区块链技术框架搭建方案,区块链技术框架搭建流程
区块链技术框架搭建方案和流程是实现区块链技术的重要步骤,它们涉及到一系列的关键词,如系统架构、数据结构、安全机制等。本文将介绍三个与区块链技术框架搭建方案和流程相关的关键词:节点管理、智能合约、共识机制。
节点管理是区块链技术框架搭建方案和流程中的一个重要关键词。节点管理指的是在区块链网络中,网络中的节点参与者如何管理和运行网络,以及节点参与者之间如何进行交互。节点管理包括节点的拓扑结构、节点的状态管理、节点的访问权限管理等内容。节点管理可以帮助区块链网络更好地运行,保持网络的安全性和稳定性,为网络参与者提供更好的服务。
智能合约是区块链技术框架搭建方案和流程中的另一个重要关键词。智能合约是指基于区块链技术的可编程的自动执行协议,它可以自动执行和管理合同条款,无需人工干预。智能合约的特点是可信赖、可追溯、可审计、可扩展等。智能合约可以更好地保护网络参与者的权益,更好地实现网络参与者之间的交易,更好地实现网络参与者之间的交互。
共识机制是区块链技术框架搭建方案和流程中的另一个重要关键词。共识机制是指在区块链网络中,网络参与者之间通过一定的规则和机制来达成共识,以确保网络的安全性、去中心化和可扩展性。目前,最常用的共识机制包括工作量证明(Proof of Work)、权益证明(Proof of Stake)、拜占庭容错(Byzantine Fault Tolerance)等。共识机制可以有效地保护网络的安全性,为网络参与者提供更好的服务。
以上就是关于区块链技术框架搭建方案和流程的三个关键词:节点管理、智能合约和共识机制的介绍。这三个关键词都是区块链技术框架搭建方案和流程中不可或缺的内容,它们可以帮助我们更好地理解和掌握区块链技术框架搭建方案和流程。
请查看相关英文文档
A. The organizational structure that makes up the basic computing functions of the blockchain
With the rapid development of the Internet, consumers’ understanding of blockchain technology and digital virtual currency The level of knowledge is also constantly improving. Today, let’s take a look at the structures of the basic computing methods of blockchain technology. Let’s take a look at the specific situation in the following Java course.
The basic elements that make up computing technology are storage, processing and communication. Mainframes, PCs, mobile devices, and cloud services all exhibit these elements in their own way. There are also dedicated building blocks within each element to allocate resources.
This article focuses on the large framework of the blockchain: it introduces the modules of each computing element in the blockchain and some implementation cases of each module, preferring an overview rather than a detailed explanation.
The building blocks of blockchain
The following are the building blocks of each computing element in decentralized technology:
p>
Storage: token storage, database, file system/blob
Processing: stateful business logic, stateless business Logic, high-performance computing
Communication: a connected network of data, value and state
Storage
As a basic computing element, the storage part contains the following building blocks.
Token storage. Tokens are storage media of value (such as assets, securities, etc.), and the value can be bitcoins, airline miles, or the copyright of digital works. The main function of the token storage system is to issue and transfer tokens (there are many variations) while preventing events such as multiple payments from occurring.
Bitcoin and Zcash are two "pure" systems that only focus on the token itself. Ethereum began to use tokens for various services to realize its ideal of serving as a global computing center. These are examples where tokens are used as internal incentives to operate the entire network architecture.
There are also some tokens that are not internal tools used by the network to promote its own operation, but are used as incentives for higher-level networks, but their tokens are actually stored in in the underlying architecture. One example is an ERC20 token like Golem, which runs on the Ethereum network layer. Another example is Envoke’s IP authorization token, which runs on the IPDB network layer.
Database. Databases specialize in storing structured metadata, such as data tables (relational databases), document stores (such as JSON), key-value stores, time series or graph databases. Databases can quickly retrieve data using queries like SQL.
Traditional distributed (but centralized) databases such as MongoDB and Cassandra typically store hundreds of terabytes or even petabytesLevel data, performance can reach millions of writes per second.
Query languages like SQL are very powerful because they separate implementation from specifications, so that Fu Tanqing is not bound to a specific application. . SQL has been used as a standard for decades, so the same database system can be used in many different industries.
In other words, to discuss generality outside of Bitcoin, one does not necessarily have to talk about Turing completeness. You only need one database, which is both concise and easy to expand. There are times when Turing completeness is also useful, which we will discuss in detail in the "Decentralized Processing" section.
BigchainDB is decentralized database software and a specialized document storage system. It is based on MongoDB (or RethinkDB) and inherits the latter's query and expansion logic. But it also has the characteristics of blockchain, such as decentralized control, tamper resistance and token support. IPDB is a regulated public instance of BigchainDB.
