scispace - formally typeset
Search or ask a question

Showing papers on "Core router published in 2015"


Proceedings ArticleDOI
09 Mar 2015
TL;DR: Two mechanisms are proposed that not only allow power control signals to utilizing existing slack at source nodes to wake up powered-off routers along the first few hops before packets are injected, but also allow these signals to utilize hop count slack by staying ahead of packets to "punch through " any blocked routers alongThe imminent path of packets.
Abstract: As chip designs penetrate further into the dark silicon era, innovative techniques are much needed to power off idle or under-utilized system components while having minimal impact on performance. On-chip network routers are potentially good targets for power-gating, but packets in the network can be significantly delayed as their paths may be blocked by powered-off routers. In this paper, we propose Power Punch, a novel performance-aware, power reduction scheme that aims to achieve non-blocking power-gating of on-chip network routers. Two mechanisms are proposed that not only allow power control signals to utilize existing slack at source nodes to wake up powered-off routers along the first few hops before packets are injected, but also allow these signals to utilize hop count slack by staying ahead of packets to "punch through " any blocked routers along the imminent path of packets, preventing packets from having to suffer router wakeup latency or packet detour latency. Full system evaluation on PARSEC benchmarks shows Power Punch saves more than 83% of router static energy while having an execution time penalty of less than 0.4%, effectively achieving near non-blocking power-gating of on-chip network routers.

97 citations


Patent
Wu Tianyi1
12 Jun 2015
TL;DR: In this article, a first switch receives an ARP response from an SDN controller, where the response carries a MAC address of a destination gateway, where a router corresponding to the VTEP information is located in a first data center.
Abstract: In a method and an apparatus provided for implementing communication between virtual machines, a first switch receives an ARP response from an SDN controller, where the ARP response carries a MAC address of a destination gateway; the first switch acquires, according to the MAC address of the destination gateway, VTEP information corresponding to the MAC address of the destination gateway, where a router corresponding to the VTEP information is located in a first data center; and the first switch sends, according to the VTEP information, an IP packet to the router corresponding to the VTEP information, so that the router corresponding to the VTEP information sends the IP packet to a second virtual machine through a tunnel between the router and a second switch.

94 citations


Patent
31 Dec 2015
TL;DR: In this article, a configurable directional 2D router for Networks on Chips (NOCs) is presented, which is designed for implementation in programmable logic in FPGAs, and achieves theoretical lower bounds on FPGA resource consumption for various applications.
Abstract: A configurable directional 2D router for Networks on Chips (NOCs) is disclosed. The router, which may be bufferless, is designed for implementation in programmable logic in FPGAs, and achieves theoretical lower bounds on FPGA resource consumption for various applications. The router employs an FPGA router switch design that consumes only one 6-LUT or 8-input ALM logic cell per router per bit of router link width. A NOC comprising a plurality of routers may be configured as a directional 2D torus, or in diverse ways, network sizes and topologies, data widths, routing functions, performance-energy tradeoffs, and other options. System on chip designs may employ a plurality of NOCs with different configuration parameters to customize the system to the application or workload characteristics. A great diversity of NOC client cores, for communication amongst various external interfaces and devices, and on-chip interfaces and resources, may be coupled to a router in order to efficiently communicate with other NOC client cores. The router and NOC enable feasible FPGA implementation of large integrated systems on chips, interconnecting hundreds of client cores over high bandwidth links, including compute and accelerator cores, industry standard IP cores, DRAM/HBM/HMC channels, PCI Express channels, and 10G/25G/40G/100G/400G networks.

41 citations


Patent
03 Nov 2015
TL;DR: In this article, a method and apparatus to provide hop-by-hop tracking for a communication network is described, where each router verifies that a next downstream router supports tracking and in response, adds a tracking indicator and a timestamp to the data packet.
Abstract: A method and apparatus to provide hop-by-hop tracking for a communication network is described. In one embodiment, each router verifies that a next downstream router supports tracking and in response, adds a tracking indicator and a timestamp to the data packet. An end router provides a compilation of all the timestamps back to the originating router.

