Mining data model
the feature of sha256 algorithm used in bitcoin is that it's easy to verify the known answers correctly, but it's very troublesome to get the answers, and you need to try them one by one. The miner who got the answer first was recognized by everyone as having snatched the right to keep accounts, and the reward was given to him. Let's continue to grab the bookkeeping right of the next question
simply speaking, the significance of these calculations only lies in ensuring the stability and security of the whole system, and has no more significance. It is not comprehensive to regard bitcoin as a by-proct of computing. The generation and issuance of bitcoin, all the transactions and circulation in the bitcoin chain, and the stability of the bitcoin system are all the purposes of computing. Of course, in addition to maintaining the system, it does not proce other value and procts. This is also a black spot where bitcoin is accused of not being environmentally friendly and wasting resources
in general, bitcoin, as a milestone blockchain digital currency, comes from the huge value of a large amount of computing power investment and user trust. There is no doubt about that.
Blockchain is a term in the field of information technology. In essence, it is a shared database. The data or information stored in it is characterized by "unforgeability", "trace in the whole process", "traceability", "openness and transparency" and "collective maintenance". Based on these characteristics, blockchain technology has laid a solid "trust" foundation, created a reliable "cooperation" mechanism, and has broad application prospects
on January 10, 2019, the state Internet Information Office issued the regulations on the management of blockchain information services. In October 24, 2019, ring the eighteenth collective learning of the Central Political Bureau, general secretary Xi Jinping stressed that "block chain as an important breakthrough in core technology and independent innovation", "accelerating the development of block chain technology and instrial innovation". "Blockchain" has entered the public field of vision and become the focus of social attention
extended data:
related extension: blockchain financial application:
since 2016, the major financial giants have also carried out blockchain innovation projects to explore the possibility of applying blockchain technology in various financial scenarios. In particular, Puyin group took the lead in creating a "blockchain +" standard digital currency
standard digital currency refers to the process of assets identification, evaluation, right confirmation and insurance completed by a third party organization, which is written into the blockchain through careful digital algorithm to form the standard corresponding relationship between assets and digital currency, which is called standard digital currency
in order to realize the great leap forward development of blockchain finance, promote the new development of China's economy, accelerate the circulation of global assets, and realize the dream of rejuvenation that has been struggling for generations, Puyin group will hold the Guiyang strategic development ceremony of Puyin blockchain finance in Guizhou on December 9, 2016
the meeting will discuss the realization of digital circulation of assets by blockchain, the financial transaction mode of blockchain, and the application of blockchain services and social public instry. This conference will mark the beginning of the application of blockchain finance and the change and development of the new financial ecology
on June 1, 2020, Xinhua news agency was authorized to broadcast the "overall plan for the construction of Hainan free trade port" issued by the CPC Central Committee and the State Council, which will "actively participate in the formulation of international rules for cross-border data flow, and establish standards and rules for data rights confirmation, data trading, data security and blockchain finance" as one of the key tasks of Hainan free trade port before 2035
IPFs is a file transfer protocol similar to http. If IPFs wants to run, it needs many computers (storage devices) in the network as nodes. In a broad sense, all participating computers can be called IPFs mining machines
in order to attract more users to join the IPFs network and contribute to the network, an encryption currency named filecoin is designed, which is distributed to the participants (nodes) as a reward according to the amount of contributed storage space and bandwidth. In a narrow sense, the computer specially designed for the purpose of obtaining the filecoin reward is called IPFs mining machine
because IPFs network needs storage space and network bandwidth, in order to obtain the highest profit ratio, IPFs mining machine usually strengthens the storage space and reces the power consumption of the whole machine. For example, more than 10 high-capacity hard disks are equipped, Gigabit or higher speed network cards are equipped, and ultra-low power architecture processors are used
of course, the mining machine provides storage services, so it can obtain revenue. The size of revenue is related to the configuration of mining machinery and the number of IPFs mining machinery
extended data
the reasons why it is not recommended to invest in IPFs are as follows:
1. IPFs technology is too early to be commercialized
IPFs now takes up a lot of bandwidth. IPNs is very slow at present, which is an obvious technical defect. It will be very difficult to realize dynamic web pages only through IPFs
There is no reasonable economic model, even if the token economy is added, it is difficult to realize the long-term natural ecological valueas a very cumbersome decentralized protocol, it is difficult for users to share files autonomously and spontaneously. In addition, even if users share files into the protocol, the files will be completely open and users cannot delete files effectively, so the security of valid files is threatened
the solution is to introce encryption and blockchain incentive mechanism. At the same time, it solves the security and storage power problems of files. However, as mentioned before, any node with workload proof under blockchain incentive mechanism will face an economic problem of continuous power on state
