Libp2p Ethereum
BTC, usdt, ETH, BCH, LTC mean respectively:
1, BTC
bitcoin. The concept was first proposed by Nakamoto in 2009. According to Nakamoto's idea, the open source software is designed and released, and the P2P network is built on it. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system
2, usdt
TEDA currency is a virtual currency that links cryptocurrency with legal currency US dollar, and is a virtual currency kept in foreign exchange reserve account and supported by legal currency
EthEthereum is an open source public blockchain platform with intelligent contract function, which provides decentralized Ethereum virtual machine to process point-to-point contract through its special cryptocurrency ether
4. BCH
bitcoin cash is a new version of bitcoin with different configurations launched by a small number of bitcoin developers
at 20:20 on August 1, 2017, bitcoin cash starts mining, and each bitcoin investor's account will have the same amount of bitcoin cash (BCH)
5, LTC
litecoin, abbreviated as LTC, currency symbol: & # 321;; It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world
source of reference: network bitcoin
source of reference: network TEDA coin
source of reference: network Ethereum
source of reference: network bitcoin cash
source of reference: network letcoin
source of reference: Network
if you want to understand the content of blockchain bitcoin, it is recommended to go to relevant websites to have a more comprehensive look, such as bitmaster and Babbitt forum.
bitcoin does not rely on specific currency institutions to issue. It is generated through a large number of calculations of specific algorithms. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction
bitcoin is very similar to cash
the advantages of bitcoin are: no freezing, no tracking, no taxes, and extremely low transaction costs. Compared with people who speculate in currency, it is wealth, and people outside the currency circle may think it is a fraud
bitcoin, Ethereum, bitcash, EOS, REBO, etc. are the mainstream digital currencies, which can be properly invested. All transactions have risks. You can invest cautiously. You can search online for fire coin, coin security, OK, dobby trading platforms, etc. all of which can trade bitcoin. These are relatively large trading platforms, investing in mainstream digital currencies, and Don't invest in counterfeit money or air money.
what is stun
the full name of stun protocol is simple transverse of user datagram protocol through network address translators. Its main function is to detect whether it is behind NAT, and if it is behind NAT, what is the address and port after NAT conversion, In addition, the type of NAT can be detected
basic idea
install a stun client in the private network and a stun server in the public network. The stun protocol defines some message formats, which are generally divided into request / response. The client sends a request to the server, and the server sends a response to the client. The principle is roughly as follows: after the server receives the UDP packet from the client, the server will send the address and port of the packet back to the client by using UDP, and the client will compare these addresses and ports with the IP address and port of the local machine. If they are different, they are behind NAT, otherwise they are in front of NAT<
what is turn.
the full name of turn is traversal using relay NAT, that is, traversing NAT through relay mode. In short, traversing is realized through a server transfer.
what is NAT
nat (network address translation); The private network (local area network) address is transformed into the public network address to realize the network access function
