为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 比特币基础> 正文

区块链 超级账本,区块链3.0时代,超级账本使用的共识算法是

发布时间:2023-12-11-05:11:00 来源:网络 比特币基础 账本   区块   tps

区块链 超级账本,区块链3.0时代,超级账本使用的共识算法是

区块链,是一种分布式数据库技术,它具有不可篡改、可追溯、安全可靠等特点。它的最大特点是它可以记录所有的交易信息,这些信息可以在网络上安全、可靠的共享。区块链技术可以用来记录金融交易、智能合约等,可以大大提高传统金融体系的效率和安全性。

超级账本,是一种公开的、去中心化的分布式数据库,它可以记录所有的交易信息,并且可以被任何人访问。超级账本的最大优势在于它可以提供更高的安全性和可靠性,它可以帮助企业更好地管理资产,并且可以更加安全、可靠的完成金融交易。

区块链3.0时代,拥有更高效率和安全性的超级账本可以更好的满足企业的需求,并且可以更加安全、可靠的完成金融交易。其中,使用的共识算法是拓展的关键,可以帮助超级账本实现更高的安全性和可靠性。

共识算法是指一种用于确定网络参与者之间共识的算法,它可以帮助网络中的参与者在没有中心化管理机构的情况下,安全可靠地达成共识。目前,比特币和以太坊使用的共识算法是工作量证明(Proof of Work),而超级账本使用的共识算法是拓展(Byzantine Fault Tolerance)。

拓展是一种分布式共识算法,它可以帮助网络中的参与者在没有中心化管理机构的情况下,安全可靠地达成共识。它是一种基于可靠节点的共识算法,它可以帮助网络中的参与者确定可靠的节点,从而确保网络的安全性。拓展的最大优势在于它能够在发生故障时保持网络的可靠性,并且能够在网络中出现矛盾时达成共识。

因此,拓展是超级账本使用的共识算法,它可以帮助超级账本实现更高的安全性和可靠性,并且可以在网络中出现矛盾时达成共识。拓展的使用,将使得超级账本更加安全、可靠,并且可以更好地满足企业的需求。


请查看相关英文文档

Ⅰ Horizontal comparison of various blockchain architectures

Horizontal comparison of various blockchain architectures
I often hear people talking about blockchain, since the birth of Bitcoin in 2009 So far, various blockchain systems or blockchain-based applications have been continuously developed and applied to a large number of scenarios, and the blockchain technology itself is constantly changing and improving.
Blockchain is also called a distributed ledger, which corresponds to a centralized ledger, such as a bank. Different from centralized ledgers, distributed ledgers rely on redundant storage of ledger data in all participating nodes to ensure the security of the ledger. Simply put, blockchain uses three underlying technologies: peer-to-peer network technology, cryptography technology, and distributed consensus algorithms. Usually, the blockchain system also “comes with a free feature” called a smart contract. Although smart contracts are not a necessary part of the blockchain system, due to the decentralized nature of the blockchain, it can provide a trusted computing environment for smart contracts.
In order to adapt to the needs of different scenarios, blockchain systems often need to undergo various transformations during actual application to meet specific business requirements, such as identity authentication, consensus mechanism, key management, transaction frequency, Response time, privacy protection, regulatory requirements, etc. Companies that actually apply blockchain systems often do not have the ability to carry out such transformations, so some frameworks for customizing dedicated blockchain systems have gradually appeared on the market. Using these frameworks, it is easy to customize products suitable for enterprises. Blockchain system for your own business.
This article will conduct a horizontal comparison of several typical blockchain frameworks currently on the market to see what characteristics they have and what are the differences between them. In order to keep the comparison fair, this article will only discuss open source blockchain frameworks.
A brief introduction to each blockchain architecture
1. Bitcoin
Bitcoin originated from an article named Satoshi Nakamoto published in 2008 The paper is "Bitcoin: A Peer-to-Peer Electronic Cash System", which describes an electronic currency he calls "Bitcoin" and its algorithm. In the following years, Bitcoin continued to grow and mature, and its underlying technology was gradually recognized and abstracted by people. This is blockchain technology. As the originator of blockchain, Bitcoin plays an important role in the blockchain family. The number of altcoins developed based on Bitcoin technology is as countless as the stars in the sky.
It can be learned from the paper that Satoshi Nakamoto’s purpose of designing Bitcoin is to realize an electronic cash system completely based on a peer-to-peer network, so that online payments can be directly initiated by one party and paid to another party, with an intermediate NoNeed to go through any intermediaries. In summary, he hopes that the design of Bitcoin can achieve the following goals:
● Issue currency without the need for a central authority
● Make payments without the need for intermediaries
● Maintain user trust Anonymity
● Transactions cannot be reversed
From the perspective of an electronic cash system, the above goals have been basically achieved in Bitcoin, but there are still some technical problems that need to be solved, such as scalability attacks , block capacity limit, block fork, scalability, etc.
In terms of application scenarios, a large number of digital currency projects are currently designed based on the Bitcoin architecture. In addition, there are some more practical application cases, such as colored coins, t?, etc.
Colored coins (coloredcoins), by carefully tracking the ins and outs of some specific Bitcoins, they can be distinguished from other Bitcoins. These specific Bitcoins are called colored coins. They have some special properties and thus have a value that is independent of the face value of Bitcoin. Using this characteristic of colored coins, developers can create other digital assets on the Bitcoin network. Colored coins are Bitcoins themselves, require no third parties for storage and transfer, and can leverage the already existing foundation of Bitcoin.
t? is an application of Bitcoin blockchain in the financial field. It is a blockchain-based private and public equity trading platform launched by the American online retailer Overstock.
2. Ethereum
The goal of Ethereum is to provide a blockchain with a Turing-complete language. With this language, contracts can be created to write arbitrary state transition functions. Users only need to simply By implementing logic with just a few lines of code, you can create a blockchain-based application and apply it to scenarios other than currency.
The design philosophy of Ethereum is not to directly "support" any application, but the Turing-complete programming language means that in theory any contract logic and any type of application can be created. In summary, in addition to the design goals of Bitcoin, Ethereum also needs to achieve the following goals:
● Turing-complete contract language
● Built-in persistent state storage
Currently There are hundreds of contract projects based on Ethereum, the more famous ones include Augur, TheDAO, Digix, FirstBlood, etc.
Augur is a decentralized prediction market platform based on Ethereum blockchain technology. Users can use digital currency to make predictions and bets, relying on the wisdom of the crowd to predict the outcome of events, which can effectively eliminate counterparty risks and server centralization risks.
Limited by space limitations, we will not introduce more projects based on the Ethereum smart contract platform. There are many blockchain projects that have been modified based on Ethereum code, but almost all of them are closed source projects and can only be inferred based on some public features., so we will not discuss it in this article.
3. Fabric
Fabric is a blockchain framework developed by IBM and DAH, and is one of the project members of Hyperledger. It functions similarly to Ethereum and is also a distributed smart contract platform. But unlike Ethereum and Bitcoin, it is a framework from the beginning, not a public chain, and there is no built-in token.
Hyperledger is an open source project launched by the Linux Foundation in 2015 to promote blockchain technology and standards. Its members include: ABN AMRO, Accenture and more than a dozen different interests. As an entity, the goal is to allow members to work together to build an open platform to meet various user cases from multiple different industries and simplify business processes.
As a blockchain framework, Fabric adopts a loosely coupled design to modularize components such as consensus mechanism and identity verification so that they can be easily replaced with custom modules during the application process. In addition, Fabric also uses container technology to run smart contract code (chaincode) in docker, so that smart contracts can be written in almost any high-level language.
The following are some design goals of Fabric:
● Modular design, components can be replaced
● Smart contracts running on docker
There are already many developers using Fabric architecture for development During the implementation of proof-of-concept (POC) projects, there are many attempts by some financial institutions. However, because the project has just started, there is no mature application yet.
4. DNA
DNA (Distributed Networks Architecture) is a blockchain architecture developed by "Distributed Technology", a blockchain startup company headquartered in Shanghai. It can support public chains at the same time. , alliance chain, private chain and other different application types and scenarios, and quickly integrate with business systems.
Different from Ethereum and Fabric, DNA supports a variety of digital assets at the bottom of the system. Users can create their own asset types directly on the chain and use smart contracts to control its issuance logic. For most blockchain application scenarios, digital assets are indispensable, and developing a set of transfer and issuance logic based on smart contracts for each digital asset is very wasteful and inefficient. Therefore, it is very necessary for the bottom layer of the blockchain to provide direct digital asset functions. For those application scenarios that do not require digital assets at all, arbitrary custom logic can also be written based on the smart contract architecture provided by DNA.
The design goals of DNA mainly include the following points:
● Underlying support for multiple digital assets
● Turing-complete smart contracts and state persistence
● Cross-chain interoperability
● Transaction finality
Currently Many financial institutions use DNA architecture to develop blockchain proof-of-concept products. In addition, there are some blockchain projects that have been implemented, such as Xiaoyi Blockchain, Fachain, etc.
Antshares is a public chain positioned at the digitization of assets. It digitizes assets and rights in the physical world and uses a decentralized network protocol to conduct registration, issuance, transfer transactions, clearing and delivery and other financial services through a peer-to-peer network. . It adopts a community development model and is architecturally consistent with DNA, allowing cross-chain interoperability with any DNA-based blockchain system.
FaChain is the world's first large-scale commercial legal evidence storage blockchain. It is an evidence recording and preservation system based on DNA blockchain technology and is established and operated by multiple institutions. The system has no central control point, and once the data is entered, it cannot be tampered with by a single agency or node, thus meeting the requirements for judicial evidence storage.
5. Corda
Corda was developed by R3CEV, a New York-based blockchain startup. The R3 blockchain alliance initiated by it has so far attracted the participation of dozens of giant banks. These include Wells Fargo, Bank of America, Bank of New York Mellon, Citibank, Commerzbank, Deutsche Bank, HSBC, Mitsubishi UFJ Financial Group, Morgan Stanley, National Australia Bank, Royal Bank of Canada, Sweden's Nordisk Bank ( SEB), Société Générale, etc.
It can also be seen from the composition of R3 members that Corda is a blockchain architecture specifically used for bank and inter-bank business. Although R3 itself claims that Corda is not a blockchain, judging from various characteristics, it has some characteristics of a blockchain.
Technical comparison
1. Digital assets
Next, we will make a series of technical comparisons of these blockchain frameworks mentioned above, and introduce their differences from multiple dimensions. with similarities.

