SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
Blockchain Technology
Giuseppe Andreetti
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Introduction
● Distributed Ledger
● Blockchain
● How Blockchain works
● Bitcoin
● Blockchain 2.0
Outline
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 2
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
On the Internet if we want to exchange informations
or money we need a third-part that sign,certify and
validate these data.
Obviously, the third-part offers us a service that
most of the time we have to pay.
● Blockchain is born in order to eliminate this third-
part.
Why is Blockchain born?
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 3
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● The blockchain technology is the technology on
which Bitcoin is based, this type of
implementation was described the first time by
Satoshi Nakamoto (it is a fictitious name used by
the unknown person or persons who designed
bitcoin and created its original standard) in 2008
by a white paper: “Bitcoin: A Peer-to-Peer
Electronic Cash System”.
Introduction
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 4
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● What is a ledger?
A ledger, is defined as a central repository of the
accounting information of an organization in which
the summaries of all financial transactions during an
accounting period are recorded.
The transaction are registered in chronological
order.
Ledger
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 5
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
A digital ledger is stored in a central server:
● control mechanism that authenticates users, enables secure access, and
enforces access restrictions (for example, read-only)
A distributed ledger:
● list of cryptographically signed, irrevocable records of transactions that is
shared by a distributed network of computers
● every participant has the same copy of the ledger. Each participant may
propose a new transaction to be added to the ledger and when consensus
that the transaction is valid is reached, it is added to the register
Distributed Ledgers
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 6
● A consensus mechanism is used in which
computers on the network check each other to
ensure records are consistent. This mechanism is
implemented by systems called miners.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Architecture Comparison
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 7
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● It is a growing list of records, blocks, which are linked to
each other and made safe by the use of cryptography.
● Each block in the chain contains a hash pointer as a link
to the previous block, a timestamp and the transaction
data.
● Blockchain, is basically an open and distributed register
that can record transactions in an efficient, verificable and
permanent way. For this use, this database exploits a
peer-to-peer network that connects to a protocol for the
validation of new blocks. Once registered, the data in a
block can not be retroactively changed.
What is Blockchain?
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 8
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● A blockchain is a linear sequence of blocks used
to store transactions.
● Each block contains one or more related
transactions, and the blocks are ordered in
increasing time sequence.
Blockchain concepts
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 9
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Chain
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 10
It is computationally feasible to add a new block to the end of the chain
but computationally infeasible to replace a block interior to the chain or
to insert a new block between two existing blocks in the chain.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● A unique identifier for the blockchain; remains constant
for all subsequent blocks.
● Blocksize field that specifies the total number of bytes in
the block.
● Block format version.
● Backward Link consists of the hash of all of the headers
of the preceding block.
● Transaction Hash. This hash value is computed from the
set of data blocks that comprise the list of transactions.
● Timestamp, which indicates the relative time that this
block was created.
● Mining Difficulty, is a measure of how difficult it is to find
a new block.
● Nonce, casual number used for the proof-of-work (varying
this number changes the PoW difficulty)
● Transaction Counter, number of transactions in this
block.
● Transaction, the (nonempty) list of transactions.
Structure of the blocks
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 11
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Linkage Between Blocks
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 12
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Merkle Tree
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 13
● The transaction blocks are
processed in pairs; if there is an
odd number of transactions, the
last transaction on the list is
duplicated.
● Each pair of blocks is
concatenated to form a binary
block that is input to a hash
function, typically SHA-256.
● This process continues until a
single hash value results, known
as the Merkle Root.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Each user has a copy of the blockchain.
● Each user running the blockchain client is part of the
network.
● New blocks are broadcast to the network.
● Each user updates its local copy of the blockchain.
● If a user is behind the current height of the chain, it can
ask other nodes for copies of the blocks needed to catch
up.
● If every user has a copy of the blockchain, when the
blockchain is queried, every user gets the same answer.
Characteristics of the blockchain
environment
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 14
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Mining: linking a new block to the end of the chain.
● Proof-of- Work: sacrifice of time and energy dedicated to
that particular block.
● Miners: who provide to mine the blocks. In distributed
blockchain application, there are no designated miner
(generally there is a reward for the miners, for example, in
the Bitcoin environment they gain cryptovalues).
In the case there are two equal block mined to different
miners, the clients choose the block with the highest Proof-
of- Work.
Blockchain Mining
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 15
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Users broadcast transactions onto the network to be added to
a new block.
● A miner collects these transactions to form a pool of
transactions that are not yet part of a block.
● The miner constructs a new block with the pool of the actions
it currently has.
● The miner then invests considerable computational effort to
construct a new block (Bitcoin: The cryptographic hash value
of the block header is calculated to form the backward link used
by the next block in the chain.
● This block is then broadcast to all the miners on the network
and tentatively added to the end of the blockchain.
How is constructed a block
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 16
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
An adversary who wishes to successfully alter the
transaction list is faced with two alternative challenges:
1. modify the transaction list in such a way that the
transaction hash is unchanged, also leaving the header
hash unchanged; this modification is computationally
