Position: Home page » Blockchain » Do you want to study for blockchain

Do you want to study for blockchain

Publish: 2021-05-14 11:18:07
1.

Although the blockchain technology is still in the early stage of development, the corresponding talents are in short supply

Computer (software engineering, information and computing science, information technology, information security, etc.)

2, mathematics related majors

3, economics related majors

4, cryptography

at present, various well-known institutions around the world are competing to launch blockchain teaching courses, Some universities have even set up corresponding completion certificates for blockchain courses

2. If you are interested in blockchain technology, you can learn the knowledge of cryptography at the beginning, and learn how to strengthen contracts other than trust through numbers. This is the most basic principle of blockchain. Then you can look at the programming books, understand the basic code, and do simple programming. After that, you can download some common blockchains, Study its code arrangement, see how it adds contracts, and make simple modifications to build its own smart contracts. Of course, if you are only affected by the recent price and hype and decide to join the instry, I suggest you learn more about the Bulls who hype it, listen to their opinions, and learn how others reap!
3. According to the current talent demand in the blockchain field, it can be roughly divided into the following categories:
1. Build a distributed ledger application based on DLT technology to realize the business requirements of customers on DLT. At present, the more famous one in this field is REBO. So what does DLT mean? Just look at what REBO is doing
2. Develop your own application on the existing public chain. At present, most companies are doing this. This category is also characterized by low threshold, high business potential and low risk
3. Companies develop their own public chains, which have the greatest potential in the future, but also have the highest risks and technical difficulties
4. Blockchain ecological infrastructure. For example, mobile wallet, hardware cold wallet, trading platform, blockchain content platform and so on are the blockchain instries with the highest commercial profits at present. Relatively speaking, the threshold is low and the risk is low, but there are many competitors
if we start from technology, what languages and knowledge do we need to learn
for the first class, go language is necessary, because DLT is mainly based on go language, and it also needs to master certain application development ability, because it must be a piece of software rather than a bunch of command-line source programs delivered to customers. For the second category, the mainstream of smart contract is the solidness language of Ethereum smart contract, so if you want to enter the second category of enterprises, you need to start with Ethereum. The third type of public chain development, the mainstream is C + + and go, but there are also many famous projects are implemented in trust, such as: Facebook's Libra, fire coin's nervos and so on. In fact, the fourth category has little to do with blockchain technology, because development such as trading platform does not need blockchain technology
in addition to the above technical hard power, blockchain companies prefer "slash youth", that is, talents who master multi field knowledge at the same time, which can be divided into three categories: finance and blockchain, content operation and blockchain, community operation and blockchain. Among them, the third kind of talents is the rarest, because most technical talents are not good at communication and exchange. However, e to its distributed characteristics, blockchain especially needs the joint efforts of the community to create and maintain a chain
in the end, many people mistakenly think that blockchain is a brand new instry, and that blockchain is totally different from traditional fields. This is actually a big mistake. From what has been written above, you can also find that in the end, blockchain still needs to solve the actual needs in reality. The only difference is that the tools to solve the needs have changed, so don't think that only knowing blockchain can kill all sides, It is very important to have the basic knowledge of the requirement field
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry.
4. Depending on your basic level, if you have a certain technical foundation for development, it is relatively easy to learn
"chainman College" offers short weekend technical training courses for colleges with a certain programming foundation. You can investigate them and ask about your situation.
5. Personal advice or to enhance their ecation, ecation is not a job to pick you, but you pick the ecation
6. Yes, starting from the basic training, Xiao can learn it, regardless of ecation background. As long as you are willing to work hard, you will be able to learn it.
7. TCP / IP protocol does not fully conform to OSI's seven layer reference model. The traditional open system interconnection reference model is a seven layer abstract reference model of communication protocol, in which each layer performs a specific task. The purpose of this model is to make all kinds of hardware communicate with each other at the same level. The seven layers are: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The TCP / IP communication protocol adopts a four layer hierarchical structure, and each layer calls the network provided by its next layer to fulfill its own requirements. These four layers are: application layer: the layer of communication between applications, such as simple e-mail transfer (SMTP), file transfer protocol (FTP), network remote access protocol (telnet), etc. Transport layer: in this layer, it provides data transmission between nodes and communication services between applications. Its main functions are data format, data confirmation and loss retransmission. Such as transmission control protocol (TCP), user datagram protocol (UDP), etc., TCP and UDP add transmission data to the packet and transmit it to the next layer, which is responsible for transmitting data and determining that the data has been delivered and received. Interconnection network layer: it is responsible for providing basic packet transmission function, so that each packet can reach the destination host (but not check whether it is received correctly), such as Internet Protocol (IP). Network interface layer (host network layer): receive IP packets and transmit them, receive physical frames from the network, extract IP datagrams and transfer them to the next layer, manage the actual network media, and define how to use the actual network (such as Ethernet, serial line, etc.) to transmit data. TCP / IP protocol structure diagram
the main protocols are as follows: 1. IP internet protocol IP is the heart of TCP / IP and the most important protocol in the network layer. The IP layer receives the data packet from the lower layer (network interface layer, such as Ethernet device driver) and sends the data packet to the higher layer -- TCP or UDP layer; On the contrary, IP layer also transfers packets received from TCP or UDP layer to lower layer. IP packets are unreliable because IP doesn't do anything to confirm that the packets are sent in order or are not corrupted. IP packet contains the address of the host sending it (source address) and the address of the host receiving it (destination address). When high-level TCP and UDP services receive packets, they usually assume that the source address in the packet is valid. It can also be said that IP addresses form the authentication basis of many services, which believe that packets are sent from a valid host. IP confirmation contains an option called IP source routing, which can be used to specify a direct path between the source address and the destination address. For some TCP and UDP services, IP packets using this option seem to be delivered from the last system on the path rather than from its real location. This option exists for testing purposes, indicating that it can be used to spoof the system to make normally forbidden connections. Then, many services that rely on IP source address for confirmation will have problems and will be illegally intruded. 2. TCP if there are already sealed TCP packets in IP packets, then IP will "up" them to the TCP layer. TCP sorts packets and checks for errors, and realizes the connection between virtual circuits. TCP packets include sequence number and acknowledgement, so packets not received in order can be sorted, while damaged packets can be retransmitted. TCP sends its information to higher-level applications, such as telnet's server and client. Applications send information back to the TCP layer in turn, and the TCP layer sends them down to the IP layer, device drivers and physical media, and finally to the receiver. Connection oriented services such as Telnet, FTP, rlogin, X windows, and SMTP require a high degree of reliability, so they use TCP. DNS uses TCP (send and receive domain name databases) in some cases, but uses UDP to send information about a single host. 3. UDP is in the same layer as TCP, but it doesn't care about the order, error or retransmission of packets. Therefore, UDP is not used for connection oriented services that use virtual circuits. UDP is mainly used for query response oriented services, such as NFS. Compared with FTP or Telnet, these services need to exchange less information. Services that use UDP include NTP (Network Time Protocol) and DNS (DNS also uses TCP). Spoofing UDP packets is easier than spoofing TCP packets because UDP does not establish an initial connection (also known as handshake) (because there is no virtual circuit between the two systems), that is, UDP related services are at greater risk. 4. ICMP ICMP is located in the same layer as IP, which is used to transmit IP control information. It is mainly used to provide information about the path to the destination address. ICMP's "redirect" information informs the host of a more accurate path to other systems, while the "unreachable" information indicates that there is a problem with the path. In addition, if the path is not available, ICMP can terminate the TCP connection "gracefully". Ping is the most commonly used ICMP based service. 5. Port structure of TCP and UDP TCP and UDP services usually have a client / server relationship. For example, a telnet service process starts to be idle on the system, waiting for connection. The user uses the telnet client to establish a connection with the service process. The client program writes information to the service process, the service process reads the information and sends a response, and the client program reads the response and reports it to the user. Therefore, the connection is plex and can be used for reading and writing. How do multiple telnet connections between two systems confirm and coordinate with each other? A TCP or UDP connection uniquely uses the following four items in each message: the source IP address, the IP address of the sending packet. Destination IP address the IP address of the received packet. Source port the port of the connection on the source system. Destination port the port of the connection on the destination system. Port is a software structure, which is used by client program or service process to send and receive information. A port corresponds to a 16 bit number. Service process usually uses a fixed port, for example, SMTP uses 25, xwindows uses 6000. These port numbers are "well known" because these addresses and destination addresses are needed to communicate when establishing a connection to a particular host or service
reference model
TCP / IP protocol does not fully conform to OSI's seven layer reference model. The traditional open system interconnection reference model is a seven layer abstract reference model of communication protocol, in which each layer performs a specific task. The purpose of this model is to make all kinds of hardware communicate with each other at the same level. These seven layers are: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The TCP / IP communication protocol adopts a four layer hierarchical structure, and each layer calls the network provided by its next layer to fulfill its own requirements. These four layers are: application layer: the layer of communication between applications, such as simple e-mail transfer (SMTP), file transfer protocol (FTP), network remote access protocol (telnet), etc. Transport layer: in this layer, it provides data transmission services between nodes, such as transmission control protocol (TCP), user datagram protocol (UDP), etc. TCP and UDP add transmission data to the packet and transmit it to the next layer. This layer is responsible for transmitting data and determining that the data has been delivered and received. Interconnection network layer: it is responsible for providing basic packet transmission function, so that each packet can reach the destination host (but not check whether it is received correctly), such as Internet Protocol (IP). Network interface layer: manage the actual network media, define how to use the actual network (such as Ethernet, serial line, etc.) to transmit data

