Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer)
The objective is to analyze the foundation the Virtual Network Level of Application Composed IP Networks Connected with Systems. Methods/Statistical Analysis: In this research using the methodological foundation logical analysis attempts to give an overview of the state of the art in terms P2P and e...
- Autores:
-
Viloria Silva, Amelec Jesus
Robayo Acuna, Paula Vivana
- Tipo de recurso:
- Article of journal
- Fecha de publicación:
- 2016
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/4336
- Acceso en línea:
- https://hdl.handle.net/11323/4336
https://repositorio.cuc.edu.co/
- Palabra clave:
- Massive computing systems
SIS issues connected to IP networks
Technical complexity
Virtual application level
Sistemas de computación masiva
Problemas SIS conectados a redes IP
Complejidad técnica
Nivel de aplicación virtual
- Rights
- openAccess
- License
- Attribution-NonCommercial-ShareAlike 4.0 International
id |
RCUC2_2c68e5ad06479463d62d7de92eb31b3f |
---|---|
oai_identifier_str |
oai:repositorio.cuc.edu.co:11323/4336 |
network_acronym_str |
RCUC2 |
network_name_str |
REDICUC - Repositorio CUC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
dc.title.translated.spa.fl_str_mv |
Nivel de red virtual de aplicaciones Compuesto por redes IP conectadas con sistemas - (NETS Peer-to-Peer) |
title |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
spellingShingle |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) Massive computing systems SIS issues connected to IP networks Technical complexity Virtual application level Sistemas de computación masiva Problemas SIS conectados a redes IP Complejidad técnica Nivel de aplicación virtual |
title_short |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
title_full |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
title_fullStr |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
title_full_unstemmed |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
title_sort |
Virtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer) |
dc.creator.fl_str_mv |
Viloria Silva, Amelec Jesus Robayo Acuna, Paula Vivana |
dc.contributor.author.spa.fl_str_mv |
Viloria Silva, Amelec Jesus Robayo Acuna, Paula Vivana |
dc.subject.spa.fl_str_mv |
Massive computing systems SIS issues connected to IP networks Technical complexity Virtual application level Sistemas de computación masiva Problemas SIS conectados a redes IP Complejidad técnica Nivel de aplicación virtual |
topic |
Massive computing systems SIS issues connected to IP networks Technical complexity Virtual application level Sistemas de computación masiva Problemas SIS conectados a redes IP Complejidad técnica Nivel de aplicación virtual |
description |
The objective is to analyze the foundation the Virtual Network Level of Application Composed IP Networks Connected with Systems. Methods/Statistical Analysis: In this research using the methodological foundation logical analysis attempts to give an overview of the state of the art in terms P2P and especially networks in the field of computer systems distributed along with several contributions that allow build systems High Throughput Computing. Findings: The network is virtual is application level made up connected to IP networks, in a nutshell systems P2P systems are distributed systems in which there are no any central control or hierarchical structure and can therefore go beyond the services offered by traditional centralized type systems Client Server at the cost of greater technical and theoretical complexity. In P2P systems, nodes that make up the system are connected together using IP networks forming a kind of virtual network application layer, also called “Overlay”, which is used to route messages between nodes in order to find information |
publishDate |
2016 |
dc.date.issued.none.fl_str_mv |
2016 |
dc.date.accessioned.none.fl_str_mv |
2019-05-17T15:29:24Z |