It is difficult to establish an ecological network with IPFs as the core under the influence of technical problems The ecological application space ofIPFs is quite limited, and the project interaction speed realized by IPFs protocol is also very slow. Of course, it has a direct relationship with the number of nodes and the distance of calling
1. Data layer
the data layer is the lowest layer in the six hierarchies of the blockchain. We can understand the data layer as a database, but for the blockchain, this database is a tamperable and distributed database, which is what we call "distributed ledger"
in the data layer, that is, the "distributed ledger", the data information on the blockchain is stored, and the blockchain structure, asymmetric encryption technology, hash algorithm and other technical means of the block are encapsulated to ensure the security of the data in the case of the whole network being open. The specific method is:
in the blockchain network, nodes use consensus algorithm to maintain the consistency of data layer (that is, the distributed database), and use asymmetric encryption and hash algorithm in cryptography to ensure the non usurpation and traceability of the distributed database
This constitutes the bottom data structure of blockchain technology. However, it is not enough to have a distributed database. We also need to let the data information in the database be shared and exchanged. Next, we will introce the upper layer of the data layer - the network layer
Second, network layer
the network system of blockchain is essentially a P2P (point-to-point) network. Point to point means that there is no need for an intermediate link or centralized server to control the system. All resources and services in the network are distributed in the hands of each node, and the transmission of information is also a direct communication between the two nodes. However, it should be noted that P2P
(peer-to-peer) was not invented by Nakamoto, and the blockchain only integrates this technology
therefore, the network layer of blockchain is actually a particularly powerful point-to-point network system. In this system, each node can not only proce information, but also receive information, just like sending e-mail. You can write your own e-mail, and you can also receive the e-mail sent to you by others
in the blockchain network, nodes need to jointly maintain the blockchain system. Every time a node creates a new block, it needs to notify other nodes in the form of broadcast. After receiving the information, other nodes verify the block, and then create a new block on the basis of the block. In this way, the whole network can jointly maintain and update the general ledger of the blockchain system
however, what rules should the whole network follow to maintain and update the general ledger of the blockchain system? This involves the so-called "laws and regulations" (rules), which we will introce next: the consensus layer
Third, consensus layer
in the world of blockchain, consensus simply means that the whole network should maintain and update the general ledger of blockchain system according to a unified and agreed rule, which is similar to the rule of updating data. It is one of the core technologies of blockchain and the governance mechanism of blockchain community to let highly dispersed nodes reach consensus efficiently in the decentralized blockchain network
at present, the mainstream consensus mechanism algorithms include: proof of work of bitcoin (POW), proof of rights and interests of Ethereum (POS), proof of rights and interests of EOS (dpos), etc
we now introce the data layer, network layer and consensus layer. These three layers ensure that there are data, networks and rules for updating data on the network. However, there is no free lunch in the world. How can nodes actively participate in the maintenance of the blockchain system? Here is the incentive layer, which we will introce next: incentive layer< 4. Incentive layer
incentive layer is the so-called mining mechanism, which can be understood as incentive mechanism: you can get as much reward as you contribute to the blockchain system. With this incentive mechanism, the whole network nodes can be encouraged to participate in the data recording and maintenance on the blockchain
mining mechanism and consensus mechanism are actually the same truth. Consensus mechanism can be understood as the company's general rules and regulations, while mining mechanism can be understood as the reward rules for what you do well in the general rules and regulations
just like the consensus mechanism POW of bitcoin, it stipulates that more work pays more. Whoever can find the correct hash value first can get a certain amount of bitcoin reward
and Ethereum's POS stipulates that the older the holder is, the more likely he or she will be rewarded
it should be noted that the incentive layer is generally only available for the public chain, because the public chain must rely on the nodes of the whole network to jointly maintain data, so there must be a set of incentive mechanism to encourage the nodes of the whole network to participate in the construction and maintenance of the blockchain system, so as to ensure the security and reliability of the blockchain system
the blockchain is safe and reliable, and it is not intelligent enough, right? The contract layer we will introce next can make the blockchain system more intelligent
v. contract layer
Contract layer mainly includes various scripts, codes, algorithm mechanisms and smart contracts, which is the basis of block chain programming. What we call "smart contract" is at the contract level
if the bitcoin system is not intelligent enough, the "smart contract" proposed by Ethereum can meet many application scenarios. The principle of the contract layer is to embed the code into the blockchain system, in this way to realize the smart contract that can be customized. In this way, on the blockchain system, once the terms of the smart contract are triggered, the system can automatically execute commands< Finally, the application layer. The application layer is very simple. As the name suggests, it is a variety of application scenarios and cases of blockchain. What we now call "blockchain +" is the so-called application layer. At present, the blockchain applications that have been implemented are mainly various blockchain applications built on
eth, EOS and other public chains. There are more applications of gambling and games, and the real practical applications have not yet appeared.
