scispace - formally typeset
Search or ask a question
Topic

Core router

About: Core router is a research topic. Over the lifetime, 2763 publications have been published within this topic receiving 59733 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new over the-cell channel router that uses greedy heuristics to make the over-the-cell connections and to define the nets needed to complete the connections inside the channel.
Abstract: Recent advances in VLSI technology have made the area over cells available for routing. In this paper we present a new over-the-cell channel router that uses greedy heuristics to make the over-the-cell connections and to define the nets needed to complete the connections inside the channel. The router tries to reduce the channel density by moving segments that cross maximum density columns to the over-the-cell areas. The layout model used allows only planar connections over each cell. The final stage is to use an existing channel router to route the connections inside the channel. An important characteristic of the new router is that there is interaction between the decisions made for the over-the-cell connections and the connections needed inside the channel. It performs significantly better than previous over the-cell routers.
Patent
26 Aug 2002
TL;DR: In this article, the authors propose forwarding packet data through the optimal path to the radio terminal unit after the movement in the handover control and achieves effective utilization of network resources and reduction of handover transactions.
Abstract: When a radio terminal unit 30 undergoes a handover between base stations 34, 36, a previous edge router 40 having been connected to the radio terminal unit 30, out of edge routers 40, 42 provided in respective base stations 34, 36, provides an instruction to instruct a relay router 48, under which the edge router 40 and every edge router 42 in the base station 36 as a candidate for a destination of the movement are connected, to buffer data from a correspondent node, and instructs the relay router to forward the data buffered in the relay router 48 according to the instruction, to the radio terminal unit 30 after the movement, after completion of the handover, whereby the buffered data is forwarded to the radio terminal unit 30. This implements forwarding packet data through the optimal path to the radio terminal unit after the movement in the handover control and achieves effective utilization of network resources and reduction of handover transactions.
Patent
10 Dec 1999
TL;DR: In this article, an access interface performs control operations on packet flows transmitted to the concentrating router as part of a contract between the subscriber and a manager of the shared network, authenticating that the packet has been subjected to the control operations.
Abstract: The invention concerns an access interface (16) performing control operations on packet flows transmitted to the concentrating router (12) as part of a contract between the subscriber and a manager of the shared network (10). After performing the control operations concerning a packet to be transmitted, the interface access transmits said packet to the concentrating router with a signature based on a secret shared with the concentrating router, authenticating that the packet has been subjected to the control operations.
Patent
06 Sep 2012
TL;DR: In this paper, an apparatus, system, and method to allow a user of a mobile device to access a social network through a router is described, based on authentication by the router.
Abstract: Disclosed are an apparatus, system, and method to allow a user of a mobile device to access a social network through a router. The mobile device may comprise a user interface and a processor. The processor may be used to: command transmitting a social profile associated with the mobile device to the router to bind the mobile device to the router and to command transmitting social network credentials requested by the router to the router to authenticate the mobile device to the router. Based upon authentication by the router, the mobile device may be permitted to access a social network in accordance with control rules set by the router.
Patent
Wassim Haddad1, Mats Näslund1
04 Sep 2014
TL;DR: In this article, the first access router utilizes a Prefix Reachability Detection (PRD) protocol to determine the first endpoint is topologically legitimate due to being topologically located behind the second access router.
Abstract: A method, arrangement, and first access router in a packet-switched communication network for determining that a first endpoint originating a communication session with a second endpoint is not initiating a malicious man-in-the-middle attack. The first access router provides access for the first endpoint to the network and a second access router provides access for the second endpoint. The first and second access routers facilitate conducting a secure key exchange between the first and second endpoints, wherein a shared secret key is generated. The first access router utilizes a Prefix Reachability Detection (PRD) protocol to determine the first endpoint is topologically legitimate due to being topologically located behind the first access router, and then sends a Prefix Request Test Initialization (PRTI) message to the second access router indicating the first endpoint is topologically legitimate.

Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
80% related
Server
79.5K papers, 1.4M citations
80% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202219
20213
202011
201915
201823