SlideShare a Scribd company logo
1 of 14
Donald Thibeau, Director of Product Mangement
donald@hedera.com
Xin Li, Senior Software Engineer
xin.li@swirlds.com
HEDERA
GOVERNING
COUNCIL
NETWORK
SERVICES
CRYPTOCURRENCY SMART
CONTRACTS
FILE
SERVICE
CONSENSUS
SERVICE
HASHGRAPH CONSENSUS
HEDERA MAINNET & MIRROR NODES
END USERS 3RD PARTY APPLICATIONS
LEGALGAMING LOGISTICSCOMMUNICATIONS PRIVATE DLT
MEDIAHEALTHREAL ESTATE SOCIAL CAUSESFINANCIAL
Individuals
Enterprises
Devices
Governments
Public vs. Private
Advantage Disadvantage
Private
• Privacy configuration
• Governance
• Centralization
• Scale
• Vendor lock in
Public
• Decentralization • Performance
• Anonymity
• Regulatory concerns
The Hedera Consensus Service
Hedera: Providing decentralization of a public network with privacy
and compliance controls of a private network.
PRIVACY
FINALITY
TRUST
AVAILABILITY
HEDERA
CONSENSUS
PRIVATE NETWORK PRIVATE NETWORK
CUSTOMIZATION
DATA ENCRYPTION
PERFORMANCE
IDENTITYMANAGEMENT
Encrypted
transaction
Transaction
timestamp
Pluggable Consensus with HCS
Hedera Consensus Service provides auditable
log of transaction for distinct tokens.
Permissioned networks now share a single
consensus engine, enabling:
• Custom data access and encryption
• Custom token definitions
• Verifiable timestamps
• Decentralized, shared service
• Finality of transaction order
• High performance
Hedera supports integrations between the
Hedera Consensus Service, Hyperledger Fabric,
and R3’s Corda
Hedera mainnet
Hedera mirrornet
• Message
• TopicID
• Submitting Account
Hedera
HCS Message Submission
Hedera mainnet
Hedera mirrornet
• Consensus Timestamp
• Sequence Number
• Running Hash
Hedera
HCS Message Response
A quick refresher on Hyperledger Fabric
• Fabric Network
• Peer
• Orderer
• Certificate Authority
• Chaincode
• Channel
Lifecycle of a transaction
1
Transaction proposed to
Fabric peer
2
Client application
broadcast transaction to
orderer
Client
Fabric peer
Fabric orderer
HCS plug-in
Consensus nodes
Mirror nodes
Hedera Hashgraph
Lifecycle of a transaction
3
Transaction fragmented
into messages,
associated with topicID
4
Messages submitted to
topic using HCS
Client
Fabric peer
Fabric orderer
HCS plug-in
Hedera Hashgraph
Consensus nodes
Mirror nodes
Lifecycle of a transaction
5
Event reaches
consensus,
receiving
consensus
timestamp and
state proof
Client
Fabric peer
Fabric orderer
HCS plug-in
Hedera Hashgraph
Consensus nodes
Mirror nodes
Lifecycle of a transaction
6 Notify of message order
Client
Fabric peer
Fabric orderer
HCS plug-in
Consensus nodes
Mirror nodes
Hedera Hashgraph
Lifecycle of a transaction
Client
Fabric peer
Fabric orderer
HCS plug-in
Consensus nodes
Mirror nodes
7
Transaction
reassembled,
put in block
8
Ordered
transactions
given to peers
9
Endorsed
responses
collected
Hedera Hashgraph
HCS-based Orderer
Orderer
Hedera SDK
Common
HCS Plug-in
Config handling Channel mgmt
Common txn
handling
Block cutter
AtomicBroadcast
Config
handling
Channel
mgmt
Txn handling
Consenter Chain
Broadcast transaction to orderer Deliver ordered blocks
Notify of consensus messages from
mirror node
Submit messages to mainnet

More Related Content

What's hot

DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020 DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020 MazeBolt Technologies
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Floyd DCosta
 
Data transformation in the oil and gas industry
Data transformation in the oil and gas industryData transformation in the oil and gas industry
Data transformation in the oil and gas industryI AM Consulting
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
Block chain technology a myriad of possibilities
Block chain technology   a myriad of possibilitiesBlock chain technology   a myriad of possibilities
Block chain technology a myriad of possibilitiesRamanujam Vangipuram
 
Discover the power of blockchain with r3 corda platform
Discover the power of blockchain with r3 corda platformDiscover the power of blockchain with r3 corda platform
Discover the power of blockchain with r3 corda platformI AM Consulting
 
How Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the FutureHow Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the FutureDamco Solutions
 
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?Colleen Beck-Domanico
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Dana Gardner
 
Blockchain Use Cases For Telecom Industry
Blockchain Use Cases For Telecom IndustryBlockchain Use Cases For Telecom Industry
Blockchain Use Cases For Telecom IndustryBlockchain Council
 
