区块链几个节点合理运行,区块链几个节点合理的
区块链技术的出现,极大地改变了我们的商业模式,它可以让我们以安全、可靠的方式进行贸易和交易,而且不需要第三方参与。但是,要想让区块链技术有效运行,需要有合理的节点架构来支撑。那么,区块链几个节点合理运行和合理拓展呢?下面我们就来介绍一下:
节点数量区块链的节点数量是构建区块链网络的基础,它是确保区块链网络的安全性、可靠性和可扩展性的关键因素。一般来说,区块链的节点数量越多,网络的安全性就越高,但是,过多的节点也会增加网络的复杂性,影响网络的可扩展性。因此,区块链的节点数量应该在一定的范围内,一般来说,区块链节点的数量最好在10-20个之间,这样可以保证网络的安全性和可扩展性。
节点位置在构建区块链网络时,节点的位置也是非常重要的。节点的位置会影响网络的可靠性和可扩展性,因此,节点的位置应该尽可能分散,以确保网络的安全性和可靠性。此外,节点的位置也会影响网络的延迟,因此,节点的位置应该尽可能接近用户,以确保网络的低延迟。
节点拓展当网络的节点数量达到一定程度时,网络的可扩展性就会受到限制,因此,为了保证网络的可扩展性,需要合理的拓展节点。一般来说,拓展节点的数量应该控制在一定的范围内,以确保网络的安全性和可靠性。此外,拓展节点的位置也应该尽可能分散,以确保网络的可扩展性和低延迟。
总之,要想让区块链技术有效运行,需要有合理的节点架构来支撑,区块链几个节点合理运行和合理拓展的关键就是节点的数量、位置和拓展,以确保网络的安全性、可靠性和可扩展性。
请查看相关英文文档
⑴ 108 knowledge points for getting started with blockchain
108 essential knowledge points for getting started with blockchain
(Welcome to communicate with fans) < /p>
1. What is a blockchain
The information of multiple transactions and the information indicating the block are packaged together. The verified package is the block.
Each block stores the hash value of the previous block, creating a relationship between blocks, that is to say, a chain. Together they are called blockchain.
2. What is Bitcoin
The concept of Bitcoin was proposed by Satoshi Nakamoto in 2009, with a total number of 21 million. The Bitcoin chain generates a block approximately every 10 minutes, and this block is mined by miners for 10 minutes. As a reward to miners, a certain number of Bitcoins will be issued to miners, but this certain number is halved every four years. Now it's 12.5. If this continues, all Bitcoins will be available in 2040.
3. What is Ethereum
The biggest difference between Ethereum and Bitcoin is the smart contract. This allows developers to develop and run various applications on it.
4. Distributed ledger
It is a database that is shared, replicated and synchronized among network members. To put it bluntly, all users on the blockchain have accounting functions and the content is consistent, which ensures that the data cannot be tampered with.
5. What is quasi-anonymity?
I believe everyone has a wallet, and the wallet address (a string of characters) used to send transactions is quasi-anonymity.
6. What is open transparency/traceability
The blockchain stores all data from history to the present, anyone can view it, and can also view any data in history.
7. What is tamper-proof
Historical data and current transaction data cannot be tampered with. The data is stored in the block on the chain and has a hash value. If the block information is modified, its hash value will also change, and the hash values of all blocks following it must also be modified to form a new chain. At the same time, the main chain is still conducting transactions to generate blocks. The modified chain must always generate blocks synchronously with the main chain to ensure that the length of the chain is the same. The cost is too high, just to modify a piece of data.
8. What is anti-DDoS attack
DDoS: Hackers control many people’s computers or mobile phones and allow them to access a website at the same time. Since the bandwidth of the server is limited, a large amount of traffic The influx of data may cause the website to fail to function properly, resulting in losses. But blockchain is distributed,There is no central server. If one node fails, other nodes will not be affected. Theoretically, if more than 51% of the nodes are attacked, problems will occur.
9. Definition of main chain
Taking Bitcoin as an example, at a certain point in time, a block is mined by two miners at the same time, and then 6 blocks are generated first. The chain of blocks is the main chain
10. Single chain/multi-chain
Single chain refers to the data structure that handles everything on one chain. The core essence of the multi-chain structure is composed of public chain + N sub-chains. There is only one, but in theory there can be countless sub-chains, and each sub-chain can run one or more DAPP systems
11. Public chain/alliance chain/private chain
Public Chain: Everyone can participate in the blockchain
Alliance chain: Only alliance members are allowed to participate in accounting and query
Private chain: Writing and viewing permissions are only controlled by one person In the hands of the organization.
12. Consensus layer, data layer, etc.
There are six overall structures of the blockchain: data layer, network layer, consensus layer, incentive layer, contract layer, and application layer. Data layer: a layer that records data, belonging to the underlying technology; network layer: a structure for building a blockchain network, which determines how users are organized. Consensus layer: Provides a set of rules to allow everyone to reach agreement on the information received and stored. Incentive layer: Design incentive policies to encourage users to participate in the blockchain ecosystem; Contract layer: Generally refers to "smart contracts", which are a set of contract systems that can be automatically executed and written according to their own needs. Application layer: Applications on the blockchain, similar to mobile apps. Former Distributed Storage R&D Center
13. Timestamp
The timestamp refers to the time from January 1, 1970 Day 0 hours 0 minutes 0 seconds 0... The total number of seconds from the current time to now, or the total number of nanoseconds and other very large numbers. Each block is generated with a timestamp indicating when the block was generated.
14. Block/block header/block body
Block is the basic unit of blockchain, and block header and block body are components of blockchain. The information contained in the block header includes the hash of the previous block, the hash of this block, timestamp, etc. The block body is the detailed data in the block.
15. Merkle tree
Merkle tree, also called binary tree, is a data structure for storing data. The bottom layer is the original data contained in all blocks, and the upper layer is each The hash value of a block, the hash of this layer is combined in pairs to generate a new hash value, forming a new layer, and then upwards layer by layer, until a hash value is generated. Such a structure can be used to quickly compare large amounts of data. You can quickly find what you want without downloading all the data.The lowest level historical data you need.
16. What is expansion?
The size of a Bitcoin block is about 1M and can save 4,000 transaction records. Expansion means making the block larger so that more data can be stored.
17. What is a chain?
Each block will save the hash of the previous block, creating a relationship between the blocks. This relationship is a chain. Data such as block transaction records and status changes are stored through this chain.
18. Block height
This is not the height mentioned in terms of distance. It refers to the total number of blocks between the block and the first block on the chain. This height indicates which block it is, and is just for identification purposes.
