Academic literature on the topic 'Routers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Routers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Routers"
Saravanan, K., and R. Asokan. "An New Efficient Cluster Based Detection Mechanisms for Distributed Denial of Services (DDoS) Attacks." International Journal of Mathematics and Computers in Simulation 15 (November 27, 2021): 147–52. http://dx.doi.org/10.46300/9102.2021.15.27.
Full textBessos, Mai Ben Adar, and Amir Herzberg. "Intercepting a Stealthy Network." ACM Transactions on Sensor Networks 17, no. 2 (June 2021): 1–39. http://dx.doi.org/10.1145/3431223.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textFan, Jin Dou, Hao Wu, Jian Yuan Lu, and Bin Liu. "Reducing Read Overhead in CCN Routers via Aggregating Interest Packets." Applied Mechanics and Materials 380-384 (August 2013): 1973–76. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1973.
Full textPranaya, Valen Brata, and Theophilus Wellem. "Implementasi BGP dan Resource Public Key Infrastructure menggunakan BIRD untuk Keamanan Routing." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (December 30, 2021): 1161–70. http://dx.doi.org/10.29207/resti.v5i6.3631.
Full textLiu, Xinming. "The Standard of Wireless Network Technology and Its Application in Router." Highlights in Science, Engineering and Technology 27 (December 27, 2022): 465–69. http://dx.doi.org/10.54097/hset.v27i.3802.
Full textTang, Xian Tuo, Guang Fu Zeng, Feng Wang, Zuo Cheng Xing, and Chao Chao Feng. "Locality-Route Pre-Configuration Mechanism for Latency Optimization in NoCs." Applied Mechanics and Materials 571-572 (June 2014): 381–88. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.381.
Full textOda, Tetsuya. "A Delaunay Edges and Simulated Annealing-Based Integrated Approach for Mesh Router Placement Optimization in Wireless Mesh Networks." Sensors 23, no. 3 (January 17, 2023): 1050. http://dx.doi.org/10.3390/s23031050.
Full textLi, Teng, Jianfeng Ma, Yulong Shen, and Qingqi Pei. "Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning." Entropy 21, no. 8 (July 26, 2019): 734. http://dx.doi.org/10.3390/e21080734.
Full textPakhomova, V. M., and A. O. Opriatnyi. "Software Model for Determining the Optimal Routes in a Computer Network Based on the Two-Colonial Ant Algorithm." Science and Transport Progress. Bulletin of Dnipropetrovsk National University of Railway Transport, no. 3(93) (June 15, 2021): 38–49. http://dx.doi.org/10.15802/stp2021/242046.
Full textDissertations / Theses on the topic "Routers"
BANTAN, NOUMAN. "A ROUTING PROTOCOL AND ROUTING ALGORITHM FOR SPACE COMMUNICATION." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1172099125.
Full textMizrak, Alper Tugay. "Detecting malicious routers." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3274932.
Full textTitle from first page of PDF file (viewed October 10, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 13--140).
Szczepankiewicz, Peter J. Velazquez Luis E. "Authentication in SAAM routers." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380178.
Full textThesis advisor(s): Xie, Geoffrey; Buddenberg, Rex. "June 2000." Includes bibliographical references (p. 205-206). Also available in print.
Szczepankiewicz, Peter J., and Luis E. Velazquez. "Authentication in SAAM routers." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/9331.
Full textAuthentication is particularly important in the SAAM system because SAAM uses mobile codes, called resident agents. These resident agents are loaded onto SAAM routers dynamically, and execute on the destination SAAM router. Mobile code in the SAAM system requires an authentication scheme to prevent an outsider from sending a malicious resident agent. The primary focus of this research is to find the best-fit authentication scheme for the SAAM system. SAAM with authentication can be used as the technical network infrastructure to support Network Centric Warfare (NCW) as described in JV2OlO. The prototype in this thesis authenticates new nodes that join a SAAM network using Kerberos. Signaling data, called control traffic, is authenticated with a dynamic signature key that changes every two minutes. Once a SAAM node is authenticated, its identity is protected throughout the battle.
Sivaraman, Kaushalram Anirudh. "Designing fast and programmable routers." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113936.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 141-155).
