为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

区块链技术与互联网技术的区别,区块链技术与互联网技术的关系

发布时间:2023-12-22-09:33:00 来源:网络 区块链知识 区块   互联网技术   技术

区块链技术与互联网技术的区别,区块链技术与互联网技术的关系

近年来,随着互联网技术的飞速发展,区块链技术也逐渐被大家所熟知。那么,区块链技术与互联网技术有着怎样的关系呢?今天,小编就来为大家介绍一下区块链技术与互联网技术的关系,以及它们之间的区别。

1. 区块链技术

区块链技术是一种新型的分布式数据库技术,它是基于密码学原理和分布式计算技术的创新应用,可以实现数据的安全存储和安全传输,具有去中心化、不可篡改、全程可追溯等特点,是一种全新的信息存储和传输技术。

2. 互联网技术

互联网技术是一种基于计算机网络技术的应用技术,它可以将世界各地的计算机网络连接起来,使得用户可以自由地在全球范围内进行信息的共享和传输。它不仅可以让用户在网络上获取信息,还可以让用户进行信息的交流和共享。

3. 区块链技术与互联网技术的关系

区块链技术和互联网技术之间存在着密切的联系。互联网技术为区块链技术提供了良好的应用环境,可以让区块链技术快速发展,并得到更广泛的应用。而区块链技术也可以为互联网技术提供更安全、可靠的信息存储和传输机制,从而让互联网技术更好地发挥其作用。

总之,区块链技术与互联网技术之间存在着相互促进、互相补充的关系,它们将在未来发挥更大的作用,为我们的生活提供更多的便利。


请查看相关英文文档

A. Is blockchain useful? What impact and prospects does blockchain have?


I believe everyone is no longer unfamiliar with the emerging technology of blockchain, because This is the most popular topic at the moment. Many big names in different industries are analyzing its role and prospects. Today we also do some research on blockchain. Is the blockchain useful? and blockchain I hope this analysis of the impact and prospects can help everyone.
Is blockchain useful?
1. Banking: As a digital, secure and interference-proof account, blockchain realizes the core function of the banking industry: a safe storage and transfer center of value. In other words, in the next few years, a wave of companies based on blockchain technology may affect the banking industry.
2. Payment and transfer: Blockchain technology can avoid complicated systems and create a more direct payment process between the payer and the payee. Whether it is a domestic transfer or a cross-border transfer, this method has its advantages. Low price, fast, and no intermediate handling fees.
3. Network security: Although the blockchain system is public, its verification, sending and other data exchange processes use advanced encryption technology. This technology not only ensures the correct source of data, but also ensures that the data is not intercepted during the process. If blockchain technology is more widely used, the probability of being attacked by hackers may also decrease, so people think that blockchain systems are more stable than traditional systems. One of the reasons why blockchain systems can reduce traditional network security risks is that they eliminate the need for middlemen.
4. Election: Everyone's vote "can never be modified or deleted by us - programmers, school administrators or students."
5. Smart contract: Smart contracts are actually on another object. A computer program that functions on the go. Like ordinary computer programs, smart contracts are also an "if-then" function, but blockchain technology enables the automatic filling of these "contracts" without manual intervention. Such contracts may eventually replace the legal merger industry's core business of drafting and managing contracts in both commercial and civil areas.
6. Stock trading: For many years, companies have been trying to simplify the process of buying, selling and trading stocks. Emerging blockchain technology startups believe they can go beyond the past, automating the entire process, improving security and efficiency.
What impact and prospects does blockchain have?
1. The dual impact of bringing wealth and risk:
The difference between blockchain technology and traditional Internet technology is that it chooses the high-risk financial industry as the entry point, but the financial field is full of Areas with many obstacles. Such direct entry has a dual impact: on the one hand, it can bring wealth effects to entrepreneurs relatively quickly; on the other hand, various risks will also come directly and violently.
2. Improve efficiency and reduce costs:
For physical finance, blockchain can maintain the fidelity in the process of transmitting information, such as personal credit information and other data, thus avoiding many transaction costs.This is the positive significance it brings to improve efficiency on a large scale.
3. Control financial risks early and small:
Blockchain is cooperating with the innovation of digital currency, preventing over-insurance in the insurance industry, over-lending in bank mutual funds loans, and the integration of supply chain finance. , promote electronic identity recognition, etc., applicable to many industries and fields. In terms of financial security, many companies have also cooperated with regulatory authorities to build regulatory technology systems to help regulatory authorities monitor and provide early warning for the risks of Internet financial companies, so as to control financial risks early and at an early stage.
4. The owner of the data should be the user himself:
Blockchain is a technology worthy of attention, and it has relevant layouts in its own business and investment. Bitcoin and other electronic currencies are applications based on blockchain technology. They have certain currency functions and have certain use value. However, the main problem now is that the gap between the use value and the transaction price is too big. . ICO is a financing business model.
5. The darkest stage contains the most opportunities:
The darkest stage often contains the most opportunities. The application of blockchain is far more than just monetary and financial. For example, big data can be applied to the entire medical industry in the future. health field. If medical records and diagnosis data are shared to all different medical systems through the big data blockchain, the efficiency of treating diseases and saving lives can be greatly improved.
The editor believes that the correct development prospect of blockchain is to "talk less about financial innovation, focus more on financial security, focus more on inclusive finance, and do more on medical care, health, and environmental protection."
The above is the blockchain brought to you by the editor. Is it useful? What impact and prospects does blockchain have? all content.

