How to mine in IPFs
-
at present, according to the official income method of fil, there are three ways: one is to provide hard disk storage to obtain income (storage miner), the other is to provide bandwidth resources to obtain retrieval income (retrieval miner), and the third is mining and packing block income (storage miner). Based on the above rules, only enterprise level and cloud mine pool can meet the three kinds of income at present
In terms of configuration, based on mining rules, the following configuration suggestions are given:CPU: 4 cores or above, Inteli series is the best, memory is at least 8g, if you want to get retrieval revenue, memory needs more than 16g, hard disk space is recommended to be more than 4T to get storage revenue
-
household mining machine (current situation analysis, There are the following disadvantages:
A. more than 95% of domestic IP addresses are not static, which leads to mining default platform withholding pledge tokenB. you need to buy pledge token, and you need to spend some extra money to buy token to start
C. the sound of power outage is loud, and the events affecting neighbors lead to no income
D. unfortunately, your family is in the second, third, fourth and fifth tier cities, Basically, we can't get the order
e. the home miner advertised by a Yingkuang machine can't mine and can be retrieved. The retrieval needs an uplink bandwidth of at least 10m, and the space-time proof (IPFs anti cheating mechanism) may need a higher stable bandwidth of more than 20m. Who's community's network can meet the above requirements within 24 hours, so the retrieval is also very difficult
It is said that the investors who started brainwashing and bought the household miner in March of 18 bought a small box at 5-10 times the price and put it at home as a decoration, so the household miner is used to cut leeks, because it has a low threshold, and then you can hardly dig fil -
Enterprise trusteeship miner
a, In terms of hardware configuration, the cost of setting up a mine is relatively high. If the leasing meets the national application conditions, the purchase price of a single configuration combination is about 3-10 times of the cost price, which is relatively high
B. the same computer room is generally leased to multiple enterprises for storage and application, which will lead to multiple operating systems running at the same time, Lack of unity, easy to be attacked by hackers
C. vicious competition of all mining machines in the mine, internal consumption of computing power, unbalanced order distribution, resulting in some machines grabbing orders and some machines not having orders, and Unbalanced Income
D. different independent IPFs mining machine systems, it is difficult to unify parameter grabbing orders in real time
E. unable to resist regional policy risks, For example, the national policy risk
F. the biggest advantage of enterprise level is high configuration, centralized basic management, and room conditions are superior to household mining machines. At the same time, the above situation is accompanied by
-
cloud mining pool
A. computing power leasing, the price is relatively low for hosting mining machines, The leasing time is controllable
B. the IDC rooms of general cloud mine pool are defense class, which can prevent hackers from intruding
C. the output of the mine pool is shared throughout the network, and there is no worry about the failure of a purchased node, and there is no income
D. the hardware input is allocated throughout the network, and the personal input-output ratio is cost-effective
E. unified scale management, and there is no single node debugging, Single maintenance status
D. node layout is generally multi city and multi country, regional policy risk
E. third party real-time monitoring, high degree of information disclosure, always know the output status of ore pool
F. unified operation and maintenance system, real-time unified parameter adjustment, pricing strategy, order grabbing strategy, storage strategy
-
for the above analysis, At present, the existing cloud mining pools in China, such as a cat cloud mining pool, a Yingyun node, an inter cloud mining pool, and a chain cloud mining pool, claim to be globally distributed in the publicity. After actual verification, their mining pools are either small private mines established by themselves or professional mining machine trusteers cooperated in China, and most of them are limited to China, Because the construction cost of the mine pool is very high, and the cost of cooperation with domestic cloud service providers is even higher, we should set up our own small mine pool to publicize the global layout
currently, it is recommended to learn about "Noah cloud pool". After verification, the channel cloud service providers of Noah cloud pool are currently cooperating in Hong Kong, Singapore, Germany and Poland, and their technical background is relatively strong. Please check other relevant information
Before the main network of IPFs filecoin was launched, the specific mining yield could not be calculated effectively and accurately, and the mining computing power of filecoin became a complex composed of bandwidth, hard disk space, network coverage and other factors