infeasible for a secure hash function (such as SHA-256);
2. allow the transaction hash to change but modify the
nonce so that the header hash is unchanged; again, this
modification is computationally infeasible;
The nonce, transaction hash, and header hash protect the
blockchain.
Attack the block
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 17
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Building the chain
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 18
Some miners works to add a
block on 0.
In the same time differents
miners attach 2 differents block
to 0.
Some miners will work on 1B,
other on 1A.
A miners attach a block on 1B,
so 1A is discarded and all the
miners follow to work on the
longest chain.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
It is not necessary for all users to perform all the blockchain tasks.
There are 5 categories of configuration:
1. Basic client: key management operations, no P2P comunications.
2. Thin Client: key management operations. It performs some P2P
tasks (network communication and blockchain verification). It does
not keep a copy of the full blockchain.
3. Thick Client: key management operations and P2P tasks. It mantain
a copy of the full blockchain.
4. Fully Functional Basic Client: as a thick client, but also executes
the mining algorithm.
5. Hosted Client: webclient, it does not run on a user-controlled
device.
Type of Clients
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 19
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Public: nodes participating in a public blockchain
network do not have to obtain permission to
access the ledger or add transactions.
● Consortium: The right to read the blockchain
may be public or restricted to the participants. The
validation of blocks is made by authorized nodes.
● Fully private: read and write permissions are
managed by a central authority.
Blockchain Types
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 20
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Digital currency or digital money is an Internet-based medium
of exchange distinct from physical (such as banknotes and
coins) that exhibits properties similar to physical currencies, but
allows for instantaneous transactions and borderless transfer-
of-ownership.
● Cryptocurrency: a digital currency in which encryption
techniques (cryptography) are used to regulate the generation
of units of currency and verify the transfer of funds, operating
independently of a central bank.
● The first cryptocurrency to be created was Bitcoin back in
2009. Today there are hundreds of other cryptocurrencies,
often referred to as Altcoins.
What is Cryptocurrency ?
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 21
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Bitcoin is protocol. The unit digital currency is “bitcoin”.
● First “decentralized” digital currency. They are digital coins you can send
through the internet.
● Based on blockchain: a growing general public ledger of cryptographically-
signed transactions.
● All transactions are public, but are not by default tied to anyone's real identity.
● Bitcoin protocol provide to the privacy of the users.
● Secured by collective compute power of miners. It is very difficult to create a
new valid block, but very easy for every client, miner or not, to check the
validity of a new block.
Bitcoin
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 22
In simple words, bitcoin is an open source
software to transfer money over the internet.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Bitcoin relies on a network of volunteers, to
collectively implement a replicated ledger. The
ledger tracks the balance of all accounts in the
system. Each node keeps a complete replica of the
ledger.
Bitcoin: The Ledger
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 23
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Bitcoins contain the public key of their owner (i.e.
the address). When a user A transfers money to
user B, renounces his property by adding the public
key of B (his address) to the coins in question and
signing them with his private key. Then it transmits
these coins into a message through the peer-to-
peer network (“transaction”).
Bitcoin: The transactions
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 24
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Bitcoin miner nodes are responsible for validating
transactions and the state transitions that update the
ledger. Transactions are grouped in blocks by miners.
Miners are responsible for validating the transaction block
and performing a hard mathematical computation or proof
of work (PoW) which goes along used to validate the
block of transactions.
Bitcoin: Miners
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 25
● Miners that validate Bitcoin transactions get paid in
Bitcoin.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
The ledger replicas have to be consistent among all
the nodes of the network and respect the same
temporal order. Bitcoin do this by tentatively
committing transactions and then synchronizing
at regular intervals by broadcasting a block created
by one of the nodes.
Bitcoin: The Blocks
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 26
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
Have to be a chronological order over the blocks
and therefore about the transactions contained
within them. The blocks are organized in a directed
tree. Each block contains a reference to a
previously found block. The block b referenced by
a block b’ is called its parent.
Bitcoin: Blockchain
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 27
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
The Blockchain 2.0 is an evolution of the
blockchain protocol enabling not only to exchange
transaction but rather code and programs in the
form of Smart Contracts.
Now developers are allowed to build programs and
API's on the Blockchain Protocol.
Blockchain 2.0
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 28
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
The objective of this type of implementation is to allow
peopleto easily write Dapp (decentralized application) trough
the use of the blockchain technology. Dapp is a tool for
people and organizations on different sides of an interaction
use to come together without any centralized intermediary.
These apps consists in 2 part: a frontend part written in
HTML (an interface) and a backend part. The backend
operations are validated by all nodes on the network.
(Ex: in Ethereum it is implemented a scripting language.)
Programming language and Dapp
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 29
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
● Smart contracts are softwares “written“ on a shared secure
database, traceable and immutable, and they verify
automatically at a certain date or event some stipulation pre-
established between 2 or more host in the network.
Smart Contracts
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 30
● There are often hundred
condition in a single smart
contractor there are many
smart contract
interconnected.
Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics
[1] William Stallings, “A Blockchain Tutorial”, The
Internet Protocol Journal, Volume 20, Number 3,
November 2017.
[2] Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer
Electronic Cash System”, 2008.
[3] Stuart Haber, W. Scott Stornetta, “How to Time-
Stamp a Digital Document”, Journal of Cryptology,
Vol. 3, No. 2, pp. 99-111, 1991.
References
Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 31

