0% found this document useful (0 votes)
70 views3 pages

Topic 1 Highlights - Introduction DLT

This document provides an overview of distributed ledger technology including roles of money, centralized vs decentralized databases, types of distributed ledgers like blockchain and directed acyclic graphs. It also discusses blockchain ecosystem components such as nodes, miners, wallets and keys. Consensus protocols and algorithms like proof-of-work and proof-of-stake are explained. Real-world use cases of distributed ledgers are also mentioned.

Uploaded by

Olivia Rada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views3 pages

Topic 1 Highlights - Introduction DLT

This document provides an overview of distributed ledger technology including roles of money, centralized vs decentralized databases, types of distributed ledgers like blockchain and directed acyclic graphs. It also discusses blockchain ecosystem components such as nodes, miners, wallets and keys. Consensus protocols and algorithms like proof-of-work and proof-of-stake are explained. Real-world use cases of distributed ledgers are also mentioned.

Uploaded by

Olivia Rada
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Introduction to Distributed Ledger Technology

Roles of Money
1. Medium of exchange: A value carrier between two independent transactions.
2. Means of payment: Exchanging money for goods or services.
3. Store of value: The value of wealth remains relatively stable over time.
4. Unit of account: A measure for economic quantities, such as GDP.
5. Natural co-option on goods and services: No expiration date or restriction on when
money can be spent.
Centralized, Decentralized, and Distributed Databases
 Centralized: A single, central database where all nodes are connected to the
database.
 Decentralized: Databases are distributed across different storage devices and
interconnected.
 Distributed: All nodes store data and access the database, requiring a consensus
algorithm to synchronize data across the network.
Distributed Ledger Technology (DLT)
 DLT is a set of technologies that enable a consistent representation of data across
multiple nodes without a central authority.
 It allows for a distributed record or ledger in which transactions are stored in a
permanent, immutable way using cryptographic techniques.
 DLT is essentially a database with different ways of recording and adding new
information, resulting in various types of DLT.
Types of DLT
1. Blockchain: Transactions are recorded with an unchangeable cryptographic signature
called a hash, and data is stored in blocks chained together.
2. Directed Acyclic Graph (DAG): Transactions are entered sequentially, and each
transaction needs to endorse two previous transactions to be considered valid.
3. Hashgraph: A gossip protocol is used to relay transaction information, and virtual
voting is used for validation.
4. Holochain: Each node maintains its own ledger, and a set of rules called DNA is used
to verify individual ledgers.
5. Radix or Tempo: The system relies on the sequence of transactions to reach
consensus, and each node keeps a shard with a unique ID.
Key Characteristics of DLT
1. Decentralized
2. Immutable
3. Append-only
4. Distributed
5. Shared

Blockchain Ecosystem
Nodes and Miners
 Nodes are computers or servers that maintain copies of the ledger, communicate
with each other, and help with data entry and verification.
 Miners create new blocks through the mining process and are designated nodes that
add new blocks to the blockchain.
Wallets, Public Keys, and Private Keys
 A blockchain wallet is a software program that allows users to buy, sell, and monitor
balances for their digital assets.
 Public keys are derived from private keys using known algorithms and are made
available through public directories.
 Private keys allow users to access their cryptocurrency and are kept secret. If lost, the
user can no longer access their wallet.
Hash Functions
 Hash functions are mathematical algorithms that transform information bits into a
string of alphanumeric values.
 They have a high avalanche effect, meaning a small change in the input results in a
significantly different output.
 Common hashing functions include SHA-256 and SHA-512.
 Merkle trees are hash-based data structures used to verify the contents of blocks and
links between blocks.
Nonce and Difficulty
 A nonce is a number that is generated and used only once, providing replay
protection, authentication, and encryption in cryptographic operations.
 Miners must find the correct nonce capable of generating a valid block hash that
meets specific requirements.
 Difficulty is a mechanism for regulating the time it takes to mine a block, ensuring
that blocks are added at regular intervals even as more miners join the network.
 The difficulty level is adjusted by the system every two weeks to maintain a
consistent block creation rate (e.g., every 10 minutes for Bitcoin).

Byzantine Generals Problem and Consensus


Byzantine Generals Problem
 A group of generals needs to reach a consensus on whether to attack or retreat, but
some of them may be traitors sending conflicting messages to others.
 In the blockchain network, all nodes are connected, so they can verify and check
transactions, solving the Byzantine Generals Problem.
Double-Spending and the Longest Chain Rule
 Double-spending occurs when someone tries to spend the same funds in multiple
transactions.
 The blockchain solves this problem by using a decentralized ledger that all users can
access and examine the full history of transactions.
 Three scenarios for double-spending:
1. If transaction A is validated first, transaction B will be rejected.
2. If A and B reach the new block at the same time, the transaction in the block
that gets the next block validated will be confirmed.
3. If no new block is built on A or B, the network waits until six blocks are
confirmed after A or B to validate the transaction.
 The Longest Chain Rule: The chain with the most accumulated work (measured by
the number of hashes and difficulty level) is considered the valid chain.
Limitations of Blockchain
1. Scalability: Blockchain networks are not as scalable as current financial networks.
2. Adoption: Blockchain is seen as a nascent technology, and challenges like scalability
must be solved to increase adoption.
3. Regulation: Due to its decentralized nature, regulation is almost impossible on
blockchain.
4. Relatively immature technology: Blockchain is still a new technology compared to
traditional IT systems.
5. Privacy and confidentiality: Public blockchains like Bitcoin lack privacy, which is a
concern for many industries.
6. High energy consumption: Blockchain, especially proof-of-work, consumes a lot of
energy.

Consensus Protocols
Definition and Key Properties
 Consensus protocols are a way to reach an agreement between different parties in a
blockchain network.
 Key properties: Safety and consistency, liveness, and fault tolerance.
Types of Consensus Protocols
 66 known consensus algorithms, with Bitcoin using proof-of-work.
 Proof-of-Work (PoW): Miners compete to find a nonce that satisfies a difficulty level,
requiring significant computational power.
 Proof-of-Stake (PoS): Validators stake their coins to propose blocks and secure the
network, consuming less power than PoW.
 Proof-of-Importance (PoI): A variation of PoS where each account is given an
importance score similar to a credit score.
Comparison of Consensus Protocols
 The choice of consensus protocol depends on the type of blockchain network (public,
private, or consortium).
 The comparison table in the reading material helps determine which consensus
protocol is suitable for a given network type.

Use Cases and Discussion


Facebook/Meta and the Libra Cryptocurrency
 In 2019, Facebook announced its own cryptocurrency called Libra (now renamed
Diem).
 Students are asked to research and discuss why Libra was not successful.
Other use cases mentioned include:
 AiGang, Tokio Marine Insurance, Generali Group
 Winding Tree, TUI Bedshare
 JPM Quorum
 Alibaba E-commerce, Walmart

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy