• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    LPR-Trie:A Fast IPv6 Routing Lookup Algorithm with Virtual Nodes

    2022-10-27 04:41:46WenlongChenDiyaLiuJiachengWangXiaolanTang
    China Communications 2022年10期

    Wenlong Chen,Diya Liu,Jiacheng Wang,Xiaolan Tang

    The College of Information Engineering,Capital Normal University,Beijing 100048,China

    *The corresponding author,email:tangxl@cnu.edu.cn

    Abstract:The number of IPv6 routes in todays backbone routers has grown rapidly,which has put tremendous pressure on route lookup and storage.Based on the analysis of IPv6 address prefx length and distribution characteristics,this paper proposes an IPv6 route lookup architecture called LPR-Trie.The core idea of the algorithm is to utilize more spaces and accelerate routing lookup.Moreover,we put forward the concept of virtual nodes,and leverage the link between virtual nodes and ordinary nodes to accelerate routing lookup.We provide the longest prefx routing entry(LPR)calculation algorithm to achieve the longest prefx match.The experimental results show that the virtual node mechanism increases the search speed up to 244%,and the virtual nodes have better stability by setting an appropriate keep-alive time according to the characteristics of actual traffc.This paper shows that our design improves the routing lookup speed and have better memory utilization.

    Keywords:IPv6;route lookup;longest prefx match;virtual node;Trie

    I.INTRODUCTION

    WITH the continuous growth of the network scale,IPv4 protocol no longer meets the requirement of the Internet.Therefore,IPv6 emerged as the next generation IP protocol.Routing lookup is the process of searching the forwarding table for the destination address according to the longest prefx matching principle and selecting the path.The 128-bit IPv6 address format inevitably results in a very large routing table in the router.High-performance routing lookup algorithms have become the key to improving the router’s forwarding speed.

    The routing table search algorithm is mainly evaluated by storage overhead and search speed[1].For the routing table with frequent update,the update performance is also required.As the network throughput increases,the routing table expands exponentially.This trend poses challenges to current routers by requiring higher throughput and larger routing tables.

    Most current routing lookup algorithms are designed for IPv4 and cannot be directly applied to IPv6.The algorithms proposed in some related studies can be extended to IPv6,but no exhaustive research has been done.Therefore,we propose the LPR-Trie structure and corresponding search algorithm in accordance with the characteristics of IPv6 addresses and backbone network routing tables.By analyzing the number of routes for each prefx length,we store 64-bit prefx addresses in three layers which achieves high memory utilization.Compared to existing multi-bit Trie trees,we introduce the concept of virtual nodes.The virtual node,as a kind of temporary node,is created when relevant real-time packets come and is destroyed when its keep-alive time expires.Once the IP address matches a virtual node,the LPR algorithm is used to quickly match the corresponding longest prefx routing entries.Compared with ordinary nodes,the number of virtual nodes is small,and has little effect on the overall memory space consumption.

    The contributions of our method are summarized as follows.

    ·We propose an IPv6 route lookup architecture called LPR-Trie and the corresponding lookup algorithm based on the characteristics of IPv6 addresses,which accelerate routing lookup with better memory utilization than existing studies.

    ·In LPR,a virtual node is created when an IP address cannot match the ordinary nodes,in order to increase the search speed for corresponding IP addresses.Meanwhile,the dynamic creation and deletion of virtual nodes improves the memory utilization.

    ·We compare our proposed method LPR with TSB[2]by using the current routing table from bgp.potaroo.net.Experimental results show that our search speed is 3.49 times that of TSB,and the memory size occupied by TSB is about 1.5 times that of LPR.

    The rest of this article is organized as follows:we present existing methods for IPv6 route lookup in Section II.An overview of the architecture,LPR algorithm and lookup procedure are provided in Section III.In Section IV we introduce the routing update.The experiments and performance analysis are discussed in Section V.Finally,we summarize our work in Section VI.

    II.RELATED WORK

    In general,there are three kinds of algorithms for IP routing lookup:Trie-based,hash-based,and hardware-based methods.Each method has its own advantages and disadvantages.

    Trie uses a tree-based data structure that determines the branch of the tree by the value of each bit in the prefx.In the Trie tree,the path from the root node to the node of the n-th layer represents the value of the frst n bits in the string.The traditional Trie tree has a large storage overhead and requires a large amount of memory access operations as the search depth increases.

    Multi-branch Trie tree looks up multiple bits at each step,which effectively reduces the number of accesses.In[2],TSB is a three-stage algorithm for IPv6 routing table lookup that uses three data structures:tree,segment table,and route bucket.The frst stage is the root node 2001.The second stage is a segment table or another node linked to the node 2001.The segment table stores the value of 17-32 bits of the destination IPv6 address.The third stage is the routing bucket linked to the segment table or 8 child nodes of node 2001.In[3],the multi-branch Trie tree is combined with the Hash table to divide the IPv6 address space into fve levels:1-32 bits,1-16 bits,33-48 bits,49-64 bits,65-128 bits.The prefx information is stored in 5 hash tables and 3 multi-bit trees.The algorithm starts from frst 32 bits.Hash tables are used in[4]to store address prefx information starting with 0x20,0x24,0x26,0x28,0x2A.At the same time,the 6-5-4 Trie tree is used to store the address prefxes of the three intervals of 33-38,39-43,and 43-47.

    For a multi-bit Trie tree,each step of the search process checks multiple bits,so it does not support an address prefx of any length.We need to use the prefx expansion method to convert the address prefx,which will increase the redundancy of the information.For the search method that uses the hash algorithm,we have to face the two problems of the choice of the hash function and the handling of hash conficts.When there are many prefxes in the forwarding table,it is diffcult to fnd a collision-free hash function.This article has carefully studied the characteristics of IPv6 address structure and routing table,and we propose an IPv6 route lookup architecture called LPR-Trie,which combines the Trie tree and the array.Because the array address space is continuous,the corresponding node can be located with one search,which improves routing lookup speed.