In the field of blockchain, it can also be said that IOTA is a time series database.
File system/blob data storage. These systems store large files (movies, music, large data sets) in a hierarchical structure of directories and files.
IPFS and Tahoe-LAFS are decentralized file systems that contain decentralized or centralized blob storage. FileCoin, Storj, Sia and Tieron are decentralized blob storage systems, as is the old and wonderful BitTorrent, although the latter uses a p2p system rather than a token. Ethereum Swarm, Dat, and Swarm-JS basically support the above two methods.
Data market. Such systems connect data owners (such as businesses) with data users (such as AI startups). They sit on top of databases and file systems, but they are still the core architecture because countless data-hungry applications (such as AI) rely on such services. Ocean is an example of a protocol and network upon which a data marketplace can be created. There are also application-specific data marketplaces: EnigmaCatalyst for crypto markets, Datum for private data, and DataBrokerDAO for IoT data streams.
Processing
The basic computational element of processing is discussed next.
"Smart contract" system usually refers to a system that processes data in a decentralized form [3]. It actually has two subsets with completely different properties: stateless (combined) business logic and stateful (sequential) business logic. Stateless and stateful in complexity, verifiability, etc.The differences are huge. The three decentralized processing modules are high-performance computing (HPC).
Stateless (combined) business logic. This is arbitrary logic and does not retain state internally. In electrical engineering terms, it can be understood as a combinational digital logic circuit. This logic can be expressed as a truth table, a logic diagram, or code with conditional statements (a combination of if/then, and, or, not, etc.). Because they are stateless, it is easy to verify large stateless smart contracts, creating large provably secure systems. N inputs and one output require O(2^N) calculations to verify.
The Inter-Ledger Protocol (ILP) includes crypto-conditions (CC) protocols to clearly label combinational circuits. CC is easy to understand because it became an Internet standard through the IETF, while ILP is widely used in various centralized and decentralized payment networks (such as Ripple used by more than 75 banks). CC has many independently implemented versions, including JavaScript, Python, Java, etc. BigchainDB, Ripple and other systems also use CC to support combined business logic/smart contracts.
B. Peking University Jade Bird Design Training: Element Architecture of Blockchain Technology
With the continuous development of the Internet, more and more people are Now that we have learned about some of the characteristics and usage of blockchain technology, today we will introduce some of the elements of blockchain in Guangzhou.
Composition of Blockchain Blockchain consists of blocks and chains.
Each block contains three elements: data, hash value, and the hash value of the previous block.
The first element of the block is data.
The data stored in the block is related to the type of blockchain.
For example, blocks in the Bitcoin blockchain save relevant transaction information, including sellers, buyers, and the amount of Bitcoin traded.
The second element of the block is the hash value.
Each block contains a hash value, which is used to identify a block and all the content it contains.
Once a block is created, its hash value is calculated accordingly.
Changing something in the block will cause the hash value to change.
So in other words: hashes are helpful when you want to detect changes to content in a block.
If the fingerprint of a block changes, it is no longer the same block as before.
The third element of the block is the hash of the previous block.
This element allows links to be formed between blocks and makes the blockchain very secure.
For example, suppose we have a blockchain containing 3 blocks.
Each block contains its own hash value and the hash value of the previous block.
Block No. 3 points to Block No. 2, and Block No. 2 points to Block No. 1.block.
But block No. 1 is a bit special, it cannot point to the previous block because it is the first block.
We call block 1 the genesis block.
So, now let's assume you tampered with the second block.
This will cause the hash value of the second block to change, so the data stored in block No. 3 will be wrong and illegal.
Once the data stored in block 3 is illegal, the following blocks must also be illegal.
So if a person wants to tamper with any block in the blockchain, it must modify this block and all blocks after this block.
This will be a heavy task.
Blockchain's Proof of Work However, the method of using hash values alone is not enough to prevent users from tampering with blocks.
Because today's computer computing speed is powerful enough and can calculate thousands of hash values per second.
java course http://www.kmbdqn.cn/ suggests that you can completely tamper with a block and recalculate the hash values of other blocks, thus making your block legal again.
C. What are the blockchain architecture designs?
As an architectural design, the implementation of blockchain is quite different from basic languages or platforms. Blockchain is the technology behind cryptocurrency. It is one of the popular technologies currently on par with VR and virtual reality. It is not a new technology in itself. It is similar to Ajax. It can be said to be a technical architecture, so let’s talk about it from the perspective of architectural design. Blockchain technology implementation. No matter what programming language you are good at, you can refer to this design to implement a blockchain product. At the same time, we will sort out the related knowledge maps and systems to help everyone study and research systematically.