37 citations


Patent
24 Jun 2015
TL;DR: In this paper, a switch configured to intercept address resolution protocol (ARP) request for the enterprise router's address and fabricate a response using the MAC address of the router in the public cloud.
Abstract: Many hybrid cloud topologies require virtual machines in a public cloud to use a router in a private cloud, even when the virtual machine is transmitting to another virtual machine in the public cloud. Routing data through an enterprise router on the private cloud via the internet is generally inefficient. This problem can be overcome by placing a router within the public cloud that mirrors much of the routing functionality of the enterprise router. A switch configured to intercept address resolution protocol (ARP) request for the enterprise router's address and fabricate a response using the MAC address of the router in the public cloud.

36 citations


Journal ArticleDOI
TL;DR: This paper surveys the possible attack scenarios on present-day MPSoCs and investigates a new attack scenario, i.e., router attack targeted toward NoC architecture, and proposes different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs.
Abstract: The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.

26 citations


Book ChapterDOI
19 Mar 2015
TL;DR: This work utilizes active probes to periodically elicit IPv6 fragment identifiers from IPv6 router interfaces, and analyzes the resulting identifier time series for reboots to find evidence of clustered reboot events, popular maintenance windows, and correlation with globally visible control plane data.
Abstract: We consider the problem of inferring IPv6 router uninterrupted system availability, or uptime, from a remote vantage point without privileged access. Uptime inference is important to broader efforts to measure and characterize the availability of critical infrastructure, provides insight into network operations, and has subtle security implications. Our approach utilizes active probes to periodically elicit IPv6 fragment identifiers from IPv6 router interfaces, and analyzes the resulting identifier time series for reboots. We demonstrate the approach’s potential by characterizing 21,539 distinct IPv6 router interfaces over a five-month period. We find evidence of clustered reboot events, popular maintenance windows, and correlation with globally visible control plane data. Our results, validated by five ASes, provide initial insight into the current state of IPv6 router availability.

22 citations


Patent
30 Sep 2015
TL;DR: In this paper, the authors propose a method for implementing a logical router in a logical network using a configuration of a static route for the logical router, which includes several routing components with separate routing tables.
Abstract: Some embodiments provide a method for implementing a logical router in a logical network. In some embodiments, the method receives a configuration of a static route for the logical router, which includes several routing components with separate routing tables. The method identifies which of the routing components require addition of a route to a corresponding routing table to implement the configuration of the static route. The method adds the routes to the corresponding separate routing tables of the identified routing components.

22 citations


Patent
15 Sep 2015
TL;DR: In this article, the authors present techniques for internet group management protocol tunneling by electing, by each of a plurality of multicast gateways in a subnet, a designated router in the subnet.
Abstract: This disclosure is directed to techniques for internet group management protocol tunneling. This may be done by electing, by each of a plurality of multicast gateways in a subnet, a designated router in the subnet. The designated router sends internet group management protocol queries to at least one router in the subnet. The designated router further tunnels internet group management protocol reports.

20 citations


Journal ArticleDOI
TL;DR: This work introduces a novel heterogeneous NoC router architecture, supporting different link bandwidths and different number of virtual channels per unidirectional port, and formally proves a novel approach that reduces the number of required middle shared-buffers without affecting the performance of the router.
Abstract: We introduce a novel heterogeneous NoC router architecture, supporting different link bandwidths and different number of virtual channels (VCs) per unidirectional port The NoC router is based on shared-buffer architecture and has the advantages of ingress and egress bandwidth decoupling, and better performance as compared with input-buffer router architecture We present the challenges facing the design of such heterogeneous NoC router, and describe how this router architecture addresses them We introduce and formally prove a novel approach that reduces the number of required middle shared-buffers without affecting the performance of the router In comparison with an optimal input-buffer homogeneous router, our NoC router improves saturation throughput by 6-47 percent for standard traffic patterns The router achieves significant run-time improvement for NoC-based CMP running PARSEC benchmarks It offers better scalability, area, and power reduction of 15-60 percent, for NoC based CMPs of size 4 × 4 up to 16 × 16, as compared with optimal input-buffer homogeneous and heterogeneous routers