dc.date.available.none.fl_str_mv |
2019-05-17T15:29:24Z |
dc.type.spa.fl_str_mv |
Artículo de revista |
dc.type.coar.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_6501 |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.redcol.spa.fl_str_mv |
http://purl.org/redcol/resource_type/ART |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/acceptedVersion |
format |
http://purl.org/coar/resource_type/c_6501 |
status_str |
acceptedVersion |
dc.identifier.issn.spa.fl_str_mv |
09746846 |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/11323/4336 |
dc.identifier.instname.spa.fl_str_mv |
Corporación Universidad de la Costa |
dc.identifier.reponame.spa.fl_str_mv |
REDICUC - Repositorio CUC |
dc.identifier.repourl.spa.fl_str_mv |
https://repositorio.cuc.edu.co/ |
identifier_str_mv |
09746846 Corporación Universidad de la Costa REDICUC - Repositorio CUC |
url |
https://hdl.handle.net/11323/4336 https://repositorio.cuc.edu.co/ |
dc.language.iso.none.fl_str_mv |
eng |
language |
eng |
dc.relation.references.spa.fl_str_mv |
1. Arzola R, La Cruz J. The use of new technologies in Organizations. Editorial Vanguardia. Buenos Aires, Argentina; 2013. 2. Ty Baldwin Childs U. Universal neonatal hearing screening moving from evidence to practice. USA. New York; 2009. 3. Bierly N, Scott H, Tuner H, Lanz J. The historical context of the evolution of information technologies. Editorial Review. Madrid Spain; 2000. 4. CERA L. Vanguardia and use of technology in the world. Editorial Vid. Barcelona, Spain; 2010. 5. Faloutsos M, Faloutsos P, Faloutsos C. On power-law. Relationships of the Internet Topology. SIGCOMM; 2009. 6. Adar E, Huberman B. Free riding on Gnutella. First. Monday. 2000 Oct; 5(10). Gnutella Protocol Specification v4.0. Available from: http://dss.clip2.com/GnutellaProtocol04.pdf 7. DSS Group. Gnutella: To the bandwidth barrier and beyond. Available from: http://dss.clip2.com 8. Hong T. Performance, in Peer-to-Peer: Harnessing the Power of Disruptive Technologies. A. Oram, editor. O’Reilly and Associates: Sebastopol, CA; 2001. 9. Adamic L, Lukose R, Puniyani A, Huberman B. Search in Power-Law Networks; 2015. 10. Ripeanu. Peer-to-peer architecture case study: Gnutella network. University of Chicago Technical Report TR-20- 26; 2016. 11. Barabasi, Albert R. Emergence of scaling in random networks. Science. 2009; 286(509). 12. Albert R, Jeong H, Barabási A. Attak and tolerance in complex networks. Nature. 2000; 406(378). 13. Callan JP, Lu Z, Croft WB. Searching distributed collections with inference networks. In Proceedings of the 8th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval; 1995. p. 21–8. 14. Callan J, Powell AL, French JC, Connell M. The effects of query-based sampling on automatic database selection algorithms. 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. 15. Carlin BP, Louis TA. Bayes and empirical bayes methods for data analysis. CRC Press; 2000. 16. Cha E. E-power to the people. The Washington Post; 2000 May 18. p. A01. 17. Clarke. Freenet - Front page. Available from: http://freenet. sourceforge.net/ 18. Clarke O, Sandberg B, Wiley, Hong TW. Freenet: A distributed anonymous information storage and retrieval system. ICSI Workshop on Design Issues in Anonymity and Unobservability. Berkeley, California; 2000 Jul 25-26. 19. Viloria A. Validation of a model for productivity evaluation for microfinance institutions. Advanced Science Letters. 2015; 21:1610–4. ISSN: 1936-6612 (Print): EISSN: 1936- 7317 (Online). |
dc.rights.spa.fl_str_mv |
Attribution-NonCommercial-ShareAlike 4.0 International |
dc.rights.uri.spa.fl_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0/ |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
rights_invalid_str_mv |
Attribution-NonCommercial-ShareAlike 4.0 International http://creativecommons.org/licenses/by-nc-sa/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.publisher.spa.fl_str_mv |
Indian Journal of Science and Technology |
institution |
