区块链数据层内容包括,区块链数据层内容有哪些
。近年来,区块链技术在金融、分布式账本、社交媒体等领域的应用越来越广泛,其中区块链数据层也受到了越来越多的关注。下面,就来简单介绍区块链数据层的三个关键词:分布式账本、去中心化和智能合约。
分布式账本(Distributed Ledger),也称为分布式账户,是一种由一组节点组成的分布式数据库,用于存储和管理账户信息。分布式账本的特点是可以记录和管理多种类型的数据,比如货币、资产、合同等,而且可以实现去中心化、安全性、可信度和可追溯性。此外,分布式账本还可以防止恶意活动,如账户被盗等。
去中心化(Decentralization)是一种新型的网络结构,它不存在中心服务器,而是由多台节点组成的网络,每台节点都可以访问网络上的数据。去中心化的特点是可以有效地防止数据被篡改,因为每台节点都可以访问网络上的数据,而且数据是实时同步的,所以可以有效地保证数据的安全性。此外,去中心化还可以提高系统的可用性,可以有效地避免系统停机的情况。
智能合约(Smart Contract)是一种特殊的计算机程序,它可以在满足一定条件的情况下自动执行合同。智能合约的优势在于它可以自动执行合同,可以有效地节省人力成本,而且可以有效地防止恶意活动,如账户被盗等。此外,智能合约还可以有效地减少交易成本,可以实现跨境支付,而且可以有效地保护双方的利益。
以上就是区块链数据层的三个关键词:分布式账本、去中心化和智能合约,它们的应用可以帮助企业更好地管理账户信息,有效地防止恶意活动,节省人力成本,减少交易成本,实现跨境支付,保护双方的利益等。
请查看相关英文文档
① What are the characteristics of the data layer in blockchain technology
Traditional blockchain tends to divide the architecture into data layer, network layer, consensus layer, Incentive layer, contract layer, application layer. Example of blockchain platform architecture
Data layer
An appendable and unchangeable distributed database system that encapsulates the chain structure of the underlying data blocks, related asymmetric public and private key data encryption technology and timestamp technology , exists as a distributed ledger.
Network layer
It is built on the basis of IP communication protocol and P2P network, including distributed networking mechanism, data dissemination mechanism and data interception and verification mechanism.
Consensus layer
Encapsulates various simple consensus mechanism algorithms of network nodes.
Incentive layer
Integrate economic factors, mainly used in public chains.
Contract layer
Encapsulates various scripts, algorithms and smart contracts, and is the basis of programmable features.
The application layer
encapsulates various application scenarios and cases of the blockchain, provides a programmable environment, and converts business rules into contracts for automatic execution by the platform through smart contracts.
② Introduction to blockchain technology What is blockchain technology
1. Blockchain technology is one of the top ten typical judicial technology applications on the Internet.
2. Blockchain is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of "unforgeable", "full traces left", "traceable", "open and transparent" and "collectively maintained". Based on these characteristics, blockchain technology has laid a solid foundation of "trust" and created a reliable "cooperation" mechanism, which has broad application prospects.
3. Generally speaking, the blockchain system consists of data layer, network layer, consensus layer, incentive layer, contract layer and application layer.
4. Among them, the data layer encapsulates the underlying data blocks and related data encryption and timestamps and other basic data and basic algorithms; the network layer includes distributed networking mechanisms, data dissemination mechanisms and data The verification mechanism is obvious; the consensus layer mainly encapsulates various consensus algorithms of network nodes; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various Class scripts, algorithms and smart contracts are the basis of the programmable features of the blockchain; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.
5. The consensus mechanism of the blockchain has the characteristics of "the minority obeys the majority" and "everyone is equal". Among them, "the minority obeys the majority" does not entirely refer to the number of nodes, but also to computing power. , number of shares or otherCharacteristic quantities that a computer can compare. "Everyone is equal" means that when a node meets the conditions, all nodes have the right to give priority to the consensus result, which will be directly recognized by other nodes and may eventually become the final consensus result. Taking Bitcoin as an example, Caizihe uses proof of work. Only by controlling more than 51% of the accounting nodes in the entire network can it be possible to forge a non-existent record. When there are enough nodes joining the blockchain, this is basically impossible, thus eliminating the possibility of fraud.
③ 108 essential knowledge points for getting started with blockchain
108 essential knowledge points for getting started with blockchain
(Welcome
1. What is a blockchain
Packing together the information of multiple transactions and the information indicating the block, the verified package It's the block.
Each block stores the hash value of the previous block, creating a relationship between blocks, that is to say, a chain. Together they are called blockchain.
2. What is Bitcoin
The concept of Bitcoin was proposed by Satoshi Nakamoto in 2009, with a total number of 21 million. The Bitcoin chain generates a block approximately every 10 minutes, and this block is mined by miners for 10 minutes. As a reward to miners, a certain number of Bitcoins will be issued to miners, but this certain number is halved every four years. Now it's 12.5. If this continues, all Bitcoins will be available in 2040.
3. What is Ethereum
The biggest difference between Ethereum and Bitcoin is the smart contract. This allows developers to develop and run various applications on it.
4. Distributed ledger
It is a database that is shared, replicated and synchronized among network members. To put it bluntly, all users on the blockchain have accounting functions and the content is consistent, which ensures that the data cannot be tampered with.
5. What is quasi-anonymity?
I believe everyone has a wallet, and the wallet address (a string of characters) used to send transactions is quasi-anonymity.