In terms of architectural design, blockchain can be simply divided into three levels, the protocol layer, the extension layer and the application layer. Among them, the protocol layer can be divided into the storage layer and the network layer, which are independent of each other but inseparable.
Blockchain Architecture Diagram
The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is developed by the School Planning, Construction and Development Center of the Ministry of Education of China "Smart Learning Workshop 2020-Master's Degree Innovation Workstation" is the only approved "Blockchain Technology Professional" pilot workstation. The professional position is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.
D. Blockchain STO registration process for U.S. companies to build VIE structures
STO is the issuance of security tokens. It is a securities issuance with Token as the carrier. This Tokne can be used to replace stocks, bonds, loans and other asset targets. Judging from the name, it is similar in concept to ICO and IFO, and is a way of issuing tokens. The most significant feature of STO is that the tokens issued have securities properties and are regulated by securities agencies (such as the U.S. SEC) and relevant securities laws and regulations.
In layman’s terms, security tokens must be linked to assets, such as cash, shares, fixed income assets, real estate, commodities, etc. They are the intersection of digital assets (tokens) and traditional financial products - a new technology that improves on old things. If we call cryptocurrencies like Bitcoin "programmable money", then security tokens are What can be called a “programmable ownership” version of a token is that any asset under its ownership can and will be tokenized. If you want to conduct an STO, you must first obtain permission from the regulatory agency. Therefore, we can regard STO as an ICO that is more compliant with legal regulations. About STO service process
1. VIE structure preparation
The first type: traditional VIE structure (Cayman, Hong Kong, wofe agreement), the cycle is longer, ranging from 3-6 months.
The second type: registering a US company (controlling through the wofe agreement), the cycle is shorter, about 6 weeks.
2. Preparation of legal documents
Documents prepared by the legal team:
Evaluation and optimization by expert teams such as American lawyers and CITI Securities Department
SAFT/PPM
Risk Disclosure Statement
/>Company structure, etc.
3. Financing channel services
RegD: Only for US compliant investors, we will recommend
RegS: Only for legal investors outside the US The state raises funds and recommends investment institutions such as Japan
4. Token issuance
According to different platform rules, recommend the most suitable platform for issuing Token.
Exchange docking services.
E. What does the blockchain industry architecture include
The architecture model of blockchain technology is as follows:
1. Data layer< /p>
The data layer encapsulates the underlying data blocks and related data encryption and timestamp technologies;
2. Network layer
< p>The network layer includes distributed networking mechanism, data dissemination mechanism and data verification mechanism;3. Consensus layer
The consensus layer mainly encapsulates Mingsong various consensus algorithms of network nodes;
4. Incentive layer
The incentive layer integrates economic factors into the blockchain technology system. It mainly includes the issuance mechanism and distribution mechanism of economic incentives;
5. Contract layer
The contract layer mainly encapsulates various scripts, algorithms and smart contracts. It is the basis of the programmable features of the blockchain;
6. Application layer
The application layer encapsulates various application scenarios and cases of the blockchain .
F. Let you quickly understand the technical model architecture of blockchain in 1 minute
Blockchain technology is not a single technology, but the integration and innovation of multiple technologies the result of,Its essence is a weakly centered, self-reliant underlying architecture technology.
The blockchain technical model includes the data information layer, the consensus layer of the transmission layer, the incentive layer, the contract layer and the network layer from top to bottom. Each layer has an important role, and different levels cooperate with each other to build a value transfer system that goes to the management center.
The characteristics of the data information layer are that it cannot be forged, fully backed up data, and completely fair (data information, management permissions, coding), and its algorithm design is a blockchain, including blockchain headers and blocks material. The blockchain header consists of three sets of blockchain databases. One set of databases is the parent blockchain hash value, which is used to connect the block to the previous block in the blockchain. The second set of databases is the Merkle root. An algorithm designed to effectively summarize all transactions in the blockchain; the three sets of databases are the difficulty target, time format and Nonce related to the production of the blockchain.
The transport layer encapsulates technologies such as P2P network mechanism, dissemination and authentication mechanism. In the transport layer, new transactions are broadcast to major websites. Each node will include the received transaction information in a blockchain, and each node will try to add it to its own blockchain. Find a proof of workload with sufficient difficulty. When a node finds a proof of workload (qualified to package the blockchain), it broadcasts the program (newly packaged blockchain) to major websites. When And only if all transactions included in the block are valid and have not existed before, other nodes will recognize the validity of the block, and the way to express acceptance is to follow the block. At the end of the block, a new block is created to add to the chain, and any hash of the accepted block is treated as any hash of the new block.
