Let’s represent this Distributed Hashtable using a circular doubly-linked list
- Each node knows the node before it and after it.
Place all the data on the node being deleted on the next node (going clockwise)
- Use a fingertable to find the node that has the key you’re looking for
- A hashtable on each node storing the address to a couple of nodes in the cluster
- A hacked acceptor might be giving evil values (ex: spoofing)
- A bug might be causing bad values
- This is an arbitrary/byzantine failure
- All loyal lieutenants follow the same order even if commander is a traitor
- If the commander is loyal, every loyal liuetenant obeys his command https://cse.buffalo.edu/~stevko/courses/cse486/spring14/lectures/36-bft1.pdf