Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for error control in network system

A control device and error technology, applied in the field of error control, can solve the problems that cannot be aggregated and analyzed, and cannot analyze the type of errors, etc.

Inactive Publication Date: 2009-08-05
SYNACAST COMP SYST SHANGHAI
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing technology cannot conduct a summary analysis of the errors of individual user equipment to find out the root cause of the error and solve the problem from the root cause, nor can the user equipment analyze the specific error type and take corresponding processing steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for error control in network system
  • Method and apparatus for error control in network system
  • Method and apparatus for error control in network system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] Embodiment 1: A memory out-of-bounds error occurs when a single user equipment runs corresponding software.

[0039] In order to save relatively few memory resources, the operating system generally divides the memory into different levels of memory according to the size of the memory. When applying for a memory block for a specific application program running related software on a single user device, it is necessary to declare the required memory size. The operating system Then return the corresponding memory block to the application. The general memory length segmentation is defined as: 16, 32, 64, 128, and 256 bytes.

[0040] image 3 It shows a schematic structural diagram of a storage structure of the memory of the user equipment using a one-way linked list with a head node. refer to image 3 , it can be seen that by visiting the head node, the chain head node can be accessed from "pointing to the chain head node". All nodes of the linked list. In memory, linke...

no. 2 example

[0048] The second embodiment: the code error related to the version of the corresponding software run by the user equipment.

[0049] In practice, due to the incompleteness of the software function test, there are always more or less code errors in the software, so the software version is always constantly upgraded.

[0050] Specifically, in this embodiment, it is taken that the user equipment 1 runs network transmission software based on the P2P protocol as an example. In the above step S11, if the error phenomenon captured by the user equipment 1 is an out-of-bounds error in the code memory of the 50th line of the software, according to the error phenomenon, the cause of the error is analyzed as the application for the 10th line of the software code. The memory length is inconsistent with the length of the data actually written in line 50. The user equipment 1 determines that the type of the error is a code error of the software run by the user equipment 1 according to the ...

no. 3 example

[0057] Embodiment 3: The user equipment runs the network transmission software to download the media file from the download source, resulting in a file or file fragmentation error.

[0058] refer to figure 1 , the network based on the P2P protocol in this embodiment includes multiple user equipments and one network server.

[0059] Usually, the network server generates a file list according to all the file information therein, and the file list includes a check value of each file and / or each file fragment, such as an MD5 check value. The user equipment first obtains the file list from the network server or other user equipment. After the user equipment obtains a certain file or a certain file fragment in the file list, the obtained file or file fragment is subjected to MD5 verification processing to obtain an MD5 verification value; the obtained MD5 verification value is compared with Compare the MD5 check value corresponding to the file or file fragment in the previously ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a technical proposal for controlling errors in network systems. The technical proposal comprises the following steps: an user device captures the error generated in the operation of the user device to generate an error report which is sent to a network server through the user device; the network server collects the errors of a plurality of user devices and carries out analysis of the errors; and if the occurrence times of a same type errors reach to a preset threshold value, a corresponding processing can be executed. Through adopting the method and the device of the invention, the network server can know the errors generated by a plurality of user devices, and the cause of the errors can be found out through carrying out a statistical analysis of the errors and a corresponding processing measure can be adopted in time. The user device can also carry out analysis to the captured errors, sets the type of the errors and adopts a corresponding processing measure to deal with the errors in time.

Description

technical field [0001] The present invention relates to error control technology, in particular to a method and device for controlling and processing errors in multiple user equipments in the network in a network server, and a method and device for error handling in user equipments. Background technique [0002] As user equipment, such as personal computers, becomes more powerful, so does the functionality of the software. Due to fierce competition in the market, many software developers are the first to launch various software in order to seize market opportunities without a complete functional test of the software. Therefore, various errors (or also called BUGs) often occur when the software is running in the user equipment. [0003] In the prior art, the error handling mechanism for the software running of the user equipment is as follows: when an error occurs in the software running of the user equipment, the operating system of the user equipment pops up an alarm windo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/06
Inventor 张少华
Owner SYNACAST COMP SYST SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products