Nothing Special   »   [go: up one dir, main page]

Skip to main content

Simulation of Distributed Applications Based on Containerization Technology

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2019 (ICCSA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11620))

Included in the following conference series:

Abstract

The logical structure of the underlying network is often neglected in the design and deployment of new distributed systems and sometimes can come into play only after the system reach the production state. This can lead to the vulnerability of the system against intruders controlling the properties of the network. This paper describes a simulation system designed to analyze the influence of the logical structure and quality of the network service on a distributed systems workflow and their general testing during unstable network operation. This system allows developers to detect network vulnerabilities of distributed systems in advance and simplifies further development with regard to new findings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Etiemble, D.: 45-year CPU Evolution: one law and two equations. arXiv preprint arXiv:1803.00254 (2018)

  2. Skala, K., Davidović, D., Lipić, T., Sović, I.: G-Phenomena as a base of scalable distributed computing —G-Phenomena in Moore’s Law. Int. J. Internet Distrib. Syst. 2(1), 1–4 (2014). https://doi.org/10.4236/ijids.2014.21001

    Article  Google Scholar 

  3. Shurov, A., Malevanniy, D., Iakushkin, O., Korkhov, V.: Blockchain network threats: the case of PoW and ethereum. In: Misra, S., et al. (eds.) ICCSA 2019. LNCS, vol. 11620, pp. 606–617. Springer, Cham (2019)

    Google Scholar 

  4. Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE (2017)

    Google Scholar 

  5. Henderson, T.R., et al.: Network simulations with the ns-3 simulator. SIGCOMM Demonstration 14(14), 527 (2008)

    Google Scholar 

  6. Montresor, A., Jelasity, M.: PeerSim: a scalable P2P simulator. In: Proceedings of the 9th International Conference on Peer-to-Peer (P2P 2009), Seattle, WA, September 2009, pp. 99–100 (2009)

    Google Scholar 

  7. Feldotto, M., Graffi, K.: Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM. In: Proceedings of IEEE International Conference on High Performance Computing and Simulation (IEEE HPCS 2013) (2013)

    Google Scholar 

  8. Dinh, T.T.A., et al.: Blockbench: a framework for analyzing private blockchains. In: Proceedings of the 2017 ACM International Conference on Management of Data. ACM (2017)

    Google Scholar 

  9. Iakushkin, O., Shichkina, Y., Sedova, O.: Petri Nets for modelling of message passing middleware in cloud computing environments. In: Gervasi, O., et al. (eds.) ICCSA 2016. LNCS, vol. 9787, pp. 390–402. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-42108-7_30

    Chapter  Google Scholar 

  10. Stoykov, L., Zhang, K., Jacobsen, H.-A.: VIBES: fast blockchain simulations for large-scale peer-to-peer networks: demo. In: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Posters and Demos (Middleware 2017), pp. 19–20. ACM, New York (2017). https://doi.org/10.1145/3155016.3155020

  11. Rekhter, Y., et al.: Application of the border gateway protocol in the internet (1990)

    Google Scholar 

  12. Felter, W., et al.: An updated performance comparison of virtual machines and linux containers. In: 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). IEEE (2015)

    Google Scholar 

  13. Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_5

    Chapter  MATH  Google Scholar 

  14. Iakushkin, O., Malevanniy, D., Bogdanov, A., Sedova, O.: Adaptation and deployment of PanDA task management system for a private cloud infrastructure. In: Gervasi, O., et al. (eds.) ICCSA 2017. LNCS, vol. 10408, pp. 438–447. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62404-4_32

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniil Malevanniy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malevanniy, D., Iakushkin, O., Korkhov, V. (2019). Simulation of Distributed Applications Based on Containerization Technology. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11620. Springer, Cham. https://doi.org/10.1007/978-3-030-24296-1_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24296-1_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24295-4

  • Online ISBN: 978-3-030-24296-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics