为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链军事应用,区块链技术在军事领域的应用

发布时间:2023-12-21-22:59:00 来源:网络 区块链知识 区块   通信   军事

区块链军事应用,区块链技术在军事领域的应用

近年来,区块链技术在军事领域的应用受到了越来越多的关注,以下是3个相关的关键词,分别是:军事智能、联合作战和军事投资。

军事智能:军事智能是指将人工智能技术应用于军事领域,以提高军事作战效能的一种技术。区块链技术可以帮助军事智能技术更好地实现,通过使用区块链技术,可以更好地实现军事智能系统的安全性和可靠性,以及更好地进行数据分析和决策。

联合作战:联合作战是指将多个军事力量结合起来,以更有效地实现军事目标的一种军事行动。区块链技术可以帮助改善联合作战的效率,通过使用区块链技术,可以更好地实现数据共享、信息安全、数据保护和数据审计等,以提高联合作战的效率。

军事投资:军事投资是指政府和私人机构在军事领域进行的投资行为。区块链技术可以帮助改善军事投资的安全性和可靠性,通过使用区块链技术,可以更好地实现资金流转的安全性和可靠性,以及更好地进行资金管理和风险控制。

从上述可以看出,区块链技术在军事领域的应用可以改善军事智能、联合作战和军事投资的安全性和可靠性,为军事领域的发展和投资带来新的机遇。


请查看相关英文文档

❶ What is the military application value of blockchain technology?

There are many possible potential applications of blockchain technology in the military field:
Intelligence work performance incentives. Blockchain has the anonymity feature when recording transactions and can be used for covert targeted payments of intelligence work incentives. As we all know, intelligence providers or "informants" need to keep their identities and whereabouts secret, and traditional payment methods such as transfers and cash can easily be tracked or even locked. However, by using Bitcoin as a payment intermediary, the payment channel can be cleverly "broken", making the flow of intelligence funds difficult to trace, thereby effectively protecting security. The Bitcoin trading platform plays the role of a "black box" in the entire payment process, in which the three key links of "purchase-transaction-exchange" can be completed anonymously, hiding the key information of both parties to the transaction.
Full life management of weapons and equipment. Equipment needs to register and manage important information throughout its life cycle from project establishment and verification, production verification, delivery to service, to retirement and scrapping. The current recording method is usually paper or electronic media. This traditional method has difficulties in ensuring safety and Defects such as difficulty in transfer and handover and lack of effective supervision. If blockchain technology is introduced, higher-level authorities, equipment management departments, equipment users, and even equipment manufacturers can participate in the update and maintenance of equipment combat status, forming a distributed and supervised file registration network. If all parties keep a complete copy of the file, the above problems can be effectively solved and the security, convenience and credibility of the file can be improved.
Military intelligent logistics. For modern military logistics to be truly intelligent, it cannot be separated from the intelligence of participants such as logistics departments, warehouses, materials and material demand parties, which constitutes the small Internet of Things. Blockchain technology can effectively solve the problems of network communication, data storage and system maintenance. People and things in the system are dynamically and autonomously networked to form a decentralized peer-to-peer network without the need for a central server. The distributed structure improves the survivability of the system; nodes connected to the network can be connected directly or through relays. Communicate through various methods to achieve free exchange of information; important data information in the logistics chain, such as user needs, warehousing goods, loading and transportation, distribution transfer, etc., are uniformly stored in each block; the maintenance of the blockchain must be supervised by the entire network node. Illegal operations by individual nodes will be rejected and resisted by the majority of nodes, ensuring the orderly and efficient operation of the system. (Reprinted from Science and Technology Daily)
Of course, blockchain is mostly used in the financial field, such as Biying China’s digital currency crowdfunding; China Post Bank’s fund custody, etc.

❷ How to understand blockchain

Nowadays, science and technology are developing rapidly and the situation is turbulent. If you and I are a little lazy, we may be out. No, the new "hot internet celebrity" - blockchain is here. Since the beginning of this year, blockchain has become one of the hottest knowledge points in the technology world, and it has become increasingly dazzling in fields such as digital finance, Internet governance, and big data computing.

Blockchain technology in the military fieldThe domain also has broad application prospects and is very likely to quietly subvert future wars.

This is not Xiaole bragging. "In matters involving the three armed forces, nothing should be more important than secrecy." We must know that in the future information battlefield, confidentiality is the key to determining the outcome of a war. Because the blockchain system has many characteristics such as information independence, confidentiality and integrity, it can achieve the perfect combination of data storage and data encryption. After being attacked, it is also extremely resilient and can protect highly sensitive data, which is very helpful in winning the war.

According to the information collected by Xiaole, some countries are currently planning to build a blockchain information platform and have begun to study the application potential of blockchain in several scenarios such as military satellites and nuclear weapons; a certain International organizations are currently evaluating the performance of blockchain technology in military logistics, the Internet of Things and other fields.

If digital currencies such as Bitcoin are blockchain 1.0 applications, then the "smart contracts" that provide strong guarantees for the security of network transaction data are blockchain 2.0. There will be 3.0 in the future - from DAO (blockchain self-consistent organization), DAC (blockchain self-consistent company) to the blockchain society.

“Use informatization to cultivate new kinetic energy, use new kinetic energy to promote new development, and use new development to create new brilliance.” I believe that blockchain, the “new kinetic energy” of technology, will bring us more surprises: “ "With a machine in hand, I own the world", "trade autonomy", wider sharing, optimally adapted life model... Blockchain technology will create a more honest, convenient and efficient big data era.

