区块链技术的两个关键因素是什么,区块链技术的两个关键因素是
区块链技术是一种分布式数据存储技术,它可以使用户在不受中心机构控制的情况下进行数据交换,从而改变传统的中心化管理方式。区块链技术的两个关键因素是去中心化和加密技术。
去中心化:去中心化是指没有中心控制机构,也没有一个实体可以控制网络的运行。去中心化的网络可以让用户之间的交易变得更加安全和可靠,因为没有一个实体可以控制网络的运行,所以数据不会被篡改,也不会出现安全漏洞。区块链技术就是利用去中心化的思想,让用户之间可以进行安全的数据交换。
加密技术:加密技术是指使用密钥来加密数据,以防止数据被篡改或泄露。加密技术是区块链技术的重要组成部分,因为它可以保证数据的安全性,也可以防止数据被篡改或泄露。区块链技术使用加密技术,可以使用户之间的交易更加安全可靠,也可以保证交易的完整性。
共识机制:共识机制是指在区块链网络中,所有参与者都必须遵守的一组规则,用来确保网络的安全性和可靠性。共识机制的目的是保证网络上的所有数据都是有效的,并且不会被篡改或泄露。区块链技术使用共识机制,可以保证网络的安全性,也可以确保用户之间的交易是可靠的。
总之,区块链技术的两个关键因素是去中心化和加密技术,这两种技术可以保证网络的安全性和可靠性,还可以让用户之间的交易更加安全和可靠。此外,还有一种重要的技术是共识机制,它可以确保网络上的所有数据都是有效的,并且不会被篡改或泄露。区块链技术的出现,让用户之间的交易更加安全和可靠,也让数据更加安全和可靠。请查看相关英文文档
『一』What are some important elements of blockchain technology
1. The so-called blockchain technology, referred to as BT (Blockchain technology), is also called distribution Ledger technology is an Internet database technology that is characterized by decentralization, openness and transparency, allowing everyone to participate in database records.
2. Blockchain is an innovative application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm in the Internet era. In recent years, the development and application of blockchain have had a profound impact on technology. Innovation and industrial revolution are of great significance. This experience introduces relevant knowledge of blockchain technology.
3. Blockchain is a distributed ledger that can contain financial and/or non-financial transactions, replicated (distributed) across multiple systems in near real-time through a peer-to-peer network, and each participant "owns" the same Having a copy of the ledger and getting updates as any transactions are added, each participant helps determine the inherent "immutability" of all existing records, using cryptography and digital signatures to prove identity, authenticity and enforce read/ With write access, there are mechanisms that make it difficult to change the history and can easily detect someone trying to change it.
『二』Blockchain technology concept
Blockchain technology concept
Blockchain technology concept, nowadays, blockchain has become most It is an area that people are paying attention to. Many companies have already studied this technology in depth, but there are still people who don’t know much about it. Below I will share an article about the concept of blockchain technology.
Blockchain technology concept 1Basic concepts and working principles of blockchain
1. Basic concepts
Blockchain is a distributed data storage, point-to-point New application models of computer technologies such as transmission, consensus mechanisms, and encryption algorithms. The so-called consensus mechanism is a mathematical algorithm that establishes trust and obtains rights and interests between different nodes in the blockchain system.
Blockchain is an important concept of Bitcoin. It is essentially a decentralized database and serves as the underlying technology of Bitcoin. The blockchain is a series of data blocks generated using cryptographic methods. Each data block contains information about a Bitcoin network transaction, which is used to verify the validity of the information, prevent counterfeiting, and generate the next block.
In a narrow sense, blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-tamperable. Fake distributed ledger.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. safety, a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data.
2. Working principle
The blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer. Among them, the data layer encapsulates the underlying data blocks and related basic data and basic algorithms such as data encryption and timestamps; the network layer includes distributed networking mechanisms, data dissemination mechanisms, and data verification mechanisms; the consensus layer mainly encapsulates network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain The basis of programmable features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.
Blockchain mainly solves the trust and security issues of transactions, so it proposes four technological innovations to address this issue:
1. Distributed The ledger means that transaction accounting is completed by multiple nodes distributed in different places, and each node records a complete account, so they can all participate in supervising the legality of the transaction and can also jointly testify for it.
Different from traditional distributed storage, the uniqueness of blockchain distributed storage is mainly reflected in two aspects: First, each node of the blockchain stores complete data according to the block chain structure. For data, traditional distributed storage generally divides the data into multiple parts for storage according to certain rules. Second, the storage of each node in the blockchain is independent and has equal status, relying on the consensus mechanism to ensure the consistency of storage, while traditional distributed storage generally synchronizes data to other backup nodes through the central node. [8]
No node can record ledger data independently, thus avoiding the possibility of a single bookkeeper being controlled or bribed to record false accounts. Also because there are enough accounting nodes, theoretically speaking, the accounts will not be lost unless all nodes are destroyed, thereby ensuring the security of the accounting data.
2. Asymmetric encryption and authorization technology. Transaction information stored on the blockchain is public, but account identity information is highly encrypted and can only be accessed with authorization from the data owner. , thus ensuring data security and personal privacy.
