6.1 Peer-to-peer Network Architecture
Bitcoin uses a peer-to-peer (peer-to-peer) network architecture based on the Internet (Internet). Peer-to-peer means that each computer in the same network is equal to each other, each node provides a network
So what exactly is digging mine. How do miners get bitcoin by digging a mine? This requires the POW (work proof) consensus mechanism that is used in the Bitcoin block chain system.
PoW (work proof) consensus mechanism
Tell a story first:
There is a
Reference:http://www.infoq.com/cn/articles/deep-understanding-of-bitcoin-transaction-script
In the Bitcoin blockchain, each chunk points to the previous block , and the chunk Hashiki computed by SHA256 is the basis for the non-tampering of the
Recently in the exchange with colleagues in our palletone on the Utxo and signature processing, some experience, write down this blog post. The basic concept of Bitcoin is that bitcoin is a ECDSA digital signature to unlock the unspent balance in
Chapter No. 0 Introduction
Bitcoin is a set of software, the software code to modify the upgrade will often involve two concepts, a called hard fork, a soft fork. What the hell does that mean? The most common definition in the community is the
Blockchain Enthusiast (qq:53016353)
The blockchain uses an Internet-based (Internet)-on-Peer (peer-to-peer) network architecture. Peer to peer refers to each computer located in the same network is equal to each other, each node provides network
Blockchain Enthusiast (qq:53016353)
1. Similarities and differences between the traditional distributed consistency algorithm and the blockchain consensus process Same point: Append onlyEmphasis on serializationThe minority obeys the majority
White Paper on the certification mechanism for authorized shares
(Delegated Proof-of-stake, DPOS)
Author: Daniel Larimer
April 3, 2014 translation: Yidaidaxia_ ShaoxiBit Square Digital Asset Research Club translation works (Www.bitfarm.io)More
This article is about the last article in the Crypto Currency primer article. Cryptocurrency introductory article mainly for developers, from the theoretical level to describe the concept of crypto-currency architecture, a total of 3. The title of
"Consensus algorithms" and "consensus attacks" have been mentioned in many articles. We should be more profound impression of "consensus attack", right, that is what we call this and the company shares is a truth, when you occupy the entire company "
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.