Position: Home page » Pool » Principle of virtual miner

Principle of virtual miner

Publish: 2021-05-08 08:20:53
1. bitcoin is a digital currency based on a specific algorithm. < blockquote >

bitcoin is equivalent to digital gold. As a generally recognized equivalent, gold naturally has monetary properties and has been regarded as a kind of currency since ancient times. Bitcoin was born in 2009 and created by a person named Nakamoto. As the earliest digital currency, it was worthless at the beginning of creation. Until 2017, the highest transaction price of bitcoin exceeded 30000 RMB. The reasons why bitcoin became a valuable digital currency are as follows:

first of all, it is like gold, as a natural mineral, The total amount of bitcoin is limited. Bitcoin can not be over issued according to its own algorithm, so there will be no rapid devaluation of currency e to excessive currency issuance. The number of bitcoin is controlled to no more than 21 million e to the algorithm, so it can not be issued in large quantities, so its value is guaranteed

2.

In short, mining is the use of chips for a random number related calculation, get the answer in exchange for a virtual currency. Virtual currency can be exchanged for the currency of each country through some way. The stronger the computing power, the faster the chip can find this random answer. Theoretically, the more virtual coins can be proced per unit time. Because it's about random numbers, you can only get rewards if you happen to find the answer

In his paper, Nakamoto stated:

"in the absence of central authority, it not only encourages miners to support bitcoin network, but also enables bitcoin's currency circulation system to have the initial source of money injection."

Nakamoto compares the generation of bitcoin by consuming CPU power and time to the consumption of resources by gold mines to inject gold into the economy. Bitcoin mining and node software mainly initiates zero knowledge proof and verification transactions through peer-to-peer network, digital signature and interactive proof system

each network node concts broadcast transactions to the network. After these broadcast transactions are verified by miners (computers on the network), miners can use their own work proof results to express their confirmation. The confirmed transactions will be packaged into data blocks, and the data blocks will form a continuous data block chain

Nakamoto himself designed the first version of bitcoin mining program, which was later developed into the first generation of widely used mining software bitcoin, which was popular from 2009 to mid-2010

each bitcoin node will collect all the unconfirmed transactions and gather them into a data block. The miner node will add a random adjustment number and calculate the SHA-256 hash value of the previous data block. The mining node tries again and again until it finds the random adjustment number so that the hash value is lower than a specific target

extended data

at the earliest, bitcoin miners were mining through Intel or AMD CPU procts. But because mining is a computing intensive application, and with the continuous improvement of mining number and equipment performance, the difficulty graally increases, now using CPU mining has no profit or even loss

as of 2012, since the first quarter of 2013, miners graally began to use GPU or FPGA and other mining equipment [5]. At the same time, a large number of ASIC devices were launched in mid 2013

since July 2013, the computing power of the whole network has shown a straight-line rise e to the large number of ASIC equipment put into operation. Based on the average computing power in July 2013, all CPU mining equipment has been unable to generate positive revenue, and FPGA equipment is close to no revenue

according to the estimation of average computing power in September 2013, the existing small ASIC mining equipment developed for indivials will also be close to no positive revenue in the next 1-2 months. A large amount of computing power is monopolized by cluster ASIC mining equipment with 5 th ash / s or more. Because of no profit, indivial mining is almost squeezed out of mining groups. Some bitcoin miners have raised funds to build machine rooms and install a large number of mining equipment in places where low-cost electricity can be obtained

in order to save the cost of mining, some bitcoin miners make mining programs into malicious programs to infect other people's computers on the network to mine for themselves


3.

Bitcoin mining machine is a kind of computer used to earn bitcoin. This kind of computer generally has professional mining chips and works in the way of burning graphics card, which consumes a lot of power. It is one of the ways to get bitcoin that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server

mining is actually a competition of performance and equipment, and a competition of computing power among miners. Miners with more computing power are more likely to dig bitcoin. With the increase of computing power in the whole network, it is more and more difficult to dig bits with traditional devices (CPU, GPU). People have developed chips specially used for mining. Chip is the core part of mining machine. The process of chip operation will proce a lot of heat, in order to cool down, bitcoin miner is generally equipped with heat sink and fan

< H2 > extended materials:

bitcoin is a kind of virtual currency. Bitcoin mining system is the process of carrying out mathematical operation for bitcoin network through computer hardware. Miners who provide services can get a reward, because the network reward is calculated according to the tasks completed by miners, so the competition for mining is very fierce

bitcoin mining started with low-cost hardware such as CPU or GPU, but with the popularity of bitcoin, the mining process has changed greatly. Nowadays, the mining activities are transferred to the field programmable gate array, and the hash speed can be achieved through optimization. The mining efficiency of this mode is very high

4. Qwertycoin, which has been popular recently, was built by the geek team in Germany for 18 months. It is a secure anonymous coin that focuses on privacy and is used for global
secure payment. Qwc has no pre excavation and ICO, and adopts cryptonight algorithm (supporting mainstream mining machine X3 and A8 +) POW mining.
5. At present, bitcoin is the only reliable virtual currency. Bitcoin is a kind of virtual currency generated by the corresponding algorithm, which needs to use a large number of mining machines, that is, servers for mining. At present, only the virtual currency issued by the central bank is legal in our country, and the others are illegal
I hope I can help you. Thank you for your adoption.
6. The mining of virtual currency is a process of using computer hardware to do mathematical calculation for virtual currency network to confirm transactions and improve security. As a reward for their service, miners can get the Commission included in the transaction they confirm, as well as the newly created virtual currency. Mining is a professional and competitive market. The bonus is divided according to the amount of calculation
however, some Shanzhai coins are purely tools for developers and users to earn money. There are two main ways to make money by using virtual coins: one is mining. For example, if you want to obtain bitcoin, you must use a professional ASIC miner to mine (Avalon miner), and the bitcoin obtained from mining can be traded on the trading platform; The other is trading on the trading platform and making money by using the price difference
7.

Bitcoin mining is a process of using computer hardware to do mathematical calculation for bitcoin network to confirm transactions and improve security

8. There are many applications in the Alipay block chain. For example, the original Dangshan and Wuchang rice in Anhui originally had many fake goods, but since the Alipay chain chain landed the origin of the origin, the whole process was more transparent and monitored. For example, closer to life, everyone love Tmall shopping mall. Tmall started menace from the rear of consumers, which is to relieve consumers' worries. It is the use of Alipay block chain, which is not tampered with, non repudiated, and easy to trace back.
9. Don't play with the kind of currency speculation. Bitcoin was cut by 50% at the beginning of the year. After that, there should be no money to make. This is basically the end. The public platform of SMIC (Changsha) blockchain serves enterprises. It seems that they have access to the government and banks.
10.

The home network is probably the one that people contact most. It usually uses the address beginning with 192.168. In fact, this is a convention. You can also use private IP addresses that start with 172.16 or 10. What is private IP address and NAT address translation

{rrrrrrr}



in short, e to the small scale of the network, the home network usually uses the private network address starting with 192.168. The optical cat dials to obtain a public network address (or the private network address of the operator), and maps to different ports of the public network address through NAT to access the Internet. The NAT mode and routing mode are different< br />

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750