0% found this document useful (0 votes)
21 views12 pages

BCT

The document explains how Ethereum operates from a user's perspective, detailing the steps for requesting Ether, initiating transactions, and confirming them on the network. It also covers the Transaction Substate and State Storage mechanisms in Ethereum, emphasizing the validation process and the use of Merkle Patricia Tries for efficient data management. Additionally, it describes the Ethereum Virtual Machine (EVM) and Geth as essential tools for interacting with the Ethereum blockchain, along with an overview of Hyperledger's architecture and design principles for enterprise blockchain solutions.

Uploaded by

ppoojashreeanand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views12 pages

BCT

The document explains how Ethereum operates from a user's perspective, detailing the steps for requesting Ether, initiating transactions, and confirming them on the network. It also covers the Transaction Substate and State Storage mechanisms in Ethereum, emphasizing the validation process and the use of Merkle Patricia Tries for efficient data management. Additionally, it describes the Ethereum Virtual Machine (EVM) and Geth as essential tools for interacting with the Ethereum blockchain, along with an overview of Hyperledger's architecture and design principles for enterprise blockchain solutions.

Uploaded by

ppoojashreeanand
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

2. Discuss how Ethereum works from a user's point of view. (Pg.

315-317)

To understand how Ethereum works from a user's perspective, let's break down the process using relevant
information from the provided citations.

Step-by-Step Explanation:

1. Requesting Ether:

o A user (e.g., Irshad) can request funds from another user (e.g., Bashir) by providing their
Ethereum address. This request can be sent via a QR code or manually inputted into the wallet
software. For example, Irshad might send a QR code to Bashir through email or text.

2. Initiating a Transaction:

o Once Bashir receives the request, they can initiate a transaction by either scanning the QR code
with their Ethereum wallet app or manually entering Irshad's address into the wallet software.
This step involves specifying the amount of Ether to be sent.

3. Broadcasting the Transaction:

o After confirming the details, the transaction is broadcasted to the Ethereum network. The
sender must digitally sign the transaction to prove ownership of the Ether, ensuring authenticity
and security.

4. Transaction Confirmation and Tracking:

o Once the transaction is sent, it propagates across the network for verification by other nodes
(miners). The transaction can be tracked on a block explorer like Etherscan.io to monitor its
status and confirm that it has been added to the blockchain.

Key Takeaways:

• User-Friendly Interfaces: Ethereum wallets (like Jaxx) provide an intuitive way for users to send,
receive, and manage their Ether.

• Smart Contracts: While not directly mentioned in this context, smart contracts enable automated
processes on the Ethereum network, which can be explored further as you delve deeper into its
features.

This process exemplifies how Ethereum operates from a user's point of view, emphasizing simplicity and
accessibility for individuals interacting with cryptocurrency.

6. Explain Transaction substate and state storage in the Ethereum blockchain. (Pg. 329-330)

Explanation of Transaction Substate and State Storage in Ethereum Blockchain

The Ethereum blockchain operates as a transaction-driven state machine, where transactions are processed
through the state transition function. The Transaction Substate refers to the specific aspects of this process
that manage the execution and validation of transactions within the state machine.

Transaction Substate:

• Definition: The Transaction Substate is an integral part of Ethereum's state transition function, ensuring
that each transaction is validated according to predefined rules.

• Function: It involves confirming the validity of a transaction by checking its syntax, signature, and
nonce. Additionally, it calculates transaction fees, resolves the sender's account using their signature,
deducts the appropriate amount from the sender's balance, and increments the nonce.

• Execution Steps:
1. Validation: The transaction is checked for syntactic correctness and valid signature (e.g.,
message authentication code).

2. Fee Calculation: Gas fees are computed based on the transaction's size, and the miner's
address is determined using the signature.

3. Balance Check and Transfer: The sender's balance is checked to ensure it can cover the
transaction's costs. If sufficient funds are available, the transfer proceeds; otherwise, an error
occurs.

4. Nonce Incrementation: After a valid transaction, the nonce at the sender's account is
incremented for future reference.

State Storage:

The state of accounts on the Ethereum blockchain is stored using a data structure that ensures efficient and
secure storage. The State Storage mechanism in Ethereum uses a Merkle Patricia Trie (MPT) to organize and
manage the account states, which are then serialized using the Recursive Length Prefix (RLP) encoding
scheme.