19. Fork
Two blocks were generated at the same time (the transaction information in the block is the same, but the hash value of the block is different), and then in Two chains are forked from these two blocks. Whoever generates 6 blocks from these two links first will be the main chain, and the other chain will be discarded.
20. Ghost Protocol
Mining pools with high computing power can easily generate blocks faster than mining machines with low computing power, resulting in most of the blocks on the blockchain being generated by these mining pools with high computing power. However, the blocks generated by mining machines with low computing power are not stored on the chain because they are slow, and these blocks will be invalid.
The ghost protocol allows blocks that should be invalidated to remain on the chain for a short time, and can also be used as part of the proof of work
. In this way, miners with small computing power will contribute more to the main chain, and large mining pools will not be able to monopolize the confirmation of new blocks.
21. Orphan blocks
As mentioned before, orphan blocks are blocks generated at the same time. One of them forms a chain, and the other does not form a chain. Then this block that does not form a chain is called an orphan block.
22. Uncle block
The orphan block mentioned above, through the ghost protocol, makes it part of the proof of work, then it will not be discarded and will be saved in the main chain superior. This block is next
23 replay attack
The hacker resends the message that has been sent to the server. Sometimes this can deceive the server into multiple responses.
24. Directed acyclic graph
Also called data set DAG (directed acyclic graph), DAG is an ideal multi-chain data structure. Most of the blockchains mentioned now are single chains, that is, one block is connected to another block, and DAG is multiple blocks connected. The advantage is that several blocks can be generated at the same time, so the network can process a large number of transactions at the same time, and the throughput is certainIt went up. However, there are many shortcomings and it is currently in the research stage.
25. What is mining
The mining process is to perform a series of conversions, connections and hash operations on the above six fields, and continue to try them one by one. The random number you are looking for, and finally successfully find a random number that meets the conditions: the value after hashing is smaller than the hash value of the preset difficulty value, then the mining is successful, and the node can broadcast the area to neighboring nodes. block, neighboring nodes receive the block and perform the same operation on the above six fields to verify compliance, and then forward it to other nodes. Other nodes also use the same algorithm to verify. If there are 51% of nodes in the entire network If all verifications are successful, even if this block is truly "mined" successfully, each node will add this block to the end of the previous block, delete the list in the block that is the same as its own record, and resurrect again. the above process. Another thing to mention is that regardless of whether the mining is successful or not, each node will pre-record the reward of 50 Bitcoins and the handling fees of all transactions (total input-total output) in the first item of the transaction list (this is " The most fundamental purpose of "mining" is also the fundamental reason to ensure the long-term stable operation of the blockchain), the output address is the address of this node, but if the mining is unsuccessful, the transaction will be invalidated without any reward. Moreover, this transaction called "production transaction" does not participate in the "mining" calculation.
26. Mining machines/mining farms
Mining machines are computers with various configurations, and computing power is the biggest difference between them. A place where mining machines are concentrated in one place is a mining farm
27. Mining pool
Miners join together to form a team, and the computer group under this team is a mining pool. Mining rewards are distributed based on your own computing power contribution.
28. Mining difficulty and computing power
Mining difficulty is to ensure that the interval between generating blocks is stable within a certain short time, such as Bitcoin’s 10 minutes.
p>Block 1. The computing power is the configuration of the mining machine.
29. Verification
When verification in the blockchain is a confirmation of the legality of the transaction, each node will verify the transaction once when the transaction message is propagated between nodes. Whether the transaction is legal. For example, verify whether the syntax of the transaction is correct, whether the transaction amount is greater than 0, whether the entered transaction amount is reasonable, etc. After passing the verification, it will be packaged and handed over to the miners for mining.
30. Transaction broadcast
The node sends information to other nodes through the network.
31. Mining fees
For the blockchain to work non-stop like a perpetual motion machine, miners need to maintain the system. Therefore, the miners must be given favorable fees to make it sustainable.
32. Transaction confirmation
When a transaction occurs, record theThe block will be confirmed for the first time and will be confirmed again in every block on the chain after the block: when the number of confirmations reaches 6 or more, the transaction is generally considered to be relatively safe and difficult to tamper with.
33. Double transaction
That is, I have 10 yuan, I use the 10 yuan to buy a pack of cigarettes, and then instantly use the 10 yuan that has not yet been paid. Bought another cup of coffee. So when verifying the transaction, you need to confirm whether the 10 yuan has been spent.
34. UTXO unspent transaction output
It is a data structure containing transaction data and execution code, which can be understood as digital currency that exists but has not yet been consumed.
35. Transactions per second TPS
That is throughput, tps refers to the number of transactions the system can process per second.
36. Wallet
Similar to Alipay, it is used to store digital currencies, and blockchain technology is more secure.
37. Cold wallet/hot wallet
A cold wallet is an offline wallet. The principle is to store it locally and use QR code communication to prevent the private key from touching the Internet. A hot wallet is an online wallet. The principle is to encrypt the private key and store it on the server. When it is needed, it is downloaded from the server and decrypted on the browser side.
38. Software Wallet/Hardware Wallet
A software wallet is a computer program. Generally speaking, a software wallet is a program that interacts with the blockchain and allows users to receive, store, and send digital currencies and can store multiple keys. Hardware wallets are smart devices that specialize in handling digital currencies.
39. Airdrop
The project sends digital currency to each user’s wallet address.
40. Mapping
Mapping is related to the issuance of blockchain currency and is a mapping between chains. For example, there are some blockchain companies that have not completed the development of the chain in the early stage. They rely on Ethereum to issue their own currency. The issuance and transactions of the early currency are all operated on Ethereum. With the development of the company, the company's own chain development has been completed. The company wants to map all the previous information on Ethereum to its own chain. This process is mapping.
