Abstract
The logical structure of the underlying network is often neglected in the design and deployment of new distributed systems and sometimes can come into play only after the system reach the production state. This can lead to the vulnerability of the system against intruders controlling the properties of the network. This paper describes a simulation system designed to analyze the influence of the logical structure and quality of the network service on a distributed systems workflow and their general testing during unstable network operation. This system allows developers to detect network vulnerabilities of distributed systems in advance and simplifies further development with regard to new findings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Etiemble, D.: 45-year CPU Evolution: one law and two equations. arXiv preprint arXiv:1803.00254 (2018)
Skala, K., Davidović, D., Lipić, T., Sović, I.: G-Phenomena as a base of scalable distributed computing —G-Phenomena in Moore’s Law. Int. J. Internet Distrib. Syst. 2(1), 1–4 (2014). https://doi.org/10.4236/ijids.2014.21001
Shurov, A., Malevanniy, D., Iakushkin, O., Korkhov, V.: Blockchain network threats: the case of PoW and ethereum. In: Misra, S., et al. (eds.) ICCSA 2019. LNCS, vol. 11620, pp. 606–617. Springer, Cham (2019)
Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)
Henderson, T.R., et al.: Network simulations with the ns-3 simulator. SIGCOMM Demonstration 14(14), 527 (2008)
Montresor, A., Jelasity, M.: PeerSim: a scalable P2P simulator. In: Proceedings of the 9th International Conference on Peer-to-Peer (P2P 2009), Seattle, WA, September 2009, pp. 99–100 (2009)
Feldotto, M., Graffi, K.: Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM. In: Proceedings of IEEE International Conference on High Performance Computing and Simulation (IEEE HPCS 2013) (2013)
Dinh, T.T.A., et al.: Blockbench: a framework for analyzing private blockchains. In: Proceedings of the 2017 ACM International Conference on Management of Data. ACM (2017)
Iakushkin, O., Shichkina, Y., Sedova, O.: Petri Nets for modelling of message passing middleware in cloud computing environments. In: Gervasi, O., et al. (eds.) ICCSA 2016. LNCS, vol. 9787, pp. 390–402. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-42108-7_30
Stoykov, L., Zhang, K., Jacobsen, H.-A.: VIBES: fast blockchain simulations for large-scale peer-to-peer networks: demo. In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos (Middleware 2017), pp. 19–20. ACM, New York (2017). https://doi.org/10.1145/3155016.3155020
Rekhter, Y., et al.: Application of the border gateway protocol in the internet (1990)
Felter, W., et al.: An updated performance comparison of virtual machines and linux containers. In: 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE (2015)
Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_5
Iakushkin, O., Malevanniy, D., Bogdanov, A., Sedova, O.: Adaptation and deployment of PanDA task management system for a private cloud infrastructure. In: Gervasi, O., et al. (eds.) ICCSA 2017. LNCS, vol. 10408, pp. 438–447. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62404-4_32
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Malevanniy, D., Iakushkin, O., Korkhov, V. (2019). Simulation of Distributed Applications Based on Containerization Technology. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11620. Springer, Cham. https://doi.org/10.1007/978-3-030-24296-1_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-24296-1_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24295-4
Online ISBN: 978-3-030-24296-1
eBook Packages: Computer ScienceComputer Science (R0)