Corporación Universidad de la Costa |
bitstream.url.fl_str_mv |
https://repositorio.cuc.edu.co/bitstreams/a1df8a83-3edd-432e-92ae-ad504e1e5b34/download https://repositorio.cuc.edu.co/bitstreams/3b639a1c-18bb-4591-a807-0b6b46a2b9d0/download https://repositorio.cuc.edu.co/bitstreams/180688e0-152d-45dd-8072-6c4ea032c544/download https://repositorio.cuc.edu.co/bitstreams/e413b6b7-70cc-4372-a88f-76a8c392c332/download https://repositorio.cuc.edu.co/bitstreams/2437f607-1ee7-4333-8733-1c9a230753a0/download |
bitstream.checksum.fl_str_mv |
934f4ca17e109e0a05eaeaba504d7ce4 8a4605be74aa9ea9d79846c1fba20a33 a52038c75c362de76b42649861891f33 0d2a3835f1760a2e4db1656cf7b63a8c 1645e31a28efc2bc908766af1aa14f81 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio de la Universidad de la Costa CUC |
repository.mail.fl_str_mv |
repdigital@cuc.edu.co |
_version_ |
1811760722360664064 |
spelling |
Viloria Silva, Amelec JesusRobayo Acuna, Paula Vivana2019-05-17T15:29:24Z2019-05-17T15:29:24Z201609746846https://hdl.handle.net/11323/4336Corporación Universidad de la CostaREDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/The objective is to analyze the foundation the Virtual Network Level of Application Composed IP Networks Connected with Systems. Methods/Statistical Analysis: In this research using the methodological foundation logical analysis attempts to give an overview of the state of the art in terms P2P and especially networks in the field of computer systems distributed along with several contributions that allow build systems High Throughput Computing. Findings: The network is virtual is application level made up connected to IP networks, in a nutshell systems P2P systems are distributed systems in which there are no any central control or hierarchical structure and can therefore go beyond the services offered by traditional centralized type systems Client Server at the cost of greater technical and theoretical complexity. In P2P systems, nodes that make up the system are connected together using IP networks forming a kind of virtual network application layer, also called “Overlay”, which is used to route messages between nodes in order to find informationThe objective is to analyze the foundation the Virtual Network Level of Application Composed IP Networks Connected with Systems. Methods/Statistical Analysis: In this research using the methodological foundation logical analysis attempts to give an overview of the state of the art in terms P2P and especially networks in the field of computer systems distributed along with several contributions that allow build systems High Throughput Computing. Findings: The network is virtual is application level made up connected to IP networks, in a nutshell systems P2P systems are distributed systems in which there are no any central control or hierarchical structure and can therefore go beyond the services offered by traditional centralized type systems Client Server at the cost of greater technical and theoretical complexity. In P2P systems, nodes that make up the system are connected together using IP networks forming a kind of virtual network application layer, also called “Overlay”, which is used to route messages between nodes in order to find informationViloria Silva, Amelec Jesus-0000-0003-2673-6350-600Robayo Acuna, Paula Vivana-bbf3ed20-49dd-4d92-83cc-0478aa132ebf-0engIndian Journal of Science and TechnologyAttribution-NonCommercial-ShareAlike 4.0 Internationalhttp://creativecommons.org/licenses/by-nc-sa/4.0/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Massive computing systemsSIS issues connected to IP networksTechnical complexityVirtual application levelSistemas de computación masivaProblemas SIS conectados a redes IPComplejidad técnicaNivel de aplicación virtualVirtual network level of application composed IP networks connected with systems - (NETS Peer-to- Peer)Nivel de red virtual de aplicaciones Compuesto por redes IP conectadas con sistemas - (NETS Peer-to-Peer)Artículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersion1. Arzola R, La Cruz J. The use of new technologies in Organizations. Editorial Vanguardia. Buenos Aires, Argentina; 2013. 