Position: Home page » Pool » Software architecture of mining machinery

Software architecture of mining machinery

Publish: 2021-03-26 18:28:28
1.
  1. at present, according to the official income method of fil, there are three ways: one is to provide hard disk storage to obtain income (storage miner), the other is to provide bandwidth resources to obtain retrieval income (retrieval miner), and the third is mining and packing block income (storage miner). Based on the above rules, only enterprise level and cloud mine pool can meet the three kinds of income at present

    In terms of configuration, based on mining rules, the following configuration suggestions are given:

    CPU: 4 cores or above, Inteli series is the best, memory is at least 8g, if you want to get retrieval revenue, memory needs more than 16g, hard disk space is recommended to be more than 4T to get storage revenue

  2. household mining machine (current situation analysis, There are the following disadvantages:
    A. more than 95% of domestic IP addresses are not static, which leads to mining default platform withholding pledge token

    B. you need to buy pledge token, and you need to spend some extra money to buy token to start

    C. the sound of power outage is loud, and the events affecting neighbors lead to no income

    D. unfortunately, your family is in the second, third, fourth and fifth tier cities, Basically, we can't get the order

    e. the home miner advertised by a Yingkuang machine can't mine and can be retrieved. The retrieval needs an uplink bandwidth of at least 10m, and the space-time proof (IPFs anti cheating mechanism) may need a higher stable bandwidth of more than 20m. Who's community's network can meet the above requirements within 24 hours, so the retrieval is also very difficult

    It is said that the investors who started brainwashing and bought the household miner in March of 18 bought a small box at 5-10 times the price and put it at home as a decoration, so the household miner is used to cut leeks, because it has a low threshold, and then you can hardly dig fil

  3. Enterprise trusteeship miner

    a, In terms of hardware configuration, the cost of setting up a mine is relatively high. If the leasing meets the national application conditions, the purchase price of a single configuration combination is about 3-10 times of the cost price, which is relatively high

    B. the same computer room is generally leased to multiple enterprises for storage and application, which will lead to multiple operating systems running at the same time, Lack of unity, easy to be attacked by hackers

    C. vicious competition of all mining machines in the mine, internal consumption of computing power, unbalanced order distribution, resulting in some machines grabbing orders and some machines not having orders, and Unbalanced Income

    D. different independent IPFs mining machine systems, it is difficult to unify parameter grabbing orders in real time

    E. unable to resist regional policy risks, For example, the national policy risk

    F. the biggest advantage of enterprise level is high configuration, centralized basic management, and room conditions are superior to household mining machines. At the same time, the above situation is accompanied by

  4. cloud mining pool

    A. computing power leasing, the price is relatively low for hosting mining machines, The leasing time is controllable

    B. the IDC rooms of general cloud mine pool are defense class, which can prevent hackers from intruding

    C. the output of the mine pool is shared throughout the network, and there is no worry about the failure of a purchased node, and there is no income

    D. the hardware input is allocated throughout the network, and the personal input-output ratio is cost-effective

    E. unified scale management, and there is no single node debugging, Single maintenance status

    D. node layout is generally multi city and multi country, regional policy risk

    E. third party real-time monitoring, high degree of information disclosure, always know the output status of ore pool

    F. unified operation and maintenance system, real-time unified parameter adjustment, pricing strategy, order grabbing strategy, storage strategy

  5. for the above analysis, At present, the existing cloud mining pools in China, such as a cat cloud mining pool, a Yingyun node, an inter cloud mining pool, and a chain cloud mining pool, claim to be globally distributed in the publicity. After actual verification, their mining pools are either small private mines established by themselves or professional mining machine trusteers cooperated in China, and most of them are limited to China, Because the construction cost of the mine pool is very high, and the cost of cooperation with domestic cloud service providers is even higher, we should set up our own small mine pool to publicize the global layout

    currently, it is recommended to learn about "Noah cloud pool". After verification, the channel cloud service providers of Noah cloud pool are currently cooperating in Hong Kong, Singapore, Germany and Poland, and their technical background is relatively strong. Please check other relevant information

2.

