Position: Home page » Pool » Mining machinery policy

Mining machinery policy

Publish: 2021-04-28 13:16:04
1.
  1. at present, according to the official income method of fil, there are three ways: one is to provide hard disk storage to obtain income (storage miner), the other is to provide bandwidth resources to obtain retrieval income (retrieval miner), and the third is mining and packing block income (storage miner). Based on the above rules, only enterprise level and cloud mine pool can meet the three kinds of income at present

    In terms of configuration, based on mining rules, the following configuration suggestions are given:

    CPU: 4 cores or above, Inteli series is the best, memory is at least 8g, if you want to get retrieval revenue, memory needs more than 16g, hard disk space is recommended to be more than 4T to get storage revenue

  2. household mining machine (current situation analysis, There are the following disadvantages:
    A. more than 95% of domestic IP addresses are not static, which leads to mining default platform withholding pledge token

    B. you need to buy pledge token, and you need to spend some extra money to buy token to start

    C. the sound of power outage is loud, and the events affecting neighbors lead to no income

    D. unfortunately, your family is in the second, third, fourth and fifth tier cities, Basically, we can't get the order

    e. the home miner advertised by a Yingkuang machine can't mine and can be retrieved. The retrieval needs an uplink bandwidth of at least 10m, and the space-time proof (IPFs anti cheating mechanism) may need a higher stable bandwidth of more than 20m. Who's community's network can meet the above requirements within 24 hours, so the retrieval is also very difficult

    It is said that the investors who started brainwashing and bought the household miner in March of 18 bought a small box at 5-10 times the price and put it at home as a decoration, so the household miner is used to cut leeks, because it has a low threshold, and then you can hardly dig fil

  3. Enterprise trusteeship miner

    a, In terms of hardware configuration, the cost of setting up a mine is relatively high. If the leasing meets the national application conditions, the purchase price of a single configuration combination is about 3-10 times of the cost price, which is relatively high

    B. the same computer room is generally leased to multiple enterprises for storage and application, which will lead to multiple operating systems running at the same time, Lack of unity, easy to be attacked by hackers

    C. vicious competition of all mining machines in the mine, internal consumption of computing power, unbalanced order distribution, resulting in some machines grabbing orders and some machines not having orders, and Unbalanced Income

    D. different independent IPFs mining machine systems, it is difficult to unify parameter grabbing orders in real time

    E. unable to resist regional policy risks, For example, the national policy risk

    F. the biggest advantage of enterprise level is high configuration, centralized basic management, and room conditions are superior to household mining machines. At the same time, the above situation is accompanied by

  4. cloud mining pool

    A. computing power leasing, the price is relatively low for hosting mining machines, The leasing time is controllable

    B. the IDC rooms of general cloud mine pool are defense class, which can prevent hackers from intruding

    C. the output of the mine pool is shared throughout the network, and there is no worry about the failure of a purchased node, and there is no income

    D. the hardware input is allocated throughout the network, and the personal input-output ratio is cost-effective

    E. unified scale management, and there is no single node debugging, Single maintenance status

    D. node layout is generally multi city and multi country, regional policy risk

    E. third party real-time monitoring, high degree of information disclosure, always know the output status of ore pool

    F. unified operation and maintenance system, real-time unified parameter adjustment, pricing strategy, order grabbing strategy, storage strategy

  5. for the above analysis, At present, the existing cloud mining pools in China, such as a cat cloud mining pool, a Yingyun node, an inter cloud mining pool, and a chain cloud mining pool, claim to be globally distributed in the publicity. After actual verification, their mining pools are either small private mines established by themselves or professional mining machine trusteers cooperated in China, and most of them are limited to China, Because the construction cost of the mine pool is very high, and the cost of cooperation with domestic cloud service providers is even higher, we should set up our own small mine pool to publicize the global layout

    currently, it is recommended to learn about "Noah cloud pool". After verification, the channel cloud service providers of Noah cloud pool are currently cooperating in Hong Kong, Singapore, Germany and Poland, and their technical background is relatively strong. Please check other relevant information

2.

1、 Mining principle

at the beginning, we could dig bitcoin with the computer CPU. The founder of bitcoin, Nakamoto Tsung, g out the world's first creation block with his computer CPU. However, the era of CPU mining has long passed, and now bitcoin mining is the era of ASIC mining and large-scale cluster mining

looking back on the mining history, bitcoin mining has gone through the following five times: CPU mining → GPU mining → FPGA mining → ASIC mining → large-scale cluster mining, The mining speed changes are as follows:

CPU (20mhash / s) → GPU (400mhash / s) → FPGA (25ghash / s) → ASIC (3.5tash / s) → large scale cluster mining (3.5tash / s * x)

mining speed, which is called computing power in professional terms, that is, the ability of computer to generate hash collisions per second. In other words, how many hash collisions can our miner do per second is the calculation force. Computing power is the ability to dig bitcoin. The higher the computing power, the more bitcoin you dig, the higher the return

in the world of bitcoin, a data block is recorded about every 10 minutes. All mining computers are trying to package the data block and submit it, and the person who successfully generates the data block will get a bitcoin reward. Initially, bitcoin rewards of 50 bitcoins could be generated about every 10 minutes. But the payment is halved every four years, and now the bitcoin network can generate 25 bitcoins every 10 minutes

to successfully generate data blocks, miners need to find the effective hash value. To get the correct hash value, there is no shortcut. You can only guess. The process of guessing is the process of computer random hash collision. If you guess correctly, you will get bitcoin

