skip to main content
research-article
Free Access

The network is reliable

Published:01 September 2014Publication History
Skip Abstract Section

Abstract

An informal survey of real-world communications failures.

References

  1. Abadi, D. Consistency trade-offs in modern distributed database system design: CAP is only part of the story. Computer 45 (2 (2012), 37--42; http://dl.acm.org/citation.cfm?id=2360959. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amazon Web Services. Summary of the Amazon EC2 and Amazon RDS service disruption in the US East region, 2011; http://aws.amazon.com/message/65648/.Google ScholarGoogle Scholar
  3. Bailis, P., Davidson, A., Fekete, A., Ghodsi, A., Hellerstein, J.M. and Stoica, I. Highly available transactions: virtues and limitations. In Proceedings of VLDB 2014 (to appear); http://www.bailis.org/papers/hat-vldb2014.pdf.Google ScholarGoogle Scholar
  4. Bailis, P., Fekete, A., Franklin, M.J., Ghodsi, A., Hellerstein, J.M. and Stoica, I. Coordination-avoiding database systems, 2014; http://arxiv.org/abs/1402.2237Google ScholarGoogle Scholar
  5. Bailis, P. and Ghodsi, A. Eventual consistency today: Limitations, extensions, and beyond. ACM Queue 11, 3 (2013); http://queue.acm.org/detail.cfm?id=2462076. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CityCloud, 2011; https://www.citycloud.eu/cloud-computing/post-mortem/.Google ScholarGoogle Scholar
  7. Davidson, S.B., Garcia-Molina, H. and Skeen, D. Consistency in a partitioned network: A survey. ACM Computing Surveys 17, 3 (1985), 341--370; http://dl.acm.org/citation.cfm?id=5508. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dwork, C., Lynch, M. and Stockmeyer, L. Consensus in the presence of partial synchrony. JACM 35, 2 (1988); 288--323. http://dl.acm.org/citation.cfm?id=42283. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fischer, M.J., Lynch, N.A., Patterson, M.S. Impossibility of distributed consensus with one faulty process. JACM 32, 2 (1985), 374--382; http://dl.acm.org/citation.cfm?id=214121 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Fog Creek Software. May 5--6 network maintenance post-mortem; http://status.fogcreek.com/2012/05/may-5-6-network-maintenance-post-mortem.html.Google ScholarGoogle Scholar
  11. Gilbert, S. and Lynch, N. Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News 33, 2 (2002), 51--59; http://dl.acm.org/citation.cfm?id=564601. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Gill, P., Jain, N., Nagappan, N. Understanding network failures in data centers: Measurement, analysis, and implications. In Proceedings of SIGCOMM '11; http://research.microsoft.com/enus/um/people/navendu/papers/sigcomm11netwiser.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Github. Github availability this week, 2012; https://github.com/blog/1261-github-availability-this-week.Google ScholarGoogle Scholar
  14. Kielhofner, K. Packets of death; http://blog.krisk.org/2013/02/packets-of-death.html.Google ScholarGoogle Scholar
  15. Lillich, J. Post mortem: Network issues last week; http://www.freistil.it/2013/02/post-mortem-network-issues-last-week/.Google ScholarGoogle Scholar
  16. Narayan, P.P.S. Sherpa update, 2010; https://developer.yahoo.com/blogs/ydn/sherpa-7992.html#4.Google ScholarGoogle Scholar
  17. Prince, M. Today's outage post mortem, 2013; http://blog.cloudflare.com/todays-outage-post-mortem-82515.Google ScholarGoogle Scholar
  18. Turner, D., Levchenko, K., Snoeren, A. and Savage, S. California fault lines: Understanding the causes and impact of network failures. In Proceedings of SIGCOMM '10; http://cseweb.ucsd.edu/~snoeren/papers/cenic-sigcomm10.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Twilio. Billing incident post-mortem: breakdown, analysis and root cause; http://www.twilio.com/blog/2013/07/billing-incident-post-mortem.html.Google ScholarGoogle Scholar

Index Terms

  1. The network is reliable

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 57, Issue 9
        September 2014
        94 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/2663191
        • Editor:
        • Moshe Y. Vardi
        Issue’s Table of Contents

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 September 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDFChinese translation

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format