Hands-On Cloud-Native Microservices with Jakarta EE by Luigi Fugaro
Author:Luigi Fugaro
Language: eng
Format: epub
Tags: COM051280 - COMPUTERS / Programming Languages / Java, COM060180 - COMPUTERS / Web / Web Services and APIs, COM091000 - COMPUTERS / Cloud Computing
Publisher: Packt Publishing
Published: 2019-01-31T17:31:07+00:00
The 2PC consensus protocol has the ability to manage node failures through the transaction log. Usually, a periodic recovery thread processes all of the unfinished transactions.
One of the main disadvantages of the 2PC protocol is that it is a lock-based protocol. If the coordinator fails after the first phase has completed, all of the participants will be blocked waiting for the coordinator's decision, and will not be able to progress until it recovers.
3PC protocol
The 3PC protocol is an extension of the 2PC protocol, and its goal is to overcome its limits, which are related to its blocking nature.
One of the main features of this consensus protocol is that it is non-blocking; this doesn't mean that the participants are not blocked during processing, but it means that the protocol can proceed in spite of failures.
It consists of three phases; the prepare phase and the commit (or abort) phase are the same as those of the 2PC protocol.
However, it introduces a new phase, which we can define as a prepared state, where all of the participants of the transaction will define their statuses. The status can be either waiting or pre-commit. This means that the final phase can only have one, final state—aborted, if the previous phase was waiting, or commit, if the previous phase was pre-commit.
3PC mitigates the blocking nature of 2PC. The problem is that it obtains it with a more complicated protocol, and with a need to send another message before deciding to commit or abort the transaction. Furthermore, it does not solve the issue with network partitions.
3PC is not widely used in production environments.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7582)
Grails in Action by Glen Smith Peter Ledbrook(7486)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(4905)
Kotlin in Action by Dmitry Jemerov(4844)
Azure Containers Explained by Wesley Haakman & Richard Hooper(4817)
Running Windows Containers on AWS by Marcio Morales(4334)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4278)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(3988)
The Age of Surveillance Capitalism by Shoshana Zuboff(3651)
Combating Crime on the Dark Web by Nearchos Nearchou(3556)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3354)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3213)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3151)
Mastering Python for Networking and Security by José Manuel Ortega(3145)
Blockchain Basics by Daniel Drescher(3075)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(2809)
TCP IP by Todd Lammle(2796)
Python for Security and Networking - Third Edition by José Manuel Ortega(2771)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2614)