Mais conteúdo relacionado

Mais procurados

Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Simplilearn
 
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Дмитрий Плахов
 

Mais procurados (20)

Intro into blockchain
Intro into blockchainIntro into blockchain
Intro into blockchain
 
Blockchains 101
Blockchains 101Blockchains 101
Blockchains 101
 
On Private Blockchains, Technically
On Private Blockchains, TechnicallyOn Private Blockchains, Technically
On Private Blockchains, Technically
 
Basic blockchain
Basic blockchainBasic blockchain
Basic blockchain
 
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
Blockchain Tutorial For Beginners - 2 | Blockchain Technology | Blockchain Tu...
 
Blockchain - a basic overview
Blockchain - a basic overviewBlockchain - a basic overview
Blockchain - a basic overview
 
How to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on EthereumHow to develop Decentralized App (ĐApp) on Ethereum
How to develop Decentralized App (ĐApp) on Ethereum
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?
 
Metadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
 
Information security in private blockchains
Information security in private blockchainsInformation security in private blockchains
Information security in private blockchains
 
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
 
Bitcoin, Banking and the Blockchain
Bitcoin, Banking and the BlockchainBitcoin, Banking and the Blockchain
Bitcoin, Banking and the Blockchain
 
Abhishek jaiswal blockchain
Abhishek jaiswal blockchainAbhishek jaiswal blockchain
Abhishek jaiswal blockchain
 
Vilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensusVilnius blockchain club 20170413 consensus
Vilnius blockchain club 20170413 consensus
 
Introduction to blockchain and cryptocurrency technologies
Introduction to blockchain and cryptocurrency technologiesIntroduction to blockchain and cryptocurrency technologies
Introduction to blockchain and cryptocurrency technologies
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
 
Best practices to build secure smart contracts
Best practices to build secure smart contractsBest practices to build secure smart contracts
Best practices to build secure smart contracts
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 

Semelhante a Blockchain Technology

Semelhante a Blockchain Technology (20)