2. Ty Baldwin Childs U. Universal neonatal hearing screening moving from evidence to practice. USA. New York; 2009. 3. Bierly N, Scott H, Tuner H, Lanz J. The historical context of the evolution of information technologies. Editorial Review. Madrid Spain; 2000. 4. CERA L. Vanguardia and use of technology in the world. Editorial Vid. Barcelona, Spain; 2010. 5. Faloutsos M, Faloutsos P, Faloutsos C. On power-law. Relationships of the Internet Topology. SIGCOMM; 2009. 6. Adar E, Huberman B. Free riding on Gnutella. First. Monday. 2000 Oct; 5(10). Gnutella Protocol Specification v4.0. Available from: http://dss.clip2.com/GnutellaProtocol04.pdf 7. DSS Group. Gnutella: To the bandwidth barrier and beyond. Available from: http://dss.clip2.com 8. Hong T. Performance, in Peer-to-Peer: Harnessing the Power of Disruptive Technologies. A. Oram, editor. O’Reilly and Associates: Sebastopol, CA; 2001. 9. Adamic L, Lukose R, Puniyani A, Huberman B. Search in Power-Law Networks; 2015. 10. Ripeanu. Peer-to-peer architecture case study: Gnutella network. University of Chicago Technical Report TR-20- 26; 2016. 11. Barabasi, Albert R. Emergence of scaling in random networks. Science. 2009; 286(509). 12. Albert R, Jeong H, Barabási A. Attak and tolerance in complex networks. Nature. 2000; 406(378). 13. Callan JP, Lu Z, Croft WB. Searching distributed collections with inference networks. In Proceedings of the 8th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval; 1995. p. 21–8. 14. Callan J, Powell AL, French JC, Connell M. The effects of query-based sampling on automatic database selection algorithms. 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. 15. Carlin BP, Louis TA. Bayes and empirical bayes methods for data analysis. CRC Press; 2000. 16. Cha E. E-power to the people. The Washington Post; 2000 May 18. p. A01. 17. Clarke. Freenet - Front page. Available from: http://freenet. sourceforge.net/ 18. Clarke O, Sandberg B, Wiley, Hong TW. Freenet: A distributed anonymous information storage and retrieval system. ICSI Workshop on Design Issues in Anonymity and Unobservability. Berkeley, California; 2000 Jul 25-26. 19. Viloria A. Validation of a model for productivity evaluation for microfinance institutions. Advanced Science Letters. 2015; 21:1610–4. ISSN: 1936-6612 (Print): EISSN: 1936- 7317 (Online).PublicationCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-81031https://repositorio.cuc.edu.co/bitstreams/a1df8a83-3edd-432e-92ae-ad504e1e5b34/download934f4ca17e109e0a05eaeaba504d7ce4MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.cuc.edu.co/bitstreams/3b639a1c-18bb-4591-a807-0b6b46a2b9d0/download8a4605be74aa9ea9d79846c1fba20a33MD53ORIGINALVirtual Network Level of Application Composed IP.pdfVirtual Network Level of Application Composed IP.pdfapplication/pdf184464https://repositorio.cuc.edu.co/bitstreams/180688e0-152d-45dd-8072-6c4ea032c544/downloada52038c75c362de76b42649861891f33MD51THUMBNAILVirtual Network Level of Application Composed IP.pdf.jpgVirtual Network Level of Application Composed IP.pdf.jpgimage/jpeg66343https://repositorio.cuc.edu.co/bitstreams/e413b6b7-70cc-4372-a88f-76a8c392c332/download0d2a3835f1760a2e4db1656cf7b63a8cMD55TEXTVirtual Network Level of Application Composed IP.pdf.txtVirtual Network Level of Application Composed IP.pdf.txttext/plain17195https://repositorio.cuc.edu.co/bitstreams/2437f607-1ee7-4333-8733-1c9a230753a0/download1645e31a28efc2bc908766af1aa14f81MD5611323/4336oai:repositorio.cuc.edu.co:11323/43362024-09-17 10:48:25.488http://creativecommons.org/licenses/by-nc-sa/4.0/Attribution-NonCommercial-ShareAlike 4.0 Internationalopen.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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 |