Position: Home page » Ethereum » Leyte belongs to P2P

Leyte belongs to P2P

Publish: 2021-05-14 02:37:41
1. What is a Leyte coin? To put it simply, litecoin (LTC)
was released on October 7, 2011. It is currently the highest market value counterfeit coin, about 1% of BTC's market value, or US $1000W. Compared with BTC, LTC is faster, with an average of 2.5 minutes and 6 confirmations per block in 15 minutes. In addition, the number of LTCs is four times that of BTCs, with a total of 8400w. At present, LTC uses scrypt algorithm, which needs a lot of memory support. The professional mining machine on the market can not be used for LTC mining, only the graphics card
what is the difference between lightcoin and bitcoin
1. Transaction: easier to use, larger volume and greater appreciation potential. The block confirmation time is shorter, which is four times faster than bitcoin. For example, pizza owners are more willing to accept LTC payment to save transaction time< Mining:

special algorithm creates the unique charm of LTC, which is also the key to stand out from Shanzhai coins. Scrypt algorithm uses sha256 as its subroutine, and scrypt itself needs a lot of memory, each hash is used as the input seed, and then needs a lot of memory to store another seed pseudo-random sequence, Generate pseudo-random points of sequence and output hash value. The key is that scrypt algorithm needs a lot of memory while sha256 algorithm does not. So in this era when BTC mining of graphics card is coming to an end, LTC mining is about to usher in a golden period of development. Because of the high cost of memory, any ASIC or FPGA has no advantage over graphics card mining. LTC has advantages, at least in the foreseeable future
3. The biggest threat of bitcoin is 51% attack:
some shanzhais are killed by 51% attack. To be honest, LTC is a worry for the development of LTC and BTC, of course. However, the specific problems they face are different: BTC can avoid 51% attack through technology upgrading (such as end block reconstruction, careful node upgrading, and calculation difficulty), However, there is no way to evade LTC technology. However, e to the scattered computing power of graphics card mining and the increasing difficulty, this problem needs to be paid attention to, but don't worry too much. With the use of ASIC in BTC, the risk of 51% attack is increasing. I hope BTC development team can solve this problem as soon as possible.
2. The concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's idea, open source software was designed and released, and P2P network was built on it. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system
litecoin (abbreviated as LTC, currency symbol: Ł) It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world
lightcoin is inspired by bitcoin (BTC) and has the same implementation principle in technology. The creation and transfer of lightcoin is based on an open source encryption protocol and is not managed by any central organization. Lightcoin aims to improve bitcoin. Compared with bitcoin, lightcoin has three significant differences. First, the lightcoin network can process a block every 2.5 minutes (instead of 10 minutes), so it can provide faster transaction confirmation. Second, the lightcoin network is expected to proce 84 million lightcoins, four times the amount of money issued by bitcoin network. Thirdly, the scrypt encryption algorithm first proposed by Colin Percival is used in lightcoin's workload proof algorithm, which makes it easier to mine lightcoin on ordinary computer than bitcoin. Each Leyte is divided into 100000000 smaller units, defined by eight decimal places.
3.

Litecoin (LTC, currency symbol: 321;) It is a kind of network currency based on "peer-to-peer" technology. It is also an open source software project under MIT / X11 license. It can help users make instant payments to anyone in the world< better use of digital currency trading platform coin exchange

data expansion:

lightcoin is inspired by bitcoin (BTC), and has the same implementation principle in technology. The creation and transfer of lightcoin is based on an open source encryption protocol, and is not managed by any central organization. Lightcoin aims to improve bitcoin. Compared with bitcoin, lightcoin has three significant differences. First, the lightcoin network can process a block every 2.5 minutes (instead of 10 minutes), so it can provide faster transaction confirmation. Second, the lightcoin network is expected to proce 84 million lightcoins, four times the amount of money issued by bitcoin network. Thirdly, the scrypt encryption algorithm first proposed by Colin Percival is used in lightcoin's workload proof algorithm, which makes it easier to mine lightcoin on ordinary computer than bitcoin. Each Leyte is divided into 100000000 smaller units, defined by eight decimal places

4. Brief introction: a kind of currency based on bitcoin protocol, but it does not require extremely high computing power. It can also be mined by ordinary computer. Lightcoin's algorithm comes from the algorithm designed by Dr colinpercival for tarsnap secure online backup service (backup for Linux and other open source operating systems)< Br > release time: lightcoin was released on October 7, 2011 through the open source client on GitHub< Br > maximum supply: 84 million LTC < br > total circulation: 55152208ltc < br > market value: $8882916638
5.

