SlideShare a Scribd company logo
1 of 20
Blockchain Types Architecture
Sk mohamed kasim
Core Components of Blockchain
Architecture: How Does It Work
These are the core blockchain architecture components:
● Node - user or computer within the blockchain architecture (each
has an independent copy of the whole blockchain ledger)
● Transaction - smallest building block of a blockchain system
(records, information, etc.) that serves as the purpose of blockchain
● Block - a data structure used for keeping a set of transactions which
is distributed to all nodes in the network
● Chain - a sequence of blocks in a specific order
● Miners - specific nodes which perform the block verification process
before adding anything to the blockchain structure
● Consensus (consensus protocol) - a set of rules and
arrangements to carry out blockchain operations
● Any new record or transaction within the blockchain implies the
building of a new block. Each record is then proven and digitally
signed to ensure its genuineness. Before this block is added to the
network, it should be verified by the majority of nodes in the system.
blockchain sequence diagram
● Each blockchain block consists of:
○ certain data
○ the hash of the block
○ the hash from the previous block
Key Characteristics of
Blockchain Architecture
● Blockchain architecture possesses a lot of benefits for businesses. Here are
several embedded characteristics:
○ Cryptography - blockchain transactions are validated and trustworthy
due to the complex computations and cryptographic proof among
involved parties
○ Immutability - any records made in a blockchain cannot be changed or
deleted
○ Provenance - refers to the fact that it is possible to track the origin of
every transaction inside the blockchain ledger
○ Decentralization - each member of the blockchain structure has access
to the whole distributed database. As opposed to the central-based
system, consensus algorithm allows for control of the network
○ Anonymity- each blockchain network participant has a generated
address, not user identity. This keeps users' anonymity, especially in a
public blockchain structure
○ Transparency - the blockchain system cannot be corrupted. This is
All blockchain structures fall into three
categories:
● Public blockchain architecture
○ A public blockchain architecture means that the
data and access to the system is available to
anyone who is willing to participate (e.g. Bitcoin,
Ethereum, and Litecoin blockchain systems are
public).
● Private blockchain architecture
○ As opposed to public blockchain architecture, the
private system is controlled only by users from a
specific organization or authorized users who
have an invitation for participation.
● Consortium blockchain architecture
○ This blockchain structure can consist of a few
organizations. In a consortium, procedures are
set up and controlled by the preliminary assigned
Permisionless or Public
Blockchains
● In the case of Bitcoin, mining is done by solving complex mathematical equations which in return validate
the transactions saved on the network – anyone is free to download the bitcoin blockchain and begin
mining operations, in exchange for mining fees and block rewards.
● Additionally, for digital currencies such as Ethereum, the blockchain network also supports smart
contracts, which are automated transactions that self-execute when certain criteria are met. As Ethereum
also employs a permisionless blockchain, anyone can develop and add smart contracts onto the network,
with no limitation imposed by the developers.
characteristics associated with the
permissionless model
● Decentralization:
○ permissionless networks need to be decentralized,
which means that no central entity has the authority to
edit the ledger, shut down the network, or change its
protocols.
○ Many permissionless networks are based on
consensus protocols, which means that network
changes of any type can be achieved as long as 50%
+ 1 of the users agree to it.
● Digital assets:
○ Another characteristic is the presence of a financial
system on the network.
○ Most permissionless networks have some kind of
user-incentivising token, which can grow or fall in
value depending on the relevancy and state of the
blockchain they belong to.
● Anonymity:
○ granted the way blockchains operate, anonymity has become
quite relevant in the industry.
○ Many permissionless networks do not require users to submit
personal information prior to being able to create an address, or
submit transactions.
○ However, in certain cases, personal information is required for
legal purposes.
○ Bitcoin, for instance, does not offer full anonymity, as user
identity is indirectly tied to the addresses they have the private
keys of.
● Transparency:
○ blockchain networks are bound to be transparent by design.
○ This is a required characteristic, given the fact that users who get
involved must be incentivised to trust the network.
○ Therefore, a transparent network needs to freely give users
access to all information apart from the private keys – from
Permissioned or Private
Blockchains
● Permissioned blockchains