    Degermark et al.[5]proposed the Lulea algorithm that is a bitmap compression of the Trie tree structure.The 32-layer IPv4 tree structure is divided into 3 layers according to the cutting method of(16-8-8).By cutting,the entire tree is organized into many tree branches.The Lulea algorithm frst uses leaf push to save the node information in the leaf nodes,and then constructs the corresponding bitmap by traversing all the leaf nodes.This algorithm uses a multi-level index table generated offine to achieve fast lookup.Although this algorithm reduces the storage overhead of the data structure,it causes update diffculties,and complex and ineffcient update operations also affects the search performance to a certain extent.Liu et al.[6]proposed a software routing lookup algorithm based on overlapping bitmap compression,which constructs an overlapping bitmap structure through hierarchical traversal,and puts the port information of the tree structure onto a linear forwarding port array(FPA).Instead of using leaf push technology,the hierarchical traversal of the tree is used to ensure the longest prefx match.The array of forwarding ports is divided into groups of equal length,and independent group structures are established for each group.Based on bitmap segmentation,two optimization algorithms,conditional optimization and general optimization,are proposed to further improve the update speed.

    Hardware-based algorithms mainly use SRAM and FPGA chips to complete route lookup.Peng et al.[7]uses extended segment tables and extended offset tables to accommodate changes in memory capacity across different SRAM and FPGA chips.The algorithm divides the same prefx of the frst l bit into the same segment,and expands the prefx of less than 1 bit.The next hop address of the segment is then stored in the corresponding segment table or offset table.Hardware is relatively expensive and often requires multiple external memory chips.Due to the limitations of the hardware itself,the update performance and scalability are not very satisfying.

    Virtual routers are also a promising way to lookup IP to provide network services.Each virtual router has a local forwarding information base(FIB).When multiple virtual routers run IP forwarding at the same time,a large amount of memory is needed to store multiple FIBs,which places higher requirements on the cache of general-purpose processors.Considering the commonality of IP prefxes between each FIB,Fu et al.[8]use the prefx conversion method to convert the network prefxes in all FIBs into the same prefx set.With the help of prefx conversion,the memory usage is reduced.Existing software routers often store IPv6 routes through binary trees or Hash linked lists,but when the number of IPv6 routing items increases to several k or tens of k,the storage space required is very large,and the search speed will also be signifcantly reduced.The work of this paper can better solve the above-mentioned problems.

    III.LPR-TRIE ARCHITECTURE AND VIRTUAL NODE

    Based on the analysis of characteristics of IPv6 prefx length and distribution,this paper proposes a routing lookup algorithm.It leverages LPR-Trie structure to reduce the number of memory accesses and achieve the lookup with the virtual nodes.In order to support rapid update,we develop the optimization methods.

    3.1 LPR-Trie Architecture

    We divide the frst 64 bits of the IP prefx into four tiers evenly:Root Tier(1-16 bits),Tier 1(17-32 bits),Tier 2(33-48 bits)and Tier 3(49-64 bits).Root tier stores the frst 16 bits in an array and other tiers are organized in an array or linked list.In Figure 1,the circles represent nodes.We use different colors to distinguish which layer the nodes belong to,and use solid lines and dashed lines to distinguish the types of nodes.Red circle represents the node in R array,green circles represent nodes in T1 array,and blue circles represent nodes in T2 array.Solid circles indicate ordinary nodes,and dotted circles mean virtual nodes.Because the whole structure are four layers and there is a link relationship between each layer,so we call the elements in the array“nodes”.

    Root Tier:Root Tier is organized as an array:R array.The structure of R array elements is divided into three types:root node,list header and NULL.The size of the array element is 16 bits and the length is 216.In the current routing table,there are 52 kinds of values in the frst 16 bits of the destination address.Although the structure of the array requires 216spaces,each search for the frst 16 bits of the destination address requires only one memory operation.

    When the number of routing prefxes starting with the element value is greater than a certain thresholdk,the element type is the root node.When the number is less than or equal tok,the element type is the list header.When there is no route starting with the element value,the element type is NULL.In this paper,we setkto 3.

    The array element contains two kinds of pointers.One is the structure pointerPS,which points to the next level of array or linked list.The other is the prefx pointerPlen,which points to the prefx length table.The prefx length table is a table composed of all the lengths of the prefx that starts with the element value in the routing table at this level.

    Tier 1:The second tier is organized in an array or linked list according to the element type of the R array

    ·If the element type of the R array is the root node,then Tier 1 is organized as T1 array that stores the 17-32 bits of the IP address.T1 array has the same size as the R array and elements in T1 array contain 2 types of information:fag and pointer.If the node value exists in the value of bits 17-32 in the routing table entry,the fag is set to beordinary,otherwise the fag is set to bevirtual.The pointer of the virtual node is calculated by LPR and points to an ordinary node.For the defnition and discussion of LPR calculation,see the introduction in section 3.2 below.

    Figure 1.LPR-Trie structure.

    The ordinary node contains two types of pointers:structure pointer and prefx pointer are the same as the pointer types in the R array,and virtual node does not have these two pointers,but an pointerPLPRto an ordinary node in the same layer through LPR calculation.

    ·If the element type of the R array is the list header,then Tier 1 is a linked list which stores the 17-64 bits of the IP address.For example,there are 3 routing entries whose frst 16 bits are“1234”,so the type of the element“1234”in R array is the list header and T1 tier stores the 3 entries in a list.

    ·The element type is NULL:When searching,it returns the next hop information of the default route.

    Tier 2 and Tier 3:The third layer has a similar structure to the second layer.According to statistics,the prefx length of the routing table is mostly concentrated in 33-48.Therefore,the fourth layer is mainly lists linked with T2 array.When there are only a few routing entries in the lists,linear search generally meets the requirements.

    The routing prefx is distributed in different array layers in steps of 16 bits:the R array is concerned with frst 16 bits of the routing prefx,and the T1 array is related to 17-32 bits.The T2 array represents the 33-48 bits.The 49-64 bits are placed in the list linked by the T2 array.

    T1 array stores routes with same value of IP prefx(SV-RT)in the form of a pointer structure.The SVRTs stored in the T1-ND are routing entries with the frst 32 bits being a specifc value and the mask length from 17 to 32.SV(ND,len)is used to describe the node and prefxes linked to it where len=prefx length-TierNum*16.In Figure 1,node C has two SV-RTs,which are:2001:1240::/28 and 2001:1240::/24.They are represented as SV(C,12)and SV(C,8).