B. One article to understand the Internet blockchain

One article to understand the Internet blockchain

One article to understand the Internet blockchain, you need to understand the blockchain , we have to study the brief history of blockchain technology development starting from the birth of the Internet, discover the motivations for the emergence of blockchain, and infer the future of blockchain. Let’s understand the Internet blockchain in one article.

Understand the Internet blockchain in one article 1

The originator of blockchain is mahjong, and the earliest blockchain was invented by the Chinese! The blockchain is just like Mahjong, except that Mahjong has fewer blocks. Mahjong only has 136 blocks. The rules of Mahjong vary from place to place and can be regarded as a hard fork of Bitcoin.

As the oldest blockchain project, Mahjong has a team of four miners. The first one to dig out the 13 correct hash values ​​will get the accounting rights and rewards. It adopts the method of being willing to admit defeat and not cheating. Thousands of consensus mechanisms!

Mahjong is decentralized, everyone can be the banker, and it is completely peer-to-peer.

Mining pool = commission from the boss of the chess and card room.

It cannot be tampered with, because convincing the other three people requires too much computing power and physical strength.

A typical value Internet. The value in my pocket didn't take eight turns to run to himWent into their pockets.

The Chinese are basically good at playing mahjong. In terms of blockchain, they produce 70% to 80% of the world’s mining machines and have the most computing power in the world, accounting for about 77% of the computing power.

Mahjong is actually the earliest blockchain project:

1. A group of four miners. The miner who first collides with the correct hash value of 13 numbers can obtain the accounting rights. and get rewarded.

2. It cannot be tampered with. Because convincing the other three people requires too much computing power and physical strength.

3. Typical value Internet. The valuable digital currency www.gendan5.com/digitalcurrency/btc.html in my pocket ran into their pockets after eight rounds.

4. Decentralization, everyone can be a banker, it is completely peer-to-peer.

5. UTXO, unspent transaction expenses.

There is another blockchain method of credit, assuming that everyone has no cash

Let’s take a closer look. When everyone reaches a consensus, we see There is no intermediary or third party to judge whether C wins, and the rewards given to C do not need to be transferred to C through a third party. They are all direct peer-to-peer transactions. This process is decentralized, and players (miners) record their own records. After recording the results of the first game, B Dahu drew thirteen pieces, and B got Jia Dongfeng. After the record was completed, a complete block was generated, but remember, this was only the first game. In the entire blockchain , this is just one node. After the 8 rounds mentioned at the beginning, there are 8 nodes (blocks). The 8 blocks are connected together to form a complete ledger, which is the blockchain. Because everyone has one of this ledger, it is a distributed ledger. The purpose is to prevent someone from tampering with the record. At the end of the game, it is clear who wins and who loses.

Four men (A, B, C, and D) got together to play mahjong for money. None of them brought any cash, so they asked a beautiful woman (centralized) to keep a book and record who won how much money in each round. , Who lost how much? At the end of the day, everyone uses Alipay or WeChat to pay and settle the ledger. However, if this beauty made a mistake in accounting or was bribed by one of the four people in advance to make a mistake on purpose, there is no guarantee that the outcome of this game will be fair, just, and reasonable. ,dont you agree? then what should we do? If you "play mahjong", you can use "blockchain" as the game rules and adapt it as follows:

Four men (A, B, C and D) got together to play mahjong for money. No one brought any cash. B said Let the beauty she brought keep accounts. A said that none of us knew this beauty, so the four of them, A, B, C, and D, agreed that everyone would keep accounts at the same time (decentralized) on their mobile phones (blockchain nodes) for each game. ), after finally playing mahjong and paying with electronic money directly on the mobile phone, everyone checked the accounting results. The accounting results should have been the same.

Assume that the original result is recorded on A’s mobile phoneAccount: B owes A 10 yuan. However, the record on B's mobile phone shows that there is no debt, but the other two people (C and D) have the same accounting as A, so the settlement is still based on the majority rule. In addition, everyone has a bad impression of B's ​​integrity. Next The first time I play mahjong, I won’t take B to play with me.

Unless B bribes two people (C and D) in advance to deliberately cheat, but the cost of B bribes them is 100,000 yuan (10,000 times the default of 10 yuan), then in common sense, B only You can choose to give up because the cost of counterfeiting is too high.

Assume that even if B is secretly willing to pay a high price of 100,000 yuan to buy C and D to do this silly cat transaction with huge losses during the card game, the rules of the blockchain are to keep accounts based on timestamps. Yes, it turns out that B owed A 10 yuan when debiting the account at 1 p.m., that is, when C and D changed the account at 3 p.m., time is irreversible and they can only record 3 p.m., which does not comply with the rules of the game. .

In fact, in 2017 the blogger has developed a set of Mahjong coins

China’s earliest blockchain project: a group of four miners, first starting from 148 random numbers The miner who collides with the correct hash value of 14 numbers can obtain an accounting right incentive. Since distributed accounting requires the consensus of several other miners, each accounting transaction takes about ten minutes.