6. What is open transparency/traceability
The blockchain stores all data from history to the present, anyone can view it, and can also view any data in history.
7. What is tamper-proof
Historical data and current transaction data cannot be tampered with. Data is stored in blocks on the chain and has a hash value. If the block information is modified, its hash value will also change, and the hash values of all blocks following it will also change.It must be modified to become a new chain. At the same time, the main chain is still conducting transactions to generate blocks. The modified chain must always generate blocks synchronously with the main chain to ensure that the length of the chain is the same. The cost is too high, just to modify a piece of data.
8. What is anti-DDoS attack
DDoS: Hackers control many people’s computers or mobile phones and allow them to access a website at the same time. Since the bandwidth of the server is limited, a large amount of traffic The influx of data may cause the website to fail to function properly, resulting in losses. However, the blockchain is distributed and there is no central server. If one node fails, other nodes will not be affected. Theoretically, if more than 51% of the nodes are attacked, problems will occur.
9. Definition of main chain
Taking Bitcoin as an example, at a certain point in time, a block is mined by two miners at the same time, and then 6 blocks are generated first. The chain of blocks is the main chain
10. Single chain/multi-chain
Single chain refers to the data structure that handles everything on one chain. The core essence of the multi-chain structure is composed of public chain + N sub-chains. There is only one, but in theory there can be countless sub-chains, and each sub-chain can run one or more DAPP systems
11. Public chain/alliance chain/private chain
Public Chain: Everyone can participate in the blockchain
Alliance chain: Only alliance members are allowed to participate in accounting and query
Private chain: Writing and viewing permissions are only controlled by one person In the hands of the organization.
12. Consensus layer, data layer, etc.
There are six overall structures of the blockchain: data layer, network layer, consensus layer, incentive layer, contract layer, and application layer. Data layer: a layer that records data, belonging to the underlying technology; network layer: a structure for building a blockchain network, which determines how users are organized. Consensus layer: Provides a set of rules to allow everyone to reach agreement on the information received and stored. Incentive layer: Design incentive policies to encourage users to participate in the blockchain ecosystem; Contract layer: Generally referred to as "smart contracts", it is a set of contract systems that can be automatically executed and written according to their own needs. Application layer: Applications on the blockchain, similar to mobile apps. Former Distributed Storage R&D Center
13. Timestamp
The timestamp refers to the time from January 1, 1970 Day 0 hours 0 minutes 0 seconds 0... The total number of seconds from the current time to now, or the total number of nanoseconds and other very large numbers. Each block is generated with a timestamp indicating when the block was generated.
14. Block/block header/block body
Block is the basic unit of blockchain, and block header and block body are components of blockchain. The information contained in the block headerThe information includes the hash of the previous block, the hash of this block, timestamp, etc. The block body is the detailed data in the block.
15. Merkle tree
Merkle tree, also called binary tree, is a data structure for storing data. The bottom layer is the original data contained in all blocks, and the upper layer is each The hash value of a block, the hash of this layer is combined in pairs to generate a new hash value, forming a new layer, and then upwards layer by layer, until a hash value is generated. Such a structure can be used to quickly compare large amounts of data, and you can quickly find the bottom-level historical data you want without downloading all the data.
16. What is expansion?
The size of a Bitcoin block is about 1M and can save 4,000 transaction records. Expansion means making the block larger so that more data can be stored.
17. What is a chain?
Each block will save the hash of the previous block, creating a relationship between the blocks. This relationship is a chain. Data such as block transaction records and status changes are stored through this chain.
18. Block height
This is not the height mentioned in terms of distance. It refers to the total number of blocks between the block and the first block on the chain. This height indicates which block it is, and is just for identification purposes.
19. Fork
Two blocks were generated at the same time (the transaction information in the block is the same, but the hash value of the block is different), and then in Two chains are forked from these two blocks. Whoever generates 6 blocks from these two links first will be the main chain, and the other chain will be discarded.
20. Ghost Protocol
Mining pools with high computing power can easily generate blocks faster than mining machines with low computing power, resulting in most of the blocks on the blockchain being generated by these mining pools with high computing power. However, the blocks generated by mining machines with low computing power are not stored on the chain because they are slow, and these blocks will be invalid.
The ghost protocol allows blocks that should be invalidated to remain on the chain for a short time, and can also be used as part of the proof of work
. In this way, miners with small computing power will contribute more to the main chain, and large mining pools will not be able to monopolize the confirmation of new blocks.
21. Orphan blocks
As mentioned before, orphan blocks are blocks generated at the same time. One of them forms a chain, and the other does not form a chain. Then this block that does not form a chain is called an orphan block.
22. Uncle block
The orphan block mentioned above becomes part of the proof of work through the ghost protocol, so it will not be discarded and will be saved on the main chain. This block is the next
23 replay attack
The hacker resends the message that has been sent to the server. Sometimes this can deceive the server into multiple responses.
24. Directed acyclic graph
Also called data set DAG (directed acyclic graph), DAG is an ideal multi-chain data structure. Most of the blockchains mentioned now are single chains, that is, one block is connected to another block, and DAG is multiple blocks connected. The advantage is that several blocks can be generated at the same time, so the network can process a large number of transactions at the same time, and the throughput will definitely increase. However, there are many shortcomings and it is currently in the research stage.