Mining method: from a miner to a large-scale mine, you need to prepare a miner, a computer that can connect to the Internet, an AUC, a raspberry pie, power supply and all kinds of connecting lines, etc. The connection order of various devices is network cable - & gt; Raspberry pie - & gt; Microusb cable - & gt; AUC-> 4Pin cable - & gt; Mining machine and power supply

< EM > Figure 3: Mine Map (scale of tens of thousands of mining machines) < / EM >

nowadays, the profit space of small and medium-sized absenteeism who take one mining machine home or deploy a small family workshop (dozens of mining machines) is very limited, and the mining instry is graally concentrating on enterprises and teams with low-cost power resources and professional deployment ability

there are many factors that affect the mining revenue, such as the performance and power consumption of mining machinery, the computing power and difficulty of the whole network, the deployment and operation and maintenance capacity of the mine, the availability of low-cost electricity resources, and the currency price and policy guidance, etc. At present, excellent mining enterprises have the ability of chip research and development, a lot of computing power, professional mine deployment and operation experience, etc. in the future, resources and computing power will be more and more concentrated in these mining enterprises

2. Mine pool

in addition to the above equipment, you also need a necessary tool - mine pool. The function of the mine pool is to gather a large amount of mineral computing power, increase your probability of getting bitcoin, and at the same time, distribute your future bitcoin income to your account in advance

the simple explanation is as follows: now the bitcoin network generates a block every 10 minutes, which contains 25 bitcoins. Suppose there are 1W people in the world participating in mining, then in these 10 minutes, only one lucky person has taken these 25 bitcoins, and the others have nothing. The principle of the mine pool is that everyone mines in teams and distributes according to the agreed distribution method, so that the income of the miners' bitcoin tends to be stable and the risks of the miners are reced. Let's take the most common PPS allocation method as an example. Suppose that your computing power is 10t, and the computing power of the whole mine pool is 100t. Your computing power accounts for 1 / 10 of the total computing power of the mine pool. Suppose that the mine pool can generate 10 bitcoins a day, then you can get 1 bitcoin a day

3. Cloud computing power

in reality, the supply of mining machines often exceeds the demand, and at the same time, the delivery of mining machines needs a long waiting period. Miner installation, commissioning, maintenance and other processes are very complex, which requires a lot of energy. Miners have to enre the noise and heat of miner. For miners, the biggest cost is not these, but the high electricity charges consumed by mining. The profit space of small and medium-sized miners is getting smaller and smaller, even negative

Mining income and risk mining income can be calculated by the following formula:

Mining income = generated bitcoin * currency price - mining machinery cost - electricity fee - custody fee

if you are just a small miner, generally you only need to dect mining machinery cost and electricity fee

Mining risks are as follows:

< UL >
  • at present, the number of bitcoin is less than 4.5 million. If we do not issue additional bitcoin, the price of bitcoin will fluctuate, and the price callback will lead to the extension of the payback cycle

  • mining difficulty improvement at present, our machines can meet the market demand

  • the risk of power outage

  • < UL >

    < EM >
    < / EM >

    3. Smart people will choose to refit mining machine for other purposes, or put it at home as a souvenir, which is also good.
    4.

    GEC mining machine is a pyramid scheme. The new trading mode of "GEC environmental protection coin" has been widely spread. The mode takes "ecological environment protection", "zero investment", "zero risk" and "high income" as labels, and draws the development capital chain down the line by pulling people into the partnership. Environmental protection coins can basically be classified as disks and circles. The appearance of disk circle is virtual currency, and the core is capital disk. The former's income comes from the later's capital. This model is not only suspected of ICO in disguise, but also suspected of MLM

    there is also a way of "cloud computing power" in the trading mode of "GEC environmental protection coin"“ The "cloud computing power" has been running for 1440 hours with an expected annual rate of return of 200%, 2160 hours with an expected annual rate of return of 250%, 4320 hours with an expected annual rate of return of 300%, 8640 hours with an expected annual rate of return of 350%

    but "cloud computing power" means that investors spend money to buy the lease right of mining machinery for a certain period of time, and the professional mining machinery management platform provides the lease service, which is a bit similar to the concept of crowdfunding. If the price of virtual currency continues to fall, mining will not make money

    {rrrrrrr}

    extended information:

    Article 7 of the regulations on the prohibition of pyramid selling

    the following behaviors belong to pyramid selling behaviors:

    (1) the organizer or operator, through the development personnel, requires the development personnel to develop other personnel to join, To calculate and pay remuneration (including material rewards and other economic benefits, the same below) to the developing personnel based on the number of the personnel they have directly or indirectly developed in a rolling way, so as to seek illegal benefits

    (2) the organizer or business operator, through the development personnel, requires the personnel to be developed to pay fees or pay fees in disguised form by way of subscribing for commodities, so as to obtain the qualification of joining or developing other personnel to join and seek illegal interests

    (3) the organizers or business operators, through the development personnel, require the development personnel to develop other personnel to join, form the relationship between the upper and lower line, and calculate and pay the online remuneration based on the sales performance of the lower line, so as to seek illegal interests

    Article 8 the administrative department for Instry and Commerce shall, in accordance with the provisions of these regulations, be responsible for investigating and dealing with the pyramid selling activities specified in Article 7 of these regulations

    5.

