Albandari L. Alanazi, Almetwally M. Mostafa, A. Alnuaim
{"title":"复制技术最新趋势的系统文献综述","authors":"Albandari L. Alanazi, Almetwally M. Mostafa, A. Alnuaim","doi":"10.1109/ICCAIS48893.2020.9096684","DOIUrl":null,"url":null,"abstract":"Nowadays, most software systems manage large amount of data. The clients depend heavily on these data and expect them to be available at all times. To use and manage these data in an efficient way and to ensure availability, the data replication technique is applied. So far, three basic models for replication exist with their variants. This paper reviews these three basic models of replication techniques and their variants with regard to how the load is distributed among replicas, what the total throughput is for these set of replicas, and which type of consistency models is supported by them.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Systematic Literature Review of Recent Trends in Replication Techniques\",\"authors\":\"Albandari L. Alanazi, Almetwally M. Mostafa, A. Alnuaim\",\"doi\":\"10.1109/ICCAIS48893.2020.9096684\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, most software systems manage large amount of data. The clients depend heavily on these data and expect them to be available at all times. To use and manage these data in an efficient way and to ensure availability, the data replication technique is applied. So far, three basic models for replication exist with their variants. This paper reviews these three basic models of replication techniques and their variants with regard to how the load is distributed among replicas, what the total throughput is for these set of replicas, and which type of consistency models is supported by them.\",\"PeriodicalId\":422184,\"journal\":{\"name\":\"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCAIS48893.2020.9096684\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAIS48893.2020.9096684","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Systematic Literature Review of Recent Trends in Replication Techniques
Nowadays, most software systems manage large amount of data. The clients depend heavily on these data and expect them to be available at all times. To use and manage these data in an efficient way and to ensure availability, the data replication technique is applied. So far, three basic models for replication exist with their variants. This paper reviews these three basic models of replication techniques and their variants with regard to how the load is distributed among replicas, what the total throughput is for these set of replicas, and which type of consistency models is supported by them.