25. What is mining
The mining process is to perform a series of conversions, connections and hash operations on the above six fields, and continue to try them one by one. The random number you are looking for, and finally successfully find a random number that meets the conditions: the value after hashing is smaller than the hash value of the preset difficulty value, then the mining is successful, and the node can broadcast the area to neighboring nodes. block, neighboring nodes receive the block and perform the same operation on the above six fields to verify compliance, and then forward it to other nodes. Other nodes also use the same algorithm to verify. If there are 51% of nodes in the entire network If all verifications are successful, even if this block is truly "mined" successfully, each node will add this block to the end of the previous block, delete the list in the block that is the same as its own record, and resurrect again. the above process. Another thing to mention is that regardless of whether the mining is successful or not, each node will pre-record the reward of 50 Bitcoins and the handling fees of all transactions (total input-total output) in the first item of the transaction list (this is " The most fundamental purpose of "mining" is also the fundamental reason to ensure the long-term stable operation of the blockchain), the output address is the address of this node, but if the mining is unsuccessful, the transaction will be invalidated without any reward. Moreover, this transaction called "production transaction" does not participate in the "mining" calculation.
26. Mining machines/mining farms
Mining machines are computers with various configurations, and computing power is the biggest difference between them. A place where mining machines are concentrated in one place is a mining farm
27. Mining pool
Miners join together to form a team, and the computer group under this team is a mining pool. Mining rewards are distributed based on your own computing power contribution.
28. Mining difficulty and computing power
Mining difficulty is to ensure that the interval between generating blocks is stable within a certain short time, such as Bitcoin’s 10 minutes.
p>Block 1. The computing power is the configuration of the mining machine.
29. Verification
When verification in the blockchain is a confirmation of the legality of the transaction, when the transaction message is propagated between nodes, each node will verify whether the transaction is legal. For example, verify whether the syntax of the transaction is correct, whether the transaction amount is greater than 0, whether the entered transaction amount is reasonable, etc. After passing the verification, it will be packaged and handed over to the miners for mining.
30. Transaction broadcast
The node sends information to other nodes through the network.
31. Mining fees
For the blockchain to work non-stop like a perpetual motion machine, miners need to maintain the system. Therefore, the miners must be given favorable fees to make it sustainable.
32. Transaction confirmation
When a transaction occurs, the block recording the transaction will be confirmed for the first time, and will be confirmed in every area on the chain after the block. Block is reconfirmed: When the number of confirmations reaches 6 or more, the transaction is generally considered safe and difficult to tamper with.
33. Double transaction
That is, I have 10 yuan, I use the 10 yuan to buy a pack of cigarettes, and then instantly use the 10 yuan that has not yet been paid. Bought another cup of coffee. So when verifying the transaction, you need to confirm whether the 10 yuan has been spent.
34. UTXO unspent transaction output
It is a data structure containing transaction data and execution code, which can be understood as digital currency that exists but has not yet been consumed.
35. Transactions per second TPS
That is throughput, tps refers to the number of transactions the system can process per second.
36. Wallet
Similar to Alipay, it is used to store digital currencies, and blockchain technology is more secure.
37. Cold wallet/hot wallet
A cold wallet is an offline wallet. The principle is to store it locally and use QR code communication to prevent the private key from touching the Internet. A hot wallet is an online wallet. The principle is to encrypt the private key and store it on the server. When it is needed, it is downloaded from the server and decrypted on the browser side.
38. Software Wallet/Hardware Wallet
A software wallet is a computer program. Generally speaking, a software wallet is a program that interacts with the blockchain and allows users to receive, store, and send digital currencies and can store multiple keys. Hardware wallets are smart devices that specialize in handling digital currencies.
39. Airdrop
The project sends digital currency to each user’s wallet address.
40. Mapping
Mapping and areaRelated to the issuance of blockchain currency, it is the mapping between chains. For example, there are some blockchain companies that have not completed the development of the chain in the early stage. They rely on Ethereum to issue their own currency. The issuance and transactions of the early currency are all operated on Ethereum. With the development of the company, the company's own chain development has been completed. The company wants to map all the previous information on Ethereum to its own chain. This process is mapping.