    T2 array stores two kinds of routes.The frst type is SV-RT,which prefx length is between 33 and 48.The SV-RTs stored in node G in Figure 1 are:2001:1240:5800::/48,2001:1240:5800::/45 and 2001:1240:5800::/37.The second type is extending route(EX-RT).The frst 48 bits of these routes are the same and the mask length is greater than 48.The EX-RTs stored in the node G are:

    2001:1240:5800::/62,2001:1240:5800::/56,

    2001:1240:5800:1200::/56,

    2001:1240:5800:3400::/56,

    2001:1240:5800:5678::/64.

    EX-RT are described in forms of EX(ND,len,value)where value is thevalueof 49-6bits.For example,for 2001:1240:5800:3400:/56,it matches node G,len=56-3*16=8 andvalue=0x3400.Therefore it is represented as EX(G,8,0X3400).

    Note that SV-RT may exist in both T1 and T2 array,and EX-RT only appears in T2 array.Moreover,the prefx length of the Internet route is always greater than 16,so the R-ND does not store the route.If a route whose mask length is shorter than 16 appears in the future,it is supposed to be stored at R array in a similar way to the SV-RT in T1 array.

    Virtual nodeOnly when the node contains at least 1 SV-RT or 1 EX-RT routing entry,the fag is set to be ordinary.Otherwise,the fag is set to be virtual.The virtual node itself does not contain routing,nor does it have descendant nodes.It is constructed for fast routing matching during message forwarding.Virtual node points to an ordinary node in the same tier by LPR algorithm to fnd the longest prefx matching entry,and see the subsequent LPR algorithm in details.

    3.2 Routing Lookup and LPR Calculation

    The output of route lookup algorithm is a routing entry stored in nodeM,which matches the destination IP address and has the longest prefx,denoted byLPR.

    When a packet reaches a router,the forwarding engine searches for the routing entry in the routing tree based on the destination IP address(Dest)of the packet.

    S1.According to the frst 16 bits of Dest,we search the R array.If the search fails,we return to the default route and the search ends.If the R array element structure type is the root node,continue to fnd the next layer according to the pointer type.If it is a linked list,directly search the linked list and return the result.

    S2.According to the 17-32 bits,we search the T1 array.If the nodeMis marked as virtual,it directly returns LPR(M),and the search ends.If the element fag is ordinary,record max prefx value,and continue to fnd the next level of array according to thePS.

    S3.Find the T2 array based on the 33-48 bits of the destination address.In the T2 array,if the fag is virtual,the LPR of the element is directly returned,and the search ends.If the element fag is ordinary,it means that the element contains at least one SV-RT or EX-RT.According to thePS,search for SV-RT or EX-RT.If both SV-RT and EX-RT are available,check EX-RT frst.If the match fails,then check SV-RT.If the search still fails,the LPR of the element is returned.

    For the virtual node and the ordinary node without SV-RT,it needs to obtain the corresponding LPR and store the link relationship when constructing the LPRTrie.Moreover,the link relationship is also an important part of the maintenance of the routing tree.We give the details as following:

    Algorithm 1Replace-1 describes the replacement of the last“1”(binary bit)with“0”.Details are illustrated in Algorithm 1.For a given binaryM=0x1234,this algorithm transforms it to 0x1230;ifM=0x0018,it is transformed to 0x0010.

    Algorithm 2LPR calculation algorithm calculates the routing entry with the longest prefx that matches the destination IP address.For a nodeM,the algorithm continuously performs Replace-1 operations onMuntil it matches the same layer nodes which fag is ordinary,and then chooses a SV-RT satisfying the longest prefx matching(LPM)condition.If the LPR is not found in the sibling nodes,the node M points to the same LPR as its parent.Obviously,if the LPR of the parent node is NULL,the LPR corresponding to the nodeMis also NULL.

    In the search process,the LPR of the ordinary element or the LPR of the virtual element may be returned.Specifc examples are given separately below:

    Suppose the destination address is 2001:1240:5840:3400::0001.We frst fnd node I that stores the route whose frst 48 bits are 2001:1240:5840 and the minimum prefx length is 48.As node I only has no SV-RT and only one EX-RT:EX(I,8,0x1200),and the destination IP cannot match this EX-RT,it needs to return LPR(I).Take out the second-level array element value 0x5840,and get 0x5800 according to the Replace-1 operation of Algorithm 1,matching to node G=0x5800.G stores three SV-RTs of length 16,13,5,because it is the 10th bit of 0x5840 is replaced from 1 to 0,according to the longest prefx match,the routing prefx length of the third layer should be less than 10,and then SV(G,5)is obtained.

    For node H=0x5806,the frst Replace-1 operation replaces the 15th bit from 1 to 0 and returns t=0x5804,whereas no corresponding node is found in the same layer.The next Replace-1 operation replaces the 14th bit from 1 to 0 and returnst2=0x5800,which matches node G.There are three SVRTs stored in G are 16,13 and 5.We choose the longest prefx route smaller than 14,that is,LPR(H)=SV(G,13).J=0x5860.The frst Replace-1 operation returns 0x5840,then the node I is matched in the same layer node,but there is no SV-RT in the node I,so the LPR of I should be returned,LPR(I)=SV(G,5).

    3.3 Architecture Optimization

    For a nodeMin then-th array,the routing entries whose frst 16*nbits are the same with M and the parent node of M and the mask length exceeds 16*nare called the government routing entry(GR-RT).GR-RT of nodes in R array or T1 array are the routing entry stored in all its child nodes,excluding the SV-RT.GRRT of nodes in T2 array are its EX-RTs.In Figure 1,the GR-RTs of node C are 11 routes stored in nodes F,G,and I.

    Table 1.Number of T1 nodes with different KGR.

    Table 2.Number of T2 nodes with different KEX.

    The real routing table we downloaded from bgp.potaroo.net contains more than 70,000 routes.According to the data structure of this article,a root node represents the frst 16 bits of a routing prefx,and there are totally 52 root nodes.We counted and sorted the number of routes under each root node,that is,the number of routes beginning with different frst 16 bits.Then,for clear presentation and simple analysis,we selected the 7 root nodes with the largest numbers of routes to analyze the characteristics of routing entries.

