Position: Home page » Blockchain » Distributed storage of blockchain ledger

Distributed storage of blockchain ledger

Publish: 2021-03-26 12:08:55
1. That's a good question. Let me give you an example. For example, when I deposit 100 yuan in the bank, the data of this deposit is only recorded in the bank's database, which can't be obtained by others, namely "central bookkeeping". The blockchain is a distributed accounting, a new information recording technology, and it is "encrypted" and "distributed". The data does not exist in a center, but is stored once on the computer of the whole network. For example, if I transfer 100 yuan to you, I will shout to all the computers in the whole network. Let's record the accounts together, that is, "Distributed Accounting".
2. Blockchain technology is also known as distributed ledger. Generally speaking, if we assume that the database is an ledger, reading and writing the database can be regarded as a kind of bookkeeping behavior. The principle of blockchain technology is to find the fastest and best person for bookkeeping in a period of time, and then send this page of information of the ledger to everyone else in the whole system. This is equivalent to changing all the records in the database and sending them to every other node in the whole network, which can not only ensure the data security, but also ensure the authenticity of the data, so as to enhance the social credit.
3. Blockchain is a kind of distributed ledger technology. By safely storing information across multiple systems, and by creating reliable "truth" sources, it realizes the intermediary of so-called "trust intermediary", so as to realize point-to-point transactions. Relying on secure distributed storage for verification brings a paradigm shift of trust building, which has a profound impact
in the future, jinwowo network technology will continue to tap the value of blockchain technology in the commercial field, give full play to the advantages of big data services, add value to user behavior, break the ice for the development of small and medium-sized enterprises, and build a real, efficient, safe and honest Internet community of destiny.
4. Blockchain distributed storage is a kind of decentralized storage, which does not store data on one or more specific nodes, but scattered storage
5. For the benefits, jinwowo feels that the biggest benefit is to obtain great security. First of all, there is a central ledger, so it cannot be destroyed. As like as two peas, each node is only part of the system, and each node has the same rights. Destroying some nodes has no effect on the system at all. Secondly, you can't cheat, because unless you can control most people's computers in the system to make changes, the system will refer to the opinions of most people to decide what is the real result. As a result, it will find that it is totally meaningless to modify your own account book (because others don't admit it). Secondly, since there is no centralized intermediary, making everything run automatically through preset proceres can not only greatly rece costs, but also improve efficiency. Since everyone has the same account book, it can ensure that the process of account book recording is open and transparent.
6. IBM, Microsoft, Oracle, Accenture, Tencent, Alibaba, Jingdong, network, etc. have all done it. Many large banks, including Ping An Bank, have also launched their own blockchain solution platforms or solutions. However, it should be added that large companies do not mean strong technical strength, because blockchain is still in the hot stage of concept in the world. Unicorn blockchain companies are likely to emerge in the future, such as EOS abroad and Binhe Yun patent technology and application landing in China are much higher than those of large companies.
7. The three levels are pyramid type, and several switches are connected below the core layer. If the core ports are not enough, they need to be stacked
our school's core uses Nortel 8610, and the expansion only needs to add interfaces. Generally, the core is tested by moles, and adding ports only needs to add moles instead of stacking
an optical switch can be connected under the core, and several layer-2 switches can be connected under the optical switch, which can also save the core port, rece the cost and increase the network users
the specific situation also depends on whether the ports of your core are enough, as well as the core bandwidth, the number of convergence layers, and so on.
8. There are two ways to connect the core switch to the general switch in the computer room:
the first way is through the "optical fiber + optical mole", that is, the general switch is connected to the optical port of the core switch through the uplink optical port, combined with the optical mole and optical fiber
the second way is through the network cable, which generally requires the core switch to have an optical multiplexer port. At this time, the general switch can directly connect with the RJ45 port on the core switch through the network cable.
9.

This is a data center switch, which supports virtualization, that is VSU. Configuration reference

core switch 1:

Switch1 # configuration terminal
enter configuration commands, one per line. End with cntl / Z.

Switch1 (config) # switch virtual domain 1

Switch1 (config vs domain) # switch 1

Switch1 (config vs domain) # switch 1 priority 200 -- & gt; The default priority is 100, which is configured as a higher priority. After the VSU is successfully established, it will become the management host

Switch1(config-vs-domain)# exit

Switch1(config)# vsl-aggregateport 1 ------> At least two VSL links are needed, and the reliability of one link is low. When link oscillation occurs, VSU will be very unstable

Switch1(config-vsl-ap-1)# port-member interface TenGigabitEthernet 1/1 ------> Configure VSL link, heartbeat link and traffic channel between VSU active and standby cores

Switch1 (config-vsl-ap-1) ﹥ port member interface tengigabit Ethernet 1 / 2
Switch1 (config-vsl-ap-1) ﹥ exit

core switch 2:

switch2 ﹥ configuration terminal
enter configuration commands, one per line. End with CNTL/Z.

Switch2(config)# switch virtual domain 1 ------> Domain ID must be consistent with the first one

switch2 (config vs domain) # switch 2 ----- & gt; The second device must change its ID to 2

switch2 (config vs domain) { switch 2 priority 150

switch2 (config vs domain) { exit
switch2 (config) { VSL aggregateport 1 ----- & gt; At least two VSL links are needed, and the reliability of one link is low. When link oscillation occurs, VSU will be very unstable

Switch2(config-vsl-ap-1)# port-member interface TenGigabitEtherne 1/1 ------> Configure VSL link, heartbeat link and traffic channel between VSU active and standby cores

switch2 (config-vsl-ap-1) # port member interface tengigabit Ethernet 1 / 2
switch2 (config-vsl-ap-1) # exit

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750