Blockchain’s built-in tokens are often an economic incentive model and a means to prevent spam transactions. Bitcoin is born with and has only one built-in token, so all "transactions" in the Bitcoin system are essentially transfer behaviors, unless additional digital assets are added to Bitcoin through an external protocol layer.
Ethereum and DNA have built-in tokens. In addition to the above-mentioned economic incentives and preventing spam transactions, their role is to provide a charging channel for the built-in functions of the system. For example, Ethereum's smart contract operation requires GAS, and DNA's digital asset creation also requires a certain amount of tokens.
Ethereum and Fabric are notThere is built-in support for a variety of digital assets, and corresponding functions are implemented through smart contracts. The advantage of this approach is that the system design can be very simple, and the behavior of the assets can be specified arbitrarily, with a high degree of freedom. However, such a design will also bring a series of negative impacts. For example, all asset creators have to write repeated business logic themselves, and users cannot operate their assets in a unified way.
In contrast, DNA and Corda adopt a method of supporting multiple digital assets at the bottom level, allowing asset creators to easily create their own asset types, and users can also manage all in the same client. assets. For business scenarios with more complex logic, they can also use smart contracts to enhance the functions of assets, or create a business logic that has nothing to do with assets.
2. Account system

UTXO (Unspent Transaction Output) is a mechanism: each digital currency will be registered under the ownership of an account. A digital currency has two status, that is, either it has not been spent or it has been spent. When you need to use a digital currency, mark its status as spent, create a new digital currency of the same amount, and register its ownership under a new account. In this process, the digital currency marked as spent is called the input of the transaction, and the new digital currency created is called the output of the transaction. In a transaction, it can contain multiple inputs and multiple output, but the sum of the inputs and the sum of the outputs must be equal. To calculate the balance of an account, just add the denominations of all digital currencies registered under the account.
Bitcoin and Corda adopt an account mechanism such as UTXO, while Ethereum adopts a more intuitive balance mechanism: each account has a status, and the status directly records the current balance of the account and the logic of the transfer. It means subtracting a part of the balance from one account and adding the corresponding balance to another account. The subtracted part and the added part must be equal. DNA is compatible with both modes in terms of account mechanism.
So what are the advantages and disadvantages of UTXO mode and balance mode? The biggest benefit of UTXO is that UTXO-based transactions can be verified in parallel and ordered arbitrarily, because all UTXOs are not related to each other. This is very helpful to the future scalability of the blockchain, and the balance-based design There is no such advantage; on the contrary, the advantage of balance design is that the design idea is very simple and intuitive, which facilitates program implementation. Especially in smart contracts, it is very difficult to deal with the status of UTXO. This is also the reason why Ethereum, which uses smart contracts as its main function, chooses the balance design, while Bitcoin, OnchainDNA, Corda and other digital asset-centric architectures are more inclined to UTXO design.
As for identity authentication, Bitcoin and Ethereum basically have no identity authentication design. The reason is very simple, because the design ideas of both of them emphasize privacy and anonymity and oppose supervision and centralization, and identity authentication is inevitable. Introduce some centers or weakened central institutions. Fabric, DNA and Corda all chose to use digital certificates to authenticate user identities because all three have design goals of being applied to existing financial systems, and financial systems must consider compliance and accept supervision. In addition, Existing financial systems have adopted digital certificate solutions on a large scale, so that they can be quickly integrated with blockchain systems.