18 citations


Patent
29 Sep 2015
TL;DR: In this article, the intermediate router detects AD routes without performing layer two (L2) address learning for the EVPN and forwards network traffic using the backup route without requiring reprogramming the forwarding unit.
Abstract: In general, techniques enable an intermediate router to perform node protection for one or more other PE routers operably coupled to the intermediate router in active-active mode in an EVPN. The techniques may include configuring the intermediate router, which is positioned within an a service provider network between a remote provide edge router and at least two provider edge (PE) routers operating in active-active mode in an Ethernet Virtual Private Network (EVPN), to operate in a passive mode in which the intermediate router detects Ethernet Auto-Discovery (AD) routes without performing layer two (L2) address learning for the EVPN. The techniques may include installing a primary route to a protected router and a backup route from the intermediate router to a PE router other than the protected router, and in response to a link failure, forwarding network traffic using the backup route without requiring reprogramming the forwarding unit.

Proceedings ArticleDOI
28 Sep 2015
TL;DR: The non-fault-tolerant CHIPPER router architecture was extended to enable fault-tolerance and this architecture is based on deflection routing and utilizes a permutation network instead of a crossbar.
Abstract: Deflection routing is a promising approach for energy and hardware efficient NoCs. Future VLSI designs will have an increasing susceptibility to failures and breakdowns. The inherent redundancy of NoCs can be used to tolerate such failures. We extended the non-fault-tolerant CHIPPER router architecture to enable fault-tolerance. This architecture is based on deflection routing and utilizes a permutation network instead of a crossbar. The permutation network eliminates the sequential dependence of the priority based port allocation. Compared to a crossbar based design, a permutation network allows a faster and smaller router design. Simulations of an 8 × 8 network and more than 30.000 it injections show, that our router architecture is competitive with existing crossbar based fault-tolerant router architectures.

Patent
28 Jan 2015
TL;DR: In this paper, a method for configuring a router is described, which consists of providing router configuration information and sending the configuration information to the router over a cellular data network over cellular networks.
Abstract: A method for configuring a router is disclosed The method comprises providing router configuration information The router configuration information is sent to the router over a cellular data network

Patent
30 Oct 2015
TL;DR: A network visibility system provided according to an aspect of the present disclosure forms rules for routing of packets to an appropriate analytic server, based on IP addresses discovered while processing packets as mentioned in this paper.
Abstract: A network visibility system provided according to an aspect of the present disclosure forms rules for routing of packets to appropriate analytic server, based on IP addresses discovered while processing packets. Due to such discovery and forming of rules based on discovery, manual configuration of the network visibility system can be avoided. In an embodiment, the network visibility system comprises a packet router and a router controller. The router controller receives the examined packets from the packet router and configures the packet router with the formed rules.

Patent
Vijay Gopalakrishnan1, Angela L. Chiu, Oliver Spatscheck, Chengwei Wang, Yang Xu 
25 Feb 2015
TL;DR: In this article, a provider edge (PE) router system and a PE router system controller for hybrid virtualization of PE router functions is described, which includes an elastic computing system, a plurality of switches, and a port virtual machine.
Abstract: A provider edge (“PE”) router system and a PE router system controller for hybrid virtualization of PE router functions is disclosed herein. According to one aspect of the concepts and technologies disclosed herein, a PE router system operating at a PE of a network includes an elastic computing system and a plurality of switches. The elastic computing system can include a plurality of hardware resources and a plurality of virtual machines. Each virtual machine of the plurality of virtual machines can utilize at least a portion of the plurality of hardware resources to perform operations. The plurality of virtual machines can include a port virtual machine that provides an interface to a customer edge (“CE”) router operating at a CE of the network. The port virtual machine can provide a first set of operations. The plurality of switches can provide a second set of operations.

Journal ArticleDOI
TL;DR: The presented experiments show that architectures based on router aggregation can better exploit the available CPU cores to reach performance not far from the ones obtained by non-virtualised software routers.