Understanding the Internet Blockchain in One Article 2

1. Before the birth of Bitcoin, 5 Internet technologies that will have a significant impact on the future of the blockchain

In 1969, the Internet was born in the United States. Since then, the Internet has expanded from four research institutions in the United States to the entire planet. In terms of application, it has expanded from the earliest military and scientific research to all aspects of human life. In the nearly 50 years since the birth of the Internet, five technologies have been of particularly great significance to the future development of blockchain.

1. The TCP/IP protocol born in 1974: determines the position of blockchain in the Internet technology ecosystem

In 1974, the most critical step in the development of the Internet was taken by The TCP/IP protocol, the core communication technology of the Internet jointly developed by American scientists Vinton Cerf and Robert Kahn, was officially launched.

This protocol enables the transmission of information between different computers and even different types of networks. All computers connected to the network can communicate and interact as long as they comply with this protocol.

In layman's terms, Internet data can travel tens of thousands of kilometers to reach the computer users who need it. This is mainly because the Internet world has formed a unified information dissemination mechanism. That is to say, Internet devices follow a unified law-TCP/IP protocol when disseminating information.

Understanding the TCP/IP protocol is of great significance to mastering the Internet and blockchain. After the invention of TCP/IP in 1974, the entire Internet was between the underlying hardware devices, the intermediate network protocols and the network Addresses have always been relatively stable, but they are constantly emerging at the top application layer.There are many innovative applications, including news, e-commerce, social networks, QQ, WeChat, and blockchain technology.

In other words, in the technical ecology of the Internet, blockchain is a new technology at the top layer of the Internet - the application layer. Its emergence, operation and development have not affected the underlying infrastructure and communication protocols of the Internet. , is still one of the many software technologies that operates according to the TCP/IP protocol.

2. Cisco router technology born in 1984: an imitation of blockchain technology

In December 1984, Cisco was established in the United States. The founder was a professor from Stanford University. A couple, Leonard Posak, director of the computer center, and Sandy Lerner, director of the business school's computer center, designed a networking device called a "multiprotocol router" that was placed on the Internet's communication lines to help data Get from one end of the Internet to the other thousands of kilometers away accurately and quickly.

In the entire Internet hardware layer, tens of millions of routers are busy working, directing the transmission of Internet information. An important function of Cisco routers is that each router saves a complete Internet device address table. Once something happens Changes will be synchronized to tens of millions of other routers (theoretically), ensuring that each router can calculate the shortest and fastest path.

When you see the operation process of the router, you will feel very familiar. That is the important feature of the blockchain later. The significance of understanding the router lies in the important features of the blockchain. It has been implemented on the router in 1984. For the router, even if the node device is damaged or attacked by hackers, it will not affect the transmission of the entire Internet information.

3. The B/S (C/S) architecture that was born with the World Wide Web: the opponent of the blockchain and the target of attempted subversion

The World Wide Web is referred to as the Web and is divided into Web clients and server. All updated information is only modified on the Web server. Thousands, tens of thousands, or even tens of millions of other client computers do not retain the information and only obtain the information data when accessing the server. This structure is often called the Internet B/S architecture is a centralized architecture. This architecture is also the most important architecture of the current Internet. Internet giants such as Google, Facebook, Tencent, Alibaba, and Amazon have all adopted this architecture.

Understanding the B/S architecture will be of great significance to the subsequent understanding of blockchain technology. The B/S architecture is that data is only stored in the central server, and all other computers obtain information from the server. Blockchain technology has tens of millions of computers without a center, and all data will be synchronized to all computers. This is the core of blockchain technology.

4. Peer-to-Peer Network (P2P): Blockchain The father of the chain and the technical basis

Peer-to-peer network P2P is another Internet infrastructure corresponding to C/S (B/S). It is characterized by multiple computers connected to each other.They are all in a peer-to-peer position, and there is no distinction between master and slave. A computer can be used as a server, set up shared resources for use by other computers in the network, and can also be used as a workstation.

Napster is one of the earliest P2P systems, mainly used for music resource sharing. Napster cannot be regarded as a true peer-to-peer network system. On March 14, 2000, a message was posted on the mailing list of the underground hacker site Slashdot in the United States, saying that AOL's Nullsoft department had released Gnutella, an open source Napster clone software.

In the Gnutella distributed peer-to-peer network model, each networked computer is functionally peer, serving as both a client and a server, so Gnutella is called the first true peer-to-peer network model. Network Architecture.

In the past 20 years, some Internet technology giants such as Microsoft and IBM, as well as liberals, hackers, and even criminals who infringe intellectual property rights, have continued to promote the development of peer-to-peer networks. Of course, those on the Internet want to strengthen information sharing. The idealists also put a lot of enthusiasm into peer-to-peer networks. Blockchain is a software application based on a peer-to-peer network architecture. It is a benchmark application for peer-to-peer networks trying to break out from the silence of the past.

5. Hash algorithm: the key to generating Bitcoin and tokens (tokens)

The hash algorithm converts numbers of any length into fixed-length values ​​using a hash function. Algorithms, famous hash functions such as: MD4, MD5, SHS, etc. It is a member of the family of cryptographic functions defined by the American National Institute of Standards and Technology.

