Fig. 9From: Using weaker consistency models with monitoring and recovery for improving performance of key-value storesNetwork arrangement with proxiesBack to article page