41. Position
Refers to the ratio of the investor’s actual investment to the actual investment funds
42. Full position
Buy with all funds Enter Bitcoin
43. Reduce the position
Sell some of the Bitcoins, but not all of them
44. Heavy positions
Compared with Bitcoin, Bitcoin accounts for a larger share of funds
45. Short position
Compared with Bitcoin, the share of funds is larger
46. Short position
Sell all the Bitcoins you hold and convert them all into funds
47. Stop loss
After obtaining a certain profit, sell the Bitcoin held to keep the profit
48. Stop loss
After losses reach a certain level, sell the Bitcoins you hold to prevent further losses
49. Bull market
Prices continue to rise and the outlook is optimistic
50. Bear market
The price continues to fall, and the outlook is bleak
51. Long (long)
The buyer believes that the currency price will rise in the future, buys the currency, and waits for the currency price After rising, sell at a high price to take profits
52. Short position (short selling)
The seller believes that the currency price will fall in the future, and sells the currency he holds (or borrows it from the trading platform) (coin) sell, wait for the price of the currency to fall, buy at a low price to take profits
53. Open a position
Buy virtual currencies such as Bitcoin
54 . Cover the position
Buy Bitcoin and other virtual currencies in batches, for example: buy 1 BTC first, and then buy 1 BTC later
55. Full position
All funds are purchased at one time to buy a certain virtual currency
56. Rebound
When the currency price falls, the price rebounds and adjusts because it falls too fast
57 .Consolidation (sideways)
The price fluctuation range is relatively largeSmall, the currency price is stable
58. Overcast
The currency price declines slowly
59. Diving (waterfall)
The currency price is rapid The decline was very large
60. Cutting meat
After buying Bitcoin, the price of the currency fell. In order to avoid the expansion of losses, Bitcoin was sold at a loss. Or after borrowing the currency to go short, the currency price rises, and you buy Bitcoin at a loss
61. Hold on
Expect the currency price to rise, but unexpectedly the currency price falls after buying; or expect the currency price fell, but unexpectedly, after selling, the currency price rose
62. Unwinding
After buying Bitcoin, the currency price fell, causing a temporary book loss, but then the currency price rebounded and the loss was reversed To make a profit
63. Go short
After selling Bitcoin because of the bearish market outlook, the price of the currency continued to rise, and I was unable to buy it in time, so I failed to make a profit
64. Overbought
The currency price continues to rise to a certain height, the buyer's power is basically exhausted, and the currency price is about to fall
65. Oversold
The currency price continues to fall to a certain low, the seller's power has basically been exhausted, and the currency price is about to rise
66. Lure bulls
The currency price has been consolidating for a long time, and it is more likely to fall. Most of the short sellers have sold Bitcoin, and suddenly the short sellers pulled up the price of the currency, inducing the long parties to think that the price of the currency will rise and buy one after another. As a result, the short sellers suppressed the price of the currency, causing the long parties to get stuck
67. Lure shorts
After buying Bitcoin, bulls deliberately suppress the price of the currency, making short sellers think that the price of the currency will fall and sell them one after another. As a result, they fall into the trap of bulls
68. What is NFT
The full name of NFT is "Non-Fungible Tokens", which is a non-fungible token. Simply put, it is an indivisible token on the blockchain. Copyright certificate is mainly used to confirm and transfer the rights of digital assets. The difference from digital currency is that it is unique and indivisible. In essence, it is a unique digital asset.
69. What is the Metaverse
The Metaverse is a collection of virtual time and space, consisting of a series of augmented reality (AR), virtual reality (VR) and the Internet (Internet) Composed of digital currency, which carries the function of value transfer in this world.
70. What is DeFi
DeFi, the full name is Decentralized Finance, which is "decentralized finance"."Finance" or "distributed finance". "Decentralized finance", as opposed to traditional centralized finance, refers to various financial field applications established in open decentralized networks, with the goal of establishing a multi-level financial system , based on blockchain technology and cryptocurrency, to recreate and improve the existing financial system
71. Who is Satoshi Nakamoto?
72. Bitcoin and Q Coin Different
Bitcoin is a decentralized digital asset with no issuing entity. Q Coin is an electronic currency issued by Tencent. It is similar to electronic points, but it is not actually a currency. Q Coin needs a center As a professional issuing institution, Q Coin can only be recognized and used because of Tencent's credit endorsement. The scope of use is also limited to Tencent's games and services. The value of Q Coin is entirely based on people's trust in Tencent.
< p> Bitcoin is not issued through a centralized organization, but it is widely recognized around the world because Bitcoin can self-certify its credibility. The issuance and circulation of Bitcoin are jointly accounted for by miners across the entire network, and no central organization is needed. Ensure that no one can tamper with the ledger.73. What is a mining machine?
Taking Bitcoin as an example, Bitcoin mining machines compete for accounting rights by running a large number of calculations. The professional equipment for new Bitcoin rewards is generally composed of mining chips, heat sinks and fans. It only executes a single calculation program and consumes a lot of power. Mining is actually a competition between miners for computing power. Those with more computing power Miners have a greater chance of mining Bitcoin. As the computing power of the entire network increases, it becomes more and more difficult to mine Bitcoin with traditional equipment (CPU, GPU). People have developed chips specifically for mining. The chip is The core part of the mining machine. The operation of the chip will generate a lot of heat. In order to dissipate heat, Bitcoin mining machines are generally equipped with heat sinks and fans. Users download Bitcoin mining software on their computers and use the software to distribute each After completing the tasks of the mining machine, you can start mining. Each currency has a different algorithm and requires different mining machines.
74. What is quantitative trading?
Quantitative trading, sometimes also called automated trading, refers to the use of advanced mathematical models to replace human subjective judgments, which greatly reduces the impact of investor sentiment fluctuations and avoids making irrational decisions when the market is extremely fanatical or pessimistic. Investment decision-making. There are many types of quantitative trading, including cross-platform trading, trend trading, hedging, etc. Cross-platform trading means that when the price difference between different target platforms reaches a certain amount, sell on the platform with a higher price and sell on the platform with a lower price. Buy.
75. Blockchain asset over-the-counter trading
Over-the-counter trading is also called OTC trading. Users need to find their own counterparties and do not complete transactions through matching. The transaction price is determined by the transaction After negotiation and determination by both parties, the parties to the transaction can fully communicate through face-to-face negotiation or telephone communication.
76. What is a timestamp?
The blockchain ensures that each block is connected sequentially through timestamps. Timestamps enable every piece of data on the blockchain to have a time stamp. Simply put, timestamps prove when something happened on the blockchain and cannot be tampered with by anyone.
77. What is a blockchain fork?
Upgrading software in a centralized system is very simple, just click "Upgrade" in the app store. However, in decentralized systems such as blockchain, "upgrading" is not that simple, and a disagreement may even cause a blockchain fork. Simply put, a fork refers to a disagreement when the blockchain is "upgraded", resulting in a fork in the blockchain. Because there is no centralized organization, every code upgrade of digital assets such as Bitcoin needs to be unanimously recognized by the Bitcoin community. If the Bitcoin community cannot reach an agreement, the blockchain is likely to form a fork.
