Blockchain training translation
< Introction to cognition & gt Download link is attached at the end of the article)
new economy blueprint and guide
publication time: 2016
recommendation: this book is mainly for programmers. Combined with API programming, we can tell you the principle and usage of cryptocurrency, as well as how to develop related software. For non programmer readers, the first few chapters of this book are still applicable as in-depth introction of bitcoin. Book download
in order to better promote the application of blockchain in real economy, Hong Kong Institute of international new economy has arranged "chain energy institute" + "chain energy capital" + "chain energy instry alliance", and established an ecological environment of self-development and self evolution of chain energy economy
chain energy college is an academic research and ecational institution focusing on economic theory, business model research and chain energy training ecation. It is the "brain" and theoretical pioneer of chain energy economy
the Hong Kong International New Economy Research Institute was officially established in Hong Kong on June 7, 2018. It is a comprehensive scientific research service institution. Its research fields include research on the integration and application of global blockchain and big data technology, research on the integration and application of global blockchain and artificial intelligence technology, Research on regulatory policies, laws and regulations of blockchain, research on the development of China's blockchain instry, research on the integration and application of global blockchain and artificial intelligence technology The practical application of blockchain technology. With the help of research and judgment on the trend of new economy, research results and promotion experience, the Hong Kong Institute of international new economy has proposed the forward-looking theoretical system of "chain energy economy" for the first time, which is committed to providing the popularization and relevant solutions of the theoretical system of financial new economy, blockchain technology and "chain energy economy" for government regulators and real enterprises
as the proponent of "chain energy economy", the Hong Kong Institute of international new economy is committed to providing government regulators and traditional Chinese entities with new financial economy, blockchain technology and popularization of the theoretical system of "chain energy economy" and related solutions.
Yin Cheng, a graate of Tsinghua University, is a top professional in the field of blockchain in China. He is proficient in C / C + +,, golang, python, kalilinux, sicikit learn and tensorflow. He is an EOS open source contributor and has developed many blockchain cryptocurrencies. He once served as Google algorithm engineer and a gold medal lecturer in Microsoft tech.ed conference. He is the most valuable expert in the field of artificial intelligence and blockchain in the world. He also has 15 years of programming experience and 5 years of teaching experience. He is a senior software architect and Intel Software Technology expert. The teaching and research team of blockchain college led by him is mainly composed of master's and doctoral students who graated from Tsinghua University, Peking University and other well-known institutions
the team has rich practical experience in blockchain and has won many blockchain competitions.
2. Teaching environment and lecturer's teaching experience, good learning atmosphere is concive to their own learning and growth, and lecturer's teaching level is concive to the accumulation of experience in the process of learning practice
3. How about the overall employment rate? Employment is the ultimate goal of learning UI. You can understand the employment rate by understanding the employment situation of the previous employment students.
(1) strong teachers
(2) focusing on blockchain training
(3) relatively complete curriculum system
virtual currency refers to non real currency. Well known virtual currency, such as network company's network currency, Tencent company's Q currency, Q point, Shanda company's voucher, Sina's Micro currency (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver pattern (used for bixue Qingtian game)
the popular digital currencies in 2013 are bitcoin, Leyte coin, infinite coin, quark coin, zeta coin, BBQ coin, pennies (Internet), invisible gold bar, red coin and prime currency. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"
extended materials:
classification
1. The first category is familiar game currency. In the era of stand-alone games, the protagonist accumulates money by knocking down the enemy, entering the gambling house to win money, and using these to buy Herbs and equipment, but it can only be used in his own game console. Since the establishment of Internet portal and community, the realization of game networking, virtual currency has a "financial market", players can trade game currency
2. The second type is the special currency issued by the portal website or instant messaging service provider, which is used to purchase the services in the website. The most widely used is Tencent's q-coin, which can be used to purchase membership, QQ show and other value-added services
3. The third kind of virtual currency on the Internet, such as bitcoin (BTC), lightmoney (LTC), etc. bitcoin is an electronic currency proced by open-source P2P software. Some people also translate bitcoin as "bitcoin", which is a kind of network virtual currency. It is mainly used for Internet financial investment, and can also be directly used in daily life as a new currency
