What is Ethereum token transmission
After reading the answers of other respondents, I really want to laugh. It's not terrible to pretend that I don't understand. What's terrible is to answer blindly. There's something wrong with this question. The burst of 5.7 billion yuan has nothing to do with a drop of 10 cents. It can even be said that its disappearance is e to the sharp rise. So where is the decline? If bitcoin really falls, it will not be 5.7 billion capital washed away, it will be tens of billions, hundreds of billions of capital evaporated, those who talk about trends and development, please study the capital and stock market well, and by the way, please search for the meaning of the word "burst", no culture is too terrible
in addition, I would like to make a digression. Recently, a hot topic is fund. In 2021, the annual meeting is more or less a national fund. In 2020, the fund manager is still a good active fund. Even if the position is not changed, the annual yield will reach at least 40%, but this does not mean that this year is still OK, It's not that everyone can make money playing with funds. it's similar to the nature of stocks. Index funds, stock funds and even active funds are risky. I think many people say that they should get on the bus quickly. They are really worried about your funds
of course, 2021 may be a bull market. It is estimated that the whole network has spread, many people are rubbing their hands to make a lot of money, but I can't do much. I just advise you not to go with the flow too much, don't be greedy, and don't think you are. That's all. Good luck strong>
with Ethereum officially confirming erc-721 as one of the new token standards, many people are asking what erc-721 is recently. There are many technical posts on the Internet to analyze the code differences between erc-721 and erc-20. They are very unfriendly to Xiao and leek. With the attitude of sharing knowledge, I will try to explain the most significant differences between erc-721 and erc-20 with intuitive words
erc-20 standard token:
1
2. It can be subdivided into N parts (n = 10 ^ 18)
conclusion: similar to the currency in real life, it can perform all monetary functions. The application cases are similar to legal currency and virtual currency
erc-721 standard token:
1
2. The minimum unit is 1 and cannot be subdivided
summary: non homogeneity exists widely in life, such as art, pets, handicrafts, custom-made items, etc., and can even be used to mark students in schools, doctors and patients in hospitals, etc. The application scenarios are very wide
the above description is relatively concise. Taking a look at specific projects can help you better understand erc-721 standard. At present, the popular projects using erc-721 standard can take a look at
- cryptokitties (cryptokitties | collect and breed digital cats!)
this is the "ethereal cat" mentioned before. It's very basic and interesting. Each cat is a token with unique attributes. The more unique the attributes, the higher the value of the cat. It's very popular, but its development potential is limited
- 0xcert (0xcert - supporting uniformity.)
this project is a recent project of personal interest, which is close to life and easy to implement. Erc-721 token is used to mark real-life artwork or a unique item, and record the basic attributes, characteristics, value, previous owners, etc. It is very helpful in combating counterfeits and piracy. It may also be used in the second-hand market, exchange of valuables and other scenarios in the future
personally, I am very optimistic about erc-721 standard. After the whole blockchain instry calms down from the carnival, the implementation of the project has become the first consideration for developers, and erc-721 is very suitable for connecting the blockchain with the real world.
the token ring defined in IEEE 802.5 is derived from IBM token ring LAN technology. Both methods are based on token passing technology. Although there are some differences, generally speaking, the two methods are compatible with each other
the small data (frame) transmitted on the token ring is called token. Whoever has the token has the transmission authority. If a workstation on the ring receives a token and sends information, it changes one bit of the token (the operation turns the token into a frame start sequence), adds the information it wants to transmit, and then sends the whole information to the next workstation in the ring. When this information frame is transmitted on the ring, there is no token in the network, which means that other workstations have to wait if they want to transmit data. Therefore, there is no transmission conflict in token ring network
the information frame travels along the ring until it reaches its destination, which creates a for further processing. Information frames continue to travel along the ring until they reach the sending station and can be deleted. The sending station can check whether the frame is received and copied by the receiving station by checking the returned frame
unlike Ethernet CSMA / CD network, token passing network is deterministic, which means that the maximum waiting time can be calculated before any terminal station can transmit. This feature, combined with other reliability features, makes token ring network suitable for applications that need to be able to predict latency and reliable network operation< In addition, token passing protocol is also used in FDDI.