3. The consensus mechanism is how all accounting nodes reach a consensus to determine the validity of a record. This is both a means of identification and a means of preventing tampering. Blockchain proposes four different consensus mechanisms, which are suitable for different application scenarios and strike a balance between efficiency and security.
The consensus mechanism of the blockchain has "the minority obeys the majority"As well as the characteristics of "everyone is equal", where "the minority obeys the majority" does not entirely refer to the number of nodes, but can also be computing power, the number of shares, or other characteristics that computers can compare. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, which will be directly recognized by other nodes and may eventually become the final consensus result. Taking Bitcoin as an example, it uses proof of work. Only when more than 51% of the accounting nodes in the entire network are controlled, it is possible to forge a non-existent record. When there are enough nodes joining the blockchain, this is basically impossible, thus eliminating the possibility of fraud.
4. Smart contracts. Smart contracts are based on these trustworthy and non-tamperable data. Some predefined rules and terms can be automatically executed. Take insurance as an example. If everyone's information, including medical information and risk occurrence information, is true and trustworthy, it will be easy to implement automated claims settlement in some standardized insurance products.
3. Others
The Internet exchanges information, and the blockchain exchanges value. Human history and the history of the Internet can be understood in eight words: if they are divided for a long time, they must be combined. For a long time, they must be combined. In the era of long-term separation, all network information is scattered on the Internet. It is very difficult for everyone to mine information. At this time, platforms such as Google and Facebook will appear. , the only thing it does is recombine all our information. In the Internet era, what the monopoly giants reorganize is information, rather than generating their own information. The information generated is entirely our own. Once the information is reorganized, a new monopoly giant will emerge, so it will be an era of long-lasting separation. Now, due to the emergence of blockchain technology, it has entered an era of integration and division. It is a new multi-centralization. After the new multi-centralization, new value will be generated. These data will be in our own hands, and personal data will generate value. It belongs to oneself. This is the most exciting era of this era.
What is the value of blockchain? A low-cost mechanism to establish trust, establish data rights, and resolve data property rights.
At present, blockchain technology continues to develop, including the current development of single chains to multi-chains, and the technology can be further expanded. I think there may still be disruptions in the future, especially in transactions and other aspects. , especially many disruptive scenarios for existing industries.
The essence of blockchain is to establish trusted information exchange on untrustworthy networks.
One Belt, One Road + One Chain. The bigger thing about blockchain is not to create trust, but to allow trust to be transmitted losslessly, reducing the friction cost of society as a whole, thereby improving the overall efficiency.
Now the blockchain itself is still in its initial stage, so it includes the information transmission and encryption of the blockchain. Quantum encryption and other encryption appear in this process, which actually attacks the encryption algorithm used by the blockchain itself. This phenomenon also occurs from time to time. Including blockchain is also recognized as an asset, digitalA recognition of assets, but now many of us use cryptographic algorithms, or as the key for us to decrypt, but if the password is forgotten, it is likely that your current assets will be lost, and you will not be able to get your original assets. , so it should be said that there are still some hidden dangers in asset management, including information transmission and some security aspects. Of course, from a technical perspective, the processing speed of our blockchain itself, or its scalability, is because from the perspective of the working mechanism, the entire ledger must be copied to all participants, so in the blockchain Its operational efficiency and scalability are still relatively limited. We feel that these still need further development in terms of technology.
The underlying technologies of the blockchain platform also form blockchain wallets, blockchain browsers, node elections, mining machines, mining pools, development components, development modules, technical communities and project communities. and a series of ecosystems. The perfection of these ecosystems directly determines the efficiency and effectiveness of the underlying platform of the blockchain.
4. Mundell’s Impossible Triangle
It is impossible to achieve the ultimate in decentralization, efficiency, and security at the same time.
Blockchain technology concept 2The essence of blockchain is a distributed accounting technology, as opposed to centralized accounting technology, which is widely used in our current lives. exist. Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
Blockchain is an important concept of Bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of Bitcoin, it is a series of related cryptographic methods. Each data block contains a batch of Bitcoin network transaction information, which is used to verify the validity and anti-counterfeiting of the information and generate the next block.
In a narrow sense, blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-tamperable. Fake distributed ledger.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure data transmission and access. It is a new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data securely.
The popular understanding of blockchain technology is: connecting the front, back, left and right blocks of "things" into a chain using one technology, but each block The original data of the block cannot be tampered with. It is a "linked module" technology in the field of Internet of Things that allows participants to trust. The application of blockchain technology is inseparable from the Internet and the Internet of Things. It is based on the integration and interaction of the two, but itAllow participants to maintain independent decentralization and jointly own this set of value chain co-construction and sharing technologies.
Characteristics of blockchain: decentralization, openness, autonomy, information cannot be tampered with, and anonymity.
Blockchain is a network that can deliver value. The demand for a network that can deliver value is an important reason for the emergence of blockchain technology. Blockchain emerged driven by the need to protect information with ownership or other value. Through public and private key cryptography, distributed storage and other technical means, the blockchain ensures on the one hand the efficient transmission of valuable information, and on the other hand ensures that this information will not be easily copied and tampered with during the transmission process.
