• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    LPR-Trie:A Fast IPv6 Routing Lookup Algorithm with Virtual Nodes

    2022-10-27 04:41:46WenlongChenDiyaLiuJiachengWangXiaolanTang
    China Communications 2022年10期

    Wenlong Chen,Diya Liu,Jiacheng Wang,Xiaolan Tang

    The College of Information Engineering,Capital Normal University,Beijing 100048,China

    *The corresponding author,email:tangxl@cnu.edu.cn

    Abstract:The number of IPv6 routes in todays backbone routers has grown rapidly,which has put tremendous pressure on route lookup and storage.Based on the analysis of IPv6 address prefx length and distribution characteristics,this paper proposes an IPv6 route lookup architecture called LPR-Trie.The core idea of the algorithm is to utilize more spaces and accelerate routing lookup.Moreover,we put forward the concept of virtual nodes,and leverage the link between virtual nodes and ordinary nodes to accelerate routing lookup.We provide the longest prefx routing entry(LPR)calculation algorithm to achieve the longest prefx match.The experimental results show that the virtual node mechanism increases the search speed up to 244%,and the virtual nodes have better stability by setting an appropriate keep-alive time according to the characteristics of actual traffc.This paper shows that our design improves the routing lookup speed and have better memory utilization.

    Keywords:IPv6;route lookup;longest prefx match;virtual node;Trie

    I.INTRODUCTION

    WITH the continuous growth of the network scale,IPv4 protocol no longer meets the requirement of the Internet.Therefore,IPv6 emerged as the next generation IP protocol.Routing lookup is the process of searching the forwarding table for the destination address according to the longest prefx matching principle and selecting the path.The 128-bit IPv6 address format inevitably results in a very large routing table in the router.High-performance routing lookup algorithms have become the key to improving the router’s forwarding speed.

    The routing table search algorithm is mainly evaluated by storage overhead and search speed[1].For the routing table with frequent update,the update performance is also required.As the network throughput increases,the routing table expands exponentially.This trend poses challenges to current routers by requiring higher throughput and larger routing tables.

    Most current routing lookup algorithms are designed for IPv4 and cannot be directly applied to IPv6.The algorithms proposed in some related studies can be extended to IPv6,but no exhaustive research has been done.Therefore,we propose the LPR-Trie structure and corresponding search algorithm in accordance with the characteristics of IPv6 addresses and backbone network routing tables.By analyzing the number of routes for each prefx length,we store 64-bit prefx addresses in three layers which achieves high memory utilization.Compared to existing multi-bit Trie trees,we introduce the concept of virtual nodes.The virtual node,as a kind of temporary node,is created when relevant real-time packets come and is destroyed when its keep-alive time expires.Once the IP address matches a virtual node,the LPR algorithm is used to quickly match the corresponding longest prefx routing entries.Compared with ordinary nodes,the number of virtual nodes is small,and has little effect on the overall memory space consumption.

    The contributions of our method are summarized as follows.

    ·We propose an IPv6 route lookup architecture called LPR-Trie and the corresponding lookup algorithm based on the characteristics of IPv6 addresses,which accelerate routing lookup with better memory utilization than existing studies.

    ·In LPR,a virtual node is created when an IP address cannot match the ordinary nodes,in order to increase the search speed for corresponding IP addresses.Meanwhile,the dynamic creation and deletion of virtual nodes improves the memory utilization.

    ·We compare our proposed method LPR with TSB[2]by using the current routing table from bgp.potaroo.net.Experimental results show that our search speed is 3.49 times that of TSB,and the memory size occupied by TSB is about 1.5 times that of LPR.

    The rest of this article is organized as follows:we present existing methods for IPv6 route lookup in Section II.An overview of the architecture,LPR algorithm and lookup procedure are provided in Section III.In Section IV we introduce the routing update.The experiments and performance analysis are discussed in Section V.Finally,we summarize our work in Section VI.

    II.RELATED WORK

    In general,there are three kinds of algorithms for IP routing lookup:Trie-based,hash-based,and hardware-based methods.Each method has its own advantages and disadvantages.

    Trie uses a tree-based data structure that determines the branch of the tree by the value of each bit in the prefx.In the Trie tree,the path from the root node to the node of the n-th layer represents the value of the frst n bits in the string.The traditional Trie tree has a large storage overhead and requires a large amount of memory access operations as the search depth increases.

    Multi-branch Trie tree looks up multiple bits at each step,which effectively reduces the number of accesses.In[2],TSB is a three-stage algorithm for IPv6 routing table lookup that uses three data structures:tree,segment table,and route bucket.The frst stage is the root node 2001.The second stage is a segment table or another node linked to the node 2001.The segment table stores the value of 17-32 bits of the destination IPv6 address.The third stage is the routing bucket linked to the segment table or 8 child nodes of node 2001.In[3],the multi-branch Trie tree is combined with the Hash table to divide the IPv6 address space into fve levels:1-32 bits,1-16 bits,33-48 bits,49-64 bits,65-128 bits.The prefx information is stored in 5 hash tables and 3 multi-bit trees.The algorithm starts from frst 32 bits.Hash tables are used in[4]to store address prefx information starting with 0x20,0x24,0x26,0x28,0x2A.At the same time,the 6-5-4 Trie tree is used to store the address prefxes of the three intervals of 33-38,39-43,and 43-47.

    For a multi-bit Trie tree,each step of the search process checks multiple bits,so it does not support an address prefx of any length.We need to use the prefx expansion method to convert the address prefx,which will increase the redundancy of the information.For the search method that uses the hash algorithm,we have to face the two problems of the choice of the hash function and the handling of hash conficts.When there are many prefxes in the forwarding table,it is diffcult to fnd a collision-free hash function.This article has carefully studied the characteristics of IPv6 address structure and routing table,and we propose an IPv6 route lookup architecture called LPR-Trie,which combines the Trie tree and the array.Because the array address space is continuous,the corresponding node can be located with one search,which improves routing lookup speed.

