Abstract
The network is reliable tops Peter Deutsch’s classic list, "Eight fallacies of distributed computing", "all [of which] prove to be false in the long run and all [of which] cause big trouble and painful learning experiences." Accounting for and understanding the implications of network behavior is key to designing robust distributed programs; in fact, six of Deutsch’s "fallacies" directly pertain to limitations on networked communications. This should be unsurprising: the ability (and often requirement) to communicate over a shared channel is a defining characteristic of distributed programs, and many of the key results in the field pertain to the possibility and impossibility of performing distributed computations under particular sets of network conditions.
Publisher
Association for Computing Machinery (ACM)
Reference19 articles.
1. Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story
2. Amazon Web Services. 2011. Summary of the Amazon EC2 and Amazon RDS service disruption in the U.S. East region; http://aws.amazon.com/message/65648/. Amazon Web Services. 2011. Summary of the Amazon EC2 and Amazon RDS service disruption in the U.S. East region; http://aws.amazon.com/message/65648/.
3. Bailis P. Fekete A. Franklin M.J. Ghodsi A. Hellerstein J.M. Stoica I. 2014. Coordination-avoiding database systems; http://arxiv.org/abs/1402.2237. Bailis P. Fekete A. Franklin M.J. Ghodsi A. Hellerstein J.M. Stoica I. 2014. Coordination-avoiding database systems; http://arxiv.org/abs/1402.2237.
4. Bailis P. Ghodsi A. 2013. Eventual consistency today: limitations extensions and beyond. ACM Queue 11(3); http://queue.acm.org/detail.cfm?id=2462076. 10.1145/2460276.2462076 Bailis P. Ghodsi A. 2013. Eventual consistency today: limitations extensions and beyond. ACM Queue 11(3); http://queue.acm.org/detail.cfm?id=2462076. 10.1145/2460276.2462076
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. dDrops: Detecting silent packet drops on programmable data plane;Computer Networks;2022-09
2. The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022
3. Cutoffs for Symmetric Point-to-Point Distributed Algorithms;Networked Systems;2021
4. Kollaps;Proceedings of the Fifteenth European Conference on Computer Systems;2020-04-15
5. The NoSQL Toolbox: The NoSQL Landscape in a Nutshell;Fast and Scalable Cloud Data Management;2020