This family of algorithms is crucial to the functioning of the entire world. From Internet application stores, emails, anti-virus software, to browsers, etc., all of them are using secure hashing algorithms. It can determine whether Internet users have downloaded what they want, and it can also determine whether Internet users are involved in man-in-the-middle attacks or network attacks. Victim of a phishing attack.

The process of blockchain and its application to generate new coins from Bitcoin or other virtual currencies is to use the function of the hash algorithm to perform operations to obtain numbers that meet the format requirements, and then the blockchain program gives Bitcoin rewards.

Mining, including Bitcoin and tokens, is actually a small mathematical game built with a hash algorithm. However, because of the fierce competition, people all over the world used powerful servers to perform calculations in order to get the rewards first. As a result, many computers on the Internet participated in this little mathematical game, which even consumed more than 40% of the electricity in some countries.

2. The birth and technical core of blockchain

The birth of blockchain should be the most unusual and mysterious invention and technology in the history of human science, because in addition to blockchain, to So far, there is no major invention in the history of modern science whose inventor cannot be found.

October 31, 2008, thanSatoshi Nakamoto (pseudonym), the founder of Bitcoin, published a paper on the cryptography mailing group - "Bitcoin: A Peer-to-Peer Electronic Cash System". In this paper, the author claims to have invented a new electronic currency system that is not controlled by governments or institutions. Blockchain technology is the basis for supporting the operation of Bitcoin.

The preprint address of the paper is at http://www.bitcoin.org/bitcoin.pdf. From an academic point of view, this paper is far from a qualified paper. The main body of the article is composed of 8 flow charts. It is composed of corresponding explanatory text, no nouns and terms are defined, and the format of the paper is also very irregular.

In January 2009, Satoshi Nakamoto released an application case of blockchain on the SourceForge website - the open source software of the Bitcoin system. After the release of the open source software, it is said that Satoshi Nakamoto mined approximately 1 million bits. Coin. A week later, Satoshi Nakamoto sent 10 Bitcoins to cryptography expert Hal Finney, which became the first transaction in Bitcoin history. With the booming development of Bitcoin, research on blockchain technology has also begun to show explosive growth.

It is indeed difficult to fully and clearly explain the blockchain to the public. We use Bitcoin as the object to introduce the technical characteristics of the blockchain as simply as possible but in depth.

1. Blockchain is a peer-to-peer network (P2P) software application

As we mentioned before, at the beginning of the 21st century, the Internet formed two major types of applications. Architecture, centralized B/S architecture and non-centered peer-to-peer (P2P) architecture. Many Internet giants such as Alibaba, Sina, Amazon, etc. all have centralized B/S architecture. Simply put, it is data Put it in a giant server, and our ordinary users can access the servers of Alibaba, Sina and other websites through mobile phones and personal computers.

Since the beginning of the 21st century, there have been many software applications for freely sharing music, videos, and paper materials. Most of them use a peer-to-peer network (P2P) architecture, that is, there is no central server, everyone's personal computer They are all servers and clients, with equal status. However, this type of application has never become popular. The main reasons are large resource consumption and intellectual copyright issues. Blockchain is a software application in this field.

2. Blockchain is a peer-to-peer network (P2P) software application that synchronizes information across the entire network

Peer-to-peer networks also have many application methods. In many cases, everyone is not required to Each computer keeps the same information. Everyone only stores the information they need, and downloads it to other computers when needed.

However, in order to support Bitcoin financial transactions, the blockchain requires that every transaction that occurs must be written into historical transaction records and change information be sent to all computers with Bitcoin programs installed. Every computer with Bitcoin software installed maintains the latest and complete Bitcoin historical transaction information.

The characteristics of blockchain's network-wide synchronization and network-wide backup are often referred to as blockchain information security, and the source cannot be changed. Although it is still not absolutely safe in practice, when the number of users is very large, it does have certain security advantages in preventing information tampering.

3. Blockchain is a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network

Area The first application of the blockchain was the famous Bitcoin. When discussing Bitcoin, a term that is often mentioned is "mining". So what exactly is mining?

The metaphor is that the blockchain program gives the miners (players) 256 coins, numbered 1, 2, 3...256. Each time a Hash operation is performed, it is like tossing a coin. 256 coins are thrown at the same time. After landing, if all the coins with the first 70 numbers happen to be heads. The miner can tell the blockchain program this number, and the blockchain will reward the miner with 50 Bitcoins.

From the perspective of software programs, Bitcoin mining is a mathematical game built using the hash SHA256 function. The blockchain first stipulates a winning mode in this small game: a 256-bit hash number is given, but the last 70 bits of the hash number are all 0, and then the player (miner) continuously enters various numbers. Give the hash SHA256 function and see if you can use this function to get a number with 70 zeros. If you find one, the blockchain program will reward the player with 50 Bitcoins. Actual mining and rewards are more complex, but the above example expresses the core process of mining and obtaining Bitcoin.

