Skip to main content

Blockchain


Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. A blockchain functions as a decentralized database that is managed by computers belonging to a peer-to-peer (P2P) network. Each of the computers in the distributed network maintains a copy of the ledger to prevent a single point of failure (SPOF) and all copies are updated and validated simultaneously.


In the past, blockchains were commonly associated with digital currencies such as Bitcoin, or alternate versions of Bitcoin like Bitcoin Cash. Today, blockchain applications are being explored in many industries as a secure and cost-effective way to create and manage a distributed database and maintain records for digital transactions of all types.


How blockchain works


A blockchain ledger consists of two types of records, individual transactions and blocks. The first block consists of a header and data that pertains to transactions taking place within a set time period. The block’s timestamp is used to help create an alphanumeric string called a hash.


After the first block has been created, each subsequent block in the ledger uses the previous block’s hash to calculate its own hash. Before a new block can be added to the chain, its authenticity must be verified by a computational process called validation or consensus. At this point in the blockchain process, a majority of nodes in the network must agree the new block’s hash has been calculated correctly. Consensus ensures that all copies of the distributed ledger share the same state.


Once a block has been added, it can be referenced in subsequent blocks, but it cannot be changed. If someone attempts to swap out a block, the hashes for previous and subsequent blocks will also change and disrupt the ledger’s shared state. When consensus is no longer possible, other computers in the network are aware that a problem has occurred and no new blocks will be added to the chain until the problem is solved. Typically, the block causing the error will be discarded and the consensus process will be repeated.


Blockchain platforms


Blockchain platforms can be either permission-less or permissioned. In a public, permission less blockchain like Bitcoin, every node in the network can conduct transactions and transaction fees and participate in the consensus process. In a private, permissioned chain like Multichain, every node might be able to perform transactions, but participation in the consensus process is restricted to a limited number of approved nodes.


Blockchain consensus/validation algorithms


Choosing which consensus algorithm to use is perhaps the most crucial aspect of selecting a blockchain platform. There are four standard methods blockchain and other distributed database platforms use to arrive at a consensus. Generally, public platforms choose algorithms like Proof of Work because they require a lot of processing power to compute, and are easy for other network nodes to verify. 
  • Proof-of-work algorithm (PoW) 
  • Practical byzantine fault tolerance algorithm (PBFT)
  • Proof-of-stake algorithm (PoS)
  • Delegated proof-of-stake algorithm (DPoS)
Who uses blockchain?

Bitcoin was one of the most visible uses of blockchain, crashing; however, in 2018 when its price fell by 65-80% from its peak value. Bitcoin and other cryptocurrencies such as Ethereum or Litecoin can be used the same way as any other distributed database. 

In 2016, the online retail company Overstock.com used blockchain to sell and distributed more than 126,000 company shares, marking the first time a publicly traded company used blockchain to support stock transactions. R3, a global consortium of financial institutions, also uses blockchain to record, manage and synchronize financial information using blockchain APIs for specific platforms. 
Banks and financial institutions across the globe are exploring how they can use blockchain to improve security.  

Other industries, including healthcare, government and technology, are investigating how they can use blockchain to enable the secure exchange of data such as personal health information, digital assets like downloaded entertainment and real estate deeds. However, adoption of blockchain is slowing. In 2018, 1% of CIOs adopted blockchains, and around 8% of CIOs were looking into and planning towards the use of blockchain. Manufacturing and other similar businesses also see some potential to leverage blockchain to manage smart contracts as well as track materials as they move through their supply chains.

Advantages and disadvantages of blockchain

Experts cite several key benefits to using blockchain. Security is considered one of the significant advantages of this technology. It is almost impossible to corrupt a blockchain because information is shared and continually reconciled by thousands, even millions of computers, and blockchain has no single point of failure. If one node goes down, it’s not a problem because all the other nodes have a copy of the ledger.

On the other hand, experts say blockchain also has potential drawbacks, risks and challenges. With public blockchains, there are questions about trust and who is responsible should a problem arise. With private blockchains, there are questions about whether organizations are capable or willing to invest in the infrastructure for IT chargeback, an accounting strategy that would apply the costs of IT services, like database transactions, to the business unit in which they are used.

Comments

Popular posts from this blog

Understanding the Evolution: AI, ML, Deep Learning, and Gen AI

In the ever-evolving landscape of artificial intelligence (AI) and machine learning (ML), one of the most intriguing advancements is the emergence of General AI (Gen AI). To grasp its significance, it's essential to first distinguish between these interconnected but distinct technologies. AI, ML, and Deep Learning: The Building Blocks Artificial Intelligence refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. Machine Learning, a subset of AI, empowers machines to learn from data and improve over time without explicit programming. Deep Learning, a specialized subset of ML, involves neural networks with many layers (hence "deep"), capable of learning intricate patterns from vast amounts of data. Enter General AI (Gen AI): Unraveling the Next Frontier Unlike traditional AI systems that excel in specific tasks (narrow AI), General AI aims to replicate human cognitive abilities across various domains. I...

Normalization of Database

Database Normalisation is a technique of organizing the data in the database. Normalization is a systematic approach of decomposing tables to eliminate data redundancy and undesirable characteristics like Insertion, Update and Deletion Anamolies. It is a multi-step process that puts data into tabular form by removing duplicated data from the relation tables. Normalization is used for mainly two purpose, Eliminating reduntant(useless) data. Ensuring data dependencies make sense i.e data is logically stored. Problem Without Normalization Without Normalization, it becomes difficult to handle and update the database, without facing data loss. Insertion, Updation and Deletion Anamolies are very frequent if Database is not Normalized. To understand these anomalies let us take an example of  Student  table. S_id S_Name S_Address Subject_opted 401 Adam Noida Bio 402 Alex Panipat Maths 403 Stuart Jammu Maths 404 Adam Noida Physics Updation Anamoly :  To upda...

How to deal with a toxic working environment

Handling a toxic working environment can be challenging, but there are steps you can take to address the situation and improve your experience at work: Recognize the Signs : Identify the specific behaviors or situations that contribute to the toxicity in your workplace. This could include bullying, harassment, micromanagement, negativity, or lack of support from management. Maintain Boundaries : Set boundaries to protect your mental and emotional well-being. This may involve limiting interactions with toxic individuals, avoiding gossip or negative conversations, and prioritizing self-care outside of work. Seek Support : Reach out to trusted colleagues, friends, or family members for support and advice. Sharing your experiences with others can help you feel less isolated and provide perspective on the situation. Document Incidents : Keep a record of any incidents or behaviors that contribute to the toxic environment, including dates, times, and specific details. This documentation may b...