Blockchain Technology
Blockchain Technology
Unit 3:
It was first introduced by Nick Szabo in the 1990s and later implemented with the
rise of blockchain platforms like Ethereum.
o Use case: Digital agreement between two parties — like a rental agreement,
insurance claim.
o Example: Smart contract for automatic car rental once payment is made.
2. Decentralized Autonomous Organizations (DAOs)
o Functionality: Often interact with other smart contracts or external data via
oracles.
o Example: A smart contract in a DeFi app that calculates interest and executes
payments.
2. What is bytecode in Ethereum, give its importance. List the different languages
supported by Ethereum
Bytecode in Ethereum is the low-level code that is executed by the Ethereum Virtual
Machine (EVM). When you write a smart contract in a high-level language like
Solidity, it is compiled into bytecode before deployment on the Ethereum blockchain.
The EVM reads and executes this bytecode on every node in the Ethereum network.
1. Execution on EVM:
Only bytecode can be executed by the Ethereum Virtual Machine, making it essential
for running smart contracts.
2. Portability:
Bytecode is platform-independent and can run on any node running the EVM.
3. Security:
Bytecode is immutable once deployed, ensuring the contract’s logic cannot be
tampered with.
4. Cost Efficiency:
Gas fees in Ethereum are charged based on the complexity of bytecode execution.
5. Transparency:
Anyone can verify and audit the bytecode deployed on the blockchain.
Language Description
LLL (Low-Level Lisp- Low-level language offering fine control over EVM
like Language) operations, similar to assembly.
What is Ethereum?
Has a virtual machine called the Ethereum Virtual Machine (EVM) that runs smart
contracts.
Programmable
Digital currency / store of blockchain platform for
Purpose
value DApps and smart
contracts
Satoshi Nakamoto
Creator(s) Vitalik Buterin and team
(pseudonymous)
Complex, supports
Network Simple, focused on
decentralized
Complexity transactions
applications
Development Turing-complete
Limited scripting language
Flexibility programming languages
4. Explain solidity in detail
What is Solidity?
2. Compile using the Solidity compiler (solc), which converts it into EVM bytecode.
4. Once deployed, users interact with the smart contract by calling its functions.
dvantages of Solidity
Large developer community and extensive tooling support (Truffle, Remix, Hardhat).
Challenges / Limitations
Security risks (e.g., reentrancy attacks, overflow bugs) require careful coding.
5. Write Short Note on : i) Ethereum Virtual Machine: EVM. ii) Ethereum Programming
Languages iii) Runtime Byte Code
The Ethereum Virtual Machine (EVM) is a runtime environment for executing smart
contracts on the Ethereum blockchain.
Ethereum supports multiple languages to write smart contracts, all compiled to EVM
bytecode:
Runtime Bytecode is the compiled machine-level code of a smart contract that runs
on the EVM.
Deployed on the blockchain, this bytecode is immutable and executed when contract
functions are called.
Runtime bytecode controls the contract’s logic and state changes during execution.
Components of Ethereum
o It ensures that the same code produces the same result on every node,
maintaining consensus.
2. Smart Contracts:
o Self-executing contracts with the terms directly written in code.
3. Ether (ETH):
o The native cryptocurrency used to pay for transaction fees and computational
services on the network.
4. Nodes:
5. Gas:
6. Accounts:
o Two types:
7. Blockchain:
o A distributed ledger storing all transaction history and smart contract data in
blocks linked cryptographically.
Unit 4:
Features of Hyperledger
1. Permissioned Network
Only authorized participants can join and access the network, ensuring privacy and
control.
2. Modular Architecture
Allows components like consensus algorithms and membership services to be
plugged in or customized based on needs.
5. Consensus Mechanisms
Supports multiple consensus protocols (e.g., PBFT, RAFT) suited for permissioned
environments, focusing on efficiency over mining.
8. Interoperability
Can integrate with existing enterprise systems and other blockchain platforms.
9. Open Source
Developed and maintained by the Linux Foundation with contributions from many
industry leaders.
Hyperledger Fabric is a permissioned blockchain platform designed for enterprise use. Its
architecture is modular and supports plug-and-play components to provide flexibility,
scalability, and security.
