• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Proactive Replication for Data Durability (2006)

Cached

  • Download as a PDF

Download Links

  • [iptps06.cs.ucsb.edu]
  • [www.cs.rice.edu]
  • [iris.csail.mit.edu]
  • [www.mpi-sws.org]
  • [www.cis.upenn.edu]
  • [berkeley.intel-research.net]
  • [www.mpi-sws.mpg.de]
  • [pdos.csail.mit.edu]
  • [www.iptps.org]
  • [www.cs.berkeley.edu]
  • [www.cis.upenn.edu]
  • [www.ic.unicamp.br]
  • [www.seas.upenn.edu]
  • [iris.lcs.mit.edu]
  • [iris.csail.mit.edu]
  • [pdos.csail.mit.edu]
  • [pdos.lcs.mit.edu]
  • [pdos.csail.mit.edu]
  • [oceanstore.cs.berkeley.edu]
  • [oceanstore.cs.berkeley.edu]
  • [www.oceanstore.org]
  • [fireless.cs.cornell.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Emil Sit , Andreas Haeberlen , Frank Dabek , Byung-gon Chun , Hakim Weatherspoon , Robert Morris , M. Frans Kaashoek , John Kubiatowicz
Venue:IN PROCEEDINGS OF THE 5TH INT’L WORKSHOP ON PEER-TO-PEER SYSTEMS (IPTPS
Citations:37 - 6 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Sit06proactivereplication,
    author = {Emil Sit and Andreas Haeberlen and Frank Dabek and Byung-gon Chun and Hakim Weatherspoon and Robert Morris and M. Frans Kaashoek and John Kubiatowicz},
    title = {Proactive Replication for Data Durability},
    booktitle = {IN PROCEEDINGS OF THE 5TH INT’L WORKSHOP ON PEER-TO-PEER SYSTEMS (IPTPS},
    year = {2006},
    publisher = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Many wide-area storage systems replicate data for durability. A common way of maintaining the replicas is to detect node failures and respond by creating additional copies of objects that were stored on failed nodes and hence suffered a loss of redundancy. Reactive techniques can minimize total bytes sent since they only create replicas as needed; however, they can create spikes in network use after a failure. These spikes may overwhelm application traffic and can make it difficult to provision bandwidth. This paper

Keyphrases

proactive replication    data durability    total byte    reactive technique    node failure    common way    failed node    additional copy    application traffic    many wide-area storage system    network use    provision bandwidth   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University