Proceedings of the 9th ACM SIGPLAN Workshop on Erlang 2010
DOI: 10.1145/1863509.1863515
|View full text |Cite
|
Sign up to set email alerts
|

Chain replication in theory and in practice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The reply for every query request is generated by the tail and sent to the client. Since all the values stored in the tail are guaranteed to have been propagated to all replicas, reads are always consistent [36].…”
Section: Chain Replicationmentioning
confidence: 99%
See 1 more Smart Citation
“…The reply for every query request is generated by the tail and sent to the client. Since all the values stored in the tail are guaranteed to have been propagated to all replicas, reads are always consistent [36].…”
Section: Chain Replicationmentioning
confidence: 99%
“…Their main objective is to improve replication cell performance by distributing consistency management responsibilities among servers. These approaches include different variants of Paxos such as Multi-Paxos [16 and 17], Fast Paxos [27], Mencius [28], generalized Paxos [29], EPaxos [30], Object Ownership Distribution (OOD) [13], and chain replication [32][33][34][35][36].…”
Section: Related Workmentioning
confidence: 99%
“…The Chain Replication repair technique used by HibariDB [7] starts a repair with a transition from chain…”
Section: Chain Repairmentioning
confidence: 99%
“…This reduces the number of replicas necessary, not only increasing efficiency but also robustness in the face of limited sources of diversity. Our protocols are based on Chain Replication [10], which is increasingly being used in scalable fault tolerant systems [17][18][19][20]. Chain Replication also uses an external configuration service, but cannot tolerate even general crash failures as the protocol depends on accurate failure detection, an overly strong requirement in today's datacenters.…”
Section: Introductionmentioning
confidence: 99%