{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T09:10:02Z","timestamp":1745399402260,"version":"3.40.4"},"reference-count":31,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T00:00:00Z","timestamp":1354665600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2014,10]]},"abstract":"<jats:title>SUMMARY<\/jats:title><jats:p>In networks with identifier\/locator separation, border routers often cache recently used identifier\u2010to\u2010locator mappings of remote hosts and set a time to live (TTL) for each mapping. We consider two options to update the TTL of a mapping, designated as no\u2010reset (NR) and with\u2010reset (WR) modes. In the NR mode, once a mapping is cached, its TTL is set to a default value called cache timeout, and the mapping is removed when the TTL expires. By contrast, in the WR mode, whenever the mapping is queried, its TTL is reset to the cache timeout. Although it is not difficult to intuitively observe that the WR mode performs better than the NR mode in terms of cache hit rate, it is still of interest to evaluate what is the benefit gained by using the WR mode rather than the NR mode and what is the cost incurred to achieve this gain. Another equivalent question is what is the additional cost incurred in terms of resources for the NR mode to perform similarly to the WR mode. We model the cache hit rate and compare the performance of the WR and NR modes for flat and aggregatable identifiers by analysis and simulation, and estimate how much more cache size the NR mode requires to achieve similar cache hit rate and communication interruptions to the WR mode. The comparison results provide rational to use the WR mode, rather than the NR mode, for identifier\u2010to\u2010locator mapping caches. Copyright \u00a9 2012 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/dac.2478","type":"journal-article","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T20:11:57Z","timestamp":1354738317000},"page":"2324-2342","source":"Crossref","is-referenced-by-count":1,"title":["Time to live of identifier\u2010to\u2010locator mappings: with\u2010reset or no\u2010reset"],"prefix":"10.1002","volume":"27","author":[{"given":"Xiaoqian","family":"Li","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Interconnection Devices Beijing Jiaotong University Beijing 100044 China"}]},{"given":"Moshe","family":"Zukerman","sequence":"additional","affiliation":[{"name":"City University of Hong Kong Tat Chee Avenue, Kowloon Hong Kong China"}]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Interconnection Devices Beijing Jiaotong University Beijing 100044 China"}]},{"given":"Hongbin","family":"Luo","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Interconnection Devices Beijing Jiaotong University Beijing 100044 China"}]},{"given":"Feng","family":"Qiu","sequence":"additional","affiliation":[{"name":"Communications and Electromagnetism Security Lab Institute of Information Engineering Chinese Academy of Sciences, Beijing China"}]},{"given":"Hongke","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Next Generation Internet Interconnection Devices Beijing Jiaotong University Beijing 100044 China"}]}],"member":"311","published-online":{"date-parts":[[2012,12,5]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"crossref","unstructured":"MeyerD ZhangL FallK.Report from the IAB workshop on routing and addressing.IETF Internet Standard RFC 4984 September2007.","DOI":"10.17487\/rfc4984"},{"key":"e_1_2_8_3_1","doi-asserted-by":"crossref","unstructured":"FarinacciD MeyerD LewisD.Locator\/ID Separation Protocol (LISP).IETF Internet Draft draft\u2010ietf\u2010lisp\u201024 November2012.","DOI":"10.17487\/rfc6830"},{"key":"e_1_2_8_4_1","unstructured":"AtkinsonRJ.ILNP ilnp architectural description.IRTF Internet Draft draft\u2010irtf\u2010rrg\u2010ilnp\u2010arch\u201006 July2012."},{"key":"e_1_2_8_5_1","unstructured":"MenthM HartmannM KleinD.Global locator Local locator and Identifier Split (GLI\u2010Split).Technical Report 470 University of W\u00fcrzburg Institute of Computer Science April2010."},{"issue":"10","key":"e_1_2_8_6_1","first-page":"1790","article-title":"A DHT\u2010based identifier\u2010to\u2010locator mapping approach for a scalable internet","volume":"20","author":"Luo H","year":"2009","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_2_8_7_1","doi-asserted-by":"crossref","unstructured":"JungJ BergerAW BalakrishnanH.Modeling TTL\u2010based Internet caches.INFOCOM 2003 CA USA 2003;417\u2013426.","DOI":"10.1109\/INFCOM.2003.1208693"},{"key":"e_1_2_8_8_1","doi-asserted-by":"crossref","unstructured":"IannoneL BonaventureO.On the cost of caching Locator\/ID mappings.2007 ACM CoNEXT Conference NY USA 2007;1\u201312.","DOI":"10.1145\/1364654.1364663"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.009"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20757-0_29"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.101011"},{"key":"e_1_2_8_12_1","unstructured":"FullerV FarinacciD MeyerD LewisD.LISP Alternative Topology (LISP+ALT).IETF Internet Draft draft\u2010ietf\u2010lisp\u2010alt\u201010 December2011."