    Degermark et al.[5]proposed the Lulea algorithm that is a bitmap compression of the Trie tree structure.The 32-layer IPv4 tree structure is divided into 3 layers according to the cutting method of(16-8-8).By cutting,the entire tree is organized into many tree branches.The Lulea algorithm frst uses leaf push to save the node information in the leaf nodes,and then constructs the corresponding bitmap by traversing all the leaf nodes.This algorithm uses a multi-level index table generated offine to achieve fast lookup.Although this algorithm reduces the storage overhead of the data structure,it causes update diffculties,and complex and ineffcient update operations also affects the search performance to a certain extent.Liu et al.[6]proposed a software routing lookup algorithm based on overlapping bitmap compression,which constructs an overlapping bitmap structure through hierarchical traversal,and puts the port information of the tree structure onto a linear forwarding port array(FPA).Instead of using leaf push technology,the hierarchical traversal of the tree is used to ensure the longest prefx match.The array of forwarding ports is divided into groups of equal length,and independent group structures are established for each group.Based on bitmap segmentation,two optimization algorithms,conditional optimization and general optimization,are proposed to further improve the update speed.

    Hardware-based algorithms mainly use SRAM and FPGA chips to complete route lookup.Peng et al.[7]uses extended segment tables and extended offset tables to accommodate changes in memory capacity across different SRAM and FPGA chips.The algorithm divides the same prefx of the frst l bit into the same segment,and expands the prefx of less than 1 bit.The next hop address of the segment is then stored in the corresponding segment table or offset table.Hardware is relatively expensive and often requires multiple external memory chips.Due to the limitations of the hardware itself,the update performance and scalability are not very satisfying.

    Virtual routers are also a promising way to lookup IP to provide network services.Each virtual router has a local forwarding information base(FIB).When multiple virtual routers run IP forwarding at the same time,a large amount of memory is needed to store multiple FIBs,which places higher requirements on the cache of general-purpose processors.Considering the commonality of IP prefxes between each FIB,Fu et al.[8]use the prefx conversion method to convert the network prefxes in all FIBs into the same prefx set.With the help of prefx conversion,the memory usage is reduced.Existing software routers often store IPv6 routes through binary trees or Hash linked lists,but when the number of IPv6 routing items increases to several k or tens of k,the storage space required is very large,and the search speed will also be signifcantly reduced.The work of this paper can better solve the above-mentioned problems.

    III.LPR-TRIE ARCHITECTURE AND VIRTUAL NODE

    Based on the analysis of characteristics of IPv6 prefx length and distribution,this paper proposes a routing lookup algorithm.It leverages LPR-Trie structure to reduce the number of memory accesses and achieve the lookup with the virtual nodes.In order to support rapid update,we develop the optimization methods.

    3.1 LPR-Trie Architecture

    We divide the frst 64 bits of the IP prefx into four tiers evenly:Root Tier(1-16 bits),Tier 1(17-32 bits),Tier 2(33-48 bits)and Tier 3(49-64 bits).Root tier stores the frst 16 bits in an array and other tiers are organized in an array or linked list.In Figure 1,the circles represent nodes.We use different colors to distinguish which layer the nodes belong to,and use solid lines and dashed lines to distinguish the types of nodes.Red circle represents the node in R array,green circles represent nodes in T1 array,and blue circles represent nodes in T2 array.Solid circles indicate ordinary nodes,and dotted circles mean virtual nodes.Because the whole structure are four layers and there is a link relationship between each layer,so we call the elements in the array“nodes”.

    Root Tier:Root Tier is organized as an array:R array.The structure of R array elements is divided into three types:root node,list header and NULL.The size of the array element is 16 bits and the length is 216.In the current routing table,there are 52 kinds of values in the frst 16 bits of the destination address.Although the structure of the array requires 216spaces,each search for the frst 16 bits of the destination address requires only one memory operation.

    When the number of routing prefxes starting with the element value is greater than a certain thresholdk,the element type is the root node.When the number is less than or equal tok,the element type is the list header.When there is no route starting with the element value,the element type is NULL.In this paper,we setkto 3.

    The array element contains two kinds of pointers.One is the structure pointerPS,which points to the next level of array or linked list.The other is the prefx pointerPlen,which points to the prefx length table.The prefx length table is a table composed of all the lengths of the prefx that starts with the element value in the routing table at this level.

    Tier 1:The second tier is organized in an array or linked list according to the element type of the R array

    ·If the element type of the R array is the root node,then Tier 1 is organized as T1 array that stores the 17-32 bits of the IP address.T1 array has the same size as the R array and elements in T1 array contain 2 types of information:fag and pointer.If the node value exists in the value of bits 17-32 in the routing table entry,the fag is set to beordinary,otherwise the fag is set to bevirtual.The pointer of the virtual node is calculated by LPR and points to an ordinary node.For the defnition and discussion of LPR calculation,see the introduction in section 3.2 below.

    Figure 1.LPR-Trie structure.

    The ordinary node contains two types of pointers:structure pointer and prefx pointer are the same as the pointer types in the R array,and virtual node does not have these two pointers,but an pointerPLPRto an ordinary node in the same layer through LPR calculation.

    ·If the element type of the R array is the list header,then Tier 1 is a linked list which stores the 17-64 bits of the IP address.For example,there are 3 routing entries whose frst 16 bits are“1234”,so the type of the element“1234”in R array is the list header and T1 tier stores the 3 entries in a list.

    ·The element type is NULL:When searching,it returns the next hop information of the default route.

    Tier 2 and Tier 3:The third layer has a similar structure to the second layer.According to statistics,the prefx length of the routing table is mostly concentrated in 33-48.Therefore,the fourth layer is mainly lists linked with T2 array.When there are only a few routing entries in the lists,linear search generally meets the requirements.

    The routing prefx is distributed in different array layers in steps of 16 bits:the R array is concerned with frst 16 bits of the routing prefx,and the T1 array is related to 17-32 bits.The T2 array represents the 33-48 bits.The 49-64 bits are placed in the list linked by the T2 array.

    T1 array stores routes with same value of IP prefx(SV-RT)in the form of a pointer structure.The SVRTs stored in the T1-ND are routing entries with the frst 32 bits being a specifc value and the mask length from 17 to 32.SV(ND,len)is used to describe the node and prefxes linked to it where len=prefx length-TierNum*16.In Figure 1,node C has two SV-RTs,which are:2001:1240::/28 and 2001:1240::/24.They are represented as SV(C,12)and SV(C,8).

