Analysis and Implementation of Comparison Between Podman and Docker in Container Management

Husain Husain, Khairan Marzuki, Christopher Michael lauw, Lalu Zazuli Azhar Mardedi

Abstract


The increasing use of the internet makes the implementation process more accessible, but the problem is that it is difficult to manage network management, with the emergence of container technologies such as Docker and Podman as efficient application management solutions. This research compares Docker and Podman regarding container management using the Network Development Life Cycle (NDLC) methodology. This study evaluates three parameters: accessing the Fedora project registry, handling images or ISOs, and user access in containers. The results show that Podman performs better regarding registry access, is slightly faster with images, and offers faster user creation. Overall, the study concludes that Podman is superior, demonstrating compatibility with Docker and proving its efficacy in container management.

Keywords


Computer Network; Container; Docker; Podman

Full Text:

PDF

References


R. M. Akbar and R. R. W. Giri, “Analysis Of Digital Skill Confirmation Factors In The Use Of Mobile Banking Services In Bogor Regency,” Jurnal Ekonomi, vol. 12, no. 04, pp. 313–326, 2023.

B. Cherinka et al., “Marvin: A tool kit for streamlined access and visualization of the SDSS-IV MaNGA data set,” The Astronomical Journal, vol. 158, no. 2, p. 74, 2019.

A. R. Kunduru, “Cloud BPM Application (Appian) Robotic Process Automation Capabilities,” Asian Journal of Research in Computer Science, vol. 16, no. 3, pp. 267–280, 2023.

R. Khattar, R. Hales, D. P. Ames, E. J. Nelson, N. L. Jones, and G. Williams, “Tethys App Store: Simplifying deployment of web applications for the international GEOGloWS initiative,” Environmental Modelling & Software, vol. 146, p. 105227, 2021.

H. Husain, A. Anggrawan, H. Santoso, H. T. Sihotang, D. Pyanto, and F. R. Hidayat, “Pengaturan Bandwidth Management Dan Time Limitation Berbasis User Manajer Mikrotik,” Jurnal Mantik Penusa, vol. 2, no. 2, 2018.

L. Baier, F. Jöhren, and S. Seebacher, “Challenges in the Deployment and Operation of Machine Learning in Practice.,” in ECIS, 2019.

K. Zandberg and E. Baccelli, “Femto-containers: Devops on microcontrollers with lightweight virtualization & isolation for iot software modules,” arXiv preprint arXiv:2106.12553, 2021.

S. Abraham, A. K. Paul, R. I. S. Khan, and A. R. Butt, “On the use of containers in high performance computing environments,” in 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), IEEE, 2020, pp. 284–293.

S. Kaiser, M. S. Haq, A. Ş. Tosun, and T. Korkmaz, “Container technologies for ARM architecture: A comprehensive survey of the state-of-the-art,” IEEE Access, 2022.

S. Kaiser, A. Ş. Tosun, and T. Korkmaz, “Benchmarking Container Technologies on ARM-Based Edge Devices,” IEEE Access, 2023.

B. Ward, “SQL Server 2022 on Linux, Containers, and Kubernetes,” in SQL Server 2022 Revealed: A Hybrid Data Platform Powered by Security, Performance, and Availability, Springer, 2022, pp. 389–412.

S. Kadri, A. Sboner, A. Sigaras, and S. Roy, “Containers in bioinformatics: applications, practical considerations, and best practices in molecular pathology,” The Journal of molecular diagnostics, vol. 24, no. 5, pp. 442–454, 2022.

A. K. Mishra, E. S. Pilli, and M. C. Govil, “CONTAIN4n6: a systematic evaluation of container artifacts,” Journal of Cloud Computing, vol. 11, no. 1, pp. 1–14, 2022.

V. T. Tran, “Maintaining Linux Repositories For Closed Network Infrastructure,” 2023.

D. Siswanto, G. Priyandoko, N. Tjahjono, R. S. Putri, N. B. Sabela, and M. I. Muzakki, “Development of Information and Communication Technology Infrastructure in School using an Approach of the Network Development Life Cycle Method,” in Journal of Physics: Conference Series, IOP Publishing, 2021, p. 12026.

I. Kamu, M. T. Parinsi, M. W. Kuhu, and A. V. Mananggel, “Computer Network Design in Vocational School Using Network Simulator,” International Journal of Information Technology and Education, vol. 2, no. 1, pp. 22–31, 2022.

A. M. Potdar, D. G. Narayan, S. Kengond, and M. M. Mulla, “Performance evaluation of docker container and virtual machine,” Procedia Computer Science, vol. 171, pp. 1419–1428, 2020.

I. Miell and A. Sayers, Docker in practice. Simon and Schuster, 2019.

F. Björklund, “A comparison between native and secure runtimes: Using Podman to compare crun and Kata Containers.” 2021.

S. Giallorenzo, J. Mauro, M. G. Poulsen, and F. Siroky, “Virtualization costs: benchmarking containers and virtual machines against bare-metal,” SN Computer Science, vol. 2, no. 5, p. 404, 2021.

S. Prabakaran et al., “Predicting attack pattern via machine learning by exploiting stateful firewall as virtual network function in an SDN network,” Sensors, vol. 22, no. 3, p. 709, 2022.

K. Voulgaris et al., “A Comparison of Container Systems for Machine Learning Scenarios: Docker and Podman,” presented at the 2022 2nd International Conference on Computers and Automation (CompAuto), IEEE, 2022, pp. 114–118.

D. P. VS, S. C. Sethuraman, and M. K. Khan, “Container Security: Precaution levels, Mitigation Strategies, and Research Perspectives,” Computers & Security, p. 103490, 2023.

R. Keller Tesser and E. Borin, “Containers in HPC: a survey,” The Journal of Supercomputing, vol. 79, no. 5, pp. 5759–5827, 2023.

R. Kałaska and P. Czarnul, “Investigation of Performance and Configuration of a Selected IoT System—Middleware Deployment Benchmarking and Recommendations,” Applied Sciences, vol. 12, no. 10, p. 5212, 2022.




DOI: http://dx.doi.org/10.24042/ijecs.v3i2.19860

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Creative Commons License

International Journal of Electronics and Communications System (IJECS) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.