Patent classifications
H04L67/1055
Mechanism to identify link down reasons
Methods, systems, and devices are provided herein for a mechanism to identify link down reasons. As described herein, a first port of a first peer device may be determined to have unexpectedly changed to a port down state. Subsequently, a topology file may be referenced to identify a second port of a second peer device with which the first peer device is intended to have a link if not for the first port being in a port down state. In some examples, port settings of the first port may be compared with port settings of the second port. If a port setting for the first port mismatches an associated port setting for the second port, an alert message may be transmitted to a network administrator indicating this mismatch as a possible reason for the first port being in the port down state.
MECHANISM TO IDENTIFY LINK DOWN REASONS
Methods, systems, and devices are provided herein for a mechanism to identify link down reasons. As described herein, a first port of a first peer device may be determined to have unexpectedly changed to a port down state. Subsequently, a topology file may be referenced to identify a second port of a second peer device with which the first peer device is intended to have a link if not for the first port being in a port down state. In some examples, port settings of the first port may be compared with port settings of the second port. If a port setting for the first port mismatches an associated port setting for the second port, an alert message may be transmitted to a network administrator indicating this mismatch as a possible reason for the first port being in the port down state.
Information processing terminal and control method
An information processing terminal on which a web browser operates includes a setting unit configured to set a limitation condition for limiting transmission of local storage data to a web server providing a web application, and a determination unit configured to determine a value indicating a status of network connection of the information processing terminal in accordance with the set limitation condition when the status of the network connection of the information processing terminal is online. Even when the status of the network connection of the information processing terminal is online, the transmission of the local storage data to the web server from the web application is limited in accordance with the determined value.
Flow control for probabilistic relay in a blockchain network
The invention relates to method for adjusting the minimum and maximum number of peer nodes that a node on the blockchain network will connect with. The adjustment takes in to account the bandwidth and processing capability of the node. Bandwidth capacity of a node is determined based on a maximum data amount processable by the node over a time period. Data is monitored passing through interfaces of the node, to and from peer nodes, and a profile factor of the node is determined from the difference between the input data to output data. Over a plurality of time periods monitoring said data the data analysed is used to set a minimum number of peer nodes and a maximum number of peer nodes connectable to the node according to said monitored data and the maximum number of peers connectable to the node. The method enables a node to adjust the number of connections according to performance limitation factors, such as bandwidth availability and processing performance. With the number of peer node connections determined, the node can further determine a correlation matrix between the interfaces and peer nodes to which it is connected. The matrix can be compiled with correlation coefficients representing the correlation between data processed at each interface of said node. The invention also resides in a corresponding computer readable storage medium, electronic device, node of a blockchain network or blockchain network having such a node.
Efficient threshold storage of data object
An example operation may include one or more of dividing a data object into a plurality of parts, hashing the data object to generate a hashed data object and hashing the plurality of parts to generate a plurality of hashed parts, generating a plurality of slices where each slice includes the hashed data object and a different respective hashed part, and distributing the plurality of slices across a plurality of blockchain peers, respectively.
Probabilistic relay for efficient propagation in a blockchain network
The invention relates to method for a node of a blockchain network, the computer-implemented method comprising receiving or generating, at a node, data for distribution in the blockchain network, said node having a plurality of interfaces, said data corresponding to an object such as a transaction or a block. The transaction can be a Bitcoin transaction for recordal in a blockchain. The method determines a correlation matrix having correlation coefficients representing the correlation between data processed at each interface of said node. From the correlation matrix a correlation index for each interface is determined. A threshold or indicator is calculated and data or objects such as Bitcoin transactions are relayed from nodes via interfaces according to a set of correlation coefficients of interface receiving the data. An indicator or threshold can derived from the correlation matrix and data is relayed if the correlation between the receiving interface and the other interface is lower than the indicator. The invention also resides in a corresponding computer readable storage medium, electronic device, node of a blockchain network, super-node of a blockchain network or blockchain network.
CONTROL METHOD, SERVER, AND RECORDING MEDIUM
A control method includes: receiving transaction data that includes (i) peer information used for connecting a first peer among peers in a P2P system to another peer among the peers and (ii) a signature added to the peer information by the first peer; verifying the received transaction data using the signature included in the transaction data; and storing the transaction data into the distributed ledger when the verifying is successful.
Flow control for probabilistic relay in a blockchain network
The invention relates to method for adjusting the minimum and maximum number of peer nodes that a node on the blockchain network will connect with. The adjustment takes in to account the bandwidth and processing capability of the node. Bandwidth capacity of a node is determined based on a maximum data amount processable by the node over a time period. Data is monitored passing through interfaces of the node, to and from peer nodes, and a profile factor of the node is determined from the difference between the input data to output data. Over a plurality of time periods monitoring said data the data analysed is used to set a minimum number of peer nodes and a maximum number of peer nodes connectable to the node according to said monitored data and the maximum number of peers connectable to the node. The method enables a node to adjust the number of connections according to performance limitation factors, such as bandwidth availability and processing performance. With the number of peer node connections determined, the node can further determine a correlation matrix between the interfaces and peer nodes to which it is connected. The matrix can be compiled with correlation coefficients representing the correlation between data processed at each interface of said node. The invention also resides in a corresponding computer readable storage medium, electronic device, node of a blockchain network or blockchain network having such a node.
INFORMATION REPORTING METHOD, RESOURCE ASSIGNING METHOD, FIRST TERMINAL AND SECOND TERMINAL
An information reporting method applied to a first terminal includes: reporting first location information to a second terminal. The first terminal is a group member in a first group, and the second terminal is a group head in the first group.
FLOW CONTROL FOR PROBABILISTIC RELAY IN A BLOCKCHAIN NETWORK
Techniques are presented for removing a connection to a peer node determined to be malicious based on transactions received from the peer node.