Content source: People's Liberation Army Daily

❸ Understand the Internet blockchain in one article

Understand the Internet blockchain in one article

Understand the Internet blockchain in one article Internet blockchain, to understand blockchain, we have to study the brief history of blockchain technology development starting from the birth of the Internet, discover the motivations for blockchain, and infer the future of blockchain. Let’s understand the Internet blockchain in one article.

Understand the Internet blockchain in one article 1

The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.

As the oldest blockchain project, Mahjong has a team of four miners. The first one to dig out the 13 correct hash values ​​will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!

Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.

Mining pool = commission from the boss of the chess and card room.

It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.

A typical value Internet. The value in my pocket didn't last eight rounds before it went into their pockets.

Chinese people are basically good at playing mahjong, and blockchain productionIt owns 70%~80% of the world’s mining machines and has the most computing power in the world, accounting for about 77% of the computing power

Mahjong is actually the earliest blockchain project:

< p > 1, a group of four miners, the miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights and be rewarded.

2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.

3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.

4. Decentralization, everyone can be a banker, it is completely peer-to-peer.

5. UTXO, unspent transaction expenses.

There is another blockchain method of credit, assuming that everyone has no cash

Let’s take a closer look. When everyone reaches a consensus, we see There is no intermediary or third party to judge C’s win, and the rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralized, and players (miners) record their own records. After recording the results of the first game, B Dahu drew thirteen pieces, and B got Jia Dongfeng. After the record was completed, a complete block was generated, but remember, this was only the first game. In the entire blockchain , this is just one node. After the 8 rounds mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger, which is the blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.

Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:

Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.

Assume that the original result is the account recorded on A’s mobile phone: B owes A 10 yuan. However, the records on B’s mobile phone are correct, but the records of the other two people (C and D) and AIf the accounts are the same, then the settlement will still be based on the majority rule. In addition, everyone will have a bad impression of B's ​​integrity, and they will not take B to play mahjong next time.

Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.

Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .

In fact, in 2017 the blogger has developed a set of Mahjong coins

China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers The miner who collides with the correct hash value of 14 numbers can obtain an accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.

Understanding the Internet Blockchain in One Article 2

1. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain

In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.

1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem

In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.

This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.

In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.

Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but an endless stream of innovative applications are emerging at the top application layer, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.

In other words, in the technical ecology of the Internet, blockchain is a new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.

2. Cisco router technology born in 1984: an imitation of blockchain technology

In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.

In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a complete Internet device address table. Once something happens Changes will be synchronized to tens of millions of other routers (theoretically), ensuring that each router can calculate the shortest and fastest path.

When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.

3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion

The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is often called the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.

Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.

4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and its technical basis

Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). Its characteristic is that multiple computers connected to each other are connected to each other. In a peer-to-peer position, there is no distinction between master and slave. A computer can be used as a server to set shared resources for the network.It can be used by other computers on the network and can also be used as a workstation.

Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the mailing list of the underground hacker site Slashdot in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.

In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.

In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. The idealists also put a lot of enthusiasm into peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.

5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)

The hash algorithm converts numbers of any length into fixed-length values ​​using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.

This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.

The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.

Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.

2. The birth and technical core of blockchain

The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because apart from blockchain, So far, there is no major invention in the history of modern science whose inventor cannot be found.

On October 31, 2008, Bitcoin founder Satoshi Nakamoto (pseudonym) published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer"electronic cash system. In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.

The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.

In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.

It is indeed difficult to fully and clearly explain the blockchain to the public. We use Bitcoin as the object to introduce the technical characteristics of the blockchain as simply as possible but in depth.

1. Blockchain is a peer-to-peer network (P2P) software application

As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.

Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.

2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network

Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.

However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.

The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security and cannot be changed.source. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.

3. Blockchain is a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network

Area The first application of the blockchain was the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?

The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Each time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.

From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.

When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.

From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.

4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin

From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .

Because Bitcoin can be exchanged for legal currency, purchased in kind, and made huge profits through appreciation, the whole world is not calm. With the attitude that if you can do it, so can I, many peopleCreated his own imitation Bitcoin software application. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.

Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.

Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".

ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. This process of issuing coins It’s called ICO. The emergence of ICO has amplified the transaction volume of Bitcoin and Ethereum. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.

Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.

3. The historical status and future prospects of blockchain technology in the Internet

1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.

We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.

2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.

It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past nearly 30 years, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web to grow into Internet giants.

In their headquarters, a powerful central service has been establishedServer clusters store massive amounts of data. Hundreds of millions of users obtain the data they need from giant servers. This also led to the emergence of cloud computing. Then Internet giants opened up their unused central server resources to further attract enterprises, governments, personal data. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.

The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.

3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom

The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure, and massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers to obtain the latest information and historical information.

If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.

Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.

So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman’s terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.

This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.

4. Looking at the future prospects of blockchain from the Internet brain model

We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.

Since the birth of the Internet in 1969, humans have innovated in the Internet field from different directions, and there is no unified plan to build the Internet into a structure. When the wheel of time reaches the 20thIn 2017, with the vigorous development of science and technology such as artificial intelligence, Internet of Things, big data, cloud computing, robots, virtual reality, and industrial Internet, when humans raised their heads and looked at the giant system of their own creation, the model and architecture of the Internet brain It's becoming increasingly clear.

Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.

The birth of the blockchain provides another neuron model. Instead of uniformly managing neurons in the centralized services of giants, each terminal, including personal computers and personal mobile phones, becomes an independent neuron node. , retaining an independent data space and synchronizing mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.

Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.

4. Judgment on the future status of blockchain in the Internet

1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.

2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses hashing algorithms to generate "tokens" to synchronize information across the entire network.

3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.

4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.

5. Whether from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.

6. Of course, Internet giants developed from B/S and C/S structures also have their own problems.problems, but these can be gradually solved through commercial and political means in the future.

❹ What are the areas where blockchain technology is currently used?

The current areas where blockchain technology is used include:
1 .Digital Currency
At present, the most extensive and successful application of blockchain technology is the digital currency represented by Bitcoin.
2. Financial applications
Blockchain has inherent advantages in the financial field. On the Internet, this is determined by the genes of blockchain.
3. Blockchain + Industry Application
As the application of blockchain technology in the financial field continues to be verified, its technical advantages are gradually showing value in other industries. At present, blockchain application projects are gradually being implemented in fields such as medical and health, education, culture and entertainment, communications, charity, social management, sharing economy, and the Internet of Things, and "blockchain+" is becoming a reality.
At present, the main fields used by Pinji Technology’s blockchain technology are: smart medical care, smart education, smart transportation, etc.

❺ What are the applications of blockchain technology?

Blockchain has become popular, so what are the application fields of blockchain?

At present, the most extensive and successful application of blockchain technology is the digital currency represented by Bitcoin. Digital currency has developed rapidly in recent years. Due to the characteristics of decentralized credit and frequent transactions, it has a high transaction value and can maintain a relatively stable price through the development of hedging financial derivatives as a quasi-super-sovereign currency.

Financial institutions are the most willing to explore blockchain applications and need new technologies to improve operational efficiency and reduce costs to cope with the current status of the entire global economy. Objectively speaking, the market space in the financial industry is huge, and a little progress can bring huge benefits. The financial industry is an industry with extremely high requirements for security and stability. If the application of blockchain in the financial field is verified, it will have a huge demonstration effect and be quickly promoted in other industries. In the financial field, in addition to digital currency applications, blockchain has gradually begun to be applied in cross-border payments, supply chain finance, insurance, digital bills, asset securitization, bank credit reporting and other fields.

As the application of blockchain technology in the financial field continues to be verified, its technical advantages are gradually showing value in other industries. At present, blockchain application projects are gradually being implemented in fields such as medical and health, IP copyright, education, culture and entertainment, communications, charity, social management, sharing economy, and the Internet of Things, and "blockchain" is becoming a reality.

(1) Blockchain medical care: In the medical field, blockchain can use its anonymity, decentralization and other characteristics to protect patient privacy. Electronic health (EHR), DNA wallet, drug anti-counterfeiting, etc. are all possible application areas of blockchain technology. IBM predicted in last year's report that 56% of medical institutions around the world will invest in blockchain technology by 2020.

(2) Blockchain Internet of Things: The Internet of Things is a very broad concept. If communications, energy management, supply chain management, sharing economy, etc. are included, the Internet of Things application of blockchain technology will become a very important application. field.

(3) Blockchain IP copyright & cultural entertainment: Since the Internet became popular, digital music, digital books, digital videos, digital games, etc. have gradually become mainstream. The rise of the knowledge economy has made intellectual property rights a core element of market competition. However, intellectual property infringement is serious in the current Internet ecosystem, and the copyright protection of digital assets has become a pain point in the industry. Blockchain features disintermediation, consensus mechanism, and non-tampering. Blockchain technology can effectively integrate all aspects of the cultural and entertainment value chain, accelerate circulation, and shorten the value creation cycle; at the same time, it can realize the value of digital content Transfer, and ensure that the transfer process is credible, auditable and transparent, effectively preventing piracy and other behaviors. Blockchain Public Services & Education: In the fields of public services, education, charity and public welfare, issues such as file management, identity (qualification) certification, and public trust all exist objectively. The traditional method is to rely on third parties with credibility. The company makes credit endorsements, but problems such as fraud and deficiencies still exist.

❻ Is blockchain technology a devil or an angel?

Both good and bad are more good and less bad

Blockchain Technology , in the final analysis, it is the sharing of information and data.

Whoever masters this technology will have the opportunity to develop the economy and trade, and have the initiative to do business.

Its characteristics are: unforgeable, leaving traces throughout the process, traceable, open and transparent and collectively maintained.

Therefore, both devils and angels will use blockchain to serve themselves. It’s just that whoever has advanced technology and is powerful will be at the top.

Aren’t each of us the incarnation of devils and angels? ? What's more, it's a technology? The key depends on how you use it,

Technology is neutral, neither an angel nor a devil. The key is who controls it. If angels dominate, the world will become a better place. If the devil dominates, it will be hell on earth.

In essence, blockchain is a shared database. The data or information stored in it has the characteristics of "unforgeable", "full traces", "traceable", "open and transparent" and "collectively maintained". ” and other characteristics. Based on these characteristics, a solid foundation of "trust" has been laid, a reliable "cooperation" mechanism has been created, and it has broad application prospects, especially in the financial field, which will bring unprecedented experience to people.

Blockchain technology is an advancement in network development and is widely used in the military. It is not available for civilian use yet. It is also not suitable for civilian use in our country. Therefore, if you can use it, you are an angel.

