区块链节点矿池设计规范,区块链节点有什么用
区块链节点是一种典型的分布式系统,它是由一组节点组成的网络,可以实现数据的安全存储和共享,也可以实现智能合约的执行。区块链节点矿池设计规范提供了一种可靠的节点矿池设计方案,可以有效地提高节点的可用性和可靠性,为区块链应用提供更安全、稳定的基础。本文将围绕以下三个关键词:节点矿池,节点可用性,节点可靠性,来讨论区块链节点矿池设计规范的重要性。
一、节点矿池
节点矿池是一种分布式系统,它可以将一组节点连接在一起,形成一个网络。节点矿池可以实现分布式计算、存储和共享数据,从而提高系统的可用性和可靠性。区块链节点矿池设计规范提供了一种可靠的节点矿池设计方案,可以有效地提高节点的可用性和可靠性,从而为区块链应用提供更安全、稳定的基础。
二、节点可用性
节点可用性是指系统中节点的可用状态,它是系统可靠性的重要指标。区块链节点矿池设计规范可以有效地提高节点可用性,通过节点矿池设计,可以有效地提高系统的可用性,当系统中的某个节点出现故障时,可以通过节点矿池设计,将其他节点的计算能力集中起来,从而提高系统的可用性。
三、节点可靠性
节点可靠性是指系统的可靠性,它是指系统中的数据是否可以被安全地存储和共享。区块链节点矿池设计规范可以有效地提高节点可靠性,通过节点矿池设计,可以将系统中的数据分散存储,从而提高系统的可靠性,防止数据被篡改或遭受破坏。此外,节点矿池设计还可以有效地提高智能合约的执行效率,从而提高系统的可靠性。
综上所述,区块链节点矿池设计规范对于提高节点的可用性和可靠性具有重要意义,可以为区块链应用提供更安全、稳定的基础。因此,在设计和实施区块链节点矿池时,应该遵循区块链节点矿池设计规范,以确保系统的可用性和可靠性。
请查看相关英文文档
Ⅰ Three common consensus mechanisms in blockchain
Blockchain is a distributed ledger system built on P2P network and participated by nodes. The biggest feature is " centralization”. That is to say, in the blockchain system, there is no need to establish trust between users, between users and institutions, and between institutions. Transactions can be realized by relying only on the blockchain protocol system.
But how to ensure the accuracy, authority, and reliability of the ledger? Why do nodes on the blockchain network participate in accounting? What should I do if the node is fake? How to prevent the ledger from being tampered with? How to ensure data consistency between nodes? …These are the problems that blockchain needs to solve when establishing “decentralized” transactions, resulting in the consensus mechanism.
The so-called "consensus mechanism" is to complete the verification and confirmation of transactions in a very short time through the voting of special nodes; when there is a disagreement, without central control, several Nodes participate in decision-making to reach consensus, that is, how to establish a trust relationship between individuals who have no basis for trust in each other.
Blockchain technology uses a set of consensus-based mathematical algorithms to establish a "trust" network between machines, thereby creating new credit through technical endorsement rather than centralized credit institutions.
Different blockchain types require different consensus algorithms to ensure that the last block on the blockchain can reflect the status of the entire network at any time.
So far, the blockchain consensus mechanisms mainly include the following: POW workload proof, POS equity proof, DPOS authorized equity proof, Paxos, PBFT (Practical Byzantine Fault Tolerance Algorithm), dBFT, DAG ( Directed acyclic graph)
Next, we will mainly talk about the principles and application scenarios of common POW, POS, and DPOS consensus mechanisms
Concept:
Proof of work was originally an economic term, referring to the measurement method set up by the system to achieve a certain goal. A simple understanding is a certificate to confirm that you have done a certain amount of work, and to prove that the corresponding amount of work has been completed by certifying the results of the work.
The proof-of-work mechanism has the advantage of complete decentralization. In a blockchain with a proof-of-work mechanism as the consensus, nodes can enter and exit freely and calculate the numerical solution of the random hash. The ability to compete for accounting rights and obtain correct numerical solutions to generate blocks is a concrete manifestation of node computing power.
Applications:
The most famous application of POW is Bitcoin. In the Bitcoin network, during the generation process of Block, miners need to solve complex problemsIt is a cryptographic mathematical puzzle to find a Block Hash that meets the requirements and consists of N leading zeros. The number of zeros depends on the difficulty value of the network. During this period, a lot of trial calculations (workload) are required, and the calculation time depends on the hashing speed of the machine.