Historically, the evolution of network routers was driven primarily by performance. Recently, owing to the need for better control over network operations and the constant demand for new features, programmability of routers has become as important as performance. However, today's fastest routers, which have 10-100 ports each running at a line rate of 10-100 Gbit/s, use fixed-function hardware, which cannot be modified after deployment. This dissertation describes three router hardware primitives and their corresponding software programming models that allow network operators to program specific classes of router functionality on such fast routers. First, we develop a system for programming stateful packet-processing algorithms such as algorithms for in-network congestion control, buffer management, and data-plane traffic engineering. The challenge here is the fact that these algorithms maintain and update state on the router. We develop a small but expressive instruction set for state manipulation on fast routers. We then expose this to the programmer through a high-level programming model and compiler. Second, we develop a system to program packet scheduling: the task of picking which packet to transmit next on a link. Our main contribution here is the finding that many packet scheduling algorithms can be programmed using one simple idea: a priority queue of packets in hardware coupled with a software program to assign each packet's priority in this queue. Third, we develop a system for programmable and scalable measurement of network statistics. Our goal is to allow programmers to flexibly define what they want to measure for each flow and scale to a large number of flows. We formalize a class of statistics that permit a scalable implementation and show that it includes many useful statistics (e.g., moving averages and counters). These systems show that it is possible to program several packet-processing functions at speeds approaching today's fastest routers. Based on these systems, we distill two lessons for designing fast and programmable routers in the future. First, specialized designs that program only specific classes of router functionality improve packet processing throughput by 10-100x relative to a general-purpose solution. Second, joint design of hardware and software provides us with more leverage relative to designing only one of them while keeping the other fixed.
by Anirudh Sivaraman Kaushalram.
Ph. D.
Becker, Matthew E. (Matthew Erin). "Fast arbitration in dilated routers." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39080.
Full textIncludes bibliographical references (p. 84-85).
by Matthew E. Becker.
M.Eng.
Gavgani, Yashar Ganjali. "Buffer sizing in internet routers /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textWang, Feng. "Building scalable next generation Internet routers /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20WANGF.
Full textEgi, Norbert. "Software virtual routers on commodity hardware architectures." Thesis, Lancaster University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539674.
Full textHe, Rongsen. "Indirect interconnection networks for high performance routers/switches." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/R_He_072307.pdf.
Full textBooks on the topic "Routers"
Swapan, Zakariya. Routers. Dhaka: Ananya, 2002.
Find full textBrenton, Chris. Mastering Cisco routers. San Francisco: Sybex, 2000.
Find full textInternational, Inc (Firm) Wave Technologies. Practical Cisco routers. St. Louis, MO: Wave Technologies International, 2000.
Find full textC, Marney-Petix V., ed. Switches, routers, gateways! 2nd ed. Fremont, CA: Numidia Press, 1998.
Find full textBridges, routers, gateways! Fremont, CA: Numidia Press, 1996.
Find full textAndrew, Hamilton, and Kessler Gary C, eds. Mastering Cisco routers. 2nd ed. San Francisco: Sybex, 2002.
Find full textservice), SpringerLink (Online, ed. Guide to Cisco Routers Configuration: Becoming a Router Geek. London: Springer London, 2012.
Find full textInterconnections: Bridges and routers. Reading, Mass: Addison-Wesley Pub. Co., 1992.
Find full textRosendahl, Robert R. The router. Winnipeg: Oak Park Enterprises, 1989.
Find full textSpielman, Patrick. The new router handbook. New York: Sterling, 1993.
Find full textBook chapters on the topic "Routers"
Buchanan, W. J. "Routers." In The Complete Handbook of the Internet, 653–72. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-306-48331-8_31.
Full textSong, Min. "Routers." In Handbook of Computer Networks, 364–74. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256053.ch23.
Full textBuchanan, W. J. "Routers." In The Handbook of Data Communications and Networks, 1141–60. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4020-7870-5_69.
Full textNelson, Brett. "Using Routers." In Getting to Know Vue.js, 235–59. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3781-6_12.
Full textUzayr, Sufyan bin. "React Routers." In Mastering React, 87–104. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003309369-5.
Full textAweya, James. "Rate Management Mechanisms in Switch/Routers." In Designing Switch/Routers, 305–25. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003311249-9.
Full textAweya, James. "Designing the Switch/Router." In Designing Switch/Routers, 159–235. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003311256-3.
Full textAweya, James. "Introducing Multilayer Switching and the Switch/Router." In Designing Switch/Routers, 13–32. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003311249-2.
Full textAweya, James. "OSI and TCP/IP Reference Models." In Designing Switch/Routers, 33–52. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003311249-3.
Full textAweya, James. "High-Performance Switch/Routers." In Designing Switch/Routers, 41–158. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003311256-2.
