An Identifier-to-Locator Mapping Buffer Management Algorithm Based on Aimed Pushing and Pre-Fetching Method

Article Preview

Abstract:

This paper analyzed the features of a new network architecture whose locator and identifier are separated, in order to improve the query and replacement efficiency of the identifier mapping, the backup of the locator/identifier mapping information needs storing in the most necessary place, which is a problem of cache management in fact .In this paper the typical cache management algorithms are analyzed firstly, and then a new aimed pushing and pre-fetching strategy is proposed according to the bidirectional interactive character of the communication activity in querying the mapping relationship, thus divided the Access Switch Router(ASR) cachespace into three section: Waiting_First_Access_Section (WFA), Frequently_Used_se- ction(FU) and Session_Duration_Section (SDU). And based on the identity mapping information reuse probability predicted by the Markov model, an information lifetime-based adaptive cache management algorithm is proposed. The simulation result shows that the performance of the buffer management algorithm proposed by this paper is better than those of the existing cache management algorithms such as LFU, LRU and LFU-LRU

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 457-458)

Pages:

1317-1325

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M Ishiyama, M Kunishi, F Teraoka. An Analysis of Mobility Handling in LIN6[A]. In: International Symposium on Wireless Personal Multimedia Communication[C], (2001).

Google Scholar

[2] Eriksson J. PeerNet: Pushing peer-to-peer down the stack[A]. In: Proc. of the Int'l Workshop on Peer-To-Peer Systems 2003 (IPTPS 2003)[C], Berkeley, CA, USA, 2003: 268−277.

DOI: 10.1007/978-3-540-45172-3_25

Google Scholar

[3] Hongbin Luo, Yajuan Qin, et al. A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet[J], IEEE Transactions on Parallel and Distributed Systems, 2009, 20(12): 1790-1802.

DOI: 10.1109/tpds.2009.30

Google Scholar

[4] Zhang Jianwei. A Network Locality Aware Algorithm Based on Identity Mapping [A]. In: The 2nd International Conference on Signal Processing Systems (ICSPS 2010) [C], (2010).

DOI: 10.1109/icsps.2010.5555859

Google Scholar

[5] Zhang Hong-ke, Su Wei. Fundamental Research on the Architecture of New Network—Universal Network and Pervasive Services[J]. ACTA ELECTRONICA SINICA, 2007, 35(4): 593-598(in Chinese).

Google Scholar

[6] Dong Ping, Qin Ya-juan, Zhang Hong-ke. Research on Universal Network Supporting Pervasive Services[J]. ACTA ELECTRONICA SINICA, 2007, 35(4): 599-606(in Chinese).

Google Scholar

[7] Pind Dong, Hongchao Wang, et al. Evaluation of Scalable Routing Architecture Based on Locator/Identifier Separation[J], Globecom, (2009).

DOI: 10.1109/glocomw.2009.5360746

Google Scholar

[8] Ying Zhang, Houkuan Huang, et al. A hierarchical and Chord-based semantic service discovery system in the Universal Network[J], International Journal of Innovative Computing, Information and Control, 2009, 5(11): 3745-3753.

Google Scholar

[9] Balamash A, Krunz M. An overview of web caching replacement algorithms[J]. IEEE Communications Surveys and Tutorials, 2004, 6(2): 44-56.

DOI: 10.1109/comst.2004.5342239

Google Scholar

[10] Rizzo L, Vicisano L. Replacement Policies for a Proxy Cache [J]. IEEE/ACM Transactions on Networking, 2000, 8(2): 158-170.

DOI: 10.1109/90.842139

Google Scholar

[11] He Chen, Chen Zhaoxiong, Heyan H. Summary of web caching technology[J]. Mini-Micro Systems, 2004, 25(5): 836-842. (in Chinese).

Google Scholar

[12] Podlipnig S, Boszormenyi L. A survey of web cache replacement strategies[J]. ACM Computing Surveys, 2003, 35 (4): 374-398.

DOI: 10.1145/954339.954341

Google Scholar

[13] PENG Yan-Bing GONG Jian DING Wei XU Jia-Ling. Route Lookup in Fractal Active Subnet Prefix Space [J]. CHINESE JOURNAL OFCOMPUTERS, 2005, 28(8): 107-115 (in Chinese).

Google Scholar

[14] Kihong Park, Walter Willinger. Self-similar Network Traffic and Performance Evaluation[M]. Wiley-Inter science Publication, by John Wiley & Sons, Inc., 2000, 531~553.

Google Scholar

[15] Gabor Szabo, Bernardo A. Huberman. Predicting the popularity of online content [EB/OL]. http: /www. hpl. hp. com/research/idl/papers/predictions/predictions. pdf.

Google Scholar

[16] Carlos Cunha, Azer Bestavros, Mark Crovella. Characteristics of WWW client-based traces[R]. Technical Report TR-95-010, Boston University, CS Dept, Boston, MA 02215, April (1995).

Google Scholar

[17] Jianwei Zhang, Yunfei Guo. Identifier Mapping Buffer Management Based on Markov-Repeated-using -Probability Prediction[A]. In: The 6th International Conference on Wireless Communications, Networking and Mobile Computing ( WiCOM 2010) [C], 2010. 09.

DOI: 10.1109/wicom.2010.5600781

Google Scholar