    Table 1 lists the number of T1 nodes for different GR-RT numbers under each root node.T1 nodes stores GR-RTs in a linked list where the number of routes does not exceeds the thresholdKGR.On the one hand,a large threshold causes a large number of memory accesses when traversing the linked list.On the other hand,excessive pointers to T2 array consume memory spaces signifcantly.As Table 1 shows,withKGR=3,only 18.99% of the T1 nodes point to the node array of 216.In other words,81.01% of the T1 nodes have no more than 3 routes in average.Table 2 describes the number of T2 nodes for different EX-RT numbers under each root node.Similarly,T2 nodes stores EX-RTs in a linked list where the number of routes is smaller than the thresholdKEX.In our LPR-Trie structure,when the number of EX-RT exceedsKEX,the T2 node points to the next array of nodes.Table II shows that an average of 16.41%of the T2 nodes are linked to a layer of node arrays.Properly setting thresholdsKEXandKEXcan achieve a balance between storage consumption and lookup effciency.

    3.4 Security Considerations for Virtual Node Mechanism

    With the concept of virtual node,the router becomes prone to a malicious DoS attack.To avoid the explosion of virtual nodes consuming enormous storage resources,we have the following considerations:

    1.To reduce the attack hazard,we make use of the suppression mechanism.Many existing network processing mechanisms use a suppression mechanism to generate a limited number of control entries,such as the interface-MAC entry of the switch.Suppression is refected in two aspects:1)limit the number of virtual nodes generated per unit time;2)limit the total number of virtual nodes in the router system.These two values are determined jointly by various factors such as the hardware performance of the route system and the network environment.

    2.The deployment of the real source address mechanism makes it easy to trace and block malicious nodes.The multi-level real source address mechanism studied by Tsinghua University has been widely deployed in Chinese universities and national institutions.Therefore,it is relatively easy for the network administrator to trace back.

    3.The IPv6 routing lookup in this paper is designed for software routers and mainly deployed at the edge.The traffc entering the local area network from the external network does not generate the virtual nodes,while the traffc from the local area network to the external network does.Once a malicious behavior is discovered,it must be from the device of the subnet,hence it is easy to locate the attack point.

    In addition,the above-mentioned suppression measures for virtual nodes help to detect network malicious behaviors early,block their spread,and provide certain support for the security of the whole network.

    IV.ROUTING UPDATE

    When the routing table is initialized,all possible areas are constructed according to the routing statistics.Let the route to be processed be described asrt:(prefix,masklen)whereprefixis the destination IP prefx and themasklenis the mask length.The route insertion process is as follows:

    S1.If the routing entry is added as the default route,it is pointed to by the default route.It does not belong to any area and the LPR of all R nodes are updated.

    S2.According to the 1-16 bits of theprefix,determine the routing storage area where it is located,and obtain R nodes.

    S3.Take the value of 17-32 bits in the prefx asP1,and locate the child node according toP1.If there is no such node,change the type of this node from NULL to ordinary.

    S4.If 16

    S5.Take the value of 33-48 bits in the prefx asP2,and locate the child node of T1-ND according toP2.If there is no such node,change the type of this node from NULL to ordinary.

    S6.If 32

    S7.If 48

    The route deletion process is similar to the route addition process.The routing area and the tree node are mainly located according toprefixandmasklen.After deleting a route,if the tree node or the subtree rooted at it is empty,delete the corresponding empty node and empty subtrie.Due to the addition or deletion of routes,LPR of some nodes may change and the consistency of the LPR shall be maintained according to Algorithm 2.

    V.PERFORMANCE EVALUATION

    For evaluation,we downloaded the current routing table from bgp.potaroo.net and implemented the algorithm on the Linux platform.In order to adapt to the application environment of the edge router,the sizes of the selected routing tables TABLE-A and TABLE-B are 5k and 6k,respectively.The CPU confguration of the experiment is the Intel Core i7TM 6700 processor,and the software compilation environment is Visual C++2015.

    Figure 2 shows that the distribution of routing items is characteristic.The routing items with a prefx length of 32 account for 17%,and the routing items with a length of 48 account for the most,accounting for 48%,and the prefx distribution is mainly concentrated in 32-48.According to this feature,we search in steps of 16 bits.

    Figure 2.Prefix length distribution.

    Figure 3.Number of routes per layer in each area.

    Figure 3 further analyzes the number of routes with prefx lengths of 17-32,33-48,and 49-64 in each area.17-32 routes are stored in the T1 array in the form of SV-RT,33-48 routes are stored under the T2 array in the form of SV-RT,and routes longer than 48 are stored in the form of EX-RT.

    5.1 Lookup Speed and Timing Analysis

    Figure 4.The percent of lookup times for real time traffic on TABLE-A and TABLE-B.

    We implement the LPR scheme described in Section III and compare it with TSB[2].TSB has three-stage for IPv6 routing table lookup.In the frst stage,2001 was used as the root node.Because the algorithm was proposed in the year of 2006,the frst 16 bits of the IPv6 addresses of traffc on the IPv6 network at that time only had 9 values,and most started with 2001.Part of the traffc can be matched in one search on the binary tree.The second stage uses two different data structures.Node 2001 links segment table,while the other 8 nodes link routing buckets.The segment table is composed of 17-32 bits of the routing prefx,and the length is 16 bits.The third stage is the routing bucket linked to the segment table.It is a collection of routing table entries.According to the number of routing table entries in the routing bucket,the routing buckets can be organized in different ways.

    In Figure 4,the number of memory accesses are shown.For most routes,the longest prefx route can be matched by three searches,and the search process is R array→T1 array→SV-RT of T1,and the result is returned directly in SV-RT of T1.In particular,since the virtual node is being constructed,a pointer to the ordinary node of the same array has been established.When the virtual node is matched,the corresponding node can be found directly through the pointer,which reduces the number of searches.

    Table 1 depicts lookup speed and memory requirements of LPR and TSB.The average numbers of searches of the LPR and TSB for TABLE-A are 3.54 and 6.81,respectively.For TSB,in the year of 2006,most routing prefxes start with 2001,and there are very few routing prefxes that start with other values,so that most of the traffc only needs to be matched once on the binary tree.Now,there are 52 values in the frst 16 bits.The routes beginning with 2001 arestill the most,but only account for 14%.Therefore,only using 2001 as the root node is not suitable for current traffc characteristics.Due to the fast growth of the routing table,the number of segment tables and the size of the routing bucket in TSB have increased signifcantly.In LPR,we store the frst 16-bit value in the R array,whose memory consumption is fxed,and the corresponding root node can be located in only one search because of the characteristic of the structure of array.