Blockchain
BlockchainBlockchain
Blockchain
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
 
IRJET - A Detailed Study on Cryptocurrency
IRJET -  	  A Detailed Study on CryptocurrencyIRJET -  	  A Detailed Study on Cryptocurrency
IRJET - A Detailed Study on Cryptocurrency
 
IRJET- Blockchain Security Implementation for Financial Domains
IRJET- Blockchain Security Implementation for Financial DomainsIRJET- Blockchain Security Implementation for Financial Domains
IRJET- Blockchain Security Implementation for Financial Domains
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
 
Blockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspectiveBlockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspective
 
Blockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspectiveBlockchain technology and applications from a financial perspective
Blockchain technology and applications from a financial perspective
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
IRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature SurveyIRJET- Blockchain Technology a Literature Survey
IRJET- Blockchain Technology a Literature Survey
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
Trends and Hot Topics in Networking 2023 - IA377 Seminar FEEC-UNICAMP
Trends and Hot Topics in Networking 2023 - IA377 Seminar FEEC-UNICAMPTrends and Hot Topics in Networking 2023 - IA377 Seminar FEEC-UNICAMP
Trends and Hot Topics in Networking 2023 - IA377 Seminar FEEC-UNICAMP
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking System
 
IRJET- Study of Blockchain and its Concepts
IRJET-  	  Study of Blockchain and its ConceptsIRJET-  	  Study of Blockchain and its Concepts
IRJET- Study of Blockchain and its Concepts
 
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...IRJET-  	  Predicting Bitcoin Prices using Convolutional Neural Network Algor...
IRJET- Predicting Bitcoin Prices using Convolutional Neural Network Algor...
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
Blockchains and Smart Contracts: Architecture Design and Model-Driven Develop...
 
Blockchain Technology Centralised Ledger to Distributed Ledger
Blockchain Technology Centralised Ledger to Distributed LedgerBlockchain Technology Centralised Ledger to Distributed Ledger
Blockchain Technology Centralised Ledger to Distributed Ledger
 
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithmFair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
Fair and trustworthy: Lock-free enhanced tendermint blockchain algorithm
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Blockchain Technology