    T2 array stores two kinds of routes.The frst type is SV-RT,which prefx length is between 33 and 48.The SV-RTs stored in node G in Figure 1 are:2001:1240:5800::/48,2001:1240:5800::/45 and 2001:1240:5800::/37.The second type is extending route(EX-RT).The frst 48 bits of these routes are the same and the mask length is greater than 48.The EX-RTs stored in the node G are:

    2001:1240:5800::/62,2001:1240:5800::/56,

    2001:1240:5800:1200::/56,

    2001:1240:5800:3400::/56,

    2001:1240:5800:5678::/64.

    EX-RT are described in forms of EX(ND,len,value)where value is thevalueof 49-6bits.For example,for 2001:1240:5800:3400:/56,it matches node G,len=56-3*16=8 andvalue=0x3400.Therefore it is represented as EX(G,8,0X3400).

    Note that SV-RT may exist in both T1 and T2 array,and EX-RT only appears in T2 array.Moreover,the prefx length of the Internet route is always greater than 16,so the R-ND does not store the route.If a route whose mask length is shorter than 16 appears in the future,it is supposed to be stored at R array in a similar way to the SV-RT in T1 array.

    Virtual nodeOnly when the node contains at least 1 SV-RT or 1 EX-RT routing entry,the fag is set to be ordinary.Otherwise,the fag is set to be virtual.The virtual node itself does not contain routing,nor does it have descendant nodes.It is constructed for fast routing matching during message forwarding.Virtual node points to an ordinary node in the same tier by LPR algorithm to fnd the longest prefx matching entry,and see the subsequent LPR algorithm in details.

    3.2 Routing Lookup and LPR Calculation

    The output of route lookup algorithm is a routing entry stored in nodeM,which matches the destination IP address and has the longest prefx,denoted byLPR.

    When a packet reaches a router,the forwarding engine searches for the routing entry in the routing tree based on the destination IP address(Dest)of the packet.

    S1.According to the frst 16 bits of Dest,we search the R array.If the search fails,we return to the default route and the search ends.If the R array element structure type is the root node,continue to fnd the next layer according to the pointer type.If it is a linked list,directly search the linked list and return the result.

    S2.According to the 17-32 bits,we search the T1 array.If the nodeMis marked as virtual,it directly returns LPR(M),and the search ends.If the element fag is ordinary,record max prefx value,and continue to fnd the next level of array according to thePS.

    S3.Find the T2 array based on the 33-48 bits of the destination address.In the T2 array,if the fag is virtual,the LPR of the element is directly returned,and the search ends.If the element fag is ordinary,it means that the element contains at least one SV-RT or EX-RT.According to thePS,search for SV-RT or EX-RT.If both SV-RT and EX-RT are available,check EX-RT frst.If the match fails,then check SV-RT.If the search still fails,the LPR of the element is returned.

    For the virtual node and the ordinary node without SV-RT,it needs to obtain the corresponding LPR and store the link relationship when constructing the LPRTrie.Moreover,the link relationship is also an important part of the maintenance of the routing tree.We give the details as following:

    Algorithm 1Replace-1 describes the replacement of the last“1”(binary bit)with“0”.Details are illustrated in Algorithm 1.For a given binaryM=0x1234,this algorithm transforms it to 0x1230;ifM=0x0018,it is transformed to 0x0010.

    Algorithm 2LPR calculation algorithm calculates the routing entry with the longest prefx that matches the destination IP address.For a nodeM,the algorithm continuously performs Replace-1 operations onMuntil it matches the same layer nodes which fag is ordinary,and then chooses a SV-RT satisfying the longest prefx matching(LPM)condition.If the LPR is not found in the sibling nodes,the node M points to the same LPR as its parent.Obviously,if the LPR of the parent node is NULL,the LPR corresponding to the nodeMis also NULL.

    In the search process,the LPR of the ordinary element or the LPR of the virtual element may be returned.Specifc examples are given separately below:

    Suppose the destination address is 2001:1240:5840:3400::0001.We frst fnd node I that stores the route whose frst 48 bits are 2001:1240:5840 and the minimum prefx length is 48.As node I only has no SV-RT and only one EX-RT:EX(I,8,0x1200),and the destination IP cannot match this EX-RT,it needs to return LPR(I).Take out the second-level array element value 0x5840,and get 0x5800 according to the Replace-1 operation of Algorithm 1,matching to node G=0x5800.G stores three SV-RTs of length 16,13,5,because it is the 10th bit of 0x5840 is replaced from 1 to 0,according to the longest prefx match,the routing prefx length of the third layer should be less than 10,and then SV(G,5)is obtained.

    For node H=0x5806,the frst Replace-1 operation replaces the 15th bit from 1 to 0 and returns t=0x5804,whereas no corresponding node is found in the same layer.The next Replace-1 operation replaces the 14th bit from 1 to 0 and returnst2=0x5800,which matches node G.There are three SVRTs stored in G are 16,13 and 5.We choose the longest prefx route smaller than 14,that is,LPR(H)=SV(G,13).J=0x5860.The frst Replace-1 operation returns 0x5840,then the node I is matched in the same layer node,but there is no SV-RT in the node I,so the LPR of I should be returned,LPR(I)=SV(G,5).

    3.3 Architecture Optimization

    For a nodeMin then-th array,the routing entries whose frst 16*nbits are the same with M and the parent node of M and the mask length exceeds 16*nare called the government routing entry(GR-RT).GR-RT of nodes in R array or T1 array are the routing entry stored in all its child nodes,excluding the SV-RT.GRRT of nodes in T2 array are its EX-RTs.In Figure 1,the GR-RTs of node C are 11 routes stored in nodes F,G,and I.

    Table 1.Number of T1 nodes with different KGR.

    Table 2.Number of T2 nodes with different KEX.

    The real routing table we downloaded from bgp.potaroo.net contains more than 70,000 routes.According to the data structure of this article,a root node represents the frst 16 bits of a routing prefx,and there are totally 52 root nodes.We counted and sorted the number of routes under each root node,that is,the number of routes beginning with different frst 16 bits.Then,for clear presentation and simple analysis,we selected the 7 root nodes with the largest numbers of routes to analyze the characteristics of routing entries.

