SlideShare a Scribd company logo
1 of 21
Download to read offline
Blockchain Technology
Types of Blockchain
Dr. Ramchandra Mangrulkar
Blockchain Types
Public Blockchain
Private Blockchain
Consortium / Federated Blockchain
Hybrid Blockchain
2/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Blockchain Types 1
1. https://blog.blockchainfirm.io/how-blockchain-technology-works/
3/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Public Blockchain / Permissionless Blockchain
4/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Public Blockchain
A public blockchain is the permission-less distributed ledger technology
where anyone can join and do transactions
Non-restrictive version where each peer has a copy of the ledger
The verification of the transactions is done through consensus methods
such as Proof-of-Work(PoW), Proof-of-Stake(PoS), and so on.
If a public blockchain doesn’t have the required peers participating in
solving transactions, then it will become non-functional.
Public Blockchain networks reward their participants for taking part in
the mining process and regulating the flow of the transactions while
simultaneously maintaining the immutability of the ledger.
Examples : Bitcoin, Ethereum, Litecoin, NEO
5/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Advantages of Public Blockchain
Anyone can join the public blockchain.
It brings trust among the whole community of users Everyone feels
incentivized to work towards the betterment of the public network
Public blockchain requires no intermediaries to work.
Public blockchains are also secure depending on the number of
participating nodes
It brings transparency to the whole network as the available data is
available for verification purposes.
6/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Dis-advantages of Public Blockchain
They suffer from a lack of transaction speed. It can take a few minutes to
hours before a transaction is completed. For instance, bitcoin can only
manage seven transactions per second compared to 24,000 transactions
per second done by VISA.
Another problem with public blockchain is scalability. They simply cannot
scale due to how they work. The more nodes join, the clumsier, and slow
the network becomes. There are steps taken to solve the problem. For
example, Bitcoin is working on lighting the network, which takes
transactions off-chain to make the main bitcoin network faster and more
scalable.
The last disadvantage of a public blockchain is the consensus method
choice. Bitcoin, for example, uses Proof-of-Work (PoW), which consumes
a lot of energy. However, this has been partially solved by using more
efficient algorithms such as Proof-of-Stake (PoS).
7/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Use Cases of Public Blockchain
Voting : Governments can do voting through public blockchain employing
transparency and trust.
Fundraising : Companies or initiatives can make use of the public
blockchain for improving transparency and trust.
8/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Private Blockchain / Permissioned Blockchain
9/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Private Blockchain
Private blockchain networks are shared only among the trusted
participants.
The control of a private network lies with the owner.
The rules that a private blockchain abides by can be customized
depending on levels of permissions, exposure, number of participants,
authorization requirements, and a lot more.
Examples : Multichain, Hyperledger Fabric, Hyperledger Sawtooth, Corda
10/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Advantages of Private Blockchain
Private blockchains are fast. This is because there are few participants
compared to the public blockchain.
Private blockchains are more scalable. The scalability is possible because,
in a private blockchain, only a few nodes are authorized to validate
transactions.
11/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Dis-advantages of Private Blockchain
Private blockchains are not truly decentralized. This is one of the biggest
disadvantages of private blockchain and goes against the core philosophy
of distributed ledger technology or blockchain in general.
Achieving trust within the private blockchain is tough because the
centralized nodes make the last call.
As there are only a few nodes here, the security isn’t all that good.
12/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Use Cases of Private Blockchain
Supply chain management : Organizations can deploy a private
blockchain to manage their supply chain.
Asset ownership : Assets can be tracked and verified using a private
blockchain.
Internal Voting : Private blockchain is also effective at internal voting.
13/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Federated Blockchain / Consortium Blockchain
14/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Federated Blockchain / Consortium Blockchain
A creative approach to solving organizations’ needs where there is a need
for both public and private blockchain features.
Consortium blockchains are partially decentralized blockchain networks. a
consortium blockchain is managed by more than one organization. So,
there is no one single force of centralized outcome here.
In a consortium blockchain, some aspects of the organizations are made
public, while others remain private.
To ensure proper functionality, the consortium has a validator node that
can do two functions, validate transactions, and also initiate or receive
transactions. In comparison, the member node can receive or initiate
transactions.
The federated blockchain helps in reducing the transaction costs and
redundancy of data while being faster and offering higher scalability.
Examples of Consortium Blockchain : Marco Polo, Energy Web
Foundation, IBM Food Trust.
15/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Advantages of Federated Blockchain
It offers better customizability and control over resources.
Consortium blockchains are more secure and have better scalability.
It is also more efficient compared to public blockchain networks.
Works with well-defined governance structures.
It offers access controls.
16/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Dis-advantages of Federated Blockchain
Even though it is secure, the whole network can be compromised due to
the member’s integrity.
It is less transparent. Regulations and censorship can have a huge impact
on network functionality.
It is also less anonymous compared to other types of blockchain.
17/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Use Cases of Federated Blockchain
Banking and payments : A group of banks can work together and create
a consortium. They can decide the nodes that will validate transactions.
Research : A consortium blockchain can be used to share research data
and results.
Food tracking : It is also great for food tracking.
18/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Hybrid Blockchain : A Duo Of Public And Private Blockchain
19/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Hybrid Blockchain
Hybrid blockchain is best defined as a combination of a private and
public blockchain. It has use-cases in an organization that neither wants
to deploy a private blockchain nor public blockchain and simply wants to
deploy both worlds’ best.
To be precise, a hybrid blockchain offers controlled access and complete
freedom, both at the same time.
A hybrid blockchain network is not open to all. However, it includes
features such as transparency, integrity, and security.
Hybrid blockchains are totally customizable. The existing members of this
blockchain decide who can participate in the network and who cannot
and also which transactions are made public and which are kept private.
This type of blockchain opens up the door to the best possible way that
an organization can work with its shareholders.
Example of Hybrid Blockchain : Dragonchain, XinFin’s Hybrid blockchain
20/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
Difference between Types of Blockchain
21/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai

More Related Content

Similar to Blockchain#3.pdf

Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology OverviewIRJET Journal
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyIRJET Journal
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfStephenAmell4
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologySyedMahammad1
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyMahammad Syed
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptxJackTheMan1
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyNimmy Solomon
 
Blockchain Technology-1.pptx
Blockchain Technology-1.pptxBlockchain Technology-1.pptx
Blockchain Technology-1.pptxandre241421
 
Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0samossummit
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxtoddr4
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxhealdkathaleen
 
Blockchain-comparisons
Blockchain-comparisonsBlockchain-comparisons
Blockchain-comparisonsSteve Hodgkiss
 
What Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptxWhat Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptxdanishshah40
 
Types of Blockchain Technology (1).pptx
Types of Blockchain Technology (1).pptxTypes of Blockchain Technology (1).pptx
Types of Blockchain Technology (1).pptxVishakha Verma
 
Top Blockchain Trends You Must Check This Year
Top Blockchain Trends You Must Check This YearTop Blockchain Trends You Must Check This Year
Top Blockchain Trends You Must Check This YearInnvonixTechSolution
 
The Three Types of Blockchains
The Three Types of BlockchainsThe Three Types of Blockchains
The Three Types of BlockchainsDucatus Global
 
Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...
Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...
Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...Prolitus Technologies
 

Similar to Blockchain#3.pdf (20)

Blockchain Technology Overview
Blockchain Technology OverviewBlockchain Technology Overview
Blockchain Technology Overview
 
Scaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain TechnologyScaling up Banking Operations: Harnessing the power of block chain Technology
Scaling up Banking Operations: Harnessing the power of block chain Technology
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdf
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain Technology-1.pptx
Blockchain Technology-1.pptxBlockchain Technology-1.pptx
Blockchain Technology-1.pptx
 
Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0Blockchain Technology Developments in Government 3.0
Blockchain Technology Developments in Government 3.0
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
 
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docxRunning Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
Running Head BITCOIN BLOCKCHAIN1BITCOIN BLOCKCHAIN 7.docx
 
Blockchain-comparisons
Blockchain-comparisonsBlockchain-comparisons
Blockchain-comparisons
 
What Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptxWhat Is a Consortium Blockchain.pptx
What Is a Consortium Blockchain.pptx
 
Types of Blockchain Technology (1).pptx
Types of Blockchain Technology (1).pptxTypes of Blockchain Technology (1).pptx
Types of Blockchain Technology (1).pptx
 
Top Blockchain Trends You Must Check This Year
Top Blockchain Trends You Must Check This YearTop Blockchain Trends You Must Check This Year
Top Blockchain Trends You Must Check This Year
 
The Three Types of Blockchains
The Three Types of BlockchainsThe Three Types of Blockchains
The Three Types of Blockchains
 
Technical seminar blockchain.pptx
Technical seminar blockchain.pptxTechnical seminar blockchain.pptx
Technical seminar blockchain.pptx
 
Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...
Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...
Custom Blockchain vs. Public Blockchains Choosing the Right Path for Your Bus...
 

More from Dr. Ramchandra Mangrulkar

Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityDr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part IDr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity ManagementDr. Ramchandra Mangrulkar
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityDr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityDr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