Finding a reasonable hash is a probabilistic event. When a node has n% of the computing power of the entire network, the node has an n/100 probability of finding the Block Hash. After the node successfully finds a satisfactory Hash value, it will immediately broadcast the packaged block to the entire network. The nodes in the network will verify it immediately after receiving the broadcast packaged block.
If the verification passes, it means that a node has successfully solved the puzzle, and it will no longer compete for the current block, but choose to accept the block, record it in its own ledger, and then proceed to the next block. Competitive guessing game of blocks. Only the fastest puzzle-solving block in the network will be added to the ledger, and other nodes will copy it, thus ensuring the uniqueness of the entire ledger.
If a node engages in any cheating behavior, it will cause the network node verification to fail and directly discard its packaged block. This block will not be recorded in the general ledger, and the cost of the cheating node will be It is all in vain. Therefore, under the huge mining cost, miners voluntarily comply with the consensus protocol of the Bitcoin system, thus ensuring the security of the entire system.
Advantages and Disadvantages
Advantages: The results can be verified quickly, the system bears a large number of nodes, and the cost of evil is high to ensure the conscious compliance of miners.
Disadvantages: It requires a large amount of algorithm consumption, and it takes a long time to reach consensus
Concept:
Proof of Stake mechanism (Proof of Stake), requirements A certifier provides ownership of a certain amount of cryptocurrency.
The way the proof-of-stake mechanism works is that when a new block is created, the miner needs to create a "coin rights" transaction, which will send some coins to the miners themselves according to a preset ratio. The proof-of-stake mechanism reduces the mining difficulty of nodes in equal proportions based on the proportion and time of tokens owned by each node based on the algorithm, thus speeding up the search for random numbers.
Application:
In 2012, a netizen with the pseudonym Sunny King launched Peercoin, which was the first application of the proof-of-stake mechanism in encrypted electronic currency. The biggest innovation of PPC is that its mining method mixes POW and POS methods, uses a proof-of-work mechanism to issue new coins, and uses a proof-of-stake mechanism to maintain network security.
In order to realize POS, Sunny King drew lessons from Satoshi Nakamoto’s Coinbase and specially designedA special type of transaction called Coinstake.
The picture above shows how Coinstake works. Coin age refers to the holding period of the currency. If you own 10 coins and hold them for 10 days, then you have collected 100 days of coins. age. If you use these 10 coins, the coin age is consumed (destroyed).
Advantages and Disadvantages:
Advantages: Shortens the time required to reach consensus and is more energy-saving than proof of work.
Disadvantages: Essentially, nodes in the network are still required to perform mining operations, and the authenticity of transfers is difficult to guarantee
Concept:
Authorized equity certificate Mechanism (Delegated Proof of Stake) is similar to board voting. This mechanism has a built-in real-time shareholder voting system, just like the system is convening a never-ending shareholders' meeting at any time, where all shareholders vote to decide company decisions.
While trying to solve the problems of traditional PoW and PoS mechanisms, authorized proof of equity can also offset the negative effects of centralization by implementing technological democracy. The decentralization of the blockchain established based on the DPoS mechanism relies on a certain number of representatives rather than all users. In such a blockchain, all nodes vote to elect a certain number of node representatives, who act on behalf of all nodes to confirm blocks and maintain the orderly operation of the system.
At the same time, all nodes in the blockchain have the power to remove and appoint representatives at any time. If necessary, all nodes can vote to disqualify the current node representatives and re-elect new representatives to achieve real-time democracy.
Application:
Bitshare is a type of cryptocurrency that uses the DPOS mechanism. By introducing the concept of witnesses, witnesses can generate blocks, and everyone who holds BitShares can vote for witnesses. Candidates who get the top N (N is usually defined as 101) candidates in the total number of consent votes can be elected as witnesses. The number of elected witnesses (N) must meet: at least half of the participating voters believe that N has been fully decentralized. .
The candidate list of witnesses is updated every maintenance cycle (1 day). The witnesses are then randomly arranged, and each witness has 2 seconds of permission time to generate a block in order. If the witness cannot generate a block in a given time slice, the block generation permission is given to the witness corresponding to the next time slice. . This design of DPoS makes the generation of blocks faster and more energy-saving.
DPOS makes full use of the votes of shareholders to reach consensus in a fair and democratic way. The N witnesses they voted for can be regarded as N mines.Pool, and the rights of these N mining pools are completely equal to each other. Shareholders can change these witnesses (mining pools) at any time by voting, as long as the computing power they provide is unstable, the computer is down, or they try to use their power to do evil.
