2014
DOI: 10.4304/jetwi.6.2.174-179
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Distributed Online Stream Processing Systems Considering Fault Tolerance Issues

Abstract: This paper presents an analysis of four online stream processing systems (MillWheel, S4, Spark Streaming and Storm) regarding the strategies they use for fault tolerance. We use this sort of system for processing of data streams that can come from different sources such as web sites, sensors, mobile phones or any set of devices that provide real-time high-speed data. Typically, these systems are concerned more with the throughput in data processing than on fault tolerance. However, depending on the type of app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Some distributed checkpointing schemes such as Meteor Shower [33] have each operator checkpointing independently. This type of a scheme imposes additional overhead and needs more effort to maintain a consistent global state compared to system-wide checkpoint [14,3]. For instance, this approach requires saving the message buffers at each operator to recover from failures whereas a system-wide checkpoint saves message buffers only at the sources.…”
Section: Utilization Of a Stream Processing Systemmentioning
confidence: 99%
“…Some distributed checkpointing schemes such as Meteor Shower [33] have each operator checkpointing independently. This type of a scheme imposes additional overhead and needs more effort to maintain a consistent global state compared to system-wide checkpoint [14,3]. For instance, this approach requires saving the message buffers at each operator to recover from failures whereas a system-wide checkpoint saves message buffers only at the sources.…”
Section: Utilization Of a Stream Processing Systemmentioning
confidence: 99%
“…However, using all components are not mandatory, and an actual system may have only some of these features. The communication between components often uses TCP/IP protocols (Gradvohl et al, 2014).…”
Section: Fundamental Conceptsmentioning
confidence: 99%
“…These streams are potentially unbounded data transmitted at high volume and high velocities. Some of them require real-time processing and analysis, such as disaster management, network attack and anomaly detection, financial market, trend analysis, social media, web analytics, Internet of Things (IoT), operational infrastructure monitoring, and online advertising (de Assunção et al, 2018, Gradvohl et al, 2014.…”
Section: Introductionmentioning
confidence: 99%
“…In the next section, we present the main Big Data technologies. We also present, in the same section, a comparative study of these frameworks (Chintapalli et al, 2016;Gradvohl et al, 2014;Zhang et al, 2017).…”
Section: Big Data Analysismentioning
confidence: 99%