Ⅱ Blockchain Graduation Project Proposal

Background of the project research:

With the development of modern technology and information industry, at this stage, the fourth The second industrial revolution is beginning to take shape, and the world is about to enter a technological era centered on new technologies such as the Internet and artificial intelligence. At the same time, blockchain technology has emerged as the times require and has become a hot topic of concern to many international governments and industries. Blockchain technology has been regarded as the core technology with the greatest potential to trigger the fifth round of disruptive revolution after steam engines, electricity, information and Internet technology. In the past 10 years, with the strong support of the government and policies, the development situation of my country's philanthropy has been relatively optimistic. However, as the scale of charity continues to develop and expand, my country's public welfare undertakings have gradually revealed some shortcomings. The biggest problems existing in traditional public welfare undertakings are insufficient credibility, imperfect internal management of charitable organizations, and high costs. However, many Internet public welfare service companies are currently actively using the new technology of blockchain to solve this problem. Blockchain technology has the characteristics of decentralization, information traceability and non-tampering, openness and transparency, and smart contracts. It can make up for the shortcomings of traditional public welfare undertakings such as opaque information and low management efficiency. Blockchain technology will enter public welfare undertakings and will Bring new development opportunities to the charity industry.

The main content of the research: This topic mainly includes the following three aspects:

[if !supportLists] 1. [endif] Combination of blockchain technology and public welfare Problems that arise and solved.

[if !supportLists] 2. [endif] Make a public welfare query webpage based on blockchain technology

[if !supportLists] 3. [endif] The query system Application issues and explanations

Purpose of the research:

As the scale of my country’s public welfare continues to develop and expand, our shortcomings have also been exposed, including lack of credibility, and charitable organizations There is a lack of management, and the use of blockchain technology can solve this problem. This technology will implement full tracking of data and behavior during the donation process, and storeCertificate, realize the complete disclosure of the public welfare chain, enable donors to conduct effective supervision, avoid shortcomings such as low efficiency and clear fund flows, control risks for public welfare projects, enhance public credibility and transparency of public welfare projects, promote the development and progress of public welfare projects, and enhance Build trust between people. According to the attributes and characteristics of the blockchain system, public welfare enterprises can implement full-cycle tracking, evidence storage and auditing of data and behaviors in the public welfare process, so that all parties involved in public welfare projects can conduct full-process tracking and effective supervision of the project, avoiding Due to the shortcomings of artificially reducing efficiency in public welfare, it provides a rational method for public welfare projects to control risks and judge effects, improve the transparency of public welfare undertakings, and promote the development of public welfare.

Significance of the project research: This project intends to develop an open and transparent system for tracking public welfare donations based on blockchain technology and combined with the actual development of public welfare undertakings in my country. Through in-depth analysis of blockchain technology and charity business, we found that blockchain technology has natural advantages in solving the problem of public welfare transparency. Blockchain technology can be understood as a distributed accounting method that can record all transaction information and ensure that it cannot be tampered with. This determines that wherever justice, fairness, and integrity are required, blockchain has great technology. Room to play. At the same time, the addition of smart contracts directly solves the business problem of earmarked funds.

Eventually, trust between citizens will be enhanced, donation channels will be accelerated, and the development of social donations will be promoted

2. Literature review (current status and development of relevant research at home and abroad Trend)

[if !supportLists] (1) [endif] Current status of foreign blockchain-related industries

China and Europe are gradually occupying the world in blockchain industry policies, and the EU is The European Blockchain Observation Forum has been established in February 2018. Its main responsibilities include: policy determination, industry-university-research linkage, cross-border BaaS

(Blockchain as a Service) service construction, standard open source formulation, etc. Investing 5 million euros in Horizon2020 as a blockchain research and development fund (before December 19, 2018), it is expected that investment in blockchain will reach 340 million euros within three years (2018-2020). In the United States, due to different policies among states, although blockchain is still a craze among American start-ups, the promotion of industrial policy has been slow. The Middle East, led by Di Pai, is leading the trend of blockchain. The government is taking the lead and enterprises are cooperating to explore new technology applications of blockchain. Japan and South Korea are also relatively active in the Asia-Pacific region. Japan is dominated by NTT and the government provides support. South Korea uses finance as an entry point to explore blockchain applications. Isism is also a constant threat to all areas of Chinese society. Looking at foreign countriesThe development status of new media culture in major developed countries, summarizing experiences and drawing lessons, have certain implications for the development of new media culture in China.

[if !supportLists] (2) [endif] Current status of domestic new media research

The State Council of China issued the "Thirteenth Five-Year Plan for National Informatization", Blockchain New technologies such as big data, artificial intelligence, and machine deep learning have become the focus of the country’s layout. The People's Bank of China issued the "Thirteenth Five-Year Plan for the Development of Information Technology in China's Financial Industry", which clearly proposed to actively promote research on the application of new technologies such as blockchain and artificial intelligence, and organize pilot projects for national digital currency. In October 2017, the Ministry of Industry and Information Technology released the "White Paper on China's Blockchain Technology and Application Development", which is the first official guidance document for blockchain.

Governments across the country, especially in coastal areas, have established blockchain experimental sites and research institutes. At present, the governments of Shenzhen, Hangzhou, Guangzhou, Guiyang and other places are actively establishing blockchain development zones and providing special support policies. China Guangzhou officially released 10 Guangzhou blockchain strategies in December 2017 to create a blockchain enterprise technology innovation zone in Huangpu District and Development Zone. In March 2018, the Shenzhen Municipal Economic, Trade and Information Commission issued the "Notice of the Municipal Economic, Trade and Information Commission on Organizing and Implementing the Second Batch of Support Plan for the New Generation Information Technology and Information Security Transformation of Shenzhen's Strategic Emerging Industries in 2018". The district Blockchain is on the list of support directions. This is the fifth local government in China to introduce support policies for blockchain after Guangzhou, Guiyang, and Gehangzhou.

(3) Current status of blockchain in the open source field

Hyperledger (Hyperledger)

Hyperledger (Hyperledger) is developed by the Linux Foundation The open source project to promote blockchain digital technology and transaction verification, launched in 2015, has attracted the participation of many companies including IBM, Intel, Fujitsu, UPS, Cisco, Huawei, Redhat, Oracle, Samsung, Tencent Cloud, Internet Finance, etc. Currently, There are already more than 200 member units, and Bran Behlendorf, founder of the Aache Foundation, serves as the executive director of the ledger project.