Advantages and Disadvantages:
Advantages: Reduce the number of nodes participating in verification and accounting, thereby achieving second-level consensus verification
Disadvantages: Centrality Weaker, the security is weaker than POW, and the node agents are artificially selected, and the fairness is lower than POS. At the same time, the entire consensus mechanism still relies on the additional issuance of tokens to maintain the stability of the agent nodes.
Ⅱ One article to understand the Internet blockchain
One article to understand the Internet blockchain
One article to understand the Internet blockchain. To understand the blockchain, We have to study the brief history of blockchain technology development starting from the birth of the Internet, discover the motivations for blockchain, and infer the future of blockchain. Let’s understand the Internet blockchain in one article.
Understand the Internet blockchain in one article 1The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.
As the oldest blockchain project, Mahjong has a group of four miners. The first one to dig out the 13 correct hash values will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!
Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.
Mining pool = commission from the boss of the chess and card room.
It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.
A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.
The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the computing power.
Mahjong is actually the earliest blockchain project:
1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights. and get rewarded.
2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.
3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.
4. Decentralization, everyone can be a banker, it is completely peer-to-peer.
5. UTXO, unspent transactionsexpenditure.
There is another blockchain method of credit, assuming that everyone has no cash
Let’s take a closer look. When everyone reaches a consensus, we see There is no intermediary or third party to judge whether C wins, and the rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralized, and players (miners) record their own records. After recording the results of the first game, B Dahu drew thirteen pieces, and B got Jia Dongfeng. After the record was completed, a complete block was generated, but remember, this was only the first game. In the entire blockchain , this is just one node. After the 8 rounds mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger, which is the blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.
Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:
Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.
Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. However, the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a bad impression of B's integrity. Next The first time I play mahjong, I won’t take B to play with me.
Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.
Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .
In fact, in 2017 bloggers have startedA set of Mahjong coins were issued
China's earliest blockchain project: a group of four miners, the first miner to collide with the correct hash value of 14 numbers from 148 random numbers will receive one Accounting rights incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.
Understanding the Internet Blockchain in One Article 21. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain
In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.
1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem
In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.
This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.
In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.
Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.
In other words, in the technical ecology of the Internet, blockchain is a new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.
2. Cisco router technology born in 1984: an imitation of blockchain technology
In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.
WholeIn the Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a completed Internet device address table. Once a change occurs, it will be synchronized to other routers. On tens of millions of routers (theoretically), ensure that each router can calculate the shortest and fastest path.
When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.
3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion
The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is also often referred to as the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.
Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.
4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis
Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server, setting shared resources for use by other computers in the network, and as a workstation.
Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the mailing list of the underground hacker site Slashdot in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.
In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.
In the past 20 years, some technology giants on the Internet such as WeiboSoftware, IBM, but also liberals, hackers, and even criminals who infringe on intellectual property rights continue to promote the development of peer-to-peer networks. Of course, idealists on the Internet who want to strengthen information sharing have also invested a lot of enthusiasm in peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.
5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)
The hash algorithm converts numbers of any length into fixed-length values using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.
This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.
The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.
Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.
2. The birth and technical core of blockchain
The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because in addition to blockchain, to So far, there is no major invention in the history of modern science whose inventor cannot be found.
On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.
The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.
In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to CryptozoologyExpert Hal Finney, this also became the first transaction in the history of Bitcoin. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.
It is indeed difficult to fully and clearly explain the blockchain to the public. We use Bitcoin as the object to introduce the technical characteristics of the blockchain as simply as possible but in depth.
1. Blockchain is a peer-to-peer network (P2P) software application
As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.
Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.
2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network
Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.
However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.
The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.
3. Blockchain is a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network
Area The first application of the blockchain was the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?
The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Each time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miners can tell this numberBlockchain program, the blockchain will reward 50 Bitcoins to miners.
From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.
When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.
From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.
4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin
From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .
Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.
Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.
Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".
ICO: Since Bitcoin and Ethereum have been connected with variousFor the exchange of national legal tender and the issuance of other new virtual currencies, only Bitcoin and Ethereum are allowed to be used to purchase the new coins issued. This currency issuance process is called ICO. The emergence of ICO has amplified the transaction volume of Bitcoin and Ethereum. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.
Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.
3. The historical status and future prospects of blockchain technology in the Internet
1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.
We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.
2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.
It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.