after Ethereum is upgraded to version 2.0 POS mechanism, miners may switch mining machines to other networks
as Ethereum is finally ready to start its Ethereum 2.0 upgrade later this year, thus eliminating the long-term delay, the network will start to move towards the proof of rights model
therefore, the network will give up the workload proof consensus algorithm, so that eth miners have little choice. As their equipment will become obsolete, they will be forced to start mining counterfeit coins or re qualify as eth mortgagors. So, what is the current situation of Ethereum mining? With the coming transition, what will happen to the whole instry< At present, Ethereum consensus is based on POW system, which is similar to bitcoin (BTC). As a result, Ethereum's mining process is almost the same, as miners use their computing resources to earn rewards for each block they try to complete< However, there are still major differences between these processes. Although bitcoin mining has relied almost entirely on ASIC (large, loud machines designed specifically for cryptocurrency mining, most of which are concentrated in areas with low electricity prices), Ethereum's pow hash algorithm ethash is designed to support global chip manufacturers (such as NVIDIA and AMD). As Thomas Heller, global business director of cryptocurrency mining pool f2pool, explained in a conversation with cointegraph, GPU is much cheaper and easier to access than ASIC
"as ASIC is a very professional machine, when a new generation of procts is released, it is usually a huge technological leap. As a result, they have a much higher hash rate and are more energy efficient than the previous generation. This means that those manufacturers have spent a lot of money to research and develop it. Their machines are usually very expensive, and GPUs are much cheaper. "
Heller added that those who use GPU miners "have more flexibility to mine." For example, the popular NVIDIA geforce GTX 1080 Ti card can mine more than 15 different currencies, while ASIC units usually support only one currency
nevertheless, Ethereum is not completely immune to ASIC miners - at least in its current state. In April 2018, bitcontinent released antminer E3, an ASIC specially proced for mining Ethereum. Although widely praised for its hash rate of 180 megahashes per second and power consumption of 800 watts, it has received different responses from the Ethereum community. After the ASIC is inserted, a considerable number of GPU rig owners seem to suffer from loss of profits, and some are even forced to switch to other networks
"in the white paper, ETH must have ASIC resistance. I would like to say that the white paper stands for something "is one of the highest comments on the AR / ethermining topic about the topic discussed when antminer E3 was announced. Another reddit user argued that "the $800 only applies to 180mh."“ Split or die of a nation. "
some Ethereum users continue to suggest that bitmain's mining devices can lead to greater concentration, thus increasing the possibility of attack by 51%. Soon, a group of developers put forward "programmed workload proof" or progpow, which is an extension of the current Ethereum algorithm ethash, aiming to make GPU more competitive and promote decentralization
according to a paper published in March by Kristy Leigh Minehan, co-founder of progpow, about 40% of the hash rate of Ethereum is generated by bitmain ASIC. Alejandro de la Torre, the vice president of poolin, is the sixth largest pool of eth. He confirmed to cointegration that "GPU mining is still dominant" in Ethereum network, and added:
"at present, the profit of eth mining is not high, and the management threshold and cost of GPU equipment are higher than ASIC equipment. Compared with ASIC devices, GPU devices are more flexible, and you can use other algorithms to switch to other coins. "
progpow has not been integrated into Ethereum, and it is not clear when it will be finally implemented - in March, Ethereum core developers were debating whether progpow will really benefit the network in nearly two hours, and failed to reach a consensus. It is worth noting that a bitmain representative has previously told cointegraph that the mining hardware giant does not intend to extend the service life of antminer E3 to start operation after October 2020: "as far as we know, mining will end in October or some time after that."