the reason why TCP / IP is a protocol family is that TCP / IP protocol includes TCP, IP, UDP, ICMP, rip, telnet FTP, SMTP, ARP, TFTP and many other protocols, which are collectively called TCP / IP protocol. Here we introce the English names and uses of some common protocols in the protocol family: TCP (Transport Control Protocol), IP (Internet Protocol), UDP (User Datagram Protocol), ICMP (Internet control message protocol) and SMTP (Simple Mail Transfer Protocol) Protocol SNMP (Simple Network Management Protocol) FTP (File Transfer Protocol) ARP (address resolution protocol) address resolution protocol from the perspective of protocol layered model, TCP / IP consists of four layers: network interface layer, inter network layer, transport layer and application layer. Among them: network interface layer, which is the lowest layer of TCP / IP software, is responsible for receiving IP datagrams and sending them through the network, or receiving physical frames from the network, extracting IP datagrams and giving them to the IP layer. The inter network layer is responsible for the communication between adjacent computers. Its functions include three aspects. 1、 After receiving the request, the packet is loaded into the IP datagram, the header is filled, the path to the destination machine is selected, and then the datagram is sent to the appropriate network interface. 2、 Processing input datagram: first check its validity, and then carry out pathfinding - if the datagram has arrived at the sink machine, remove the header and hand over the rest to the appropriate transport protocol; If the datagram has not arrived at the sink, the datagram is forwarded. 3、 Deal with path, flow control, congestion and other issues. The transport layer provides communication between applications. Its functions include: 1. Format information flow; 2、 Provide reliable transmission. In order to realize the latter, the transport layer protocol stipulates that the receiver must send back an acknowledgement, and if the packet is lost, it must be retransmitted. The application layer provides users with a set of common applications, such as e-mail, file transfer access, remote login and so on. Telnet uses telnet protocol to provide interfaces registered on other hosts in the network. Telnet session provides character based virtual terminal. File transfer access FTP uses FTP protocol to provide file function between machines in the network. We have learned the related concepts of OSI reference model. Now let's take a look at how TCP / IP protocol implements the network model compared with the seven layer protocol reference model. Layer functions in OSI: TCP / IP protocol family
application layer file transfer, e-mail, file service, virtual terminal, TFTP, HTTP, SNMP, FTP, SMTP, DNS, rip, telnet
presentation layer data format, code conversion, There is no protocol for data encryption
there is no protocol for session layer to release or establish contact with other nodes
the transport layer provides end-to-end interfaces TCP, UDP
the network layer selects routing IP, ICMP, OSPF, BGP, IGMP, ARP, RARP for data packets
the data link layer transmits addressable frames and error detection functions slip, CSLIP, PPP, MTU
the physical layer transmits data iso2110 and IEEE802 on the physical media in the form of binary data. Ieee802.2
data link layer includes hardware interface and protocols ARP and RARP
8. In addition to digital currency, blockchain can be applied in many fields. I don't know why you think it is unnecessary. Blockchain can help the real economy rece operating costs, improve manufacturing efficiency, and establish a faster and better credit mechanism. So many advantages are unnecessary. Moreover, digital currency does not exist. HNB, for example, is the next generation of decentralized blockchain economy built in combination with the real economy. I think this kind of blockchain project relying on the real economy can be killed in the current situation of recession.
9. Blockchain is just a technology that anyone can use. Blockchain is a new
application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain interests between different nodes in the blockchain system
there is no underlying platform for blockchain now. If there is R-3, it should be regarded as one. Center, bitcoin and Ethereum are all relatively successful projects
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750