○ act as closed ecosystems, where users are not
freely able to join the network, see the recorded
history, or issue transactions of their own.
○ Permissioned blockchains are preferred by
centralized organizations, which leverage the
power of the network for their own, internal
business operations.
○ Company consortiums are also likely to employ
private blockchains to securely record
transactions, and exchange information between
one another.
○ Ripple is one example of a semi-pemissioned
blockchain, run by Ripple Labs.
● private blockchains are run by specific
members of consortiums or companies, and
members need to opt-in for the creation of
such a network.
● Additionally, only approved people or
computer entities have the possibility of
running nodes on the network, validating
transaction blocks, issuing transactions,
executing smart contracts, or reading the
transaction history.
Main characteristics of
permissioned blockchains include:
● Varying decentralization:
○ members of the blockchain network are free to negotiate
and come to a decision concerning the level of
decentralization that the network will have.
○ For private blockchain, it is entirely accepted if they are fully
centralized or partially decentralized.
○ Some form of central control is required, given the fact that
businesses people-managed entities.
○ Additionally, private blockchains are free to choose which
consensus algorithms they wish to employ, yet the
governance model is more important in this scenario, as
power on the network cannot be evenly distributed among
all members.
○ This has led to the creation of level tiers of private
blockchain users, hence allowing individuals to do only
what their job entails them to.
● Transparency & Anonymity:
○ private blockchains are not required to be transparent,
but they can choose to do so freely, depending on the
inner organization of the businesses.
○ In terms of privacy, it isn’t needed on a central level,
and can be individually determined on a user-case
basis.
○ Many private blockchains store an extensive amount
of data relating to the transactions, and operations
carried out by users.
○ Lastly, as there is no internal economy for most
private blockchains, there is no need to see how
monetary tokens are being sent or used.
● Governance:
○ F or permissioned blockchains, governance is decided by members of the business network –
○ there are numerous dynamics which can determine how decisions are made on a central level, yet there is no need for
consensus-based mechanisms, where the entirety of the network must agree to a change.
Algorithms
● Permissionless networks use proof of work
algorithms. This means you only need your
hashing power to build trust. For Proof of
Stake systems, you actually have to own a
certain amount of coins to gain trust.
● Because of this, permissioned networks do
not require a lot of computing power that
makes bitcoin mining extremely power
hungry.
● Proof of Stake networks often uses
consensus algorithms such as Paxos.
Permissioned vs Permissionless
Networks
● With that understanding of decentralised networks, we can now delve into permissioned and permissionless
networks.
● Permissioned Blockchains
○ You can consider permissioned networks as closed or private. This means that only a few people can
access and read the data contained on the blockchain. They may also have different levels of access.
Banks, for example, might need to share some information between themselves while keeping certain
information private. This can include sensitive information such as transaction volumes.
○ In such a network only selected validators verify transactions. A good example is the Ripple network.
There is debate whether networks that do not use proof-of-work algorithms should be considered
blockchains. Some view them simply as shared ledgers.
● Permissionless Blockchains
○ Permissionless networks, on the other hand, have some level of control and can suffer from the
problems of centralised networks.
○ With permissionless networks like bitcoin, anyone can be a validator. Virtually anyone can read the
blockchain and help verify transactions and create smart contracts. They just have to follow the rules
of the network. All you have to do is avail your processing power. Bitcoin has maintained its integrity
for about ten years. That’s mostly because of its decentralised nature. Having no one controlling the
network is a major advantage. Ethereum is another example of a permissionless network although
there are plans to make it a proof-of-stake network.
Advantages of Permissioned and
Permissionless Networks
● Permissioned and permissionless networks
have their own unique strengths.
● As mentioned before, permissioned networks
are strong on privacy because only the actors
can view the transactions. Permissionless
networks are however ideal as a common
shared database.
● One of the major problems facing bitcoin is
scalability. Permissioned networks do not
have this problem as consensus can easily be
built.
● Hybrid networks that bring the best of both
worlds, however, do exist.
Comparison

