How to query each transaction of blockchain
the confirmation times of bitcoin are different from that of Ruitai coin, Laite coin and doggy coin.
first, define the
blockchain as an open network ledger. It originated from bitcoin and is the underlying technology of bitcoin. In bitcoin transactions, all the information of transaction records will be packaged into a "block" for storage. With the expansion of information exchange, one block links with another, forming a blockchain
Second, the digital currency represented by bitcoin is a point-to-point e-cash system. Among them, every transaction will broadcast to all participants in the network, and it will be recorded in the account book after repeated confirmation, which is called "blockchain". Each participant will have his own account book. In this way, when false information occurs, it can be broken through mutual verification, so as to ensure network securityin the blockchain, every node is equal, and there is no centralized management organization. This "decentralized" feature makes the blockchain do not need to rely on a third party, its operation does not need any human intervention, and it can independently conct self verification. In addition, the network of blockchain is open to the world, and anyone can query data through the public port, so the whole system is highly transparent
In a word, blockchain is a reliable database and a reliable "account book". In the future, it will be applied in cross-border payment, securities, loans, voting, etc. For example, in cross-border payment, with the security of blockchain, you can remit money to the world anytime and anywhere, which saves a lot of intermediate links and high feesdoes each node have complete blockchain data? You mean a user node? A user node needs to keep the of the block head of the longest workload proof chain, so it knows the data of all the block heads. It can move forward to know all the data on the block chain, but not all of them are saved. A block header is very small, only 80 bytes, which can be saved completely, because the generation of nodes is very slow. Even with the passage of time, the amount is not too large now.
Let's suppose villagers Lao Wang and Xiao Li. Lao Wang borrowed some money from Xiao Li, who wrote it in an IOU signed by both parties. A few days later, Lao Wang denied the existence of borrowing money and claimed that Xiao Li forged the paper. Xiao Li can't argue because he finds it difficult to prove that Lao Wang actually owes him money
in this example, Lao Wang and Xiao Li are two nodes
now assuming the same scenario, there are many pairs of people trading with each other in the village. The only evidence for each pair is the IOU. If one party fails, it will be difficult to do so. Seeing this scene, the village head came up with a solution. He suggested using a common notebook for the whole village to record all the transactions. Due to the high prestige of the village head, the villagers unanimously decided to let the village head keep this important transaction book. Each transaction, the villagers go to the village head's home, let the village head witness and record, each transaction is written into a notebook, and then safely saved. That notebook can be called a database
because this notebook is very important, the village head locked it in the safe. However, there are always some problems. Sometimes, the village head will accidentally sprinkle ink on the paper, making some transaction records illegible. This is called a single point of failure. The thief knows that there is an important notebook in the safe of the village head's house. He tries his best to steal it. This is called hacking
until one day, the village head's son owed others a lot of money, so the village head secretly deleted his son's debt entry. In this way, the village head's son "does not owe money."
when the villagers knew this, they began to question the fairness and authority of the village head. So some people put forward a new idea:
abolish the power of the village head, which is called decentralization. Let all villagers keep a notebook, and the transaction records are copied and distributed, which is called distributed database. Therefore, if there are n people in the village, there are n notebooks, that is, n nodes. Every time there is a trade between any two people, all the people in the village get together and record it in their notebooks. And no one can cover the sky. This is called decentralization
they also decided that they would never delete the mentioned transactions from their notebooks, which is irreversible. For example, Lao Wang borrowed a sum of money from Xiao Li before, but in the twinkling of an eye, he wants to return the money. Then the transaction book will not delete the previous borrowing record, but write a new repayment record, so there are two records
next, let's try to break this rule. What if we bribe Lao Wang to change his notebook? It's not feasible, because the next time the villagers meet, they find that Lao Wang's notebook is different from everyone else's, so the villagers notice that Lao Wang may be engaged in an indescribable transaction, and decide to abolish Lao Wang's transaction record and kick Lao Wang out of the organization
What if you try to bribe all the villagers? It's too expensive
the characteristic of this model is that greedy people need to pay a lot to attack the rules. He will find it more profitable to follow the rules
a smart child in the village suggested that each transaction data be called "block" and linked into a "chain" in chronological order, which is called blockchain strong>
1. Regularly clean the st in the computer, turn off the computer, open the chassis, use a hair dryer and blow with cold air< At ordinary times, 360 guard, Jinshan guard and other tools should be used to clean up the system garbage and temporary files generated by the Internet, and check and kill malicious
Italian software
3. The computer configuration is poor, so try to set the virtual memory as large as possible, and install anti-virus software with less resources, such as NOD32, or only one
auxiliary anti-virus software
4. Try to set the IP to static IP, which can rece the startup time of the computer
5. Don't put too many files and icons on the computer desktop, which will slow down the reaction of the computer. Try not to install the software on disk C
6. Regularly defragment the disk. Open the drive of my computer to defragment - properties - tools
select the disk to be defragmented. Open the "disk defragmenter" window - Analysis - defragmentation - the system will start to defragment
.