Blockchain Technology
Blockchain Technology
UNIT 3
1)Give the different types of blockchain. State their advantages and disadvantages
Advantages:
• Trustable: There are algorithms to detect no fraud. Participants need not worry
about the other nodes in the network
• Secure: This blockchain is large in size as it is open to the public. In a large size,
there is greater distribution of records
• Anonymous Nature: It is a secure platform to make your transaction properly at
the same time, you are not required to reveal your name and identity in order to
participate.
• Decentralized: There is no single platform that maintains the network, instead
every user has a copy of the ledger.
Disadvantages:
• Processing: The rate of the transaction process is very slow, due to its large
size. Verification of each node is a very time-consuming process.
• Energy Consumption: Proof of work is high energy-consuming. It requires good
computer hardware to participate in the network
• Acceptance: No central authority is there so governments are facing the issue
to implement the technology faster.
Advantages:
• Speed: The rate of the transaction is high, due to its small size. Verification of
each node is less time-consuming.
• Scalability: We can modify the scalability. The size of the network can be
decided manually.
• Privacy: It has increased the level of privacy for confidentiality reasons as the
businesses required.
• Balanced: It is more balanced as only some user has the access to the
transaction which improves the performance of the network.
Disadvantages:
• Security- The number of nodes in this type is limited so chances of manipulation
are there. These blockchains are more vulnerable.
• Centralized- Trust building is one of the main disadvantages due to its central
nature. Organizations can use this for malpractices.
• Count- Since there are few nodes if nodes go offline the entire system of
blockchain can be endangered.
3. Hybrid Blockchain-It is the mixed content of the private and public blockchain, where
some part is controlled by some organization and other makes are made visible as a public
blockchain.
• Permission-based and permissionless systems are used.
• User access information via smart contracts
• Even a primary entity owns a hybrid blockchain it cannot alter the transaction
Advantages:
• Ecosystem: Most advantageous thing about this blockchain is its hybrid nature.
It cannot be hacked as 51% of users don’t have access to the network
• Cost: Transactions are cheap as only a few nodes verify the transaction. All the
nodes don’t carry the verification hence less computational cost.
• Architecture: It is highly customizable and still maintains integrity, security, and
transparency.
• Operations: It can choose the participants in the blockchain and decide which
transaction can be made public.
Disadvantages:
• Efficiency: Not everyone is in the position to implement a hybrid Blockchain.
The organization also faces some difficulty in terms of efficiency in maintenance.
• Transparency: There is a possibility that someone can hide information from
the user. If someone wants to get access through a hybrid blockchain it depends
on the organization whether they will give or not.
• Ecosystem: Due to its closed ecosystem this blockchain lacks the incentives for
network participation.
4. Consortium Blockchain-It is a creative approach that solves the needs of the organization.
This blockchain validates the transaction and also initiates or receives transactions.
This is known as “placing a stake” or “staking”. A block creator in a PoS system is limited to
creating blocks proportionate to his or her stake in the network.
Thus, PoS networks are based on deterministic algorithms, meaning that validators of blocks
are elected depending on the nature of the stake. For instance, selecting account balance as
the sole criterion on which the next valid block in a blockchain is defined could potentially
lead to unwanted centralisation. This would mean that wealthy members in a network would
enjoy great advantages.
PoS networks are based on deterministic algorithms, meaning that validators of blocks are
elected depending on the nature of the stake.
For this reason, there are various selection methods to define a stake, or a combination
thereof. Different cryptocurrencies that utilise PoS employ different variants to define
“stakes”.
8) What is BFT? Explain p-BFT? State Advantages and Disadvantages.
What is Byzantine Fault Tolerance?
Byzantine Fault Tolerance (BFT) is the feature of a distributed network to reach consensus
(agreement on the same value) even when some of the nodes in the network fail to
respond or respond with incorrect information. The objective of a BFT mechanism is to
safeguard against the system failures by employing collective decision making (both –
correct and faulty nodes) which aims to reduce to influence of the faulty nodes. BFT is
derived from Byzantine Generals’ Problem.
PBFT-pBFT tries to provide a practical Byzantine state machine replication that can work
even when malicious nodes are operating in the system.
Nodes in a pBFT enabled distributed system are sequentially ordered with one node being
the primary (or the leader node) and others referred to as secondary (or the backup
nodes). Note here that any eligible node in the system can become the primary by
transitioning from secondary to primary (typically, in the case of a primary node failure).
The goal is that all honest nodes help in reaching a consensus regarding the state of the
system using the majority rule.
