Distributed caching architecture for computer networks
First Claim
1. A method comprising:
- hashing at a first processor a first resource identifier to create a hash key, wherein said first resource identifier identifies a first resource;
transmitting from said first processor to a second processor said hash key and a request for said first resource; and
receiving at said first processor a second resource in response to the transmission of said hash key and said request for said first resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A distributed chaching technique for use in computer networks is disclosed. The illustrative embodiment is particularly advantageous in computer networks that comprises a hierarchical topology because it removes some of the computational tasks associated with chaching away from the network nodes that act as caches to other network nodes that are less burdened with computational tasks. Furthermore, some embodiments of the present invention use hash tables to facilitate the storage and retrieval of cached resources. The illustrative embodiment of the present invention comprises: hashing at a first processor a first resource identifier to create a hash key, wherein the first resource identifier identifies a first resource; transmitting from the first processor to a second processor the hash key and a request for the first resource; and receiving at the first processor a second resource in response to the transmission of the hash key and the request for the first resource from the first processor to the second processor.
-
Citations
22 Claims
-
1. A method comprising:
-
hashing at a first processor a first resource identifier to create a hash key, wherein said first resource identifier identifies a first resource;
transmitting from said first processor to a second processor said hash key and a request for said first resource; and
receiving at said first processor a second resource in response to the transmission of said hash key and said request for said first resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a first processor for hashing a first resource identifier to create a hash key, wherein said first resource identifier identifies a first resource;
a transmitter for transmitting said hash key and a request for said first resource to a second processor; and
a receiver for receiving a second resource in response to the transmission of said hash key and said request for said first resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving a request for a first resource and a hash key that is a hashed function of a first resource identifier;
retrieving said first resource and said first resource identifier from a data structure that is indexed by said hash key; and
transmitting said first resource and said first resource identifier in response to said request for said first resource.
-
-
16. An apparatus comprising:
-
a receiver for receiving a request for a first resource and a hash key that is a hashed function of a first resource identifier;
a processor for retrieving said first resource and said first resource identifier from a data structure that is indexed by said hash key; and
a transmitter for transmitting said first resource and said first resource identifier in response to said request for said first resource.
-
-
17. A method comprising:
-
receiving at a first processor a first resource identifier that identifies a first resource, a hash key that is a hashed function of said first resource identifier, and a request for a first resource;
retrieving a second resource and a second resource identifier from a data structure that is indexed by said hash key;
verifying that said second resource is said first resource by comparing said second resource identifier to said first resource identifier; and
transmitting said second resource to said first processor when said second resource is verified as said first resource.
-
-
18. An apparatus comprising:
-
a receiver for receiving at a first processor a first resource identifier that identifies a first resource, a hash key that is a hashed function of said first resource identifier, and a request for a first resource;
a processor for retrieving a second resource and a second resource identifier from a data structure that is indexed by said hash key, and for verifying that said second resource is said first resource by comparing said second resource identifier to said first resource identifier; and
a transmitter for transmitting said second resource to said first processor when said second resource is verified as said first resource.
-
-
19. A method comprising:
-
hashing at a first processor a first resource identifier to create a hash key, wherein said first resource identifier identifies a first resource;
transmitting from said first processor to a second processor said hash key and a request for said first resource when said all or a portion of said hash key is contained in a list of valid hash keys associated with said first processor; and
receiving at said first processor said first resource in response to the transmission of said hash key and said request for said first resource.
-
-
20. An apparatus comprising:
-
a processor for hashing at a first processor a first resource identifier to create a hash key, wherein said first resource identifier identifies a first resource, and for verifying that all or a portion of said hash key is contained in a list of valid hash keys;
a transmitter for transmitting from said first processor to a second processor said hash key and a request for said first resource; and
a receiver for receiving said first resource in response to the transmission of said hash key and said request for said first resource.
-
-
21. A method comprising:
-
receiving at a first processor a request for a first resource and a first hash key that is a hashed function of a first resource identifier;
retrieving a second resource and a first portion of a second hash key from a data structure that is indexed by a first portion of said first hash key;
verifying that said second resource is said first resource by comparing a second portion of said first hash key to said first portion of said second hash key; and
transmitting said second resource to said first processor when said second resource is verified as said first resource.
-
-
22. An apparatus comprising:
-
a receiver for receiving at a first processor a request for a first resource and a first hash key that is a hashed function of a first resource identifier;
a processor for retrieving a second resource and a first portion of a second hash key from a data structure that is indexed by a first portion of said first hash key, and for verifying that said second resource is said first resource by comparing a second portion of said first hash key to said first portion of said second hash key; and
a transmitter for transmitting said second resource to said first processor when said second resource is verified as said first resource.
-
Specification