When Bitcoin was born in 2009, each bounty was 50 Bitcoins. Ten minutes after its birth, the first batch of 50 Bitcoins was generated, and the total currency amount at this time was 50. Subsequently, Bitcoin increased at a rate of about 50 every 10 minutes. When the total amount reaches 10.5 million (50% of 21 million), the bounty is halved to 25. When the total amount reaches 15.75 million (new output is 5.25 million, which is 50% of 1050), the bounty is further halved to 12.5. According to the design of the Bitcoin program, the total number of Bitcoins is 21 million.

From the above introduction, Bitcoin can be seen as a guessing game based on a peer-to-peer network architecture. The Bitcoin information rewarded for each correct guess will be transmitted to all players and recorded. into each player's history database.

4. Smart contracts, tokens, ICOs and blockchain basic platforms generated by blockchain technology due to the rise of Bitcoin

From the above introduction, Bitcoin technology It is not a new technology falling from the sky, but a clever combination of various original Internet technologies, such as peer-to-peer network architecture, network-wide synchronization of routing, and network security encryption technology. It can be regarded as a combination of innovative algorithm games. .

Since Bitcoin can be exchanged for legal tender through operation, purchasingIn kind, huge profits can be obtained through appreciation, and the whole world is not calm. With the attitude that if you can do it, I can do it, many people have created their own imitation Bitcoin software applications. At the same time, taking advantage of the difficulty for the government to regulate peer-to-peer networks, various altcoins exploded together with Bitcoin. There have been many incidents of fraud and absconding, which have gradually attracted the attention of governments around the world.

Blockchain basic platform: It is still quite technically difficult to create currency using the blockchain technology framework. At this time, basic technology platforms such as Ethereum, the blockchain basic platform, have emerged, making it convenient for ordinary people. Create a "Bitcoin"-like software program, each showing its magical powers, inviting people to join the game to mine coins, speculate on coins, and gain profits from it.

Pass or token: If each "Bitcoin" or "Altcoin" uses a hash algorithm to create a guessing game and generates its own "currency", this "currency" is collectively referred to as " "Certificate" or "Token".

ICO: Since Bitcoin and Ethereum have been exchanged with the legal currencies of various countries, when other new virtual currencies are issued, only Bitcoin and Ethereum are allowed to purchase the new issued coins. Such a currency issuance process It’s called ICO. The emergence of ICO has amplified the transaction volume of Bitcoin and Ethereum. At the same time, many ICO projects are completely based on nihilistic projects, resulting in a large number of frequent fraud cases. This further deepens society’s negative understanding of virtual currencies generated by blockchain.

Smart contract: It can be seen as a software function on the blockchain. It is a program that assists various virtual currency transactions on the blockchain. The specific function is like the fund custody of Alipay on Taobao. When a user receives goods and confirms them on Alipay, the funds are automatically paid to the buyer and owner. Smart contracts also assume this intermediary payment function in blockchain applications such as Bitcoin.

3. The historical status and future prospects of blockchain technology in the Internet

1. Where does blockchain stand in Internet technology? It is a new software and architecture at the top level.

We mentioned in the previous introduction to TCP/IP that blockchain, like browsers, QQ, WeChat, online game software, mobile APPs, etc., is a software form of the top layer of the Internet - the application layer. . Its operation still relies on the TCP/IP architecture system to transmit data. But unlike most application layer software, it does not adopt the central software architecture of C/S (B/S). Instead, an unusual peer-to-peer network architecture is adopted. From this point of view, blockchain cannot subvert the Internet infrastructure.

2. Who does blockchain want to subvert? Want to subvert the B/S (C/S) structure of the World Wide Web.

It attempts to subvert the B/S, C/S structure of the World Wide Web, which was born in 1989. Said before. Since 1989, European physicist Tim Berners-Lee invented the World Wide Web and gave up applying for a patent. In the past 30 years since then, companies including Google, Amazon, Facebook, Alibaba, Internet, Tencent and other companies have used the B/S (C/S) structure of the World Wide Web toGrow into an Internet giant.

In their headquarters, a powerful central server cluster was established to store massive amounts of data. Hundreds of millions of users obtained the data they needed from the giant servers. This also led to the emergence of cloud computing, and then the Internet giants Open up your unused central server resources to further absorb data from enterprises, governments, and individuals. Centralized Internet giants have an increasing influence on the world, countries, and Internet users.

The goal of blockchain is to try to reduce the influence of Internet giants by distributing data to each Internet user’s computer. It can be seen that the real opponent of blockchain and what it wants to subvert is the 1990 The B/S (C/S) structure born in 2007. But whether it can be subverted depends on its technical advantages and bottlenecks.

3. Technical flaws of blockchain: dilemmas caused by the pursuit of complete equality and freedom

The technical flaws of blockchain first come from its peer-to-peer network architecture. For example For example, Taobao currently has a B/S structure, and massive data is stored in the Taobao server cluster computer room. Hundreds of millions of consumers access the Taobao server website through their browsers to obtain the latest information and historical information.

If blockchain technology is used, hundreds of millions of people will retain a complete Taobao database on their personal computers or mobile phones. Every time a transaction occurs, it will be synchronized to hundreds of millions of other users. This is completely unachievable in reality. The amount of data transferred and stored is too large. It is equivalent to setting up and running hundreds of millions of Taobao websites at the same time.