    Table 1 lists the number of T1 nodes for different GR-RT numbers under each root node.T1 nodes stores GR-RTs in a linked list where the number of routes does not exceeds the thresholdKGR.On the one hand,a large threshold causes a large number of memory accesses when traversing the linked list.On the other hand,excessive pointers to T2 array consume memory spaces signifcantly.As Table 1 shows,withKGR=3,only 18.99% of the T1 nodes point to the node array of 216.In other words,81.01% of the T1 nodes have no more than 3 routes in average.Table 2 describes the number of T2 nodes for different EX-RT numbers under each root node.Similarly,T2 nodes stores EX-RTs in a linked list where the number of routes is smaller than the thresholdKEX.In our LPR-Trie structure,when the number of EX-RT exceedsKEX,the T2 node points to the next array of nodes.Table II shows that an average of 16.41%of the T2 nodes are linked to a layer of node arrays.Properly setting thresholdsKEXandKEXcan achieve a balance between storage consumption and lookup effciency.

    3.4 Security Considerations for Virtual Node Mechanism

    With the concept of virtual node,the router becomes prone to a malicious DoS attack.To avoid the explosion of virtual nodes consuming enormous storage resources,we have the following considerations:

    1.To reduce the attack hazard,we make use of the suppression mechanism.Many existing network processing mechanisms use a suppression mechanism to generate a limited number of control entries,such as the interface-MAC entry of the switch.Suppression is refected in two aspects:1)limit the number of virtual nodes generated per unit time;2)limit the total number of virtual nodes in the router system.These two values are determined jointly by various factors such as the hardware performance of the route system and the network environment.

    2.The deployment of the real source address mechanism makes it easy to trace and block malicious nodes.The multi-level real source address mechanism studied by Tsinghua University has been widely deployed in Chinese universities and national institutions.Therefore,it is relatively easy for the network administrator to trace back.

    3.The IPv6 routing lookup in this paper is designed for software routers and mainly deployed at the edge.The traffc entering the local area network from the external network does not generate the virtual nodes,while the traffc from the local area network to the external network does.Once a malicious behavior is discovered,it must be from the device of the subnet,hence it is easy to locate the attack point.

    In addition,the above-mentioned suppression measures for virtual nodes help to detect network malicious behaviors early,block their spread,and provide certain support for the security of the whole network.

    IV.ROUTING UPDATE

    When the routing table is initialized,all possible areas are constructed according to the routing statistics.Let the route to be processed be described asrt:(prefix,masklen)whereprefixis the destination IP prefx and themasklenis the mask length.The route insertion process is as follows:

    S1.If the routing entry is added as the default route,it is pointed to by the default route.It does not belong to any area and the LPR of all R nodes are updated.

    S2.According to the 1-16 bits of theprefix,determine the routing storage area where it is located,and obtain R nodes.

    S3.Take the value of 17-32 bits in the prefx asP1,and locate the child node according toP1.If there is no such node,change the type of this node from NULL to ordinary.

    S4.If 16

    S5.Take the value of 33-48 bits in the prefx asP2,and locate the child node of T1-ND according toP2.If there is no such node,change the type of this node from NULL to ordinary.

    S6.If 32

    S7.If 48

    The route deletion process is similar to the route addition process.The routing area and the tree node are mainly located according toprefixandmasklen.After deleting a route,if the tree node or the subtree rooted at it is empty,delete the corresponding empty node and empty subtrie.Due to the addition or deletion of routes,LPR of some nodes may change and the consistency of the LPR shall be maintained according to Algorithm 2.

    V.PERFORMANCE EVALUATION

    For evaluation,we downloaded the current routing table from bgp.potaroo.net and implemented the algorithm on the Linux platform.In order to adapt to the application environment of the edge router,the sizes of the selected routing tables TABLE-A and TABLE-B are 5k and 6k,respectively.The CPU confguration of the experiment is the Intel Core i7TM 6700 processor,and the software compilation environment is Visual C++2015.

    Figure 2 shows that the distribution of routing items is characteristic.The routing items with a prefx length of 32 account for 17%,and the routing items with a length of 48 account for the most,accounting for 48%,and the prefx distribution is mainly concentrated in 32-48.According to this feature,we search in steps of 16 bits.

    Figure 2.Prefix length distribution.

    Figure 3.Number of routes per layer in each area.

    Figure 3 further analyzes the number of routes with prefx lengths of 17-32,33-48,and 49-64 in each area.17-32 routes are stored in the T1 array in the form of SV-RT,33-48 routes are stored under the T2 array in the form of SV-RT,and routes longer than 48 are stored in the form of EX-RT.

    5.1 Lookup Speed and Timing Analysis

    Figure 4.The percent of lookup times for real time traffic on TABLE-A and TABLE-B.

    We implement the LPR scheme described in Section III and compare it with TSB[2].TSB has three-stage for IPv6 routing table lookup.In the frst stage,2001 was used as the root node.Because the algorithm was proposed in the year of 2006,the frst 16 bits of the IPv6 addresses of traffc on the IPv6 network at that time only had 9 values,and most started with 2001.Part of the traffc can be matched in one search on the binary tree.The second stage uses two different data structures.Node 2001 links segment table,while the other 8 nodes link routing buckets.The segment table is composed of 17-32 bits of the routing prefx,and the length is 16 bits.The third stage is the routing bucket linked to the segment table.It is a collection of routing table entries.According to the number of routing table entries in the routing bucket,the routing buckets can be organized in different ways.

    In Figure 4,the number of memory accesses are shown.For most routes,the longest prefx route can be matched by three searches,and the search process is R array→T1 array→SV-RT of T1,and the result is returned directly in SV-RT of T1.In particular,since the virtual node is being constructed,a pointer to the ordinary node of the same array has been established.When the virtual node is matched,the corresponding node can be found directly through the pointer,which reduces the number of searches.

    Table 1 depicts lookup speed and memory requirements of LPR and TSB.The average numbers of searches of the LPR and TSB for TABLE-A are 3.54 and 6.81,respectively.For TSB,in the year of 2006,most routing prefxes start with 2001,and there are very few routing prefxes that start with other values,so that most of the traffc only needs to be matched once on the binary tree.Now,there are 52 values in the frst 16 bits.The routes beginning with 2001 arestill the most,but only account for 14%.Therefore,only using 2001 as the root node is not suitable for current traffc characteristics.Due to the fast growth of the routing table,the number of segment tables and the size of the routing bucket in TSB have increased signifcantly.In LPR,we store the frst 16-bit value in the R array,whose memory consumption is fxed,and the corresponding root node can be located in only one search because of the characteristic of the structure of array.

