This is a continuation of the article at http://ravinote.blogspot.com/2020/09/best-practice-from-networking.html
Deduplication - As data ages, there is very little need to access it regularly. It can be packed and saved in a format that reduces spaces. Networking makes efficient use of bits. In addition, if data is repeated across packets, it can be viewed as segments that are delineations which facilitate study of redundancy in data. Then redundant segments may simply be avoided from storing which allows a more manageable form of accumulated raw data. Deduplication lightens the load for networking.
Encryption – Encryption is probably the only technique to truly protect a data when there can be unwanted or undesirable access. The scope of encryption may be limited to sensitive data if the raw data can be tolerated as not encrypted.
Data flow – Data flows into stores and stores grow by size. Businesses and applications that generate data often find the data to be sticky once it accumulates. Consequently, a lot of attention is paid to early estimation of size and the kind of treatment to take. Determining flows helps determine the network.
Protocols – Nothing facilitates communication between peers or master-slave better than a protocol. Even a description of the payload and generic operations of create, update, list and delete become sufficient to handle network relevant operations at all levels.
Layering – Finally network solutions have taught us that appliances can be stacked, services can be hierarchical and data may be tiered. Problem solved in one domain with a particular solution may be equally applicable to similar problem in different domain. This means that we can use layers for the overall solution
No comments:
Post a Comment