the other devices in your home.
Use the appropriate apps and find helpful articles on the publisher's websites and on YouTube in order to get help with operation of the AI and connecting it to your other devices and services.
Extra: API Keys and Friend Codes
Sometimes a device setup requires connecting with a special key- these are sometimes known as API Keys or Handshake Keys (or sometimes simply as passwords). In the gaming world, the concept of a friend code is that for each player of the game, a unique number/letter identifier is assigned to locate that player in the digital phonebook. API keys are how services create this secure connection with each other.
API Keys are like passwords because they grant access to a service or an account independently of the actual login info (username/password). You should not share API keys and codes unless you know what it will be used for.
API Example: Stream Keys
If you wish to use a software to broadcast you camera or computer screen live onto the internet, you would use a Stream Key API to connect your streaming software to a service on the internet which publishes your datafeed in realtime. The key links your feed to the internet service so they can publish what you are sharing. If another party were to obtain that key, it would be possible for them to stream to your internet feed as an imposter.