The instrialization of virtual money will form a virtual money market. If the emergence of the stock market is the proct of the combination of instrial capital and financial capital, then virtual currency will be the proct of the combination of service capital and financial capitalmodern service instry, especially personalized modern information service instry, will become the instrial foundation of personalized virtual currency. Personalized virtual money market is different from stock market and derivative financial instrument market. The latter is more established for the needs of instrialization, which is also reflected in meeting the needs of the so-called modern service instry
The instrial foundation of the former is closely related to the demand of informatization. The future of the tertiary instry is different from the service instry, its development direction is the post-modern service instry, that is, the experience instry, that is, more personalized instry to meet the development needs of spirit, culture and entertainmentthe stock market will make more use of information to guide the rational investment of instry and service instry, while the personalized virtual money market will make more use of information to guide the perceptual consumption of experience instry
the main protocols are as follows: 1. IP internet protocol IP is the heart of TCP / IP and the most important protocol in the network layer. The IP layer receives the data packet from the lower layer (network interface layer, such as Ethernet device driver) and sends the data packet to the higher layer -- TCP or UDP layer; On the contrary, IP layer also transfers packets received from TCP or UDP layer to lower layer. IP packets are unreliable because IP doesn't do anything to confirm that the packets are sent in order or are not corrupted. IP packet contains the address of the host sending it (source address) and the address of the host receiving it (destination address). When high-level TCP and UDP services receive packets, they usually assume that the source address in the packet is valid. It can also be said that IP addresses form the authentication basis of many services, which believe that packets are sent from a valid host. IP confirmation contains an option called IP source routing, which can be used to specify a direct path between the source address and the destination address. For some TCP and UDP services, IP packets using this option seem to be delivered from the last system on the path rather than from its real location. This option exists for testing purposes, indicating that it can be used to spoof the system to make normally forbidden connections. Then, many services that rely on IP source address for confirmation will have problems and will be illegally intruded. 2. TCP if there are already sealed TCP packets in IP packets, then IP will "up" them to the TCP layer. TCP sorts packets and checks for errors, and realizes the connection between virtual circuits. TCP packets include sequence number and acknowledgement, so packets not received in order can be sorted, while damaged packets can be retransmitted. TCP sends its information to higher-level applications, such as telnet's server and client. Applications send information back to the TCP layer in turn, and the TCP layer sends them down to the IP layer, device drivers and physical media, and finally to the receiver. Connection oriented services such as Telnet, FTP, rlogin, X windows, and SMTP require a high degree of reliability, so they use TCP. DNS uses TCP (send and receive domain name databases) in some cases, but uses UDP to send information about a single host. 3. UDP is in the same layer as TCP, but it doesn't care about the order, error or retransmission of packets. Therefore, UDP is not used for connection oriented services that use virtual circuits. UDP is mainly used for query response oriented services, such as NFS. Compared with FTP or Telnet, these services need to exchange less information. Services that use UDP include NTP (Network Time Protocol) and DNS (DNS also uses TCP). Spoofing UDP packets is easier than spoofing TCP packets because UDP does not establish an initial connection (also known as handshake) (because there is no virtual circuit between the two systems), that is, UDP related services are at greater risk. 4. ICMP ICMP is located in the same layer as IP, which is used to transmit IP control information. It is mainly used to provide information about the path to the destination address. ICMP's "redirect" information informs the host of a more accurate path to other systems, while the "unreachable" information indicates that there is a problem with the path. In addition, if the path is not available, ICMP can terminate the TCP connection "gracefully". Ping is the most commonly used ICMP based service. 5. Port structure of TCP and UDP TCP and UDP services usually have a client / server relationship. For example, a telnet service process starts to be idle on the system, waiting for connection. The user uses the telnet client to establish a connection with the service process. The client program writes information to the service process, the service process reads the information and sends a response, and the client program reads the response and reports it to the user. Therefore, the connection is plex and can be used for reading and writing. How do multiple telnet connections between two systems confirm and coordinate with each other? A TCP or UDP connection uniquely uses the following four items in each message: the source IP address, the IP address of the sending packet. Destination IP address the IP address of the received packet. Source port the port of the connection on the source system. Destination port the port of the connection on the destination system. Port is a software structure, which is used by client program or service process to send and receive information. A port corresponds to a 16 bit number. Service process usually uses a fixed port, for example, SMTP uses 25, xwindows uses 6000. These port numbers are "well known" because these addresses and destination addresses are needed to communicate when establishing a connection to a particular host or service
