In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
1. Conversion in Taiyuan units. The unit of Ethernet Square, following the tradition of the scientific community, is named after experts in mathematics and cryptography who have made outstanding contributions. The smallest unit of Etay Square is Wei.
Kwei (Babbage) = 10 to the third power Wei
Mwei (Lovelace) = 10 to the 6th Wei
Gwei (Shannon) = 10 to the ninth power Wei
MicroEther (Szabo) = 10 to the power of 12 Wei
MilliEther (Finney) = 10 to the power of 15 Wei
Wei to the power of 18 of Ether = 10
2. The Ethernet Square account is different from the UTXO in Bitcoin. There are two types of accounts: external ownership accounts (EOA) (general accounts) and contract accounts.
General account: an account that stores Ethernet coins, which can be generated at will, with the following features:
Balance with the balance of ethercoin (the place where ethercoin is stored, which is different from the UTXO mode of bitcoin). A counter (nonce) used to determine that each transaction can only be processed once. Send transactions (Ethernet currency transfer, release contract, call smart contract) there is no associated code through private key control
Contract account: a collection of functions and data, which exists at the specific address (contract address) of Tai Tai Fong, with the following characteristics:
The code associated with the token balance can be triggered by a transaction or message call and interpreted and executed by the Taifang virtual machine (EVM).
3. Ethernet Square transaction: the process of sending signed message packets from one account to another in Ethernet Square, and the block chain records and stores the relevant data. The etherfang smart contract to change the data status of a contract account is also a transaction, which also costs a fee.
The elements of the transaction include the following:
The signature information of the sender of the message and the receiver of the message is used to prove that the sender intends to send the value field of the message to the receiver through the block chain, the optional data field of the number of Ethernet coins transferred from the sender to the receiver, used to store the intelligent contract or the code gasLimit of the intelligent contract, the transaction is executed using the upper limit gasPrice of gas, and the price of the gas fee that the transaction sender is willing to pay. A unit of gas represents the execution of a basic instruction, such as a calculation step.
4. Gas limit is the maximum amount of gas allowed in a single block, which can be used to determine how many transactions can be packaged in a single block. The gas limit of the block is determined by the miners on the network, and you can refer to the data fed back by https://stats.ethfans.org/. Gas Price fuel price, GasUsed: the total amount of gas consumed by the transaction. Transaction fee = gasUsed gasPrice, maximum transaction cost = Gas Price Gas Limit.
5. After the transaction is issued, it will be broadcast to the whole network through many miner nodes, which will help you forward it to the next node until your transaction is packaged into a block by the miners. Each forwarding consumes a portion of the Gas, and if the fuel runs out before it is packaged, reaching the upper limit set by Gas Limit, the deal is bound to fail. The ETH will be returned, but the fuel charge will still be deducted.
6. Intelligent contract, the innovation of ethernet lies in that it puts forward the concept and underlying implementation of smart contract (Intelligent contract) for the first time. The so-called contract refers to the collection of code (function) and data (state), which exists at the specific address of the etherfang block chain. Intelligent contracts are triggered by transactions or message calls and interpreted and executed by the ethernet virtual machine (EVM).
7. EVM is the abbreviation of Ethereum Virtual Machine, which is called etherfang virtual machine. EVM is the core component of eTaifang platform, and all intelligent contract binary bytecodes are executed by EVM. EVM is a runtime environment that supports arbitrarily complex code and is called "Turing complete" in scientific terms.
8. Solidity is a high-level programming language recommended by Taifang officially. Its syntax is similar to JavaScript. It is designed to generate Ethernet Fang virtual machine code in a compiled way. So if we want to create our own contract code, it's very easy to use Solidity.
9. Browser-solidity is an official browser-based contract compiler, it is very easy to use it for some simple contract development tests, and its compiler version will be updated in time. Solidity online compiler website: https://ethereum.github.io/browser-solidity
10. Mist is a graphical client officially released by eTaifang. It has a graphical tool for wallet, development and debugging, making it easy for us to create, develop, test and deploy smart contracts. Mist supports various operating systems such as Windows, Mac, Linux, and so on.
11. Geth, whose full name is Go-ethereum, is an ethernet client, and it is also the most commonly used client at present. it is also easy to use Geth for development and debugging. Geth client has complete operation instructions. When we first came into contact with ethernet development, using Geth for simple private chain debugging is a very good learning environment.
Geth command usage:
Geth [options] command [command options] [parameters …]
Command:
Account Management account
Attach launches an interactive JavaScript environment (connects to nodes)
Bug reports to bug Issues
Console launches interactive JavaScript environment
Copydb creates a local chain from a folder
Dump Dump (analyze) a specific block storage
Dumpconfig display configuration valu
Export export chunk chain to file
Import imports a blockchain file
Init starts and initializes a new Genesis block
Js executes the specified JavaScript file (multiple)
License displays license information
Makecache generates ethash validation cache (for testing)
Makedag generates ethash mining DAG (for testing)
Monitor Monitoring and Visualization of Node Index
Removedb deletes the blockchain and state database
Version print version number
Wallet manages Ethereum presale wallets
Help,h displays a list of commands or help commands
ETHEREUM options:
-- config value TOML configuration file
-- data directory of datadir "xxx" database and keystore key
-- keystore keystore storage directory (default is in datadir)
-- nousb disables monitoring and managing USB hardware wallets
-- networkid value network identifier (integer, 1=Frontier, 2=Morden (deprecated), 3=Ropsten, 4=Rinkeby) (default: 1)
-- testnet Ropsten network: pre-configured POW (proof-of-work) test network
-- rinkeby Rinkeby network: pre-configured POA (proof-of-authority) test network
-syncmode "fast" synchronization mode ("fast", "full", or "light")
-- ethstats value reports to ethstats service URL (nodename:secret@host:port)
-- identity value custom node name
-- maximum percentage of LES request time allowed by lightserv value (0-90) (default: 0)
-- maximum number of LES client peers for lightpeers value (default: 20)
-- lightkdf reduces key-derivation RAM&CPU use when consuming KDF intensity
Developer (mode) option
-- dev uses POA consensus network. By default, it pre-allocates a developer account and automatically starts mining.