    Table 3.Lookup speed and memory requirements of LPR and TSB.

    The worst case of the LPR algorithm requires 8 searches,namely R array→T1 array→T2 array→EX-RT of T2→T2 array.When the destination address matches the EX-RT list of T2 array once,the routes are searched one by one,however the search fails,and T2 array are searched once again,returning the LPR under the node at the same layer.But only about 4.72%of the traffc needs to be searched 8 times.

    In terms of memory consumption,although we use a three-level array structure,in fact most of the routes are stored in the form of SV-RT under the T1 array,and the T2 array is not developed.When the number of routes exceeds a lot,the linear search will greatly reduce the search speed.Therefore,we set the thresholdKGR,andKEX.Table 3 shows the size of memory consumption withKGR=3 andKEX=3.

    5.2 Keep-Alive Time

    For the different keep-alive time of virtual nodes,the number of visits and the destruction and reconstruction times of the virtual nodes in the keep-alive time are different.The experimental results show that when the input actual fow duration is 24h,the keep-alive timeτis set to 0,1h,2h and 3h,respectively.When the keep-alive time is set to a small value,the storage overhead of the virtual node is small,but it needs to be destroyed and re-established multiple times.Due to the local characteristics of traffc,as the keep-alive time increases,the number of new virtual nodes decreases signifcantly.The update of the virtual node is stable,and it occupies less memory.But overall,the virtual node has less impact on memory overhead.

    Figure 5.The change of the number of virtual nodes with time.

    Figure 6.The change of refresh times with different τ.

    Table 4.Num of V-ND with different τ.

    Table 5.Repeat times with different τ.

    Figure 7.The lookup time with different keep-alive times of V-ND.

    Figure 5 shows the number of virtual nodes that changes over time.For the same routing table,the number of virtual nodes is relatively stable as time goes on.Table 4 lists the average numbers of virtual nodes established in our structure with three keepalive times.The number of times the virtual node is refreshed indicates the number of times the virtual node is repeatedly accessed during the keep-alive time.Table 5 is the average refresh times,and the change of refresh times with differentτis shown in Figure 6.From Figure 6,we learn that only a few virtual nodes refresh frequently.

    Figure 7 illustrates that during the real destination queries for 3 hours,as we prolong the keep-alive time,the lookup decrease continuously.Moreover,we hope that the addition and deletion of virtual nodes is not too frequent.The update time of each virtual node has a great infuence on the overall search time,so a longer keep-alive time is required.According to the performance of hardware devices,the locality of traffc and peoples access habits,we recommend setting the keep-alive time to two days as a reference.In Figure 8,the numbers of reconstructions of each virtual node vary according to differentτ.A largerτresults in a less create times for one virtual node.

    VI.CONCLUSION

    Figure 8.The effect of different keep-alive times on the number of virtual node reconstructions.

    In this paper we propose a LPR-Trie extended from multi-bit Trie,and corresponding routing lookup algorithm.Combining the characteristics of the IPv6 address and the backbone network routing tables,the LPR algorithm is very effcient for IPv6 routing tables whose most prefx lengths distribute in/48.This algorithm calculates the pointer of the virtual node,which points to the longest prefx matching routing entry to achieve fast routing matching.The use of virtual node signifcantly reduces the number of memory accesses and improves the search speed.Experimental results show that our search speed is 3.49 times that of TSB.Our average number of searches is 3.41,while TSB needs 6.81 searches on average.And the memory size occupied by TSB is about 1.5 times that of LPR.In addition,due to the locality of actual traffc,a reasonable setting of the keep-alive time of the virtual node makes the data structure more stable and have less impact on memory consumption.Experimental results show that the algorithm has better storage and search performance,and it has good scalability.

    ACKNOWLEDGMENT

    We gratefully acknowledge the support from the National Natural Science Foundation of China(61872252),National Key Research and Development Program of China(2018YFB1800403),the Beijing Natural Science Foundation(4202012)and the Science and Technology Project of Beijing Municipal Commission of Education in China(KM201810028017).