Therefore, blockchain cannot be applied to projects with large amounts of data, and even smaller website projects will have difficulty using blockchain. By 2018, Bitcoin had been running for nearly 10 years, and the accumulated transaction data had brought the entire system to collapse.

So the blockchain has adopted many alternative methods, such as establishing relay nodes and lightning nodes. These two concepts can also make people confused. In layman’s terms, the blockchain will ask it for The subversive object B/S structure has been studied, and a data server center has been established to become the relay node of the blockchain, which can also be accessed with a browser-like terminal. This is the lightning node of the blockchain.

This change can alleviate the technical shortcomings of the blockchain, but it does make the blockchain what it opposes, centralization. It can be seen that pure blockchain technology has major flaws due to its technical characteristics and cannot be widely used like the World Wide Web. If the technology is upgraded and some parts adopt a B/S (C/S) structure, the blockchain will become centralized. The information node no longer maintains the dream when it was born.

4. Looking at the future prospects of blockchain from the Internet brain model

We know that the Internet generally refers to the Internet that connects computer networks around the world. On this basis The development of a global Internet network covering the whole world is called the Internet, which is a network structure that is interconnected.

Since the birth of the Internet in 1969, humans have been interconnected from different directions.Innovating in the field of Internet, there is no unified plan to build the structure of the Internet. When the wheel of time reaches 2017, with the advancement of science and technology such as artificial intelligence, Internet of Things, big data, cloud computing, robots, virtual reality, and industrial Internet, With vigorous development, when human beings look up to see the giant system they have created, the model and architecture of the Internet brain have become increasingly clear.

Through nearly 20 years of development, relying on the B/S and C/S structures of the World Wide Web, Tencent QQ, WeChat, Facebook, Weibo, and Twitter Amazon have developed structures similar to neuron networks. Internet devices, especially personal computers and mobile phones, map personal data and functional space on the giant's central server through the software on the device, allowing them to add friends, communicate and transfer information. Internet giants continue to optimize the software versions of hundreds of millions of terminals through software upgrades in central server clusters. In the neurological system, this is a standard central nervous system structure.

The birth of the blockchain provides another neuron model. Instead of uniformly managing neurons in the centralized services of giants, each terminal, including personal computers and personal mobile phones, becomes an independent neuron node. , retaining an independent data space and synchronizing mutual information. In the neurological system, this is a distributed neural structure with no center and multiple neural nodes.

Interestingly, these two different types of neural structures appear in the development of the nervous system. In lower organisms, blockchain-like neural structures have appeared. There are multiple ganglia with the same functions, all of which can command body activities and reactions. However, as organisms evolve, these ganglia gradually merge. When they evolve into higher In biology, the central nervous system appeared, which contains a large number of neurons that interact with each other.

4. Judgment on the future status of blockchain in the Internet

1. Understanding of Bitcoin: a guessing game based on peer-to-peer network architecture (P2P), Through clever financial and public opinion operations, it has become a "world currency" that is not subject to government supervision.

2. Understanding of blockchain: a peer-to-peer (P2P) software application that uses a hash algorithm to generate "tokens" to synchronize information across the entire network.

3. Blockchain has specific uses, such as large-scale election voting, large-scale gambling, financial transactions that circumvent government financial supervision, etc. It still has irreplaceable uses.

4. In more cases, blockchain technology will rely on the B/S and C/S structures of the Internet to achieve functional expansion, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.

5. Whether from the perspective of information transmission efficiency and resource consumption, or from the perspective of nervous system evolution, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolution of the future Internet.By.

6. Of course, Internet giants developed with B/S and C/S structures also have their problems, but these can be gradually solved through commercial and political methods in the future.

C. What is the relationship between blockchain technology and the Internet of Things

Chongqing Jinwowo’s analysis is as follows:
Blockchain in the field of Internet of Things and logistics Can also be combined naturally.
Through blockchain, logistics costs can be reduced, the production and delivery process of items can be traced, and the efficiency of supply chain management can be improved.
This field is considered to be a promising application direction of blockchain.

D. Will blockchain technology really be a part of the post-Internet era?

Yes, blockchain must be a necessary technology in the post-Internet era.

Specifically reflected in its non-tamperability and the ability to achieve decentralization:

1. On the Internet, value and rights can be transferred.

2. A decentralized system can be built so that multiple parties can trust each other.

The first point is that value and rights can be conveyed on the Internet.

We all know that it is easiest to copy and paste on the Internet, and we can easily transfer information. However, if value is transferred on the Internet, the information may be stolen and tampered with. With blockchain technology, the information we put on the Internet can not be tampered with, and we are not afraid of being stolen. As a result, proof of value and equity can be transmitted on the Internet.

There are too many examples of value transfer. For example, Bitcoin is a digital asset that can be transferred at will through the Internet, and does not require a centralized organization to manage it.

But how to understand the transfer of proof of equity? For example, when we go to handle government affairs, we often encounter that I go through a procedure at a window of a department, and then take the paper procedure and go to the window of the next department. Although we have experienced the Internet for so many years, we still have to go through so many processes and handle various paper documents. Why is this?

