当前位置:网站首页>Handling write conflicts under multi-master replication (4) - multi-master replication topology
Handling write conflicts under multi-master replication (4) - multi-master replication topology
2022-07-31 15:32:00 【Huawei cloud】
The topology of replication describes the communication path through which write requests are propagated from one node to another.With two masters, as in Figure-7, there is only one reasonable topology: M1 must synchronize all his writes to M2, and vice versa.When there are more than two M, a variety of different topologies are possible.Figure-8 illustrates some examples.

The most common topology is all-to-all, i.e. Figure-8, where each M synchronizes its writes to all other Ms.
But more restricted topologies are also used: for example, MySQL only supports circular topologies, where each node receives writes from the previous node and writes those writes (plus its own writes)In) forwarded to the subsequent node.
Another popular structure is the star shape ^v.A designated root node forwards writes to all other nodes.The star topology can be generalized to trees.
Ring, star topology
Write requests need to go through multiple nodes to reach all replicas, i.e. intermediate nodes need to forward data changes received from other nodes.To avoid infinite loops, each node needs to be assigned a unique identifier, and each write request in the replication log is marked with the identifiers of all nodes that have passed.When a node receives a data change marked with its own identifier, the data change will be ignored, avoiding repeated forwarding.
Questions
If a node fails, it may disrupt the flow of replicated messages between other nodes, rendering them unable to communicate until the node is repaired.Topologies can be reconfigured to work on failed nodes, but in most deployments this reconfiguration must be done manually.A more densely connected topology (such as all-to-all) is more fault-tolerant because it allows messages to travel along different paths, avoiding a single point of failure.
All-to-all topologies can also be problematic.Especially when some network links may be faster than others (network congestion), as a result some replicated messages may "overtake" others, as shown in Figure-9.
Client A sends L1A row is inserted into the table, and B updates the row in L3.However, L2 can receive writes in a different order: updates (from its perspective, updates to rows that don't exist in the database) can be received first, and then L1's insert log (which should arrive before the update log).
This is a causality problem, similar to "consistent prefix reads": updates depend on previously completed inserts, so make sure all nodes receive inserts before processing updates.Adding a timestamp to each log write is not enough, mainly because there is no way to ensure that the clocks are fully synchronized and thus the received logs cannot be ordered correctly on L2.
To properly order log messages, a version vector can be used.Conflict detection technology is not fully implemented in many primary replication systems.As PostgreSQL BDR does not provide causal ordering of writes, Tungsten Replicator for MySQL does not even attempt to detect conflicts.
边栏推荐
- org.apache.jasperException(could not initialize class org)
- SIGABRT 报错时的注意事项和解决方法
- Insert into data table to insert data
- R语言计算时间序列数据的移动平均值(滚动平均值、例如5日均线、10日均线等):使用zoo包中的rollmean函数计算k个周期移动平均值
- Efficient use of RecyclerView Section 1
- TRACE32——常用操作
- 为什么毕业季不要表白?
- 使用 GraphiQL 可视化 GraphQL 架构
- type of timer
- 做事软件开发-法的重要性所在以及合理结论的认识
猜你喜欢

Word表格转到Excel中

女性服务社群产品设计

为什么毕业季不要表白?

AVH Deployment Practice (1) | Deploying the Flying Paddle Model on Arm Virtual Hardware

网银被盗?这篇文章告诉你如何安全使用网银

长得很怪的箱图

TRACE32——基于SNOOPer的变量记录

WeChat chat record search in a red envelope

Ubantu project 4: xshell, XFTP connected the virtual machine and set xshell copy and paste the shortcut

11 pinia使用
随机推荐
Efficient use of RecyclerView Section 3
对话庄表伟:开源第一课
Public Key Retrieval is not allowed error solution when DBeaver connects to MySQL 8.x
.NET 20周年专访 - 张善友:.NET 技术是如何赋能并改变世界的
网银被盗?这篇文章告诉你如何安全使用网银
How useful is four-quadrant time management?
OPPO在FaaS领域的探索与思考
Codeforces Round #796 (Div. 2) (A-D)
多主复制下处理写冲突(4)-多主复制拓扑
力扣:56. 合并区间
TRACE32——常用操作
Synchronized和volatile 面试简单汇总
R语言计算时间序列数据的移动平均值(滚动平均值、例如5日均线、10日均线等):使用zoo包中的rollmean函数计算k个周期移动平均值
The use of button controls
腾讯云部署----DevOps
The use of border controls
多主复制的适用场景(1)-多IDC
力扣:714. 买卖股票的最佳时机含手续费
MySQL database operations
Delete table data or clear table