    Table 3.Lookup speed and memory requirements of LPR and TSB.

    The worst case of the LPR algorithm requires 8 searches,namely R array→T1 array→T2 array→EX-RT of T2→T2 array.When the destination address matches the EX-RT list of T2 array once,the routes are searched one by one,however the search fails,and T2 array are searched once again,returning the LPR under the node at the same layer.But only about 4.72%of the traffc needs to be searched 8 times.

    In terms of memory consumption,although we use a three-level array structure,in fact most of the routes are stored in the form of SV-RT under the T1 array,and the T2 array is not developed.When the number of routes exceeds a lot,the linear search will greatly reduce the search speed.Therefore,we set the thresholdKGR,andKEX.Table 3 shows the size of memory consumption withKGR=3 andKEX=3.

    5.2 Keep-Alive Time

    For the different keep-alive time of virtual nodes,the number of visits and the destruction and reconstruction times of the virtual nodes in the keep-alive time are different.The experimental results show that when the input actual fow duration is 24h,the keep-alive timeτis set to 0,1h,2h and 3h,respectively.When the keep-alive time is set to a small value,the storage overhead of the virtual node is small,but it needs to be destroyed and re-established multiple times.Due to the local characteristics of traffc,as the keep-alive time increases,the number of new virtual nodes decreases signifcantly.The update of the virtual node is stable,and it occupies less memory.But overall,the virtual node has less impact on memory overhead.

    Figure 5.The change of the number of virtual nodes with time.

    Figure 6.The change of refresh times with different τ.

    Table 4.Num of V-ND with different τ.

    Table 5.Repeat times with different τ.

    Figure 7.The lookup time with different keep-alive times of V-ND.

    Figure 5 shows the number of virtual nodes that changes over time.For the same routing table,the number of virtual nodes is relatively stable as time goes on.Table 4 lists the average numbers of virtual nodes established in our structure with three keepalive times.The number of times the virtual node is refreshed indicates the number of times the virtual node is repeatedly accessed during the keep-alive time.Table 5 is the average refresh times,and the change of refresh times with differentτis shown in Figure 6.From Figure 6,we learn that only a few virtual nodes refresh frequently.

    Figure 7 illustrates that during the real destination queries for 3 hours,as we prolong the keep-alive time,the lookup decrease continuously.Moreover,we hope that the addition and deletion of virtual nodes is not too frequent.The update time of each virtual node has a great infuence on the overall search time,so a longer keep-alive time is required.According to the performance of hardware devices,the locality of traffc and peoples access habits,we recommend setting the keep-alive time to two days as a reference.In Figure 8,the numbers of reconstructions of each virtual node vary according to differentτ.A largerτresults in a less create times for one virtual node.

    VI.CONCLUSION

    Figure 8.The effect of different keep-alive times on the number of virtual node reconstructions.

    In this paper we propose a LPR-Trie extended from multi-bit Trie,and corresponding routing lookup algorithm.Combining the characteristics of the IPv6 address and the backbone network routing tables,the LPR algorithm is very effcient for IPv6 routing tables whose most prefx lengths distribute in/48.This algorithm calculates the pointer of the virtual node,which points to the longest prefx matching routing entry to achieve fast routing matching.The use of virtual node signifcantly reduces the number of memory accesses and improves the search speed.Experimental results show that our search speed is 3.49 times that of TSB.Our average number of searches is 3.41,while TSB needs 6.81 searches on average.And the memory size occupied by TSB is about 1.5 times that of LPR.In addition,due to the locality of actual traffc,a reasonable setting of the keep-alive time of the virtual node makes the data structure more stable and have less impact on memory consumption.Experimental results show that the algorithm has better storage and search performance,and it has good scalability.

    ACKNOWLEDGMENT

    We gratefully acknowledge the support from the National Natural Science Foundation of China(61872252),National Key Research and Development Program of China(2018YFB1800403),the Beijing Natural Science Foundation(4202012)and the Science and Technology Project of Beijing Municipal Commission of Education in China(KM201810028017).