Understand the connotation of blockchain from the inevitability of its birth. Blockchain is a distributed accounting technology that solves the shortcomings of centralized accounting and solves the problem of distributed consistency. It is also The connected Internet is upgraded to a value network that ensures the safe and efficient transmission of valuable information.
Blockchain Technology Concept 3Blockchain: Blockchain is like a globally unique account book, or database, which records the history of all transactions in the network.
Ethereum Virtual Machine (EVM): It allows you to write more powerful programs on Ethereum and script programs on Bitcoin. It is also sometimes used to refer to the Ethereum blockchain, which is responsible for executing smart contracts and everything.
Node: You can run a node to read and write to the Ethereum blockchain, that is, using the Ethereum Virtual Machine. Full nodes require downloading the entire blockchain. Light nodes are still under development.
Miner: Mining, that is, the node that processes blocks on the blockchain. You can see some of the currently active Ethereum miners on this page: stats.ethdev.com.
Proof of Work: Miners are always competing to solve some mathematical problem. The first one to solve the problem (calculate the next block) will be rewarded with Ether coins. All nodes then update their own blockchain. All miners who want to figure out the next block have an incentive to stay in sync with other nodes and maintain the same blockchain, so the entire network can always reach consensus. (Note: Ethereum is planning to move to a proof-of-stake system (POS) without miners, but that is beyond the scope of this article.)
Ethereum: Abbreviation ETH. A true digital currency that you can buy and use. Here is a chart from one of the exchanges where Ethereum can be traded. At the time of writing, 1 Ether is worth 65 cents.
Gas: Executing programs and saving data on Ethereum consumes a certain amount of Ethereum. Gas is converted from Ethereum. This mechanism is used to ensure efficiency.
DApp: The Ethereum community calls applications based on smart contracts decentralized applications (Decentralized App). The goal of a DApp is (orIt should be) to have a friendly interface for your smart contracts, plus some extras, such as IPFS, a decentralized network that can store and read data, not from the Ethereum team but in a similar spirit). DApp can run on a centralized server that can interact with Ethereum nodes, or it can run on any Ethereum equal node. (Take a minute to think about this: Unlike ordinary websites, DApps cannot run on ordinary servers. They need to submit transactions to the blockchain and read important data from the blockchain rather than a centralized database. Compared to typical users When logging into the system, the user may be represented as a wallet address and other user data is stored locally. Many things will be structured differently from current web applications.)
Ethereum client, smart contract language
p>Writing and deploying smart contracts does not require you to run an Ethereum node. Browser-based IDEs and APIs are listed below. But if you are just learning, you should still run an Ethereum node to understand the basic components, and running a node is not difficult.
Clients available for running Ethereum nodes
Ethereum has many client implementations in different languages, that is, multiple methods of interacting with the Ethereum network. , including C++, Go, Python, Java, Haskell, etc. Why do we need so many implementations? Different implementations can meet different needs. For example, the goal of Haskell implementation is to be mathematically verifiable, to make Ethereum more secure, and to enrich the entire ecosystem.
At the time of writing this article, I am using the client geth (go-ethereum) implemented in the Go language. At other times, I also use a tool called testrpc, which uses the Python client pyethereum. Later examples will use these tools.
About mining: Mining is fun, a bit like caring for your houseplant, but also a way to learn about the entire system. Although the current price of Ethereum may not even cover the electricity bill, who knows in the future. People are creating many cool DApps that may make Ethereum more and more popular.
Interactive console: Once the client is running, you can synchronize the blockchain, create a wallet, and send and receive Ethereum. One way to use geth is through the Javascript console. In addition, you can use cURL-like commands to interact with the client through JSON RPC. The goal of this article is to take you through the process of DApp development, so I won’t go into details about this. But we should remember that these command line tools are useful for debugging, configuring nodes, and using wallets.
Running the node on the test network: If you run the geth client on the official network, it will take quite a while to download the entire blockchain and synchronize with the network.time. You can determine if synchronization has occurred by comparing the last block number printed in the node logs with the latest block listed on stats.ethdev.com. ) Another problem is that running smart contracts on the official network requires real Ethereum. Running the node on the test network does not have this problem. At this time, there is no need to synchronize the entire blockchain. Just create your own private chain, which saves time for development.
Testrpc: Use geth to create a test network. Another faster way to create a test network is to use testrpc. Testrpc can help you create a bunch of test accounts with funds at startup. It also runs faster and is therefore better suited for development and testing. You can start with testrpc, and then as the contract slowly takes shape, move to the test network created by geth - the startup method is very simple, you only need to specify a networkid: geth --networkid "12345". Here is the code repository for testrpc, we will talk about it again below.
Next, let’s talk about the available programming languages, and then we can start the real programming. Solidity is the programming language used to write smart contracts.
There are several languages to choose from for writing smart contracts: Solidity, which is somewhat similar to Javascript, has a file extension of .sol. Serpent, which is similar to Python, has a file name ending in .se. There is also a Lisp-like LLL. Serpent has been popular for a while, but now the most popular and stable one is Solidity, so just use Solidity. I heard you like Python? Use Solidity.
solc compiler: After writing the smart contract with Solidity, you need to use solc to compile it. It is a component from a C++ client implementation. Again, different implementations complement each other. Here is how to install it. If you don't want to install solc, you can also use a browser-based compiler, such as Solidity real-time compiler or Cosmo. The programming sections below will assume you have solc installed.
web3.js API. After the Solidity contract is compiled and sent to the network, you can use Ethereum's web3.js JavaScript API to call it and build web applications that can interact with it.