The goal of the Hyperledger project is to allow members to work together to build an open platform to meet user cases from many different industries and simplify business processes. Process Ledger has multiple blockchain platform projects, including the Fabric project contributed by BIM, the Sawtooth project contributed by Intel, and Iroha, Burrow, Indy, etc.

The development status of blockchain in the standard field

ITU-T

ITU-T (International Telecommunication Union Standardization Organization) from 2016 to early 2017, SG16 (Study Group), SG17 and SG20 respectively launched research on the overall needs and security of distributed ledgers to attract application in the Internet of Things. Established three focus groups (Focus Group on Distributed Ledger (FG DLT), Focus Group on Data Processing and Management (FG DPM), and Focus Group on Fiat Digital Currency (FG DFC)), focusing on blockchain and distributed ledger respectively. Technology application and service research, establishing a trustworthy Internet of Things and smart city data management framework based on blockchain, and carrying out standardization work on blockchain applications based on digital currency. Huawei serves as the chairman of the Architecture Group of the Focus Group on Distributed Ledger (FG DLT) and the Blockchain Group of the Focus Group on Data Processing and Management (FGDPM).

Two committees of CCSA (China Communications Standards Association) have established subgroups and projects respectively:

CCSA TC10 (Internet of Things Technical Working Committee) Established in October 2017, the Internet of Things Blockchain Subgroup: Responsible for the application research and standardization of blockchain technology in the Internet of Things and its covered areas such as smart cities, Internet of Vehicles, edge computing, Internet of Things big data, Internet of Things industry applications, logistics and intelligent manufacturing, and is led by China China Unicom technical experts serve as team leaders, and Huawei technical experts serve as deputy team leaders.

The Blockchain and Big Data Working Group under CCSA TC1 (Internet and Application Technology Working Committee) completed two blockchain industry standards: "Blockchain: Part 1 Overall Technical Requirements for Blockchain ” and “Blockchain: Part 2 Evaluation Indicators and Evaluation Methods”, in which Huawei actively participated.

JPEG

During the 78th JPEG Conference in February 2018, the JPEG Committee organized a special session on blockchain and distributed ledger technology and their impact on the JPEG standard. Meeting. Taking into account the potential impact of technologies such as blockchain and distributed ledgers on future multimedia, the committee decided to establish an ad hoc group to explore use cases and standardization needs related to blockchain technology in a multimedia environment, with a focus on imaging and multimedia applications. standardization work.

IETF

The "Decentralized Internet Infrastructure ProposedRG

(Research Group) was established at the IETF99 meeting in June 2017 to plan research blocksChain architecture and corresponding standards, in 2018 IETF will likely pay more attention to the implementation and development of blockchain interconnection standards on the blockchain.



3. The proposed research methods (plans, technical routes, etc.) and feasibility demonstration

This topic mainly studies blockchain technology Research methods adopted in combination with charitable donations:

1. Collect relevant theories using the literature method, collect literature materials and related theories using information retrieval, screening and other methods, and come to the blockchain The current state of technology and mastering blockchain decentralization technology.

2. Combine the technology with public welfare by combining theory and practice. Complete improvements to the system.

3. Use the method of comparative analysis to discuss the current development status of new media operations from both domestic and foreign aspects, as well as existing problems in the development of my country's new media operation models, and look forward to the development prospects of this technology field.

Feasibility demonstration:

1. Technical feasibility. The research goals involved in this topic already have considerable theoretical foundations at home and abroad. Through literature survey, we can learn about actual, reliable and useful information data, and the actual requirements are not difficult.

2. Economic feasibility. The research on this topic can be done by accessing literature and materials through the Internet and libraries. It is convenient and feasible and does not require a lot of economic consumption. Therefore, from an economic point of view, it is completely feasible.

3. Operational feasibility. This topic requires the combination of blockchain technology and public welfare, especially the tracing of these applications. A comprehensive analysis of the graduation project system on this topic can be achieved through the analysis of both Study the literature and study the existing information documents, use the data you collected to organize and analyze, apply what you have learned, and complete this project completely. From an operability point of view, it is completely feasible.

4. Expected results (or expected results)

1. Through research on the data, clarify the relevant concepts of blockchain technology, skillfully use dapp, and create a web page.

2. Through distributed applications, creating a system that allows the public to quickly browse and understand the public welfare process will increase convenience for the further development of my country's public welfare undertakings.

3. I hope that I can continue to learn and make progress from the process of writing this paper. Being able to master the relevant knowledge of blockchain will be helpful to your future career.

III Blockchain --- Consensus Algorithm

The PoW algorithm is a mechanism to prevent the abuse of distributed service resources and denial of service attacks. It requires nodes to perform a moderate amount of complexity that consumes time and resources.The calculation results can be quickly verified by other nodes, and the time and energy consumption are used as guarantees to ensure that services and resources are used according to real needs.

The most basic technical principle in the PoW algorithm is the use of hashing algorithms. Assume that the hash value Hash(r) is found. If the original data is r (raw), the operation result is R (Result).

R = Hash(r)

The characteristic of the hash function Hash() is that for any input value r, the result R is obtained, and r cannot be deduced from R. When the input original data r changes by 1 bit, the resulting R value changes completely. In the Bitcoin PoW algorithm, the algorithm difficulty d and the random value n are introduced, and the following formula is obtained:

Rd = Hash(r+n)

This formula requires filling in the random In the case of value n, the first d bytes of the calculation result Rd must be 0. Due to the unknown nature of the hash function results, each miner has to do a lot of calculations to get the correct result. After the calculation result is broadcast to the entire network, other nodes only need to perform a hash operation to verify it. The PoW algorithm uses this method to consume resources for calculation, and verification only needs to be done once.

The PoS algorithm requires node verifiers to pledge a certain amount of funds to be eligible for mining and packaging, and the regional chain system uses a random method when selecting packaging nodes. When the node pledges The more funds there are, the greater the probability of being selected to package the block.

In POS mode, each coin generates 1 coin age every day. For example, if you hold 100 coins for a total of 30 days, then your coin age will be 3000 at this time. At this time, if you verify a POS block, your currency age will be cleared to 0, and the corresponding digital currency interest will be obtained from the block.

The process of a node producing blocks through the PoS algorithm is as follows: To become a block producing node, an ordinary node must first pledge its assets. When it is its turn to produce a block, it packages the block and then broadcasts it to the entire network. , other verification nodes will verify the legitimacy of the block.

The DPoS algorithm is similar to the PoS algorithm and also uses shares and equity pledges.

But the difference is that the DPoS algorithm uses a delegated pledge method, which is similar to the method of universal election of representatives to select N super nodes to record and produce blocks.

Voters cast their votes for a certain node. If a certain node is elected as the accounting sectionpoint, then the accounting node can often use any method to reward its voters after obtaining the block reward.

