Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 580-583.

Special Issue: Block Chain Technology

• Interdiscipline & Application • Previous Articles     Next Articles

System Solution of Multi-blockchain Transaction Dispatching and Event Handling

LIU Xiong-wen   

  1. Shanghai OneConnect Technology Co.,LTD.,Shanghai 201102,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: In the blockchain system based on the Byzantine Fault Tolerance (BFT) protocol,the efficiency and perfor-mance of system are poor,which limited the application and development of blockchain.A system solution of supporting transaction dispatching and event handling based on multiple blockchains was proposed.In the solution,the system is divided into application clients,handling system and blockchains.Application clients are used to send out transaction requests and receive the events which are interested in.Every blockchains are used to internally handle transaction requests and events.The handling system is adaptive to the system of variable number of blockchain and the system of immutable number of blockchain.Two polices of selecting blockchain,including mapping relationship table and hash consistency alogorithm,are designed.According to the load balance,monotonicity and consistency,both of these two policies dispatch transactions based on the service type and the internal ID of service type.Every blockchain set up the one-to-one correspondence with transaction calling client,event and message streaming client.Every application client sents out the transaction requests and receives the transaction results by interacting with transaction application calling ser-ver,transaction application event connection server and event message streaming server.Transaction dispatcher and event handler were designed in detail,and basic test and verification were made for the whole system solution.

Key words: Consistency, Event handling, Message stream, Multiple blockchain, Transaction dispatching

CLC Number: 

  • TP311
[1]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):482.
[2]董宁,朱轩彤.区块链技术演进及产业应用展望[J].信息安全研究,2017,3(3):200-210.
[3]王继业,高灵超,董爱强,等.基于区块链的数据安全共享网络体系研究[J].计算机研究与发展,2017,54(4):742-749.
[4]何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):6.
[5]许涛.区块链技术在教育教学中的应用与挑战[J].现代教育技术,2017,27(1):110-111.
[6]安瑞,何德彪,张韵茹,等.基于区块链技术的防伪系统的设计与实现[J].密码学报,2017,4(2):199-208.
[7]田海博,何杰杰,付利青.基于公开区块链的隐私保护公平合同签署协议[J].密码学报,2017,4(2):187-198.
[8]夏新岳.基于区块链的股权资产购买和转赠设计与实现[D].内蒙古:内蒙古大学,2016:29-36.
[9]黄洁华,高灵超,许玉壮,等.众筹区块链上的智能合约设计[J].信息安全研究,2017,3(3):211-219.
[10]张波.国外区块链技术的运用情况及相关启示[J].金融科技时,2016(5):35.
[11]黄征,李祥学,来学嘉,等.区块链技术及其应用[J].信息安全研究,2017,3(3):237-245.
[12]冯超政,蒋溢,何军,等.基于冷热数据的MongoDB自动分片机制[J].计算机工程,2017,43(3):7-10.
[13]王亚玲,杨超,章名尚.数据库系统应用分片中间件[J].计算机系统应用,2015,24(10):76-78.
[14]吴黎兵,党平,聂雷,等.一种可分片预留接纳控制算法研究[J].计算机研究与发展,2014,51(6):1201-1204.
[15]蔡维德,郁莲,玉荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487.
[1] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[2] JIN Li-zhen, LI Qing-zhong. Fast Structural Texture Image Synthesis Algorithm Based on Seam ConsistencyCriterion [J]. Computer Science, 2022, 49(6): 262-268.
[3] XU Hua-jie, CHEN Yu, YANG Yang, QIN Yuan-zhuo. Semi-supervised Learning Method Based on Automated Mixed Sample Data Augmentation Techniques [J]. Computer Science, 2022, 49(3): 288-293.
[4] LIU Yi, MAO Ying-chi, CHENG Yang-kun, GAO Jian, WANG Long-bao. Locality and Consistency Based Sequential Ensemble Method for Outlier Detection [J]. Computer Science, 2022, 49(1): 146-152.
[5] ZHAO Xiao, LI Shi-lin, LI Fan, YU Zheng-tao, ZHANG Lin-hua, YANG Yong. Double-cycle Consistent Insulator Defect Sample Generation Method Based on Local Fine-grainedInformation Guidance [J]. Computer Science, 2021, 48(6A): 581-586.
[6] GUO Wen, YIN Tong-ling, ZHANG Tian-zhu, XU Chang-sheng. Temporal Consistency Preserving Multi-Mask Sparse Deep Representation for Visual Tracking [J]. Computer Science, 2021, 48(6): 110-117.
[7] WANG Kai-xun, LIU Hao, SHEN Gang, SHI Ting-ting. Subset Ratio Dynamic Selection for Consistency Enhancement Evaluation [J]. Computer Science, 2021, 48(2): 153-159.
[8] ZHANG Zi-liang, ZHUANG Yi, YE Tong. Cooperative Modeling Model Combination and Update Method Based on Meta-model [J]. Computer Science, 2021, 48(12): 67-74.
[9] LI Xiao-yu,GAO Qing-wei,LU Yi-xiang,SUN Dong. Image Fusion Method Based on Image Energy Adjustment [J]. Computer Science, 2020, 47(1): 153-158.
[10] XU Yao-li, LI Zhan-huai. Quality Control Agent Based on Probability Inference [J]. Computer Science, 2019, 46(4): 8-13.
[11] LIAO Bin, ZHANG Tao, LI Min, YU Jiong, GUO Bing-lei, LIU Yan. Consistency Checking Algorithm for Distributed Key-Value Database Based on Operation History Graph [J]. Computer Science, 2019, 46(12): 213-219.
[12] CHEN Feng, MENG Zu-qiang. Study on Heterogeneous Multimodal Data Retrieval Based on Hash Algorithm [J]. Computer Science, 2019, 46(10): 49-54.
[13] MENG Han, WU Ji, HU Jing-hui, LIU Chao, YANG Hai-yan, SUN Xin-ying. Modeling in Multiple Views and Industrial Case Study of Automatic Test for Hardware System [J]. Computer Science, 2018, 45(9): 75-80.
[14] LI Yang, CHEN Zhi-hua, SHENG Bin. Image Co-segmentation Algorithm via Consistency of Center Sensitive Histogram [J]. Computer Science, 2018, 45(8): 28-35.
[15] LI Yue,WANG Fang. Survey on Storage Security of Emerging Non-volatile Memory [J]. Computer Science, 2018, 45(7): 53-60.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!