In their headquarters, a powerful central server cluster was established to store massive amounts of data. Hundreds of millions of users obtained the data they needed from the giant servers. This also led to the emergence of cloud computing, and then the Internet giants Open up your unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.
The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.
3. The technical flaws of the blockchain: the dilemma caused by the pursuit of complete equality and freedom
The technical flaws of the blockchain come firstIn terms of its peer-to-peer network architecture, for example, Taobao currently has a B/S structure. Massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers to obtain the latest information and historical information. .
If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.
Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.
So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman's terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.
This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.
4. Looking at the future prospects of blockchain from the Internet brain model
We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.
Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches 2017, with the advent of artificial intelligence, With the vigorous development of science and technology such as the Internet of Things, big data, cloud computing, robots, virtual reality, and the industrial Internet, when humans look up to see the giant systems they have created, the model and architecture of the Internet brain have become increasingly clear.
Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.
The birth of the blockchain provides another neuron model. Instead of uniformly managing neurons in the centralized services of giants, each terminal, including personal computers and personal mobile phones, becomes an independent neuron node. , retaining an independent data space and synchronizing mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.
Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.
4. Judgment on the future status of blockchain in the Internet
1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.
2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses hashing algorithms to generate "tokens" to synchronize information across the entire network.
3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.
4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.
5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.
6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.
Ⅲ Ranking of the top ten domestic eth mining pools
1. Ethereum
It is the world's leading Bitcoin data service provider and mining pool and wallet solution provider. Since 2015, the team has started with industry infrastructure such as block explorers and is committed to building new standards in various sub-fields. Brands can be seen in wallets, mining pools, quotes, information and other fields.
2. F2Pool
F2Pool is one of the largest Bitcoin and Litecoin mining system mining pools in China. Data shows that F2Pool is currently the second largest mining pool in the world, second only to AntPool.
3. Qianyin
Biyin was established in November 2017 and was built by the original core team. The team’s products and technical output now serve most of the entire networkDivide Bitcoin computing power; create multiple products within two years, spanning multiple vertical fields such as blockchain browsers, mining pools, and wallets. Biyin Mining Pool is a professional mining pool that supports mining of all mainstream currencies. Currently supported currencies include: BTC, BCH, BSV, ZEC, LTC, ETH, DCR, DASH, and XMR.
4. Huobi Mining Pool
Huobi Mining Pool is the world’s first mining pool platform that integrates digital asset mining and trading. It adopts a new distribution model FPPS based on the POW mining mechanism. Most mining pools on the market adopt the traditional PPS settlement and distribution model. In contrast, Huobi’s FPPS model reduces miners’ packaging fees, and each miner can increase profits by about 5%. Through this move, Huobi Mining Pool differentiates itself from other mining pools and attracts miners to join.
5. Ant Pool
Ant Pool is an efficient digital currency mining pool developed by BitTaiwan using a large amount of resources. Committed to providing miners with a more friendly interface, more complete functions, more uses, and more generous and transparent benefits. Make more contributions to the development of currency. Ant Pool is an efficient digital currency mining pool that is committed to providing miners with a friendlier interface, better functions, easier use and more transparent benefits. Ant Pool provides Bitcoin, Litecoin, and Ethereum mining services for a variety of digital currencies, and supports multiple payment methods such as PPS, PPLNS, and SOLO.
6. Webit
Webit is a professional digital currency technology service provider. Its service scope includes digital currency trading platforms, digital currency mining pools, and cloud mining contracts. Founded in May 2016, the Bitcoin mining pool was launched in June of the same year, and cloud mining products were launched in November. In March 2017, Weibit received 20 million yuan in Series A financing led by BitTaiwan to expand its exchange business. In June, Weibit will be launched on the digital currency trading platform.
7. 58COIN&1THash
58COIN&1THash is a business under 58COIN. 58COIN relies on mining pools to build bit computing power. This is a new business prepared by 58COIN together with mining machine manufacturers, mining pools, and mine owners. Users only need to pay the mining machine fee, electricity fee, and management fee to enjoy stable mining services. Users can view it in the background at any time. The current business includes mining machine sales and hosting, mining machine leasing and standard cloud computing services.