A practical Byzantine Fault Tolerant system can function on the condition that the
maximum number of malicious nodes must not be greater than or equal to one-third of all
the nodes in the system. As the number of nodes increase, the system becomes more
secure.
pBFT consensus rounds are broken into 4 phases (refer with the image below):
• The client sends a request to the primary(leader) node.
• The primary(leader) node broadcasts the request to the all the
secondary(backup) nodes.
• The nodes (primary and secondaries) perform the service requested and then
send back a reply to the client.
• The request is served successfully when the client receives ‘m+1’ replies from
different nodes in the network with the same result, where m is the maximum
number of faulty nodes allowed.
The primary(leader) node is changed during every view (pBFT consensus rounds) and can
be substituted by a view change protocol if a predefined quantity of time has passed
without the leading node broadcasting a request to the backups(secondary). If needed, a
majority of the honest nodes can vote on the legitimacy of the current leading node and
replace it with the next leading node in line.
Tangle was created with the promise of high scalability, no fees, and near-instant transfers.
• The IOTA Tangle is an innovative type of distributed ledger technology (DLT) that is
specifically designed for the Internet of Things (IoT) environment.
• IOTA is based on a new type of DLT, rather than the traditional blockchain model.
• Tangle was created with the promise of high scalability, no fees, and near-instant
transfers
USE CASES OF IOTA –
1 SMART ENERGY
Energy is a major use case for IOTA and the Tangle. Since it focuses on machine-to-machine
interaction, IOTA can decentralize the power grid for clean and efficient energy throughput.
For instance, Smart charging can be used to enable independent charging and discharging of
vehicles as the car and station connect with special IOTA software and hardware. The first
working prototype for smart charging has been developed in the Netherlands, and it was built
using IOTA.
2 MANUFACTURING AND SUPPLY CHAINS
Global trade and supply chains are all involved in moving products from suppliers to
transporters, to distribution, to retail and then it is picked up from the store by daily
consumers. At every point of the supply chain, the IOTA can help in providing better
authentication, documentation, and flow of products from the raw materials to the point of
sale.
3 MOBILITY
Soon sharing data will be big business in the transportation industry. Any vehicle will become
a digital platform for transacting and transmitting data with other devices, vehicles, and
stations.
11)Explain DeFi and NFT
Decentralized Finance (DeFi)-
Developed on top of blockchain networks, DeFi is a network of financial apps. Because it is
open and programmable, runs without a centralised authority, and lets developers to create
new models for payments, investing, lending, and trading, it differs from conventional
financial networks.
Customers may quickly create safe decentralised financial apps by utilising distributed
networks and smart contracts. DeFi companies, for instance, currently provide goods that
make it possible to trade on decentralised exchanges, earn interest on bitcoin holdings, and
conduct peer-to-peer lending and borrowing. Compound, Aave, UniSwap, and MakerDAO
are a few of the well-known DeFi systems.
Advantages of cryptocurrency
1. Protection from inflation
2. Self-governed and managed
3. Secure and private
4. Currency exchanges can be done easily
5. Decentralized
6. Cost-effective mode of transaction
7. A fast way to transfer funds
Disadvantages of cryptocurrency
1. Can be used for illegal transactions
2. Data losses can cause financial losses
3. Decentralized but still operated by some organization
4. Some coins not available in other fiat currencies
5. Adverse Effects of mining on the environment
6. Susceptible to hacks
7. No refund or cancellation policy
2) Altcoins: They are viewed as alternatives to Bitcoin, the original cryptocurrency, even if
they may all be considered coins. Also known as stictions, apart from Ethereum, most of the
first ones were forked from Bitcoin. These include Name coin, Peercoin, Litecoin, Dogecoin,
and Aurora coin.
3) Tokens: In a blockchain, tokens mentioned before, a digital wallet stores them and
accessed with a key, which can be reassigned to someone else. Tw types of tokens exist.
First, is a native token. This type of token has an intrinsic utility. It forms the core part of a
blockchain. That is to say, a blockchain could without a native token. Often times, they're
used as incentive to validate transactions, or create blocks. Be careful not run that tokens
and gg coins have different properties. The majority of people frequently use them
interchangeably, yet this is incorrect.
4) Bitcoin: The king of the castle. Created in 2008, it the original code for blockchain
technology. Its creations spurred many other cryptocurrencies. It's easily the housed most
trusted and known virtual currency on the market, even if it has its flaws.