General token network, token ring and token bus. Token bus based on IEEE802.4 standard is a kind of physical bus structure, and its site constitutes a logical ring structure, while token runs on the logical ring, and its operation principle is basically the same as token ring. At present, tokenbus is rarely used; Token ring is a network structure based on ieee802.5 standard. At present, token ring network mostly refers to the implementation of IBM token passing ring network, which has two transmission rates of 4MB / s and 16MB / s. The main feature of token ring network transmission is to ensure that each node device can access the network at a predetermined time interval, which is suitable for applications with high real-time requirements. Due to the high price of this kind of network equipment, which is not concive to popularization, and the lack of support for a variety of services and QoS, there are few examples of application in China
the working state of token network
token network is like a LAN composed of three computers, a.b.c. if A.B.C wants to send out packets at the same time, there will be conflicts. Therefore, there must be a token. Which machine obtains the token can send out information, and then send the token to that machine to send out information There are two states“ "Idle" means that the token is not occupied, that is, no computer is transmitting information in the network“ "Busy" indicates that the token has been occupied, that is, information is being transmitted in the network. The computer that wants to transfer data must first detect the "idle" token, set it to the "busy" state, and then transfer data after the token. When the data is received by the destination computer, the data is removed from the network and the token is reset to "idle". The disadvantage of token ring network is that it needs to maintain the token. Once the token is lost, it can not work. It needs to select a special node to monitor and manage the token. Due to the rapid development of Ethernet technology and the inherent shortcomings of token network, token network is rare in the whole computer LAN. Most of the manufacturers who originally provided token network equipment have also withdrawn from the market. Therefore, token network can be said to be "a thing of the past" in the current LAN Market<
how token ring works
TokenRing token ring was introced by IBM in 1969, and its workflow was later listed as ieee802.5 standard protocol. It is based on ring structure physically and logically, and its transmission rate can reach 4 or 16mbps. Token ring network uses twisted pair or coaxial cable as the transmission medium, and connects the interfaces connected with each station one by one to form a closed loop. Each ring interface on the ring has two working modes: sending mode and receiving mode. The network controls and manages the use of the transmission medium through a small freetoken (a special signal frame different from the data signal frame) one-way cycle on the ring, so as to ensure that at most one station in the whole ring is in the sending mode and the other stations are in the receiving mode. In the receive / forward mode, the corresponding station is actually disconnected from the ring interface. At this time, the ring interface receives one bit at a time, copies it to the buffer, and forwards it after checking or modifying (only causing one bit delay). At this point, it monitors two special bit combinations: local address and free token. When the ring interface corresponding to the station to send data detects a free token, it changes the free token to a busy token (data signal frame), connects the station at the same time, and enters the sending mode. The data in the buffer area is sent out bit by bit by the ring interface. After sending, it disconnects the station and returns to the receiving mode. When the ring interface in the receive / forward mode detects the data signal frame with the address of the station, it connects the station, and copies the bit stream to the station connected with it bit by bit while continuing to forward the bit stream, and marks the recognized and copied mark on the data frame, and then disconnects the station after receiving the data signal frame; Then, when the data frame returns to the transmitting station, it is absorbed and a free token is inserted. The media access control mechanism of brand ring network adopts the circulation method of distributed control mode. In token ring network, there is a token which is passed in turn along the ring bus between the computers of the network access nodes. The token is actually a special format frame, which does not contain information. It only controls the use of the channel to ensure that only one node can monopolize the channel at the same time. When all the nodes on the ring are idle, the token moves around the ring. The node computer can only send data frames after obtaining the token, so there will be no collision. Because the token is delivered in order on the ring, the access right is fair to all computers. In this kind of network, there is a special frame called "token", which is continuously transmitted on the loop to determine when a node can send packets. The token is 24 bits long and has three 8-bit domains, which are the start delimiter (SD), access control (AC) and end delimiter (ED). A prefix is a distinctive signal pattern, which is presented as a non data signal to prevent it from being interpreted as something else. This unique 8-bit combination can only be recognized as a frame first identifier (SOF)<
token ring
token ring is a LAN protocol defined in ieee802.5, in which all workstations are connected to a ring, and each workstation can only transmit data with the directly adjacent workstation. The token information surrounding the ring grants the workstation transmission authority. The small data (frame) transmitted on the token ring is called token. Whoever has the token has the transmission authority. If a workstation on the ring receives a token and sends information, it changes one bit of the token (the operation turns the token into a frame start sequence), adds the information it wants to transmit, and then sends the whole information to the next workstation in the ring. When this information frame is transmitted on the ring, there is no token in the network, which means that other workstations have to wait if they want to transmit data. Therefore, there is no transmission conflict in token ring network. The information frame travels along the ring until it reaches its destination, which creates a for further processing. Information frames continue to travel along the ring until they reach the sending station and can be deleted. The sending station can check whether the frame is received and copied by the receiving station by checking the returned frame<
protocol structure of token network
123915bytes routeinformation 0-30bytes information (llcormac) variable FCS (4bytes) edelfs sdel / Edel -- starting / ending separator. AC -- the access control field includes the priority field. The FC -- frame control field indicates whether the frame contains data information or control information. Destination address - destination station address. Sourceaddress -- source station address. Routeinformation -- this field includes routing control, routing descriptor and routing type information. Information - the information field may be LLC or Mac. FCS -- framecheck sequence framestatus -- starts from the frame receiver, identifies the signal address and whether the frame is successful.