They are:

bitcoin

the concept of bitcoin was first proposed by Nakamoto in 2009. According to Nakamoto's ideas, the open source software was designed and released, and the P2P network was built on it. Bitcoin is a kind of P2P digital currency. Point to point transmission means a decentralized payment system

bitcoin cash

bitcoin cash is a new version of bitcoin with different configurations launched by a small number of bitcoin developers

extended data:

virtual currency refers to non real currency. Well known virtual currency, such as network company's network currency, Tencent company's Q currency, Q point, Shanda company's voucher, Sina's Micro currency (used for micro games, Sina reading, etc.), chivalrous Yuanbao (used for chivalrous road game), silver pattern (used for bixue Qingtian game)

the popular digital currencies in 2013 are bitcoin, Leyte coin, infinite coin, quark coin, zeta coin, BBQ coin, pennies (Internet), invisible gold bar, red coin and prime currency. At present, hundreds of digital currencies are issued all over the world. Popular in the circle & quot; The legend of "bitcoin, Wright silver, infinite copper, pennies aluminum"

6. Whether it is MLM or not depends on its specific operation and operation mode. In the mode of joining a member, the company will return cash when introcing a friend to join a member. In this case, it is necessary to take care of relatives and friends< According to the regulations on the prohibition of pyramid selling, the following acts belong to pyramid selling:
(1) organizers or business operators, through developers, require the developed personnel to pay fees or pay fees in disguised form by subscribing for commodities, so as to obtain the qualification to join or develop other personnel, and seek illegal interests
(2) the organizer or operator, through the development personnel, requires other personnel developed by the development personnel to join, forms the relationship between the upper and lower line, and calculates and pays the online remuneration based on the sales performance of the lower line, so as to seek illegal interests.
7. On October 7, 2011, a network organization announced the release of a new P2P virtual currency, called lightcoin (LTC)

litecoin is short for LTC, and its English name is litecoin. Litecoin stands for lightweight. The meaning behind litecoin is lightweight currency
1. Bitcoin generates a block every 10 minutes, while lightcoin LTC generates a block every 2.5 minutes. This means that lightcoin has faster transaction confirmation efficiency. Bitcoin transfer sometimes takes 1 hour or even longer to arrive at the account, but lightcoin generally takes less than 20 minutes to confirm

2. Since the LTC speed of lightcoin is four times that of bitcoin, and the reward of each block is the same as bitcoin, the total amount of money is four times that of bitcoin, which is 84 million lightcoins, which is higher than that of bitcoin<

3. Bitcoin adopts sha256 encryption algorithm, and lightcoin adopts script encryption algorithm. Compared with bitcoin, lightcoin LTC has a slightly lower computational load, which makes it easier to mine and more suitable for graphics card
(GPU) operation. At the same time, FPGA (field programmable gate array) and ASIC (application specific integrated circuit) implemented for script are better than sha256 used for bitcoin, More expensive.
8. At present, one view of lightcoin is that it will eventually survive and become an auxiliary currency other than bitcoin. There is a famous slogan on the official website of lightcoin: "bitcoin is gold, lightcoin is silver." Another point of view demonstrates that Leyte coin and other counterfeit coins can not succeed from a logical point of view: if the counterfeit coin succeeds, there will be more counterfeit coins, and the proliferation of counterfeit coins will lead to the collapse of value, and people finally find that bitcoin is the best way to maintain its value; If Shanzhai coin is not successful, there will be no imitators, and the failed Shanzhai coin will eventually disappear. The author tends to think that cryptography currency will eventually become an important member of the world's mainstream currency, and bitcoin is not necessarily the only one, just like the coexistence of US dollar, euro, yen and RMB in real life. There will not be only one kind of cryptocurrency, but there will not be innumerable kinds in the world. In the end, only bitcoin and the other 2-3 counterfeit currencies will survive. In fact, the key to the survival of an open source currency is the public's confidence in it, which comes from its long-term and stable use. In the two years since the invention of Leyte coin, public confidence in it has been graally established. Whether this confidence can be maintained or not, there are still many unstable factors. One of them is that lightcoin is more vulnerable to 51% attacks than bitcoin. Previously, FTC (feather coin), which uses the same algorithm as Wright coin, has been attacked by 51% and led to the collapse of public confidence. In fact, FTC is graally withdrawing from the stage of history. Whether it can resist 51% attacks and survive is a problem that lightcoin must solve. As for whether Leyte can replace bitcoin, we should go a step further: is there a counterfeit coin that can eventually replace bitcoin? The answer is simple: No. In the future, there will probably be a variety of cryptography currencies in the world, but any kind of counterfeit currency can not replace the mainstream position of bitcoin, no matter how excellent its algorithm is compared with bitcoin. We have to admit that bitcoin is not perfect compared with many counterfeit currencies. Its confirmation time is as long as 10 minutes, which is really time-consuming for transactions; 51% attack the sword of Damocles, which is always hanging overhead; From the perspective of environmental protection, the energy consumed by mining is almost wasted. Therefore, many new counterfeit currencies claim that their advantage lies in making up for the defects of bitcoin. But some of the flaws in bitcoin itself are not real. In other words, these defects are deliberately preserved by its inventors after weighing the pros and cons. For example, the 51% attack is rooted in the distributed mining characteristics of bitcoin, a P2P currency. While ripple's XRP currency doesn't need to worry about 51% attacks, and it doesn't need to spend a lot of energy on mining. However, its mode of relying on trust gateway for transaction and centralized currency issuance means that it is very easy to be controlled by government agencies. In addition, even if the design of some counterfeit coins is more ingenious, we should also understand the fact that no matter how excellent the indicators of a proct are, it can not guarantee that it can beat its competitors and achieve success.
9. Illegal, belonging to the network pyramid scheme, there are dozens of other kinds, such as "mark money", "black tea", "Baichuan money", "dark money", "3M", "carat money", "petroleum money", "Huaqiang money", "U money", "Morgan money", "Fuda compound interest financing", "WorldCom", "21st Century Fox" and "Wanxi financing".
10. Peer to peer (P2P) can be simply defined as sharing computer resources and services through direct exchange, and the network formed by the application layer of P2P computing model is usually called peer-to-peer network. In the P2P network environment, thousands of computers connected to each other are in a peer-to-peer position. Generally speaking, the whole network does not rely on a dedicated centralized server. Each computer in the network can not only act as a network service requester, but also respond to the requests of other computers, providing resources and services. Usually these resources and services include: information sharing and exchange, computing resources (such as CPU sharing), storage sharing (such as cache and disk space use), etc< The number of computers in the network is relatively small. Generally, the number of computers in the peer-to-peer network is less than 10, so the peer-to-peer network is relatively simple
2. The distribution range of P2P network is relatively small, usually in an office or a home
3. The network security management is decentralized, so the data confidentiality is poor
4. Sharing resources and services through the most direct exchange, using non centralized, equal status of each node, as a server and client
because peer-to-peer networks do not need special servers for network support, and do not need other components to improve the performance of the network, so the networking cost is low, and it is suitable for small and medium enterprises or families with less network<

