Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Real-time Analytics with Storm and Cassandra

You're reading from  Real-time Analytics with Storm and Cassandra

Product type Book
Published in Mar 2015
Publisher
ISBN-13 9781784395490
Pages 220 pages
Edition 1st Edition
Languages
Author (1):
Shilpi Saxena Shilpi Saxena
Profile icon Shilpi Saxena

Table of Contents (19) Chapters

Real-time Analytics with Storm and Cassandra
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Let's Understand Storm 2. Getting Started with Your First Topology 3. Understanding Storm Internals by Examples 4. Storm in a Clustered Mode 5. Storm High Availability and Failover 6. Adding NoSQL Persistence to Storm 7. Cassandra Partitioning, High Availability, and Consistency 8. Cassandra Management and Maintenance 9. Storm Management and Maintenance 10. Advance Concepts in Storm 11. Distributed Cache and CEP with Storm Quiz Answers Index

Introduction to memcached


Memcached is a very simple in-memory key value store; we can assume it to be an in-memory store for a hash map. This can be used in conjunction with Storm supervisors to serve as a common memory storage, which can be accessed for read/write operations by all the Storm workers on various nodes in the Storm cluster.

Memcached has the following components:

  • The memcached server

  • The memcache client

  • The hashing algorithm (client-based implementation)

  • The server algorithm for data retention

Memcached uses Least Recently Used (LRU) to discard the elements from the cache. This means that the items that have not been referred since the longest time are the first ones to be removed from the cache. These items are said to be expired from the cache, and if they are referred after expiry, they are reloaded from a stable storage.

The following is the flow of how entries are loaded and retrieved from or through a cache:

The preceding figure depicts the scenarios of cache hit and cache...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}