In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article mainly explains the "tendermint open source block chain development introduction", the article explains the content is simple and clear, easy to learn and understand, the following please follow the editor's ideas slowly in depth, together to study and learn "tendermint open source block chain development introduction" bar!
Brief introduction
Tendermint is an open source and complete implementation of blockchain, which can be used for common chain or federation chain. Its official positioning is the developer-oriented blockchain consensus engine:
Compared with other blockchain platforms such as Ethernet Square or EOS, tendermint is characterized by its differentiated positioning: although it includes the complete implementation of blockchain, it provides these core functions in the form of SDK for developers to easily customize their own proprietary blockchain:
Tendermint's SDK contains most of the components that construct a blockchain node, such as encryption algorithm, consensus algorithm, blockchain storage, RPC interface, P2P communication and so on. Developers only need to implement their own applications according to the requirements of their application development interface (Application Blockchain Communication Interface).
ABCI is independent of the development language, and developers can use any language they like to develop specialized block chains based on tendermint. However, because tendermint itself is developed in the go language, an added benefit of developing ABCI applications with go is that you can completely embed tendermint into your own application and neatly deliver a single executable file.
Consensus algorithm of tendermint
On the technical side, tendermint prides itself on its consensus algorithm, the world's first Byzantine fault-tolerant algorithm that can be applied to common chains. Tendermint won the most innovative award in 2016 International blockchain week and was adopted as a consensus engine in many products such as Hyperledger's Burrow. You can click here to view its application.
The consensus mechanism adopted by tendermint belongs to an equity proof (Proof Of Stake) algorithm, in which a group of Validator takes the place of the role of miner (Miner) and takes turns to produce blocks according to the proportion of mortgages:
By avoiding the POW mechanism, tendermint can achieve high transaction throughput. According to the official statement, with the support of a reasonable (ideal) application data structure, it can reach 42000 transactions per second, citation here. However, in the real world, consensus communication among 100 nodes deployed around the world can actually reach 1000 transactions per second.
Tendermint is also Byzantine fault-tolerant (Byzantine Fault Tolerance), so for the block chain composed of 3f+1 authentication nodes, even if there are Byzantine errors in f nodes, it can ensure that the global correct consensus can be reached. At the same time, in the extreme environment, tendermint chooses security between transaction security and downtime risk, so when more than f authentication nodes fail, the system will stop working.
What is a Byzantine error? To put it simply, it is any error: not only the downtime of the node, but also the deception and attack of the malicious node.
Another feature of the tendermint consensus mechanism is the ultimate certainty of its consensus: once a consensus is reached, it is really reached, rather than a probabilistic certainty such as Bitcoin or Ethernet Square, and may expire at some point in the future. Therefore, there is no block chain bifurcation in tendermint.
Course address: http://xc.hubwiz.com/course/5bdec63ac02e6b6a59171df3
Tendermint vs. Tai Tai Fong
The positioning of tendermint determines that applications play a significant role in the final delivery of the node software layer. Let's better understand this by comparing it with Tai Tai Fong:
In the figure above, the abci application in the tendermint structure and the intelligent contract in the Ethernet Square structure are implemented by user code. Obviously, the ABCI application roughly matches the combination of EVM+ contracts.
In Ethernet Square, the nodes are a whole, and the smart contracts provided by developers run in a restricted virtual machine environment; in tendermint, there is no virtual machine layer, and the application is a standard operating system process without any restrictions or constraints-which sounds dangerous, but this flexibility is even more advantageous when you consider that the purpose of using tendermint is to build a proprietary blockchain.
In fact, the application layer space left by tendermint is so large that you can implement an EVM in an ABCI application and then provide solidity contract development capabilities, which is what super-ledger Burrow does.
Thank you for reading, the above is the content of the "introduction to the development of tendermint open source block chain". After the study of this article, I believe you have a deeper understanding of the development introduction of tendermint open source block chain, and the specific use needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
1. Configure the secondarynamenode of hadoop, which is as follows: node2
© 2024 shulou.com SLNews company. All rights reserved.