2. Network steps editing
1. Network topology
2
3. Select the network connection device according to the type of transmission medium, network speed, network coverage, etc
4. Hardware connection
5. Installation of network software
6. Set up resource sharing< The current communication modes include client / server, Br
Title
owser / server and slave / master. For example, both intranet and Internet are based on client / server and browser / server mode, while the early host system is based on slave / master mode. The characteristics of these modes are: they are all application oriented, there must be an application server in the network, the user's request must be completed through the application server, and the communication between users must also pass through the server. In peer-to-peer network, users can communicate directly, share resources and work together<

4 software type editing
peer to peer network software mainly includes the following types:
1. Instant messaging software, such as ICQ, anychat, etc. Two or more users can communicate through text, voice or file, and even communicate with mobile phones
peer to peer network
2. Software for sharing file resources, such as Napster and Gnutella. Users can directly download or upload files from any PC installed with similar software, and retrieve and the shared files
3. Game software. Many current online games are realized through peer-to-peer network
4. Storage software, such as FARSITE, is used to store storage objects on the network
5. Data search and query software, such as infrasearch and pointera, is used to complete information retrieval in peer-to-peer networks
6. Collaborative computing software, such as netbatch, can connect thousands or tens of thousands of PCs and use their idle time for collaborative computing
7. Collaborative processing software, such as groove, can be used for enterprise management
8. P2P distributed computing
9, bitcoin, lightcoin and other virtual digital currencies are all built on the P2P network<

5 technical standard editor
there is no unified standard for peer-to-peer networks in the world
in August 2000, a P2P working group was established, with members including Intel, IBM and HP. The other main obstacles to the development of peer-to-peer network are right, network bandwidth, management and security. How to connect phones, mobile phones, household appliances and instrial equipment is also a problem to be solved in peer-to-peer networks
domestic
the domestic peer-to-peer network market started in 2000
there are two main applications in China: file sharing and collaborative work
in terms of file sharing, a number of domestic companies have launched their own procts. At present, the main Chinese peer-to-peer network software include workslink, ezpeer, Jelawat, Kuro and toperson, as well as PASP_ E-school real-time interactive multimedia online classroom teaching software. In the future, enterprise peer-to-peer network application will be a hot spot, which will mainly solve the problems of enterprise internal transaction processing collaboration, enterprise portal, enterprise virtual private network (VPN), remote interaction and broadband applications. Domestic enterprise application procts based on peer-to-peer network technology include km server, SME knowledge management software, etc.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750