How blockchain works
  • Tags - #blockchain
    • Last updated February 7, 2023
    • 0 comments, 145 views, 0 likes

More from Beata She

  • The first Volvo that is cooler than a BMW? The Volvo S60 test
    0 comments, 0 likes
  • How to make money on the Internet
    0 comments, 0 likes
  • How NFT works
    0 comments, 0 likes

More in Politics

  • Norton antivirus account login
    31 comments, 144,976 views
  • Liquidity Locking Made Easy
    10 comments, 83,152 views
  • Ang jili178 login ay nagdudulot sa iyo ng mga laro ng slot at karanasan sa laro ng soccer
    2 comments, 46,603 views

Related Blogs

  • Slot Machine Marvels: A new Self-help guide to Online Fishing reels
    0 comments, 0 likes
  • \u0e25\u0e07\u0e17\u0e38\u0e19\u0e04\u0e32\u0e2a\u0e34\u0e42\u0e19 \u0e44\u0e21\u0e48\u0e15\u0e49\u0e2d\u0e07\u0e40\u0e1b\u0e34\u0e14\u0e1a\u0e48\u0e2d\u0e19\u0e01\u0e47\u0e21\u0e35\u0e23\u0e32\u0e22\u0e44\u0e14\u0e49\u0e2b\u0e25\u0e31\u0e01\u0e41\u0e2a\u0e19 \u0e41\u0e04\u0e48\u0e41\u0e19\u0e30\u0e19\u0e33\u0e40\u0e1e\u0e37\u0e48\u0e2d\u0e19 2023
    0 comments, 0 likes
  • De Dientes Perdidos A Sonrisas Seguras: El Viaje De Los Implantes Dentales
    0 comments, 0 likes

Archives

Social Share

How blockchain works

Posted By Beata She     February 7, 2023    

Body


Blockchain allows every participant in a network to access a distributed database. Blockchain does not store data but records events (transactions) in chronological order.

All new records are checked for authenticity - they must be confirmed by the majority of the network members before they can be entered into the blockchain. Records are grouped into blocks, which are combined into chains. Once data is on the blockchain, it cannot be altered or deleted without breaking the blockchain's integrity.

Types of blockchain

Blockchain can operate both on a public (open) network, to which any user has access, and on a private (closed) network, such as a corporate network in the case of sensitive data. Private versions of blockchain can have different levels of access for users and different levels of complexity for encrypting information.

The best-known example of a public blockchain is bitcoin, chainlink news, and other cryptocurrencies. Corporations use blockchain not only in the financial sector but also in other sectors, such as the entertainment industry (for issuing tickets) and healthcare (to protect patient data).

There are also hybrid networks that combine features of both open and closed networks.

Blockchain is classified in a variety of ways:
By transaction object:
- information;

- virtual value (a value whose counterpart does not exist in the "real world" - for example, bitcoin);

by the type of access to the network:
- Unrestricted (networks in which participants are allowed to perform any activity);

- Limited (networks, which restrict the type of activity of the participants);

by identification requirements:
- anonymous;

- pseudo-anonymous;

- full identification;
- PoW (Proof-of-work) - the right to certify a block is given to a participant based on his performance of some sufficiently complex work, which meets predetermined criteria.

- PoS (Proof-of-stake) - the right to certify a block is given to an account holder when the number of his funds and term of holding them meet the specified criteria. The formulas for calculating the criteria may vary slightly.

- PoS + PoW - a hybrid of PoW and PoS, where blocks can be certified both via calculated PoS criteria and PoW overshoot. The purpose of this approach is to make it harder to recalculate the entire chain (from the very first block), possible when using PoS in its pure form.

- PBFT (Practical Byzantine Fault Tolerance), Paxos, and RAFT are algorithms of multistage network consensus establishment. Algorithms of this group allow blockchain to function with small expenses and have significant bandwidth, but are weakly stable to increase the number of participants.

- Non-BFT (Non-Byzantine Fault Tolerance) - consensus algorithms, unstable to the behavior in which some participants start to work against the network. Such algorithms apply to closed networks with full identification.

In the presence of a central administrator:
- There is a central administrator;

- there is no central administrator

Comments

0 comments