41. Position
Refers to the ratio of the investor’s actual investment to the actual investment funds
42. Full position
Buy with all funds Enter Bitcoin
43. Reduce the position
Sell some of the Bitcoins, but not all of them
44. Heavy positions
Compared with Bitcoin, Bitcoin accounts for a larger share of funds
45. Light warehouse
Comparing funds with Bitcoin, the capital share is large
46. Short position
Sell all the Bitcoins you hold and convert them all into funds
47. Take profit
After obtaining a certain amount of profit, sell the Bitcoin held to maintain the profit
48. Stop loss
After the loss reaches a certain level, sell the Bitcoin held to prevent loss Further expansion
49. Bull market
Prices continue to rise, the outlook is optimistic
50. Bear market
Prices continue to fall, the outlook is bleak
p>51. Long (long)
The buyer believes that the currency price will rise in the future, buys the currency, and after the currency price rises, sells it at a high price to take profits
52. Short position (short selling)
The seller believes that the currency price will fall in the future, sells the currency he holds (or borrows currency from the trading platform), and buys it at a low price after the currency price drops. Taking profits
53. Opening a position
Buying Bitcoin and other virtual currencies
54. Covering the position
Buying Bitcoins in batches Wait for virtual currency, such as: buy 1 BTC first, then buy 1 BTC
55. Full position
Buy all the funds into a certain virtual currency at once
>56. Rebound
When the currency price falls, the price rebounds and adjusts because it falls too fast
57. Consolidation (sideways)
Price fluctuations The amplitude is small and the currency price is stable
58. Overcast drop
The currency price slowly declines
59. Diving (waterfall)
Coin The price fell rapidly and to a large extent
60. Cutting meat
After buying Bitcoin, the price of the currency fell. In order to avoid the expansion of losses, the Bitcoin was sold at a loss. Or after borrowing the currency to go short, the currency price rises, and you buy Bitcoin at a loss
61. Hold on
Expect the currency price to rise, but unexpectedly the currency price falls after buying; or expect the currency price fell, but unexpectedly, after selling, the currency price rose
62. Unwinding
After buying Bitcoin, the currency price fell, causing a temporary book loss, but then the currency price rebounded and the loss was reversed To make a profit
63. Go short
After selling Bitcoin because of the bearish market outlook, the price of the currency continued to rise, and I was unable to buy it in time, so I failed to make a profit
64. Overbought
The currency price continues to rise to a certain height, the buyer's power is basically exhausted, and the currency price is about to fall
65. Oversold
The currency price continues to fall to a certain low, the seller's power is basically exhausted, and the currency price is about to rise
66. Lure bulls
The currency price The market has been consolidating for a long time and is more likely to fall. Most of the short sellers have sold Bitcoin. Suddenly, the short sellers pulled up the price of the currency, inducing many parties to think that the price of the currency will rise and buy one after another. As a result, the short sellers suppressed the price of the currency, causing the bulls to buy. Trapped
67. Short-selling
After buying Bitcoin, bulls deliberately suppress the price of the currency, making short sellers think that the price of the currency will fall, and sell them one after another. As a result, they fall into the trap of bulls.
68. What is NFT
The full name of NFT is "Non-Fungible Tokens", which is non-fungible tokens. Simply put, It is an indivisible copyright certificate on the blockchain. It is mainly used to confirm and transfer the rights of digital assets. The difference from digital currency is that it is unique and indivisible. In essence, it is a unique digital asset.
69. What is the Metaverse
The Metaverse is a collection of virtual time and space, consisting of a series of augmented reality (AR), virtual reality (VR) and the Internet (Internet) Composed of digital currency, which carries the function of value transfer in this world.
70. What is DeFi
DeFi, the full name is Decentralized Finance, which is "decentralized finance" or "distributed finance". "Decentralized finance", as opposed to traditional centralized finance, refers to various financial applications based on open decentralized networks. The goal is to establish a multi-level financial system based on blockchain technology and cryptocurrency. As a basis, re-create and improve the existing financial system
71. Who is Satoshi Nakamoto?
Satoshi Nakamoto is the developer and founder of Bitcoin. Satoshi Nakamoto published the Bitcoin white paper on November 1, 2008, and mined Bitcoin for the first time on January 3, 2009. Whoever can use the Bitcoin in the genesis block is Satoshi Nakamoto himself, so who Is it Satoshi Nakamoto? There have been many "Satoshi Nakamotos" in history: In 2013, someone revealed that Mochizuki Shinichi, who had made outstanding contributions in the field of mathematics, was Satoshi Nakamoto, but no direct evidence was provided. In 2014, hackers broke into the mailbox used by Satoshi Nakamoto and found the owner of the mail, Dorian Nakamoto. Later, Dorian said that he only obtained the mailbox address and password by chance, not Nakamoto. Cong. In 2016, Craig Wright said that he was Satoshi Nakamoto and could provide Satoshi Nakamoto's private key. But later, Wright withdrew his statement because he could not face everyone's doubts.
72. Bitcoin is different from Q Coin
Bitcoin is a decentralized digital asset with no issuing entity. Q Coin is an electronic currency issued by Tencent. It is similar to electronic points, but it is not actually a currency. Q Coin requires a centralized issuing institution. Q Coin can only be recognized and used because of the credit endorsement of Tencent. The scope of use is also limited to Tencent's games and services. The value of Q coins is entirely based on people's trust in Tencent.
Bitcoin is not issued through a centralized institution, but it is widely recognized around the world because Bitcoin can self-certify its trust. The issuance and circulation of Bitcoin are jointly accounted for by miners across the entire network, and are not A central authority is also needed to ensure that no one can tamper with the ledger.
73. What is a mining machine?
Taking Bitcoin as an example, a Bitcoin mining machine is a professional equipment that competes for accounting rights by running a large amount of calculations to obtain new Bitcoin rewards. It is generally composed of a mining chip, a heat sink and a fan, and only performs A single calculation program consumes a lot of power. Mining is actually a competition between miners for computing power. Miners with more computing power have a greater probability of mining Bitcoin. As the computing power of the entire network increases, it becomes increasingly difficult to mine bits with traditional equipment (CPU, GPU), and people have developed chips specifically for mining. The chip is the core part of the mining machine. The operation of the chip will generate a large amount of heat. In order to dissipate heat, Bitcoin mining machines are generally equipped with heat sinks and fans. Users download Bitcoin mining software on their computers, use the software to assign tasks to each mining machine, and then start mining. Each currency has a different algorithm and requires different mining machines.
74. What is quantitative trading?
Quantitative trading, sometimes also called automated trading, refers to the use of advanced mathematical models to replace human subjective judgments, which greatly reduces the impact of investor sentiment fluctuations and avoids extreme fanaticism or pessimism in the market. make irrational investment decisions. There are many types of quantitative trading, including cross-platform trading, trend trading, hedging, etc. Cross-platform trading means that when the price difference between different target platforms reaches a certain amount, sell on the platform with a higher price and buy on the platform with a lower price.
75. Blockchain asset over-the-counter trading
Over-the-counter trading is also called OTC trading. Users need to find their own counterparties and do not need to match the transaction. The transaction price is determined by negotiation between the two parties. The two parties can fully communicate through face-to-face negotiation or telephone communication.
76. What is a timestamp?
The blockchain ensures that each block is connected sequentially through timestamps. Timestamps enable every piece of data on the blockchain to have a time stamp. Simply put, timestamps prove when something happened on the blockchain and cannot be tampered with by anyone.
