BLOCKCHAIN IMP QUESTION
BLOCKCHAIN IMP QUESTION
Define PoW.
Proof of Work (PoW) is a decentralized consensus mechanism that verifies transactions
and adds blocks to a blockchain. It's also known as mining, and is used in many
cryptocurrencies, including Bitcoin, Dogecoin, Bitcoin Cash, Litecoin, and Monero.
What is consensus?
In a blockchain, consensus is the process of ensuring that all nodes on the network
agree on the authenticity of transactions and the current state of the network. It's a
crucial part of how transactions are processed and settled.
What is Nonce?
In blockchain technology, a nonce is a random or semi-random number generated by
miners when they create a new block in the blockchain.
-The word "nonce" derives from the Latin and means "number used once." This is to say
that this number should be used only once in this particular case.
-Nonces are of central importance to the proof-of-work consensus mechanism model,
which is a well-known way of operating in many blockchains such as Bitcoin and
Ethereum.
-Nonces provide the ability to prove the involvement in the mining process of a complex
mathematical problem and the requirement to add a new block to the blockchain.
What is Ether?
Ether (ETH) is the cryptocurrency of the Ethereum blockchain, a decentralized, open-
source platform for smart contracts and decentralized applications (DApps):
What is DAO?
DAO stands for decentralized autonomous organization, which is a digital management
structure that uses blockchain technology and smart contracts to govern its operations:
What is FPGA?
Field Programmable Gate Array (FPGA) is basically an integrated circuit that can be
programmed to perform specific operations. FPGAs are usually programmed in
Hardware Description Languages (HDLs), such as Verilog and VHDL.
In AES, on which factor does the number of encryption rounds depend on?
Each round consists of four main operations: SubBytes, ShiftRows, MixColumns, and
AddRoundKey. The number of rounds varies depending on the key size: 10 rounds for
AES-128, 12 rounds for AES-192, and 14 rounds for AES-256. The number of rounds in
AES a ects the di usion and confusion properties of the algorithm.
What is ASIC?
An application-specific integrated circuit (ASIC) is an integrated circuit chip designed for
a specific purpose. An ASIC miner is a device that uses ASICs for the sole purpose of
"mining" digital currency. Generally, each ASIC miner is constructed to mine a specific
digital currency based on their hashing algorithms.
In this type of blockchain anyone can read, In this type of blockchain read and write
write and participate in a blockchain. is done upon invitation, hence it is a
Hence, it is permissionless blockchain. permissioned blockchain.
Data can be easily deleted or modified if Data once entered cannot be deleted and is
needed with proper authorization. permanent in nature.
Cost-e ective for most business More expensive to maintain due to high
applications as it requires less computational power requirements for
computational power. consensus mechanisms.
What is BFT?
Byzantine Fault Tolerance (BFT) is a key concept in blockchain technology that allows a
network to continue functioning even when some nodes fail or act maliciously. BFT is
necessary because blockchains are decentralized systems without a central authority
how BFT works in blockchains:
A client sends a request to the leader node.
The leader node sends the request to all backup nodes.
All nodes work on the request and send a reply to the client.
The client waits for replies from all nodes with the same result.
What is Hybrid Blockchain?
A Hybrid blockchain is a blockchain that combines elements of both public and private
blockchains. It is designed to reduce the disadvantages of both types of blockchains
while maximizing their benefits.
A hybrid database contains both public and private entries.
Similar to public blockchains, where anyone is invited to join and participate in
the network, public nodes operate similarly to those in those systems. Private
nodes, on the other hand, are in charge of validating and checking transactions
and are governed by specific organizations or individuals.
Using private nodes, a hybrid blockchain can process transactions more rapidly
and with greater privacy and security. Public nodes provide decentralization and
transparency at the same time, making it di icult for one group to maintain
control over the network.
In a hybrid blockchain, the members can decide who can participate in the
blockchain or which transactions are made public.
Layers of Blockchain
Application Layer: This layer interacts with users and provides the interface for users to
interact with the blockchain. It includes dApps (decentralized applications) and other
user-facing applications.
Network Layer: This layer handles the communication and consensus mechanisms
between nodes in the network. It ensures that all nodes agree on the state of the
blockchain.
Consensus Layer: This layer is responsible for validating and adding new blocks to the
blockchain. It employs algorithms like Proof-of-Work (PoW) or Proof-of-Stake (PoS) to
achieve consensus.
Data Layer: This layer stores the actual data, including transactions and smart contract
code. It ensures the integrity and security of the data.
Execution Layer: This layer executes smart contracts and processes transactions. It
provides the computational power necessary for running smart contracts.
In Client-Server Network, Centralized server is While in Peer-to-Peer Network, Each peer has its
used to store the data. own data.
Client-Server Network are costlier than Peer-to- While Peer-to-Peer Network are less costlier than
Peer Network. Client-Server Network.
Client-Server Network are more stable than While Peer-to-Peer Network are less stable if
Peer-to-Peer Network. number of peer is increase.