These N accounting nodes will take turns to produce blocks, and the nodes will supervise each other. If they do evil, the pledge deposit will be deducted.

By trusting a small number of honest nodes, unnecessary steps in the block signing process can be removed, increasing the speed of transactions.

Byzantine problem:

Byzantium was the capital of the ancient Eastern Roman Empire. For defense, an army led by a single general was stationed in each fiefdom. The message could only be delivered by messenger. In a war, all generals must reach a consensus and decide whether to go to war together.

However, there may be traitors within the army who will influence the generals to reach a consensus. The Byzantine Generals Problem refers to the problem of how the remaining generals can reach a unanimous decision when one of the generals is known to be a traitor.

BFT:

BFT is Byzantine fault tolerance. Byzantine fault tolerance technology is a type of fault tolerance technology in the field of distributed computing. The Byzantine hypothesis is a modeling of the real world, where computers and networks may behave unpredictably due to hardware errors, network congestion or outages, and malicious attacks. Byzantine fault tolerance techniques are designed to handle these abnormal behaviors and meet the specification requirements of the problem to be solved.

Byzantine fault-tolerant system:

The failed node is called a Byzantine node, and the normal node is a non-Byzantine node.

Assuming that the distributed system has n nodes, and assuming that the entire system has no more than m Byzantine nodes (n ≥ 3m + 1), the Byzantine fault-tolerant system needs to meet the following two conditions:

In addition, the Byzantine fault-tolerant system needs to achieve the following two indicators:

PBFT is the practical Byzantine fault-tolerant algorithm, which solves the problem of inefficiency of the original Byzantine fault-tolerant algorithm. The time complexity of the algorithm is O(n^2 ), so that Byzantine fault tolerance problems can be solved in actual system applications

PBFT is a state machine replica replication algorithm. All replicas operate in the process of a view (view) rotation. The master The node is determined by the view number and the set of node numbers, that is: main node p = v mod |R|. v: view number, |R| number of nodes, p: primary node number.

The consensus process of the PBFT algorithm is as follows: the client (Client) initiates a message request (request) and broadcasts it to each replica node (Replica), and one of the master nodes (Leader) initiates a proposal message pre -prepare and broadcast. Other nodes obtain the original message, and after the verification is completedSend prepare message. Each node receives 2f+1 prepare messages, that is, it is considered ready and sends a commit message. When the node receives 2f+1 commit messages and the client receives f+1 identical reply messages, it means that the request initiated by the client has reached a network-wide consensus.

The specific process is as follows:

Client c sends a request to master node p. o: the specific operation of the request, t: the timestamp appended by the client during the request, c: client identifier. REQUEST: Contains message content m, and message digest d(m). The client signs the request.

When the master node receives the client's request, it needs to conduct the following verifications:

a. Whether the signature of the client's request message is correct.

Illegal requests are discarded. For a correct request, a number n is assigned. The number n is mainly used to sort the client's requests. Then broadcast a <, m> message to other replica nodes. v: view number, d client message summary, m message content. performs master node signature. n is [h, H] to be within a certain range. For specific reasons, please refer to the Garbage Collection chapter.

When replica node i receives the PRE-PREPARE message from the master node, the following verification is required:

a. Whether the signature of the master node's PRE-PREPARE message is correct.

b. Whether the current replica node has received a PRE-PREPARE message under the same v and also numbered n, but with different signatures.

c. Whether the abstracts of d and m are consistent.

d. Whether n is within the interval [h, H].

Illegal requests are discarded. Correct request, replica node i sends a message to other nodes including the master node, v, n, d, m is the same as the content of the above PRE-PREPARE message, i is the current replica node number. Sign the replica node i. Record PRE-PREPARE and PREPARE messages to the log, which are used to restore unfinished request operations during the View Change process.

When the master node and replica node receive the PREPARE message, they need to conduct the following verifications:

a. Whether the signature of the replica node's PREPARE message is correct.

b. Current copyWhether the node has received n under the same view v.

c. Whether n is within the interval [h, H].

d. Whether d is the same as d in the currently received PRE-PPREPARE

Illegal request is discarded. If replica node i receives 2f+1 verified PREPARE messages, it sends a message to other nodes including the master node, where v, n, d, i is the same as the content of the above PREPARE message. same. performs the signature of replica node i. Record the COMMIT message to the log, which is used to restore the unfinished request operation during the View Change process. Record PREPARE messages sent by other replica nodes to the log.

When the master node and replica node receive the COMMIT message, they need to conduct the following verifications:

a. Whether the signature of the COMMIT message of the replica node is correct.

b. Whether the current replica node has received n under the same view v.

c. Whether the abstracts of d and m are consistent.

d. Whether n is within the interval [h, H].

Illegal requests are discarded. If replica node i receives 2f+1 verified COMMIT messages, it means that most nodes in the current network have reached a consensus, run the client's request operation o, and return For the client, r: is the result of the request operation. If the client receives f+1 identical REPLY messages, it means that the request initiated by the client has reached the consensus of the entire network. Otherwise, the client needs to determine whether to resend the request to the master node. Record COMMIT messages sent by other replica nodes to the log.

If the master node does evil, it may assign the same sequence number to different requests, or not allocate sequence numbers, or make adjacent sequence numbers discontinuous. The backup node should have the responsibility to actively check the validity of these sequence numbers.

If the master node goes offline or acts maliciously and does not broadcast the client's request, the client sets a timeout mechanism. If the timeout occurs, the request message is broadcast to all replica nodes. The replica node detects that the master node has done something evil or is offline, and initiates the View Change protocol.

View Change protocol:

The replica node broadcasts ​​messages to other nodes. n is the latest stable checkpoint number, C is the 2f+1 verified CheckPoint message collection, P is the PRE-PREPARE and PREPARE message collection of outstanding requests by the current replica node.

When the master node p = v + 1 mod |R| receives 2f valid VIEW-CHANGE messages, it broadcasts messages to other nodes. V is a valid set of VIEW-CHANGE messages. O is the set of uncompleted PRE-PREPARE messages reinitiated by the master node. Selection rules for the PRE-PREPARE message set:

The replica node receives the NEW-VIEW message from the master node, verifies the validity, and if valid, enters the v+1 state and starts the PRE-PREPARE message in O processing flow.

In the above algorithm process, in order to ensure that the previous request can be restored during the View Change process, each replica node records some messages to the local log. After executing the request The replica node needs to clear the record messages of the previous request.

The simplest way is to execute the consensus synchronization of the current state again after the Reply message. This is relatively expensive, so it can be executed after executing multiple requests K (for example: 100). A status synchronization. This status synchronization message is the CheckPoint message.

Replica node i sends to other nodes, n is the last view request number retained by the current node, d is a summary of the current status, and the CheckPoint message record to the log. If replica node i receives 2f+1 verified CheckPoint messages, the messages in the previous log are cleared and n is used as the current stable checkpoint.

