Mining algorithm
You can refer to the following, according to some commonly used graphics cards in the Internet bar market, sort out the price and calculation power of a related graphics card, as well as the expected return to the current period, It can be used as a reference:
{rrrrrrr}
power consumption: 243w
computing power: 22.4m
price of graphics card: 1999 yuan
quantity of eth g every 24 hours: 0.015
revenue generated every 24 hours: 24.48 yuan
expected payback time: 81.66 days
power consumption: 159w
computing power: 24.3m
price of graphics card: 1599 yuan Yuan
number of eth g every 24 hours: 0.017
revenue generated every 24 hours: 27.9 yuan
estimated payback time: 57.31 days
total power consumption: 171w
computing power: 24.4m
price: 1999 yuan
number of eth g every 24 hours: 0.017
revenue generated every 24 hours: 27.87 yuan
estimated payback time: 71.73 days
Video card (graphics card) full name display interface card, also known as display adapter, is the most basic configuration of computer, one of the most important accessories. As an important part of the computer host, the graphics card is the equipment of digital to analog signal conversion, and it undertakes the task of output display graphics
the graphics card is connected to the main board of the computer, which converts the digital signal of the computer into an analog signal for the display. At the same time, the graphics card still has the ability of image processing, which can help the CPU work and improve the overall running speed. For those engaged in professional graphic design, graphics card is very important. Civil and military graphics chip suppliers mainly include amd (ultra micro semiconctor) and NVIDIA (NVIDIA). Today's TOP500 computer, including graphics card computing core. In scientific computing, graphics card is called display accelerator
In short, mining is the use of chips for a random number related calculation, get the answer in exchange for a virtual currency. Virtual currency can be exchanged for the currency of each country through some way. The stronger the computing power, the faster the chip can find this random answer. Theoretically, the more virtual coins can be proced per unit time. Because it's about random numbers, you can only get rewards if you happen to find the answer
In his paper, Nakamoto stated:"in the absence of central authority, it not only encourages miners to support bitcoin network, but also enables bitcoin's currency circulation system to have the initial source of money injection."
Nakamoto compares the generation of bitcoin by consuming CPU power and time to the consumption of resources by gold mines to inject gold into the economy. Bitcoin mining and node software mainly initiates zero knowledge proof and verification transactions through peer-to-peer network, digital signature and interactive proof system
each network node concts broadcast transactions to the network. After these broadcast transactions are verified by miners (computers on the network), miners can use their own work proof results to express their confirmation. The confirmed transactions will be packaged into data blocks, and the data blocks will form a continuous data block chain
Nakamoto himself designed the first version of bitcoin mining program, which was later developed into the first generation of widely used mining software bitcoin, which was popular from 2009 to mid-2010
each bitcoin node will collect all the unconfirmed transactions and gather them into a data block. The miner node will add a random adjustment number and calculate the SHA-256 hash value of the previous data block. The mining node tries again and again until it finds the random adjustment number so that the hash value is lower than a specific target
extended data
at the earliest, bitcoin miners were mining through Intel or AMD CPU procts. But because mining is a computing intensive application, and with the continuous improvement of mining number and equipment performance, the difficulty graally increases, now using CPU mining has no profit or even loss
as of 2012, since the first quarter of 2013, miners graally began to use GPU or FPGA and other mining equipment [5]. At the same time, a large number of ASIC devices were launched in mid 2013
since July 2013, the computing power of the whole network has shown a straight-line rise e to the large number of ASIC equipment put into operation. Based on the average computing power in July 2013, all CPU mining equipment has been unable to generate positive revenue, and FPGA equipment is close to no revenue
according to the estimation of average computing power in September 2013, the existing small ASIC mining equipment developed for indivials will also be close to no positive revenue in the next 1-2 months. A large amount of computing power is monopolized by cluster ASIC mining equipment with 5 th ash / s or more. Because of no profit, indivial mining is almost squeezed out of mining groups. Some bitcoin miners have raised funds to build machine rooms and install a large number of mining equipment in places where low-cost electricity can be obtained
in order to save the cost of mining, some bitcoin miners make mining programs into malicious programs to infect other people's computers on the network to mine for themselves
the content of this article comes from: financial code of the people's Republic of China: application edition, China Law Press
Bitcoin mining is a process of using computer hardware to do mathematical calculation for bitcoin network to confirm transactions and improve security
Hash algorithm maps any length of binary value to a fixed length of smaller binary value, which is called hash value. Hash value is a unique and compact numerical representation of a piece of data. If you hash a piece of plaintext and change only one letter of the paragraph, subsequent hashes will proce different values. It is computationally impossible to find two different inputs with the same hash value
message authentication code (MAC) hash function is usually used with digital signature to sign data, while message detection code (MDC) hash function is used for data integrity
the basic information of bitcoin network is as follows:
all digital currencies that need to be mined have hash values, such as Laite coin, Ruitai coin, doggy coin, Weimeng coin, Diandian coin, Yuanbao coin, etc< br />
elliptic curve digital signature algorithm is mainly used in the generation process of bitcoin public key and private key, which is the cornerstone of bitcoin system. SHA-256 hash algorithm is mainly used in the workload proof mechanism of bitcoin
the principle of bitcoin generation is the special solution generated by complex operation, and mining is the process of finding the special solution. However, the total number of bitcoin is only 21 million, and with the continuous mining of bitcoin, the more difficult it will be to proce bitcoin, and the cost of acquiring bitcoin may be higher than the price of bitcoin itself
the bitcoin block consists of a block header and the transaction list contained in the block. The size of the block header is 80 bytes, which is composed of 4-byte version number, 32 byte hash value of the previous block, 32 byte Merkle root hash, 4-byte timestamp (current time), 4-byte current difficulty value and 4-byte random number. A block header with a fixed length of 80 bytes is the input string used to prove the workload of bitcoin. Constantly change the random number in the block header, that is, the value of nonce, and do double sha256 operation on the block header after each change, and compare the result value with the target value of the current network. If it is less than the target value, the problem is solved successfully, and the workload is proved to be complete
the essence of bitcoin is actually the unique solution of a set of equations generated by a bunch of complex algorithms. Bitcoin is the first distributed virtual currency in the world, which has no specific distribution center. The network of bitcoin is composed of all users, because there is no center to ensure the security of data.
In fact, the mining calculation of bitcoin is to do math problems together. The problem stem is the transaction that needs to be recorded. By doing the problem, everyone grabs the bookkeeping right, and the miners can get system rewards and transaction fees. The feature of sha256 algorithm used in bitcoin is that it is easy to verify the known answers correctly, but it is very troublesome to get the answers, and it needs to try one by one. The miner who got the answer first was recognized by everyone as having snatched the right to keep accounts, and the reward was given to him. Let's continue to grab the bookkeeping right of the next question. In short, the significance of these calculations is only to ensure the stability and safety of the whole system, and there is no more significance
it is not comprehensive to regard bitcoin as a by-proct of computing. The generation and issuance of bitcoin, all the transactions and circulation in the bitcoin chain, and the stability of the bitcoin system are the purpose of computing and are integrated. Of course, in addition to maintaining the system, it does not proce other value and procts. This is also a black spot where bitcoin is accused of not being environmentally friendly and wasting resources. In general, bitcoin, as a milestone blockchain digital currency, is e to the huge value of a large amount of computing power investment and user trust. There is no doubt about that