    久久av网站| 国产成人91sexporn| av网站在线播放免费| 啦啦啦视频在线资源免费观看| 国产精品免费视频内射| 亚洲国产看品久久| 纵有疾风起免费观看全集完整版| 一级片'在线观看视频| 天天躁日日躁夜夜躁夜夜| 国产精品蜜桃在线观看| 人妻一区二区av| 成人毛片60女人毛片免费| 日韩一卡2卡3卡4卡2021年| 久久久久人妻精品一区果冻| 欧美成人午夜精品| 1024香蕉在线观看| 老鸭窝网址在线观看| 精品久久蜜臀av无| 中文乱码字字幕精品一区二区三区| 久久精品国产a三级三级三级| 18禁国产床啪视频网站| 免费高清在线观看视频在线观看| 9色porny在线观看| 国产一级毛片在线| 中文字幕人妻丝袜一区二区 | 日韩av不卡免费在线播放| 爱豆传媒免费全集在线观看| 老司机影院成人| 午夜福利视频在线观看免费| 久久99一区二区三区| av免费在线看不卡| 老司机亚洲免费影院| 老女人水多毛片| 亚洲av电影在线进入| 免费在线观看黄色视频的| 天美传媒精品一区二区| 亚洲精品国产av蜜桃| 亚洲在久久综合| 国产精品国产三级专区第一集| 高清av免费在线| av女优亚洲男人天堂| 亚洲国产最新在线播放| 新久久久久国产一级毛片| 久久精品人人爽人人爽视色| 精品国产乱码久久久久久小说| 日本av手机在线免费观看| 亚洲三区欧美一区| 捣出白浆h1v1| 久久久精品国产亚洲av高清涩受| 亚洲综合精品二区| 国产一区有黄有色的免费视频| 国产av精品麻豆| 性少妇av在线| 免费日韩欧美在线观看| 午夜福利乱码中文字幕| 国产精品 国内视频| 日韩av免费高清视频| 老司机影院成人| 美女中出高潮动态图| 国产成人精品久久久久久| 免费不卡的大黄色大毛片视频在线观看| 王馨瑶露胸无遮挡在线观看| 免费少妇av软件| 天堂中文最新版在线下载| 亚洲一级一片aⅴ在线观看| videossex国产| videos熟女内射| 精品国产一区二区三区久久久樱花| 观看av在线不卡| 黄色怎么调成土黄色| 另类精品久久| 免费黄频网站在线观看国产| 久热这里只有精品99| 亚洲国产日韩一区二区| 香蕉丝袜av| 国产精品一国产av| 日韩中文字幕视频在线看片| 国产男女内射视频| av免费在线看不卡| 国产精品人妻久久久影院| 18禁裸乳无遮挡动漫免费视频| 97在线视频观看| 久久影院123| 丝袜美足系列| 99久国产av精品国产电影| 欧美日韩精品网址| 18禁观看日本| 欧美97在线视频| 免费大片黄手机在线观看| 丝袜美腿诱惑在线| 大香蕉久久成人网| 少妇的丰满在线观看| 日韩欧美精品免费久久| 国产又色又爽无遮挡免| 日韩中字成人| 亚洲欧美清纯卡通| av视频免费观看在线观看| 麻豆av在线久日| 久久久久人妻精品一区果冻| 亚洲伊人色综图| 99精国产麻豆久久婷婷| 国产精品三级大全| 国产片特级美女逼逼视频| 日韩一卡2卡3卡4卡2021年| 国产探花极品一区二区| 叶爱在线成人免费视频播放| 婷婷色麻豆天堂久久| 免费人妻精品一区二区三区视频| 婷婷色麻豆天堂久久| 国产精品国产三级专区第一集| 日本vs欧美在线观看视频| 久久午夜综合久久蜜桃| 91在线精品国自产拍蜜月| 老司机亚洲免费影院| 一边摸一边做爽爽视频免费| 狠狠精品人妻久久久久久综合| 欧美av亚洲av综合av国产av | 日韩免费高清中文字幕av| av女优亚洲男人天堂| 激情视频va一区二区三区| 婷婷成人精品国产| 精品国产乱码久久久久久男人| av福利片在线| 国产成人精品婷婷| 久久ye,这里只有精品| 春色校园在线视频观看| 超碰97精品在线观看| 国产精品久久久久久精品古装| 欧美精品国产亚洲| 熟女少妇亚洲综合色aaa.| 精品久久久精品久久久| 晚上一个人看的免费电影| 赤兔流量卡办理| 午夜福利在线观看免费完整高清在| 国产欧美日韩综合在线一区二区| 国产激情久久老熟女| 午夜福利影视在线免费观看| 亚洲精品一区蜜桃| 黑丝袜美女国产一区| 日韩制服骚丝袜av| 精品卡一卡二卡四卡免费| 国产精品蜜桃在线观看| 欧美激情极品国产一区二区三区| 成人黄色视频免费在线看| 国产成人免费观看mmmm| 亚洲精品av麻豆狂野| 久久 成人 亚洲| 丝袜在线中文字幕| 欧美精品一区二区大全| 高清不卡的av网站| 国产午夜精品一二区理论片| 99香蕉大伊视频| 9191精品国产免费久久| 18+在线观看网站| 日本色播在线视频| 不卡av一区二区三区| 欧美变态另类bdsm刘玥| 日韩制服骚丝袜av| 国产精品一二三区在线看| 国产在线免费精品| √禁漫天堂资源中文www| 激情视频va一区二区三区| 婷婷色麻豆天堂久久| 久久午夜综合久久蜜桃| 国产日韩欧美亚洲二区| 两性夫妻黄色片| 99久久综合免费| 国产淫语在线视频| 免费在线观看黄色视频的| 免费在线观看视频国产中文字幕亚洲 | 国产午夜精品一二区理论片| 久久久久久伊人网av| 成年人午夜在线观看视频| 1024香蕉在线观看| 可以免费在线观看a视频的电影网站 | 在线亚洲精品国产二区图片欧美| 中文天堂在线官网| 91在线精品国自产拍蜜月| 一个人免费看片子| 91aial.com中文字幕在线观看| 一级毛片我不卡| 久久精品aⅴ一区二区三区四区 | 丰满饥渴人妻一区二区三| 五月开心婷婷网| 国产一区亚洲一区在线观看| 一区二区三区激情视频| 成年美女黄网站色视频大全免费| 日本爱情动作片www.