This is an ideal situation. In fact, when the replica node i sends a CheckPoint message to other nodes, the other nodes have not completed K requests, so they will not respond to i's request immediately. It will also follow its own rhythm, moving forward, but the CheckPoint issued at this time does not form stable.

In order to prevent i from processing requests too quickly, set a high and low water level interval [h, H] mentioned above to solve this problem. The low water level h is equal to the number of the previous stable checkpoint, and the high water level H = h + L, where L is the value we specify, which is equal to an integer multiple of the number of requests processed in the checkpoint cycle K, and can be set to L = 2K. When the request processed by replica node i exceeds the high water mark H, it will stop and wait for stable checkpoint changes, and then continue to move forward.

In blockchain scenarios, it is generally suitable for private chain and alliance chain scenarios that require strong consistency. For example, in the IBM-led blockchain Hyperledger project, PBFT is an optional consensus protocol. In Hyperledger's Fabric project, the consensus module is designed as a pluggable module and supports consensus algorithms such as PBFT and Raft.

Raft is based on a leader-driven consensus model, in which an outstanding leader (Leader) will be elected, and the Leader will be fully responsible for managing the cluster. Responsible for managing replication logs between all nodes in the Raft cluster.

In the figure below, the Leader (S1) of the cluster will be selected during the startup process and serve all commands/requests from clients. All nodes in a Raft cluster maintain a distributed log (replicated log) to store and submit commands (log entries) issued by clients. The Leader accepts log entries from clients and replicates them among all followers (S2, S3, S4, S5) in the Raft cluster.

In a Raft cluster, a minimum number of nodes is required to provide the expected level of consensus guarantee, which is also called a quorum. The minimum number of votes required to perform an operation in a Raft cluster is (N / 2 +1), where N is the total number of members in the group, that is, at least more than half of the votes, which is why cluster nodes usually have an odd number of nodes. So, in the example above, we need at least 3 nodes to have consensus guarantees.

If the legal quorum node is unavailable for any reason, that is, the votes do not exceed half, the negotiation will not reach an agreement and new logs cannot be submitted.

Data storage: Tidb/TiKV

Log: Alibaba's DLedger

Service discovery: Consul& etcd

< p> Cluster scheduling: HashiCorp Nomad

Can only accommodate faulty nodes (CFT), not evil nodes

Sequential voting, only serial apply, so high concurrency Poor performance in scenarios

Raft solves the three main issues surrounding Leader election.Sub-problem, manage the security functions of distributed logs and algorithms to solve distributed consensus problems.

When we start a new Raft cluster or a leader is unavailable, a new leader will be elected through negotiation among all member nodes in the cluster. Therefore, in a given instance, a node of a Raft cluster can be in any of the following states: Follower, Candidate, or Leader.

When the system first starts, all nodes are followers. If they do not receive the heartbeat signal from the leader within a period of time, the follower will be converted into a candidate;

If a node If a Candidate node receives votes from the majority of nodes, the Candidate can be converted into a Leader, and the remaining Candidate nodes will return to the Follower state;

Once a Leader discovers that there is a Leader node in the system that is older than itself. If the term is higher, it will be converted to Follower.

Raft uses a heartbeat-based RPC mechanism to detect when a new election starts. During normal times, the Leader will regularly send heartbeat messages to all available Followers (in practice, the log and heartbeat may be sent together). Therefore, the other node starts in the Follower state and remains in the Follower state as long as it receives periodic heartbeats from the current Leader.

When the Follower reaches its timeout, it will start the election process in the following way:

Based on the responses that the Candidate receives from other nodes in the cluster, the three steps for the election can be derived result.

The implementation of consensus algorithms is generally based on replicated state machines. What is a replicated state machine:

In simple terms: the same initial recognition state + the same input = Same end state. Different nodes should use the same and deterministic function to process input, rather than introducing uncertain values, such as local time, etc. It is a good idea to use replicated log. Log has the characteristics of persistence and order preservation, and is the cornerstone of most distributed systems.

With the Leader, all concurrent requests from the client can form an orderly log (status) sequence on the Leader's side to represent the order in which these requests are processed. Leader then will himselfThe log sequence is sent to Follower to maintain the global consistency of the entire system. Note that this is not strong consistency, but eventual consistency.

The log consists of log entries with a sequential number (log index). Each log entry consists of the term when it was created, and the data contained in the log, which can be of any type, from simple types to blocks of the blockchain. Each log entry can be represented by a [term, index, data] sequence pair, where term represents the term, index represents the index number, and data represents the log data.

The Leader attempts to execute replication commands on a majority of the nodes in the cluster. If the replication is successful, the command is submitted to the cluster and the response is sent back to the client. Similar to two-phase commit (2PC), but the difference from 2PC is that the leader only needs the consent of more than half of the nodes (in a working state).

Both leader and follower may crash, so the log maintained by the follower may have the following situation compared with the leader

When the leader and follower are inconsistent, the leader forces the follower to copy its own log, the Leader will try from back to front. Each time AppendEntries fails, it will try the previous log entry (decrementing the nextIndex value) until it successfully finds the consistent position point of each Follower's log (based on the two guarantees mentioned above), and then moves backward one by one. Overrides the Followers entry after this position. So missing or extra entries may persist for multiple terms.

Requires the candidate's log to be at least as up-to-date as other nodes. If not, the follower node will not vote for the candidate.

Means that each submitted entry must exist in at least one of these servers. If a candidate's log is at least as up-to-date as the other logs in the majority, it will save all committed entries, avoiding a log rollback event.

That is, at most one leader can be elected in any term. This is very important, there can only be one leader in a replica set at any time. There is more than one leader in the system at the same time, which is called brain split. This is a very serious problem and will cause data coverage loss. In raft, two points guarantee this property:

Therefore, there must be only one leader in a certain term.

The system is vulnerable to system failures when the status of nodes in the cluster changes (the cluster configuration changes). So, to prevent this, Raft uses something called a two-phase approach to changing cluster membership. Therefore, in this approach, the cluster first changes to an intermediate state (called federated consensus) before implementing a new membership configuration. Federated consensus enables the system to be used to respond to client requests even when transitioning between configurations, and its main purpose is to improve the availability of distributed systems.

IV What is the super ledger in the blockchain?

The ledger (Ledger) has a certain format and consists of several account pages. It is based on accounting vouchers and processes all economic businesses. The book of time-classified records is what we usually call an account book. Blockchain represents a unique data recording format. Blockchain is "block + chain". The so-called block means data block. Each block is connected by a certain mark to form a chain. .

