Part 3 : building a network and supporting applications

Professor at Université catholique de Louvain (UCL) and co-founder at Tessares
May. 7, 2021
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
Part 3 : building a network and supporting applications
1 of 63

More Related Content

Similar to Part 3 : building a network and supporting applications

Part6-network-routing.pptxPart6-network-routing.pptx
Part6-network-routing.pptxOlivier Bonaventure
Part 2 : reliable transmission and building a networkPart 2 : reliable transmission and building a network
Part 2 : reliable transmission and building a networkOlivier Bonaventure
routing algorithmrouting algorithm
routing algorithmAnusuaBasu
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptxHirazNor
Traversing Practical part 1Traversing Practical part 1
Traversing Practical part 1Bahzad5
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL

More from Olivier Bonaventure

Part3-reliable.pptxPart3-reliable.pptx
Part3-reliable.pptxOlivier Bonaventure
Part10-router.pptxPart10-router.pptx
Part10-router.pptxOlivier Bonaventure
Part1-Intro-Apps.pptxPart1-Intro-Apps.pptx
Part1-Intro-Apps.pptxOlivier Bonaventure
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptxOlivier Bonaventure
Part2-Apps-Security.pptxPart2-Apps-Security.pptx
Part2-Apps-Security.pptxOlivier Bonaventure
Part11-lan.pptxPart11-lan.pptx
Part11-lan.pptxOlivier Bonaventure

Recently uploaded

AusNOG 2023: RPKI and whois updatesAusNOG 2023: RPKI and whois updates
AusNOG 2023: RPKI and whois updatesAPNIC
pdfjupitercpanel.pdfpdfjupitercpanel.pdf
pdfjupitercpanel.pdfclay99
Summary of: “Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem”Summary of: “Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem”
Summary of: “Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem”Alessio Manià
D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...
D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...D2C Insider
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
Hacktober Fest 2023 SessionHacktober Fest 2023 Session
Hacktober Fest 2023 SessionAdnan Sheikh

Part 3 : building a network and supporting applications

Editor's Notes

  1. Pseudocode Every N seconds: for each link=l { /* one different vector for each link */ Vector=null; for each destination=d in R[] { if (R[d].link<>l) { Vector=Vector+Pair(d,R[d].cost); } } Send(Vector); }
  2. The Synchronization of Periodic Routing Messages , Floyd, S., and Jacobson, V. IEEE/ACM Transactions on Networking, V.2 N.2, p. 122-136, April 1994.
  3. In this example, the duplicate CR is likely to be a previous retransmission of the CR that was delayed in the network.