77. What is a blockchain fork?
Upgrading software in a centralized systemThe software is very simple, just click "Upgrade" in the app store. However, in decentralized systems such as blockchain, "upgrading" is not that simple, and a disagreement may even cause a blockchain fork. Simply put, a fork refers to a disagreement when the blockchain is "upgraded", resulting in a fork in the blockchain. Because there is no centralized organization, every code upgrade of digital assets such as Bitcoin needs to be unanimously recognized by the Bitcoin community. If the Bitcoin community cannot reach an agreement, the blockchain is likely to form a fork.
78. Soft fork and hard fork
Hard fork means that when the Bitcoin code changes, the old nodes refuse to accept the blocks created by the new nodes. Blocks that do not comply with the original rules will be ignored, and miners will follow the original rules and create new blocks after the last block they verified. A soft fork means that old nodes are not aware of the changes to the Bitcoin code and continue to accept blocks created by new nodes. Miners may work on blocks they have no understanding of, or validation of. Both soft forks and hard forks are "backwards compatible" to ensure that new nodes can verify the blockchain from scratch. Backward compatibility means that new software accepts data or code generated by old software. For example, Windows 10 can run Windows XP applications. Soft forks can also be "forward compatible".
79. Classification and application of blockchain projects
Judging from the current mainstream blockchain projects, blockchain projects mainly fall into four categories: Category 1: Currency; The second category: platform category; the third category: application category; the fourth category: asset tokenization.
80. USDT against the US dollar
USDT is Tether USD, a token launched by Tether that is against the US dollar (USD). 1USDT=1 US dollar, users can use USDT and USD for 1:1 exchange at any time. Tether implements a 1:1 reserve guarantee system, that is, each USDT token will have a reserve guarantee of 1 US dollar, which supports the stability of the USDT price. The unit price of a certain digital asset is USDT, which is equivalent to its unit price in US dollars (USD).
81. Altcoins and alternative coins
Altcoins refer to blockchain assets that use the Bitcoin code as a template and make some modifications to its underlying technology blockchain, among which Those with technological innovations or improvements are also called alternative coins. Because the Bitcoin code is open source, the cost of plagiarism in Bitcoin is very low. You can even generate a brand new blockchain by simply copying the Bitcoin code and modifying some parameters.
82. Three major exchanges
Binance
Okex
Huobi
83. Market software
Mytoken
Non-small account
p>84. Information website
Babbitt
Golden Finance
Coin World News
85. Blockchain browsing Device
BTC
ETH
BCH
LTC
ETC
86. Wallet
Imtoken
Bitpie
MetaMask (Little Fox)
87. Decentralized Exchange
uniswap
88. NFT Exchange
Opensea
Super Rare
89 . Ladders
Bring your own, buy reliable ladders
90. Platform currency
Digital currency issued by the platform, used to deduct handling fees, transactions, etc.< /p>
91. Bull market, bear market
Bull market: rising market
Bear market: falling market
92. Blockchain 1.0
A currency trading system based on distributed ledgers, represented by Bitcoin
93. Blockchain 2.0
Contract blockchain technology represented by Ethereum (smart contract) For 2.0
94. Blockchain 3.0
In the era of intelligent Internet of Things, it goes beyond the financial field to provide decentralized solutions for various industries
95. Smart Contract
Smart Contract is a computer protocol designed to disseminate, verify or execute contracts in an information-based manner. Simply put, an electronic contract is set in advance and once confirmed by both parties, the contract is automatically executed.
96. What is a token?
The token economy is an economic system with Token as the only reference standard, which is equivalent to a pass. If you own Token, you have rights and interests, and you have the right to speak.
97. The difference between big data and blockchain
Big data is the means of production, AI is the new productivity, and the blockchain is the new production relationship. Big data refers to a collection of data that cannot be captured, managed and processed within a certain time range using conventional software tools. It is a massive, high-growth and high-volume data set that requires new processing models to have stronger decision-making power, insight discovery and process optimization capabilities. Diverse information assets. Simply understood as,Big data is massive data accumulated over a long period of time and cannot be obtained in the short term. Blockchain can be used as a way to obtain big data, but it cannot replace big data. Big data is only used as a medium running in the blockchain and has no absolute technical performance, so the two cannot be confused. (A simple understanding of production relations is labor exchange and consumption relations. The core lies in productivity, and the core of productivity lies in production tools)
98. What is ICO?
ICO, Initial Coin Offering, is the initial public offering of tokens, which is crowdfunding in the blockchain digital currency industry. It is the most popular topic and investment trend in 2017, and the country launched a regulatory plan on September 4. Speaking of ICO, people will think of IPO, and the two are fundamentally different.
99. Five characteristics of digital currency
The first characteristic: decentralization
The second characteristic: having open source code
The third feature: independent electronic wallet
The fourth feature: constant issuance
The fifth feature: global circulation
100. What is decentralization?
It has no issuer, does not belong to any institution or country, and is a publicly issued currency designed, developed and stored on the Internet by Internet network experts.
100. What is measurement (scarcity)?
Once the total amount of issuance is set, it is permanently fixed, cannot be changed, cannot be over-issued at will, and is subject to global Internet supervision. Because the difficulty of mining and mining changes over time, the longer the time, the greater the difficulty of mining, and the fewer coins are mined, so it is scarce.
101. What is open source code?
The alphanumeric code is stored on the Internet. Anyone can find out the source code of its design, everyone can participate, can mine it, and it is open to the world.
102. What is anonymous transaction? Private wallet private?
Everyone can register and download the wallet online without real-name authentication. It is completely composed of encrypted digital codes. It can be sent and traded globally in real-time point-to-point without resorting to banks or any institutions. It cannot be traced by anyone without my authorization. ,Inquire.
103. What is a contract transaction?
A contract transaction refers to an agreement between a buyer and seller to receive a certain amount of an asset at a specified price at a certain time in the future. The objects of contract trading are standardized contracts formulated by the exchange. The exchange stipulates standardized information such as commodity type, transaction time, quantity, etc. A contract represents the rights and obligations of the buyer and seller.
104. Digital currency industry chain
Chip manufacturer, mining machine manufacturer, mining machine agent, mining, mining to exchange, retail investors trading coins
105. Who is Beifeng?
Beifeng: Digital currency value investor
Investment style: Steady
106. Build a community?
Beidou Community (high-quality price investment community)
Combining long and short, focusing on price investment, no contracts, no short-term play< /p>
Reasonable layout, scientific operation, prudent and conservative, earning periodic money
Welcome currency friends and seek common development.
⑵ The more nodes in the blockchain, the safer it is. What are the characteristics of p2p?