Blockchain technology is neither an angel nor a devil. At present, this confidentiality and sharing technology is relatively advanced, but it is a bit untimely and will be quickly eliminated in the near future!

First of all, let me explain the general meaning of blockchain technology: blockchain is a distributed shared ledger and database, which is decentralized, cannot be tampered with, leaves traces throughout the process, can be traced, and is collectively maintained. , openness and transparency and other characteristics. These characteristics ensure the "honesty" and "transparency" of the blockchain and lay the foundation for creating trust in the blockchain. The rich application scenarios of blockchain are basically based on the ability of blockchain to solve the problem of information asymmetry and achieve collaborative trust and consistent action among multiple subjects.

To put it more straightforwardly, blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. (A rougher understanding is that the main business of this technology is encrypted files and the side business is virtual currency)

One of the biggest hidden dangers is the birth of commercial quantum computers

1 , Since IBM announced the launch of the first commercial quantum computer in early 2019, the possibilities of micro personal quantum computers have become infinitely magnified. If anyone still doesn’t understand why quantum computers are mentioned here, then I can tell you responsibly that the power of quantum computers is that currently the most difficult passwords are as fragile as white paper in front of quantum computers!

2. The uncertainty faced by the blockchain. Currently, mainstream scientists have proposed two solutions to the upcoming quantum computers. The first one: Tailor-made for quantum computers and rewriting blockchain technology. (Currently, I have only written an outline, but no specific details.) The second type: Write rules and regulations into the hardware of each quantum computer that is about to leave the factory, prohibiting the use of various modes to crack blockchain technology. (I personally don’t believe in the second method. Rules and regulations are easy to write and enforce on computers, but some countries basically have no credibility at all. It is inevitable that they will default on their obligations and even open a backdoor program on it...)

3. The relationship between blockchain technology and digital currency. Take the digital currencies issued by central banks of various countries as an example. They draw on part of the blockchain technology. Although the mechanism is independent and obviously has a higher security level than the blockchain, it also faces risks because this technology is also based on the current computer working environment. from.

Summary: The best technology is not perfect. In the future, digital currency will definitely replace the original paper currency, but future risks may arise due to loopholes. And it becomes even more dangerous...

The progress of science and technology1 is indeed accompanied by the rise of emerging industries and the decline of traditional industries. Be objective in understanding.

I’m confused

Is the blockchain issue a technical job? I don't think so. I think it should be broken down from the perspective of the system of the universe, of which the solar system is a part. As for how to block other galaxies, astronomers are still in the process of brewing it. It is a matter of the future. What we have to do now is We can only start from the territory of the earth. The result is either a continent or a country. Of course, there are also the problems of the religious consciousness of numerous ethnic groups and nations, as well as the connection problems of blocks in people and things.

I haven’t quite figured out the content and meaning of blockchain yet, but at present, it should be good

❼ Won the GBLS Global Blockchain Annual Technology Value Application Award, INE Wan Ruicheng was invited to attend the roundtable forum


INE has been highly recognized by the industry

< p>

On January 6, 2019, the GBLS Global Sleepless Blockchain Industry Leaders 2018 Year-End Ceremony was grandly held in Hangzhou, Zhejiang. INE Zhilian Ecology, as an outstanding project party, won the GBLS Global Blockchain Chain Annual Technology Value Application Award, project co-founder Wan Ruicheng was invited to attend the roundtable forum.


Representative Wan Ruicheng (third from right), co-founder of INE, came to the stage to receive the award


INE co-founder Wan Ruicheng (first from the right) took the stage to receive the award on behalf of the representative


INE co-founder Wan Ruicheng (first from the left) was invited to attend the roundtable forum< /p>


INE co-founder Wan Ruicheng (first from left) was invited to attend the roundtable forum


INE co-founder Wan Ruicheng’s roundtable forum representative’s speech


GBLS authoritative evaluation system


GBLS has always been known as the "King of All Meetings" in the blockchain industry. This GBLS 2018 year-end ceremony was also unprecedentedly popular, with 1,128 industry figures. Attendance, 22,810 people participated in the exhibition, which aims to select companies and practitioners who have made outstanding contributions to the blockchain industry in the past year, give high-quality projects a stage to showcase, and promote the healthy development of the blockchain industry.

The selection criteria are comprehensively carried out from multiple dimensions such as product, community, technology, application, investment, etc., gathering 100 top expert think tanks and 1,000 blockchain industry leaders to formulate the authoritative evaluation of the GBLS Blockchain Value Index System, create the first value evaluation system "PBTI model" in the blockchain, and define the value vane of the entire blockchain ecosystem.

GBLS Global Sleepless Blockchain Industry Leader 2018 Year-End Ceremony Site

GBLS Global Sleepless Blockchain Industry Leader 2018 Year-End Ceremony Outstanding Projects


Where does the value application of technology come from?


INE IntelliShare is very honored to be recorded in this GBLS year-end ceremony as an outstanding project with application value. With a weight of 30% expert review, 15% industry leader review, 15% media review, and 40% public review, INE has been highly recognized by the industry, and the application of INE technology is highly feasible and necessary.

In the comprehensive multi-faceted evaluation of GBLS, there are many awards. Why does INE win the Global Blockchain Annual Technology Value Application Award?


1. Existing network requirements


01

Military network requirements


Mesh network is used in wireless access Access to the network began in 2002. Its point-to-multipoint network topology can solve problems such as network-free communication, fast mobile communication, timely communication, and information confidentiality in military scenarios.