The consensus layer encapsulates various consensus algorithms of nodes, which is the key technology of the blockchain, because this determines the formation of the blockchain, and the accounting decision-making method may affect the entire system. Software safety and stability. At present, more than ten consensus mechanism algorithms have been produced, among which the well-known ones are the proof-of-work mechanism (POW), the easy-to-use Byzantine fault tolerance algorithm (PBFT), the proof-of-interest mechanism (POS), and the equity authorization proof mechanism.
The encouragement layer includes an offering system and an incentive system. Simply put, the incentive system is to encourage nodes to participate in maintaining the optimal operation of the blockchain system in a balanced economic manner, to avoid falsification of the general ledger, and to maintain the driving force for the operation of the blockchain network in the long term.
The contract layer has the characteristics of a programmable controller, which mainly includes smart contracts, consensus algorithms, scripting, and coding. It is the basis for the characteristics of a blockchain programmable controller. Put the code into the blockchain or dynamic password to complete a customizable smart contract, and achieve certain clear constraints.In this case, it can be executed automatically without going through a third party, which is the basis for trust in the blockchain.
The network layer encapsulates various application fields and examples of blockchain, which is very similar to computer applications and portals on computer browsers. It deploys blockchain core technologies on things such as Ethereum. , EOS and implemented in practice.
#BTC[超话]# #digital currency#
G. What are the blockchain technology frameworks
The current mainstream blockchain architecture It contains six layers: network layer, data layer, consensus layer, incentive layer, contract layer and application layer. The positions of the data layer and the network layer are reversed in the figure, and their main uses will be detailed in the next section.
Network layer: The essence of the blockchain network is a P2P (Peer-to-peer) network. The resources and services in the network are scattered on all nodes. The transmission of information and the implementation of services are directly between the nodes. It can be carried out in a short period of time without the intervention of intermediate links and servers. Each node both receives and generates information. The nodes synchronize information by maintaining a common blockchain. When a node creates a new block, it notifies other nodes in the form of broadcast, and other nodes receive the information. The block is then verified and a new block is created based on the block, thereby achieving the role of the entire network jointly maintaining an underlying ledger. Therefore, the network layer will involve the design of P2P network, propagation mechanism, verification mechanism, etc. Obviously, these designs can affect the confirmation speed of block information. The network layer can be used as a research direction in the scalable solution of blockchain technology;
Data layer: The underlying data of the blockchain is a block + linked list data structure, which includes data blocks, chain structures, timestamps, hash functions, Merkle trees, asymmetric encryption and other designs. Among them, data blocks and chain structures can be used as improvement directions for data layer research in the scalable solution of blockchain technology.
Consensus layer: It is the basis for highly dispersed nodes to achieve rapid consensus on the validity of block data. The main consensus mechanisms include POW (Proof Of Work) and POS (Proof of Stake). Mechanism), DPOS (Delegated Proof of Stake Delegated Proof of Stake Mechanism) and PBFT (Practical Byzantine Fault Tolerance), etc., which have always been the highlight of the scalable solutions of blockchain technology.
Incentive layer: It is what everyone often calls a mining mechanism. It is used to design a certain economic incentive model and encourage nodes to participate in the security verification of the blockchain, including the design of issuance mechanisms and distribution mechanisms, etc. This level of improvement does not seem to be directly related to blockchain scalability.
Contract layer: mainly refers to various script codes, algorithm mechanisms, smart contracts, etc. first generation blockchainStrictly speaking, this layer is missing, so they can only conduct transactions and cannot be used in other fields or perform other logical processing. The emergence of the contract layer has made the use of blockchain in other fields a reality. Ethereum This part includes EVM (Ethereum Virtual Machine) and smart contracts. Improvements at this level seem to provide potential new directions for blockchain scalability, but there seems to be no direct connection in structure
Application layer: It is the display layer of the blockchain, including various application scenarios and cases. . For example, Ethereum uses truffle and web3-js. The application layer of the blockchain can be the mobile terminal, the web terminal, or it can be integrated into the existing server, and the current business server is regarded as the application layer. Improvements at this level seem to provide potential new directions for blockchain scalability, but there does not seem to be a direct connection in structure.
The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only approved "Blockchain Technology Professional" pilot of the "Smart Learning Workshop 2020- Xueshuo Innovation Workstation" launched by the School Planning and Construction Development Center of the Ministry of Education of China. workstation. The professional position is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.
H. How to build the overseas main structure of the blockchain
The Singapore non-profit foundation can later issue relevant legal opinions to ensure legal compliance , proving that the company's operations are in compliance with Singapore's current laws.
The main contents of the legal opinion:
1. White paper modification: Modify the project white paper where it does not comply with Singapore laws and regulations, and a lawyer will issue a professional legal compliance opinion.
2. TOKEN non-securitization certificate: A lawyer issues a professional legal opinion detailing that the tokens issued by the project do not have the nature of securities.