1. Peers
o Nodes that maintain the ledger and run smart contracts (called chaincode).
o Two types:
3. Ledger
6. Channels
o Allow data isolation and privacy by creating separate ledgers per channel.
7. Clients
3. Client collects endorsements and sends the transaction to the ordering service.
5. Blocks are delivered to committing peers who validate and update the ledger.
Diag: ………………………
4. State and explain the benefits of Hyperledger fabric
1. Permissioned Network
o Only authorized participants can join, ensuring enhanced privacy and security
for enterprises.
o Uses Membership Service Provider (MSP) for robust identity verification and
access control.
7. No Native Cryptocurrency
9. Integration Friendly
Consensus Mechanism
In a distributed system like blockchain, many independent nodes must agree on the
same data state.
o Used by Bitcoin.
o Validators are chosen to create new blocks based on the number of coins
they hold and lock (stake).
o Coin holders vote for a small number of delegates who validate transactions
and create blocks.
6. Raft Consensus
2. Short note on : i) Tokenizing Shares and Fund Raising ii) Challenges to tokenization
Fund Raising via tokenization allows companies to raise capital by issuing tokens
instead of traditional shares or bonds.
Regulatory Uncertainty: Laws regarding tokenized assets vary and are still evolving
worldwide.
Security Risks: Smart contract bugs or hacks can lead to loss of assets.
Liquidity Issues: Some tokens may not have active markets, limiting tradability.
Advantages:
Disadvantages:
Definition: PoA is a hybrid consensus combining PoW and Proof of Stake (PoS).
Process: Miners start by solving PoW puzzles, but instead of immediately creating a
block, they produce a block template. Then, a group of validators (selected based
on stake) signs and finalizes the block.
Advantages:
Disadvantages:
Supply Chain Management: Walmart and IBM Food Trust use blockchain to track
food products for safety and quality assurance.
Government: Land registries and identity management for transparency and fraud
prevention.
1. Definition:
2. Purpose:
4. Benefits:
5. Example:
Function of Tokenization
o Converts physical or intangible assets (like real estate, stocks) into digital
tokens on blockchain.
2. Fractional Ownership
o Divides assets into smaller parts so many people can own a fraction, making
expensive assets affordable.
3. Increased Liquidity
6. Global Access
o Anyone around the world can invest or trade tokens, expanding market
access.
o Token systems can include built-in checks for KYC and AML to follow laws
easily.
o Companies can raise money by issuing tokens (ICO, STO), allowing faster and
wider funding.
1. Increased Liquidity
2. Fractional Ownership
4. Global Access
Unit 6:
3. Decentralization
7. Cost Efficiency
8. Improved Privacy
9. Enhanced Interoperability
2. Scalability Issues
o Blockchain networks can be slow and inefficient for large healthcare data.
3. Integration Challenges
7. Limited Interoperability
2. Secure Payments
3. Loyalty Programs
4. Inventory Management
1. Cross-Border Payments
2. Fraud Reduction
4. What are the legal regulations for Blockchain in ransomware and money laundering.
3. Ransomware-Related Regulations
o Agencies like Financial Action Task Force (FATF) set global standards for
blockchain compliance.
o Blockchain solutions must comply with data protection laws (e.g., GDPR)
even in crime prevention.
1. Improved Transparency
o Reduces disputes and builds trust among suppliers, buyers, and financiers.
5. Lower Costs
6. Better Traceability
1. 51% Attack
o If a single group controls more than 50% of the network’s mining power,
they can manipulate transactions.
o Once deployed, contracts are immutable, making errors costly and difficult
to fix.
o If a private key is lost or stolen, funds and data are at risk without recovery
options.
4. Phishing Attacks
o Users can be tricked into revealing their private keys or seed phrases via
fake websites or messages.
5. Sybil Attacks
7. Consensus Manipulation
7. What are the selection Criteria for Blockchain platform for Applications?
1. Consensus Mechanism
o Example: Proof of Stake (PoS) is faster and more energy-efficient than Proof
of Work (PoW).
2. Scalability
3. Security Features
6. Interoperability
o Ability to interact with other blockchains and legacy systems.