Different types of Ethereum blockchains and their deployment: Blockchain types: public chain, alliance chain, private chain, installation and deployment of Ethereum.

third chapter


1. Blockchain Type

Classified according to the type of blockchain network: private chain, alliance chain, and public chain.

1. Public chain

  1. Mainnet: refers to the public chain used in real life, such as Bitcoin and Ethereum.
  2. Test network: No real Ether is consumed. Such as: eth, pyethAPP, Geth,

2. Alliance chain

Quorum: Consistency protocol adopts: Raft-based consistency protocol and Istanbul BFT protocol. (The Istanbul BFT protocol should be used in an environment that supports Byzantine fault tolerance)

Logical overview of the Quorum blockchain platform architecture and its various modules:

  • Transaction Management: Provides encrypted transaction data for private transactions,
  • Encryption module: Copy private key management and data encryption encryption process.
  • Quorum chain: a voting consensus mechanism implemented using smart contracts.
  • Network management: Control network access.

The core function of Quorum is to use encryption to prevent nodes unrelated to the transaction from seeing sensitive data in the transaction. Its implementation plan includes a single shared blockchain and an architecture composed of smart contract software (fields that provide private data) as well as transformation of the Ethereum public chain mechanism (including block submission and block verification). Modifications).

Quorum transaction privacy protection is one of the key features. To achieve this functionality, Quorum introduces public transactions and private transactions. Public transactions refer to transactions whose data is visible to all nodes within the authorized network, and the process of production and execution is consistent with standard Ethereum transactions. Private transactions are transactions whose data is only visible to the designated nodes within the network associated with the transaction.

The process of generating and executing private transactions is different from public transactions. Before the transaction information is sent by the counterparty, the code in the data field is replaced with the hash value of the encrypted code. Update the private state database. (How to reach consensus on private state? Introduce a supervision node into the network, and all private transactions will list this node as a transaction related party, so that the supervision node backs up all private transactions and the private state of all nodes, so that the supervision node is other nodes Provide third-party proof of its private status to make the private status valid for other transactions.

3. Private chain

Completely private blockchain is close to a centralized database.

2. Install and deploy Ethereum.

1. Installation

https://www.csdn.net/tags/Ntzacg0sNzYxMi1ibG9n.html

Summarize

For example: The above is what I will talk about today.

Guess you like

Origin blog.csdn.net/qq_53982314/article/details/124276006