At present, the mining machines in the market are mainly divided into two categories, one is PC based mining machine, the other is professional mining machine based on ASIC chip

the general PC mining machine can be used as a home computer, but the CPU performance is weak and the power consumption is high. Professional mining machine based on ASIC chip can not be used as ordinary computer because it has no graphics card and does not support mainstream desktop operating system

extended data:

mining machine is one of the ways to obtain Bitcoin is a kind of network virtual currency proced by open source P2P software. It doesn't rely on a specific currency institution to issue, but is generated by a large number of calculations of a specific algorithm. It uses a distributed database composed of many nodes in the whole P2P network to confirm and record all transactions economically. The decentralized nature of P2P and the algorithm itself can ensure that the currency value cannot be manipulated by mass proction

any computer can become a mining machine, but the profit will be relatively low, and there may not be one in ten years. Many companies have developed professional mining machines, which are equipped with special mining crystal. They are tens or hundreds of times higher than ordinary computers

mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it is just a garbage card like hd6770, can surpass the single graphics card of most users in terms of computing power

and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there are considerable expenses in mining

in addition to the display card burning machine, some ASIC (application specific integrated circuit) professional mining machines are also put into the battlefield. ASIC is specially designed for hash operation. Although the performance may not be able to kill the display card in seconds, it is already quite strong. Moreover, because their power consumption is far lower than that of the display card, it is easier to form scale and the electricity cost is also lower, It is difficult to compete with these excavators. And this kind of machine will be more expensive

3. The first point of mining machinery: Linux system

has two main advantages compared with windows

(1) stable system: for example, it is very common for a host with Linux to run continuously for more than one year without downtime or shutdown. My windows system turned on black screen this morning, and then recovered after forced shutdown

(2) fast repair of security and vulnerability: Linux is used by many computer experts, so there are many maintainers, and the update and maintenance is fast, while windows is used by everyone, and it is not open source
therefore, the core system of mining machine is Linux. At present, more than 95% of the global server market choose Linux, which has been verified for a long time, and windows is not recommended as the operating system< The second key point of mining machine is: hard disk

(1) the number of hard disk bits

IPFs is storage mining, and the mining benefit is directly proportional to the size of storage capacity, so if you want to dig more money, you have to have more hard disk bits, and the mining machine with 16 disks and 24 disks is preferred

(2) hard disk installation

if you need to shut down every time you increase or decrease the hard disk, you may not get enough money to be punished and dected. IPFs mining machine needs to work stably, so it must support hot plug
(3) hard disk compatibility

supports the mixed insertion of different brands and capacities of hard disks, which can be collocated at will according to their own needs. Only by making full use of the capacity of hard disks can we maximize the revenue
the third key point of mining machine: CPU, motherboard

CPU and motherboard should be able to point out the actual working situation of multiple hard disks, and the hardware collocation should be reasonable. For example, the configuration can only support 4T multiple hard disks. If multiple 8t hard disks are inserted, it will lead to a small horse pulling a cart, causing a crash and burning the hard disk, motherboard, CPU, etc. Therefore, the hardware configuration should be rendant, and about 8t hard disk storage space should be reserved< Key points of Miner: built in mining software

the performance of built-in mining software is better, otherwise the miner's mining situation can't be well connected with the main chain, and the main chain can't read the miner's work well, resulting in data loss and mapping data error. For example, if you save 20t and the main chain only reads 10t, you will lose the reward of storing 10t. So the software R & D team must have strength. With the upgrading of technology and the analysis of mining data, software system is also needed to ensure or improve the mining efficiency.
4.

IPFs is a file transfer protocol similar to http. If IPFs wants to run, it needs many computers (storage devices) in the network as nodes. In a broad sense, all participating computers can be called IPFs mining machines

in order to attract more users to join the IPFs network and contribute to the network, an encryption currency named filecoin is designed, which is distributed to the participants (nodes) as a reward according to the amount of contributed storage space and bandwidth. In a narrow sense, the computer specially designed for the purpose of obtaining the filecoin reward is called IPFs mining machine

because IPFs network needs storage space and network bandwidth, in order to obtain the highest profit ratio, IPFs mining machine usually strengthens the storage space and reces the power consumption of the whole machine. For example, more than 10 high-capacity hard disks are equipped, Gigabit or higher speed network cards are equipped, and ultra-low power architecture processors are used

of course, the mining machine provides storage services, so it can obtain revenue. The size of revenue is related to the configuration of mining machinery and the number of IPFs mining machinery

extended data

the reasons why it is not recommended to invest in IPFs are as follows:

1. IPFs technology is too early to be commercialized

IPFs now takes up a lot of bandwidth. IPNs is very slow at present, which is an obvious technical defect. It will be very difficult to realize dynamic web pages only through IPFs

There is no reasonable economic model, even if the token economy is added, it is difficult to realize the long-term natural ecological value

as a very cumbersome decentralized protocol, it is difficult for users to share files autonomously and spontaneously. In addition, even if users share files into the protocol, the files will be completely open and users cannot delete files effectively, so the security of valid files is threatened

the solution is to introce encryption and blockchain incentive mechanism. At the same time, it solves the security and storage power problems of files. However, as mentioned before, any node with workload proof under blockchain incentive mechanism will face an economic problem of continuous power on state

It is difficult to establish an ecological network with IPFs as the core under the influence of technical problems

The ecological application space of

IPFs is quite limited, and the project interaction speed realized by IPFs protocol is also very slow. Of course, it has a direct relationship with the number of nodes and the distance of calling

5.

IPFs is just an underlying technology, a point-to-point distributed file system

filecoin is the incentive layer based on IPFs and blockchain. Only filecoin has token

at present, filecoin is still in the stage of testing network, and there are many mining machines on the market, so whether we can dig out coins or not needs to be marked with a "question mark". At present, it is the stage of test network, and the configuration of future filecoin miner needs to be studied. You can pay more attention to the test network to help you understand the chain of filecoin

you can follow our website for information about filecoin< EM > IPFs force zone < / EM >

6. CPU central processing unit:
deeply customized CPU x86 architecture, multi thread processing, low power consumption, can run
storage device:
solid state hard disk + mechanical hard disk hybrid storage, system independent operation, relatively fast reading and writing, high processing efficiency
motherboard:
Intel ODM deeply customized motherboard, the overall operation of mining machine is relatively stable, and the fault ring mining is low
7. During the Qianlong period of the Qing Dynasty, a large-scale gold mine was discovered in Altay area in Northern Xinjiang. Many refugees in the pass were forced to make a living and went there to dig for gold. When the Minister of the Qing government in Dihua (now Urumqi) knew about it, he was afraid that too many refugees would cause riots, so he asked someone to discuss it and tried to prevent the refugees from going to the gold mining area. Some people suggest that there is only one way to the Altay gold mining area. As long as the government sends troops to guard the entrance and exit of the gold mine and forbids grain to enter, the people inside will come out obediently if they have no grain. This is a good way to seal one's throat without breaking through. The minister in Dihua accepted the proposal and sent soldiers to guard the pass, forbidding the delivery of food inside
there are tens of thousands of people in the gold mining area, and as soon as there is a shortage of food, there will be trouble. After escaping from the mining area, these refugees had no way to continue their life, so they had to take risks, gathered in the mountains, plundered their families, and became bandits who did harm to one side, which made the Qing government headache
the imperial court sent troops to encircle and suppress the bandits for several years, which cost a lot of money and damaged many generals. Not only did they not play their e role, but they suppressed more and more bandits. It seems that "blocking" can not be relied on
the imperial court had no choice but to adopt the suggestion of another high official. Gao Shen said that blocking is better than dredging, and Dayu's flood control is the way of dredging. Since the gold miners can't stop it, it's better to let them go and let them go. Just set up a checkpoint on the main road to and from the gold mine, and the gold miners will come out after they have panned the gold. You can, as long as you pay taxes to the imperial court according to the regulations. In this way, the gold diggers have income, and the country has new income. With a stable income, who is willing to be a bandit? The imperial court didn't have to spend money to suppress the bandits. With such a barrier, the refugees and the imperial court achieved a win-win situation, which is the result of "sparing"
it is better to block than to dredge“ "Blocking" is the accumulation of contradictions and the delay of the outbreak of problems. As a result, the more blocking, the greater the trouble“ "Sparse" is to resolve the contradiction, is a major event, small things, dredge channel difficulties naturally solved.
8. I suggest you go to this website to consult the webmaster of the website. He is the agent of Avalon in China, responsible for sales and customer service.
9. CPU architecture is not very important in IPFs mining machine. Hummingbird H1 mining machine runs Linux operating system
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750