The more nodes in the blockchain, the safer it will be, and p2p has the characteristics of high risk and high return. , so investors need to evaluate market risks and invest prudently.
⑶ What is the popular explanation of blockchain? You must know these five application scenarios of blockchain!
Recently, blockchain has become popular overnight, and everyone around is discussing blockchain.
So, is the blockchain the same as Bitcoin?
In fact, Bitcoin and blockchain are not the same thing.
Blockchain is the underlying technology of Bitcoin, but the first usage scenario after the birth of blockchain is Bitcoin.
Bitcoin is just a string of data in a computer. Compared with paper currency, it is also called a "virtual currency". To put it simply, you can understand that Bitcoin is just a string of numbers with cash value, similar to Q coins. In other words, Bitcoin has no actual value. Its current value is supported by the faith of currency speculators. If the faith is gone, the value of Bitcoin will collapse.
What is blockchain? What are the characteristics of blockchain technology?
Let’s first take a look, why is blockchain called blockchain?
Data is stored piece by piece, and the data stored piece by piece is called a block. Different blocks are linked to the previous block, which is called a blockchain.
For example:
On a certain day of a certain year, Lao Wang lent Xiao Wang 10,000 yuan. Lao Wang told everyone around him the news , the transfer records were posted on WeChat Moments, and everyone helped them testify to the existence of this transaction.
Lao Wang and Xiao Wang are two nodes. These two nodes generate transaction time, location, person and other information, and they are packaged to form a "block". Lao Wang’s friends are also nodes. These nodes jointly record the transaction status and details (blocks) of the two nodes Lao Wang and Xiao Wang. These blocks are connected.A blockchain is formed.
Fundamentally, blockchain is a distributed ledger database.
What does distributed ledger mean?
Let’s take a look at the traditional accounting method.
The traditional accounting method is a centralized accounting method. For example, if Lao Wang lent 10,000 yuan to Xiao Wang, if Lao Wang did not tell the world about this money, then this amount would Only Lao Wang knows about the money transactions, Xiao Wang knows, God knows, and Earth knows. This accounting method is a centralized accounting method. This method has a very fatal shortcoming: what should I do if the other party does not acknowledge the account? In fact, in real life, in spontaneous private lending relationships, there is no evidence when the lending relationship occurs, resulting in many cases where the other party does not acknowledge the debt afterwards.
The accounting method adopted by Lao Wang from the beginning has prevented future troubles. This method is the blockchain distributed ledger, which has the characteristics of decentralization and allows everyone to It is the center and everyone can testify to the existence of this deal.
In addition to the characteristics of decentralization, blockchain also has the characteristics of being immutable. In the blockchain, if the data in any one block changes, even if it only changes a punctuation mark, it will become invalid and needs to be recalculated. Therefore, in the blockchain technology, once a piece of data changes, the cost will be Very big. Unless all nodes in this blockchain have 51% control. Therefore, the blockchain system will be stable and secure.
It’s still Lao Wang and Xiao Wang. If Xiao Wang wants to default on his debt, he can’t tamper with it unless he bribes everyone in the world who knows about the transaction.
Blockchain is also open and transparent.
In blockchain technology, all data is public, which is still the case of Lao Wang and Xiao Wang.
If Xiao Wang does not acknowledge the money, once this news is released, then Xiao Wang’s reputation will be ruined. He can only release new news and wash away the money by paying back the money. Clear your own identity.
Some people say that if the blockchain is so powerful, will my identity information be revealed and there will be no privacy? In fact, the blockchain has the characteristics of anonymity and protects our privacy very well. Unless required by legal regulations, technically speaking, the identity of each block node does not need to be disclosed or verified and can be done anonymously.
What are the applications of blockchain?
The origin of blockchain is to solve the problem of trust, and one of the most successful applications of blockchain is digital currency. Bitcoin is arguably the most successful application of blockchain so far.
In addition to digital currency, the future applications of Bitcoin are still very wide. Blockchain technology has been widely used in different industries.use. Such as product traceability, copyright protection and transactions, payment and settlement, Internet of Things, digital marketing, medical care, etc., promoting different industries to quickly enter the "blockchain+" era.
1. Payment and clearing
The role of the intermediary bank can be abandoned, point-to-point payment can be realized, intermediary fees can be reduced, and fund utilization can be accelerated.
2. Product traceability
For example, if we buy a piece of clothing on a certain website, we can see the past and present life of this piece of clothing.
3. Securities trading
Traditional securities trading requires the coordination of four major institutions, which is inefficient and costly. Blockchain technology can independently complete one-stop services.
4. Supply chain
Introduce blockchain technology into the supply chain system, synchronize information within the system, control all links, and better complete division of labor and collaboration. , to facilitate accountability afterwards.
5. Intellectual property rights
With copyright on the chain, our photographic works, musical works, literary works, etc. will become our information, and the ownership of the information will be confirmed and become our property.
⑷ In-depth understanding of the consensus mechanism and algorithm principles of the blockchain
The so-called "consensus mechanism" is to complete the verification of transactions in a very short time through the voting of special nodes and confirmation; for a transaction, if several nodes with unrelated interests can reach a consensus, we can think that the entire network can also reach a consensus on it. To put it more simply, if a Chinese Weibo influencer, a virtual currency player in the United States, an African student and a European traveler do not know each other, but they all agree that you are a good person, then it can basically be concluded that You're not a bad person.
In order for the entire blockchain network node to maintain the same data and ensure the fairness of each participant, all participants in the entire system must have a unified agreement, which is what we have here The consensus algorithm to be used. All Bitcoin nodes follow unified protocol specifications. The protocol specification (consensus algorithm) consists of relevant consensus rules, which can be divided into two major cores: proof of work and the longest chain mechanism. The ultimate expression of all rules (consensus) is the longest chain of Bitcoin. The purpose of the consensus algorithm is to ensure that Bitcoin continues to operate on the longest chain, thereby ensuring the consistency and reliability of the entire accounting system.
Users in the blockchain do not need to consider the credit of the other party when conducting transactions, do not need to trust the other party, and do not need a trusted intermediary or central agency. They only need to follow the blockchain protocol. Realize the transaction. The premise for smooth transactions without the need for a trusted third-party intermediary is the consensus mechanism of the blockchain, that is, in a market environment of mutual understanding and trust, each node participating in the transaction has no intention of considering its own interests.There are no motives or behaviors for illegal cheating, so each node will actively and consciously abide by the preset rules to judge the authenticity and reliability of each transaction, and write the record of passing inspection into the blockchain. The interests of each node are different, and logically there is no incentive for them to collude to deceive. This is especially obvious when some nodes in the network have public reputation. Blockchain technology uses a consensus algorithm based on mathematical principles to establish a "trust" network between nodes, and uses technical means to achieve an innovative credit network.