},{"key":"e_1_2_8_13_1","doi-asserted-by":"crossref","unstructured":"LiX QiuF DongP ZhangH.One\u2010hop DHT resolution of Locator\/ID mapping.The 2010 2nd IEEE International Conference on Network Infrastructure and Digital Content Beijing China 2010;417\u2013423.","DOI":"10.1109\/ICNIDC.2010.5657801"},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"MathyL IannoneL.LISP\u2010DHT: towards a DHT to map identifiers onto locators.ReArch 2008 Madrid Spain 2008;1\u20136.","DOI":"10.1145\/1544012.1544073"},{"key":"e_1_2_8_15_1","doi-asserted-by":"crossref","unstructured":"LiX QiuF DongP ZhangH.H2M2: hybrid hierarchical mapping mechanism for Locator\/Identifier separation network.The 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology Beijing China 2010;106\u2013111.","DOI":"10.1109\/ICBNMT.2010.5704878"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2152867"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1366"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2346"},{"key":"e_1_2_8_19_1","doi-asserted-by":"crossref","unstructured":"QuoitinB IannoneL LaunoisC BonaventureO.Evaluating the benefits of the Locator\/Identifier separation.ACM MobiArch 2007 Kyoto Japan 2007;1\u20136.","DOI":"10.1145\/1366919.1366926"},{"key":"e_1_2_8_20_1","doi-asserted-by":"crossref","unstructured":"DongP WangH QinY ZhangH KuoSY.Evaluation of scalable routing architecture based on Locator\/Identifier separation.IEEE GLOBECOM Workshops 2009 Honolulu Hawaii USA 2009;1\u20136.","DOI":"10.1109\/GLOCOMW.2009.5360746"},{"key":"e_1_2_8_21_1","unstructured":"de\u2009LaunoisC.Unleashing traffic engineering for IPv6 multihomed sites.Ph.D. Thesis Universite Catholique de Louvain September2005."},{"key":"e_1_2_8_22_1","unstructured":"CorasF.CoreSim: a simulator for evaluating LISP mapping systems.Master's Thesis Technical University of Cluj\u2010Napoca 2009."},{"key":"e_1_2_8_23_1","doi-asserted-by":"crossref","unstructured":"ZhangH ChenM ZhuY.Evaluating the performance on ID\/Loc mapping.IEEE GLOBECOM 2008 New Orleans LO 2008;1\u20135.","DOI":"10.1109\/GLOCOM.2008.ECP.438"},{"key":"e_1_2_8_24_1","doi-asserted-by":"crossref","unstructured":"LiX QiuF LuoH ZhangH.Modeling the TTL\u2010based mapping cache.The 2011 IET International Conference on Advanced Intelligence and Awareness Internet Beijing China 2011;41\u201345.","DOI":"10.1049\/cp.2011.1424"},{"issue":"1","key":"e_1_2_8_25_1","first-page":"1","article-title":"DNS performance and the effectiveness of caching","volume":"23","author":"Jaeyeon J","year":"2002","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"5","key":"e_1_2_8_26_1","first-page":"589","article-title":"An analytical model for the performance evaluation of stack\u2010based web cache replacement algorithms","volume":"10","author":"Jung J","year":"2010","journal-title":"International Journal of Communication Systems"},{"key":"e_1_2_8_27_1","doi-asserted-by":"crossref","unstructured":"CohenE KaolanH.Aging through cascaded caches: performance issues in the distribution of web content.ACM SIGCOMM 2001 San Diego CA USA 2001;41\u201353.","DOI":"10.1145\/964723.383063"},{"key":"e_1_2_8_28_1","doi-asserted-by":"crossref","unstructured":"CohenE HalpernE KaplanH.Performance aspects of distributed caches using TTL\u2010based consistency.Automata Languages and Programming 2001 Crete Greece 2001;744\u2013756.","DOI":"10.1007\/3-540-48224-5_61"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731092"},{"key":"e_1_2_8_30_1","unstructured":"Route views project March2012. Available from:http:\/\/www.routeviews.org\/."},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039865"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.2478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.2478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T08:34:25Z","timestamp":1745397265000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.2478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,5]]},"references-count":31,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["10.1002\/dac.2478"],"URL":"https:\/\/doi.org\/10.1002\/dac.2478","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"type":"print","value":"1074-5351"},{"type":"electronic","value":"1099-1131"}],"subject":[],"published":{"date-parts":[[2012,12,5]]}}}