Full textConference papers on the topic "Routers"
Son, Hyojun, Hanjoon Kim, Hao Wang, Nam Sung Kim, and John Kim. "Ghost routers." In NOCS '19: International Symposium on Networks-on-Chip. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3313231.3352360.
Full textTekdas, Onur, and Volkan Isler. "Robotic routers." In 2008 IEEE International Conference on Robotics and Automation (ICRA). IEEE, 2008. http://dx.doi.org/10.1109/robot.2008.4543416.
Full textDecasper, Dan, Zubin Dittia, Guru Parulkar, and Bernhard Plattner. "Router plugins: a software architecture for next generation routers." In the ACM SIGCOMM '98 conference. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/285237.285285.
Full textWu, Qiang, Yong Liao, Tilman Wolf, and Lixin Gao. "Benchmarking BGP Routers." In 2007 IEEE 10th International Symposium on Workload Characterization. IEEE, 2007. http://dx.doi.org/10.1109/iiswc.2007.4362183.
Full textLiao, Haiguang, Qingyi Dong, Xuliang Dong, Wentai Zhang, Wangyang Zhang, Weiyi Qi, Elias Fallon, and Levent Burak Kara. "Attention Routing: Track-Assignment Detailed Routing Using Attention-Based Reinforcement Learning." In ASME 2020 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/detc2020-22219.
Full textCharland, Randy, Leonid Veytser, and Bow-Nan Cheng. "Integrating multiple radio-to-router interfaces to open source dynamic routers." In MILCOM 2012 - 2012 IEEE Military Communications Conference. IEEE, 2012. http://dx.doi.org/10.1109/milcom.2012.6415572.
Full textJiang, Xuezhi, Mingwei Xu, and Qi Li. "Compact Route Computation: Improving Parallel BGP Route Processing for Scalable Routers." In Distributed Processing, Workshops and Phd Forum (IPDPSW). IEEE, 2011. http://dx.doi.org/10.1109/ipdps.2011.302.
Full textArgyraki, Katerina, Sylvia Ratnasamy, Salman Baset, Byung-Gon Chun, Kevin Fall, Gianluca Iannaccone, Allan Knies, Eddie Kohler, Maziar Manesh, and Sergiu Nedevschi. "Can software routers scale?" In the ACM workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1397718.1397724.
Full textBolla, Raffaele, and Roberto Bruschi. "Pc-based software routers." In the ACM workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1397718.1397725.
Full textAnand, Ashok, Archit Gupta, Aditya Akella, Srinivasan Seshan, and Scott Shenker. "Packet caches on routers." In the ACM SIGCOMM 2008 conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1402958.1402984.
Full textReports on the topic "Routers"
Almquist, P., and F. Kastenholz. Towards Requirements for IP Routers. RFC Editor, November 1994. http://dx.doi.org/10.17487/rfc1716.
Full textSahni, Sartaj. Energy-Efficient High-Performance Routers. Fort Belvoir, VA: Defense Technical Information Center, February 2012. http://dx.doi.org/10.21236/ada555969.
Full textBaker, F., ed. Requirements for IP Version 4 Routers. RFC Editor, June 1995. http://dx.doi.org/10.17487/rfc1812.
Full textTowsley, Don. Study of Buffer Size in Internet Routers. Fort Belvoir, VA: Defense Technical Information Center, August 2006. http://dx.doi.org/10.21236/ada457457.
Full textGilligan, R., and E. Nordmark. Transition Mechanisms for IPv6 Hosts and Routers. RFC Editor, April 1996. http://dx.doi.org/10.17487/rfc1933.
Full textGilligan, R., and E. Nordmark. Transition Mechanisms for IPv6 Hosts and Routers. RFC Editor, August 2000. http://dx.doi.org/10.17487/rfc2893.
Full textHuitema, C. An Anycast Prefix for 6to4 Relay Routers. RFC Editor, June 2001. http://dx.doi.org/10.17487/rfc3068.
Full textHagino, J., and H. Snyder. IPv6 Multihoming Support at Site Exit Routers. RFC Editor, October 2001. http://dx.doi.org/10.17487/rfc3178.
Full textBernet, Y., S. Blake, D. Grossman, and A. Smith. An Informal Management Model for Diffserv Routers. RFC Editor, May 2002. http://dx.doi.org/10.17487/rfc3290.
Full textZinin, A., A. Lindem, and D. Yeung. Alternative Implementations of OSPF Area Border Routers. RFC Editor, April 2003. http://dx.doi.org/10.17487/rfc3509.
Full text