Shenma M20 mining machine burning card
behind the scenes, the entire bitcoin network shares a public ledger called "blockchain.". This general ledger contains every transaction processed, so that the user's computer can verify the validity of each transaction. The authenticity of each transaction is protected by the electronic signature corresponding to the sending address, which enables users to have complete control over the bitcoin transferred out from their own bitcoin address. In addition, anyone can use the computing power of specialized hardware to process transactions and get a bitcoin reward for it. This service is often referred to as "mining."
bitcoin mining has gone through three stages of development. When bitcoin was just born, the price of bitcoin was very low. People just took bitcoin as a game and used their ordinary computers to mine. However, in 2012, with the rise of bitcoin price, people found that the mining speed of graphics cards was fast, so, People began to buy a large number of graphics cards and assemble them for mining, commonly known as "burning graphics cards"; The third stage is the well-known ASIC miner mining. Since Avalon proced the world's first ASIC bitcoin miner, bitcoin mining has been completely subverted, and mining has become a special professional thing.
Graphics card mining is a process of increasing the bitcoin money supply
the reason why the graphics card is used is that mining is actually a competition of performance and equipment. The mining machine is composed of graphics card array. With dozens or even hundreds of graphics cards, the cost of hardware and other costs is very high, and there is a considerable expenditure in mining
computers have professional mining chips, and most of them work by installing a large number of graphics cards, which consumes a lot of power. One of the ways to get bitcoin is to download mining software and then run specific algorithm to communicate with remote server to get corresponding bitcoin
extended data
bitcoin does not rely on the issuance of specific monetary institutions, and is generated through a large number of calculations of specific algorithms. Bitcoin economy uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions. The decentralized nature and algorithm of P2P can ensure that it is impossible to artificially manipulate the value of bitcoin through mass proction
the bitcoin system is composed of users (users control the wallet through the key), transactions (transactions will be broadcast to the whole bitcoin network) and miners (the blockchain is generated by competitive computing to reach a consensus at each node, and the blockchain is a distributed public authoritative account book, including all transactions in the bitcoin network)
bitcoin miners manage the bitcoin network by solving the problem of workload proof mechanism with certain workload - confirming transactions and preventing double payment. Because hash operation is irreversible, it is very difficult to find the random adjustment number of matching requirements, which requires a continuous trial and error process that can predict the total number of times
when a node finds the solution matching the requirements, it can broadcast its results to the whole network. Other nodes can receive the new data block and check whether it matches the rule. If other nodes find that they really meet the requirements (the operation target required by bitcoin) by calculating the hash value, then the data block is valid, and other nodes will accept the data block
Hello,
bitcoin miner is mainly composed of graphics card and computing chip
hardware expenditure
mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it's only hd6770, can surpass the single graphics card of most users. And this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Taking into account the hardware price and other costs, there is a considerable expenditure in mining
at the same time, Shenma M20 / M21 series and p21 power supply quick repair can also realize quick repair with quality assurance because they are authorized maintenance brands of Shenma and Xindong.
1. CPU is mainly optimized for serial instructions, while GPU is optimized for massively parallel operations
2. Modern multi-core CPU aims at instruction set parallelism (ILP) and task parallelism (TLP), while GPU is data parallelism (DLP)
3. GPU often has a larger bandwidth of memory, that is, the so-called video memory, so it will also have good performance in high throughput applications
the CPU needs strong generality to deal with various data types, and at the same time, it also needs logical judgment, and it will introce a lot of branch jump and interrupt processing. All these make the internal structure of CPU extremely complex. GPU is faced with highly unified, interdependent large-scale data and pure computing environment without interruption. GPU uses a large number of computing units and ultra long pipeline, but it only has very simple control logic and saves cache. The CPU not only occupies a lot of space by cache, but also has complex control logic and many optimization circuits. So unlike CPU, GPU is good at large-scale concurrent computing, which is suitable for password cracking
in short, CPU is a general-purpose operation. In short, it means brainless calculation and violent calculation. Whether it's 100 children sharing apples or simulating the earth, it can be decomposed into the most basic calculation of 1 + 1 = 2. GPU is specially designed to deal with high-order mathematical algorithms, such as calculating the relative positions of light source, object, viewpoint and shadow, which requires trigonometric functions to be piled up. The bitcoin digger uses SHA-256, a secure hash function invented by the US National Security Agency, which is generally used for password encryption and decryption. This algorithm can perform a large number of 32-bit integer right-rotate operations, which is very suitable for GPU which is good at large-scale concurrent computing and password cracking.
do not strive for success:
1
2.