Components of State Storage:

1. World State: This is an extensive data structure that maps each account address to its state. The state
includes information such as nonce, balance, storage root, and code hash.

2. Account State:

o Nonce: A unique value incremented each time a transaction is sent from the account.

o Balance: Represents the amount of Ether ( Wei ) held by the account.

o Storage Root: The root node of the MPT that encodes the account's storage data.

o Code Hash: An immutable hash of the smart contract code associated with the account.

RLP Serialization:

The Recursive Length Prefix encoding is used to serialize binary data for efficient storage and transmission over
the network. This process converts complex data structures into a compact byte sequence, making them
suitable for storage within the MPT.

Conclusion:

The Transaction Substate ensures that each transaction is validated and executed according to the rules
defined by Ethereum's state transition function. The State Storage mechanism efficiently organizes and stores
account states using advanced data structures and serialization techniques, ensuring the integrity and
accessibility of blockchain data.

9. Explain EVM and its operation with pictorial representation. (Pg. 333-335)

Here's a concise, exam-focused answer to the question:

Ethereum Virtual Machine (EVM) and Its Operation

(From “Mastering Blockchain”, pp. 333–335)

Definition:
The Ethereum Virtual Machine (EVM) is the runtime environment for executing smart contracts on the
Ethereum blockchain. It is a Turing-complete, stack-based virtual machine that ensures secure and isolated
execution of code.

Key Features:

1. Isolated Environment: EVM executes smart contracts without direct access to external systems like
files or networks.

2. Stack-Based Architecture: Operates using a LIFO (Last In First Out) stack with a depth of 1024
elements.

3. Word Size: Processes 256-bit word size, optimized for cryptographic operations.

4. Memory and Storage:

o Memory: Temporary, cleared after execution.

o Storage: Permanent, stored on blockchain.

5. Gas Mechanism: Each operation costs gas to prevent infinite loops and misuse.

EVM Components and Operation:

Component Description

ROM Stores contract bytecode (read-only).

Memory Temporary workspace during execution.

Storage Persistent key-value store (long-term state).

Stack Used for computation (operands and results).

Program Counter (PC) Points to the current instruction being executed.

Execution Flow:

1. Smart contract code is copied from ROM to Memory.

2. Program Counter (PC) fetches the next opcode.

3. Opcode operates on stack, memory, or storage.

4. Gas is deducted for each step.

5. Execution ends when all instructions are processed or gas is exhausted.

Pictorial Representation:
Conclusion:

The EVM is critical to Ethereum's functioning. It ensures secure, decentralized, and deterministic execution
of smart contracts using its stack-based, gas-regulated model.

10. Briefly describe Geth. (Pg. 350-354)

Here’s a brief, exam-oriented answer for:

Geth – Go Ethereum Client

(From "Mastering Blockchain", pp. 350–354)

Definition:

Geth is the official Go language implementation of the Ethereum protocol. It allows users to interact with the
Ethereum blockchain — joining networks, mining Ether, deploying smart contracts, and more — using a
command-line interface.

Key Features:

1. Written in Go: Lightweight and fast, ideal for servers and embedded systems.

2. Command Line Interface (CLI): Provides full access to blockchain functions via terminal.

3. Supports Multiple Networks:

o Mainnet: Default Ethereum network.

o Testnets: Ropsten, Rinkeby, etc. (via flags like --testnet, --rinkeby).

o Private Net: Custom Ethereum network for development and testing.


Important Commands:

• Create New Account:

o $ geth account new

• Start Geth on Mainnet:

o $ geth

• Connect to Testnet:

o $ geth --testnet

Useful Flags for Private Network Setup:

Flag Description

--datadir Specifies data directory for blockchain data

--networkid Custom network ID to separate from public nets

--rpc Enables JSON-RPC server

--rpcapi Specifies enabled APIs like eth, web3

--rpccorsdomain Sets CORS access rules for API

--port Sets TCP port for peer connections

--nodiscover Prevents automatic peer discovery

--identity Sets a name for the node

Geth Console:

You can interactively use the JavaScript console to:

• Manage accounts (personal.newAccount("pass"))

• Check balance (eth.getBalance(eth.coinbase))

• Start mining (miner.start(2))

• Stop mining (miner.stop())

Conclusion:

Geth is an essential tool for developers and miners to interact with Ethereum networks. It supports public and
private networks and enables full blockchain functionality via a simple terminal interface.