Client-Server Network is used for both small While Peer-to-Peer Network is generally suited for
and large networks. small networks with fewer than 10 computers.
CODEBASE FORK: Codebase forks involve copying the blockchain code and modifying
it according to your needs. Most of the altcoins use the code of Bitcoin with few
changes to create a completely new experience.
LIVE BLOCKCHAIN FORK: Live Blockchain fork means a running blockchain is been
divided further into two parts or two ways. So in live blockchain at a specific page the
software is same and from that specific point the chain is divided into two parts.
ACCIDENTAL FORK : When multiple miners mine a new block at nearly the same time,
the entire network may not agree on the choice of the new block. Some can accept the
block mined by one party, leading to a di erent chain of blocks from that point onward
while others can agree on the other alternatives (of blocks) available
INTENTIONAL FORK: In intentional fork the rules of the blockchain are been changed,
knowing the code of the software and by modifying it intentionally. This gives rise to two
types of forks which can occur based on the backwards-compatibility of the blockchain
protocol and the time instant at which a new block is mined.
SOFT FORK: When the blockchain protocol is altered in a backwards-compatible way.
In soft fork you tend to add new rules such that they do not clash with the old rules. That
means there is no connection between the old rules and new rules
HARD FORK: When the blockchain protocol is altered in a non backwards-compatible
way. Hard fork is opposite of Soft fork, here the rules are loosened. When there is a
change in the software that runs on the full nodes to function as a network participant,
the change is such that the new blocks mined on the basis of new rules (in the
Blockchain protocol) are not considered valid by the old version of the software.
Consortium blockchain
A consortium blockchain is a semi decentralized type where more than one
organization manages a Blockchain network. This is opposite to private blockchain
where in which that is managed by only a single organization but in consortium
blockchain, more than one organization and banks etc. It is also known as Federated
Blockchain. Consortium blockchain are typically used by government organizations and
banks. etc..
Digital Currency Ethereum :Blockchain technology is being used to create
applications that go beyond just enabling a digital currency. Launched in July 2015 by
Vitalik Buterin, Ethereum is the largest and most well-established, open-ended
decentralized software platform. Ether is the cryptocurrency generated by the Ethereum
protocol as a reward to miners in a proof of work system for adding blocks to the
blockchain. It is the only currency accepted in the payment of transaction of fees, which
also go to miners. Ethereum enables building and deploying smart contracts and
decentralized applications (dApps) without downtime, fraud, control, or interference
from a third party. To accomplish this, Ethereum comes complete with its own
programming language that runs on a blockchain.
DES (Data Encryption Standard) creation year AES (Advanced Encryption Standard) creation
is 1976. year is 1999.
DES (Data Encryption Standard) was designed AES (Advanced Encryption Standard) was designed
by IBM. by Vincent Rijmen and Joan Daeman.
DES originate from the Lucifer cipher. AES originate from the square cipher.
Layered Architecture of Blockchain Ecyosystem
Hardware or Infrastructure Layer
Bicokchain technology based on the peer to peer network of computers that computes
transactions validates and stores them in an ordered form in a shared ledger. This
results in a distributed database that records all the data, transactions and various
relevant information. Blockchains are based on peer-to-peer information sharing. The
network of computers which contribute to the computing power of the blockchain form
the hardware layer
Computer in a peer to peer network is known as node. Nodes are accountable for
validating transactions, organizing them in to blocks, broadcasting them to the
blockchain network and it keeps on.
Reaching agreement the nodes commit the block to the blockchain network and update
their local ledger copy. When device gets connected to a blockchain network then it is
used as node.
2. Data Layer:
The next layer after the hardware layer is the data layer where details of transactions are
stored. The transaction stored on a block (the fundamental unit of a blockchain) has
details of the crypto sent, the public key of the receiver and the private key of the
sender. Each block which has data is connected to the previous block and the next
block which is generated. Only the genesis block, the first block of the network, is
connected forwards and not backward.
3.Network Layer
The network layer also known as a peer-to-peer layer .It is responsible for inter-node
communication and also called propagation layer.Network layer takes care of block
propagation, transactions and discover. Network layer ensures that nodes can reveal
each other and able to communicate synchronize and propagate with each other to
maintain valid current state of the blockchain network.There are two kinds of node i.e.
full node and light node. Full nodes guarantee that validation and verification of
transaction, enforcement of consensus rules and mining whereas light nodes only keep
the header of the blockchain and can send transaction.
4.consensus layer:
Consensus layer is essential to the existence of blockchain platforms.
Consensus layer is responsible for validating the blocks, ordering the blocks and
ensuring everyone agrees on it.
Consensus layer create a definite set of agreements between nodes across the
distributed peer to peer network.
Consensus layer ensures that power remains distributed and decentralized.
5.Application Layer
Application layer is divided into two sublayer ile application layer and execution layer.
Application layer comprise of the application that are used by end users to interact with
the blockchain network. E.g smart contracts, chain code and dApps etc for these
applications blockchain network is the backend and they connect via APIs