    国产成人freesex在线| 国产高清国产精品国产三级| 999精品在线视频| 国产精品久久久久久av不卡| 九色成人免费人妻av| av免费观看日本| 国产精品久久久久久久电影| 亚洲精品美女久久av网站| 秋霞伦理黄片| 亚洲国产精品成人久久小说| 国产国拍精品亚洲av在线观看| 欧美日韩视频精品一区| 精品熟女少妇av免费看| 久久精品国产亚洲av涩爱| 日韩视频在线欧美| 老熟女久久久| 在线观看www视频免费| 中文字幕精品免费在线观看视频 | 香蕉精品网在线| 中文字幕av电影在线播放| 我的女老师完整版在线观看| 91aial.com中文字幕在线观看| 精品熟女少妇av免费看| 人人妻人人澡人人爽人人夜夜| 欧美激情国产日韩精品一区| 亚洲国产精品国产精品| 久久久久国产精品人妻一区二区| av国产精品久久久久影院| 欧美精品国产亚洲| 交换朋友夫妻互换小说| 午夜福利,免费看| av在线app专区| 午夜激情福利司机影院| 卡戴珊不雅视频在线播放| 精品国产乱码久久久久久小说| 天堂中文最新版在线下载| 久久精品人人爽人人爽视色| a级片在线免费高清观看视频| 熟女人妻精品中文字幕| 免费观看性生交大片5| 欧美国产精品一级二级三级| 亚洲精品日韩av片在线观看| 男的添女的下面高潮视频| 久久久久久久久久久免费av| 久久av网站| 伊人久久国产一区二区| 在线观看www视频免费| 国产精品久久久久久精品古装| 婷婷色av中文字幕| 内地一区二区视频在线| 午夜精品国产一区二区电影| 婷婷色av中文字幕| 热re99久久精品国产66热6| 国产一级毛片在线| 久久国内精品自在自线图片| 男男h啪啪无遮挡| 男女高潮啪啪啪动态图| 亚洲精品,欧美精品| 欧美最新免费一区二区三区| 欧美激情国产日韩精品一区| 国产高清三级在线| 成年av动漫网址| 51国产日韩欧美| 大片免费播放器 马上看| 亚洲情色 制服丝袜| 一区二区av电影网| 高清午夜精品一区二区三区| 久久久久国产网址| 日韩精品免费视频一区二区三区 | 久久毛片免费看一区二区三区| 亚洲精品乱码久久久v下载方式| av播播在线观看一区| 亚洲精品亚洲一区二区| 久久狼人影院| 亚洲美女搞黄在线观看| 亚洲欧美清纯卡通| 久久97久久精品| 亚洲国产av影院在线观看| av专区在线播放| 男人添女人高潮全过程视频| 99久久精品国产国产毛片| 夜夜看夜夜爽夜夜摸| 看免费成人av毛片| 黑人猛操日本美女一级片| 久久久久久久久大av| 男人操女人黄网站| 18在线观看网站| 久久久亚洲精品成人影院| 最近中文字幕2019免费版| 亚洲国产日韩一区二区| 免费人成在线观看视频色| 亚洲欧美日韩另类电影网站| av电影中文网址| 久久99热这里只频精品6学生| 精品一区在线观看国产| 777米奇影视久久| 色吧在线观看| 69精品国产乱码久久久| 国产精品偷伦视频观看了| 22中文网久久字幕| 午夜福利在线观看免费完整高清在| 国产成人午夜福利电影在线观看| 日日啪夜夜爽| 美女国产高潮福利片在线看| 99久国产av精品国产电影| 青春草亚洲视频在线观看| 丰满乱子伦码专区| 亚洲国产精品专区欧美| 精品久久久久久久久亚洲| 中文字幕人妻丝袜制服| 国产精品一区二区三区四区免费观看| 97超碰精品成人国产| 精品视频人人做人人爽| 欧美 日韩 精品 国产| 999精品在线视频| 建设人人有责人人尽责人人享有的| 秋霞在线观看毛片| 亚洲欧美一区二区三区国产| 午夜福利影视在线免费观看| 久久国内精品自在自线图片| 中文字幕精品免费在线观看视频 | 秋霞伦理黄片| 伊人久久国产一区二区| 九九爱精品视频在线观看| 国产精品蜜桃在线观看| 91精品国产九色| 午夜福利影视在线免费观看| 黑人猛操日本美女一级片| 中文乱码字字幕精品一区二区三区| a级毛片免费高清观看在线播放| 美女xxoo啪啪120秒动态图| 在线 av 中文字幕| 日日摸夜夜添夜夜爱| 亚洲国产色片| kizo精华| 美女主播在线视频| 亚洲国产最新在线播放| 亚洲欧美色中文字幕在线| 免费av不卡在线播放| 精品一区二区免费观看| 免费日韩欧美在线观看| 日韩在线高清观看一区二区三区| 国产精品无大码| 亚洲国产精品一区三区| 香蕉精品网在线| 国产精品一区二区三区四区免费观看| 成人国语在线视频| 一区在线观看完整版| 日本黄色日本黄色录像| 国产精品免费大片| 三上悠亚av全集在线观看| av在线播放精品| 卡戴珊不雅视频在线播放| 午夜福利视频精品| 欧美国产精品一级二级三级| 少妇人妻 视频| 肉色欧美久久久久久久蜜桃| 日韩精品免费视频一区二区三区 | 日韩不卡一区二区三区视频在线| 国产黄色免费在线视频| 18在线观看网站| 高清午夜精品一区二区三区| 黑丝袜美女国产一区| 国产精品久久久久久久电影| 一级毛片黄色毛片免费观看视频| 亚洲欧美精品自产自拍| 一级,二级,三级黄色视频| 交换朋友夫妻互换小说| 色视频在线一区二区三区| 亚洲精品国产av蜜桃| 99国产综合亚洲精品| 各种免费的搞黄视频| 国产精品久久久久久精品电影小说| 欧美变态另类bdsm刘玥| 少妇人妻 视频| 99久久精品国产国产毛片| 精品一区二区三卡| 国产极品粉嫩免费观看在线 | 久久精品国产亚洲av涩爱| 国产欧美日韩综合在线一区二区| 大香蕉97超碰在线| 国产探花极品一区二区| 日韩中文字幕视频在线看片| 亚洲精品成人av观看孕妇| 91精品三级在线观看| 搡女人真爽免费视频火全软件| 最后的刺客免费高清国语| 欧美一级a爱片免费观看看| 精品人妻偷拍中文字幕| 毛片一级片免费看久久久久| 亚洲精品久久成人aⅴ小说 | 一级黄片播放器| 亚洲久久久国产精品| 人人妻人人澡人人看| 人妻人人澡人人爽人人| 午夜福利,免费看| 九九久久精品国产亚洲av麻豆| 久久久久网色| 欧美日本中文国产一区发布| 国产男人的电影天堂91| 飞空精品影院首页| 久久99一区二区三区| 