『三』How Blockchain Technology Becomes a Key Factor in Cybersecurity
How Blockchain Technology Becomes a Key Factor in Cybersecurity
Used by many leading cybersecurity companies Blockchain technology to prevent data tampering. Additionally, U.S. healthcare companies are beginning to explore this technology. storeThere are some drawbacks to keeping electronic health records, but from now on, decentralized databases promise to revolutionize these documents by creating an innovative healthcare architecture. Blockchain may be a way to solve the problems we face by expanding the use of the network, and ultimately more secure network communication.
Inside the Blockchain
Cryptocurrency is a digital currency that uses encryption technology to conduct secure transactions. Any type of cryptocurrency can use blockchain.
Blockchain technology is now a decentralized, public ledger technology. It is called blockchain technology because it allows digital currencies to maintain trusted transactions without relying on a central authority. network process.
This structure ensures that the system is free from government interference and manipulation, and market participants can track virtual currency transactions without the need for central records. Every transaction is recorded chronologically and added to the blockchain. Each host participating in this process gets a copy.
Each transaction is recorded in chronological order and added to the block chain. Each host participating in this process gets a copy of the blockchain. The concept includes a unique method to verify transactions, and within the scope of digital currencies, it also has the ability to digitize, encode and store any type of file, which is very important for cybersecurity.
Healthcare Companies and Their Innovation Strategies
Blockchain is a secure architecture with which a healthcare system can be built, with the right structure and parameters. In this system, patients will have accurate and up-to-date records that are protected from tampering or surveillance. This data can be easily and quickly shared with any provider who needs it.
An electronic health record (EHR) is a set of data that stores a patient's medical history. These records include all key administrative clinical data relevant to each individual's treatment. These may be a variety of parameters such as progress charts, potential problems, medications, immunizations, past medical history, and laboratory data.
EHRs streamline clinician workflow by providing automated access to information. It also has the ability to directly or indirectly support other nursing-related activities through a variety of interfaces, including evidence-based decision support, quality management and outcome reporting.
The main disadvantages of EHRs are that these records are not kept up to date with current information, and the data is not easily shared among providers. Another limitation is that data storage is not secure in case of potential cyber hazards. For these shortcomings, blockchain appears to be a smarter structure.
Take the city of Boston as an example. There are 26 different electronic medical record systems, each with its own language for representing and sharing data. Information in this case is not available when needed, resulting in loss of money and sometimes human life. Moreover, hackers have the opportunity to steal, delete or modify records, and in an emergency, doctors may lose access to critical medical information. This confusion can cause direct harm to patients.
DistrictThe blockchain structure can keep patient data secure for years and make any human errors in data entry easier to track and correct. Here, patients themselves can review and update information, and even make new records as they collect and observe. Hacking and fraud will be extremely difficult to occur.
Overview of Blockchain Capabilities
Blockchain can also help other network communication fields in terms of security.
John Zanni, Chairman of the Acronis Foundation, said, “We believe that blockchain technology will revolutionize the technology and IT fields in the coming years, just as the Internet did for the world in the 1990s and early this century. A few years ago we started working with the Ethereum blockchain to investigate how to better protect data. Today, part of our storage and backup software allows users to notarize any digital data and save their fingerprints on the blockchain , to ensure it cannot be tampered with.”
As the real and digital worlds collide, data has become a critical player for many businesses. However, ensuring that this data remains safe, secure, confidential and trustworthy has become an ongoing challenge.
In addition, in terms of cybersecurity, one of the biggest issues facing the industry today is data tampering, where data can be accidentally or intentionally tampered with in an authorized manner.
Experts need to pay attention to blockchain and plan how to apply this technology to the many potential applications that will pave the way for our future.
『四』 One article to understand the Internet blockchain
One article to understand the Internet blockchain
One article to understand the Internet blockchain, you need to understand the blocks In order to understand the blockchain, we have to study the brief history of the technological development of the blockchain starting from the birth of the Internet, discover the motivations for the emergence of the blockchain, and infer the future of the blockchain. Let’s understand the Internet blockchain in one article.
Understand the Internet blockchain in one article 1The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.
As the oldest blockchain project, Mahjong has a team of four miners. The first one to dig out the 13 correct hash values will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!
Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.
Mining pool = commission from the boss of the chess and card room.
It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.
A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.
The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the world’s mining machines.% of the computing power
Mahjong is actually the earliest blockchain project:
1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can Gain accounting rights and be rewarded.
2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.
3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.
4. Decentralization, everyone can be a banker, it is completely peer-to-peer.
5. UTXO, unspent transaction expenses.
There is another blockchain method of credit, assuming that everyone has no cash
Let’s take a closer look. When everyone reaches a consensus, we see There is no intermediary or third party to judge C’s win, and the rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralized, and players (miners) record their own records. After recording the results of the first game, B Dahu drew thirteen pieces, and B drew Jia Dongfeng. After the record is completed, a complete block is generated, but remember, this is only the first game. In the entire blockchain , this is just one node. After the 8 rounds mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger, which is the blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.
Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:
Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.
Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. But the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a deep respect for B's sincerity.I have a bad impression of Xin. I won’t take B with me next time I play mahjong.
Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.
Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .
In fact, in 2017 the blogger has developed a set of Mahjong coins
China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers The miner who collides with the correct hash value of 14 numbers can obtain an accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.
Understanding the Internet Blockchain in One Article 21. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain
In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.
1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem
In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.
This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.
In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.
Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.
In other words, in the technological ecology of the Internet, blockchain is theA new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the infrastructure and communication protocols at the bottom of the Internet. It is still one of the many software technologies that operate according to the TCP/IP protocol.
2. Cisco router technology born in 1984: an imitation of blockchain technology
In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.
In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a complete Internet device address table. Once something happens Changes will be synchronized to tens of millions of other routers (theoretically), ensuring that each router can calculate the shortest and fastest path.
When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.
3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion
The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is often called the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.
Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.
4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis
Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server, setting shared resources for use by other computers in the network, and as a workstation.
Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the Slashdot mailing list of the underground hacker site in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.
In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.
In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. The idealists also put a lot of enthusiasm into peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.
5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)
The hash algorithm converts numbers of any length into fixed-length values using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.
This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.
The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.
Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.
2. The birth and technical core of blockchain
The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because apart from blockchain, So far, there is no major invention in the history of modern science whose inventor cannot be found.
On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the authors claim to have invented a new set ofAn electronic currency system controlled by the government or institution, blockchain technology is the basis for supporting the operation of Bitcoin.
The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.
In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.
It is indeed difficult to fully and clearly explain the blockchain to the public. We use Bitcoin as the object to introduce the technical characteristics of the blockchain as simply as possible but in depth.
1. Blockchain is a peer-to-peer network (P2P) software application
As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.
Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.
2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network
Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.
However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.
The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large,It does have certain security advantages in preventing information tampering.
3. Blockchain is a peer-to-peer network (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network
Area The first application of blockchain is the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?
The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Every time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.
From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.
When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.
From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.
4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin
From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .
Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. while taking advantage of the difficulty for governments to regulate peer-to-peer networksFeatures, various altcoins exploded alongside Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.
Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.
Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".
ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. This process of issuing coins It’s called ICO. The emergence of ICO has amplified the transaction volume of Bitcoin and Ethereum. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.
Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.
3. The historical status and future prospects of blockchain technology in the Internet
1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.
We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.
2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.
It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.
In their headquarters, a powerful central server cluster has been established to store massive amounts of data. Hundreds of millions of users obtain the data they need from the giant servers.According to reports, this also led to the emergence of cloud computing, and then Internet giants opened up their unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.
The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.
3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom
The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure, and massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers to obtain the latest information and historical information.
If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.
Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.
So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman's terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.
This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.
4. Looking at the future prospects of blockchain from the Internet brain model
We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.
Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches 2017, with the advent of artificial intelligence, Internet of things, big data, cloud computing, robots, virtual realityIn fact, with the vigorous development of science and technology such as the industrial Internet, when humans look up to see the giant systems they have created, the model and architecture of the Internet brain have become increasingly clear.
Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.
The birth of the blockchain provides another neuron model. Instead of uniformly managing neurons in the centralized services of giants, each terminal, including personal computers and personal mobile phones, becomes an independent neuron node. , retaining an independent data space and synchronizing mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.
Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.
4. Judgment on the future status of blockchain in the Internet
1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.
2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network.
3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.
4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.
5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.
6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.
『五』What is blockchain technology and what are the core components of blockchain technology
From a technical point of view and an architectural point of view, let me tell you about it in popular language. Some understanding of blockchain.
What exactly is blockchain? Block chain, in a word, blockchain is a storage system, and the storage system is more detailed. Block chain is a distributed storage system without an administrator, and each node owns all data.
What do common storage systems look like?
First, let’s take a look at how to ensure high availability?
Ordinary storage systems usually use "redundancy" to solve high availability problems. As shown in the figure above, if the data can be copied into several copies and redundantly spread to multiple places, high availability can be ensured. If the data in one place is down, there will still be data in another place. For example, the master-slave cluster of MySQL has this principle, and the RAID of the disk also has this principle.
Two points that need to be emphasized here are: data redundancy, which often causes consistency problems
1. For example, in the master-slave cluster of MySQL, there is actually a delay in reading and writing. Sometimes, it actually means that there is inconsistency between reading and writing for a short period of time. This is a side effect of data redundancy.
2. The second point is that data redundancy often reduces writing efficiency, because data synchronization also consumes resources. If you look at single-point writing, if two slave libraries are added, the writing efficiency will actually be affected. Ordinary storage systems use redundancy to ensure high data availability.
Then the second question is, can an ordinary storage system perform multiple writes?