8. Binance Mining Pool
The current mining pool structure is mainly divided into three categories. The first category is Bitcoin POW mining pools, including Mining Pool, Printcoin, and Bitmain’s Ant Pool; the second category is other mining pools, such as Ethereum Mining Pool and Spark Mining Pool; and the third category is exchange mining pools. Pools, such as Huobi Pool, OK Pool, and Binance Pool. As the "digital economic operating system" of the new world, Binance is in the field of digital asset trading and circulation, in the field of blockchain market education, in the field of decentralized circulation exploration, the asset circulation platform is in the field of cloud computing, and in the market and digital asset industry. data domain,In the field of financial derivatives and other ecosystems, they have achieved very good results and created global influence. Of course, for the real economy in the field of blockchain and digital economy, "cloud computing power platform", that is, mining pool, Binance has also created another "commercial connotation" in a very short period of time.
9. OKEXPool
In the published data, OKExPool has rapidly developed from a market share of about 0% in October 2019 to the sixth largest mining pool in terms of market share. However, on the hashrate trend curve, OKExPool’s hashrate dropped sharply in January 2020. Some market participants told PANews that the reason for the rapid decline in OKExPool's computing power may be the addition of more centralized small mines, and there is currently a lack of investors to join the computing power structure.
Although exchanges are generally newcomers to the mining pool field, the mining pool business held by exchanges still has certain natural advantages over traditional companies.
10. BTC.TOP
After years of stable operation, Lybit Mining Pool was initially a private mining pool with the largest computing power in the entire network. Now facing the market of Ethereum, we sincerely invite all miners to share the mining benefits brought by its technology. The newly upgraded and revised Lebit mining pool system is more in line with customer needs, with richer content and simpler operations.
IV How many mining pools can there be for a virtual currency?
1. The income obtained by the master node comes from the same mining pool, about 45% Block rewards are built into this plan. Considering that the reward rate of the masternode reward program is a fixed percentage and the fact that the masternode network nodes fluctuate, it is expected that the masternode reward will change based on the total number of masternodes currently in effect. The market share can be calculated by the following calculation formula: 29% Current mining pool computing power: 56.96TH/s Mining reward settlement mode: PPS + fee: 1.0% 5. Dwarfpool In DwarfPool, the credit rating of miners is divided into RBPPS or HBPPS. Using RBPPS, as long as you have an A value, you can get the corresponding reward. The HBPPS accrual algorithm is time-based.
2. Since the probability of a single mining machine to mine a block is very small, after all, it takes a lot of computing power to mine a block in 10 minutes. Even with such a large computing power, it can be mined. , there are also many competitors. So it becomes a game of 0s and 1s. The emergence of mining pools is to break this 0 and 1. In 2021, the Jiangsu Provincial Communications Administration comprehensively investigated the "mining" behavior of virtual currencies in Jiangsu Province. Monitoring found that the export traffic of mining pools carrying out virtual currency activities in Jiangsu Province reached 136.77mbps. The total number of "mining" Internet IP addresses is 4,502, consuming more than 10 ph/s of computing resources and 260,000 kWh/day of energy. Based on the provincial virtual currency.
3. Based on the current difficulty calculation, approximately 1.012 Litecoins can be mined per day. This is the average calculation result in the mining pool, such asIf there is an efficient mining pool or SOLO, maybe more. Litecoin (abbreviation: LTC, currency symbol: 321;) is an online currency based on "peer-to-peer" technology. At this press conference, the National Development and Reform Commission also clearly elaborated on the "mining of virtual currency" "Hazards", and stated that it will continue to do a good job in the management of the entire chain of virtual currency "mining", establish a long-term mechanism, and strictly prevent "resurgence". Let’s take a look at the key points of the press conference: From January to October, industrial power generation above designated size nationwide was 6,717.6 billion kilowatt-hours, year-on-year.
4. Since the total quantity is relatively small, its scarcity is very high. Now the number is permanently limited to about 21 million! Ethereum: Ethereum is an open source public blockchain platform with contract functions. Through its dedicated cryptocurrency Ethereum, it is also a decentralized virtual machine to handle peer-to-peer contracts! In 2013, the program above is about how mining pools mine. The difficulty of mining has greatly increased, but the mining army is constantly expanding. If the basic equipment does not meet the standards, it will be difficult to make a difference in the mining industry. Harvest, because the value of the mined virtual currency may not be worth the price of a piece of equipment, and many miners do not just mine.
W. In the era of stand-alone games, the protagonist accumulated currency by defeating enemies and winning money in gambling halls. He used these to buy herbs and equipment, but they could only be used in his own game machine. At that time, there was no "market" among players. Since the Internet established portals and communities and realized the networking of games, virtual currency has had a "financial market". Mining pools are the necessary infrastructure for the mining of P2P cryptographic virtual currencies such as Bitcoin (digital currency), and are generally open to the outside world. The purpose of the team mining server is to improve the stability of Bitcoin mining and stabilize miners' salaries. Currently, the mining pools with the largest computing power in the world include F2Pool, AntPool, and Coin.