狂野欧美激情性xxxx在线观看| 亚洲精品456在线播放app| 99国产综合亚洲精品| 精品一区在线观看国产| 九九爱精品视频在线观看| 中文字幕制服av| 中文乱码字字幕精品一区二区三区| 精品国产一区二区三区久久久樱花| 精品人妻熟女毛片av久久网站| 亚洲少妇的诱惑av| 国产成人一区二区在线| 欧美日韩一区二区视频在线观看视频在线| 交换朋友夫妻互换小说| 亚洲美女黄色视频免费看| 日韩一本色道免费dvd| 波野结衣二区三区在线| 日本欧美视频一区| 香蕉精品网在线| 日本91视频免费播放| 中文字幕人妻熟人妻熟丝袜美| 亚洲国产日韩一区二区| 免费高清在线观看视频在线观看| 只有这里有精品99| 国产欧美亚洲国产| 亚洲经典国产精华液单| 街头女战士在线观看网站| freevideosex欧美| 亚洲欧美一区二区三区黑人 | 久久精品国产自在天天线| 国产国语露脸激情在线看| 精品久久蜜臀av无| www.色视频.com| 亚洲,一卡二卡三卡| 日本av手机在线免费观看| 亚洲色图综合在线观看| 黄色视频在线播放观看不卡| 婷婷成人精品国产| 精品久久久噜噜| 日本欧美视频一区| 免费高清在线观看日韩| 高清黄色对白视频在线免费看| 成年美女黄网站色视频大全免费 | 欧美成人午夜免费资源| 国产精品久久久久久久久免| 在线看a的网站| 精品人妻一区二区三区麻豆| 考比视频在线观看| 欧美xxⅹ黑人| 国产在线视频一区二区| 国产成人一区二区在线| 久久国产精品大桥未久av| 久久久午夜欧美精品| 一区在线观看完整版| 男的添女的下面高潮视频| 极品人妻少妇av视频| 一级a做视频免费观看| 一二三四中文在线观看免费高清| 国产精品嫩草影院av在线观看| 久久久精品区二区三区| 在线播放无遮挡| 一级爰片在线观看| 久久这里有精品视频免费| 日本免费在线观看一区| 国产成人免费观看mmmm| 亚洲国产色片| 男人添女人高潮全过程视频| 国产女主播在线喷水免费视频网站| 有码 亚洲区| 老司机影院成人| 午夜福利,免费看| 欧美日韩综合久久久久久| 成人国产麻豆网| 国产高清有码在线观看视频| 精品一区二区三卡| 一区二区三区精品91| 最近中文字幕高清免费大全6| 国产一级毛片在线| 伦理电影大哥的女人| 国产成人精品婷婷| 最近的中文字幕免费完整| 亚洲丝袜综合中文字幕| 成人毛片a级毛片在线播放| 午夜激情久久久久久久| 精品人妻熟女av久视频| 免费看不卡的av| 免费人妻精品一区二区三区视频| 久久 成人 亚洲| 涩涩av久久男人的天堂| freevideosex欧美| 日韩欧美一区视频在线观看| 考比视频在线观看| 成人亚洲欧美一区二区av| 亚洲国产精品专区欧美| 18禁在线无遮挡免费观看视频| 国产视频内射| 久久av网站| 只有这里有精品99| 国产欧美另类精品又又久久亚洲欧美| 性色avwww在线观看| 嘟嘟电影网在线观看| 亚洲中文av在线| 日本午夜av视频| 亚洲av福利一区| 日韩 亚洲 欧美在线| 国产淫语在线视频| 国产黄色免费在线视频| 五月玫瑰六月丁香| 美女cb高潮喷水在线观看| 免费少妇av软件| 夜夜看夜夜爽夜夜摸| 国产精品一国产av| 男女高潮啪啪啪动态图| 51国产日韩欧美| 国产av一区二区精品久久| av有码第一页| 国产精品一国产av| 久久 成人 亚洲| 国模一区二区三区四区视频| 伊人久久国产一区二区| 免费观看在线日韩| 超色免费av| 搡老乐熟女国产| 日韩一区二区三区影片| 日日摸夜夜添夜夜添av毛片| 亚洲av欧美aⅴ国产| 国产国语露脸激情在线看| 久久精品久久精品一区二区三区| 高清毛片免费看| 国产免费现黄频在线看| 久久久久久伊人网av| 18禁在线无遮挡免费观看视频| 午夜福利视频精品| av在线app专区| 午夜福利视频在线观看免费| av.在线天堂| 国产黄频视频在线观看| 国产av国产精品国产| 美女视频免费永久观看网站| 亚洲精品乱码久久久v下载方式| 国产有黄有色有爽视频| 日本av免费视频播放| 国产 一区精品| 久久国产亚洲av麻豆专区| 婷婷成人精品国产| 精品人妻熟女毛片av久久网站| 国产精品一国产av| 国产高清国产精品国产三级| 亚洲av综合色区一区| 精品人妻熟女毛片av久久网站| 色吧在线观看| 久久国内精品自在自线图片| 亚洲av不卡在线观看| 免费av不卡在线播放| 成人国产麻豆网| 91精品伊人久久大香线蕉| 2021少妇久久久久久久久久久| 亚洲图色成人| 在线看a的网站| 青春草亚洲视频在线观看| 老女人水多毛片| 亚洲第一av免费看| 国产精品国产三级专区第一集| 久久 成人 亚洲| 一级爰片在线观看| www.av在线官网国产| 欧美日韩成人在线一区二区| 日日摸夜夜添夜夜爱| 中文字幕亚洲精品专区| 五月开心婷婷网| 黑人高潮一二区| 大香蕉97超碰在线| 亚洲精品美女久久av网站| 日本色播在线视频| 一区二区三区四区激情视频| 97在线人人人人妻| 国产欧美亚洲国产| 国产国拍精品亚洲av在线观看| 亚洲欧美清纯卡通| 久久久久久久亚洲中文字幕| 午夜日本视频在线| 精品少妇久久久久久888优播| 国产精品麻豆人妻色哟哟久久| 精品国产乱码久久久久久小说| 国产成人av激情在线播放 | 蜜桃久久精品国产亚洲av| kizo精华| 亚洲国产日韩一区二区| 免费播放大片免费观看视频在线观看| 一区二区三区乱码不卡18| 狠狠精品人妻久久久久久综合| 九九在线视频观看精品| 亚洲怡红院男人天堂| 国产精品久久久久久精品电影小说| 一区二区日韩欧美中文字幕 | 女人久久www免费人成看片| 日韩大片免费观看网站| 日韩免费高清中文字幕av| 人人妻人人爽人人添夜夜欢视频| 久久免费观看电影| 亚洲色图综合在线观看| 精品亚洲成国产av| 性高湖久久久久久久久免费观看| 日韩伦理黄色片| a级毛片免费高清观看在线播放| 久久久久久久大尺度免费视频| 久久人妻熟女aⅴ| 一级二级三级毛片免费看| 