The answer is yes, for example, take this picture as an example:
In fact, MySQL can do a dual-master master-slave synchronization, dual-master master-slave synchronization, two nodes , and can be written at the same time. If you want to build a multi-machine room and multi-active data center, in fact, multi-machine room and multi-active data center also requires data synchronization. What should be emphasized here is that multi-point writing often leads to consistency issues of write-write conflicts. Taking MySQl as an example, assuming that the attribute of a table is an auto-increment ID, then the data in the database is now 1234, then one of the nodes When writing, a piece of data is inserted, it may become 5. Then these 5 pieces of data are synchronized to another master node. Before the synchronization is completed, if another writing node also inserts a piece of data, it will also generate A piece of data with an auto-incrementing ID of 5 is obtained. Then, after it is generated, it is synchronized to another node, and then when the synchronized data arrives, it will conflict with the two local 5s, and the synchronization will fail, which will cause write consistency conflicts. This problem will occur if there are multiple writes.
How to ensure consistency when writing multiple points?
Weixin's "Swan Master Class" will give you more technical work
『Lu』 What are the core blockchain technologies of blockchain technology?
What is the hottest Internet topic at the moment? You don’t need to tell me that it is blockchain technology. However, many friends have only heard of this technology and do not have too much in-depth understanding of it. So blockchain What are the technologies? Below we will bring you an introduction to the core technology of blockchain for your reference.
What are the core elements of blockchain technology?
Blockchain technology can be a public ledger (visible by anyone) or a permissioned network (visible only by those authorized), which solves supply chain challenges , because it is an immutable record that is shared among network participants and updated in real time.
Blockchain technology----data layer: designing the data structure of the ledger
Core technology 1. Block + chain:
Technically speaking, block is a data structure that records transactions. Reflects the flow of funds for a transaction. The blocks of transactions that have been reached in the system are connected together to form a main chain, and all nodes participating in the calculation record the main chain or part of the main chain.
Each block consists of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including the number of transactions and transaction details; the block header encapsulates the current version number, previous A block address, timestamp (recording the time when the block was generated, accurate to the second), random number (recording the value of decrypting the answer to the math question related to the block), the target hash value of the current block, and the Merkle number Root value and other information. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
The hash function can convert data of any length into a set of fixed-length codes through the Hash algorithm. The principle is based on a cryptographic one-way hash function. This kind of function is easy to verify, but difficult to crack. Usually, the industry uses y=hash(x) to represent it. This hash function implements operations on x to calculate a hash value y.
Commonly used hash algorithms include MD5, SHA-1, SHA-256, SHA-384 and SHA-512, etc. Taking the SHA256 algorithm as an example, inputting any string of data into SHA256 will result in a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. As long as the input data changes slightly (for example, a 1 becomes a 0), a completely different result will be obtained, and the result cannot be predicted in advance. Forward calculation (calculating the corresponding Hash value from the data) is very easy. Reverse calculation (cracking) is extremely difficult and is considered impossible under current technological conditions.
Core technology 3. Merkle tree:
Merkle tree is a hash binary tree, which can be used to quickly verify the integrity of large-scale data. In the blockchain network, the Merkle tree is used to summarize all the transaction information in a block, and finally generates a unified hash value of all the transaction information in the block. Any change in the transaction information in the block willCauses the Merkle tree to change.
Core technology 4. Asymmetric encryption algorithm:
Asymmetric encryption algorithm is a key secret method that requires two keys: public key and private key. The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it, thereby obtaining the corresponding data value; if the private key is used to sign the data, then only the corresponding public key can be used to sign the data. In order to verify the signature, the sender of the verification information is the holder of the private key.
Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption processes.
Blockchain technology----network layer: realize the decentralization of accounting nodes
Core technology 5. P2P network:
P2P network (peer-to-peer network), also known as point-to-point technology, is no Central server, Internet system that relies on user groups to exchange information. Unlike a centralized network system with a central server, each client in a peer-to-peer network acts as both a node and a server. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of decentralization and robustness.
Blockchain technology----Consensus layer: allocate the task load of accounting nodes
Core technology 6. Consensus mechanism:
Consensus mechanism is how to reach consensus among all accounting nodes to identify The validity of a record is both a means of identification and a means of preventing tampering. There are currently four main types of consensus mechanisms: PoW, PoS, DPoS and distributed consensus algorithms.
PoW (Proof of Work, proof of work): PoW mechanism, which is like Bitcoin’s mining mechanism, miners package existing transactions that have not been recorded by the network into a block, and then continue to traverse and try to find a random number , so that the hash value of the new block plus the random number meets certain difficulty conditions. Finding a random number that meets the conditions is equivalent to determining the latest block of the blockchain, and is also equivalent to obtaining the current round of accounting rights of the blockchain. Miners broadcast blocks that meet the mining difficulty conditions in the Yuanfu network. After verifying that the block meets the mining difficulty conditions and that the transaction data in the block meets the protocol specifications, other nodes in the entire network will each Blocks are linked to their own version of the blockchain, thereby forming a network-wide consensus on the current network state.