Blockchain#3.pdf

  • 1. Blockchain Technology Types of Blockchain Dr. Ramchandra Mangrulkar
  • 2. Blockchain Types Public Blockchain Private Blockchain Consortium / Federated Blockchain Hybrid Blockchain 2/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 3. Blockchain Types 1 1. https://blog.blockchainfirm.io/how-blockchain-technology-works/ 3/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 4. Public Blockchain / Permissionless Blockchain 4/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 5. Public Blockchain A public blockchain is the permission-less distributed ledger technology where anyone can join and do transactions Non-restrictive version where each peer has a copy of the ledger The verification of the transactions is done through consensus methods such as Proof-of-Work(PoW), Proof-of-Stake(PoS), and so on. If a public blockchain doesn’t have the required peers participating in solving transactions, then it will become non-functional. Public Blockchain networks reward their participants for taking part in the mining process and regulating the flow of the transactions while simultaneously maintaining the immutability of the ledger. Examples : Bitcoin, Ethereum, Litecoin, NEO 5/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 6. Advantages of Public Blockchain Anyone can join the public blockchain. It brings trust among the whole community of users Everyone feels incentivized to work towards the betterment of the public network Public blockchain requires no intermediaries to work. Public blockchains are also secure depending on the number of participating nodes It brings transparency to the whole network as the available data is available for verification purposes. 6/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 7. Dis-advantages of Public Blockchain They suffer from a lack of transaction speed. It can take a few minutes to hours before a transaction is completed. For instance, bitcoin can only manage seven transactions per second compared to 24,000 transactions per second done by VISA. Another problem with public blockchain is scalability. They simply cannot scale due to how they work. The more nodes join, the clumsier, and slow the network becomes. There are steps taken to solve the problem. For example, Bitcoin is working on lighting the network, which takes transactions off-chain to make the main bitcoin network faster and more scalable. The last disadvantage of a public blockchain is the consensus method choice. Bitcoin, for example, uses Proof-of-Work (PoW), which consumes a lot of energy. However, this has been partially solved by using more efficient algorithms such as Proof-of-Stake (PoS). 7/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 8. Use Cases of Public Blockchain Voting : Governments can do voting through public blockchain employing transparency and trust. Fundraising : Companies or initiatives can make use of the public blockchain for improving transparency and trust. 8/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 9. Private Blockchain / Permissioned Blockchain 9/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 10. Private Blockchain Private blockchain networks are shared only among the trusted participants. The control of a private network lies with the owner. The rules that a private blockchain abides by can be customized depending on levels of permissions, exposure, number of participants, authorization requirements, and a lot more. Examples : Multichain, Hyperledger Fabric, Hyperledger Sawtooth, Corda 10/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 11. Advantages of Private Blockchain Private blockchains are fast. This is because there are few participants compared to the public blockchain. Private blockchains are more scalable. The scalability is possible because, in a private blockchain, only a few nodes are authorized to validate transactions. 11/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 12. Dis-advantages of Private Blockchain Private blockchains are not truly decentralized. This is one of the biggest disadvantages of private blockchain and goes against the core philosophy of distributed ledger technology or blockchain in general. Achieving trust within the private blockchain is tough because the centralized nodes make the last call. As there are only a few nodes here, the security isn’t all that good. 12/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 13. Use Cases of Private Blockchain Supply chain management : Organizations can deploy a private blockchain to manage their supply chain. Asset ownership : Assets can be tracked and verified using a private blockchain. Internal Voting : Private blockchain is also effective at internal voting. 13/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 14. Federated Blockchain / Consortium Blockchain 14/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 15. Federated Blockchain / Consortium Blockchain A creative approach to solving organizations’ needs where there is a need for both public and private blockchain features. Consortium blockchains are partially decentralized blockchain networks. a consortium blockchain is managed by more than one organization. So, there is no one single force of centralized outcome here. In a consortium blockchain, some aspects of the organizations are made public, while others remain private. To ensure proper functionality, the consortium has a validator node that can do two functions, validate transactions, and also initiate or receive transactions. In comparison, the member node can receive or initiate transactions. The federated blockchain helps in reducing the transaction costs and redundancy of data while being faster and offering higher scalability. Examples of Consortium Blockchain : Marco Polo, Energy Web Foundation, IBM Food Trust. 15/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 16. Advantages of Federated Blockchain It offers better customizability and control over resources. Consortium blockchains are more secure and have better scalability. It is also more efficient compared to public blockchain networks. Works with well-defined governance structures. It offers access controls. 16/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 17. Dis-advantages of Federated Blockchain Even though it is secure, the whole network can be compromised due to the member’s integrity. It is less transparent. Regulations and censorship can have a huge impact on network functionality. It is also less anonymous compared to other types of blockchain. 17/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 18. Use Cases of Federated Blockchain Banking and payments : A group of banks can work together and create a consortium. They can decide the nodes that will validate transactions. Research : A consortium blockchain can be used to share research data and results. Food tracking : It is also great for food tracking. 18/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 19. Hybrid Blockchain : A Duo Of Public And Private Blockchain 19/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 20. Hybrid Blockchain Hybrid blockchain is best defined as a combination of a private and public blockchain. It has use-cases in an organization that neither wants to deploy a private blockchain nor public blockchain and simply wants to deploy both worlds’ best. To be precise, a hybrid blockchain offers controlled access and complete freedom, both at the same time. A hybrid blockchain network is not open to all. However, it includes features such as transparency, integrity, and security. Hybrid blockchains are totally customizable. The existing members of this blockchain decide who can participate in the network and who cannot and also which transactions are made public and which are kept private. This type of blockchain opens up the door to the best possible way that an organization can work with its shareholders. Example of Hybrid Blockchain : Dragonchain, XinFin’s Hybrid blockchain 20/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai
  • 21. Difference between Types of Blockchain 21/21 30.07.2022 Dr. Ramchandra Mangrulkar DJSCE, Mumbai