Advantages of decentralized network
centralization is first reflected in diversification. In the Internet world, there are no more than several portals has the final say. Various websites have begun to voice their own voice, express different choices and different hobbies, and these websites are distributed in every corner of the Internet world. Br > decentralisation is followed by the centralization of people, and decentralisation of content has become a trend, and people have become the key force to determine the survival of websites. It's a great change to build a website with indivials who lack interaction to gather talents and contribute their wisdom in the form of a circle. That is user-oriented, humanized< < br > decentralized content: < br > decentralization is the form of social relationship and content generation formed in the development of the Internet, which is a new network content proction process relative to "centralization"< Br > compared with the early Internet (Web1.0) era, today's Web (Web2.0) content is no longer proced by professional websites or specific groups of people, but is created by all Internet users with equal rights. Anyone can express their views or create original content on the Internet to proce information together< Br > with the diversification of network service forms, the decentralized network model is becoming clearer and more possible. After the rise of Web2.0, the services provided by Wikipedia, Flickr, blogger and other network service providers are decentralized. Any participant can submit content, and Internet users can create or contribute content together< After that, with the emergence of more simple and easy-to-use decentralized network services, the characteristics of Web2.0 became more and more obvious. For example, the birth of services more suitable for ordinary Internet users, such as twitter and Facebook, made it easier and more diversified to proce or contribute content to the Internet, thus enhancing the enthusiasm of Internet users to participate in the contribution and recing the threshold of procing content. Eventually, every netizen becomes a tiny and independent information provider, making the Internet more flat and content proction more diversified.
if blockchain technology is decentralized, it means that there is no central server responsible for unified management
point to point encryption is mainly the exchange of secret keys. It's hard for this technology to be absolutely safe. In the future, peer-to-peer encryption will create a more private communication mode for us
finally, security is relative and costly. The more secure, the more complex.
1. Efficiency is different: the efficiency of decentralized network is higher than that of centralized network, but conversely, the security of centralized network is higher. On the whole, centralized network is suitable for high security applications
2. Different characteristics: centralized network means that each time two client computers communicate with each other through the server. The decentralized network is the initial need to go through the server, later communication does not need the server
3. Different costs: the characteristics of collective maintenance of blockchain can rece a lot of costs. The centralized network involves the maintenance, confidentiality, operation and so on of many systems, which must require a lot of human, financial and material resources. These things do not exist for the decentralization of blockchain, so they can save a lot of costs
extended materials:
precautions:
in the aspect of blockchain governance, an interesting trend recently is the re emergence of online virtual currency holder voting as a multi-purpose decision-making mechanism. Sometimes the vote of the coin holder is used to decide who runs the super node of the network (e.g. dpos in EOS, Neo, lisk and other systems), sometimes the protocol parameters are voted (e.g. the upper limit of Ethereum fuel supply), and sometimes the vote and direct application of approval (e.g. tezos) protocol upgrade are also concted
in all these cases, voting is automatic, and the protocol itself contains all the logic needed to change the verifier set or update its own rules, and automatically responds to the voting results