78. Soft fork and hard fork
Hard fork means that when the Bitcoin code changes, the old nodes refuse to accept the blocks created by the new nodes. Blocks that do not comply with the original rules will be ignored, and miners will follow the original rules and create new blocks after the last block they verified. A soft fork means that old nodes are not aware of the changes to the Bitcoin code and continue to accept blocks created by new nodes. Miners may work on blocks they have no understanding of, or validation of. Both soft forks and hard forks are "backwards compatible" to ensure that new nodes can verify the blockchain from scratch. Backward compatibility means that new software accepts data or code generated by old software. For example, Windows 10 can run Windows XP applications. Soft forks can also be "forward compatible".
79. Classification and application of blockchain projects
Judging from the current mainstream blockchain projects, blockchain projects mainly fall into four categories: Category 1: Currency; The second category: platform category; the third category: application category; the fourth category: asset tokenization.
80. USDT against the US dollar
USDT is Tether USD, a token launched by Tether that is against the US dollar (USD). 1USDT=1 US dollar, users can use USDT and USD for 1:1 exchange at any time. Tether implements a 1:1 reserve guarantee system, that is, each USDT token will have a reserve guarantee of 1 US dollar, which supports the stability of the USDT price. The unit price of a certain digital asset is USDT, which is equivalent to its unit price in US dollars (USD).
81. Altcoins and alternative coins
Altcoins refer to blockchain assets that use the Bitcoin code as a template and make some modifications to its underlying technology blockchain, among which There are technical innovations or improvementsAlso known as altcoins. Because the Bitcoin code is open source, the cost of plagiarism in Bitcoin is very low. You can even generate a brand new blockchain by simply copying the Bitcoin code and modifying some parameters.
82. Three major exchanges
Binance
Okex
Huobi
83. Market software
Mytoken
Non-small account
84. Information website
Babbitt
Golden Finance
Coin World News
85. Blockchain Browser
BTC
ETH
BCH
< p> LTCETC
86. Wallet
Imtoken
Bitpie
MetaMask (Little Fox)
87. Decentralized exchange
uniswap
88. NFT exchange
< p> OpenseaSuper Rare
89. Ladder
Bring your own, buy a reliable ladder
90. Platform currency
Digital currency issued by the platform, used to deduct handling fees, transactions, etc.
91. Bull market, bear market
Bull market: rising market
Bear market : Falling market
92. Blockchain 1.0
A currency trading system based on distributed ledgers, represented by Bitcoin
93. Blockchain 2.0 < /p>
The contract blockchain technology represented by Ethereum (smart contract) is 2.0
94. Blockchain 3.0
The era of intelligent Internet of Things, beyond the financial field , providing decentralized solutions for various industries
95. Smart Contract
Smart Contract is a contract designed to spread, verify or execute in an information-based manner computer protocol, to put it simply, an electronic contract is set in advance. Once both parties confirm it, the contract will automaticallyExecute automatically.
96. What is a token?
The token economy is an economic system with Token as the only reference standard, which is equivalent to a pass. If you own Token, you have rights and interests, and you have the right to speak.
97. The difference between big data and blockchain
Big data is the means of production, AI is the new productivity, and blockchain It is a new production relationship. Big data refers to a collection of data that cannot be captured, managed and processed within a certain time range using conventional software tools. It is a massive, high-growth and high-volume data set that requires new processing models to have stronger decision-making power, insight discovery and process optimization capabilities. Diverse information assets. Simply understood, big data is massive data accumulated over a long period of time and cannot be obtained in the short term. Blockchain can be used as a way to obtain big data, but it cannot replace big data. Big data is only used as a medium running in the blockchain and has no absolute technical performance, so the two cannot be confused. (A simple understanding of production relations is labor exchange and consumption relations. The core lies in productivity, and the core of productivity lies in production tools)
98. What is ICO?
ICO, Initial Coin Offering, is the initial public offering of tokens, which is crowdfunding in the blockchain digital currency industry. It is the most popular topic and investment trend in 2017, and the country launched a regulatory plan on September 4. Speaking of ICO, people will think of IPO, and the two are fundamentally different.
99. Five characteristics of digital currency
The first characteristic: decentralization
The second characteristic: having open source code
The third feature: independent electronic wallet
The fourth feature: constant issuance
The fifth feature: global circulation
100. What is decentralization?
It has no issuer, does not belong to any institution or country, and is a publicly issued currency designed, developed and stored on the Internet by Internet network experts.
101. What is measurement (scarcity)?
Once the total amount of issuance is set, it is permanently fixed, cannot be changed, cannot be over-issued at will, and is subject to global Internet supervision. Because the difficulty of mining and mining changes over time, the longer the time, the greater the difficulty of mining, and the fewer coins are mined, so it is scarce.
102. What is open source code?
The alphanumeric code is stored on the Internet. Anyone can find out the source code of its design, everyone can participate, can mine it, and it is open to the world.
103. What is anonymous transaction? Private wallet private?
Everyone can register and download the wallet online without real-name authentication. It is completely composed of encrypted digital codes. It can be sent and traded globally in real-time point-to-point without resorting to banks or any institutions. It cannot be traced by anyone without my authorization. ,Inquire.
104. What is a contract transaction?
Contract trading refers to an agreement between buyers and sellers to receive a certain amount of an asset at a specified price at a certain time in the future. The objects of contract trading are standardized contracts formulated by the exchange. The exchange stipulates standardized information such as commodity type, transaction time, quantity, etc. A contract represents the rights and obligations of the buyer and seller.