At present, the mainstream consensus algorithm mechanisms in the district industry include: workload proof mechanism, equity proof mechanism, share authorization proof mechanism and Pool verification pool.
The workload proof mechanism is the proof of workload, which is a requirement that must be met when generating a new transaction information (i.e. a new block) to be added to the blockchain. In a blockchain network built based on the proof-of-work mechanism, nodes compete for accounting rights by calculating the numerical solution of random hashing. The ability to obtain the correct numerical solution to generate blocks is a specific manifestation of the node's computing power. The proof-of-work mechanism has the advantage of being completely decentralized. In a blockchain with a proof-of-work mechanism as the consensus, nodes can enter and exit freely. The well-known Bitcoin network uses a proof-of-work mechanism to produce new currencies. However, since the application of the workload proof mechanism in the Bitcoin network has attracted most of the computing power of computers around the world, it is difficult for other blockchain applications that want to try to use this mechanism to obtain the same scale of computing power to maintain their own security. At the same time, mining based on the proof-of-work mechanism also causes a lot of waste of resources, and the period required to reach consensus is also long, so this mechanism is not suitable for commercial applications.
In 2012, a netizen with the pseudonym Sunny King launched Peercoin. This encrypted electronic currency uses a proof-of-work mechanism to issue new coins and a proof-of-stake mechanism to maintain network security. This is the role of the proof-of-stake mechanism in encrypted electronic currency. first application in . Rather than requiring the certifier to perform a certain amount of computational work, Proof of Stake simply requires the certifier to provide ownership of a certain amount of cryptocurrency. The way the proof-of-stake mechanism works is that when a new block is created, the miner needs to create a "coin rights" transaction, which sends a number of coins to the miners themselves according to a preset ratio. The proof-of-stake mechanism reduces the mining difficulty of nodes in equal proportions based on the proportion and time of tokens owned by each node based on the algorithm, thus speeding up the search for random numbers. This consensus mechanism can shorten the time required to reach consensus, but essentially still requires nodes in the network to perform mining operations. Therefore, the PoS mechanism does not fundamentally solve the problem that the PoW mechanism is difficult to apply in the commercial field.
The share authorization certification mechanism is a new consensus mechanism to ensure network security. It tries to solve the problems of traditional PoW mechanism and PoS mechanism.At the same time, the negative effects of centralization can also be offset by implementing technological democracy.
The share authorization certification mechanism is similar to board voting. This mechanism has a built-in real-time shareholder voting system, just like the system is convening a never-ending shareholders' meeting at any time, where all shareholders vote. determine company decisions. The decentralization of the blockchain established based on the DPoS mechanism relies on a certain number of representatives rather than all users. In such a blockchain, all nodes vote to elect a certain number of node representatives, who act on behalf of all nodes to confirm blocks and maintain the orderly operation of the system. At the same time, all nodes in the blockchain have the power to remove and appoint representatives at any time. If necessary, all nodes can vote to disqualify the current node representatives and re-elect new representatives to achieve real-time democracy.
The share authorization certification mechanism can greatly reduce the number of nodes participating in verification and accounting, thereby achieving second-level consensus verification. However, this consensus mechanism still cannot perfectly solve the application problems of blockchain in business, because this consensus mechanism cannot get rid of its dependence on tokens, and the existence of tokens is not required in many commercial applications.
The Pool verification pool is based on traditional distributed consistency technology and is supplemented by a data verification mechanism. It is a consensus mechanism widely used in current blockchains.
The Pool verification pool can work without relying on tokens. Based on mature distributed consensus algorithms (Pasox, Raft), it can achieve second-level consensus verification, which is more suitable for multi-party participation. Polycentric business model. However, the Pool verification pool also has some shortcomings. For example, the degree of distribution that the consensus mechanism can achieve is not as good as the PoW mechanism.
Here we mainly explain some algorithm principles of the blockchain workload proof mechanism and the Bitcoin network. How to prove your workload? I hope everyone can have a basic understanding of the consensus algorithm.
The main feature of the proof-of-work system is that the client has to do a certain amount of difficult work to get a result, and the verifier can easily use the results to check whether the client has done the corresponding work. A core feature of this scheme is asymmetry: the work is modest for the requester and easy to verify for the verifier. It differs from CAPTCHAs, which are easier to solve by humans rather than easier to solve by computers.
The figure below shows the workload proof process.
For example, give a basic character "hello, world!", the workload requirement we give is that you can add a nonce (random number) after this character creation Integer value, after change (add nonce) Perform SHA-256 operation on the character creation. If the result (expressed in hexadecimal form) starts with "0000", the verification is passed. In order to achieve this proof-of-work goal, it is necessary to continuously increment the nonce value and perform a SHA-256 hash operation on the resulting character creation. According to this rule, it takes 4251 operations to find the hash with leading 4 zeros.
Through this example, we have a preliminary understanding of the proof-of-work mechanism. Some people may think that if proof of work is just such a process, then it is enough to remember that the nonce is 4521 so that the calculation can pass verification. Of course not, this is just an example.
Next we simply change the input to "Hello, World! + integer value". The integer value ranges from 1 to 1000, which means that the input is turned into an array of 1 to 1000: Hello, World !1;Hello,World!2;...;Hello,World!1000. Then perform the above proof of work on each input in the array in turn - find the hash with leading 4 zeros.
Due to the pseudo-random nature of the hash value, it is easy to calculate based on the relevant knowledge of probability theory. It is expected that it will take 2 to the 16th power of attempts to obtain a hash hash with four leading zeros. List. If you count the actual results of the 1,000 calculations just performed, you will find that the average number of calculations is 66,958, which is very close to 2 to the 16th power (65,536). In this example, the number of calculations expected by mathematics is actually the required "workload". Repeating the workload proof multiple times will be a probability event that conforms to statistical laws.
The actual number of calculations used to count the input characters and obtain the corresponding target result is as follows:
For any node in the Bitcoin network, if you want to generate a new block To join the blockchain, you must solve this puzzle of the Bitcoin network. The key elements of this question are the proof-of-work function, block and difficulty value. The workload proof function is the calculation method of this question, the block is the input data of this question, and the difficulty value determines the amount of calculation required to understand this question.
The proof-of-work function used in the Bitcoin network is the SHA-256 mentioned above. Blocks are actually generated in the proof-of-work process. Kuangong constantly constructs block data and checks whether each calculated result meets the required workload, thereby determining whether the block meets the network difficulty. The block header is the input data of the Bitcoin proof-of-work function.