Let me know if you need this converted to a PDF format or visual summary for quick revision.
2. Explain Hyperledger as a protocol or Hyperledger reference architecture model that serve to build
permissioned distributed ledgers. (Pg. 533-534)

Here is a brief and exam-ready answer on:

Hyperledger as a Protocol / Hyperledger Reference Architecture Model

(from BCT.pdf, pp. 533–534)

Definition:

Hyperledger is an open-source collaborative project by the Linux Foundation. It is not a blockchain itself but a
protocol and reference architecture used to build permissioned distributed ledger systems for enterprise
use.

1. Hyperledger as a Protocol:

• Hyperledger provides specifications and modular frameworks to build business blockchains.

• Unlike traditional blockchain platforms (like Bitcoin or Ethereum), Hyperledger is designed to be


industry-agnostic, modular, and permissioned.

• It allows businesses to build custom blockchains tailored to specific use cases.

2. Hyperledger Reference Architecture:

This model consists of several key layers and components to enable a complete permissioned DLT system:

Layer / Component Function

Identity Provides authentication, authorization, and identity services.

Policy Handles endorsement, consensus, and access policies.

Ledger & Transactions Contains the distributed ledger, ordering services, validation mechanisms.

Smart Contracts Executes business logic using “chaincode” hosted in secure containers.

Consensus Layer Ensures agreement among participants on transaction order and validity.

Communication Layer Manages message passing between network nodes.

Security & Crypto Offers privacy, confidentiality, and non-repudiation using cryptography.

Data Stores Pluggable storage (e.g., LevelDB, CouchDB) for storing the world state.

APIs & SDKs Provide interfaces for apps to interact with the blockchain (e.g., deploy chaincode).

Diagram (Simplified Overview):


Conclusion:

The Hyperledger reference architecture is a modular, flexible, and enterprise-grade model for building
permissioned blockchain networks. It addresses key needs like privacy, scalability, and regulatory
compliance — making it suitable for real-world business applications.

Let me know if you want a visual revision chart or PDF summary!

3. Describe Hyperledger design principles. (Pg. 535-536)

Here's an exam-oriented answer on:

Design Principles of Hyperledger Fabric

(From Mastering Blockchain, pp. 535–536)

Hyperledger Fabric is designed to meet the needs of enterprise-grade permissioned blockchain systems. Its
architecture is based on several core design principles:

1. Modular Architecture

• Hyperledger is built to be modular and pluggable.

• Key components like consensus, membership services, smart contracts (chaincode), and storage
can be swapped based on business needs.

• This supports flexibility across various industries and use cases.

2. Privacy and Confidentiality

• Critical for business use where sensitive data must be shared only with authorized parties.
• Hyperledger allows the use of advanced cryptographic techniques and supports private channels for
confidential transactions.

• Modular cryptographic components support pluggable cryptographic algorithms, including


integration with Hardware Security Modules (HSMs).

3. Scalability

• Fabric is built to support high transaction throughput and scale to many users without performance
degradation.

• It achieves this through the separation of transaction processing into three phases: execution,
ordering, and validation.

4. Deterministic Transactions

• All transactions must produce the same result on all nodes to ensure consistency and consensus.

• Non-deterministic operations (e.g., reading from system time or random values) are discouraged to
avoid inconsistencies.

5. Identity and Access Management

• Based on a flexible Public Key Infrastructure (PKI) model.

• Uses Membership Service Providers (MSPs) to manage user identities and permissions.

• Supports role-based access control, including the possibility of anonymous identities when needed.

6. Auditability

• Maintains an immutable audit trail for all transactions and operations.

• Enables compliance with regulatory requirements and allows authorized auditors to trace activities.

7. Interoperability

• Designed to interoperate with other blockchain systems in the future.

• Aims to define common standards for cross-chain communication.

8. Portability

• Should run across different environments and platforms.

• Portable at the level of code, libraries, APIs, and infrastructure.

9. Rich Data Queries

• Supports advanced query mechanisms using traditional query languages (e.g., CouchDB enables
JSON queries).
• Enhances usability and allows for integration with existing enterprise systems.