105. Digital Currency Industry Chain
Chip manufacturers, mining machine manufacturers, and mining machine agents mine and export to exchanges for retail investors to speculate in coins< /p>
106. Who is Bei Feng?
Beifeng: Digital currency value investor
Investment style: Steady
Establish a community: Beidou Community (high-quality price investment community)
< p>107. Beidou Investment Strategy
Combining long-term and short-term, focusing on price investment, no touching contracts, no short-term play
Reasonable layout, Scientific operation, prudent and conservative, earn periodic money
108. Beifeng?
Welcome currency friends and seek common development
④ What is the data layer in blockchain technology used for?
Chongqing Jinwowo Network Analysis Data Layer The functions are as follows:
The lowest level technology of the data layer is the foundation of everything. It mainly implements two functions, one is the storage of relevant data, and the other is the realization and security of accounts and transactions.
⑤ What structures does the blockchain consist of?
The blockchain is a chain storage structure formed by interconnecting blocks. The blocks are the data elements in the chain storage structure. The first block is called the genesis block.
General blocks include block header and block body. The block header contains the identification information of each block, such as version number, hash value, timestamp, block height and other information; the block body mainly contains specific transaction data.
⑥ What is the six-layer model of the blockchain?
The blockchain has a total of six hierarchical structures. These six hierarchical structures from bottom to top are:Data layer, network layer, consensus layer, incentive layer, contract layer, and application layer.
1. Data Layer
The data layer is the bottom layer of the six-level structure of the blockchain. We can understand the data layer as a database, but for blockchain, this database is an immutable and distributed database, which is what we call a "distributed ledger".
On the data layer, that is, on this "distributed ledger", the data information on the blockchain is stored, encapsulating the blockchain structure of the block, asymmetric encryption technology, hash algorithm and other technologies Means to ensure the security of data when it is disclosed to the entire network. The specific approach is:
On the blockchain network, nodes use consensus algorithms to maintain the consistency of data in the data layer (that is, this distributed database), using asymmetric encryption and hash algorithms in cryptography. , to ensure that this distributed database cannot be tampered with and is traceable.
This constitutes the lowest level data structure in blockchain technology. However, it is not enough to have a distributed database. The data information in the database also needs to be shared and exchanged. Next, we introduce the upper layer of the data layer - the network layer.
2. Network layer
The network system of the blockchain is essentially a P2P (point-to-point) network. Point-to-point means that there is no need for an intermediate link or centralized server to control the system. Everything in the network Resources and services are allocated to each node, and information can be transmitted directly between the two nodes. However, it should be noted that P2P
(peer-to-peer) was not invented by Satoshi Nakamoto. Blockchain just incorporates this technology.
So, the network layer of the blockchain is actually a particularly powerful peer-to-peer network system. In this system, each node can both produce and receive information, just like sending emails. You can write your own emails or receive emails sent to you by others.
On the blockchain network, nodes need to jointly maintain the blockchain system. Whenever a node creates a new block, it needs to notify other nodes in the form of broadcast, and other nodes receive After receiving the information, the block is verified, and then a new block is created based on the block. In this way, the entire network can jointly maintain and update the general ledger of the blockchain system.
However, what rules should the entire network follow to maintain and update the general ledger of the blockchain system? This involves the so-called "laws and regulations" (rules), which is what we will introduce next: the consensus layer.
3. Consensus Layer
In the world of blockchain, consensus, simply put, means that the entire network must maintain and update the general ledger of the blockchain system according to a unified and agreed-upon rule. Similar to the rules for updating data. Allowing highly dispersed nodes to efficiently reach consensus in a decentralized blockchain network is one of the core technologies of the blockchain and is also the governance mechanism of the blockchain community.
Currently mainstreamConsensus mechanism algorithms include: Bitcoin's Proof of Work (POW), Ethereum's Proof of Stake
(POS), EOS's Delegated Proof of Stake (DPOS), etc.
We have now introduced the data layer, network layer, and consensus layer. These three layers ensure that there is data and network on the blockchain, and there are rules for updating data on the network. However, there is no free lunch in the world. How to make it happen? Nodes can actively participate in the maintenance of the blockchain system. This involves incentives, which is what we will introduce below: the incentive layer.
4. Incentive layer
The incentive layer is the so-called mining mechanism. The mining mechanism can actually be understood as an incentive mechanism: how much you contribute to the blockchain system, you can get as many rewards as you want. Using this incentive mechanism, nodes across the entire network can be encouraged to participate in data recording and maintenance on the blockchain.
The mining mechanism and the consensus mechanism are actually the same. The consensus mechanism can be understood as the company's general rules and regulations, and the mining mechanism can be understood as, within this general rules and regulations, what you have done can What kind of reward you get, this kind of reward rules.
Just like Bitcoin’s consensus mechanism PoW, its stipulation is that the more work you do, the more you gain. Whoever can find the correct hash value first can get a certain amount of Bitcoin rewards;
And Ethereum PoS stipulates that the longer who holds the currency, the greater the probability of receiving rewards.
It should be noted that the incentive layer is generally only available in public chains, because public chains must rely on nodes across the entire network to jointly maintain data, so there must be such an incentive mechanism to encourage nodes throughout the network to participate in the blockchain system. Construction and maintenance to ensure the security and reliability of the blockchain system.
The blockchain is safe and reliable, but it is not smart enough, right? The contract layer we will introduce below can make the blockchain system more intelligent.