Hyperledger

Hyperledger (Chinese name is Hyperledger, collectively referred to as Hyperledger) is an initiative launched by the Linux Foundation in 2015 to promote blockchain digital technology and An open source project for transaction verification. Hyperledger's goal is to allow members to work together to build an open platform to meet the needs of various users from many different industries, while greatly simplifying business processes. The founding members of Hyperledge include major companies such as IBM, Intel, and Cisco. As of the completion of this book, more than 183 institutions and companies have joined Hyperledge, and they are growing rapidly.

When the Hyperledger project was established, the Linux Foundation had received several different code bases, including the IBM code base (to a certain extent inspired by Ethereum), and the DAH (Bits of Proof) Bitcoin code base. and the Sockstream codebase (an extension of the Bitcoin codebase). In addition, there are codes contributed by DigitalAsset and Ripple. With the development of the industry, a single project can no longer meet business needs, so Hyperledger has gradually developed from a single project into a project team. At present, Hyperedger is no longer a specific technology, but represents a collection of blockchain technology frameworks. As of now, the Hyperledger project team contains a total of 9 formal projects and more than 50 related modules of these formal projects.

The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only "blockchain technology" approved by the "Smart Learning Workshop 2020- Xueshuo Innovation Workstation" carried out by the School Planning and Construction Development Center of the Ministry of Education of China. Professional” pilot workstation. The professional base provides students with diversified growth paths and promotes the reform of the training model integrating professional degree research, production, learning and research., build an applied and compound talent training system.

IV Blockchain underlying technology PK

Common blockchain underlying technologies: Ethereum (Ethereum), EOS, Fabirc, Fisco Bcos, CITA

Platform Introduction

1.Ethereum

Ethereum (Ethereum) is a decentralized application platform that supports smart contracts developed under the leadership of Vitalik Buterin and Gavin Wood. Ethereum provides a Turing-complete scripting language, which greatly expands the application of blockchain technology. The project was launched with the release of a white paper at the end of 2013, and the genesis block was generated in July 2015. Expansion and upgrade will be carried out in the near future.

2. EOS

EOS is a blockchain application platform developed under the leadership of BM (Daniel Larimer) and was officially launched in June 2018. Its slogan is "decentralize everything" and aims to provide higher performance to the blockchain.

3. Fabric

Fabric is a product-level solution released by the open source Hyper ledger blockchain alliance that can be used to build applications, and has hundreds of A proof of concept project will be built. The official version was released in July 2017.

4. CITA

CITA is an enterprise-level blockchain product prototype independently developed by Crypt ape Technology, one of the founding members of the EEA (Enterprise Ethereum Alliance). CITA is designed with high reliability, high performance, high scalability and future adaptability as its design goals, and the open source version was released in July 2017.

5. BCOS

BCOS is a blockchain technology platform for enterprise-level application services jointly created by WeBank, Wanxiang Blockchain, and Matrix Elements. It is a distributed Business provides complete blockchain technology infrastructure and services. In July 2017, the first phase of BCOS was officially open sourced.

* Fabric has done the best in privacy protection, with a CA mechanism

International problems: cross-chain technology

In order to solve the problems of the traditional Internet world The problem of information islands. Blockchain uses the structure of a decentralized network to try to achieve information sharing to solve the problem of data islands. However, with the emergence of many blockchain applications, blockchain chains are not interoperable, making blockchain also face the dilemma of "isolated chains". It is not in line with the original intention of the blockchain.

How to implement multi-chain coexistence on the same blockchain platform based on business functions, privacy protection, data isolation, performance and capacity expansion needs, etc. How to implement information and business interaction between blockchain platforms with inconsistent identity access mechanisms, information standards, and business forms. It is expected to become an important direction of development.

Reprinted from [Chain World]: https://www.7234.cn/news/2316

VI What are the challenges currently faced by blockchain

What are the challenges that blockchain currently faces
At this stage, application projects in the blockchain field are mainly divided into two aspects: First, new business models that are more compatible with blockchain technology, such as cross-border payments, Supply chain finance, product traceability and other scenarios; the second is the application of reform based on existing centralized business, that is, using the economic incentive mechanism of Token.
With the development of technology, the number of application projects in this field is expanding rapidly. Many people believe that 2018 will be the year when blockchain will truly integrate with the real economy and explode. However, blockchain technology is still in its early development stage and faces challenges including the regulatory environment, lack of talent, and technical awareness.

From a technical perspective, applying blockchain technology to actual industry scenarios requires solving issues such as transaction speed, data consensus, and node maintenance. The current Bitcoin network can only process seven transactions per second, and the leading Hyperledger technology can only reach the level of 200 to 300 transactions; compared with the centralized system that can process tens of thousands of transactions per second, there is still a gap. Large distances. In addition, the current lack of relevant incentive mechanisms in the field makes it difficult for participating nodes to operate in an orderly manner. From a regulatory perspective, although most countries are actively embracing blockchain technology, there are currently no relatively complete regulatory regulations and industry standards. Inappropriate regulatory measures may hinder the innovative development of such emerging technologies.
Affected by various factors such as the underlying technology that needs to be further matured, the lack of public chain platforms for smart contracts, the lack of ecological compatibility of various Tokens, and unclear government supervision; at this stage, the implementation of blockchain application projects is relatively slow, and at the same time, It shows that the quality of projects varies from good to bad. For this reason, analysts said that compared with general-purpose blockchains, what will achieve breakthroughs in the short term may be focused blockchains for specific scenarios and applications.

VII Differences between Bitcoin and Ethereum Hyperledger

There are the following differences in definition.
1. Similarities.
Bitcoin and Ethereum are both successful applications of blockchain technology and are the most typical representatives. The specific point is: only with Bitcoin can there be blockchain technology, and with Ethereum can people realize that blockchain can be independent. Not only Bitcoin can have blockchain technology, but also Ethereum has opened up the ideas and thoughts of the blockchain world. Because they are all applications of blockchain technology, the underlying basic ideas are the same. They are all point-to-point network nodes., public ledgers, and consensus basic algorithms all maintain the network through mining.
2. Differences.
Bitcoin is a peer-to-peer digital payment system, similar to a bank that can settle globally, and this bank has no centralized organizational members, no group owners, no administrators, only the basic principles of code and consensus. The currency that this bank settles or issues is called Bitcoin, and this bank is also called Bitcoin. The most important thing is that the bank's ledger is completely open. Anyone can view every transaction and record, and every transaction can be traced back to the source. Through encryption and mathematical charm, the ledger is also unchangeable.

Ⅷ Blockchain TPS

As we all know, Bitcoin can only perform about 7 transactions per second, and Ethereum is slightly better, only 10-20 transactions. As a payment system, this is far from enough. Some people often use this as an argument and think that the blockchain is inefficient.