More Related Content

What's hot

Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technologyRATAN AGARWALA
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondMichael Novak
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithmsAnurag Dashputre
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Edureka!
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Fermat Jade
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology FundamentalsExperfy
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyPalakGulati10
 
Blockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBlockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBohyun Kim
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsJohannes Ahlmann
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain101 Blockchains
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts101 Blockchains
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Edureka!
 

What's hot (20)

Ppt on blockchain technology
Ppt on blockchain technologyPpt on blockchain technology
Ppt on blockchain technology
 
Blockchain in Banking, Business and Beyond
Blockchain in Banking, Business and BeyondBlockchain in Banking, Business and Beyond
Blockchain in Banking, Business and Beyond
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
Blockchain 101 | Blockchain Tutorial | Blockchain Smart Contracts | Blockchai...
 
Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum) Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum)
 
Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?Blockchain Study(1) - What is Blockchain?
Blockchain Study(1) - What is Blockchain?
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
What is quorum Blockchain ?
What is quorum Blockchain ?What is quorum Blockchain ?
What is quorum Blockchain ?
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for LibrariesBlockchain: The New Technology and Its Applications for Libraries
Blockchain: The New Technology and Its Applications for Libraries
 
Blockchain and Banking
Blockchain and BankingBlockchain and Banking
Blockchain and Banking
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts
 
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 

Similar to Blockchain types architecture

Types of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTypes of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTusharVerma933268
 
A Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various TypesA Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various TypesFutureSkills Prime
 
blockchain technology -unit-3-notes.pdf for engineering students
blockchain technology -unit-3-notes.pdf for engineering studentsblockchain technology -unit-3-notes.pdf for engineering students
blockchain technology -unit-3-notes.pdf for engineering studentsimranakhtar83
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainBlockchain Council
 
North Atlanta Blockchain - Hyperledger A Brief Overview
North Atlanta Blockchain -  Hyperledger A Brief OverviewNorth Atlanta Blockchain -  Hyperledger A Brief Overview
North Atlanta Blockchain - Hyperledger A Brief OverviewPrasadh Kannan
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.Rajasekhar364622
 
Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018 Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018 Techracers
 
Blockchain overiew (itc)
Blockchain overiew (itc)Blockchain overiew (itc)
Blockchain overiew (itc)snewell4
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledgersendhilkumarks
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfStephenAmell4
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinM Shamim Iqbal
 
Blockchain-comparisons
Blockchain-comparisonsBlockchain-comparisons
Blockchain-comparisonsSteve Hodgkiss
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxmeena466141
 

Similar to Blockchain types architecture (20)

Types of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdfTypes of Blockchain_ Permissioned & Permissionless.pdf
Types of Blockchain_ Permissioned & Permissionless.pdf
 
Blockchain Basics
Blockchain BasicsBlockchain Basics
Blockchain Basics
 
A Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various TypesA Comprehensive Overview of Blockchain Technology and Its Various Types
A Comprehensive Overview of Blockchain Technology and Its Various Types
 
blockchain technology -unit-3-notes.pdf for engineering students
blockchain technology -unit-3-notes.pdf for engineering studentsblockchain technology -unit-3-notes.pdf for engineering students
blockchain technology -unit-3-notes.pdf for engineering students
 
Advantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchainAdvantages and disadvantages of permissionless blockchain
Advantages and disadvantages of permissionless blockchain
 
North Atlanta Blockchain - Hyperledger A Brief Overview
North Atlanta Blockchain -  Hyperledger A Brief OverviewNorth Atlanta Blockchain -  Hyperledger A Brief Overview
North Atlanta Blockchain - Hyperledger A Brief Overview
 
BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.BLOCK CHAIN technology for the students.
BLOCK CHAIN technology for the students.
 
Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018 Blockchain presentation for Devfest 2018
Blockchain presentation for Devfest 2018
 
Blockchain overiew (itc)
Blockchain overiew (itc)Blockchain overiew (itc)
Blockchain overiew (itc)
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
How to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdfHow to create a permissioned blockchain.pdf
How to create a permissioned blockchain.pdf
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
module-1.pptx
module-1.pptxmodule-1.pptx
module-1.pptx
 
Blockchain (1).pptx
Blockchain (1).pptxBlockchain (1).pptx
Blockchain (1).pptx
 
Blockchain Assignment
Blockchain AssignmentBlockchain Assignment
Blockchain Assignment
 
blockchain
blockchainblockchain
blockchain
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
 
Blockchain-comparisons
Blockchain-comparisonsBlockchain-comparisons
Blockchain-comparisons
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
 

More from SKMohamedKasim

More from SKMohamedKasim (11)

Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
UNIT testing
UNIT testingUNIT testing
UNIT testing
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Handling digital crime scene
Handling digital crime sceneHandling digital crime scene
Handling digital crime scene
 
Mac memory overview
Mac memory overviewMac memory overview
Mac memory overview
 
Java database connecticity steps
Java database connecticity stepsJava database connecticity steps
Java database connecticity steps
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Operating system
Operating systemOperating system
Operating system
 
Mind map of computer science
Mind map of computer scienceMind map of computer science
Mind map of computer science
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Blockchain types architecture

  • 2. Core Components of Blockchain Architecture: How Does It Work These are the core blockchain architecture components: ● Node - user or computer within the blockchain architecture (each has an independent copy of the whole blockchain ledger) ● Transaction - smallest building block of a blockchain system (records, information, etc.) that serves as the purpose of blockchain ● Block - a data structure used for keeping a set of transactions which is distributed to all nodes in the network ● Chain - a sequence of blocks in a specific order ● Miners - specific nodes which perform the block verification process before adding anything to the blockchain structure ● Consensus (consensus protocol) - a set of rules and arrangements to carry out blockchain operations ● Any new record or transaction within the blockchain implies the building of a new block. Each record is then proven and digitally signed to ensure its genuineness. Before this block is added to the network, it should be verified by the majority of nodes in the system.
  • 3.
  • 5. ● Each blockchain block consists of: ○ certain data ○ the hash of the block ○ the hash from the previous block
  • 6. Key Characteristics of Blockchain Architecture ● Blockchain architecture possesses a lot of benefits for businesses. Here are several embedded characteristics: ○ Cryptography - blockchain transactions are validated and trustworthy due to the complex computations and cryptographic proof among involved parties ○ Immutability - any records made in a blockchain cannot be changed or deleted ○ Provenance - refers to the fact that it is possible to track the origin of every transaction inside the blockchain ledger ○ Decentralization - each member of the blockchain structure has access to the whole distributed database. As opposed to the central-based system, consensus algorithm allows for control of the network ○ Anonymity- each blockchain network participant has a generated address, not user identity. This keeps users' anonymity, especially in a public blockchain structure ○ Transparency - the blockchain system cannot be corrupted. This is
  • 7. All blockchain structures fall into three categories: ● Public blockchain architecture ○ A public blockchain architecture means that the data and access to the system is available to anyone who is willing to participate (e.g. Bitcoin, Ethereum, and Litecoin blockchain systems are public). ● Private blockchain architecture ○ As opposed to public blockchain architecture, the private system is controlled only by users from a specific organization or authorized users who have an invitation for participation. ● Consortium blockchain architecture ○ This blockchain structure can consist of a few organizations. In a consortium, procedures are set up and controlled by the preliminary assigned
  • 8. Permisionless or Public Blockchains ● In the case of Bitcoin, mining is done by solving complex mathematical equations which in return validate the transactions saved on the network – anyone is free to download the bitcoin blockchain and begin mining operations, in exchange for mining fees and block rewards.
  • 9. ● Additionally, for digital currencies such as Ethereum, the blockchain network also supports smart contracts, which are automated transactions that self-execute when certain criteria are met. As Ethereum also employs a permisionless blockchain, anyone can develop and add smart contracts onto the network, with no limitation imposed by the developers.
  • 10. characteristics associated with the permissionless model ● Decentralization: ○ permissionless networks need to be decentralized, which means that no central entity has the authority to edit the ledger, shut down the network, or change its protocols. ○ Many permissionless networks are based on consensus protocols, which means that network changes of any type can be achieved as long as 50% + 1 of the users agree to it. ● Digital assets: ○ Another characteristic is the presence of a financial system on the network. ○ Most permissionless networks have some kind of user-incentivising token, which can grow or fall in value depending on the relevancy and state of the blockchain they belong to.
  • 11. ● Anonymity: ○ granted the way blockchains operate, anonymity has become quite relevant in the industry. ○ Many permissionless networks do not require users to submit personal information prior to being able to create an address, or submit transactions. ○ However, in certain cases, personal information is required for legal purposes. ○ Bitcoin, for instance, does not offer full anonymity, as user identity is indirectly tied to the addresses they have the private keys of. ● Transparency: ○ blockchain networks are bound to be transparent by design. ○ This is a required characteristic, given the fact that users who get involved must be incentivised to trust the network. ○ Therefore, a transparent network needs to freely give users access to all information apart from the private keys – from