Proceedings ArticleDOI
01 Sep 2015
TL;DR: This approach redesigns SA's fist stage arbiters to be priority based dynamic arbiters using round-robin algorithm, which can improve throughput by up to 13% for a router with eight virtual channels and has lower worst case latency.
Abstract: As industry moves towards many core chips, conventional bus and crossbar interconnections often struggle to meet the multi-core communication requirement. Network on Chip (NoC) has been proposed to replace global interconnections to alleviate this problem. In NoC, routers are used to exchange data between IPs. So the router performance directly impacts the efficiency of the entire system. The key components of a modern router include Route Computation (RC), Virtual-channel Allocation (VA), Switch Allocation (SA) and Switch Traversal (ST). In this paper, we present a new router architecture that significantly improves the throughput while keeping the area overhead low. In this approach, we redesign SA's fist stage arbiters to be priority based dynamic arbiters using round-robin algorithm. The modified unit can increase the possibility of SA's first stage arbiters to choose requests for different output ports. Hence, in the second stage of the SA, the competition for output ports will be reduced, leading more flits to travel through the crossbar in one cycle, resulting in increased throughput. Our results show that the new design can improve throughput by up to 13% for a router with eight virtual channels. Also, the new arbiter has lower worst case latency which can help the system to increase its operational frequency.

Proceedings ArticleDOI
15 Jun 2015
TL;DR: This paper proposed Software Defined Backpressure Mechanism (SD-BM) to alleviate the pressure of edge router and Refill and Software Defining Networking based RED (RS-RED) algorithm, which makes it possible to enlarge the network buffer logically and offloads traffic from busy egress router to free ingress devices.
Abstract: Increased network traffic has put great pressure on edge router. It tends to be more expensive and consumes more resources. Buffer is especially the most valuable resource in the router. Given the potential benefits of reducing buffer sizes, a lot of debate on buffer sizing has emerged in the past few years. The small buffer rule, for example, was challenged at edge router. Instead of buffer sizing, the goal of our work is to find out a way to relieve the pressure of edge router and logically enlarge its buffer size without incurring additional costs. In this paper, taking advantage of the global view of SDN, we proposed Software Defined Backpressure Mechanism (SD-BM) to alleviate the pressure of edge router. Particularly, we gave Refill and Software Defined Networking based RED (RS-RED) algorithm, which makes it possible to enlarge the network buffer logically and offloads traffic from busy egress router to free ingress devices. Simulation results show that it has comparable performance, both in time delay and loss rate, with edge router which has large buffer in traditional way. The results can have consequences for the design of edge router and the related network.

Patent
30 Oct 2015
TL;DR: In this article, a packet router and a router controller program respective forwarding rules in each of a set of load-sharing components of the packet router to forward communication packets according to the respective programmed packet-forwarding rules.
Abstract: A network visibility system includes a packet router and a router controller. The router controller programs respective forwarding rules in each of a set of load-sharing components of the packet router. Each load-sharing component in the set is designed to forward communication packets according to the respective programmed packet-forwarding rules. The router controller receives, from the packet router, information indicating an update to the availability status of components in the set of components. The router controller updates the respective forwarding rules to reflect the update to the availability status.

Patent
05 Nov 2015
TL;DR: In this paper, the authors present a method for optimizing data center routing in the event of virtual machine (VM) mobility, where the first gateway router detects EVPN messages advertised when a VM that has moved connects to a gateway router at a data center.
Abstract: Methods and apparatus for optimizing data center routing in the event of virtual machine (VM) mobility are provided. In one embodiment, a first gateway router, acting as an interface between an Ethernet Virtual Private Network (EVPN) domain and a Locator/ID Separation Protocol (LISP) domain, detects EVPN mobility messages advertised when a VM that has moved connects to a gateway router at a data center. The first gateway router then initiates a LISP mobility event that registers the new location of the moved VM to a LISP mapping system. In another embodiment, the first gateway router may notify a second gateway router, located at another data center from which the VM departed, to clean up the state maintained in that data center. This notification may be made via EVPN or LISP mechanisms. In response, the second gateway router may insert a new sequence into the other data center.