This is because technology is now very developed, and it is actually very easy to tamper with some electronic documents. Without the combination of blockchain, it is more difficult to trust the electronic information you submit. Therefore, in order for the window department to know that you are yourself and that you are willing to apply for the application, you often need to bring your ID card and then fill in the information in person on site to ensure that you are applying for it out of your own will. This way nothing goes wrong.

Combining blockchain and face recognition, it can be done. The procedures I completed in one department are put on the blockchain, and the other department only needs to complete the procedures on the blockchain. If you check it online, you will know that I have gone through the relevant preparatory procedures myself, and then I can proceed.

In fact, Chancheng District, Foshan, Guangdong has alreadyExplore the use of blockchain technology to achieve "zero errands" in government affairs. You can handle government affairs without leaving home, which greatly improves the efficiency of processing.

Let’s talk about the second point: a decentralized system can be built so that multiple parties can trust each other. Before the emergence of blockchain, it was difficult for multiple entities to collaborate, especially online collaboration. This is why cross-border transfers generally take several days and are expensive, with fees of several percent. Because for cross-border transfers, different banks have different account books and use different systems. Therefore, it is often necessary for the personnel responsible for external clearing and settlement of the two banks to synchronize the account books with each other before the transfer can be successful.

Some people say that if everyone uses one system, then the question becomes, whose system should we use? Other companies don't trust whoever uses it, because whose system often has the authority to modify it, and the operating rights are in the hands of the other party, not to mention issues such as privacy.

But if the system is developed using blockchain, this problem can be solved very well, because everyone uses the same system, and the permissions between each node are consistent, and no one The subject can be changed at will.

In fact, in June 2018, Ant Financial had already used blockchain technology to achieve rapid cross-border remittances. It takes three seconds and the fee is extremely low and can be ignored.

This decentralized solution brought by blockchain establishes a collaborative relationship that is different from previous centralization, solves some insurmountable problems of centralization, and greatly improves efficiency.

If we extend from this direction, think about any company we are in, it will always be upstream or downstream of another company, and it will definitely exchange materials, funds, information, etc. with the other company. A series of interactions etc. Then you will find that many processes are often created for trust. For example, the information sent by the other party needs to be confirmed, and the materials sent by the other party need to be confirmed and checked. Every time you make a new action with the other party, there will be constant questions. Confirmation, feedback. And these are the costs of trust.

But if you use the blockchain, after the data is generated, it is put on the blockchain, and all the upstream and downstream companies in the supply chain obtain the data, then a lot of data does not need to be confirmed repeatedly, so that It can greatly reduce the cost of trust. At the same time, because the data transmitted is credible. Once the data is trusted, the interaction between machines will reduce a lot of trouble in the future. (This is another big topic)

Blockchain technology is widely regarded as an important starting point for achieving a more secure Internet - its advantages mainly come from its technical principles and the current Internet structure. different. In this article we will introduce to you how blockchain can promote network security.

What is blockchain technology?

Blockchain technology is a decentralized distributed ledger systemSystem, you can put any digital assets into the blockchain, regardless of industry. It uses a series of time-stamped immutable records to save information, managed by a cluster of computers. Different transactions can be tracked through these records, which are separated by blocks and connected by cryptographic chains. At the same time, the data does not belong to a certain computer or an individual, but is jointly owned by multiple users within the entire system.

Once the information is confirmed, the encoded data cannot be changed and will become a permanent block that is added to the chain formed by other blocks that have been verified. Initially this technology was designed for cryptocurrencies, but now we can see that blockchain technology has great potential in many areas, especially cybersecurity, as it can be used to prevent cyber attacks, data leaks, identity theft or Malicious transactions, keeping data private and secure.

As a lower-level technology, blockchain can provide beneficial solutions for different industries. Its main features are:

Blockchain has a democratized network with no central authority. It is public domain, so no single organization can enter the blockchain system to manipulate any information.

Blockchain is a decentralized system that does not belong to any one entity. Data in the blockchain system can be stored encrypted.

Anything stored in the blockchain is immutable, preventing human tampering or manipulation of the information. For example, with blockchain, it is possible to hold a completely transparent election with immediate results. People can vote at home, and the results can be counted immediately.

Blockchain is transparent - anything built and stored in the blockchain is publicly accessible. The data stored inside can also be tracked, creating a higher standard of accountability for those who use the system.

How does blockchain technology promote network security?

Internet of Things and Edge Computing

With the development of Internet of Things and edge computing, more and more data Distributed across edge computing and storage devices for real-time, on-demand access, meaning data is processed and stored closer to the source. Blockchain provides a secure solution for IoT and Industrial IoT through tighter authentication, improved data attributes and flows, and more advanced record management systems.

In terms of IoT devices, blockchain technology, based on its decentralized architecture, can provide security for remote IoT devices and protect them from hacker attacks. Smart contracts can provide secure verification for transactions in a blockchain environment, and blockchain can be used to manage IoT activities.

Data access control

Because one of the original goals of blockchain was to enable public access, it has no access controls or restrictions. However, various industries now useUse a private blockchain system to ensure data confidentiality and secure access control. The blockchain’s full encryption ensures that data – whether part or all of it – cannot be accessed by outsiders, especially when it is being transferred.