what the data storage market needs to contribute is hard disk storage space. The more hard disk space, the higher the mining capacity; Provide network bandwidth and get fil by mining bandwidth resources; The mining machine developed by interstellar continent based on the technical points disclosed in IPFs and filecoin white paper has more advantages in computing power
IPFs is a file transfer protocol similar to http. If IPFs wants to run, it needs many computers (storage devices) in the network as nodes. In a broad sense, all participating computers can be called IPFs mining machines
in order to attract more users to join the IPFs network and contribute to the network, an encryption currency named filecoin is designed, which is distributed to the participants (nodes) as a reward according to the amount of contributed storage space and bandwidth. In a narrow sense, the computer specially designed for the purpose of obtaining the filecoin reward is called IPFs mining machine
because IPFs network needs storage space and network bandwidth, in order to obtain the highest profit ratio, IPFs mining machine usually strengthens the storage space and reces the power consumption of the whole machine. For example, more than 10 high-capacity hard disks are equipped, Gigabit or higher speed network cards are equipped, and ultra-low power architecture processors are used
of course, the mining machine provides storage services, so it can obtain revenue. The size of revenue is related to the configuration of mining machinery and the number of IPFs mining machinery
extended data
the reasons why it is not recommended to invest in IPFs are as follows:
1. IPFs technology is too early to be commercialized
IPFs now takes up a lot of bandwidth. IPNs is very slow at present, which is an obvious technical defect. It will be very difficult to realize dynamic web pages only through IPFs
There is no reasonable economic model, even if the token economy is added, it is difficult to realize the long-term natural ecological valueas a very cumbersome decentralized protocol, it is difficult for users to share files autonomously and spontaneously. In addition, even if users share files into the protocol, the files will be completely open and users cannot delete files effectively, so the security of valid files is threatened
the solution is to introce encryption and blockchain incentive mechanism. At the same time, it solves the security and storage power problems of files. However, as mentioned before, any node with workload proof under blockchain incentive mechanism will face an economic problem of continuous power on state
It is difficult to establish an ecological network with IPFs as the core under the influence of technical problems The ecological application space ofIPFs is quite limited, and the project interaction speed realized by IPFs protocol is also very slow. Of course, it has a direct relationship with the number of nodes and the distance of calling
the differences between bitcoin and skycoin in the current stage, and why skycoin is a ship heading for the future. 1. Positioning is different. BTC's positioning is a point-to-point payment agreement. Anyone in the world can freely control their own assets anywhere, so that places without banks can enjoy services similar to banks. Now BTC's position in the blockchain instry is similar to that of gold in the financial system, anchoring other digital currencies. On the street, grab anyone and ask him if he knows blockchain? Few people have heard of it. When we talk about BTC, we all know the concept. This is where the value of BTC lies. With the increase of the number of coin holders, the number of accepted merchants and the number of transactions, the value of BTC has increased geometrically. Skycoin's positioning is decentralized and P2P Internet economy. It not only provides value transmission as a new generation of cryptocurrency, but also provides valuable services. A decentralized network service provider rewards skycoin tokens when users provide bandwidth or resources. Similarly, when users consume network resources or media, they consume skycoin tokens. As a decentralized blockchain platform, people can develop all kinds of dapps on the skycoin main chain network. 2. The original intention of BTC design is to be completely decentralized and everyone can participate. Nakamoto designed a consensus mechanism pow. After downloading the BTC account book, everyone can use their own computer to calculate the hash value and get BTC rewards. Wish is good, reality is cruel. After BTC's value was widely recognized, the price soared, attracting more people to join the mining army and opening the arms race mode. From the initial CPU mining to the present computer cluster mining, the computing power of BTC is now monopolized by the three major mines in the world, and BTC is graally gathered into the hands of a few people, and is back on the old road of centralization. Skycoin starts from design to avoid the problem that the accounting right and voting right of BTC are not separated, resulting in that the computing power is in the hands of the mining tyrant, and the code is in the hands of the code tyrant. The mining tyrant forcibly forks the BTC, and the code tyrant privatizes the technology. They do evil at will, but all the coin holders have no choice but to let fate decide. They often have to choose one of the two villains. Its consensus mechanism obelisk is independent of the creation of skycoin. If skycoin does not mine directly and cancels the block reward, the miners will have no interest, so they will not have the power to monopolize and control skycoin network. Obelisk designs a trust based mesh network. Each node will randomly connect several upstream nodes and downstream nodes to disperse the influence of nodes and avoid BTC centralization. 