Journal ArticleDOI
TL;DR: This work proposes a router for network-on-chip called Bypass router that leads to create a single-cycle data path all the way from the source to the destination, compatible with all topologies and deterministic routing algorithm.
Abstract: The number of cores on the chip increases rapidly; therefore, scalability is the most important design choice. Mesh-based Networks-on-Chip (NoC) are the most widely used topologies as a scalable alternative for traditional shared bus in many-core chips today. As the NoCs diameter increases, the low-latency communication between cores is becoming more important to ensure sustained scalability, and higher performance. In the ideal network, the low-load network latency between a source and destination is almost equal to single cycle. In this work, we propose a router for network-on-chip called Bypass router that leads to create a single-cycle data path all the way from the source to the destination. We do not use any additional control links in the network; instead the proposed router is compatible with all topologies and deterministic routing algorithm. We also propose a new routing algorithm to use the advantages of our router design. The area consumption is also reduced on $$ 4\times 4, 8\times 8, 16\times 16 $$4×4,8×8,16×16 mesh topologies, compared to SMART network (Krishna et al. IEEE 19th international symposium on high performance computer architecture (HPCA2013), 2013). System simulations with Noxim simulators demonstrate at mean 60 % reduction in latencies across synthetic traffic patterns compared to a baseline router.

Journal ArticleDOI
TL;DR: The benefits of pacing in practical scenarios multiplexing both TCP and real-time traffic are demonstrated, highlighting that unlike host pacing that requires adoption by a critical mass of users, edge pacing can be deployed relatively easily under service provider control to facilitate rapid migration to core networks with small buffers.

Patent
01 Sep 2015
TL;DR: In this article, a method for state based forwarding using an embedded flag in the type length values (TLV) architecture of information centric network (ICN) interfaces is proposed.
Abstract: A method for state based forwarding using an embedded flag in the type length values (TLV) architecture of information centric network (ICN) interfaces, the method comprises storing, in static and dynamic fashions forward information for ICN router interfaces, the stored information is stored in a pending interest table (PIT) table associated with the ICN router interface Next, using, a flag within the stored information in the TLV architecture of the ICN router interface wherein the flag is associated with an interest capability of the ICN router interface Further, receiving, an interest associated with flag for forwarding at the ICN router interface, and checking, the received interest with the stored information in the PIT table of the ICN router interface for forwarding to a content source

Patent
12 Jun 2015
TL;DR: In this article, a system and a method for intelligently learning a list of allowed IP content at one or more internet connected devices by implementing an intelligent parental control means is provided.
Abstract: A system and a method for intelligently learning a list of allowed IP content at one or more internet connected devices by implementing an intelligent parental control means is provided. The means includes a router and a filter. The router monitors and records web based operations done at the internet connected devices during a learning mode to create a list of allowed IP content at the internet connected devices. The filter implements the list and accordingly allows and blocks the content. Further, a remote device communicating with the router via a central server remotely controls and configures the router and the filter. The remote device permits the router to approve or disapprove a blocked IP content, when the blocked content is accessed at the internet connected devices.

Proceedings ArticleDOI
17 Jun 2015
TL;DR: The architecture and a prototype implementation of a new edge router architecture following SDN and NFV principals called EdgePlex, a distributed system where the functions performed by a traditional edge router are decomposed and assigned to different elements in the system are described.
Abstract: The service provider edge is responsible for connecting customers using standard protocols such as IP and BGP to the service providers internal network while enforcing service specific policies and service guarantees. Today this function is performed by the Provider Edge Router (PE). The specialized nature of the PE, however, restricts operational flexibility and their monolithic design impacts reliability. In this paper, we propose a new edge router architecture following SDN and NFV principals called EdgePlex. EdgePlex is a distributed system where the functions performed by a traditional edge router are decomposed and assigned to different elements in the system. A key aspect of our design is the use of a sandboxed environment (through the use of virtual machines) per customer. This gives EdgePlex the ability to isolate customers from one-another and independently move customers within and across EdgePlex platforms. We describe the architecture and a prototype implementation of EdgePlex. We perform detailed experiments using this prototype and show that EdgePlex is able to saturate the server in terms of throughput while having acceptable latency and jitter overheads. Our results lead us to believe that the EdgePlex design not only addresses the limitations of existing routers, but is also viable and can meet performance demands of production networks.