6)Litecoin: One of the first cryptocurrencies to emerge after Bitcoin's initial release. It has a
much shorter processing time-about 2.5 minutes-than Bitcoin's crazy 10-minute timeframe.
Litecoin provides more tokens and a different mining algorithm, but it ultimately didn't take
off the same way its big brother did.
7)Ripple: Because every single token was mined before its release, it is quite possibly the
most despised cryptocurrency by the community. This action is known as pre-mining and is
a huge no-no. Essentially, this takes away the community aspect of virtual currencies. It
attempts to take a decentralized platform and centralize it.
8)Monero: Solved many of Bitcoin's privacy issues. It adds an additional level on anonymity
to transactions. A few darknet markets (networks that require specific software or
authorization to access them) started accepting the cryptocurrency in 2016, where it
ultimately reached its peak.
8)Digital Tokens-
Digital tokens, simply known as "Tokens," are another market- shaking blockchain-based
technology that is trending. Tokens are a digital asset that are developed on top of
cryptocurrencies of a blockchain network. They are a minor variation of cryptocurrencies.
The token may be used for a variety of things, including granting rights, paying for services,
transferring data, offering incentives, getting access to further services, and many more. To
put it another way, a token can be utilized anyway the developer or creating company sees
fit.
The tokens are a digital asset that is less liquid than a cryptocurrency and will never be
utilised as one. Therefore, the value of every token that is produced will likewise be
specified.
The tokens may be refundable under specific circumstances, allowing us to trade them for
cryptocurrencies. Wallets are used to maintain tokens, just like they are with
cryptocurrencies.
Most tokens are now produced on the Ethereum network. It is easy to create tokens using
the Ethereum network. The establishment of a smart contract is all that is required to create
a token in Ethereum.
All that is required to create the tokens is the addition of the essential codes to the
structure. When the token is finished, the Ethereum network can use it.
9) What id NFT? Diff Between Fungible and Non Fungible Tokens (NFT)
10)Diff Between 1) Fiat currency and crypto currency 2) IPO and ICO
UNIT 5
1)What is Ethereum-
Ethereum is a blockchain-based computing platform that gives programmers the ability to
create and deploy decentralised apps, which are those that are not controlled by a single
entity. You can design a decentralised application where the decision-making suthority
resides with the system's users.
Features of Ethereum
1) Ether: This is Ethereum's cryptocurrency.
2) Smart contracts: Ethereum supports the creation and implementation of such a contract.
3) Ethereum Virtual Machine: Ethereum offers the underlying technology the software and
architecture that recognises smart contracts and enables you to communicate with them.
4) Decentralized applications (Dapps): A Dapp is a short form of Decentralized apps, which
are consolidated DAPP, App, or DApp) is a short form for a applications, are possible using
Ethereum.
5) Decentralized Autonomous Organizations: You may build these for democratic decision-
making using Ethereum.
Types of Ethereum Network -
1)Mainnet-Mainnet is the current live network of Ethereum. The current version of main
net is Byzantium (Metropolis) and its chain ID is Chain ID is used to identify the network.
2)Testnet-The commonly used test network for the Ethereum blockchain is known as
Testnet. Before being implemented on the live production blockchain, smart contracts and
DApps are tested on this test blockchain. Additionally, since it's a test network, study and
experimentation are allowed.
The primary testnet, known as Ropsten, has all the characteristics of various smaller and
specialized testnets that were made for certain versions. Kovan and Rinkeby, for example,
were created as additional testnets to evaluate Byzantium versions.
3)Private net- As the name suggests, this is the private network that can be created by
generating a new genesis block.
This is usually the case in private blockchain distributed ledger networks, where a private
group of entities start their blockchain and use it as a permissioned blockchain.
Differentiate Bitcoin And Ethereum
2)Explain Decentralized Autonomous Organization (DAOs)-
A DAO is a digital organisation that functions in a decentralised, democratic manner without
the use of hierarchical administration.
In summary, a DAO is an organisation where decision-making is preferably delegated to
certain specified authorities or a group of designated individuals as a part of an authority
rather than being centralised.
DAOS rely on smart contracts for decision-making or, in other words, decentralised voting
systems within the organisation since it lives on a blockchain network and is regulated by
the protocols included in a smart contract.
The voting mechanism, which is controlled by a decentralised application, must thus be
used before any organisational decision can be taken. This is how it works. People
contribute money through the DAO because it needs it to function and make decisions.
Based on it, a token that represents each member's share in the DAO is issued to them.