3. The transaction process of BTC is open with different node risks. For a new block composed of more than 2000 transaction data, all nodes can participate in mining, and only spend the most computing resources to get rewards. Nodes are randomly connected to each other, and each node transfers the most difficult block it knows to other nodes, which will then accept the chain. The node will evaluate the function to verify the received block chain more difficult, and then switch to the received block chain. The node then broadcasts its new chain to other nodes. In this way, consensus is spread through the network, and all nodes reach the same consensus. Each bitcoin node is very easy to control. An attacker who controls the router has absolute control and can arbitrarily affect the consensus result of the node. Skycoin's transaction process is closed, only between the node and its associated upstream and downstream nodes. Just like Apple's system, the closeness ensures high efficiency and good user experience. If you want to destroy skycoin, you must get a user's private key in the transaction chain, and you must join its upstream or downstream. Once joined, all subsequent actions will be broadcast, and at the same time, they will be limited in this trading chain, so they cannot be spread on a large scale. If someone violates the rules or attacks maliciously, the community will easily find the problem node, cut off the connection between the node and other upstream and downstream nodes, and minimize the harm. Conclusion: one is the underlying basic chain, which aims to become the basic digital currency. One is the application chain, which aims to build a self-sufficient ecosystem. When the infrastructure is completed, the value of the application chain will not be lower than that of the basic digital currency. One begins to deviate from the original intention of decentralization, and power is gathered into the hands of a few people; One from the beginning of design is to not repeat the mistakes, find the original heart, and achieve complete decentralization. There is a crisis of being attacked and tampered by 51% of the computing power; Let's wait and see - skycoin - a safer, faster and more futuristic digital currency.
this
year, depending on the official progress of IPFs. There are many mining machines. You can try the black fluorite mining machine.
1、 Different ways of issuance
bitcoin and other virtual currencies are not issued by specific monetary institutions. They are generated by a large number of calculations based on specific algorithms, which is a decentralized way of issuance. Each different terminal node is responsible for maintaining the same account book, and the maintenance process is mainly to package and encrypt the transaction information. The virtual money of pyramid scheme is often rewarded by the way of sending money
Second, different trading methodsbitcoin and other virtual currencies are scattered transactions spontaneously formed in the market, and after the scale is formed, the third party graally establishes an exchange to complete the transaction. However, pyramid selling virtual currency is often issued by itself, and self built platform for trading
Third, different ways of implementationbitcoin and other virtual currencies are open source programs, and the parameters and ways of their total amount limit are shown in the open source code. However, the so-called open source of pyramid selling virtual currency itself is completely ing other people's open source code, and it does not use open source code to build programs, so its essence is controlled by the website as Q coin
extended information:
pyramid selling is to absorb and allocate funds by developing the relationship between the upper and lower line. In the bitcoin investment market, the elderly and new people do not have the time advantage, nor do they rely on high profits to pull down the line. In the face of market fluctuations, no one can guarantee that they will make money, and the elderly can not force them to get income from pulling new people
bitcoin or other digital currency does not belong to any person or organization. It is an uncontrolled and decentralized program. The code is fully developed, and the total amount cannot be modified or destroyed
source of reference: network bitcoin
source of reference: network MLM source of reference: network bitcoin