Abstract:
A node in a distributed network computes a hash of content for a service received in a data packet. The node verifies the data packet by comparing the hash of the content of a service received from a neighboring node to a hash of the content computed by the node. An amount of content of the service having a same identification is accumulated in a trusted execution environment (TEE) of the node, and a signature based on code stored in a TEE of the node is generated. The node then sends the data packet to the next neighboring node, where the service-related information includes the service ID, a hash of the service content and the signature. The service records with the accumulated amount of service content, accumulated hash values, and nodes' signatures are sent to the validation nodes to reach consensus for the service provided.
Abstract:
This application provides an optical link fault identification method, and relate to the field of communications technologies. The method includes: obtaining performance data of a network device, extracting a feature parameter of the performance data, and identifying a fault mode on an optical link based on the feature parameter. The method resolves problems of a difficulty in fault identification and slow troubleshooting that are caused by a large quantity of devices, many line faults, and a difficulty in obtaining manual troubleshooting cases. In addition, a fault can be quickly identified when the fault occurs, improving troubleshooting efficiency. When an optical link risk does not cause a fault, deterioration of the performance data can be found in advance based on a feature, to perform identification and warning.
Abstract:
A memory anomaly detection method and device are provided. The method includes: obtaining a first memory log, where the first memory log includes log information of a plurality of garbage collections, and log information of each garbage collection includes a garbage collection time, and includes at least one of a downtime, memory usage after garbage collection, and memory usage before garbage collection; obtaining, based on log information in a first detection time window, first statistical information corresponding to the first detection time window; and determining, based on the first statistical information corresponding to the first detection time window, an anomaly degree corresponding to the log information in the first detection time window. It can be learned that by implementing the method described in the embodiments of this application, accuracy of a detection result of a memory anomaly degree is improved.
Abstract:
Embodiments of the present invention provide a method and an apparatus for allocating a device-to-device (D2D) communication resource. The method for allocating a device-to-device D2D communication resource in the present invention comprises: receiving, by a first network device, a device-to-device D2D communication capability sent by a user device within coverage; sending, by the first network device according to the communication capability, a resource identifier to each user device within the coverage of the first network device in a D2D group, where the D2D group includes at least two user devices; and sending, by the first network device, a resource allocation message, where the resource allocation message carries D2D communication resource allocation information corresponding to the resource identifier.
Abstract:
A multi-version concurrency control method in a database and a database system, where the database system sets a data page link of a page, where the data page link includes a page pointer, and a page pointer is used to point to another version page prior to a last operation on the version page. Hence, when a page in the database is read, and when a timestamp of a current version page is greater than a timestamp of a read transaction, page-level rollback may be directly performed according to a data page link of the page that is requested to read to roll back to a page that needs to be read, which facilitates queries for data on each version page in the database, and the database system may implement record rollback efficiently.
Abstract:
The embodiments of the present invention provide a method and a trusted gateway for a WiFi terminal to access a PS service domain. The method comprises: receiving an accounting request message sent by an authentication, authorization and accounting AAA server or a dynamic host configuration protocol DHCP request message sent by the WiFi terminal; establishing, by a trusted gateway, a first packet data protocol PDP context connection or a first packet data network PDN connection with the PS service domain according to attribute information of the WiFi terminal after receiving the accounting request message or the DHCP request message, so that the WiFi terminal accesses the PS service domain via the wireless local area network, the trusted gateway, and the established first PDP context connection or the first PDN connection.
Abstract:
Embodiments of the present application provide a method for measuring performance of multi-service in a tunnel, including: receiving a measurement message corresponding to a service packet, where a priority of the measurement message is the same as that of the service packet, and the measurement message includes at least one of the three: a packet loss measurement parameter, a delay measurement parameter, and a jitter measurement parameter; and measuring performance of a service in a tunnel according to a measurement parameter in the measurement message. According to the embodiments of the present application, a problem that performance measurement cannot be performed for different services transmitted in a tunnel in the prior art may be solved.