The difficulty value is an important reference indicator for miners to mine. It determines how many hash operations it takes for miners to generate a legal block. The Bitcoin network generates approximately every 10 minutesinto a block. If the generation of new blocks basically maintains this speed under different computing power conditions of the entire network, the difficulty value must be adjusted according to changes in the computing power of the entire network. The general principle is to ensure that the network always generates a new block in 10 minutes, regardless of the mining power.
The adjustment of the difficulty value occurs independently and automatically in each complete node. Every 2016 blocks, all nodes will automatically adjust the difficulty value according to a unified format. This formula is based on the time spent in the latest 2016 blocks and the expected time (assuming a withdrawal is generated every 10 minutes, the expected time is 20160 minutes) and adjusted according to the ratio of actual duration to expected duration. That is, if blocks are generated faster than 10 minutes, increase the difficulty value; anyway, decrease the difficulty value. The formula is expressed as follows:
New difficulty value = old difficulty value * (20160 minutes/time spent in the past 2016 blocks).
Proof of work requires a target value. The calculation formula of the target value (Target) of Bitcoin's proof of work is as follows:
Target value = maximum target value/difficulty value, where the maximum target value is a constant value
The size of the target value is inversely proportional to the difficulty value. To achieve the Bitcoin workload proof, the block hash value calculated in the mine must be less than the target value.
We can also simply understand the process of Bitcoin workload as performing SHA-256 hash operation by constantly changing the block header (that is, trying different nonce values) and using it as input. Find a process that has a hash value in a specific format (that is, requires a certain number of leading 0s), and the more leading 0s required, the more difficult it becomes.
The steps of Bitcoin’s proof-of-work puzzle can be roughly summarized as follows:
The process can be represented by the following figure:
Bitcoin’s proof of work is the main work we commonly call “mining”. Understanding the workload proof mechanism will lay the foundation for us to further understand the consensus mechanism of the Bitcoin blockchain.
⑸ What is blockchain and how to simply understand blockchain technology
What is blockchain
Blockchain is through point-to-point transmission, A new technology for encrypting algorithms. There are countless points in the blockchain. Each point represents a user. If a transaction occurs between points, the transaction record will be directly uploaded to the block. The data in the block will be uploaded according to time. Linked sequentially is a blockchain.
1. Blockchain is also called a distributed ledger, which records the transaction records of all nodes., each node needs to maintain the development of the blockchain, supervise whether the transaction is legal, and can also vouch for the transaction together.
2. Encryption technology. The transaction information in the blockchain is public, but personal information has been encrypted. There is no need to worry about the leakage of personal information. Only with the individual's authorization can the other party Personal information is queried and the security of personal information is guaranteed.
3. Consensus mechanism. Every node in the blockchain trusts each other. Every user can trade with confidence because the data cannot be tampered with and every transaction must be legal and will not There is a possibility of fraud.
4. In scenarios where smart contracts and blockchain technology are applied, intelligent matching can be used. For example, insurance claims can be automatically settled.
How to simply understand blockchain technology
Blockchain technology can be understood in this way. Xiaohei and Xiaobai are both nodes in the blockchain. Borrowing 1,000 yuan is a transaction, and the data will be stored in the block. At this time, Xiaobai broadcasts to everyone that Xiaohei borrowed 1,000 yuan from him, and Xiaohei also broadcasts that he borrowed money from Xiaobai. He borrowed 1,000 yuan from Xiaobai. Everyone heard the news. On the repayment day, Xiaohei said that he had not borrowed 1,000 yuan from Xiaobai. At this time, everyone came out to testify to Xiaobai that Xiaohei had indeed borrowed money. 1,000 yuan.
In the above example, Xiao Hei and Xiao Bai are equivalent to the two nodes of the blockchain. Borrowing money is a transaction. As long as the transaction is made, transaction data will be generated and uploaded directly to the block. The data in the block is public. Not only can you see it, but everyone in the blockchain can see it. This ensures that Xiaohei will not breach the contract and say that he did not borrow the money. Everyone in the block will supervise Xiaohei. To repay the money, it ensures the legality of the transaction and mutual trust between each node.
⑹ Bitcoin—a currency worth more than 80,000 yuan
Anyone who has been exposed to digital currency is familiar with Bitcoin. It is the ancestor of digital currency. If you are In 2010, you spent three dollars to buy 10,000 Bitcoins and keep them till now. Now you are worth more than 800 million yuan. Isn’t it incredible?
Blockchain technology is called the successor to the steam engine. , electricity, the Internet, an epoch-making symbol in the future,
What is the underlying technology of Bitcoin?
It is blockchain technology, so what is blockchain technology? To give an easy-to-understand example, you go to China Merchants Bank to save money and deposit 1 million. One day, China Merchants Bank’s bank The system has been hacked and 500,000 has been transferred from your account. Your deposit slip has also been lost. At this time, the bank does not want to replenish you with the lost money. Are you going to go crazy? The blockchain has countless storage systems, and they all contain the same content. No one can modify the bills that have been produced, just like before there was only oneLedgers, but after using the blockchain, there are countless accounting ledgers, and they are distributed in various places. To put it more professionally, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses A new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and operate data.
But now is an era when digital currencies are rampant. Various new digital currencies are issued for money laundering. The last thing is a chicken feather. For the current state-advocated blockchain technology and enterprise chain reform, if it falls into On the ground, such digital currencies can still be held. We know that only large companies can be listed, but all companies can be listed on the chain
If you know a certain digital currency very well and know its operation situation, whether it has been implemented on the ground to help the company with chain changes, technical support, etc. Otherwise, try not to buy it.
Back to BTC, the BTC public chain is called the 1.0 era of blockchain. It uses the POW consensus mechanism, which is proof of work. How much currency you get depends on your mining contribution. To work effectively, the better the computer performance, the more mines will be allocated to you. The POW mechanism solves the Byzantine Generals problem, that is, in the case of mutual distrust, as long as many people trust it, the correct operation of the system can be guaranteed. However, There are also certain flaws, that is, the speed of processing transactions is too slow, and miners need to constantly collide hash values through calculations, which is wasteful and inefficient. TPS system throughput (user concurrency) 7 transactions/second. The ETH public chain is called the 2.0 era of blockchain. ETH has proposed a new consensus mechanism POW+POS (Proof of Equity). Simply put, the more coins you hold, the higher your equity, because you The more coins you hold and the longer you hold the coins, the difficulty of your calculations will be reduced and mining will be easier. The TPS is 21 transactions/second. EOS is called the 3.0 public chain. The DPOS consensus mechanism (Byzantine fault-tolerant delegated proof of equity) is a cryptocurrency with a POS mechanism. Each node can create blocks and obtain "interest" according to the individual's shareholding ratio and the block time. 3 seconds, TPS is 5000 transactions/second.