在线观看| 精品亚洲成a人片在线观看| 日韩人妻精品一区2区三区| √禁漫天堂资源中文www| 一二三四中文在线观看免费高清| 欧美精品人与动牲交sv欧美| 日韩人妻精品一区2区三区| 亚洲精品乱久久久久久| 最近2019中文字幕mv第一页| 黑人巨大精品欧美一区二区蜜桃| 亚洲中文av在线| 看非洲黑人一级黄片| 日本猛色少妇xxxxx猛交久久| 国产免费视频播放在线视频| 日韩制服丝袜自拍偷拍| 国产精品国产三级专区第一集| 精品少妇久久久久久888优播| 18禁动态无遮挡网站| 久久精品aⅴ一区二区三区四区 | 熟女电影av网| 成人国产av品久久久| 亚洲综合色惰| 亚洲色图综合在线观看| 天堂俺去俺来也www色官网| 国产色婷婷99| 90打野战视频偷拍视频| 久久久久精品久久久久真实原创| 在线观看国产h片| 国产片特级美女逼逼视频| 精品国产一区二区三区四区第35| 在线天堂最新版资源| 日本wwww免费看| 黑人欧美特级aaaaaa片| 一区二区三区激情视频| 日韩一区二区视频免费看| 国产女主播在线喷水免费视频网站| 人人澡人人妻人| 91成人精品电影| 超色免费av| 婷婷色综合www| 精品少妇黑人巨大在线播放| 欧美中文综合在线视频| 国产精品麻豆人妻色哟哟久久| 国产精品一国产av| 97精品久久久久久久久久精品| 性高湖久久久久久久久免费观看| 国产片内射在线| 久久精品国产a三级三级三级| 国产极品天堂在线| 中文乱码字字幕精品一区二区三区| 日韩,欧美,国产一区二区三区| 亚洲内射少妇av| 三级国产精品片| 国产男女超爽视频在线观看| 最近中文字幕高清免费大全6| 久久国产精品男人的天堂亚洲| 成人黄色视频免费在线看| 久久久久精品性色| 熟女电影av网| 亚洲婷婷狠狠爱综合网| 国产在线免费精品| 日韩成人av中文字幕在线观看| 午夜影院在线不卡| 美女国产视频在线观看| 亚洲美女搞黄在线观看| 如日韩欧美国产精品一区二区三区| 婷婷色综合www| 亚洲国产日韩一区二区| 天堂8中文在线网| 久久国产精品男人的天堂亚洲| 国产欧美日韩综合在线一区二区| 蜜桃国产av成人99| 丝袜人妻中文字幕| 国产在视频线精品| 国产男女超爽视频在线观看| 久久韩国三级中文字幕| 在线精品无人区一区二区三| 国产亚洲最大av| 免费黄频网站在线观看国产| 26uuu在线亚洲综合色| 最近的中文字幕免费完整| 亚洲男人天堂网一区| 啦啦啦啦在线视频资源| 亚洲精品国产色婷婷电影| 国产1区2区3区精品| av线在线观看网站| 91aial.com中文字幕在线观看| 下体分泌物呈黄色| 午夜福利在线观看免费完整高清在| 国产综合精华液| 十八禁高潮呻吟视频| 欧美激情高清一区二区三区 | 如日韩欧美国产精品一区二区三区| 女性被躁到高潮视频| 亚洲成色77777| 人人妻人人添人人爽欧美一区卜| 国产伦理片在线播放av一区| 亚洲内射少妇av| videos熟女内射| 69精品国产乱码久久久| 国产乱来视频区| 在线看a的网站| videossex国产| 亚洲精品美女久久av网站| 夫妻午夜视频| 日本欧美视频一区| 日韩一卡2卡3卡4卡2021年| 欧美 日韩 精品 国产| 91午夜精品亚洲一区二区三区| 久久鲁丝午夜福利片| 亚洲精品国产色婷婷电影| 精品国产一区二区三区四区第35| 亚洲综合色惰| 伊人久久大香线蕉亚洲五| 久久精品亚洲av国产电影网| 亚洲五月色婷婷综合| 久久精品国产亚洲av高清一级| 精品国产国语对白av| 久久精品国产亚洲av涩爱| 国产亚洲最大av| 日韩电影二区| 国产男女内射视频| 午夜福利乱码中文字幕| av网站在线播放免费| 精品亚洲成国产av| 亚洲综合色惰| 国产亚洲精品第一综合不卡| 99久久中文字幕三级久久日本| 在线亚洲精品国产二区图片欧美| 最黄视频免费看| 韩国av在线不卡| 成人毛片60女人毛片免费| 国产在视频线精品| 免费女性裸体啪啪无遮挡网站| av国产久精品久网站免费入址| 捣出白浆h1v1| 高清不卡的av网站| 成人免费观看视频高清| 精品少妇内射三级| videosex国产| 国产精品久久久久久av不卡| 性高湖久久久久久久久免费观看| 国产精品久久久久久av不卡| 波野结衣二区三区在线| 国产免费视频播放在线视频| 欧美日本中文国产一区发布| 免费观看无遮挡的男女| 久久久久久久久久久免费av| 美女福利国产在线| 免费高清在线观看日韩| 美国免费a级毛片| 黑丝袜美女国产一区| 一二三四在线观看免费中文在| 日本免费在线观看一区| av卡一久久| 国产白丝娇喘喷水9色精品| 日本av手机在线免费观看| 亚洲男人天堂网一区| 在线观看国产h片| 免费看不卡的av| 欧美中文综合在线视频| 国产午夜精品一二区理论片| 青春草亚洲视频在线观看| 80岁老熟妇乱子伦牲交| 2018国产大陆天天弄谢| 两个人免费观看高清视频| 又粗又硬又长又爽又黄的视频| 久久久国产欧美日韩av| 啦啦啦在线观看免费高清www| 精品亚洲成国产av| 自拍欧美九色日韩亚洲蝌蚪91| 午夜福利视频在线观看免费| 一本—道久久a久久精品蜜桃钙片| 国产深夜福利视频在线观看| 亚洲国产av影院在线观看| 999久久久国产精品视频| 看非洲黑人一级黄片| 晚上一个人看的免费电影| 国产熟女午夜一区二区三区| 中文字幕亚洲精品专区| 99热国产这里只有精品6| 国产日韩欧美视频二区| 国产av精品麻豆| 91国产中文字幕| 如日韩欧美国产精品一区二区三区| 2021少妇久久久久久久久久久| 亚洲精品美女久久av网站| 国产男女内射视频| 日韩中文字幕欧美一区二区 | 久久99蜜桃精品久久| 国精品久久久久久国模美| videos熟女内射| 久久99蜜桃精品久久| 亚洲av免费高清在线观看| 99re6热这里在线精品视频| 成人国产av品久久久| 免费av中文字幕在线| 欧美成人午夜免费资源| 免费高清在线观看视频在线观看| 日韩免费高清中文字幕av| 国产精品二区激情视频| 久久久久国产一级毛片高清牌| 亚洲精品国产av蜜桃| av网站免费在线观看视频| 久久久久网色| 日韩一本色道免费dvd| 国产精品99久久99久久久不卡 | 国产人伦9x9x在线观看 | 久久精品国产综合久久久| 国产精品一区二区在线观看99| 嫩草影院入口| 亚洲欧美精品自产自拍| 亚洲欧美中文字幕日韩二区| 超色免费av| 亚洲av综合色区一区| 亚洲天堂av无毛| 女的被弄到高潮叫床怎么办| 性少妇av在线| 亚洲国产看品久久| 国产精品一区二区在线不卡| 亚洲国产日韩一区二区| 日韩欧美精品免费久久| 边亲边吃奶的免费视频| 三级国产精品片| 日本色播在线视频| 97在线人人人人妻| 2018国产大陆天天弄谢| 亚洲,欧美精品.