Make Use of Mesh Network Features: Scalability, Redundancy, and Resilience for Your Applications
A mesh network offers several advantages over star-shaped structures:
Nodes
- Each node is typically connected to multiple other nodes, forming a mesh-like structure.
- Messages are forwarded through these links between nodes to reach their destination.
- All links between nodes are continuously monitored, and latency is measured in real time.
- This allows the routers on each node to gather the necessary information on which path a message should take to reach its destination the fastest.
- Adding new nodes increases the number of routing options.
- The more nodes a mesh network has, the more resilient it becomes against partial failures.
- It is simple to add new nodes without disrupting the network's structure.
- New nodes are immediately integrated into the network, as all other nodes are promptly informed of the newcomer's presence.
- No configuration is required for routing messages.
- Additionally, new nodes can be added where the load is highest or where demand is greatest.
- For instance, nodes with web server plugins can be hosted in countries with the highest user traffic.
- Other nodes placed near databases can help offload the task of preparing data for dialogues or other processes.
Services
- The same services can be deployed on multiple nodes.
- Service registries can provide service-based load balancing, again without any additional configuration.
- The failure of one or more nodes reduces the likelihood that all services of the same type will fail simultaneously.
- Moreover, the load is distributed across the various nodes.
- Redundant services can be added not only by launching new nodes but also by deploying services on other existing nodes.
- Since each node runs hundreds of services, it’s often enough to simply replicate a service on additional nodes to ensure availability.
Applications
The same principles that apply to services also apply to applications. Application load balancing is handled by the application collector, where all applications register themselves.
Conclusion
Simply start new nodes and connect them to several other nodes.
No further configuration is required.
Your network will scale effortlessly and become increasingly secure.