Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Data Connection Diagrams

Learning Goals

By the end of this section you will:

  • understand the different types of data connection diagrams and what they are used for

  • understand how networks can be represented using different data connection diagrams

  • know how to represent the data communicated between different nodes using a network diagram

A Data Connections Diagram is a drawing that shows how different systems, databases, files, or tables are connected and how they share or move data between each other. It helps you understand where data comes from, where it goes, and how different parts of a system interact.

How are they used?

Data Connection Diagrams are used to:


Key parts of the diagram

Common diagram types

Network Diagram

A Network Diagram shows how different parts of a system (like websites, databases, or devices) are linked and how data moves between them. Each part is shown as a circle box or symbol, and lines or arrows connect them to show the direction of data flow. These diagrams are great for seeing how systems work together and are often used to spot problems, improve performance, or keep data secure.

network diagram

Chord Diagram

A Chord Diagram is a circle diagram used when lots of systems are sharing data with each other. Each item is placed around the edge of the circle, and curved lines inside the circle show how they are connected. It’s helpful for showing complex relationships—like how different school apps or departments share information—especially when everything is linked to everything else.

chord diagram

Relationship Diagram

A Relationship Diagram is used to show how different things in a database are related. Each table (like “Students” or “Subjects”) is drawn as a box, and lines connect the boxes to show how they’re linked through shared fields (like student IDs). This diagram doesn’t show how data moves, just how the data is structured and connected. It’s mostly used when designing or understanding how a database works. Our Entity Relationship Diagrams are an example of a relationship diagram.

relationship diagram

We will be using Network Diagrams in Unit 4.

Creating Data Exchange Diagrams

  1. Identify All Devices and Systems

    • List all devices (e.g. computers, servers, routers, printers, phones, cloud services).

    • Include physical and virtual systems, like cloud apps, databases, and VPNs.

  2. Define How Devices Communicate

    • Note the transmission methods (wired or wireless).

    • Include relevant protocols (TCP/IP, HTTP/HTTPS, FTP, VPN).

    • Identify which systems send and receive data, and whether it’s unicast, broadcast, or multicast.

  3. Group Devices by Network Type

    • Organize into LANs (Local Area Networks) or WANs (Wide Area Networks).

    • Show which parts are internal (e.g. school network) vs external (e.g. internet access).

  4. Add Transmission Details

    • Include latency-sensitive connections (e.g. VoIP, streaming) and label them clearly.

    • Add any QoS (Quality of Service) requirements or performance concerns (e.g. timeliness, jitter).

  5. Represent Devices as Nodes

    • Use circles, rectangles or symbols to represent each device or system.

    • Label them with names like “Web Server”, “Student Laptop”, “Database”, or “Router”.

  6. Draw Connections (Edges)

    • Use arrows or lines to show how data flows between nodes.

    • Arrows show direction (e.g. from laptop to web server).

    • Include information such as:

      • Data type (e.g. JSON, XML, streaming video)

      • Transmission protocol (e.g. HTTPS, FTP)

      • Connection type (wired, wireless, VPN).

  7. Highlight Key Security Measures

    • Show where firewalls, encryption, or VPNs are used.

    • Add any points of vulnerability (e.g. public Wi-Fi, cloud storage).

  8. Label External and Third-Party Services

    • Clearly mark connections to services outside your network, such as:

      • Cloud platforms (Google Drive, AWS)

      • Email servers

      • Third-party APIs

  9. Check for Privacy and Risk Areas

  1. Review for Accuracy and Clarity