蜜桃国产av成人99| 日本黄大片高清| 国产精品一区二区在线不卡| 热re99久久精品国产66热6| 精品久久久精品久久久| av又黄又爽大尺度在线免费看| 国产成人免费无遮挡视频| 欧美3d第一页| 亚洲在久久综合| 69精品国产乱码久久久| a级毛片免费高清观看在线播放| 简卡轻食公司| 十八禁网站网址无遮挡| 午夜av观看不卡| 91久久精品国产一区二区成人| 三上悠亚av全集在线观看| 女性生殖器流出的白浆| 国产亚洲午夜精品一区二区久久| 毛片一级片免费看久久久久| 精品一区二区三卡| 国产精品 国内视频| 日日爽夜夜爽网站| 久久久国产欧美日韩av| 久久久久久久久久久久大奶| 欧美性感艳星| 国产精品国产三级国产专区5o| 80岁老熟妇乱子伦牲交| 亚洲精品久久久久久婷婷小说| 日日摸夜夜添夜夜爱| 国产免费又黄又爽又色| 汤姆久久久久久久影院中文字幕| 在线观看免费高清a一片| 亚洲三级黄色毛片| 最新的欧美精品一区二区| 一二三四中文在线观看免费高清| 日韩一区二区三区影片| 免费黄频网站在线观看国产| 久久女婷五月综合色啪小说| 爱豆传媒免费全集在线观看| 99九九在线精品视频| 久久久久久久久久久丰满| 一级,二级,三级黄色视频| 欧美日韩视频高清一区二区三区二| 亚洲精品乱码久久久v下载方式| 伦理电影大哥的女人| 日韩av免费高清视频| 99热6这里只有精品| av.在线天堂| 日韩大片免费观看网站| 插阴视频在线观看视频| 国产不卡av网站在线观看| 精品一区二区免费观看| 国产精品熟女久久久久浪| 日本欧美视频一区| 亚洲精品视频女| 日日爽夜夜爽网站| 国产精品久久久久久久久免| 亚洲第一区二区三区不卡| 色哟哟·www| 亚洲国产精品国产精品| 亚洲精品视频女| 大片免费播放器 马上看| 日韩精品免费视频一区二区三区 | 波野结衣二区三区在线| 国产一区二区在线观看av| 久久久久网色| 99久久精品一区二区三区| 亚洲精品视频女| 黄色毛片三级朝国网站| 久热这里只有精品99| 如日韩欧美国产精品一区二区三区 | 免费黄网站久久成人精品| 永久免费av网站大全| 啦啦啦视频在线资源免费观看| 欧美丝袜亚洲另类| 亚洲av二区三区四区| 国产成人免费观看mmmm| 午夜激情福利司机影院| 欧美最新免费一区二区三区| 有码 亚洲区| 熟妇人妻不卡中文字幕| 国产精品偷伦视频观看了| 美女福利国产在线| 久久毛片免费看一区二区三区| 日韩一本色道免费dvd| 久久国产亚洲av麻豆专区| av在线app专区| 日韩av不卡免费在线播放| 亚洲高清免费不卡视频| 国产成人精品一,二区| 中文天堂在线官网| 搡老乐熟女国产| 97精品久久久久久久久久精品| 亚洲久久久国产精品| 一边亲一边摸免费视频| 亚洲五月色婷婷综合| 日韩成人伦理影院| xxx大片免费视频| 亚洲人成网站在线播| 高清午夜精品一区二区三区| 人人澡人人妻人| 国产爽快片一区二区三区| 免费人妻精品一区二区三区视频| 国产精品嫩草影院av在线观看| 亚洲经典国产精华液单| 久久人人爽人人爽人人片va| 狠狠精品人妻久久久久久综合| 高清午夜精品一区二区三区| 91久久精品国产一区二区成人| 美女中出高潮动态图| 亚洲av国产av综合av卡| 精品国产国语对白av| 精品亚洲乱码少妇综合久久| 国产 一区精品| 国产成人aa在线观看| 肉色欧美久久久久久久蜜桃| 久久 成人 亚洲| a级片在线免费高清观看视频| 亚州av有码| 成年av动漫网址| 国产极品粉嫩免费观看在线 | 欧美xxxx性猛交bbbb| 久久久久久久久久人人人人人人| 亚洲内射少妇av| 天堂俺去俺来也www色官网| 精品熟女少妇av免费看| 制服人妻中文乱码| 午夜免费观看性视频| 少妇人妻 视频| 18禁动态无遮挡网站| 欧美精品一区二区免费开放| 老司机亚洲免费影院| 午夜福利,免费看| 一级片'在线观看视频| 女的被弄到高潮叫床怎么办| 纵有疾风起免费观看全集完整版| 中文字幕av电影在线播放| 国产淫语在线视频| 亚洲av成人精品一二三区| 国产 精品1| 全区人妻精品视频| 国产视频首页在线观看| 精品视频人人做人人爽| 国产欧美另类精品又又久久亚洲欧美| 丝瓜视频免费看黄片| 国产av码专区亚洲av| 久久 成人 亚洲| 免费看不卡的av| 精品久久蜜臀av无| 超碰97精品在线观看| 天堂中文最新版在线下载| 亚洲精品久久午夜乱码| 国产精品99久久久久久久久| 成人国产av品久久久| 大片免费播放器 马上看| h视频一区二区三区| 日韩av免费高清视频| 国产色婷婷99| 日韩中文字幕视频在线看片| 中文字幕亚洲精品专区| 欧美精品一区二区免费开放| 久久精品国产亚洲网站| 亚洲精品自拍成人| 热99国产精品久久久久久7| 插逼视频在线观看| 天美传媒精品一区二区| 又黄又爽又刺激的免费视频.| 精品一区二区免费观看| 亚洲av综合色区一区| 欧美精品一区二区免费开放| 人妻少妇偷人精品九色| 欧美+日韩+精品| 中文字幕最新亚洲高清| 日韩成人伦理影院| 亚洲欧洲精品一区二区精品久久久 | 国产一区二区在线观看av| 人妻系列 视频| 欧美亚洲 丝袜 人妻 在线| 春色校园在线视频观看| 成人亚洲精品一区在线观看| 日韩人妻高清精品专区| xxxhd国产人妻xxx| 免费看不卡的av| 精品午夜福利在线看| 久久久久久久久久久丰满| 最新的欧美精品一区二区| 99久国产av精品国产电影| 制服丝袜香蕉在线| 国产av国产精品国产| 成年人免费黄色播放视频| 国产高清国产精品国产三级| 国产免费又黄又爽又色| 自拍欧美九色日韩亚洲蝌蚪91| 晚上一个人看的免费电影| 亚洲天堂av无毛| 最近2019中文字幕mv第一页| 亚洲精品视频女| 国产精品一区www在线观看| 伦理电影大哥的女人| 9色porny在线观看| 中国美白少妇内射xxxbb| 又粗又硬又长又爽又黄的视频| av黄色大香蕉| av福利片在线| 91精品国产九色| 欧美bdsm另类|