  • 2. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Introduction ● Distributed Ledger ● Blockchain ● How Blockchain works ● Bitcoin ● Blockchain 2.0 Outline Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 2
  • 3. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics On the Internet if we want to exchange informations or money we need a third-part that sign,certify and validate these data. Obviously, the third-part offers us a service that most of the time we have to pay. ● Blockchain is born in order to eliminate this third- part. Why is Blockchain born? Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 3
  • 4. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● The blockchain technology is the technology on which Bitcoin is based, this type of implementation was described the first time by Satoshi Nakamoto (it is a fictitious name used by the unknown person or persons who designed bitcoin and created its original standard) in 2008 by a white paper: “Bitcoin: A Peer-to-Peer Electronic Cash System”. Introduction Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 4
  • 5. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● What is a ledger? A ledger, is defined as a central repository of the accounting information of an organization in which the summaries of all financial transactions during an accounting period are recorded. The transaction are registered in chronological order. Ledger Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 5
  • 6. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics A digital ledger is stored in a central server: ● control mechanism that authenticates users, enables secure access, and enforces access restrictions (for example, read-only) A distributed ledger: ● list of cryptographically signed, irrevocable records of transactions that is shared by a distributed network of computers ● every participant has the same copy of the ledger. Each participant may propose a new transaction to be added to the ledger and when consensus that the transaction is valid is reached, it is added to the register Distributed Ledgers Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 6 ● A consensus mechanism is used in which computers on the network check each other to ensure records are consistent. This mechanism is implemented by systems called miners.
  • 7. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Architecture Comparison Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 7
  • 8. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● It is a growing list of records, blocks, which are linked to each other and made safe by the use of cryptography. ● Each block in the chain contains a hash pointer as a link to the previous block, a timestamp and the transaction data. ● Blockchain, is basically an open and distributed register that can record transactions in an efficient, verificable and permanent way. For this use, this database exploits a peer-to-peer network that connects to a protocol for the validation of new blocks. Once registered, the data in a block can not be retroactively changed. What is Blockchain? Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 8
  • 9. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● A blockchain is a linear sequence of blocks used to store transactions. ● Each block contains one or more related transactions, and the blocks are ordered in increasing time sequence. Blockchain concepts Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 9
  • 10. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Chain Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 10 It is computationally feasible to add a new block to the end of the chain but computationally infeasible to replace a block interior to the chain or to insert a new block between two existing blocks in the chain.
  • 11. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● A unique identifier for the blockchain; remains constant for all subsequent blocks. ● Blocksize field that specifies the total number of bytes in the block. ● Block format version. ● Backward Link consists of the hash of all of the headers of the preceding block. ● Transaction Hash. This hash value is computed from the set of data blocks that comprise the list of transactions. ● Timestamp, which indicates the relative time that this block was created. ● Mining Difficulty, is a measure of how difficult it is to find a new block. ● Nonce, casual number used for the proof-of-work (varying this number changes the PoW difficulty) ● Transaction Counter, number of transactions in this block. ● Transaction, the (nonempty) list of transactions. Structure of the blocks Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 11
  • 12. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Linkage Between Blocks Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 12
  • 13. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Merkle Tree Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 13 ● The transaction blocks are processed in pairs; if there is an odd number of transactions, the last transaction on the list is duplicated. ● Each pair of blocks is concatenated to form a binary block that is input to a hash function, typically SHA-256. ● This process continues until a single hash value results, known as the Merkle Root.
  • 14. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Each user has a copy of the blockchain. ● Each user running the blockchain client is part of the network. ● New blocks are broadcast to the network. ● Each user updates its local copy of the blockchain. ● If a user is behind the current height of the chain, it can ask other nodes for copies of the blocks needed to catch up. ● If every user has a copy of the blockchain, when the blockchain is queried, every user gets the same answer. Characteristics of the blockchain environment Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 14
  • 15. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Mining: linking a new block to the end of the chain. ● Proof-of- Work: sacrifice of time and energy dedicated to that particular block. ● Miners: who provide to mine the blocks. In distributed blockchain application, there are no designated miner (generally there is a reward for the miners, for example, in the Bitcoin environment they gain cryptovalues). In the case there are two equal block mined to different miners, the clients choose the block with the highest Proof- of- Work. Blockchain Mining Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 15
  • 16. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Users broadcast transactions onto the network to be added to a new block. ● A miner collects these transactions to form a pool of transactions that are not yet part of a block. ● The miner constructs a new block with the pool of the actions it currently has. ● The miner then invests considerable computational effort to construct a new block (Bitcoin: The cryptographic hash value of the block header is calculated to form the backward link used by the next block in the chain. ● This block is then broadcast to all the miners on the network and tentatively added to the end of the blockchain. How is constructed a block Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 16
  • 17. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics An adversary who wishes to successfully alter the transaction list is faced with two alternative challenges: 1. modify the transaction list in such a way that the transaction hash is unchanged, also leaving the header hash unchanged; this modification is computationally infeasible for a secure hash function (such as SHA-256); 2. allow the transaction hash to change but modify the nonce so that the header hash is unchanged; again, this modification is computationally infeasible; The nonce, transaction hash, and header hash protect the blockchain. Attack the block Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 17