INE Mesh can be used to integrate various military service resources and assist the military in unified command and joint operations. Provide the military with temporary networking, communication command and logistics support wireless network services required for camps, exercises and wartime. Achieve unified command and coordination across different military functional units.


02

Private network for civilian use


The first application of wireless mesh networks was in community access networks. In Japan, Nankoku City has used Mesh networks to connect 13 elementary schools, 4 middle schools, and 18 municipal buildings. In Finland, Nokia's wireless router products can be installed on rooftops and have been favored by more than 50 operators.

At present, most domestic users are deploying Mesh networks. The application solutions involve wireless cities, intelligent transportation, manufacturing and energy, public safety, medical and health, education, residential areas and hotels, temporary networks, etc. etc., the application scenarios are extremely broad. The INE Mesh network has been tested in hotels, public security, temporary networking, manufacturing and energy. The network connection is very smooth, and monitoring is convenient and free of lags.


03

World without network communication

Network-free communication actually covers two levels. One is internal communication in areas without network, and the other is building communication systems in areas without network in the world. The market demand for the latter is huge.

According to surveys, in countries or regions with relatively backward economic development (especially the third world), 57% of the world's people (about 4 billion people) do not have access to the Internet, and are in a completely "no network" situation. "status. 50% of the population already has access to the Internet, but the remaining 50% have long and difficult access to the Internet. In these countries or regions, it is impossible to complete the installation of expensive wired network infrastructure. In contrast, the main goal of wireless Mesh networks is to achieve "last mile" broadband access and provide high-speed data coverage with lower network deployment and maintenance costs.

As of the end of December 2018, INE has signed a strategic cooperation agreement with the Philippines, which symbolizes that the third world countries represented by the Philippines will have a huge market for the INE Mesh network.


2. Potential network blue ocean


Wireless Mesh network, also known as "community wireless network", has become a A new, cheap and efficient network structure solution for the next generation of wireless Internet.

AI, Internet of Things, AR sensors, 5G and other technologies spawned in the digital era, as well as the decentralized technology of blockchain, are calling for a more diversified network system, thereby solving the traditional network system’s impact on technology. development constraints.

Kaixiang Zhang, chief architect of WeBank, believes that distributed network is an important implementable application project in the blockchain industry. The current blockchain development is mainly concentrated in the financial industry, and there is huge space in decentralized networks.


3. Already leading the implementation of blockchain distributed network


01

Launched IPFS mining machine

INE has reached a strategic cooperation with Zhongke Huichen, a smart mining equipment hardware manufacturer. In terms of the distributed storage system mining machine IPFS, the distributed network, that is, the technological combination of Mesh, has been opened up. The first phase of 100,000 IPFS+Mesh concept mining machines has been delivered gradually since October 2018.


02

Floor-standing wireless charging

INE and Dianzan Technology - its terminal scenarios have been signed with 7-Eleven, Family and other first-tier convenience stores across the country, and the wireless charging hardware embedded with Mesh network technology modules has entered the mass production period.


03

Implementing smart communities

INE has signed a strategic cooperation agreement with Shawei Community in Futian District, Shenzhen, and will use the INE Mesh network as the underlying network system to build smart communities. The community consensus has designated 40 residential buildings as pilot projects for INE Mesh equipment.


04

Unique landing scene

At the 2018 Qingdao Shanghai Cooperation Organization Summit, we solved the data security and network connection problems at the conference site, ensured the security of the surrounding monitoring network, and prevented the leakage of confidential data.

Information distribution and outfield network security monitoring services for the 2018 WPMF World Professional Muay Thai Federation China Division venues are available at the event site.Conduct timely deployment and control to prevent emergencies during dense crowds and take timely measures.


05

Implement traditional physical factory

INE has signed a strategic cooperation agreement with Henan Nanyang Niannian Food Co., Ltd. Based on the Mesh network, it will create the integration of blockchain industry + traditional physical industry and build a blockchain distributed network factory; and based on the blockchain spirit, create a distributed business system.


06

Landing in the Third World

The IntelliShare Foundation signed a strategic cooperation agreement with the Philippine ASYA Pacific Foundation, Asian Premier Institution, and Malayan Pacific Power Holdings Corporation (MPPH). INE Mesh technology will support the Internet of Things network and network security of the Philippine petroleum industry, support the low-cost network coverage and emergency network of the Philippine communications industry, and the island network ecology of the Philippine Islands.


Landing is just the beginning


For blockchain projects, implementation is just the beginning, and the ecosystem that is constantly built based on this is the most important part.

This ecosystem must have technical support, perfectly integrate the blockchain’s token economic model, be feasible for implementation, and have a broad market. Adhering to this concept and original intention, INE Intelligent Ecology still forges ahead even in the bear market, and gathers the consensus of all members of the community to wait for the dawn and tomorrow.


❽ Since 1993, what have people used on the Internet?

Since 1993, people have been able to see text on the Internet. , you can see pictures and hear sounds, making the online world more beautiful and colorful. This is mainly due to the "www World Wide Web".

World Wide Web WWW is the abbreviation of World Wide Web, also known as Web, 3W, etc. WWW is a combination of client/server information discovery technology and hypertext technology. The WWW server organizes information into hypertext with pictures and text through Hypertext Markup Language (HTML), and uses links to jump from one site to another. This completely breaks away from the limitation that previous query tools could only find information step by step along a specific path.