  • 12. Permissioned or Private Blockchains ● Permissioned blockchains ○ act as closed ecosystems, where users are not freely able to join the network, see the recorded history, or issue transactions of their own. ○ Permissioned blockchains are preferred by centralized organizations, which leverage the power of the network for their own, internal business operations. ○ Company consortiums are also likely to employ private blockchains to securely record transactions, and exchange information between one another. ○ Ripple is one example of a semi-pemissioned blockchain, run by Ripple Labs.
  • 13. ● private blockchains are run by specific members of consortiums or companies, and members need to opt-in for the creation of such a network. ● Additionally, only approved people or computer entities have the possibility of running nodes on the network, validating transaction blocks, issuing transactions, executing smart contracts, or reading the transaction history.
  • 14. Main characteristics of permissioned blockchains include: ● Varying decentralization: ○ members of the blockchain network are free to negotiate and come to a decision concerning the level of decentralization that the network will have. ○ For private blockchain, it is entirely accepted if they are fully centralized or partially decentralized. ○ Some form of central control is required, given the fact that businesses people-managed entities. ○ Additionally, private blockchains are free to choose which consensus algorithms they wish to employ, yet the governance model is more important in this scenario, as power on the network cannot be evenly distributed among all members. ○ This has led to the creation of level tiers of private blockchain users, hence allowing individuals to do only what their job entails them to.
  • 15. ● Transparency & Anonymity: ○ private blockchains are not required to be transparent, but they can choose to do so freely, depending on the inner organization of the businesses. ○ In terms of privacy, it isn’t needed on a central level, and can be individually determined on a user-case basis. ○ Many private blockchains store an extensive amount of data relating to the transactions, and operations carried out by users. ○ Lastly, as there is no internal economy for most private blockchains, there is no need to see how monetary tokens are being sent or used.
  • 16. ● Governance: ○ F or permissioned blockchains, governance is decided by members of the business network – ○ there are numerous dynamics which can determine how decisions are made on a central level, yet there is no need for consensus-based mechanisms, where the entirety of the network must agree to a change.
  • 17. Algorithms ● Permissionless networks use proof of work algorithms. This means you only need your hashing power to build trust. For Proof of Stake systems, you actually have to own a certain amount of coins to gain trust. ● Because of this, permissioned networks do not require a lot of computing power that makes bitcoin mining extremely power hungry. ● Proof of Stake networks often uses consensus algorithms such as Paxos.
  • 18. Permissioned vs Permissionless Networks ● With that understanding of decentralised networks, we can now delve into permissioned and permissionless networks. ● Permissioned Blockchains ○ You can consider permissioned networks as closed or private. This means that only a few people can access and read the data contained on the blockchain. They may also have different levels of access. Banks, for example, might need to share some information between themselves while keeping certain information private. This can include sensitive information such as transaction volumes. ○ In such a network only selected validators verify transactions. A good example is the Ripple network. There is debate whether networks that do not use proof-of-work algorithms should be considered blockchains. Some view them simply as shared ledgers. ● Permissionless Blockchains ○ Permissionless networks, on the other hand, have some level of control and can suffer from the problems of centralised networks. ○ With permissionless networks like bitcoin, anyone can be a validator. Virtually anyone can read the blockchain and help verify transactions and create smart contracts. They just have to follow the rules of the network. All you have to do is avail your processing power. Bitcoin has maintained its integrity for about ten years. That’s mostly because of its decentralised nature. Having no one controlling the network is a major advantage. Ethereum is another example of a permissionless network although there are plans to make it a proof-of-stake network.
  • 19. Advantages of Permissioned and Permissionless Networks ● Permissioned and permissionless networks have their own unique strengths. ● As mentioned before, permissioned networks are strong on privacy because only the actors can view the transactions. Permissionless networks are however ideal as a common shared database. ● One of the major problems facing bitcoin is scalability. Permissioned networks do not have this problem as consensus can easily be built. ● Hybrid networks that bring the best of both worlds, however, do exist.

Editor's Notes

  1. Anonymity – theyriyatha