Wednesday, December 6, 2017

Understanding the role of peer-to-peer networks
In order to apply a blocking registry as a register for storing transaction data, we must have the ability to check the block to see if someone has actually performed the transaction on our address or purse.

If the blocking system was stored only on one computer, which would for some reason be disconnected, at least it would be very annoying. Therefore, the current state of the block is synchronized and becomes available for a huge number of computers around the world.

These computers are called "nodes", and they work each in a peer-to-peer network to ensure the security and up-to-date data of the blocking. Each of these nodes stores a complete, updated version of the blockbuster. Each time a new block is added, each node on the network updates its copy of the block. The use of a peer-to-peer network has several advantages:

You can always check the status of the blocking system yourself using the browser blocker;
Do not rely on any one side to find out the true state of the block;
You do not need to rely on one server to ensure the security of the data from the blockroom;
To crack a blocker, an attacker will have to crack thousands of computers at the same time instead of a single server;
You can be sure that the data of the block will never be deleted, because they will have to be deleted from all nodes.
Client-server model against peer-to-peer network
Client-server model against peer-to-peer network
This is all very important, but this alone does not mean that the security of the block is maintained at a sufficient level for its real application to store valuables or conduct transactions with them.

For example, how can we know that the data (transactions) in the block are correct? How can I know that there are no invalid transactions in the blocks? And if there are different versions of the blockbuster, how do you know which one of them represents the true state of the block?

All these fears are solved in a very ingenious way by applying the consensus mechanism, the use of which became possible, first of all, thanks to the peer-to-peer network.
1. What is, in fact, blockade?
In short, blocking is just a way of structuring the data. That's all. This registry is the file that stores the accounts.

This file can be compared to a book that never ends.

Each page of the book has information and a page number at the bottom. Thanks to this page number, you immediately know where in the book this page belongs. Page 49 is clearly between pages 48 and 50.

Like pages, blocks are filled with information. Although the blocks do not have exact numbering, they have a timestamp that performs the same function. A new block is always added after the block with the latest time stamp. Thus, a chain of blocks is formed.

An important feature of blockers is that they use cryptography, thanks to which we can notice whether any information on any page in the book has been changed. This property makes the block system an ideal data structure that allows you to effectively track records of any assets.

Possibilities of using blockade
Possibilities of using blockade
Blockbine Bitcoin blocks contain information about transactions in bitcoins. Each block contains information about who sends to whom and how many bitcoins.

Since the block is used to monitor the movement of all bitmicons from the time they were created, this registry can always be checked for who and how many bitokoynov belongs at any time. "Who owns what" at any time is called the current "state" of the block.

Transaction occurs only after it is included in the block and added to the chain. Therefore, when the block is added to the chain, the state of the block chain is updated. As a result, bitkoyny move.

This means that if I want to check if someone has made a transaction to my address or not, I should be able to check the status of the block. To do this, this registry must be publicly available. Here, peer-to-peer networks come into play.