DDoS Attack

The target of a Distributed Denial of Service (DDoS) attack is usually a server that is attacked by multiple infected computer systems, causing the system to fail through denial of service. slow down, eventually causing the system to overload or crash. If blockchain is integrated into a security system, the target computer, server, or network becomes part of a decentralized system that protects these machines from attacks.

Personal communication

By using a platform based on blockchain technology for communication, enterprises can obtain higher security, and the technology can resist malicious attacks. Whether in personal, business or highly confidential communications, consumers can gain the confidentiality of communications without fear of cyber attacks. Blockchain can handle public key infrastructure (PKI) better than ordinary encryption applications, so many companies now want to develop blockchain private communication applications.

Public Key Infrastructure

There is an increased focus on securing computers and online credentials, and blockchain technology can help in this regard. PKI relies on third-party certification authorities to secure communications applications, emails, and websites. These issuing authorities, which issue, revoke or store key pairs, are often targeted by hackers, who often use fake identities to try to access encrypted communications. When these keys are encoded on the blockchain, it minimizes the possibility of generating false keys or identity theft because the identity of the legitimate account holder is already verified on the application, making any intrusion, spoofing, or identity theft Thefts are instantly identifiable.

Domain Name System

Using the blockchain method to store the Domain Name System (DNS) can comprehensively improve security. Because it is no longer a single, risky target, it can prevent malicious activities by hackers from bringing down DNS service providers.

Blockchain, the future of network security

As we continue to deepen our understanding of blockchain, more and more people are investing in the application and research and development of blockchain technology. , this technology is slowly maturing. In the past two years, the application of blockchain in different industry scenarios has increased, as well as the country’s policy guidance on blockchain technology. Blockchain has changed dramatically and is no longer synonymous with cryptocurrency.

Blockchain technology may be born of cryptocurrency, but its value is by no means limited to cryptocurrency. Blockchain is a safe and reliable technology that, once integrated into mainstream security measures, can bring many practical benefits to advancing cybersecurity.

As hackers continue to create new and more sophisticated ways to steal and attack data, the threat to network security is intensifying, and blockchain technology is likely toBe at the forefront of cybersecurity in the coming years. To a certain extent, today’s blockchain is the future of network security.

My understanding is that blockchain is a technology, and the Internet is just a carrier or a communication channel for information integration. It should not be a post-Internet era.

Blockchain can be truly fair and open, and what has happened will not be tampered with when recorded.

Blockchain is decentralized, cannot be cracked, and its uniqueness is irreplaceable

E. What is the current status of the integrated development of blockchain and other new generation information technologies

For blockchain to be effective in the real economy and other fields, it needs to be integrated with other new generation information technologies to achieve complementary advantages and functions. Currently, the integrated development of blockchain, industrial Internet, big data, cloud computing, artificial intelligence, etc. is still in its early stages, and the effects of integrated applications need to be further activated.

The "Guiding Opinions" proposes to apply blockchain technology to identification analysis, edge computing, collaborative manufacturing and other aspects of the Industrial Internet to cultivate new models and new business formats; build a regional-based The big data service platform of the blockchain promotes data compliance and orderly confirmation, sharing and circulation; uses cloud computing to build a blockchain application development, testing verification and operation and maintenance environment; develops new technologies such as smart contracts based on artificial intelligence, Explore the use of artificial intelligence technology to improve blockchain operating efficiency and value creation capabilities.

The Xueshuo Innovation Blockchain Technology Workstation under Lianqiao Education Online is the only approved "Smart Learning Factory 2020- Xueshuo Innovation Workstation" launched by the School Planning and Construction Development Center of the Ministry of Education of China. "Blockchain Technology Professional" pilot workstation. The professional position is based on providing students with diversified growth paths, promoting the reform of the training model integrating professional degree research, production, and research, and building an applied and compound talent training system.

F. Will blockchain technology replace Internet technology?

There is no such thing as replacement. At present, it is more of an icing on the cake. In the future, it may be the most The basic underlying framework plays the core operational role. For example, application platforms such as Changsha's SMIC Blockchain Public Service Platform are a good example. Internet technology is the underlying framework support, and blockchain technology is the core of the platform.

G. What impact will the emergence of blockchain technology have on the Internet?

More often, blockchain technology will depend on the B/S and C/S of the Internet. The structure realizes the expansion of functions, but overall it is still a supplement to the existing technology of the Internet. Most of the application scenarios currently envisaged by blockchain can be implemented using B/S and C/S structures, with higher efficiency and more mature technology.
Whether it is from the perspective of information transmission efficiency and resource consumption, or from the evolution of the nervous system, blockchain cannot become the mainstream architecture of the Internet, let alone a subversive and revolutionary leader of the future Internet.

H. What do blockchain technology and the Internet have in common?

Chongqing Jinwowo Analysis and Research: Blockchain operates based on the Internet, but its functions are wider than the Internet. The similarities between the two technologies mainly lie in
:
(1) In terms of data transmission methods, neither the Internet nor the blockchain requires a centralized intermediary;
(2) Both technologies Users are required to access the Internet;
(3) Both technologies can satisfy the simultaneous use of multiple users within an organization.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39901 文章总数
  • 3637508访问次数
  • 3094建站天数