IV What does blockchain node mean?
Blockchain node means a smart device connected to the blockchain network. It can be called a node, but This node may play different roles depending on the characteristics of the device. This is a great feature of distributed networks, and the more nodes there are on the entire blockchain network, it means that the blockchain network is more widely distributed, more stable and more secure. Nodes include mobile phones, mining machines, servers, etc. Those who operate a node can be ordinary wallet users, miners, and mining pool users who collaborate with multiple people. ”
[Extended information]
A node is a server in a region. In the Internet area, all the running data of an enterprise is in one server, then this server is a node.
Just like what we use every day WeChat handles so many chat messages, transfers, etc. every day. The storage and operation of these data are all in Tencent's company's servers. Then this server that processes data can be called a "node". Let's talk about blockchain world, everyone already knows that the blockchain is a decentralized distributed database. It does not rely on any centralized server. It is composed of thousands of "small servers". As long as we download a blockchain client, we become one of the thousands of "little servers".
In this way, if we want to play with the blockchain, we ourselves are equivalent to a node.
Nodes are also divided into light nodes and full nodes. A full node is a node that owns all the transaction data of the entire network, while a light node is a node that only owns transaction data related to itself. Moreover, the more and more nodes are distributed, the more decentralized the blockchain network will be, and the safer and more stable the network operation will be. For example, Lianxin has 16 million Lianxin users. This shows that there are also many Lianxin nodes. Now friends who want to play with blockchain can try Lianxin. LianXin is a good blockchain application.
The existence of nodes is a representation of the distributed nature of the blockchain and is also the charm of the blockchain.
Blockchain is a distributed system. There are many nodes in the system. You can simply understand these nodes as computers or servers connected through the Internet. Then, depending on the nature of the blockchain, the ways to become a node are also different. Of course, the definition of a node is also different. For public chains like Bitcoin, theoretically speaking, you only become a node when you download the complete blockchain and participate in transactions and mining.
However, in today's Bitcoin, miners, full nodes, lightweight nodes, and even ordinary users may all be called nodes in different contexts. But in any case, the Bitcoin system is not so much "the blockchain will automatically update when connected to the network", but rather that if you want to mine or trade (and you don't trust other people's verification results), you must update it. For the entire blockchain, this is not an automatic obligation, but a voluntary matter.
VI What is the TNB node mining pool?
TNB is a digital currency.
Similar to Bitcoin, it is a decentralized digital cryptocurrency issued based on blockchain technology. The difference from Bitcoin is that TNB currency is covered with a shell and is not a pure digital currency.
VII What epic vulnerabilities did 360 discover in the blockchain?
According to news on May 29, recently, the Vulcan team of 360 Company discovered a vulnerability in the blockchain platform EOS. A series of high-risk security vulnerabilities. It has been verified that some of these vulnerabilities can remotely execute arbitrary code on EOS nodes, that is, they can directly control and take over all nodes running on EOS through remote attacks.
Blockchain network security risks require urgent attention
EOS is a new blockchain platform called "Blockchain 3.0". The currency market value is as high as 69 billion yuan, ranking fifth in the world in market value.
In the blockchain network and digital currency system, there are many attack surfaces in nodes, wallets, mining pools, exchanges, smart contracts, etc. 36The 0 security team has previously discovered and exposed multiple serious security vulnerabilities targeting digital currency nodes, wallets, mining pools and smart contracts.
The series of new security vulnerabilities discovered by the 360 Security Team in the smart contract virtual machine of the EOS platform are a series of unprecedented security risks. No security researchers have discovered such problems before. This type of security issue not only affects EOS, but may also affect other types of blockchain platforms and virtual currency applications.
360 expressed the hope that through the discovery and disclosure of this vulnerability, the blockchain industry and security peers will pay more attention and attention to the security of such issues, and jointly enhance the security of the blockchain network. Safety.
Content source: The Paper
VIII Nodes in the blockchain network include
Nodes in the blockchain network include mobile phones, mining machines, servers, etc. .
Nodes refer to computers in the blockchain network. Blockchains are participated by a large number of individuals or family users. Each individual or family is a node of the blockchain.
Blockchain is composed of small blocks. Everyone who forms a block node does not know each other, but they trust each other because they also have a common purpose, which is to obtain the rewards of the mechanism.