Patent
19 May 2015
TL;DR: In this paper, the authors present a method for determining whether a first virtual router is configured to operate as a backup router for a second virtual router in a virtualized network by updating a routing table to indicate that the first VM should be used to route packets when the second VM cannot route packets.
Abstract: Various implementations disclosed herein include apparatuses, systems, and methods for providing virtual/virtualized network functions. In some implementations, a method includes determining that a first virtual router is configured to operate as a backup router for a second virtual router. The first virtual router and the second virtual router may reside within a public cloud. The method also includes determining, by the first virtual router, whether the second virtual router is able to route packets. The method further includes updating, by the first virtual router, a routing table to indicate that the first virtual router should be used to route packets when the second virtual router is unable to route packets.

Patent
28 Oct 2015
TL;DR: In this article, the authors describe a system for processing network packets at a network device, such as a customer premises equipment (CPE), which includes a plurality of physical network interfaces for receiving and transmitting network packets, and one or more processing entities.
Abstract: Systems, methods, apparatus and computer-readable medium are described for improving efficiency and robustness for processing network packets at a network device, such as a customer premises equipment (CPE). The network device may include a plurality of physical network interfaces for receiving and transmitting network packets, and one or more processing entities. The one or more processing entities may provide a first router for providing routing functionality, wherein the first router is not virtualized, enable a virtual machine to execute a second router for providing routing functionality and forward a network packet using the first router or the second router from the device. The one or more processors may be configured to execute instructions associated with the first router from user space.

Journal ArticleDOI
TL;DR: The joint MILP model provides a lower bound on the energy consumption, which shows to save more than 40% energy compared to the case without adaptive router card clock frequency, and the heuristic algorithm is efficient and performs close to the MILP models.
Abstract: With the explosive expansion of the information and communication technology (ICT) section, its energy saving has become an important issue and is receiving wide interest. In this study, we propose an adaptive clock frequency strategy for router cards to minimize the total energy consumption of an IP over WDM network. Rather than always running at full speed, the clock frequency of a router card is adaptively adjusted according to its actual-carried traffic demand. Given forecast traffic demand matrixes between different node pairs in different time slots, we develop a mixed integer linear programming (MILP) model to optimally choose the clock frequencies for each router card in different time slots such that the total energy consumption of the router cards is minimized. For lower computational complexity, the optimization model is also decomposed into two models, which correspond to the two subproblems of the optimization problem. The first subproblem minimizes the total number of router cards at each network node based on the peak-hour traffic, and the second subproblem optimally chooses the clock frequencies for each router card in different time slots. Due to the high-computational complexity of the MILP models, we also develop an efficient heuristic algorithm, in which two key steps that tackle the two subproblems are specifically developed. The joint MILP model provides a lower bound on the energy consumption, which shows to save more than 40% energy compared to the case without adaptive router card clock frequency. It is also found that the heuristic algorithm is efficient and performs close to the MILP models. In addition, the results also show that a router card supporting a small number of discrete clock frequencies can perform close to a card with continuously changed clock frequencies, and the benefit of adaptive clock frequency becomes weak with increasing router card power consumption overhead.

Journal ArticleDOI
TL;DR: This paper analyzes the nature of unresponsive routers and identifies different types of unresponsiveness, and utilizes a novel graph data indexing approach to build an efficient solution to the unresponsive router resolution problem.

Patent
Feilong Shen1, Fudong Shao1
16 Dec 2015
TL;DR: In this article, the authors present a network connection method, an application authentication server, a terminal and a router, which includes: acquiring a first application account corresponding to a terminal, determining, according to the first application accounts and the first router identification information, whether the terminal has permission to connect to a network through a router.
Abstract: The present disclosure relates to the field of network technologies and discloses a network connection method, an application authentication server, a terminal and a router. The method includes: acquiring a first application account corresponding to a terminal and first router identification information received by the terminal; determining, according to the first application account and the first router identification information, whether the terminal has permission to connect to a network through a router; and returning, to the terminal if the terminal has permission to connect to the network through the router, authentication information of connecting to the network through the router, so that the terminal connects to the network through the router according to the authentication information.