simple understanding is the structure of a network
for example, how many machines are located in a bus network
physical connection is the real connection, as you can see, for example, two computers are connected into a local area network through switches
logical connection generally refers to virtual connection. Simple understanding is the need Connect when you connect, Remove the connection when you don't need to connect
Ethernet refers to the bus type network, whose name is derived from optics
(scientists imagine a substance called ether) in the network, everyone shares an information channel. If you want to transmit data, you have to wait until the network is idle
token ring network is simple to understand that you have to send information Get a thing called token
the token bus arranges the workstations in the bus or tree network in a certain order, such as the size of the interface address, to form a logical ring. Only the token holder can control the bus and have the right to send information
802.3 is a standard, which gives the technical standard of Ethernet. It specifies the contents of the protocol including physical layer connection, electrical signal and media access layer.
When sending data, the computer holding the token will send the data first. The computer receiving the data will check the frame header. If it is sent to itself, it will process it. Whether it is sent to you or not, it will be passed on again. After a circle, check whether the data is the same to make sure that there is no transmission error. After sending the data, you can adjust the priority of the token as needed (lower than your own priority), and then transfer the token to the next computer. If you receive a token but the priority is higher than your own, you need to pass the token to the next computer
(token ring: IEEE 802.5 LAN Protocol)
token ring is a LAN protocol, defined in IEEE 802.5, in which all workstations are connected to a ring, and each workstation can only transmit data with the directly adjacent workstation. The token information surrounding the ring grants the workstation transmission authority
the token ring defined in IEEE 802.5 is derived from IBM token ring LAN technology. Both methods are based on token passing technology. Although there are some differences, generally speaking, the two methods are compatible with each other
the small data (frame) transmitted on the token ring is called token. Whoever has the token has the transmission authority. If a workstation on the ring receives a token and sends information, it changes one bit of the token (the operation turns the token into a frame start sequence), adds the information it wants to transmit, and then sends the whole information to the next workstation in the ring. When this information frame is transmitted on the ring, there is no token in the network, which means that other workstations have to wait if they want to transmit data. Therefore, there is no transmission conflict in token ring network
the information frame travels along the ring until it reaches its destination, which creates a for further processing. Information frames continue to travel along the ring until they reach the sending station and can be deleted. The sending station can check whether the frame is received and copied by the receiving station by checking the returned frame
unlike Ethernet CSMA / CD network, token passing network is deterministic, which means that the maximum waiting time can be calculated before any terminal station can transmit. This feature, combined with other reliability features, makes token ring network suitable for applications that need to be able to predict latency and reliable network operation< In addition, token passing protocol is also used in FDDI.
When data is transmitted, the computer with the token will send the data first. The computer receiving the data will check the frame header. If it is sent to itself, it will process it. No matter whether it is sent to you or not, it will be passed on again. After a circle, check whether the data is the same to make sure that there is no transmission error. After sending the data, you can adjust the priority of the token as needed (lower than your own priority), and then transfer the token to the next computer. If you receive a token but the priority is higher than your own, you have to pass the token to the next computer< In addition, token passing protocol is also used in FDDI