Sunday, September 20, 2020

Best practice from networking

 Best practice from networking: 

Introduction: Networking is one of the three pillars of any commercial software. The other two are compute, and storage and the three are directly included as products to implement solutions, as components to make products, as perspectives for implementation details of a feature within a product and so on. Every algorithm that is implemented pays attention to these three perspectives in order to be efficient and correct. We cannot think of distributed or parallel algorithms without network, efficiency without storage, and convergence without compute. Therefore, these disciplines bring certain best practice from the industry. 

  

We list a few in this article from networking perspective: 

  1. Not a singleton – Most network vendors know that networking is about data communications. Data cannot be lost or corrupted. Therefore, network industry vendors go to great lengths in making data safe in transit by not allowing a single point of failure such as a hop failure.  If the data is written to the wire, it is relayed to the recipient eventually.   

  1. Chunked data – Packets form the core unit of transmission in any network. If the frame is too long, it may suffer from transmission failures and require retries. Instead if it were chunked, it will reduce the fault while subsequent packets will require to be sent only once. 

  1. Global connectivity – The public cloud has taught us that it is a massive sponge for global traffic that allows data to be consolidated in the datacenters behind the cloud. This makes networking popular for application and universal connectivity 

  1. Mobile IP – The ability to appear as if working of office computer with the same address while floating different networks gives unparalleled mobility only possible by networking. 

  1. Tunneling – The ability to wrap an existing packet with a header in the same IP protocol to allow packets to safely cross a public network but allow the endpoints on either end to be part of a secure network is made possible by tunneling. The virtual private network protocols help with this. 

No comments:

Post a Comment