a safe but uncertain future
indeed, Ethereum will stay away from mining in the future. Ethereum 2.0, which is planned to be launched later in 2020, is a major network upgrade on the blockchain, aiming to transfer its current POW consensus algorithm to a virtual POS (known as "block verifier")
more specifically, users are randomly selected considering their wealth in the network or their "interests". In other words, the more coins a POS verifier chooses to put in, the more coins accumulated as a reward
according to vitalik buterin, the co-founder of Ethereum, e to the transition, the network will be more secure and the attack cost will be higher than the network of bitcoin, although the debate about the better consensus algorithm in the encryption community has lasted for many years. However, it is not clear when to start Ethereum 2.0, as many errors and management issues are reported to be delaying the process
another hypothetical benefit of POS system is that it has higher energy efficiency than pow blockchain. According to digiconomist, the cryptocurrency's total annual footprint is 59.31 terawatts per hour, which is comparable to the electricity consumption of Greece as a whole. However, since a report in July 2019 estimated that 74% of the exploitation of bitcoin was done using renewable energy, the environmental impact of bitcoin does not seem to be so serious
what will happen to the actual Ethereum miner? According to the documentation of Casper upgrade as part of Ethereum 2.0 roadmap, the network will initially support a hybrid model including both POW and POS, thus providing some space for block verifiers and GPU / ASIC miners. Jack O & 39, CEO of skale network; "There will definitely be a transition period when two networks are running at the same time," Holleran told cointegration The CEO of scale network (based on Ethereum's blockchain platform) gave a detailed description of this process:
"the transition from eth1 to eth2 takes time of course - it may be years rather than months. The good news about this slow transition is that dapps and defi platforms will be able to roam around based on survivability, security and real-world evidence of adoption. This is a positive impact on the Ethereum ecosystem. "
dig or not
once Ethereum is fully in the POS orbit, miners will have two options. One is to sell the equipment and use the money to accumulate more Eth and start mortgage. The other is the choice for GPU miners, which is simply switching to other ethash networks and mining counterfeit money. Nick foster, a representative of kabombacks, a US mining equipment dealer, told cointegration that most eth miners would choose the latter:
"what I want to say is that most of the miners have not really entered Ethereum or the mining of specific tokens. Yes, there is a certain amount of mineral deposits and holds, but I oppose the view that a large number of Shanzhai coin miners hold their coins at any time. "<
foster then described how he used 3gb GPU units to mine ethash's point-to-point blockchain asset ravencoin (RVN). Once it was unable to mine eth, he said, "this is the reason for mining crows. I immediately sold stability to BTC, and then sold it to US dollars to pay for my rights. I would say that a lot of people are adopting this strategy. "
as foster concludes, he wants eth miners to jump out of the network, and new players - those who don't invest in power infrastructure or drilling rigs - will take a stake in eth. He described the following:
"I can't imagine if I found a five-year lease with $0.04 of electricity and I was mining eth, I decided to sell everything and then continue to pay the rent so that I could hold eth as a share. Substitute. "
Marc fresa, founder of asic.to, a mining firmware company, agreed in a conversation with cointegraph: "if you invest in mining, you won't bet because you have enough room to grow."
one of the main counterfeit coins that may benefit from POW miners leaving Ethereum is Ethereum classic (etc), which is a more conservative version of the blockchain. It is reported that there is no POS related plan. As it also runs on the ethash algorithm, the startup of Ethereum 2.0 may lead to the migration of miners, so its hash rate may have a significant peak
eth's larger pools have similar options. When asked about the company's plans for Ethereum after pow, Heller told cointegraph that after the announcement of Ethereum's POS upgrade, f2pool launched a sister company called story.fish in early 2018. Story.fish has started to provide mortgage services for other POS and delegated POS projects, such as tezos (xtz), Cosmos (atom) and Cardano (ADA), e to numerous handover delays. For prin, e to the transition to POS, it "may temporarily give up supporting eth mining," de la Torre told cointegraph
other top eth pools, namely nanopool, ethermine, pool center, sparkpool and spiderpool, did not respond to requests for comment from cointegraph.
