Low Level Design: gRPC and Protocol Buffers
9 min read What Is gRPC? gRPC is a high-performance, open-source remote procedure call framework developed by Google. It uses Protocol Buffers (protobuf) […] Read article
Learn to design scalable, reliable systems that handle millions of users. System design interviews test your ability to architect real-world applications, considering tradeoffs, scalability, and best practices.
Core Topics:
Scalability: Load balancing, horizontal vs vertical scaling
Storage: Databases (SQL vs NoSQL), caching (Redis, Memcached)
Reliability: Replication, failover, disaster recovery
Performance: CDNs, caching strategies, database indexing
Common Design Questions:
Design URL shortener (bit.ly)
Design rate limiter
Design Twitter/Instagram feed
Design messaging system (WhatsApp)
Design file storage (Dropbox)
Interview Level: Senior engineers (L5+) at FAANG companies. Requires 3-5+ years experience to tackle effectively.
Preparation: Study system design patterns, understand distributed systems fundamentals, and practice mock interviews.
9 min read What Is gRPC? gRPC is a high-performance, open-source remote procedure call framework developed by Google. It uses Protocol Buffers (protobuf) […] Read article
8 min read What Is a Full-Text Search Engine? A full-text search engine indexes large collections of text documents and retrieves the most Read article
7 min read A Merkle tree (invented by Ralph Merkle in 1979) is a binary tree in which every leaf node contains the Read article
7 min read What Is Event Sourcing? In traditional systems, the database stores the current state of an entity. When an order changes Read article
7 min read A load balancer distributes incoming traffic across multiple backend instances to maximize throughput, minimize latency, and avoid overloading any single Read article
8 min read Trie Node Structure Each node in a trie holds a fixed-size array of 26 child pointers (one per lowercase letter) Read article
8 min read Token Bucket The token bucket algorithm models a bucket of capacity B tokens that refills at rate R tokens per Read article
5 min read Log-Based Storage Modern message queues (Kafka, Pulsar, Redpanda) use an append-only log as the storage primitive. Producers write messages sequentially Read article
8 min read Mutex Basics A mutex (mutual exclusion lock) guarantees that only one thread can hold it at any given time. The Read article
9 min read Compare-and-Swap (CAS) Compare-and-Swap is the atomic instruction at the heart of all lock-free algorithms. It takes three operands: a memory Read article
5 min read Query Parsing Query execution begins with parsing the raw SQL text. A lexer (scanner) tokenizes the input into keywords, identifiers, Read article
9 min read B-Tree Node Structure A B-tree of minimum degree t enforces a capacity invariant on every node except the root: each Read article
8 min read Core Concept: How MVCC Works Multi-Version Concurrency Control (MVCC) solves a fundamental database problem: how to allow readers and writers Read article
9 min read Write Path Every write in an LSM-tree storage engine lands first in two places simultaneously: the in-memory MemTable and the Read article
13 min read Three-Way Handshake Every TCP connection begins with a three-way handshake that establishes synchronized sequence numbers on both sides and verifies Read article