Fig. 8From: Using weaker consistency models with monitoring and recovery for improving performance of key-value storesSimulating network delay using proxiesBack to article page