• Skip to main content
  • Skip to primary sidebar

ARTISTIC SWAN

Your treasure of information!

  • Home
  • BUSINESS
  • CYBER SECURITY
    • Guides
    • Reviews
    • Tools
    • Videos
    • Information Security Abbreviations
    • Downloads
      • Ransomware Decryptors
  • EDUCATION AND TRAINING
    • BASIC ENGLISH GRAMMAR
  • HEALTH AND FITNESS
  • PETS
  • REFERENCE
  • SCIENCE AND TECHNOLOGY
    • ASTRONOMY
  • TRAVEL
  • Privacy Policy
  • Contact Us
You are here: Home / CYBER SECURITY / Tools / Shadow – Unique Discrete Event Network Simulator
Shadow – Unique Discrete Event Network Simulator

Shadow – Unique Discrete Event Network Simulator

October 17, 2017 By Uma Leave a Comment

Shadow

Shadow is a unique discrete-event network simulator that runs real applications like Tor and Bitcoin, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulation with the efficiency and control of simulation, achieving the best of both approaches.

Shadow was developed because there was a recognized need for an accurate, efficient, and scalable tool for Tor experimentation: using the PlanetLab platform is undesirable due to management overhead and lack of control; existing emulators are far too inefficient when scaling to thousands of nodes; roll-your-own simulators are often too inaccurate or generic to be useful for multiple projects; and experiments on the live Tor network are often infeasible due to privacy risks.

The goal for Shadow was to provide a tool that can be used by anyone with a Linux machine or access to EC2 to hasten the development of research prototypes and reduce the time to deployment. Although originally written with Tor experimentation in mind, Shadow can also run Bitcoin and is useful for researching or prototyping other distributed or pe er-to-peer systems including multi-party computation protocols.

Feature Overview

Shadow does the following:

  • creates an isolated simulation environment where virtual hosts may communicate with each other but not with the Internet
  • natively executes real applications like Tor and Bitcoin
  • provides efficient, accurate, and controlled experiments
  • models network topology, latency, and bandwidth
  • runs without root on a single Linux machine, or in the cloud
  • simulates multiple virtual hosts in virtual time
  • simulates the network (TCP stack) and CPU processing delays
  • can run private Tor networks with user/traffic models based on Tor metrics
  • much, much more!

Download

Filed Under: Tools Tagged With: Event, Network Simulator, Shadow, Unique Discrete

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Archives

Recent Posts

  • The Universe
  • Top 50 DB2 Interview Questions and Answers for Professionals
  • Microsoft Windows Versions
  • Country Code – Country Calling Codes
  • Complex Sentences

Categories

Recent Comments

  • John Deere Technical Manuals on Microsoft Windows Versions
  • P on How Hackers Hacked into Bitcoin Wallet [DEMO]
  • Gabriel on Deep Web – Best Onion Links
  • Marce3l on Deep Web – Best Onion Links

Copyright © 2023 • Android RAT • Onion Links