This is the entire image that I will discuss below.
The blocks are generated one by one and transferred into blocks, after which they are all transferred into a chain. For hackers, the block chain is extremely strong and difficult to attack. They must fill in the data to gain access to the block, including who sends the data, who receives the data, and what data they transmit. If they need to access one box, they must first determine who was the sender, who sent the data to the sender, and who sent the data to the sender. It contains eight boxes in the blockchain, and if they hack one, they can have access to the sole block.
We have been talking about small fragments of the protocol to build up background. Now we can integrate those concepts into a single framework and explore the blockchain. The ultimate result of mining is increasing the number of blocks as the network evolves over time. • Internal consistency: There are a few design principles inherent to the functioning of each block that make the blocks internally consistent. Such mechanisms in the blockchain allow it to be an internally coherent data structure that can keep a consistent record of transactions.• Consensus on transactions: The concept of mining described in 2 is just one implementation for verifying transactions;. To discover the process, let’s look at the complete structure of a block in Figure 3-1. Here, we focus more on the block header and the transaction list.
The block header and transaction list are the two components that stay unique to every block.. There are several new terms and concepts introduced here and we will go through all of them now. . Now we focus on the components of the transaction list. Let’s begin with the delay.
Next is the concept of transaction inputs and outputs. More precisely, UTXO is really the currency balance, or the unspent currency present in the Bitcoin economy.. To understand UTXO properly, we need to talk about the concept of change. The idea is very simple, actually.. UTXOs have a similar concept, as shown in Figure 3-2.
In this example, Bob wants to send one BTC to Alice, and Figure 3-2 shows how this transaction occurs. . This involves the use of private–public key pairs that lock and unlock the transactions. • Bob receives the transaction after it has been verified on the network and propagated to him.• Bob unlocks the transaction using his private key. The >Bitcoin protocol uses a minimal, bare-bones, Turing-incomplete programming language to manage transactions. Without the private–public key pair authorization, transactions between users would not occur. Let’s complete the picture that we started to create with the UTXOs, shown in Figure 3-3.
He received nine BTC in change as the unspent output n a sense, the output from the first transaction became an input for the second,
Alice initiates the transaction from her wallet, which contains multiple addresses. . There are actually other types of wallets, aside from a software wallet. . Cold storage wallets are a more permanent method of storing Bitcoins over a long period of time. . There is no recovery mechanism for a password on a wallet. The idea here is to create a new wallet, and send a transaction to a new address on that wallet.
. This is where a merkle tree provides speed and efficiency.To visualize a merkle tree, refer to Figure 3-5.. Let’s follow the example shown in Figure 3-5. How would a merkle root assist in finding a transaction? Let’s run through the example shown in Figure 3-6 and try to find transaction 6 from the merkle tree.
. Over time, the blockchain has increased in download size, recently reaching a few gigabytes.
. Using the merkle root, we can reach the transaction in just three steps, which allows a very high operational efficiency that we would need in Bitcoin’scurrent network.
Several miners are competing to solve the PoW and create a block. Incidentally, two miners find a valid value within a few seconds of each other and broadcast them to the network. What happens now? To resolve the fork, there are a few rules in place on the network, called the consensus rules.
Miners?Mining is the process through which miners add new blocks to the chain.Miners utilize specialized software to solve the very difficult arithmetic issue of generating an approved hash using a nonce.