The World Wide Web allows people around the world to communicate with each other on an unprecedented scale. apartPeople far away, or even people of different generations, can develop close relationships or sublimate each other's ideological realm through the Internet. The advantage of digital storage is that information resources on the Internet can be queried more efficiently than consulting libraries or physical books. Information can be obtained more quickly than by looking for it personally, or by mail, telephone, telegraph, or other means of communication.

The World Wide Web is the most profound and widespread communication medium in human history. It can interconnect its users with other groups of people scattered around the globe, far more numerous than can be reached through physical contact or all other communication media that already exist combined.

Today, the Internet is a household name, mobile Internet is at its peak, and satellite Internet is also rising. These networks, like transportation, electricity, gas, tap water, etc., are indispensable infrastructure for human society. If earlier infrastructure transferred matter and energy, then the Internet, mobile Internet, and satellite Internet transferred information, so they are called information infrastructure. Unlike matter and energy, information is naturally permeable, knowledgeable and intelligent, and its marginal cost of production and transmission is much smaller than that of matter and energy. Therefore, its role in promoting the development of human society is much greater than that of matter and energy.

In the new infrastructure launched by our country in response to the impact of the COVID-19 epidemic on the global economy, information infrastructure such as 5G, Internet of Things, Industrial Internet, and Satellite Internet, as well as related intelligent transportation and smart energy and other infrastructure have become the main construction content. The inclusion of satellite Internet in the scope of new infrastructure has excited people in my country's satellite communications industry. The entire industry seems to suddenly have a sense of becoming the master. There is no doubt that the inclusion of satellite Internet in the scope of new infrastructure is a good thing for the development of satellite communications in my country. At this moment, to know where the content of the new infrastructure comes from, it is necessary to review the brief history of the development of the Internet, mobile Internet, and satellite Internet. Because, review the past and learn the new.

2. The Internet dominates the world
When it comes to the Internet, we have to take it literally. The Internet originated in the United States, and its English name is Internet. It was originally transliterated into Internet in my country. Literally, the Internet is a combination of Internet and net, which means a network that is connected to each other. The Internet began in 1969 when the U.S. ARPA (Defense Research Projects Agency) launched a network interconnection research project for military communications purposes, connecting major computers. In that era, PSTN (Public Telephone Network), X.25 (Public Data Network) and DDN (Public Digital Data Network), as well as private networks of companies such as IBM's DEC, were all business networks serving specific fields and were heterogeneous with each other. , cannot communicate with each other. The ARPA network interconnection research project plans to develop a protocol family with TCP/IP (Transmission Control Protocol/Internet Protocol) as the core. Its purpose is to integrate various differentThe structural networks are connected to each other to realize the interconnection between computers. Therefore, the early Internet was also called the computer network.

TCP/IP is simplified from the ISO (International Organization for Standardization) OSI (Open Systems Interconnection) seven-layer protocol, which is divided into five layers: physical, link, network, transport and application. . The physical layer realizes the transmission of signals on various media, and channel coding and modulation and demodulation are the main technologies; the link layer realizes point-to-point transmission between network nodes, and synchronization and error correction are the main technologies; network The layer implements the delivery of data packets from the source to the destination, with routing and switching being the main technologies; the transport layer implements end-to-end conversation and confirmation; the application layer provides interfaces and interfaces for various applications. IP and TCP correspond to the network and transport layers respectively, and IP is the backbone of the Internet protocol family.

The nodes in the Internet are known as routers, which use IP protocols to connect various heterogeneous networks together. End-user data is encapsulated into uniformly formatted IP packets, which include globally unique IP addresses. IP data packets are encapsulated on various network protocols, and routers perform routing and relay transmission of data packets. This process is vividly called IP over everything, and everything refers to various heterogeneous networks.

In the early days, routers had to deal with various network protocols such as X.25, FrameRelay, ISDN (Integrated Services Digital Network), and ATM (Asynchronous Transfer Mode). Because there are not many people using it and the amount of data processed is not large, ordinary routers can handle it very well. In 1993, the Clinton administration in the United States proposed the National Information Infrastructure (NII) or Information Highway plan, and people's awareness of the importance of information networks has increased unprecedentedly. The Internet stood out because of its strong openness and inclusiveness, and soon surpassed the carefully designed networks such as ISDN and ATM in the telecommunications industry. The popularity of the WWW (World Wide Web) based on HTML (Hypertext Markup Language), packetization of voice and video, and IP packet transmission have enriched the applications of the Internet, and also caused the amount of data on the Internet to increase exponentially, which has a great impact on the original data of the Internet. Both transmission and switching modes have had a huge impact.

In order to cope with the above impact, the Internet has three important solutions. One is to run PPP (Point-to-Point Protocol) on a large-capacity SDH (Synchronous Digital Hierarchy) optical fiber network to replace various low-speed business networks at the backbone, aggregation and access layers. The second is to introduce MPLS (Multi-Protocol) into routers. Tag switching) and other technologies to improve data processing speed. According to different application scenarios and business processing capabilities, routers are divided into backbone, aggregation and access routes. Additionally, there are home routers. The third is to prioritize various application data and provide carrier-grade services for voice and other applications. In addition, in the process of Internet commercialization, network access technology is also one after another.xDSL (Digital Subscriber Line) based on telephone twisted-pair copper wires and DOCSIS (Data over Cable Service Interface Specification) based on cable TV cables have played an important supporting role, but were eventually replaced by WiFi (Wireless Fidelity) wireless networks and various Replaced by PON (Passive Optical Network) fiber optic network.

At this point, the Internet has completed a magnificent turn. It no longer relies on others, but stands on its own, and realizes the integration of the telephone network and cable TV network in the three-network integration. The IP telephony, IPTV and OTTTV that people take for granted today are typical products of triple play integration. In terms of application form, they are like telephone networks and television networks, but their network structure is the Internet. This result is vividly called EverythingoverIP, where Everything refers to various contents and applications. Today, so-called Internet companies such as Facebook, Google, and Twitter abroad, as well as domestic networks, Alibaba, and Tencent, are actually engaged in Internet applications, such as e-commerce, social networks, etc., while the Internet in the physical sense is mainly in the hands of telecom operators. inside.

3. Mobile Internet conquers the city
It should be said that although wireless and microwave transmission also played a certain role, the Internet was initially developed based on wired networks. The goal of the Internet is network interconnection to unite computers around the world, and the goal of mobile networks is to enable communication anytime and anywhere. From the 1970s to the present, mobile communications have basically been updated every ten years. If the original 1G was an analog voice mobile communication system and had nothing to do with the Internet, then starting from 2G digital communication, every step of the development of mobile communications has been strongly influenced by the Internet, and eventually became an important part and application form of the Internet. , and has a strong tendency to catch up from behind.

The gradual integration of mobile communications into the Internet and the development of mobile Internet completed the transition during the 2G and 3G periods. The starting point was GPRS (General Packet Radio Service) in the 2G period. GPRS is a wireless packet switching technology introduced on the basis of GSM network voice circuit switching to provide end-to-end, wide-area wireless IP connections and data transmission. GPRS is the 2.5G technology that transitions from GSM network to 3G. It realizes the connection between mobile communications and the Internet. Its theoretical bandwidth can reach 171.2Kbps, but the actual bandwidth is about 40~100Kbps. On top of GPRS, WAP (Wireless Application Protocol) converts HTML data on the Internet into a simple WML (Wireless Markup Language) format to adapt to application scenarios where network speed and mobile phone intelligence were limited at that time.

After entering the 3G era, in order to meet the bandwidth growth needs brought by smart phones like Apple and various value-added applications, HSDPA (High Speed ​​Downlink Packet Access) and HSUPA (High Speed ​​Downlink Packet Access), which have higher rates than GPRS, Uplink packet access) and its additionStrong versions of HSPA+ and other technologies are beginning to appear one after another. HSPA+ has an uplink rate of 5.76Mbps and a downlink rate of 21Mbps or 28Mbps.
Unlike 2G and 3G, which transmit voice and data respectively through circuit and packet domains, 4G completely cancels the circuit domain and uses a unified packet domain to carry all services, which is processed through IMS (IP Multimedia Subsystem) For real-time services such as voice, VoLTE (Voice over Long Term Evolution) is a standard for transmitting voice over IP. It can be seen that 4G has transformed mobile communications into a real mobile Internet. Entering the 5G mobile Internet stage, its application areas have expanded from ordinary Internet applications to the Internet of Things, the Internet of Vehicles and the Industrial Internet. Not only that, 5G also realizes the system integration of the Internet of Things, cloud computing, big data and blockchain technology, bringing the entire society into the era of artificial intelligence. The Internet in the era of artificial intelligence is more like the human brain. It has hearing, vision, and touch, can analyze, calculate, store, and judge, and may eventually have self-awareness.
4. Satellite Internet expands territory

Although the terrestrial Internet is very developed, it only covers 20% of the earth’s land area and 5.8% of the earth’s surface. To truly realize 5G’s vision of interconnection of everything and anytime access, we need to rely on satellite Internet that can provide truly global coverage.

It should be said that the Internetization of satellite communication networks had begun before 2000. Among them, the VSAT network and DVB-S (digital video broadcasting-satellite), DVB-RCS (digital video broadcasting-satellite) The combination of standards such as satellite return channel) is a key link. DVB-S was originally a set of technical standards for satellite digital video broadcasting developed by ETSI (European Telecommunications Standards Institute), including source coding and channel coding and modulation. Later, with the advancement of satellite channel coding and modulation technology, ETSI successively proposed DVB-S2 and DVB-S2X standards, with a cycle of exactly ten years. DVB-RCS is a return channel standard proposed by ETSI to meet the development needs of satellite broadband communications. The DVB-S series and DVB-RCS standards are jointly supported by mainstream manufacturers of global VSAT network equipment, which makes the global VSAT network have a common open standard, thus laying a solid foundation for the IPization of satellite communication networks and the development of satellite Internet. .

In the satellite Internet forward channel based on the DVB-S series and DVB-RCS standards, IP data packets are segmented using MPE (Multi-Protocol Encapsulation) and then loaded into MPEG2-TS (Transport stream) package. The IP data packets of the reverse channel can be packaged using ATM or MPE and then loaded into MPEG2-TS. Initially, this type of satellite Internet will have forward channel speeds of up to 45Mbps and reverse channel speeds of up to 2Mbps. With the promotion of large-capacity HTS (high-throughput satellite) and higher-efficiency channel coding and modulation technology,It turns out that the forward channel and reverse channel rates have been increased by more than ten times, which fully meets the bandwidth needs of consumer broadband access, mobile platform access, base station relay, content delivery and other applications.