5. Contract Layer
The contract layer mainly includes various scripts, codes, algorithm mechanisms and smart contracts, and is the basis for blockchain programmability. The "smart contract" we are talking about belongs to the contract layer.
If the Bitcoin system is not smart enough, then the "smart contracts" proposed by Ethereum can meet many application scenarios. The principle of the contract layer is mainly to embed code into the blockchain system and use this method to implement customizable smart contracts. In this way, on the blockchain system, once the terms of the smart contract are triggered, the system can automatically execute the order.
6. Application Layer
The last is the application layer. The application layer is very simple. As the name suggests, it is the various application scenarios and cases of blockchain. The "blockchain+" we are talking about now is the so-called application layer. The blockchain applications that have been implemented so far are mainly various blockchain applications built on public chains such as ETH and EOS. There are many gambling and game applications, and truly practical applications have not yet appeared.
⑦ What does the architectural model of blockchain technology include?
GoldWowo analyzes the architectural model of blockchain technology as follows:
1. Data layer
The data layer encapsulates the underlying data blocks and related data encryption and timestamp technologies;
2 , Network layer
The network layer includes distributed networking mechanisms, data dissemination mechanisms and data verification mechanisms;
3. Consensus layer
The consensus layer mainly encapsulates various consensus algorithms of network nodes;
4. Incentive layer
The incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives;
5. Contract layer
The contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the basis for the programmable features of the blockchain;
6. Application layer
The application layer encapsulates various application scenarios and applications of the blockchain case.
⑧ What does the blockchain system consist of
Generally speaking, the blockchain system consists of a data layer, a network layer, a consensus layer, an incentive layer, a contract layer and an application layer. composition.
Among them, the data layer encapsulates the underlying data blocks and related data encryption and timestamp technologies; the network layer includes distributed networking mechanisms, data dissemination mechanisms, and data verification mechanisms; the consensus layer mainly encapsulates network nodes Various consensus algorithms; the incentive layer integrates economic factors into the blockchain technology system, mainly including the issuance mechanism and distribution mechanism of economic incentives; the contract layer mainly encapsulates various scripts, algorithms and smart contracts, and is the core of the blockchain The basis of programmable features; the application layer encapsulates various application scenarios and cases of the blockchain. In this model, the chain block structure based on timestamps, the consensus mechanism of distributed nodes, economic incentives based on consensus computing power, and flexible programmable smart contracts are the most representative innovations of blockchain technology.
⑨ What are the core blockchain technologies of blockchain technology?
What is the hottest Internet topic at the moment? You don’t need to explain it to the editor to know that it is the blockchain. Blockchain technology, but many friends have only heard of this technology and do not have much in-depth understanding of it. So what are the blockchain technologies? Below we will bring you an introduction to the core technology of blockchain for your reference.
What are the core elements of blockchain technology?
Blockchain technology can be a public ledger (visible by anyone) or a permissioned network (visible only by those authorized), which solves supply chain challenges , because it is an immutable record that is shared among network participants and updated in real time.
Blockchain technology----data layer: designing the data structure of the ledger
Core technology 1. Block + chain:
Technically speaking, block is a data structure that records transactions. Reflects the flow of funds for a transaction. The blocks of transactions that have been reached in the system are connected together to form a main chain, and all nodes participating in the calculation record the main chain or part of the main chain.
Each block consists of districtsIt consists of a block header and a block body. The block body is only responsible for recording all transaction information in the previous period, mainly including the number of transactions and transaction details; the block header encapsulates the current version number, previous block address, and timestamp (record The time when the block was generated (accurate to the second), the random number (the value that records the answer to the math question related to the block), the target hash value of the current block, the root value of the Merkle number and other information. From a structural point of view, most functions of the blockchain are implemented by the block header.
Core technology 2. Hash function:
The hash function can convert data of any length into a set of fixed-length codes through the Hash algorithm. The principle is based on a cryptographic one-way hash function. This kind of function is easy to verify, but difficult to crack. Usually, the industry uses y=hash(x) to represent it. This hash function implements operations on x to calculate a hash value y.
Commonly used hash algorithms include MD5, SHA-1, SHA-256, SHA-384 and SHA-512, etc. Taking the SHA256 algorithm as an example, inputting any string of data into SHA256 will result in a 256-bit Hash value (hash value). Its characteristics: the same data input will get the same result. As long as the input data changes slightly (for example, a 1 becomes a 0), a completely different result will be obtained, and the result cannot be predicted in advance. Forward calculation (calculating the corresponding Hash value from the data) is very easy. Reverse calculation (cracking) is extremely difficult and is considered impossible under current technological conditions.
Core technology 3. Merkle tree:
Merkle tree is a hash binary tree, which can be used to quickly verify the integrity of large-scale data. In the blockchain network, the Merkle tree is used to summarize all transaction information in a block, and ultimately generates a unified hash value of all transaction information in the block. Any change in transaction information in the block will cause Merkle tree changes.
Core technology 4. Asymmetric encryption algorithm:
Asymmetric encryption algorithm is a key secret method that requires two keys: public key and private key. The public key and the private key are a pair. If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it, thereby obtaining the corresponding data value; if the private key is used to sign the data, then only the corresponding public key can be used to sign the data. In order to verify the signature, the sender of the verification information is the holder of the private key.
Because encryption and decryption use two different keys, this algorithm is called an asymmetric encryption algorithm, while symmetric encryption uses the same key in the encryption and decryption processes.