PoS (ProofofStake, Proof of Stake): PoS mechanism requires nodes to provide proof of a certain number of tokens to obtain a distributed consensus mechanism for competing for blockchain accounting rights. If you rely solely on the token balance to determine the bookkeeper, you will inevitably make the rich win, which will lead to the centralization of bookkeeping rights and reduce the fairness of the consensus. Therefore, different PoS mechanisms use different methods to increase the amount of money based on the proof of equity. The randomness of accounting rights avoids centralization. For example, in the PeerCoin PoS mechanism, the Bitcoin with the longest chain age has a greater chance of obtaining accounting rights. NXT and Blackcoin use a formula to predict the next accounting node. The more tokens you own, the greater the probability of being selected as an accounting node. In the future, Ethereum will also switch from the current PoW mechanism to a PoS mechanism. Judging from the information currently available, Ethereum's PoS mechanism will use nodes to place bets on the next block. The winner of the bet will receive an additional Ethereum currency award. Those who do not win will be deducted Ether coins to reach consensus on the next block.
DPoS (DelegatedProof-Of-Stake, share authorization certificate): DPoS is easy to understand and is similar to the modern corporate board of directors system. The DPoS mechanism adopted by BitShares is that shareholders vote to select a certain number of witnesses. Each witness has two seconds of authority to generate blocks in order. If the witness cannot generate a block within the given time slice, The block generation authority is given to the witness corresponding to the next time slice. Shareholders can replace these witnesses at any time by voting. This design of DPoS makes the generation of blocks faster and more energy-saving.
Distributed Consistency Algorithm: Distributed Consistency Algorithm is based on traditional distributed consistency technology. Among them are Byzantine fault-tolerant algorithms that solve the Byzantine Generals problem, such as PBFT (Byzantine fault-tolerant algorithm). In addition, distributed consensus algorithms (Pasox, Raft) that solve non-Byzantine problems are not explained in this article. This type of algorithm is currently a commonly used consensus mechanism in alliance chain and private chain scenarios.
Taken together, POW is suitable for public chains. If you build a private chain, it is more suitable to use POS because there is no trust problem in verification nodes; and because there are untrustworthy local nodes in the alliance chain, it is more suitable to use DPOS.
Blockchain technology----Incentive layer: Develop a "salary system" for accounting nodes
Core technology 7. Issuance mechanism and incentive mechanism:
Take Bitcoin as an example. Bitcoins are initially rewarded by the system to miners who create new blocks, and this reward is halved approximately every four years. At the beginning, miners were rewarded with 50 Bitcoins for each new block recorded, and this reward is halved approximately every four years. By analogy, by around AD 2140, newly created blocks will no longer receive rewards from the system. By then, the total number of Bitcoins will be approximately 21 million. This is the total number of Bitcoins, so it will not increase indefinitely.
Another source of incentives is transaction fees. When there are no system rewards for newly created blocks, the miners' income will change from system rewards to transaction fees. For example, when you transfer, you can specify 1% of it as a handling fee to be paid to the miner who records the block. If the output value of a transaction is less than the input value, the difference is the transaction fee, which will be added to the incentive for that block. As long as a given amount of electronic currency has entered circulation, the incentive mechanism can gradually be converted to rely entirely on transaction fees, so there is no need to issue new currency.
Blockchain technology----Contract layer: giving programmable features to the ledger
Core technology 8. Smart contract:
Smart contract isA set of scenario-responsive programmed rules and logic is implemented through decentralized, trustworthy and shared script code deployed on the blockchain. Usually, after the smart contract is signed by all parties, it is attached to the blockchain data in the form of program code, and is recorded in a specific block of the blockchain after being propagated through the P2P network and verified by nodes. Smart contracts encapsulate a number of predefined states and transition rules, scenarios that trigger contract execution, response actions under specific scenarios, etc. The blockchain can monitor the status of smart contracts in real time, and activate and execute the contract by checking external data sources and confirming that specific trigger conditions are met.
The above is what blockchain technologies the editor has brought to you? All content of the introduction to the core technology of blockchain.
『撒』 Five major factors that can promote the prosperity of blockchain technology in the future
The wind of change is blowing strongly. Starting from the Bitcoin craze at the end of 2017, Bitcoin futures contract trading reached a climax . The panic subsided a bit and buzzwords like blockchain, cryptocurrency and Bitcoin slowly faded from the headlines. But now the next phase for Bitcoin is the legalization of the asset class and the promotion of blockchain technology. Behind the market’s recent headlines about the trade war with the United States, a turf war has begun in the blockchain world. This is not a company changing its name to attract new investors, but some mature industries using this technology to cut costs and improve profit margins. Major companies like Walmart, UnitedHealth, and BMW have been adapting blockchain technology to suit their needs. It’s not just concepts, the practical applications of blockchain are already creating huge changes in industries around the world. The revolution has just begun, and when researching the cryptocurrency ecosystem, you'll find that there are many ways to invest in blockchain.
1) "Noisy Picks and Axes" and the Miners
During the Gold Rush, those who were truly wealthy were those who sold picks and axes. That is, these companies provide speculators with the tools to go out and find fortune. In the cryptocurrency world, this refers to companies that produce chips and hardware used in mining operations. Includes many semiconductor companies.
And the miners themselves. Miners confirm transactions between nodes by solving cryptographic problems and are then rewarded in cryptocurrencies. We’ve already seen publicly traded companies “mine” cryptocurrencies. These companies mine the tokens and then immediately sell them on the open market and pass the proceeds on to shareholders. Think of them like the pipeline companies of the energy industry. These companies are currently small but may become larger over time.