In fact, there are many solutions trying to solve the TPS problem. For example, fabric can reach thousands of TPS, graphene series can reach tens of thousands of TPS, and the Off-chain of Bitcoin and Ethereum The solution theoretically supports unlimited TPS. So does it mean that these new technologies are the future of blockchain? This question is always difficult to answer. There are a lot of things like consensus, distribution, and security.

I watched an interview with BM during the Chinese New Year. He mentioned a theory of VB that Scalability, Decentralization and Security cannot be taken into consideration in the blockchain, which is similar to the CAP theory in distributed systems.

I find this theory to be really simple, crude and effective in explaining blockchain technology.

For example: the alliance chain controls the number of verification nodes through the access mechanism, and improves Scalability by sacrificing decentralization; the same is true for the DPOS of the graphene series, and the consensus of RippleNet; Bitcoin improves the consensus of each node by increasing the number of verification nodes. The capacity of a block can also achieve the purpose of expansion, but the result is higher requirements for mining machines, forming a natural entry threshold, which actually sacrifices decentralization; both Bitcoin and Ethereum mining difficulty can be Adjustment and lowering the mining difficulty can actually improve Scalability, but the price paid is a decrease in attack resistance and security is sacrificed.

But this theory is invalid when applied to off-chain solutions, such as the Lightning Network (Thunder Network), Ethereum’s plasma and R3 Corda (this one is quite special, it directly converts all chains into save). Children's shoes who are interested in the principles of off-chain solutions can go here, http://www.8btc.com/ln-rn-corda. The general plan is that both parties to the transaction lock reserves, package massive transactions and upload them to the chain, and only the final results of the transactions are saved on the chain. Through smart contracts and offline multi-signature mechanisms, cheating parties will be fined and forfeit reserves.

The Off-chain solution looks perfect, guaranteeing decentralization and security, while also allowing unlimited expansion.

But there is no free lunch in the world. Let’s take the Lightning Network as an example (in fact, I don’t fully understand plasma yet😅). At least it has the following shortcomings:

1. Bitcoin locked in the Lightning Network can only be used in the Lightning Network. Only when the transaction channel is closed can it truly become a currency recognized on the chain. This will theoretically lead to a situation similar to a bank run. If everyone loses confidence in the Lightning Network and closes channels centrally, it will bring down the Bitcoin network. However, this does not seem to be a big problem, as long as there are no loopholes in the Lightning Network, such as the signature algorithm being broken.

2. The transaction is executed outside the chain, and the chain cannot verify whether the submitted transaction is the latest version. Although the script ensures that attackers who submit old version transactions are at risk of being fined for reserve funds, but the premise is Defenders are required to monitor the network and submit evidence of updated versions of transactions. That is to say, the original passive defense of Bitcoin (the security of funds can be ensured without losing the private key) to active defense. From this perspective, it can be regarded as reducing security. It is unrealistic to leave this active defense operation to users. Eventually, some service companies will inevitably be spawned to save off-chain transaction certificates on behalf of users and prevent cheating. In a sense, it has changed from "disintermediation of trust" to the need to trust an intermediary. From this perspective, it seems that decentralization is also sacrificed.

3. In the Lightning Network, only the final fund status is saved, and all intermediate transaction details are ignored. Supporters believe that the user's privacy is protected, while opponents believe that transaction data is lost.

4. Because channels require reserves to be maintained, it is impossible for there to be a trading channel between any two users. Transfers between users can be done through transfers. In the end, it is likely that large funds will form a centralized Transit node.

Ⅸ What is the TPS of the blockchain?

The full English name of TPS is Transaction PerSecond, which is used in digital currency. TPS refers to the system throughput, which is also the number of system processes per second. If the TPS concurrency per second is too low, it will easily cause serious network congestion, making the blockchain unable to be implemented in high-value, high-concurrency business fields. For example, because TPS concurrency per second is too low, both Bitcoin and Ethereum have problems with high transaction fees, long confirmation times, and poor scalability.As a result, the Bitcoin community was divided, and hard forks became the norm.

Currently, many coins are making a fuss about TPS, hoping to avoid the disadvantages of Bitcoin. For example, for ULAM, USDT, USC, and several currencies, their throughputs are minimum 10,000 TPS confirmation, 7 TPS confirmation, and 100 TPS confirmation respectively. We can compare their TPS levels to identify their speeds.

As we all know, Bitcoin can only conduct about 7 transactions per second

Ethereum is slightly better, only 10-20 transactions.

As a payment system, this is far from enough. Some people often use this as an argument and think that the efficiency of blockchain is low.

Recently I discovered a very good public chain with high TPS: ULAM public chain.

ULAM is the fifth blockchain project with major innovations in consensus algorithms after POW, POS, DPOS, and PBFT consensus algorithms.

The ULAM consensus algorithm uses the characteristics of the hash function to create an ultra-low energy consumption, completely decentralized, and highly stable blockchain system; it is currently the only one that has successfully broken the "Impossible Triangle" of the blockchain. "New consensus algorithm. ULAM does not require hash calculation competition and can allow low-power mobile phones, smart watches, routers, etc. to participate in "mining". The new non-interactive transaction verification algorithm (NITCV) designed by ULAM can enable TPS to reach a minimum of 10,000. ULAM uses the knowledge proof method to construct a non-interactive transaction verification algorithm. ULAM has super fragmented nodes; completely decentralized; resistant to computing power concentration; 49% fault tolerance; resistant to quantum attacks;

X Hyperledger Fabric 2.0 version is officially released, and all important updates are here

p>

On January 31, the Hyperledger Alliance officially released version 2.0 of its enterprise distributed ledger (DLT) platform Hyperledger Fabric. It is reported that this version adds several major features and improves different participation method of communication between readers.

Hyperledger Fabric is one of the main projects of the Hyperledger Alliance. As a private or "permissioned" blockchain network, it is currently mainly used in industries such as finance and supply chain. So far, Fabric has received support from Internet giants such as Alibaba, AWS, Azure, Internet, Google, Huawei, IBM, Oracle, and Tencent.

The 2.0 version of Fabric has ushered in the following improvements:

Regarding the official release of Fabric 2.0 version, members of the Hyperledger Alliance have expressed their opinions. For example:

It is reported that Fabric's smart contracts can have a variety of architectures. It can be programmed in mainstream languages, such as Go, Java and Javascript. In addition, Solidity can also be used.

As an enterprise-oriented product, Fabric is characterized by asynchronous upgrades, which is similar to the way mainstream software works.

Special Statement

Original text: https://www.hyperledger.org/blog/2020/01/30/welcome-hyperledger-fabric-2-0-enterprise- dlt-for-proction

Compiled by: Overnight Porridge

Source (Translation): Babbitt Information (http://www.8btc.com/article_550790)

Disclaimer: This article does not represent Babbitt’s position and does not constitute investment advice, so please treat it with caution.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 37974 文章总数
  • 3637304访问次数
  • 3083建站天数