At present, satellite Internet mainly appears in the form of HTS, which have three forms: GEO (high orbit), MEO (medium orbit) and LEO (low orbit). Among them, the GEOHTS system has a long transmission delay and weak coverage in high latitude areas. However, the system has a simple structure and can cover a wide area. It is suitable for applications such as airborne communications, maritime communications, consumer broadband access, video broadcasting and content delivery; LEOHTS is more complex, but has shorter latency and can achieve seamless global coverage. It is suitable for low-latency applications such as base station relays and the Internet of Things; MEOHTS is somewhere in between the previous two. In terms of GEO satellites, the capacities of the two in-orbit HTSs of North American Viasat Company Viasat-2 and Hughes Company Jupiter-2 have reached 300Gbps and 220Gbps respectively. The capacities of Viasat-3 and Jupiter-3 under construction will reach 1Tbps and 500Gbps respectively, while traditional The capacity of communication satellites is only about 1Gbps. In terms of MEO constellations, SES's O3b currently has 20 in orbit, and its main applications are relay and backhaul. In November 2017, O3b planned to add 30 satellites. In terms of LEO constellations, the SpaceX LEO constellation leads the way, and ultimately plans to launch 42,000 satellites. At present, SpaceX has completed seven launches using the 60-satellite technology. When the number of satellites reaches 800, it will have initial service capabilities. It is worth mentioning that the DVB-S series and DVB-RCS standards are mainly applicable to GEO satellites. For MEO and LEO satellites, due to changes in channel characteristics, more appropriate air interface standards and protocols are usually required, but the VSAT network is similar.

Satellite Internet is a natural extension of the Internet, especially the mobile Internet. In order to promote the integration of satellite Internet and 5G, international standardization organizations such as ITU, 3GPP, SaT5G (Satellite 5G Alliance) and CBA (C-Band Alliance) are conducting relevant research work. At the 2019 European Network and Communications Conference (EuCNC2019), SaT5G conducted a series of satellite 5G demonstrations:

1) MEC (Mobile Edge Computing) utilizing satellite and terrestrial networks: bit rate adaptation, chain path selection, enhanced video streaming transmission;
2) Video caching and live content distribution based on satellite multicast technology;
3) Aviation airborne communications based on MEO satellites;

4) 5G local content caching utilizing hybrid backhaul network and MEC;

5) Satellite network 5G video demonstration;

6) Expanding services for rural markets and large gathering events Hybrid 5G base stationrelay. Among them, airborne communications and rural broadband are the most attractive.

In May 2019, Telesat, the University of Surrey in the UK and Newtec in Belgium jointly conducted a LEO satellite 5G backhaul test. The round-trip delay was 18-40 milliseconds. The main applications include 8K streaming media transmission and web pages. Browsing and video communication. These test results show that satellite Internet and 5G have achieved comprehensive integration. Satellite Internet will show broad development space for the Internet and mobile Internet, play a unique role in universal services, and allow all members of mankind to enjoy the basic rights of Internet access and information services.

❾ Is blockchain technology expected to lead mankind into the era of machine trust?

Recently, the concept of blockchain has made a comeback. Since February, the U.S. House of Representatives has held two blockchain hearings in succession, elevating blockchain to a "revolutionary technology" and exploring its future applications and impact on finance, business and government. At the same time, Russian President Vladimir Putin also stated that Russia will focus on developing blockchain technology to strengthen Russia’s voice in international competition in the field of cutting-edge technology. In China, more and more industries are beginning to pay attention to the field of blockchain technology, and this concept has also become one of the hot topics discussed by representatives during this year's "Two Sessions".

In today's turbulent era of technological advancement, there are still many places for us to explore in depth as a new technology called blockchain. Especially in high-tech fields where others have formulated the "rules", we should take a long-term view, continue to innovate, digest and absorb the essence of blockchain technology, and strive to form core competitiveness with independent intellectual property rights. At the same time, in the face of various temptations, we need to be cautious at all times, see risks, avoid losses, and never let the light of economic interests obscure our understanding of the essence and deep value of blockchain.

❿ How does blockchain technology “show its mettle” in the military?

In recent years, the application of blockchain technology has attracted widespread attention, whether in the financial field, enterprises, or Government departments are accelerating the research, development and application of blockchain technology. Some countries have also sensed the potential of blockchain technology in warfare and are striving to expand the breadth and depth of blockchain technology in military applications.

Blockchain technology is the "bulletproof vest" for military logistics. The decentralized nature of blockchain technology gives it a strong ability to recover information after an attack. Unless all computers in the system are destroyed, it is completely meaningless to modify the information of a node because the system can recover quickly. Complete form. The current logistics system relies too much on the reliability of the information service center. Once the information service center fails, it will affect the normal operation of the entire logistics system. Military applications have very high requirements on system security and wartime damage resistance. The use of blockchain technology can effectively solve the core issues such as information security, data storage and interactive processing faced by intelligent military logistics. The focus is on improving the logistics system. survivability, thereby ensuring the orderly and efficient operation of the system.

Essentially speaking, blockchain technology is a mutually trusted storage device that can be used for information transactions between multiple users. Its core is "distributed consensus" and "anonymity", which can be used at any time Verify transactions without compromising the privacy of the parties involved. Therefore, blockchain technology is bound to become a new generation of disruptive technology, and its military applications will become more extensive and in-depth.

Content source ifeng.com

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39822 文章总数
  • 3637508访问次数
  • 3093建站天数