Simulation of Distributed Applications Based on Containerization Technology

作者: Daniil Malevanniy , Oleg Iakushkin , Vladimir Korkhov

DOI: 10.1007/978-3-030-24296-1_47

关键词:

摘要: The logical structure of the underlying network is often neglected in design and deployment new distributed systems sometimes can come into play only after system reach production state. This lead to vulnerability against intruders controlling properties network. paper describes a simulation designed analyze influence quality service on workflow their general testing during unstable operation. allows developers detect vulnerabilities advance simplifies further development with regard findings.

参考文章(12)
Matthias Feldotto, Kalman Graffi, Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM international conference on high performance computing and simulation. pp. 99- 106 ,(2013) , 10.1109/HPCSIM.2013.6641399
Wes Felter, Alexandre Ferreira, Ram Rajamony, Juan Rubio, An updated performance comparison of virtual machines and Linux containers international symposium on performance analysis of systems and software. pp. 171- 172 ,(2015) , 10.1109/ISPASS.2015.7095802
Karolj Skala, Davor Davidović, Tomislav Lipić, Ivan Sović, G-phenomena as a base of scalable distributed computing —G-phenomena in Moore’s law International Journal of Internet and Distributed Systems. ,vol. 2, pp. 1- 4 ,(2014) , 10.4236/IJIDS.2014.21001
Alberto Montresor, Mark Jelasity, PeerSim: A scalable P2P simulator international conference on peer-to-peer computing. pp. 99- 100 ,(2009) , 10.1109/P2P.2009.5284506
Petar Maymounkov, David Mazières, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric international workshop on peer to peer systems. pp. 53- 65 ,(2002) , 10.1007/3-540-45748-8_5
Y. Rekhter, P. Gross, Application of the Border Gateway Protocol in the Internet RFC. ,vol. 1164, pp. 1- 19 ,(1990)
Oleg Iakushkin, Yulia Shichkina, Olga Sedova, Petri Nets for Modelling of Message Passing Middleware in Cloud Computing Environments international conference on computational science and its applications. pp. 390- 402 ,(2016) , 10.1007/978-3-319-42108-7_30
Tien Tuan Anh Dinh, Ji Wang, Gang Chen, Rui Liu, Beng Chin Ooi, Kian-Lee Tan, BLOCKBENCH: A Framework for Analyzing Private Blockchains international conference on management of data. pp. 1085- 1100 ,(2017) , 10.1145/3035918.3064033
Maria Apostolaki, Aviv Zohar, Laurent Vanbever, Hijacking Bitcoin: Routing Attacks on Cryptocurrencies 2017 IEEE Symposium on Security and Privacy (SP). pp. 375- 392 ,(2017) , 10.1109/SP.2017.29
Oleg Iakushkin, Daniil Malevanniy, Alexander Bogdanov, Olga Sedova, Adaptation and Deployment of PanDA Task Management System for a Private Cloud Infrastructure Computational Science and Its Applications – ICCSA 2017. pp. 438- 447 ,(2017) , 10.1007/978-3-319-62404-4_32