Conclusion (Exam Summary)

Hyperledger Fabric follows a modular, secure, and scalable design approach. It emphasizes privacy,
interoperability, and compliance, making it suitable for enterprise blockchain applications.

Let me know if you want this formatted for print or as a flashcard-style PDF!

5. Describe the core features of Hyperledger Sawtooth. (Pg. 550-551)

Here's an exam-oriented answer for:

Core Features of Hyperledger Sawtooth

(From BCT.pdf, pp. 550–551)

Hyperledger Sawtooth is a modular blockchain platform designed for enterprise use. It supports both
permissioned and permissionless blockchain networks.

Core Features:

1. Modular Architecture

• Designed to support pluggable components such as consensus algorithms and transaction


processors.

• Allows businesses to customize blockchain behavior based on specific needs.

2. Transaction Families

• Instead of using a general-purpose virtual machine like Ethereum’s EVM, Sawtooth uses transaction
families.

• These are modular logic units that define rules for specific domains (e.g., supply chain, finance).

• Examples:

o IntegerKey: for basic testing

o MarketPlace: for trading and selling

o Endpoint Registry: for registering ledger services

3. Novel Consensus – PoET (Proof of Elapsed Time)

• A trusted execution environment (TEE)-based consensus mechanism.

• Efficient and low-energy alternative to Proof of Work.


• Randomly selects a leader based on wait time — simulated using Intel’s SGX (Software Guard
Extensions).

4. Pluggable Consensus Mechanisms

• Besides PoET, it also supports quorum-based voting for permissioned networks.

• Allows dynamic switching of consensus algorithms without redeploying the network.

5. Separation of Consensus and Transaction Logic

• Decouples the ledger system from the transaction logic.

• Enhances flexibility and scalability by allowing independent development of each component.

6. Parallel Transaction Execution

• Sawtooth supports parallel execution of transactions using a technique called transaction


scheduling.

• Improves performance by executing non-conflicting transactions concurrently.

7. Multi-language Support

• Developers can write transaction processors in multiple languages, such as Python, Go, Rust, etc.

8. Support for Both Private and Public Networks

• Can be used in enterprise (private) as well as public blockchain environments.

Conclusion (Exam Summary)

Hyperledger Sawtooth is a flexible and scalable enterprise blockchain platform that introduces innovations
like PoET consensus and transaction families. It is ideal for building domain-specific distributed ledger
applications.

Let me know if you’d like a diagram of Sawtooth architecture or a printable revision sheet.

8. With pictorial representation explain Corda high-level network architecture. (Pg 675)

Here is an exam-oriented answer with pictorial representation of the:

Corda High-Level Network Architecture

(From Mastering Blockchain, p. 675)

Overview:
Corda is a distributed ledger platform designed specifically for businesses, particularly in financial
services. Unlike traditional blockchains, Corda does not use blocks and does not broadcast transactions
globally. Instead, it shares data only with relevant parties.

Key Components of the Corda Network:

Component Function

Nodes Run by individual organizations. Communicate over TLS+AMQP securely.

Notary Service Prevents double-spending by ensuring transaction uniqueness and time-ordering.

Permissioning Service Issues and manages TLS certificates using an X.500-based naming system.

Network Map Service Provides a registry of all nodes and their services in the network.

Oracle Service Injects real-world data (e.g., FX rates, prices) into Corda transactions.

Communication Protocol:

1. AMQP (Advanced Message Queuing Protocol) over TLS is used for peer-to-peer communication.

2. All communications are authenticated and encrypted.

Corda Node Architecture (Diagram Representation):

Explanation of Diagram:

1. Node 1 ↔ Node 2: Exchange messages using AMQP over TLS.

2. Vault: Each node stores its own relevant state data in a local database.

3. Flows: Automate interaction between nodes.

4. CorDapps: Applications running on nodes for executing business logic.

5. Notary: Signs transactions to confirm uniqueness and finality.


6. Oracle: Provides real-world facts for smart contracts.

7. Permissioning: Ensures secure identity management.

8. Network Map: Maintains list of all participating nodes and their services.

Conclusion (Exam Point):

Corda’s high-level network architecture is modular, secure, and privacy-oriented. It replaces global
broadcasting with peer-to-peer communication and uses notary services for consensus, making it ideal for
enterprise-level DLT solutions.

Let me know if you'd like this diagram exported as a PNG or PDF for notes!

You might also like