Consistency Patterns PDF
Document Details
Uploaded by DecisiveGreatWallOfChina1467
Tags
Related
Summary
This document discusses different consistency patterns in computer systems, including weak, eventual, and strong consistency. It explains how each pattern handles data synchronization and when it might be suitable for different applications. The document highlights real-world examples like VoIP and email systems to further illustrate their use.
Full Transcript
Consistency patterns With multiple copies of the same data, we are faced with options on how to synchronize them so clients have a consistent view of the data. Recall the definition of consistency from the CAP theorem - Every read receives the most recent write or an [...
Consistency patterns With multiple copies of the same data, we are faced with options on how to synchronize them so clients have a consistent view of the data. Recall the definition of consistency from the CAP theorem - Every read receives the most recent write or an [ ]() error. Weak consistency After a write, reads may or may not see it. A best effort approach is taken. This approach is seen in systems such as memcached. Weak consistency works well in real time use cases such as VoIP, video chat, and realtime multiplayer games. For example, if you are on a phone call and lose reception for a few seconds, when you regain connection you do not hear what was spoken during connection loss. Eventual consistency After a write, reads will eventually see it (typically within milliseconds). Data is replicated asynchronously. This approach is seen in systems such as DNS and email. Eventual consistency works well in highly available systems. Strong consistency After a write, reads will see it. Data is replicated synchronously. This approach is seen in file systems and RDBMSes. Strong consistency works well in systems that need transactions.