Blockchain technology----network layer: realize the decentralization of accounting nodes
Core technology 5. P2P network:
P2P network (peer-to-peer network), also known as point-to-point technology, is no Central server, Internet system that relies on user groups to exchange information. Unlike a centralized network system with a central server, each client in a peer-to-peer network is both a node and a server.. Domestic Xunlei software uses P2P technology. The P2P network has the characteristics of decentralization and robustness.
Blockchain technology----Consensus layer: allocate the task load of accounting nodes
Core technology 6. Consensus mechanism:
Consensus mechanism is how to reach consensus among all accounting nodes to identify The validity of a record is both a means of identification and a means of preventing tampering. There are currently four main types of consensus mechanisms: PoW, PoS, DPoS and distributed consensus algorithms.
PoW (Proof of Work, proof of work): PoW mechanism, which is like Bitcoin’s mining mechanism, miners package existing transactions that have not been recorded by the network into a block, and then continue to traverse and try to find a random number , so that the hash value of the new block plus the random number meets certain difficulty conditions. Finding a random number that meets the conditions is equivalent to determining the latest block of the blockchain, and is also equivalent to obtaining the current round of accounting rights of the blockchain. Miners broadcast blocks that meet the mining difficulty conditions in the Yuanfu network. After verifying that the block meets the mining difficulty conditions and that the transaction data in the block meets the protocol specifications, other nodes in the entire network will each Blocks are linked to their own version of the blockchain, thereby forming a network-wide consensus on the current network state.
PoS (ProofofStake, Proof of Stake): PoS mechanism requires nodes to provide proof of a certain number of tokens to obtain a distributed consensus mechanism for competing for blockchain accounting rights. If you rely solely on the token balance to determine the bookkeeper, you will inevitably make the rich win, which will lead to the centralization of bookkeeping rights and reduce the fairness of the consensus. Therefore, different PoS mechanisms use different methods to increase the amount of money based on the proof of equity. The randomness of accounting rights avoids centralization. For example, in the PeerCoin PoS mechanism, the Bitcoin with the longest chain age has a greater chance of obtaining accounting rights. NXT and Blackcoin use a formula to predict the next accounting node. The more tokens you own, the greater the probability of being selected as an accounting node. In the future, Ethereum will also switch from the current PoW mechanism to a PoS mechanism. Judging from the information currently available, Ethereum's PoS mechanism will use nodes to place bets on the next block. The winner of the bet will receive an additional Ethereum currency award. Those who do not win will be deducted Ether coins to reach consensus on the next block.
DPoS (DelegatedProof-Of-Stake, share authorization certificate): DPoS is easy to understand and is similar to the modern corporate board of directors system. The DPoS mechanism adopted by BitShares is that shareholders vote to select a certain number of witnesses. Each witness has two seconds of authority to generate blocks in order. If the witness cannot generate a block within the given time slice, The block generation authority is given to the witness corresponding to the next time slice. Shareholders can replace these witnesses at any time by voting. This design of DPoS makes the generation of blocks faster and more energy-saving.
Distributed Consensus Algorithm: DistributionThe consensus algorithm is based on traditional distributed consistency technology. Among them are Byzantine fault-tolerant algorithms that solve the Byzantine Generals problem, such as PBFT (Byzantine fault-tolerant algorithm). In addition, distributed consensus algorithms (Pasox, Raft) that solve non-Byzantine problems are not explained in this article. This type of algorithm is currently a commonly used consensus mechanism in alliance chain and private chain scenarios.
Taken together, POW is suitable for public chains. If you build a private chain, it is more suitable to use POS because there is no trust problem in verification nodes; and because there are untrustworthy local nodes in the alliance chain, it is more suitable to use DPOS.
Blockchain technology----Incentive layer: Develop a "salary system" for accounting nodes
Core technology 7. Issuance mechanism and incentive mechanism:
Take Bitcoin as an example. Bitcoins are initially rewarded by the system to miners who create new blocks, and this reward is halved approximately every four years. At the beginning, miners were rewarded with 50 Bitcoins for each new block recorded, and this reward is halved approximately every four years. By analogy, by around AD 2140, newly created blocks will no longer receive rewards from the system. By then, the total number of Bitcoins will be approximately 21 million. This is the total number of Bitcoins, so it will not increase indefinitely.
Another source of incentives is transaction fees. When there are no system rewards for newly created blocks, the miners' income will change from system rewards to transaction fees. For example, when you transfer, you can specify 1% of it as a handling fee to be paid to the miner who records the block. If the output value of a transaction is less than the input value, the difference is the transaction fee, which will be added to the incentive for that block. As long as a given amount of electronic currency has entered circulation, the incentive mechanism can gradually be converted to rely entirely on transaction fees, so there is no need to issue new currency.
Blockchain technology----contract layer: giving the ledger programmable features
Core technology 8. Smart contract:
Smart contract is a set of programmed rules and logic that respond to scenarios. Implemented by decentralized, trusted shared script code deployed on the blockchain. Normally, after the smart contract is signed by all parties, it is attached to the blockchain data in the form of program code, and is recorded in a specific block of the blockchain after being propagated through the P2P network and verified by nodes. Smart contracts encapsulate a number of predefined states and transition rules, scenarios that trigger contract execution, response actions under specific scenarios, etc. The blockchain can monitor the status of smart contracts in real time, and activate and execute the contract by checking external data sources and confirming that specific trigger conditions are met.
The above is what blockchain technologies the editor has brought to you? All content introduced to the core technology of blockchain.