Grid Computing 2008
DOI: 10.1007/978-0-387-09457-1_21
|View full text |Cite
|
Sign up to set email alerts
|

On Consistency Of Data In Structured Overlay Networks

Abstract: Data consistency can be violated in Distributed Hash Tables (DHTs) due to inconsistent lookups. In this paper, we identify the events leading to inconsistent lookups and inconsistent responsibilities for a key. We find the inaccuracy of failure detectors as the main reason for inconsistencies. By simulations with inaccurate failure detectors, we study the probability of reaching a system configuration which may lead to inconsistent data. We analyze majority-based algorithms for operations on replicated data. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…A similar bandwidth consumption-convergence time trade-o↵ is added by ReCircle [23], in the form of a partition-merger. ReCircle has two parts: a PS algorithm and a Merger.…”
Section: Overlay Maintenance Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…A similar bandwidth consumption-convergence time trade-o↵ is added by ReCircle [23], in the form of a partition-merger. ReCircle has two parts: a PS algorithm and a Merger.…”
Section: Overlay Maintenance Strategiesmentioning
confidence: 99%
“…In some runs we have observed partition of the system after the isolated nodes complete their join procedures. For these scenarios, the PL approach used in [23] fails to trigger the merging. In order to merge such partitions proactive merger using KB is required.…”
Section: Reversibility and Its Evaluationmentioning
confidence: 99%
“…The multiple hash function scheme [6] uses f hash functions for maintaining replication with degree f. The leafset and successor-set schemes [3,5] store replicas on respective nodes from routing tables of a node responsible for data item. In symmetric replication [4,7] replicas are stored under system-wide known f identifiers. Although there are qualitative differences between the named schemes, none regards the geographical location of nodes.…”
Section: A Replication In Sonsmentioning
confidence: 99%
“…Once network partitions cease, CATS merges partitioned subsystems into a single overlay, while Scatter will continue to operate as separate overlays. Where Scatter provides scalability and consistency, CATS provides scalability, consistency, and partition tolerance.The design, implementation, and evaluation of CATS are available in a separate technical report [3,2,20]. …”
mentioning
confidence: 99%
“…The design, implementation, and evaluation of CATS are available in a separate technical report [3,2,20].…”
mentioning
confidence: 99%