Skip to main content

Advances, Systems and Applications

Table 2 An analysis of the proposed system's resource utilization

From: Cloud-based blockchain technology to identify counterfeits

Type

Name

CPU%(max)

CPU%(avg)

Memory(max) [MB]

Memory(avg) [MB]

Traffic In [MB]

Traffic Out [MB]

Docker

1OrgLocalFabric-Org1Peer1-drugsupplychainnet-0.0.1

107.65

18.76

149.56

142.25

10.06

11.90

1OrgLocalFabric_orderer.example.com

41.60

5.97

126.08

102.51

0.06

27.18

1OrgLocalFabric_ca.orderer.example.com

0.30

0.01

7.67

7.24

0.00

0.00

1OrgLocalFabric_peer0.org1.example.com

83.41

22.04

65

62

43.19

34.78

1OrgLocalFabric_couchdb0.org1.example.com

72.34

15.08

145

139.33

2.09

3.96

1OrgLocalFabric_ca.org1.example.com

0.09

0.00

5.90

5.50

0.00

0.00