2) Cloud infrastructure
No industry relies as much on cloud technology for development as blockchain. The need to distribute the ledger globally without centralized ownership or regulatory trading authority takes full advantage of the cloud. However, the cloud is still at risk here, as blockchain technologyStorage can be distributed globally, countering the centralized nature of traditional cloud services. Still, the industry can adapt technology to benefit.
3) Payment processing and lending
One of the most disruptive industries for blockchain is payment processing. Unlike traditional financial intermediaries, blockchain technology supports a distributed, open, public ledger in which transactions are confirmed by other nodes in the chain and charge higher fees than those from traditional processors. The typical fees are much lower.
Blockchain technology is also ideal for lending, allowing it to spread risk across thousands of loans in an instant, regardless of the size of the lender. We are just the tip of the iceberg on this stage.
4) Investment firms, business development firms and consulting firms
There will be a wave of companies looking for ways to integrate blockchain technology into their existing businesses. Large consulting firms have begun offering services to help companies integrate new technologies. Gartner even developed a website specifically for this purpose.
Some public companies are acting as incubators for other emerging cryptocurrencies. There are currently over 1,600 cryptocurrencies in the world. These investors and business development firms invest in promising cryptocurrency technology companies before the technology becomes mainstream.
5) Futures and ETFs (Exchange Traded Funds)
The legalization of Bitcoin continues as futures contracts begin trading on two major U.S. exchanges. Soon, Bitcoin and Ethereum ETFs will also be officially regulated. Meanwhile, investors have been using GBTC as a proxy. As mentioned earlier, Goldman Sachs will soon open its trading desk, further proving the legitimacy of cryptocurrencies as an asset class.
Conclusion
There is no doubt that blockchain will have a huge impact on almost every industry you can think of. In fact, experts predict that the sector’s value will surge 8,500% to $60 billion by 2024.
Just like in the early days of the Internet, some companies will reap huge benefits. Others are just ephemeral. We cut through the gimmicks and hype to shine a light on the powerful, often little-known companies driving blockchain technology. Jianghui Shengxing Network Technology is a professional blockchain R&D company that provides overall blockchain solutions and uses the current popular blockchain technology to truly realize blockchain development. As a professional system development company, we have 5 years of system development experience and two years of blockchain development. We have very mature development experience and are constantly improving our technology and service quality. Solve customers' problems to the greatest extentneed. If you have blockchain system development, blockchain technology research and development, blockchain various system development, blockchain settlement system development, blockchain APP development, blockchain game development, blockchain transaction system development, district If you need blockchain solutions, blockchain project development, blockchain financial system development, blockchain business model system development, blockchain payment, blockchain application development, etc., you can contact me.
『8』What are the several elements in blockchain technology
The elements of Jinwowo network analysis are as follows:
1-Contains a Distributed database
2-Distributed database is the physical carrier of the blockchain, and the blockchain is the logical carrier of transactions. All core nodes should contain a full copy of the blockchain data
3-The blockchain serializes blocks in time, and the blockchain is the only subject of transaction data in the entire network
4-The blockchain is only valid for additions, not for others The operation is invalid
5-Public and private key verification based on asymmetric encryption
6-Accounting node requires that the Byzantine Generals problem can be solved/avoided
7 -The consensus process (consensus progress) is evolutionarily stable, that is, it will not collapse in the face of a certain amount of contradictory data from different nodes.
8-The consensus process can solve the double-spending problem
『九』 The three key points in blockchain technology are:
Consensus Algorithm, uses asymmetric encryption for data signature, and stores it in chain blocks. Blockchain is a chain composed of blocks one after another. Each block stores a certain amount of information, and they are connected into a chain in the order in which they were generated. This chain is saved in all servers. As long as one server in the entire system can work, the entire blockchain is safe. These servers are called nodes in the blockchain system, and they provide storage space and computing power support for the entire blockchain system. If you want to modify the information in the blockchain, you must obtain the consent of more than half of the nodes and modify the information in all nodes. These nodes are usually in the hands of different subjects, so tampering with the information in the blockchain is a serious problem. An extremely difficult thing. Compared with traditional networks, blockchain has two core characteristics: first, data is difficult to tamper with, and second, it is decentralized. Based on these two characteristics, the information recorded in the blockchain is more authentic and reliable, and can help solve the problem of people's mutual distrust. Blockchain originated from Bitcoin. On November 1, 2008, a person claiming to be Satoshi Nakamoto published the article "Bitcoin: A Peer-to-Peer Electronic Cash System", which elaborated on P2P network technology and encryption technology. , timestamp technology, blockchain technology and other electronic cash system architectural concepts, which marks the birth of Bitcoin. Two months later, the theory entered practice, and the first prologue was held on January 3, 2009.The genesis block numbered 0 is born. A few days later, block number 1 appeared on January 9, 2009, and was connected to the genesis block number 0 to form a chain, marking the birth of the blockchain. Blockchain in the narrow sense is a chained data structure that combines data blocks in a sequential manner in chronological order, and is a cryptographically guaranteed distributed ledger that cannot be tampered with or forged. Generalized blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses smart contracts composed of automated script codes. , a new distributed infrastructure and computing paradigm for programming and manipulating data.