Get premium membership and access questions with answers, video lessons as well as revision papers.
• Data capacity analysis: It is a very important task to understand the extreme requirements of the application in terms of peak and average transactions per second, peak number of queries, payload size, expected throughput, and backup requirements. This enables the data store scalability design in terms of how many physical servers are needed and hardware configuration of the data store with respect to memory footprint, disk size, CPU Cores, I/O throughput, and other resources.
• Review data access patterns: The simplest course to scale an application is to start by looking for access patterns. Given the nature of distributed systems, all queries to the data store must have the access key in all real-time queries to avoid scatter and gather problem across different servers. Data must be aligned by the access key in each of the shards of the distributed data store. In many applications, there can be more than one access key. For example, in an ecommerce application, data retrieval can be by Product ID or by User ID. In such cases, the options are to either store the data redundantly aligned by both keys or store the data with a reference key, depending upon the application’s requirements.
• Different techniques for sharding: There are different ways to shard the data in a distributed data store. Two of the common mechanisms are function-based sharding and lookup-based sharding. Function-based sharding refers to the sharding scheme where a deterministic function is applied on the key to get the value of shard. In this case, the shard key should exist in each entity stored in the distributed data store, for efficient retrieval. In addition, if the shard key is not random, it can cause hot spots in the system. Lookup-based sharding refers to a lookup table used to store the start range and end range of the key. Clients can cache the lookup table to avoid single point of failure. Many NoSQL databases implement one of these techniques for achieving scalability.
• Self-service scaling capability: Self-service scaling, or auto-scaling, can work as a jewel in the scalable system crown. Data stores are designed and architected to provide enough capacity to scale up front, but rapid elasticity and cloud services can enable vertical and horizontal scaling in the true sense. Self-service vertical scaling enables the addition of resources to an existing node to increase its capacity, while self-service horizontal scaling enables the addition or removal of nodes in the distributed data store via “scale-up” or “scale-down” functionality.
Titany answered the question on November 30, 2021 at 07:45
- Explain three Internet services that could be utilized by students in technical institutions
(Solved)
Explain three Internet services that could be utilized by students in technical institutions
Date posted: November 30, 2021. Answers (1)
- Convert the digital encoded signal in (i) into on-return-to-zero (NRZ) line code(Solved)
Convert the digital encoded signal in (i) into on-return-to-zero (NRZ) line code
Date posted: November 30, 2021. Answers (1)
- With the aid of a diagram, represent the data 10110001 in the form of a digital
encoded wave form
(Solved)
With the aid of a diagram, represent the data 10110001 in the form of a digital
encoded wave form
Date posted: November 30, 2021. Answers (1)
- Distinguish between broadcast and host IP addresses(Solved)
Distinguish between broadcast and host IP addresses
Date posted: November 30, 2021. Answers (1)
- Outline two advantages of point to point protocol (PPP)(Solved)
Outline two advantages of point to point protocol (PPP)
Date posted: November 30, 2021. Answers (1)
- Discuss different types of computer networks (Solved)
Discuss different types of computer networks
Date posted: November 30, 2021. Answers (1)
- Explain two characteristics of a local area network (Solved)
Explain two characteristics of a local area network
Date posted: November 30, 2021. Answers (1)
- With the aid of examples, describe two categories of wireless networks that could be found in organizations(Solved)
With the aid of examples, describe two categories of wireless networks that could be found in organizations
Date posted: November 30, 2021. Answers (1)
- Use of passwords promotes network security. Outline four precautions that should be considered when assigning passwords(Solved)
Use of passwords promotes network security. Outline four precautions that should be considered when assigning passwords
Date posted: November 30, 2021. Answers (1)
- John was required to install communication software for his company, Outline four factors that he should consider before installing the software, other than cost(Solved)
John was required to install communication software for his company, Outline four factors that he should consider before installing the software, other than cost
Date posted: November 30, 2021. Answers (1)
- Network design is a very important phase in networking. Explain three objectives to be attained by the phase(Solved)
Network design is a very important phase in networking. Explain three objectives to be attained by the phase
Date posted: November 30, 2021. Answers (1)
- Outline factors to consider when selecting transmission media over cost(Solved)
Outline factors to consider when selecting transmission media over cost
Date posted: November 30, 2021. Answers (1)
- Distinguish between hub and switch as used in networking(Solved)
Distinguish between hub and switch as used in networking
Date posted: November 30, 2021. Answers (1)
- Outline disadvantages of hybrid topology networks(Solved)
Outline disadvantages of hybrid topology networks
Date posted: November 30, 2021. Answers (1)
- Outline advantages of hybrid topology networks(Solved)
Outline advantages of hybrid topology networks
Date posted: November 30, 2021. Answers (1)