Ethereum 5g
Public chain, also known as "public chain", refers to the blockchain that anyone in the world can enter the system at any time to read data, send confirmatory transactions and compete for bookkeeping. The public chain is generally considered to be "completely decentralized", because no indivial or institution can control or tamper with the reading and writing of data in it. In terms of application, blockchain public chain mainly includes bitcoin, Ethereum, super ledger, most counterfeit currencies and smart contracts. The ancestor of blockchain public chain is bitcoin blockchain, which has the following characteristics:
1, open source code
upload the code to GitHub, and everyone can get complete blockchain data by downloading, Accept the test of the public
2, complete decentralization
anyone can become a node, each node is open, everyone can participate in the calculation of the blockchain, any node is not permanent, but phased, and any center is not mandatory for nodes. Anyone can read and send transactions, and transactions can be effectively confirmed on the blockchain. Anyone can participate in the consensus process. The consensus process determines whether a block can be added to the blockchain and the exact current state. Everyone can get financial reward from it, which is proportional to their contribution to the consensus process. These public chains are generally considered to be "completely decentralized"
3. Developing decentralized applications
through this public chain, developers can easily develop centralized applications. Public chain can protect the rights and interests of users from the influence of program developers

The application prospects of blockchain are mainly in the fields of finance, Internet of things and logistics, public services, digital rights and insurance
1. Blockchain has great potential applications in international exchange, letter of credit, equity registration, stock exchange and other financial fields. The application of blockchain technology in the financial instry can eliminate the third-party intermediary link and realize the point-to-point direct docking
2. Blockchain can also be naturally combined in the field of Internet of things and logistics, which is considered as a promising application direction of blockchain. The establishment of credit resources in the blockchain can double improve the security of transactions and improve the convenience of Internet of things transactions. It can save time and cost for the application of intelligent logistics mode
3. Blockchain is closely related to people's proction and life in public management, energy, transportation and other fields. The decentralized and fully distributed DNS service provided by blockchain can realize the query and resolution of domain name through the point-to-point data transmission service between nodes in the network
4. Through blockchain technology, works can be authenticated to prove the existence of text, video, audio and other works and ensure the authenticity and uniqueness of ownership. After the works are confirmed on the blockchain, the subsequent transactions will be recorded in real time to realize the full life cycle management of digital rights, and can also be used as a technical guarantee in judicial evidence collection
5. In terms of insurance claims, insurance institutions are responsible for fund collection, investment and claims settlement, and often have higher management and operation costs. Through the application of smart contract, there is no need for the applicant to apply or the insurance company to approve. As long as the claim conditions are triggered, the automatic claim settlement of the policy can be realized
extended data:
the core technology of blockchain
1. Consensus mechanism, through the voting of special nodes, completes the verification and confirmation of transactions in a very short time; For a transaction, if several nodes with unrelated interests can reach a consensus, it can be considered that the whole network can also reach a consensus. The goal of blockchain consensus mechanism is to make all honest nodes keep consistent blockchain views
2. Asymmetric encryption requires two keys for encryption and decryption, which are public key and private key. The public key corresponds to the private key. The public key is used in the process of data encryption, and only the corresponding private key can be used to decrypt; On the contrary, the private key is used to encrypt the data, and only the corresponding public key can be used to decrypt the data
the first is the change of technology level. Blockchain technology can protect the right of blockchain, transform the technology level and strengthen the awareness of right
the second is the change at the commercial level. Blockchain digital currency can be applied to the online video instry. Sending video can enjoy token incentive, and blockchain will transform all aspects of the world.
compared with 3G and 4G, China's participation and voice in 5g are constantly improving: in 3G era, Qualcomm is the only company, and 4G network equipment manufacturers including Huawei and ZTE have made great progress. In 5g, not only Huawei, ZTE and Datang have made investment, but also many other manufacturers, especially chip manufacturers, have made great investment, which has driven China's instrial strength, including the number of patents, Compared with 4G, it has a great improvement. In 2016, according to the statistics of the World Intellectual Property Organization of the United Nations, ZTE ranked first in the world with 4123 published PCT applications in 2016, and Huawei ranked second with 3692 patent applications, far ahead of European and American communication giants such as Qualcomm, Ericsson and Nokia
the wave of 5g and Internet of things will open a new round of investment opportunities. According to Hong Kong media, the total investment of China's three major telecom operators in 5g infrastructure is expected to reach US $180 billion in seven years, far exceeding their estimated US $117 billion investment in 4G network in 2013-2020. 5g is one of the most determined directions in the communication instry, which will bring another round of share reshuffle of global main equipment manufacturers. Huawei and ZTE take the lead in the global layout of 5g technology, and their current position in the instry is different from that of 2G, 3G and 4G era.
right click the "windows" button in the upper left corner of the desktop, and select "run" item from its right-click menu to open the "run" window (press windows + R directly to open it)
from the open "run" window, enter "CMD" and press enter to enter the MSDOS interface, as shown in the figure:
after opening the "command prompt" window, enter the command "Ping router intranet address" and press enter to detect the connection between the computer network card and the router
if the feedback information indicates "unable to access the directory host" or "access failure, general error", it indicates that there is a fault in the line connection between the computer network card and the router. At this time, it is necessary to check the connection line
after eliminating the problem of hardware connection line, if the computer is still unable to access the Internet normally, it is recommended to restart the router and switch. The recommended method is: directly disconnect the power supply of the switch, wait for a few minutes, and then power on again
of course, the "MAC address" filtering function on the router side will also cause the computer to be unable to access the network normally, and the "unrecognized network" prompt will also appear. For this, enter the router background web interface, switch to the "behavior management" - MAC address filtering "tab, and clear and check the" enable "item to disable the relevant" filtering mode "
when the router side adopts the "static IP address" allocation mode, we need to manually set the IP address on the computer side. Right click the "network" icon on the right side of the task sample and select "network and sharing center" from its right-click menu
from the open "network and sharing center" interface, click the "change adapter settings" button in the upper left corner to enter, and in the pop-up "network connection" interface, right-click the "unrecognized network" Ethernet icon, and select the "properties" item from its right-click menu
then, from the "Ethernet properties" window, select "TCP / IP V4" and click "properties", check "use the following IP address" and "use the following DNS server" from the new interface, and set the IP address manually
in addition, in view of the problem that win10 is unable to access the Internet, we can also use the "360 DNS optimization" tool to select the best DNS, so as to rece the network delay and ensure the normal and smooth network. Find "DNS optimization" tool directly in "360 security guard" - "more functions" - "network optimization" column
from the open "DNS optimization" window, directly click the "start DNS optimization" button. At this time, the program will automatically detect the network delay of each DNS and give the best DNS scheme. Click the "enable now" button.
Sixin 5g instrial router f-nr100 adopts high-performance instrial grade 32-bit communication processor and instrial grade wireless mole, takes
embedded real-time operating system as software support platform, and provides 1 RS232 (or
RS485 / RS422), 4 Ethernet LANs, 1 Ethernet Wan and 2 (4)
WiFi interfaces at the same time, which can connect serial port equipment, Ethernet network and other devices Ethernet device and WiFi device, realize data
transparent transmission and routing function

