Blockchain architecture uses distributed ledger technology to allow transactions to be recorded in a verifiable and permanent way without the need for a central authority. It consists of a chain of blocks containing transactions that are linked using cryptography and validated by nodes before being added to the chain. Various consensus mechanisms like proof of work, proof of stake, and proof of authority are used to validate transactions and reach agreement in blockchain networks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
40 views5 pages
Unit 3 BC
Blockchain architecture uses distributed ledger technology to allow transactions to be recorded in a verifiable and permanent way without the need for a central authority. It consists of a chain of blocks containing transactions that are linked using cryptography and validated by nodes before being added to the chain. Various consensus mechanisms like proof of work, proof of stake, and proof of authority are used to validate transactions and reach agreement in blockchain networks.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5
Blockchain Architecture:
• Blockchain is a distributed, decentralized, and immutable digital ledger.
• It consists of a chain of blocks, where each block contains a set of transactions. • Blocks are linked together using cryptographic hashes, forming an unalterable chain. • The first block in the chain is called the genesis block. • Transactions are verified and validated by a network of nodes before being added to a block. • Each node maintains a copy of the entire blockchain, ensuring transparency and redundancy. • Blockchain architecture is designed to be resilient, secure, and resistant to data tampering. • It eliminates the need for a central authority or intermediary by enabling peer-to- peer transactions. • Smart contracts can be deployed on the blockchain, enabling programmable and self-executing agreements. • Blockchain architecture can be permissionless (public) or permissioned (private/consortium), depending on the access control mechanisms.
2. Operation of Bitcoin Blockchain:
• Bitcoin was the first and most well-known implementation of blockchain
technology. • It operates on a decentralized peer-to-peer network with no central authority. • Users can send and receive Bitcoin transactions using digital wallets and addresses. • Transactions are broadcast to the network and validated by miners. • Miners compete to solve a computationally intensive cryptographic puzzle (Proof-of-Work) to add new blocks to the chain. • The first miner to solve the puzzle and broadcast the new block receives a reward in the form of newly minted bitcoins. • The Bitcoin blockchain is designed to maintain a target block time of approximately 10 minutes. • The difficulty of the cryptographic puzzle adjusts automatically to maintain a consistent block time. • Bitcoin uses the UTXO (Unspent Transaction Output) model to track and manage transactions. • The Bitcoin blockchain is transparent, and all transactions are publicly visible and verifiable.
3. Consensus Mechanisms:
a. Proof of Work (PoW):
• PoW is the consensus mechanism used by Bitcoin and several other
blockchains. • Miners compete to solve a computationally intensive cryptographic puzzle to add new blocks. • The puzzle involves finding a nonce value that produces a hash meeting specific difficulty criteria. • The first miner to solve the puzzle and broadcast the new block is rewarded with newly minted coins. • PoW ensures that blocks are added to the chain in a secure and decentralized manner. • It provides security through the computational effort required to solve the puzzle. • PoW is energy-intensive and has scalability limitations due to its computational requirements. • It incentivizes miners to contribute computing power to secure the network. • PoW is resistant to Sybil attacks and ensures a fair distribution of mining rewards. • Alternative PoW algorithms, such as Equihash and Ethash, have been developed to address ASIC centralization concerns.
b. Proof of Stake (PoS):
• PoS is an alternative consensus mechanism that aims to address the energy
consumption and scalability issues of PoW. • Instead of computational power, PoS relies on the stake (cryptocurrency holdings) of validators. • Validators are selected to validate and add new blocks based on their stake in the network. • The selection process can be based on various algorithms, such as coin age, randomized selection, or a combination of factors. • Validators are incentivized to act honestly and validate transactions correctly to earn rewards and avoid penalties. • vi. PoS is more energy-efficient than PoW since it does not require intensive computational work. • vii. It provides better scalability and faster transaction confirmation times. • viii. PoS systems can suffer from the "nothing at stake" problem, where validators have no incentive to behave honestly. • ix. Various PoS algorithms, such as Delegated PoS (DPoS), Leased PoS (LPoS), and Casper (Ethereum's PoS implementation), have been developed to address different challenges. • x. PoS requires careful design and incentive mechanisms to ensure security and decentralization.
c. Byzantine Fault Tolerance (BFT):
• BFT is a consensus mechanism designed to achieve agreement in distributed
systems with potentially malicious nodes. • It ensures that the system can reach consensus and continue operating correctly, even if some nodes fail or act maliciously. • BFT systems typically involve a set of validators or replicas that participate in the consensus process. • The consensus algorithm must handle scenarios where up to one-third of the validators are faulty or malicious. • BFT systems can provide higher transaction throughput and lower latency compared to PoW and PoS. • They are often used in permissioned blockchain networks or consortium environments. • BFT consensus algorithms, such as Practical Byzantine Fault Tolerance (PBFT) and Tendermint, have been developed and implemented in various blockchain systems. • BFT systems require careful parameter tuning and configuration to ensure optimal performance and security. • They may have scalability limitations due to the communication overhead involved in reaching consensus among validators. • BFT systems are typically more complex and require a higher level of coordination compared to other consensus mechanisms. d. Proof of Authority (PoA):
• PoA is a consensus mechanism used in permissioned blockchain networks.
• It relies on a set of pre-approved and trusted validators (authorities) to validate transactions and add new blocks. • Authorities are typically identified by their real-world identities and reputations. • PoA systems can achieve higher throughput and lower latency compared to PoW and PoS. • They are suitable for consortium or enterprise-level blockchain networks with known and trusted participants. • PoA systems are more centralized than public blockchains but can provide better performance and efficiency. • Authorities are incentivized to behave honestly to maintain their reputation and continue participating in the network. • PoA systems can be vulnerable to collusion or compromised authorities, as they rely on trusted entities. • Careful selection and monitoring of authorities are crucial to maintain the integrity and security of the network. • PoA is often used in combination with other consensus mechanisms, such as BFT, for added security and fault tolerance.
e. Proof of Elapsed Time (PoET):
• PoET is a consensus mechanism developed by Intel for permissioned blockchain
networks. • It uses a trusted execution environment (TEE) to ensure the integrity and randomness of the leader election process. • The leader election is based on a random wait time, with the node waiting the shortest time being elected as the leader. • PoET aims to provide a fair and energy-efficient consensus mechanism without the need for intensive computational work. • It is designed to be secure against various attacks, such as grinding or pre- computing attacks. • PoET requires specialized hardware (Intel SGX) to implement the trusted execution environment. • It is suitable for permissioned and consortium blockchain networks with known participants. • viii. PoET can provide high transaction throughput and low latency compared to other consensus mechanisms. • ix. It eliminates the need for energy-intensive mining or staking processes. • x. PoET is still a relatively new consensus mechanism and is primarily used in Intel-based blockchain solutions.