| 国产综合精华液| 国产一区二区激情短视频 | 一级片免费观看大全| 国产精品免费视频内射| 亚洲天堂av无毛| 九九爱精品视频在线观看| 国产一区二区在线观看av| 一个人免费看片子| 男女高潮啪啪啪动态图| 不卡视频在线观看欧美| 午夜老司机福利剧场| 大话2 男鬼变身卡| 三级国产精品片| 欧美日韩精品成人综合77777| 国产欧美日韩一区二区三区在线| 日本vs欧美在线观看视频| 午夜影院在线不卡| 搡老乐熟女国产| 在线天堂中文资源库| av国产久精品久网站免费入址| 制服丝袜香蕉在线| 人妻系列 视频| 美女主播在线视频| 高清在线视频一区二区三区| 免费久久久久久久精品成人欧美视频| 人妻一区二区av| 免费观看无遮挡的男女| 成年美女黄网站色视频大全免费| 91在线精品国自产拍蜜月| 欧美激情极品国产一区二区三区| av电影中文网址| 欧美精品一区二区大全| 国产无遮挡羞羞视频在线观看| 最新中文字幕久久久久| 巨乳人妻的诱惑在线观看| 男女高潮啪啪啪动态图| 国产欧美亚洲国产| 久久国内精品自在自线图片| 2022亚洲国产成人精品| 久久久久久久大尺度免费视频| av片东京热男人的天堂| 午夜免费观看性视频| 欧美另类一区| 黄色一级大片看看| 免费日韩欧美在线观看| 国产精品成人在线| 亚洲美女搞黄在线观看| 大片电影免费在线观看免费| 亚洲,欧美,日韩| 久久午夜福利片| 边亲边吃奶的免费视频| 老汉色∧v一级毛片| 搡女人真爽免费视频火全软件| 在线观看一区二区三区激情| 亚洲av电影在线观看一区二区三区| 九草在线视频观看| 在线观看免费高清a一片| 人体艺术视频欧美日本| 欧美精品亚洲一区二区| 亚洲熟女精品中文字幕| tube8黄色片| 国产精品欧美亚洲77777| kizo精华| 热re99久久国产66热| 国产成人精品无人区| 午夜激情av网站| 肉色欧美久久久久久久蜜桃| 亚洲婷婷狠狠爱综合网| 国产白丝娇喘喷水9色精品| 国产高清国产精品国产三级| 成年动漫av网址| 亚洲欧洲国产日韩| 成人二区视频| 久久99精品国语久久久| 国产 精品1| 日韩一本色道免费dvd| 欧美日韩国产mv在线观看视频| 欧美激情极品国产一区二区三区| 久久午夜综合久久蜜桃| 久热这里只有精品99| 日韩av免费高清视频| 国产免费又黄又爽又色| av免费在线看不卡| 自线自在国产av| 亚洲欧洲国产日韩| 成年av动漫网址| 最黄视频免费看| 999久久久国产精品视频| av免费观看日本| 三上悠亚av全集在线观看| 69精品国产乱码久久久| 国产精品久久久久久久久免| 观看av在线不卡| 欧美 日韩 精品 国产| 久久精品国产自在天天线| 国产欧美日韩一区二区三区在线| 亚洲美女黄色视频免费看| 999精品在线视频| 最黄视频免费看| 久久久久久人妻| 精品一区二区免费观看| 涩涩av久久男人的天堂| 亚洲一级一片aⅴ在线观看| 天天影视国产精品| 色哟哟·www| 精品一品国产午夜福利视频| 黑人猛操日本美女一级片| 在线观看美女被高潮喷水网站| 咕卡用的链子| 国产免费福利视频在线观看| 成人影院久久| 男人添女人高潮全过程视频| 一边亲一边摸免费视频| 国产淫语在线视频| 国产片内射在线| 另类亚洲欧美激情| 在线观看美女被高潮喷水网站| 美女高潮到喷水免费观看| av电影中文网址| 国产一区有黄有色的免费视频| 国产亚洲午夜精品一区二区久久| 日韩视频在线欧美| 国产精品 欧美亚洲| 久久久欧美国产精品| 制服人妻中文乱码| 国产精品二区激情视频| 日日爽夜夜爽网站| 色网站视频免费| 免费在线观看视频国产中文字幕亚洲 | 丝袜人妻中文字幕| 丁香六月天网| 人人妻人人添人人爽欧美一区卜| 满18在线观看网站| 久久久久久久国产电影| 丰满乱子伦码专区| 99精国产麻豆久久婷婷| 啦啦啦啦在线视频资源| 啦啦啦在线观看免费高清www| 亚洲在久久综合| 亚洲一区中文字幕在线| 日韩不卡一区二区三区视频在线| h视频一区二区三区| 99久久综合免费| 亚洲人成电影观看| 国产精品久久久av美女十八| 亚洲色图综合在线观看| 天天躁夜夜躁狠狠久久av| 乱人伦中国视频| 欧美精品av麻豆av| 肉色欧美久久久久久久蜜桃| 久久久久久免费高清国产稀缺| 777米奇影视久久| 大香蕉久久网| 欧美精品亚洲一区二区| 99热网站在线观看| 亚洲,欧美精品.| 2021少妇久久久久久久久久久| 欧美人与性动交α欧美精品济南到 | 亚洲国产精品一区二区三区在线| 纯流量卡能插随身wifi吗| 国产片内射在线| 肉色欧美久久久久久久蜜桃| 久久久久久人人人人人| √禁漫天堂资源中文www| 99精国产麻豆久久婷婷| 婷婷成人精品国产| 国产亚洲午夜精品一区二区久久| 国产av精品麻豆| 亚洲精品中文字幕在线视频| 国产一区亚洲一区在线观看| 在线天堂中文资源库| 久久精品夜色国产| 一本色道久久久久久精品综合| 久久鲁丝午夜福利片| 国产黄色视频一区二区在线观看| 亚洲国产av影院在线观看| 深夜精品福利| a 毛片基地| 新久久久久国产一级毛片| 亚洲精品,欧美精品| 99九九在线精品视频| 蜜桃国产av成人99| 香蕉国产在线看| 侵犯人妻中文字幕一二三四区| 日本91视频免费播放| 日韩大片免费观看网站| 在线观看人妻少妇| 欧美精品国产亚洲| 人妻 亚洲 视频| 人人澡人人妻人| 亚洲av电影在线进入| 久久人人爽人人片av| 久久久精品国产亚洲av高清涩受| 国产午夜精品一二区理论片| 国产免费视频播放在线视频| 亚洲一区二区三区欧美精品| 女人高潮潮喷娇喘18禁视频| 亚洲美女搞黄在线观看| 国产亚洲欧美精品永久| 91精品三级在线观看|