reference model
TCP / IP protocol does not fully conform to OSI's seven layer reference model. The traditional open system interconnection reference model is a seven layer abstract reference model of communication protocol, in which each layer performs a specific task. The purpose of this model is to make all kinds of hardware communicate with each other at the same level. These seven layers are: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The TCP / IP communication protocol adopts a four layer hierarchical structure, and each layer calls the network provided by its next layer to fulfill its own requirements. These four layers are: application layer: the layer of communication between applications, such as simple e-mail transfer (SMTP), file transfer protocol (FTP), network remote access protocol (telnet), etc. Transport layer: in this layer, it provides data transmission services between nodes, such as transmission control protocol (TCP), user datagram protocol (UDP), etc. TCP and UDP add transmission data to the packet and transmit it to the next layer. This layer is responsible for transmitting data and determining that the data has been delivered and received. Interconnection network layer: it is responsible for providing basic packet transmission function, so that each packet can reach the destination host (but not check whether it is received correctly), such as Internet Protocol (IP). Network interface layer: manage the actual network media, define how to use the actual network (such as Ethernet, serial line, etc.) to transmit data
the reason why TCP / IP is a protocol family is that TCP / IP protocol includes TCP, IP, UDP, ICMP, rip, telnet FTP, SMTP, ARP, TFTP and many other protocols, which are collectively called TCP / IP protocol. Here we introce the English names and uses of some common protocols in the protocol family: TCP (Transport Control Protocol), IP (Internet Protocol), UDP (User Datagram Protocol), ICMP (Internet control message protocol) and SMTP (Simple Mail Transfer Protocol) Protocol SNMP (Simple Network Management Protocol) FTP (File Transfer Protocol) ARP (address resolution protocol) address resolution protocol from the perspective of protocol layered model, TCP / IP consists of four layers: network interface layer, inter network layer, transport layer and application layer. Among them: network interface layer, which is the lowest layer of TCP / IP software, is responsible for receiving IP datagrams and sending them through the network, or receiving physical frames from the network, extracting IP datagrams and giving them to the IP layer. The inter network layer is responsible for the communication between adjacent computers. Its functions include three aspects. 1、 After receiving the request, the packet is loaded into the IP datagram, the header is filled, the path to the destination machine is selected, and then the datagram is sent to the appropriate network interface. 2、 Processing input datagram: first check its validity, and then carry out pathfinding - if the datagram has arrived at the sink machine, remove the header and hand over the rest to the appropriate transport protocol; If the datagram has not arrived at the sink, the datagram is forwarded. 3、 Deal with path, flow control, congestion and other issues. The transport layer provides communication between applications. Its functions include: 1. Format information flow; 2、 Provide reliable transmission. In order to realize the latter, the transport layer protocol stipulates that the receiver must send back an acknowledgement, and if the packet is lost, it must be retransmitted. The application layer provides users with a set of common applications, such as e-mail, file transfer access, remote login and so on. Telnet uses telnet protocol to provide interfaces registered on other hosts in the network. Telnet session provides character based virtual terminal. File transfer access FTP uses FTP protocol to provide file function between machines in the network. We have learned the related concepts of OSI reference model. Now let's take a look at how TCP / IP protocol implements the network model compared with the seven layer protocol reference model. Layer functions in OSI: TCP / IP protocol family
application layer file transfer, e-mail, file service, virtual terminal, TFTP, HTTP, SNMP, FTP, SMTP, DNS, rip, telnet
presentation layer data format, code conversion, There is no protocol for data encryption
there is no protocol for session layer to release or establish contact with other nodes
the transport layer provides end-to-end interfaces TCP, UDP
the network layer selects routing IP, ICMP, OSPF, BGP, IGMP, ARP, RARP for data packets
the data link layer transmits addressable frames and error detection functions slip, CSLIP, PPP, MTU
the physical layer transmits data iso2110 and IEEE802 on the physical media in the form of binary data. Ieee802.2
data link layer includes hardware interface and protocols ARP and RARP
