Why does DNS work?
DNS Attacks? How to mitigate?
Mirigation:

What are key-value stores?
Key value store compared to DBMS - SQL
DBMS
KVS
Why are key-value stores needed?
Key-Value store client interface
Common features of key-value stores
Common non-features
Bigtable components
Master
Tablet server
Bigtable building blocks
Chubby “& ZooKeeper lock service

Representation & use of configuration information with lock service
Managed via directories, small files Directories, files can serve as locks Reads, writes are atomic.
Clients maintain sessions If session lease expires and can’t be renewed, locks are released.

Lock service in context
Core mechanisms Big TAble
– Cf. lect. on coordination – Cf. lect. on replication
Chubby example: leader election
HBase architecture overview
HBase global read-path

HBase write path

HBase adding of components

Core mechanisms HBase nn
Hbase storage unit failure

Cassandra architecture overview