    No illegal
    in the bitcoin risk notice jointly issued by the people's Bank of China and other five ministries and commissions at the end of 2013, bitcoin is clearly defined as a special Internet commodity, and people can buy and sell it freely at their own risk. But it denies the monetary nature of bitcoin< The Article 143 of the general provisions of the civil law stipulates that "the civil legal act with the following conditions is valid:
    (1) the actor has the corresponding capacity for civil conct< (2) the expression of intention is true< (3) it does not violate the mandatory provisions of laws and administrative regulations, public order and good customs. " The announcement of the seven ministries and commissions is neither a law nor an administrative regulation, and can not be used as a legal basis for judging whether a civil juristic act is valid or not; The law does not go back to the past. Therefore, the bitcoin transaction has legal effect, and the bitcoin obtained from the transaction is protected by law. Therefore, legal disputes arising from trading activities, including civil or criminal cases, should be subject to jurisdiction. Courts or public security organs can not refuse to accept bitcoin because they think bitcoin is not protected by law

    extended information:

    {rrrrrrr}

    transaction mode

    bitcoin is e-cash similar to e-mail, and both parties need "bitcoin wallet" similar to e-mail and "bitcoin address" similar to e-mail address. Just like sending and receiving e-mail, the remitter pays bitcoin directly to the other party through a computer or smart phone according to the recipient's address. The following table lists some websites that download bitcoin wallets and addresses for free

    a bitcoin address is a string of about 33 characters long, consisting of letters and numbers, always starting with 1 or 3, such as & quot& quot; Bitcoin software can generate address automatically, and it does not need to exchange information online when generating address, so it can be offline [2]. More than 2 bitcoin addresses are available. Figuratively speaking, there are about two grains of sand in the world. If there is an earth in each grain of sand, then the total number of bitcoin addresses far exceeds the number of all the sand on all these "earths"

    the bitcoin address and private key appear in pairs, and their relationship is just like the bank card number and password. A bitcoin address is like a bank card number, which records how much bitcoin you have on it. You can generate bitcoin address at will to store bitcoin. When each bitcoin address is generated, a corresponding private key of the address will be generated. This private key proves that you have ownership of the bitcoin at that address. We can simply understand the bitcoin address as the bank card number, and the private key of the address as the password of the corresponding bank card number. Only when you know the bank password can you use the money on the bank card number. Therefore, please keep your address and private key when using bitcoin wallet

    after the transaction data of bitcoin is packaged into a "data block" or "block", the transaction is initially confirmed. When a block is linked to a previous block, the transaction is further confirmed. After six block confirmations in a row, the transaction was irreversibly confirmed. Bitcoin P2P stores all transaction history in a "blockchain.". The blockchain continues to extend, and once new blocks are added to the blockchain, they will not be removed. Blockchain is actually a distributed database composed of a group of scattered client nodes and all participants, which is a record of all bitcoin transaction history. Nakamoto predicts that when the amount of data increases, users hope that not all the data will be stored in their own nodes. In order to achieve this goal, he uses the hash function mechanism. In this way, the client will be able to automatically eliminate those parts that it will never use, such as some very early bitcoin transactions

    6. Bitcoin mining is not illegal, as long as you use your own money, then you don't have the law to buy the ore. mining bitcoin mining is not illegal, as long as you use your own store and your own money, then you are not protected by law to dig the ore.
    7. To tell you the truth, I'd better not give it casually. someone else. Do other things. It will hurt your life, maybe.
    8. If you want to install the ghost directly with the packaged ghost, you can download the ghost version. What you download may be a clean installation. This kind of installation system needs to be slower. After that, you have to install various applications and drivers that you don't have, but it's more stable. I prefer to use the clean version. The driver package of ghost is too large, and the drivers are all available, but the driver you find is not necessarily the most perfect, let alone the latest, All kinds of software will have to be upgraded after installation
    9. "0" euro is not used for payment, it is just a commemorative currency

    in order to commemorate the 500th anniversary of Martin Luther's religious reform, the German interfaith Association issued 10000 euro notes with denomination of "0" in 2015 after its previous application and approval from the European Central Bank, on which the portrait of Martin Luther and his famous words are printed.
    Hot content
    Inn digger Publish: 2021-05-29 20:04:36 Views: 341
    Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
    Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
    Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
    Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
    Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
    Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
    Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
    Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
    Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750