ASYNCHRONOUS INFORMATION DISTRIBUTION AND CLUSTER STATE SYNCHRONIZATION
Maciej NABOŻNY
maciej.nabozny@cloudover.iocloudover.io ltd, 590 Kingston Road SW20–8DN London (United Kingdom)
Abstract
This article describes issues related to information distribution and cluster state synchronization in environments with inconsistent network topology (with partially connected nodes or disconnected), without centralized authentication and authorization points. The main objective of this study was to create a set of rules and functional requirements to build a framework for building applications in decentralized and distributed environments that are not fully fault-tolerant, regardless of the underlying cluster’s hardware topology and availability. These solutions are based on selected principles known from the Blockchain database, Public Key Infrastructure, and Event Driven Development. Functional requirements derived from these systems are the basis of a framework dedicated for creating decentralized systems and distribution of information, used in systems developed by cloudover.io company together with AGH University of Science and Technology. Proposed principles were implemented as free library – libdinemic, which is base for future cluster management system, dedicated for large and inconsistent environments.
Keywords:
blockchain, cloud, datacenter, clusterReferences
Balalaie, A., Heydarnoori, A., & Jamshidi, P. (2016). Microservices Architecture Enables DevOps: Migration to a Cloud-Native Architecture. In IEEE Software (33(3), pp. 42–52). USA: IEEE. https://doi.org/10.1109/MS.2016.64
DOI: https://doi.org/10.1109/MS.2016.64
Google Scholar
Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & Thayer, R. (2007, November). OpenPGP Message Format. Retrieved from https://tools.ietf.org/pdf/rfc4880.pdf
DOI: https://doi.org/10.17487/rfc4880
Google Scholar
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., & Polk, W. (2008, May). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Retrieved from https://www.rfc-editor.org/rfc/pdfrfc/rfc5280.txt.pdf
DOI: https://doi.org/10.17487/rfc5280
Google Scholar
Courtois, P. J., Heymans, F., & Parnas, D. L. (1971). Concurrent control with readers and writers. Communications of the ACM, 14(10), 667-668. https://doi.org/10.1145/362759.362813
DOI: https://doi.org/10.1145/362759.362813
Google Scholar
Davidson, S., Garcia-Molina, H., & Skeen, D. (1985). Consistency In A Partitioned Network: A Survey. ACM Computing Surveys, 17(3), 341–370. https://doi.org/10.1145/5505.5508
DOI: https://doi.org/10.1145/5505.5508
Google Scholar
Dinemic code repositories, (n.d.). Retrieved February 1, 2018, from https://github.com/cloudOver/libdinemic
Google Scholar
Dinemic project, (n.d.). Retrieved February 1, 2018, from https://dinemic.io
Google Scholar
DM-Crypt project, (n.d.). Retrieved February 1, 2018, from http://www.saout.de/misc/dm-crypt
Google Scholar
Eyal, I. (2017). Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities. In Computer (50(9), pp. 38–49). USA: IEEE. https://doi.org/10.1109/MC.2017.3571042
DOI: https://doi.org/10.1109/MC.2017.3571042
Google Scholar
Federal Information Processing Standards. (2002). Secure Hash Signature Standard (SHS) (FIPS PUB 180-2).
Google Scholar
Fernstrom, C., Narfelt, K.-H., & Ohlsson, L. (1992). Software factory principles, architecture, and experiments. In IEEE Software (9(2), 36–44). USA: IEEE. https://doi.org/10.1109/52.120600
DOI: https://doi.org/10.1109/52.120600
Google Scholar
GNU Privacy Guard project, (n.d.). Retrieved February 1, 2018, from https://www.gnupg.org/
Google Scholar
Lippman, S. B. (1996). Inside the C++ Object Model, 1st edition. USA: Addison-Wesley Professional.
