Network Transactions Design

Applications are the backbone of the central functions. In order to achieve the objectives of the client's business, must guarantee the architect of the network application performance. However, each type of traffic or an individual application, different requirements, the performance problems have to be created.

Application processing transaction Transaction Processing is a type of treatment in which the computer responds immediately to user requests. Each application is created by a user transaction. All these operations must take place additional operations. Therefore, application transactions, and an important consideration in key network design.


An atomic transaction ensures that all processes are executed or a transaction, or any of them. If the transaction is fully processed, then the entire process is aborted.


Confirmed that a transaction with partial operations are not allowed. If a partial transaction takes place, the system immediately returns to its previous state.


A transaction is a secure transaction isolation, which is completely isolated from all other transactions on the network. Safety is a concern of the basic network design. Control Lists (ACLs), firewall and data encryption in the network topology is recommended for all modern networks.


A transaction is safe, sustainable, after the transaction has been completed, can the transaction be reversed even if the system is confronted with an error. Robust design for transaction processing needs of various levels of redundancy. These values ​​take into account the physical layer connections, servers and network devices such as switches and routers. The expert evaluates network redundancy and security features that support requests.


The integration of transaction applications means that the designer must consider the influence of individual transactions in the network. This process is essential, since the additional cabling and network equipment will be required to provide redundancy performance or provision of these operations need to make available. Redundancy provides the following benefits: 1. reduces network downtime second improved application availability.

Networks with redundancy to minimize single points of failure. If a path or device fails, the redundant path or a device to be used. Server that the shops are another way to receive and transmit traffic. This ensures that the application can be accessed if the client so requests.

In addition, routers can provide redundancy if installed protocols such as Rapid Spanning Tree Protocol (RSTP), Hot Standby Routing Protocol (HSRP). RSTP barrier layer 2 switch inputs, which can occur with redundant switches. Furthermore, redundancy can offer Layer 3 HSRP and reliable recovery mechanism.


Post a Comment

Write your constructive comment here...

About Me

Hi, I’m Yani and my Syszoom blog is to share everything about the latest information around the technology field. I started Syszoom blog in 2011 to help other people solve their problem about computer, software, etc. I spent over five years as a teacher, and Syszoom blog is implementation of my knowledge in information technology field. To contact me, please email me at
Powered by Blogger.