With those tokens, users may cast votes in the DAO, and the proposal's status is determined
by which users cast the most votes.
This voting procedure must be used for every decision made inside the organisation.
3)What are the Components of Ethereum network?
1)Nodes –
1. Mining Node –
These nodes are responsible for writing all the transactions that have occurred
in the Ethereum network in the block.
2. Ethereum Virtual Machine Node –
These are the nodes in the Ethereum network in which Smart Contracts (it is a
type of contract between supporter and developer in which there are a set of
rules based on which both the parties agree to interact with each other. The
agreement will be automatically executed when the pre-defined rules are met.)
are implemented. By default, this node utilizes a 30303 port number for the
purpose of communication among themselves.
2)Ether –
• Ether is a type of cryptocurrency used in the Ethereum network just like a
bitcoin is used in a blockchain network. It is a peer-to-peer currency, similar to
Bitcoin. It tracks and promotes each transaction in the network.
• It is the second-largest cryptocurrency in the world. The first one is Bitcoin.
Other cryptocurrencies can be used to get ether tokens, but vice versa is not
true.
3)Gas –
• Gas is an internal currency of the Ethereum network. We need gas to run
applications on the Ethereum network, much as we need gas to run a vehicle.
• To complete every transaction on the Ethereum network, a consumer must first
make a payment-send out ethers-and the intermediate monetary value is
known as gas.
• Gas is a unit of measurement on the Ethereum network for the computing
power used to execute a smart contract or a transaction.
• The price of gas is very low compared to Ether. The execution and resource
utilization costs are predetermined in Ethereum in terms of Gas units,
called gwei.
4)Ethereum Accounts –
1. Externally owned account –
These accounts are used to store transactions.
2. Contract account –
As the name itself suggests, these accounts store the details of Smart
Contracts.
5)Nonce –
For externally owned accounts, nonce means the number of transactions via this account.
For a contract account, nonce means the number of contracts generated via this account.
6)Storage Root –
It is the main root node of a Merkle tree. Hash of all details of the account is stored here.
The root of the Merkle tree is the verification of all transactions.
The process
There are two parties (a buyer and a seller) interested in purchasing and selling an item.
Those two parties establish a smart contract, which is a digital and self-executing agreement,
with its terms or conditions written in codes on a decentralised blockchain network. When all
parties agree to these conditions, the transaction is completed. fully
data The smart contracts platform provides top-notch security and total transparency.
Additionally, it prevents manipulation and enables the two parties to follow the transaction.
The parties involve identities, however, are kept private.
9)Enlist and Brief about Different DApps employing Swarm. And Explain use cases of swarm
DAPPS Employing Swarm
1)Etherna: A decentralised open-source video platform that prioritises content durability,
creator rewards, and censorship resistance.
2) Zetaseek: It is a search engine built on the blockchain for individual users that is intended
to organise "files, links, and references" in information that has been posted to the Swarm
network.
3) Scaleout: A platform for data storage that focuses on end-to-end privacy, the use of
DevOps tools, and advanced machine learning.
4) Boma: A communication and engagement platform with a privacy-focused approach that
offers event organisers a variety of features like engagement data, CMS capabilities, galleries,
and audio and video streaming.
5) Giveth: It is a decentralised platform for organisations to raise money that offers
accountability and transparency while facilitating donor communities.
Fundamentals of Whisper-
1)A network of equal peers
The Whisper network is made up of decentralised systems connected together as nodes. A
node creates this network by utilising the DEVp2p protocol to identify its peers.
As the basis upon which the protocols in the Ethereum stack are constructed, DEVp2p is a
crucial bit of technology in the Ethereum ecosystem. Whisper and its sister technologies
Ethereum and Swarm do not interact despite using the same wire protocol.
The common use of the same implementation by Whisper and Ethereum nodes is only a
coincidence brought on by practicality.
2) Identity-driven communication
A Dapp instance can begin receiving messages from a node after it has connected to Whisper
by creating an identity there. Although it is required to create two-way communications, an
identity is not absolutely necessary in order to send messages. This raises interesting use
cases and challenges.
In general, a Whisper identity is an entity (an individual or a group) that consumes messages.
An identity can be viewed practically as the owner of an encryption key.
Therefore, one has to generate an encryption key in order to receive Whisper messages. For
various use cases, symmetric (AES-256) and asymmetric (secp256k1) keys are both supported.
Encryption ensures that only the intended recipient(s) can access the content of a piece of
message. If a node can decrypt a piece of message, then the message is intended for a
recipient using that node.