Google Scholar
Meetup group Crypto@Cracow. (2016). Retrieved February 1, 2018, from https://www.meetup.com/plPL/Crypto-Cracow/
Google Scholar
Nakamoto, S. (2008, October). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
Google Scholar
Polish Linux Users Group. (2000). Retrieved February 1, 2018, from https://linux.org.pl
Google Scholar
Proof of work explanation, Bitcoin project documentation. (2008). Retrieved February 1, 2018, from https://en.bitcoin.it/wiki/Proof_of_work
Google Scholar
Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. In IEEE Communications Surveys & Tutorials IEEE. (18(3), pp. 2084–2123). USA: IEEE. https://doi.org/10.1109/COMST.2016.2535718
DOI: https://doi.org/10.1109/COMST.2016.2535718
Google Scholar
Viennot, N., Lecuyer, M., Bell, J., Geambasu, R., & Nieh, J. (2015). Synapse: a microservices architecture for heterogeneous-database web applications. In EuroSys’15, Proceedings of the Tenth European Conference on Computer Systems, Article No. 21. USA, New York: ACM. https://doi.org/10.1145/2741948.2741975
DOI: https://doi.org/10.1145/2741948.2741975
Google Scholar
Wood, G. (2014). Ethereum: a secure decentralised generalised transaction ledger. Retrieved from http://gavwood.com/Paper.pdf
Google Scholar
Zhang, Z., & Zhang, Ch. (2004). Basics of Agents and Multi-agent Systems. In Agent-Based Hybrid Intelligent Systems. Lecture Notes in Computer Science (pp. 29–33). Berlin: Springer.
DOI: https://doi.org/10.1007/978-3-540-24623-7_3
Google Scholar
Authors
Maciej NABOŻNYmaciej.nabozny@cloudover.io
cloudover.io ltd, 590 Kingston Road SW20–8DN London United Kingdom
Statistics
Abstract views: 52PDF downloads: 7
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in Applied Computer Science are open-access and distributed under the terms of the Creative Commons Attribution 4.0 International License.
Similar Articles
- Shadan Mohammed Jihad ABDALWAHID, Raghad Zuhair YOUSIF, Shahab Wahhab KAREEM, ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA , Applied Computer Science: Vol. 15 No. 4 (2019)
- Elizabeth Perez, Juan A. Araiza, Dreysy Pozos, Edmundo Bonilla, Jose C. Hernandez, Jesus A. Cortes, APPLICATION FOR FUNCTIONALITY AND REGISTRATION IN THE CLOUD OF A MICROCONTROLLER DEVELOPMENT BOARD FOR IOT IN AWS , Applied Computer Science: Vol. 17 No. 2 (2021)
- Saha RENO, Sheikh Surfuddin Reza Ali CHOWDHURY, Iqramuzzaman SADI, MITIGATING LOAN ASSOCIATED FINANCIAL RISK USING BLOCKCHAIN BASED LENDING SYSTEM , Applied Computer Science: Vol. 17 No. 2 (2021)
- Tomasz NOWICKI, Adam GREGOSIEWICZ, Zbigniew ŁAGODOWSKI, PRODUCTIVITY OF A LOW-BUDGET COMPUTER CLUSTER APPLIED TO OVERCOME THE N-BODY PROBLEM , Applied Computer Science: Vol. 17 No. 4 (2021)
- Elvis COUTIÑO-MORENO, Quirino ESTRADA, Daniel MALDONADO-ONOFRE, Alejandro RODRIGUEZ-MENDEZ, Julio GOMEZ-GIRON, RESOLUTION IN THE 3D MODELING OF OBJECTS FOR ADDITIVE MANUFACTURING AND REVERSE ENGINEERING – SHUTTER EFFECT , Applied Computer Science: Vol. 17 No. 1 (2021)
- Denis RATOV, ARCHITECTURAL PARADIGM OF THE INTERACTIVE INTERFACE MODULE IN THE CLOUD TECHNOLOGY MODEL , Applied Computer Science: Vol. 16 No. 4 (2020)
- Raphael Olufemi AKINYEDE, Sulaiman Omolade ADEGBENRO, Babatola Moses OMILODI, A SECURITY MODEL FOR PREVENTING E-COMMERCE RELATED CRIMES , Applied Computer Science: Vol. 16 No. 3 (2020)
- Ihor PYSMENNYI, Anatolii PETRENKO, Roman KYSLYI, GRAPH-BASED FOG COMPUTING NETWORK MODEL , Applied Computer Science: Vol. 16 No. 4 (2020)
- Marcin Badurowicz, Sebastian Łagowski, USAGE OF IOT EDGE APPROACH FOR ROAD QUALITY ANALYSIS , Applied Computer Science: Vol. 19 No. 1 (2023)
You may also start an advanced similarity search for this article.