  • 18. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Building the chain Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 18 Some miners works to add a block on 0. In the same time differents miners attach 2 differents block to 0. Some miners will work on 1B, other on 1A. A miners attach a block on 1B, so 1A is discarded and all the miners follow to work on the longest chain.
  • 19. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics It is not necessary for all users to perform all the blockchain tasks. There are 5 categories of configuration: 1. Basic client: key management operations, no P2P comunications. 2. Thin Client: key management operations. It performs some P2P tasks (network communication and blockchain verification). It does not keep a copy of the full blockchain. 3. Thick Client: key management operations and P2P tasks. It mantain a copy of the full blockchain. 4. Fully Functional Basic Client: as a thick client, but also executes the mining algorithm. 5. Hosted Client: webclient, it does not run on a user-controlled device. Type of Clients Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 19
  • 20. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Public: nodes participating in a public blockchain network do not have to obtain permission to access the ledger or add transactions. ● Consortium: The right to read the blockchain may be public or restricted to the participants. The validation of blocks is made by authorized nodes. ● Fully private: read and write permissions are managed by a central authority. Blockchain Types Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 20
  • 21. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Digital currency or digital money is an Internet-based medium of exchange distinct from physical (such as banknotes and coins) that exhibits properties similar to physical currencies, but allows for instantaneous transactions and borderless transfer- of-ownership. ● Cryptocurrency: a digital currency in which encryption techniques (cryptography) are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank. ● The first cryptocurrency to be created was Bitcoin back in 2009. Today there are hundreds of other cryptocurrencies, often referred to as Altcoins. What is Cryptocurrency ? Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 21
  • 22. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Bitcoin is protocol. The unit digital currency is “bitcoin”. ● First “decentralized” digital currency. They are digital coins you can send through the internet. ● Based on blockchain: a growing general public ledger of cryptographically- signed transactions. ● All transactions are public, but are not by default tied to anyone's real identity. ● Bitcoin protocol provide to the privacy of the users. ● Secured by collective compute power of miners. It is very difficult to create a new valid block, but very easy for every client, miner or not, to check the validity of a new block. Bitcoin Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 22 In simple words, bitcoin is an open source software to transfer money over the internet.
  • 23. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Bitcoin relies on a network of volunteers, to collectively implement a replicated ledger. The ledger tracks the balance of all accounts in the system. Each node keeps a complete replica of the ledger. Bitcoin: The Ledger Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 23
  • 24. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Bitcoins contain the public key of their owner (i.e. the address). When a user A transfers money to user B, renounces his property by adding the public key of B (his address) to the coins in question and signing them with his private key. Then it transmits these coins into a message through the peer-to- peer network (“transaction”). Bitcoin: The transactions Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 24
  • 25. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Bitcoin miner nodes are responsible for validating transactions and the state transitions that update the ledger. Transactions are grouped in blocks by miners. Miners are responsible for validating the transaction block and performing a hard mathematical computation or proof of work (PoW) which goes along used to validate the block of transactions. Bitcoin: Miners Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 25 ● Miners that validate Bitcoin transactions get paid in Bitcoin.
  • 26. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics The ledger replicas have to be consistent among all the nodes of the network and respect the same temporal order. Bitcoin do this by tentatively committing transactions and then synchronizing at regular intervals by broadcasting a block created by one of the nodes. Bitcoin: The Blocks Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 26
  • 27. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics Have to be a chronological order over the blocks and therefore about the transactions contained within them. The blocks are organized in a directed tree. Each block contains a reference to a previously found block. The block b referenced by a block b’ is called its parent. Bitcoin: Blockchain Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 27
  • 28. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics The Blockchain 2.0 is an evolution of the blockchain protocol enabling not only to exchange transaction but rather code and programs in the form of Smart Contracts. Now developers are allowed to build programs and API's on the Blockchain Protocol. Blockchain 2.0 Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 28
  • 29. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics The objective of this type of implementation is to allow peopleto easily write Dapp (decentralized application) trough the use of the blockchain technology. Dapp is a tool for people and organizations on different sides of an interaction use to come together without any centralized intermediary. These apps consists in 2 part: a frontend part written in HTML (an interface) and a backend part. The backend operations are validated by all nodes on the network. (Ex: in Ethereum it is implemented a scripting language.) Programming language and Dapp Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 29
  • 30. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics ● Smart contracts are softwares “written“ on a shared secure database, traceable and immutable, and they verify automatically at a certain date or event some stipulation pre- established between 2 or more host in the network. Smart Contracts Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 30 ● There are often hundred condition in a single smart contractor there are many smart contract interconnected.
  • 31. Master in Innovation and Research in InformaticsMaster in Innovation and Research in Informatics [1] William Stallings, “A Blockchain Tutorial”, The Internet Protocol Journal, Volume 20, Number 3, November 2017. [2] Satoshi Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”, 2008. [3] Stuart Haber, W. Scott Stornetta, “How to Time- Stamp a Digital Document”, Journal of Cryptology, Vol. 3, No. 2, pp. 99-111, 1991. References Fall Semester 2017 Computer Networks Architecture and Network Management (CNANM-MIRI) 31