On Wed, Jan 22, 2003 at 11:38:43AM +0100, David 'Bombe' Roden wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> java.lang.RuntimeException: Assertion failed.
>         at freenet.client.RequestManager.assertTrue(RequestManager.java:352)
>         at 
> 
>freenet.client.SplitFileRequestManager.fillInDecodedBlocks(SplitFileRequestManager.java:882)
>         at 
> freenet.client.SplitFileRequestManager.writeData(SplitFileRequestManager.java:900)
>         at 
> 
>freenet.client.SplitFileRequestManager.getNextRequest(SplitFileRequestManager.java:524)
>         at freenet.client.RequestManager.execute(RequestManager.java:634)
> 
> Originating CHK is 
> CHK@1XPGsKraNGJHCBv5ng4ATEl2B8EPAwI,Z00rBbnFifpNTbiTb2FMUQ

This file, despite its questionable legality, raises an interesting
point about frost. It uses exactly 256 chunks. Presumably that is the
maximum number of chunks that frost will divide a file into. That means
that a 750MB file inserted with Frost will be divided into 256 ~ 3MB
chunks (with no redundancy, but we knew that already). Each of these
chunks is rounded up to 4MB. They will _not be stored_ in any datastore
of less than a bit over 800MB! The default node datastore size is 200MB.
Between the fact that of not using FEC, and this, no wonder they have
problems downloading files - presumably manifesting themselves in
unreliability and slowness, leading to more retries, causing more
network load... congratulations to Sandworm and Zlatin, please get the
new Frost out ASAP, we are releasing Freenet 0.5.1 in a week or so.
> 
> - -- 
>  * David 'Bombe' Roden
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.0 (GNU/Linux)
> 
> iD8DBQE+LnSzsh8Hgp5TwkMRAngIAKCtljEEDvt+64iGDWnUAvR7PpQK4ACeN5X4
> yqiTUQZVXYu9B8uVeE1+W2I=
> =lJXf
> -----END PGP SIGNATURE-----
> 

-- 
Matthew Toseland
[EMAIL PROTECTED][EMAIL PROTECTED]
Full time freenet hacker.
http://freenetproject.org/
Freenet Distribution Node (temporary) at http://amphibian.dyndns.org:8889/it8bAyd1fdw/
ICTHUS.

Attachment: msg06504/pgp00000.pgp
Description: PGP signature

Reply via email to