Beruflich Dokumente
Kultur Dokumente
Submitted By:
Nitin Kumar
297/CO/14
COE-II
In order to add these blocks to the distributed ledger, the data needs to be
validated by 51% of all the computers within the network that have
access to the Blockchain. The validation is done via cryptography,
which means that a mathematical equation has to be solved. Solving the
mathematical equation is difficult and requires a lot of computing power.
However, once it is solved it is immediately clear that the answer is
correct. This can be compared to a crossword puzzle, which can be very
difficult to solve, but once completed you immediately know that it is
done correctly.
Once the validation is done, the Block will receive a timestamp and a so-
called hash. This hash is then used to create the next block in the chain.
If even one bit in the block changes, the hash will change completely
and as a result, all subsequent blocks in the chain will change. Such a
change has to be validated again by 51% of all the nodes in the network,
which will not happen because they don’t have an incentive to work on
To clarify the allegory for our purposes: the ‘generals’ in the story are the
parties participating in the distributed network running the blockchain
(database) in question. The messengers they are sending back and forth
are the means of communication across the network on which the
blockchain is running. The collective goal of the “loyal generals” is to
decide whether or not to accept a piece of information submitted to the
blockchain (database) as valid or not. A valid piece of information would
be, in our allegory, a correct opportunity to decide in favor of attack.
Loyal generals, for their part, are faithful blockchain participants, who
are interested in ensuring the integrity of the blockchain (database) and
therefore ensuring that only correct information is accepted. The
treacherous generals, on the other hand, would be any party seeking to
falsify information on the blockchain (the database). Their potential
motives are myriad — it could be an individual seeking to spend a
BitCoin that she does not actually own or another person who wants to
As the smart contract is stored on every computer in the network, they all
must execute it and get to the same result. This way user can be sure, that
outcome is correct.
Let’s say you want to ship a pallet of goods to your friend Bob.
You trust Bob, but you don’t trust trucker Tom, who will carry your
pallet. On the other hand, Tom does not trust you as well, maybe you
won’t pay him?
Therefore, you have to sign an agreement with Tom that you will pay for
the shipment in a few days after delivery. Usually third party is involved
in this process, legal papers, contracts are scanned, printed, signed.
Let’s move a little bit forward. What if we would have a GPS tracker
attached to the pallet? Then we simply could eliminate Bob from this
process and just release the payment automatically, when the location
rule is met.
https://en.wikipedia.org/wiki/Nucleus_Software_Exports
https://www.thoughtworks.com/insights/blog/blockchain-under-
hood
https://www.linkedin.com/pulse/consensus-mechanisms-used-
blockchain-ronald-chan/
https://medium.com/blockchain-review/how-does-the-blockchain-
work-for-dummies-explained-simply-9f94d386e093
https://www.coindesk.com/
http://composer-playground.mybluemix.net/
https://hyperledger.github.io/composer/tutorials/playground-
tutorial.html
https://medium.com/startup-grind/gentle-intro-to-blockchain-and-
smart-contracts-part-1-3328afca62ab
https://www.linkedin.com/pulse/what-blockchain-why-so-
important-mark-van-rijmenam/
https://www.investopedia.com/terms/d/doublespending.asp
https://en.wikipedia.org/wiki/Double-spending