-- Mining cycle in dev.period value developer mode (0 = only when trading) (default: 0)
ETHASH options:
-- ethash.cachedir ethash verification cache directory (default = within the datadir directory)
-- the most recent number of ethash caches saved by ethash.cachesinmem value in memory (per cache 16MB) (default: 2)
-- the most recent number of ethash caches saved by ethash.cachesondisk value on disk (per cache 16MB) (default: 3)
-- ethash.dagdir "" save ethash DAGs directory (default = user hom directory)
-- the latest number of ethash DAGs saved by ethash.dagsinmem value in memory (more than each 1GB) (default: 1)
-- the latest number of ethash DAGs saved by ethash.dagsondisk value on disk (more than each 1GB) (default: 2)
Deal Pool options:
-- txpool.nolocals disables price exemption for locally submitted transactions
-- disk log of txpool.journal value local transactions: for node restart (default: "transactions.rlp")
-- interval for txpool.rejournal value to regenerate local transaction logs (default: 1 hour)
-- minimum gas price limit for txpool.pricelimit value to join the trading pool (default: 1)
-- percentage of txpool.pricebump value price fluctuation (relative to previous transactions) (default: 10)
-- txpool.accountslots value guarantees the minimum number of executable trading slots per account (default: 16)
-- the maximum number of trading slots that can be executed for all accounts in txpool.globalslots value (default: 4096)
-- maximum number of non-executable trading slots allowed per txpool.accountqueue value account (default: 64)
-- maximum number of non-executable transactions for all txpool.globalqueue value accounts (default: 1024)
-- maximum enlistment time for txpool.lifetime value non-executable transactions (default: 3 hours)
API and console options:
-- rpc enables HTTP-RPC server
-- rpcaddr value HTTP-RPC server interface address (default: "localhost")
-- rpcport value HTTP-RPC server listening port (default: 8545)
-- rpcapi value is based on API provided by HTTP-RPC interface
-- ws enables WS-RPC server
-- wsaddr value WS-RPC server listens for interface address (default: "localhost")
-- wsport value WS-RPC server listening port (default: 8546)
-- API provided by wsapi value WS-RPC-based interface
-- wsorigins value websockets request allowed source
-- ipcdisable disables IPC-RPC server
-- ipcpath the name of the IPC socket/pipe file contained in datadir (the escaped explicit path)
-- rpccorsdomain value allows a comma-separated list of domain names for cross-domain requests (browser mandatory)
-- the root path of the jspath loadScript JavaScript load script (default: ".")
-- exec value executes JavaScript statements (can only be used with console/attach)
-- A comma-delimited list of JavaScript files preloaded by preload value into the console
Network options:
-- bootnodes value enode urls (comma separated) for P2P discovery boot (v4+v5 instead of light servers)
-- bootnodesv4 value enode urls (comma separated) for P2P v4 discovery boot (light server, full node)
-- bootnodesv5 value enode urls (comma separated) for P2P v5 discovery boot (light server, light node)
-- port value Nic listening port (default: 30303)
-- the maximum number of network nodes in maxpeers value (if set to 0, the network will be disabled) (default: 25)
-- the maximum number of connections attempted by maxpendpeers value (if set to 0, the default value will be used) (default: 0)
-- nat value NAT port mapping mechanism (any | none | upnp | pmp | extip:) (default: "any")
-- nodiscover disables node discovery mechanism (manually add nodes)
-- v5disc enables experimental RLPx V5 (Topic Discovery) mechanism
-- nodekey value P2P node key file
-- nodekeyhex value hexadecimal P2P node key (for testing)
12. Truffle is a set of development framework for Solidity language based on Ethernet Square. He can be used to develop decentralized applications (Dapps)
13. Testrpc is an ethernet environment simulated in memory locally, which is more convenient and quick for development and debugging. When the contract has passed the test in testrpc, it will be deployed to geth. Unlike geth,geth, testrpc is a real etheric place environment.
14. Hash concept:
Hash algorithm is a kind of encryption algorithm, which transforms input of arbitrary length into output algorithm of fixed hash length through hash function. This kind of algorithm is public and is an one-way cryptosystem, that is, an irreversible mapping from plaintext to ciphertext, with only encryption process and no decryption process.
For example, MD5 and SHA-1 can be said to be the most widely used Hash algorithms.
It has five characteristics: (1) easy to calculate, easy to calculate for any given input; (2) easy to compress, with fixed input and output length; (3) unidirectional, no reversible algorithm to decrypt; (4) input sensitivity, any small change will cause a great change in output; (5) collision resistance, it is difficult to find hash pairs with different input and output results.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.