2. ◼Chaincode is a program, written in Go, node.js, or Java that
implements a prescribed interface. Chaincode runs in a secured
Docker container isolated from the endorsing peer process.
Chaincode initializes and manages ledger state through
transactions submitted by applications.
WHAT IS CHAINCODE?
3. ◼A chaincode typically handles business logic agreed to by members
of the network, so it may be considered as a “smart contract”. State
created by a chaincode is scoped exclusively to that chaincode and
can’t be accessed directly by another chaincode. However, within
the same network, given the appropriate permission a chaincode
may invoke another chaincode to access its state.
5. ◼ Hyperledger, is comprised of a set of open source tools and
subprojects. It's a global collaboration hosted by The Linux
Foundation and includes leaders in different sectors who are
aiming to build a robust, business-driven blockchain framework.
6. ◼There are three main types of blockchain networks: public
blockchains, consortiums or federated blockchains, and private
blockchains. Hyperledger is a blockchain framework that aims to
help companies build private or consortium permissioned
blockchain networks where multiple organizations can share the
control and permission to operate a node within the network.
7. ◼Since a blockchain is a transparent, immutable, and secure
decentralized system, it is considered a game-changing solution for
traditional supply chain industries. It can support an effective
supply chain system by:
◼Tracking the products in the entire chain
◼Verifying and authenticating the products in the chain
◼Sharing the entire chain's information between supply chain actors
◼Providing auditability
9. ◼Hyperledger Fabric is the cornerstone of the Hyperledger project. It
is a permission-based blockchain, or more accurately a distributed
ledger technology (DLT), which was originally created by IBM and
Digital Asset. It is designed as a modular framework with different
components (outlined below). It is also a flexible solution offering a
pluggable consensus model, although it currently only provides
permissioned, voting-based consensus (with the assumption that
today's Hyperledger networks operate in a partially trustworthy
environment).
10. ◼Unlike Ethereum, however, Hyperledger Fabric doesn't require
expensive mining computations to commit transactions, so it can
help build blockchains that can scale up with less latency.
11. ◼ Hyperledger Fabric is different from blockchains such as Ethereum or Bitcoin,
not only in its type or because it is currency-agnostic, but also in terms of its
internal machinery. Following are the key elements of a typical Hyperledger
network:
◼ Ledgers store a chain of blocks that keep all immutable historical records of all
state transitions.
◼ Nodes are the logical entities of the blockchain. There are three types:
– Clients are applications that act on behalf of a user to submit transactions to
the network.
– Peers are entities that commit transactions and maintain the ledger state.
– Orderers create a shared communication channel between clients and peers;
they also package blockchain transactions into blocks and send them to
committing peers
12. ◼Hyperledger Fabric is based on the following key design features:
◼Chaincode is similar to a smart contract in other networks, such as
Ethereum. It is a program written in a higher-level language that
executes against the ledger's current-state database.
◼Channels are private communication subnets for sharing
confidential information between multiple network members. Each
transaction is executed on a channel that is visible only to the
authenticated and authorized parties.
13. ◼Endorsers validate transactions, invoke Chaincode, and send the
endorsed transaction results back to the calling applications.
◼Membership Services Providers (MSPs) provide identity validation
and authentication processes by issuing and validating certificates.
An MSP identifies which certification authorities (CAs) are trusted
to define the members of a trust domain and determines the
specific roles an actor might play (member, admin, and so on).
15. ◼Alongside blockchain frameworks such as Fabric or Iroha, the
Hyperledger project provides tools such as Composer, Hyperledger
Explorer, and Cello. Hyperledger Composer provides a toolset to
help build blockchain applications more easily. It consists of:
◼CTO, a modeling language
◼Playground, a browser-based development tool for rapid testing
and deployment
◼A command-line interface (CLI) tool
HYPERLEDGER COMPOSER
16. ◼1 Permissioned membership
◼Hyperledger Fabric is a framework for permissioned networks,
where all participants have known identities. When considering a
permissioned network, you should think about whether your
blockchain use case needs to comply with data protection
regulations. Many use cases — in the financial sector and
healthcare industry, in particular — are subject to data protection
laws that require knowing who the members of the network are and
who is accessing specific data.
TOP 6 TECHNICAL ADVANTAGES OF HYPERLEDGER FABRIC FOR
BLOCKCHAIN NETWORKS
17. ◼Hyperledger Fabric is built on a modular architecture that
separates transaction processing into three phases: distributed
logic processing and agreement (“chaincode”), transaction
ordering, and transaction validation and commitment. This
separation confers several advantages: Fewer levels of trust and
verification are required across node types, and network scalability
and performance are optimized.
2
PERFORMANCE, SCALABILITY, AND
LEVELS OF TRUST
18.
19. ◼Businesses, due to competitiveness, protection laws, and
regulation on confidentiality of personal data dictate the need for
privacy of certain data elements, which can be achieved through
data partitioning on the blockchain. Channels, supported in
Hyperledger Fabric, allow for data to go to only the parties that
need to know
3
DATA ON A NEED-TO-KNOW BASIS
20. ◼The ledger is the sequenced record of state transitions for the
blockchain application. Each transaction results in a set of asset
key-value pairs that are committed to the ledger as creates,
updates, or deletes. The immutable source of truth for v1.0 is
appended into the file system of the peer, which also has LevelDB
embedded.
4
RICH QUERIES OVER AN IMMUTABLE
DISTRIBUTED LEDGER
21. ◼The modularity of Hyperledger Fabric architecture enables network
designers to plug in their preferred implementations for
components, which is an advantage. One of the most requested
areas for modularity is “bring your own identity.” Some multi-
company networks already have identity management and want to
reuse instead of rebuild. Other components of the architecture that
can be easily plugged in include consensus or encryption, where
some countries have their own encryption standards.
5
MODULAR ARCHITECTURE SUPPORTING
PLUG-IN COMPONENTS
22. ◼HSM (Hardware Security Module) support is vital for safeguarding
and managing digital keys for strong authentication. Hyperledger
Fabric provides modified and unmodified PKCS11 for key
generation, which supports cases like identity management that
need more protection. For scenarios dealing with identity
management, HSM increases the protection of keys and sensitive
data.
PROTECTION OF DIGITAL KEYS AND
SENSITIVE DATA