Blockchain is an integrated system of multiple computers
blockchain is the underlying technology of bitcoin, like a database ledger, recording all transaction records. Because of its safety and convenience, this technology has graally attracted the attention of the banking and financial instry
in April 2018, a group of scholars from Oxford University announced the establishment of Woolf University, the world's first blockchain University
in a narrow sense, blockchain is a kind of chain data structure that combines data blocks in chronological order in a sequential way, and it can not be tampered with and forged by cryptography
broadly speaking, blockchain technology is a new distributed infrastructure and computing method, which uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses intelligent contract composed of automated script code to program and operate data.
blockchain (English: blockchain or block chain) is a kind of distributed database . You may have heard about bitcoin, which is the core technology. Blockchain is a series of data blocks generated by cryptography. Each data block contains the information of a network transaction, which is used to verify the validity of the information and generate the next block. In a popular concept, blockchain is an account that everyone can keep. In a company or organization, most people only have the right to keep accounts, while only a few people with professional training have the right to keep accounts. Of course, blockchain is not an account book in the traditional sense. It has the following three key points in technical principle: first, decentralization. In a network practicing blockchain technology, each computer covered by it can read and add records. From the perspective of account book, they are the people who keep accounts together, and there is no authoritative person to guide and correct them. Second, asymmetric encryption. Although everyone can remember this account, they will not be able to read it unless they are in the Bureau. Because, in the accounting process, everyone follows the unified encryption rules, but when reading, they must use their own unique decryption method. Therefore, although everyone keeps this constantly updated account, the part they can read is only the one they can decrypt, that is, the part related to themselves. Third, time stamp. That is, time stamp (English: timestamp), refers to the string or coded information used to identify the recorded time and date. Each block on the blockchain is arranged in sequence according to the time it is generated, and is confirmed by collective authentication. Moreover, previous records cannot be modified. Just like in an account, we can index and verify the previous content through the records after a point in time. Once these contents are confirmed, it will be more difficult to tamper with them
blockchain technology is to maintain a growing distributed database of data records. These data are associated with all the data written before through cryptography technology, which makes it difficult for the third party or even the owner of the node to tamper with. Block contains the data that need to be saved in the database, and these data are written into the database through block organization. Chain usually refers to the use of Merkle tree and other methods to check whether all the current blocks have been modified. This is familiar to code farmers who have used git for a long time. Recall how to modify git's history
blockchain technology is mainly divided into three categories, which are open, collaborative and private
public blockchain
example: bitcoin, Ethereum frontier. The data on the public blockchain can be accessed by all people, and all people can issue transactions waiting to be written into the blockchain. Participants in the consensus process (corresponding to the miners in bitcoin) maintain the security of the database through cryptography technology and built-in economic incentives. Open blockchain is completely distributed
highlights and pain points: the open blockchain is completely distributed and has all the characteristics of bitcoin. However, it needs sufficient cost to maintain the system operation and relies on built-in incentives. At present, only bitcoin in the public blockchain is safe enough. If the algorithm is the same as bitcoin, it will be safe; There are no built-in rewards, but they are not; It's easy to concentrate on the attack of computing power (for example, as long as the raid sweeps goods and a large number of graphics cards), and take jujube pills. The more valuable the data on the open blockchain is, the more important it is to examine its security, transaction cost and system scalability
federated blockchain
example: audit system tried by hyperledger and Deloitte. The nodes participating in the blockchain are selected in advance, and there is likely to be a good network connection between the nodes. Other consensus algorithms without workload proof can be used on such a blockchain. For example, a blockchain has been established among 100 financial institutions, and more than 67 institutions must agree to reach a consensus. The data on such a blockchain can be public or internal to these node participants. Distributed in a partial sense
highlights and pain points: collaborative blockchain can achieve a good connection between nodes, only need a little cost to maintain operation, provide rapid transaction processing and low transaction costs, has good scalability (but the scalability will decline with the increase of nodes), and data can have certain privacy. Developers have the ability to change the protocol under the consensus. There is no problem with bitcoin hard fork, but it also means that everyone can tamper with the data together under the consensus. Collaborative blockchain also means that the application scope of this blockchain will not be too wide, lacking the network propagation effect of bitcoin
private blockchain
example: Eris instries. The participating nodes are only users themselves, and the access and use of data have strict authority management. Most of the blockchain technologies recently announced by some financial institutions for internal use are vague, but they are probably all within this scope
highlights and pain points: private blockchain is actually a confusing term. Such a system is nothing more than a shared database in the traditional sense. Merkle tree and other methods are used to try to show that the data in it is verifiable. There are already mature solutions for such databases, and Merkle tree is only one of many mature solutions. It's easy for these projects to be "like eggs". Because the user has the final say, the data inside can not be changed, and there is not much protection for the third party. Therefore, many private blockchains exist by attaching to bitcoin, such as recording system snapshots to bitcoin regularly
however, as Ethereum and hyperledger fabric have the best support for go language, go language must be learned
next, I'll give you the answer to another question, hoping to help you
Background: I started to study blockchain technology in 2015, so I have a certain understanding of blockchain
statement: it is estimated that everyone who sees this question wants to get started with blockchain, so this answer is mainly an introction at the entry level. It's just an introction at the entry level, which is not suitable for blockchain practitioners to improve their learning.
once the information is recorded in the blockchain, it will become permanent and impossible to change or delete. If a user wants to create a new entry (called a block) to the ledger, other users in the network must verify the information they propose to add. Each computer on the network (called a "node") compares the submitted information with the existing ledger. If most nodes can verify the accuracy of the new block of information, it is allowed to become a permanent part of the ledger. Because the blockchain network is composed of computers in multiple locations, even if a certain network is destroyed, the security of the whole data will not be affected
to understand the working principle of blockchain technology, we must first know the data type of each block in Dimon. Except for transaction data, all blocks contain digital fingerprints called hashes. Each unique hash is generated based on the information within the block, so if the data is changed in any way, the hash will change automatically. This cryptography is the key to decentralized authority of blockchain. The new block also contains the imprint of the hash assigned to the previous block and the chain of entries being audited. If the user attempts to tamper with the block data, the hash cannot be authenticated and the entry is rejected.
computer network technology
computer network technology is the combination of communication technology and computer technology. Computer network is a collection of scattered and independent computers connected to each other according to network protocol. The connecting medium can be cable, twisted pair, optical fiber, microwave, carrier or communication satellite. Computer network has the function of sharing hardware, software and data resources, and has the ability of centralized processing, management and maintenance of shared data resources. Computer network can be classified according to different standards, such as network topology, network scope and interconnection distance, network data transmission and network system owner, different service objects, etc. It is generally divided into: (1) local area network (LAN) 2) Man 3) Wide area network (WAN). The geographical scope of local area network is generally within 10 kilometers, which belongs to a small area network formed by a department or a group of groups, such as a school, a unit or a system. Wan covers a wide range, generally from tens of kilometers to tens of thousands of kilometers, such as a city, a country or an intercontinental network. At this time, the transmission devices and media used for communication are generally provided by the telecommunications department, which can achieve a wide range of resource sharing. Metropolitan area network is between LAN and WAN. It usually covers a city or an area, ranging from tens of kilometers to hundreds of kilometers.