(1) roadway engineering design
mainly focuses on the design of shaft, ramp, middle transport roadway, chute, chamber, shaft bottom yard and other projects in the mining system of the deposit. According to the burial conditions of the deposit and the horizontal position and height of the middle section, the ore body is cut, and the cutting entity is projected along any direction to generate the maximum projection contour line (such as the horizontal projection contour line), so as to help users quickly determine the location of each main shaft
DIMINE software is a unique function of DIMINE, which adopts parametric and visual design ideas and AutoCAD like operation style. After the design, it can automatically mark and calculate, and automatically generate design and construction drawings with control point table and engineering quantity table< br /> Roadway design can be used for shaft, ramp, drift center line design< br /> The curve design can quickly generate the curve connecting line between the two roadway projects through parametric and intelligent methods; After selecting the main roadway, automatically capture, dynamically display the curve, the user dynamically adjust to the appropriate position, or enter the radius of the curve to complete the curve design< br /> The design of turnout provides three kinds of fork way connection, namely, the specified starting point and the specified end point, which are convenient and flexible to operate< br /> According to the elevation of the roadway at both ends of a section, the roadway slope of the section is smoothed< br /> Slope adjustment adjusts the roadway slope in a certain plane according to the specified slope< br /> The section design adopts parametric method to design various standard types of roadway sections (such as circle, rectangle, trapezoid, arc arch, three center arch, etc.) or user-defined non-standard section types< br /> Generation of connected 3D roadway It is used to automatically generate fully connected 3D roadway entities according to the spatial topological connection relationship of different types and section specifications of roadways< br /> The generation of non connected 3D roadway is used to generate independent 3D entity of roadway according to the design center line of roadway and its section type and specification. The connection relationship between roadways is not automatically processed by the system. If the connection is needed, the entity connection operation in entity Boolean operation must be used< br /> The double line roadway is generated by the center line of the roadway< br /> The center line of roadway is extracted from the solid of roadway< br /> The vertical shaft is generated by special algorithm< br /> According to the designed construction drawing, the computer drawing automatically marks (including control point number, four important numbers of curve, etc.) and automatically calculates when the chart is output to generate control point table and engineering quantity table
(2) monomer design
it is mainly used in the design of mining unit of underground mine, and its main functions include: automatic cutting of ore body according to the structural parameters of mining unit, mining and cutting engineering design, parameterization, intelligent and visual design of bottom structure, and various quantities, mining reserves, grade, metal amount and dilution rate Accurate calculation of loss rate index< br /> According to the structural parameters of the mining unit, the middle orebody is cut to form a three-dimensional entity of the mining unit< br /> The stope design provides the stope design function for the sublevel caving mining method without sill pillar, which can automatically generate the stope without sill pillar (diamond block) according to the parameters such as side hole angle, sublevel height and access distance; It provides stope design tools for gently inclined thick large orebodies< br /> In the design of mining and cutting engineering, the entity of mining unit is projected, the location of mining and cutting engineering is determined according to the projection contour, the engineering center and engineering section are designed, and the 3D entity of mining and cutting engineering is generated, and the quantities of mining and cutting engineering are calculated< br /> The bottom structure design includes two types: funnel and trench. According to the type of bottom structure and design parameters, the design line of bottom structure is automatically generated, including the projects of ore drawing roadway, ore drawing connecting road, ore receiving mouth (funnel mouth / bucket neck), ore outlet, etc; According to the mining boundary, the horizontal position and height of a single engineering body in the substructure are adjusted by intelligent interaction mode to generate the engineering design line of substructure meeting the actual requirements; According to the section type and size of each project, the 3D solid model of substructure is automatically generated and the excavation volume is calculated< br />3 Mining blasting design
is mainly used for the design of fan-shaped holes and parallel holes in underground mine blasting. The system automatically generates fan-shaped or parallel holes according to hole bottom distance, stope boundary, drilling parameters, etc., and charges automatically according to charging algorithm, allowing users to interactively modify and edit automatically generated hole parameters (length, angle, charging length, etc.), Finally, the blasting entity, blasting construction card and medium length hole design and construction drawing are generated< br /> The automatic generation of blasting boundary is realized by cutting stope and roadway, and automatically generating blasting boundary and roadway section of each row< br /> According to the stope boundary, drilling parameters and blasthole parameters, the fan-shaped blasthole of a certain position is automatically generated< br /> The parameters such as the length and angle of each hole in each row are edited and adjusted interactively, so that the design result of the hole can fully meet the requirements of blasting< br /> The automatic charge is designed automatically according to the charge algorithm< br /> The chart generation automatically generates the design and construction drawing of each row of blastholes, and generates the blasthole construction table including blasthole row number, hole number, blasthole design length, inclination angle, azimuth angle, center distance of circle, charging length, charging quantity, blasting quantity and other parameters for on-site construction and acceptance< br />4 Proction schele
is mainly used for the preparation of underground mine excavation and mining plan. Through the preparation of basic data such as proction path data and three-dimensional entity (roadway, stope) data, the proction task and task operation sequence are automatically formed according to the proction process, resource and equipment status, and finally the proction plan report and animation are generated to simulate the implementation process of proction plan, Make the proction plan visible, controllable and adjustable< br /> Data preparation the data is prepared in the form of table, which is convenient and intuitive< br /> According to the prepared data, the proction schele is automatically made< br /> Report customization users can customize proction plan reports according to their own needs< br /> Results output provides excel report, project schele chart, 3D graphic display, animation simulation of the implementation process of proction plan and other results output forms.