1. Looking at blockchain technology from Bitcoin
(1) Bitcoin is a digital cryptocurrency. Bitcoin is a digital cryptocurrency, consisting of Designed by Satoshi Nakamoto on January 25, 2009. The generation, issuance and transaction mechanisms of Bitcoin are different from traditional currencies. The generation, issuance and trading of traditional currencies rely on centralized binary models such as central banks and commercial banks; while the issuance of Bitcoin does not require centralized financial intermediaries, Bitcoin community users can issue and Manage digital cryptocurrencies. Bitcoin is issued in gold mode. People vividly refer to this process as "mining", and all nodes that provide computing power are called "miners". Currently, Bitcoin mining is issued in such a way that each miner can earn 6.25 Bitcoins from it. In fact, the issuance process of Bitcoin is a process of solving multiple hash value equations (Hash Function). The process of node mining to obtain Bitcoin is achieved by using a computer to perform a large number of calculations to find a reasonable hash value. In short, the main goal of this process is to solve the public keys of both parties to the transaction. The solution obtained each time will be used as the initial condition for the next calculation, and the node will calculate new results based on this. When a node solves a set of hashes that have not been solved before, the system publishes it to the entire network and each node checks the local database. If each node finds that the solution is correct and there is no record of this solution in the database, it will confirm and record the legality of the solution. When all nodes have confirmed and recorded the solution, the node that found the solution will be rewarded with a certain number of Bitcoins. As the underlying core technology of Bitcoin, blockchain technology originated from a seminar at the British Library in October 2014. Bitcoin is the most successful financial application of blockchain technology. It records all transaction information on the entire network in the form of a public ledger. With the popularity and application of Bitcoin, blockchain technology has attracted increasing attention from the financial technology community.
(2) Blockchain is a weakly centralized distributed ledger protocol. Blockchain technology provides a public distributed secure ledger and is an open value transfer protocol. In fact, the blockchain is a weakly centralized database composed of data blocks associated using cryptographic methods. Any transaction that occurs on this blockchain network will be recorded in the blockchain using an agreed algorithm. on the system. All nodes save a complete data backup, including all transaction records since the formation of the blockchain system. The blockchain is composed of blocks. Block is the basic storage unit of the blockchain, which records all transaction information of each node within 10 minutes. Each data block contains transaction information, which is used to verify the validity of the information and prepare for the generation of the next block. A block consists of three parts: the address of this block, the transaction order, and the address of the previous block. When a node on the blockchain initiates a transaction, the node needs to announce the information to other nodes. The node encrypts information with a private key, thus effectively preventing information forgery. Because it understands the historical transaction information, the node that receives the information can use the backup information to determine whether the transaction is authentic. After each node successfully verifies, it combines the address of the last block with the transaction information to form a new block, and adds a timestamp (Timestamp) to connect to the blockchain to complete the entire transaction process. Since each block has the address of the previous block, people can find the previous block through the address of the latter block until the initial block. Therefore, the blockchain is a complete transaction information composed of blocks connected in chronological order.information chain.
(3) Characteristics of Blockchain
Blockchain is a brand new database system with the characteristics of weak centralization, non-tampering, and inclusiveness. Among them, weak centralization and non-tamperability are the core features that distinguish blockchain technology from traditional technology. These two characteristics enable systems built with blockchain technology to achieve “self-trust” through system mechanism settings.
1. Weak centralization. Each node of the blockchain system saves a complete data backup, which can effectively prevent network paralysis and data loss caused by the failure of the central server, as well as malicious attacks on individual nodes by hackers, thus ensuring data security. Unless someone can control more than 51% of the nodes in the system at the same time, attacks on a single node cannot affect the content of data on other nodes.
2. Cannot be tampered with. The blockchain system is a public general ledger, and all data in the system are openly and transparently recorded on the ledger. All data is recorded through the network consensus algorithm. Each new information based on the blockchain transaction will be released to the entire network. After being confirmed and saved by each node one by one, the received transaction information will be formed into a new block to ensure that the blockchain system information is indispensable. Tampering, impossible to fake, traceable. At the same time, blockchain technology uses random hashing algorithms and timestamp technology. The nodes will stamp the timestamp during verification to provide proof of transaction time and ensure the uniqueness of the same transaction. If you want to modify the transaction information of a certain block, you must complete all the information of this block and subsequent blocks. Since the modification will cause the hash value to be different from the original hash value, it cannot be confirmed by other nodes, which will make the modification invalid and greatly increase the difficulty of tampering with information. Therefore, blockchain technology can provide reliable credit guarantee for transactions. Its tamper-proof feature provides an effective solution for resolving contract conflicts and can be applied to areas where permanent records are stored and notarized and where the authenticity of information needs to be ensured. For example, notarization of property ownership.
3. Inclusiveness. Blockchain technology is based on algorithms and abandons the cultural and economic differences between different countries, allowing institutions in various countries to establish a unified credit system. In addition, blockchain technology is open source and shared with the outside world: any institution or individual who enters the blockchain can not only submit records, but also obtain complete historical transaction records of the system and confirm the rights of the information owner; at the same time, due to the The blockchain system runs on the Internet, and any institution or individual that meets the requirements can join the system as a node.
4. Traceability, openness and transparency.
Because blockchain or digital currency involves more knowledge and applications, interested friends can pay attention. I will organize and publish more knowledge about blockchain and digital currency.
⑺ Are different nodes in the blockchain not equal?
Yes, different nodes in the blockchain are not equal.
Reason:
1. Different node types: In a blockchain, different types of nodes can exist in rentable space, such as full nodes, light nodes, miner nodes, etc. Different types of nodes have different functions and roles, so It's not reciprocal either.
2. Different storage capacities: Some nodes may have larger storage capacity to store more transaction data and block data, while some nodes may only have smaller storage capacity and may only retain the most recent areas. block of data.
3. Different processing capabilities: Since different nodes have different hardware and network speeds, nodes have different capabilities in processing transactions and verifying blocks.
4. Different degrees of participation: In a blockchain, some high-level friend nodes may have a higher degree of participation, that is, they verify transactions and blocks by participating in the process of the consensus algorithm, thereby having a higher degree of participation. more rights to participate in decision-making.
Therefore, although nodes all play an important role in the network, different nodes have different roles, functions, processing capabilities, and participation, so they are not completely equivalent.
- 上一篇: 裴健智臻链区块链
- 下一篇: 三点钟区块链官方app,三点区块链俱乐部