Advanced Blockchain AG - Shareholder Meeting August 16, 2018
Advanced Blockchain AG - Shareholder Meeting August 16, 2018Advanced Blockchain AG - Shareholder Meeting August 16, 2018
Advanced Blockchain AG - Shareholder Meeting August 16, 2018🌍 Norbert Gehrke
 
Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Chuck Bair
 

What's hot (20)

DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020 DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
DDoS Effects On Enterprises 2020 | Industries affected by DDoS Attacks in 2020
 
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
 
Data transformation in the oil and gas industry
Data transformation in the oil and gas industryData transformation in the oil and gas industry
Data transformation in the oil and gas industry
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Block chain technology a myriad of possibilities
Block chain technology   a myriad of possibilitiesBlock chain technology   a myriad of possibilities
Block chain technology a myriad of possibilities
 
Discover the power of blockchain with r3 corda platform
Discover the power of blockchain with r3 corda platformDiscover the power of blockchain with r3 corda platform
Discover the power of blockchain with r3 corda platform
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
TGC12 e book
TGC12 e bookTGC12 e book
TGC12 e book
 
How Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the FutureHow Blockchain App Development is Paving the Way for the Future
How Blockchain App Development is Paving the Way for the Future
 
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
 
What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?What is Blockchain and How Can It Change the Game for Financial Institutions?
What is Blockchain and How Can It Change the Game for Financial Institutions?
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
Data Sovereignty, Security, and Performance Panacea: Why Mastercard Sets the ...
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Blockchain Use Cases For Telecom Industry
Blockchain Use Cases For Telecom IndustryBlockchain Use Cases For Telecom Industry
Blockchain Use Cases For Telecom Industry
 
Digital signature
Digital signatureDigital signature
Digital signature
 
The state of uma 2014 11-03
The state of uma 2014 11-03The state of uma 2014 11-03
The state of uma 2014 11-03
 
Advanced Blockchain AG - Shareholder Meeting August 16, 2018
Advanced Blockchain AG - Shareholder Meeting August 16, 2018Advanced Blockchain AG - Shareholder Meeting August 16, 2018
Advanced Blockchain AG - Shareholder Meeting August 16, 2018
 
Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?Distributed Ledger Technologies; What's up with all these blockchains?
Distributed Ledger Technologies; What's up with all these blockchains?
 

Similar to Using the Hedera Consensus Service with Hyperledger Fabric

Hyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesHyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesMobiloitte Technologies
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Modelsdrummondreed
 
DDI Market Major Manufacturers.pdf
DDI Market Major Manufacturers.pdfDDI Market Major Manufacturers.pdf
DDI Market Major Manufacturers.pdfrohitsohel
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualChris_Robilliard
 
Integrating Blockchain Technology into Mobile DApps.pptx
Integrating Blockchain Technology into Mobile DApps.pptxIntegrating Blockchain Technology into Mobile DApps.pptx
Integrating Blockchain Technology into Mobile DApps.pptxTamannaGarg29
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyNexusguard
 
Nadicent_Cloud_Brochure
Nadicent_Cloud_BrochureNadicent_Cloud_Brochure
Nadicent_Cloud_BrochureTed Hartlett
 
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...UK Government Digital Service
 
Hyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesHyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesMobiloitte Technologies
 
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...Associazione Digital Days
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudDataStax
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
The Power of Blockchain: Unveiling Cryptocurrencies' Backbone
The Power of Blockchain: Unveiling Cryptocurrencies' BackboneThe Power of Blockchain: Unveiling Cryptocurrencies' Backbone
The Power of Blockchain: Unveiling Cryptocurrencies' BackboneRenan Batista Silva
 
Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)Capital Numbers
 
How Respect Network Will Make VRM Work
How Respect Network Will Make VRM WorkHow Respect Network Will Make VRM Work
How Respect Network Will Make VRM Workdrummondreed
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Where the Rubber Hits the Road: Real World Cloud Computing Implementations
Where the Rubber Hits the Road: Real World Cloud Computing ImplementationsWhere the Rubber Hits the Road: Real World Cloud Computing Implementations
Where the Rubber Hits the Road: Real World Cloud Computing ImplementationsRuthMorton
 

Similar to Using the Hedera Consensus Service with Hyperledger Fabric (20)

Hyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesHyperledger Blockchain Development Services
Hyperledger Blockchain Development Services
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
 
DDI Market Major Manufacturers.pdf
DDI Market Major Manufacturers.pdfDDI Market Major Manufacturers.pdf
DDI Market Major Manufacturers.pdf
 
Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
 
Integrating Blockchain Technology into Mobile DApps.pptx
Integrating Blockchain Technology into Mobile DApps.pptxIntegrating Blockchain Technology into Mobile DApps.pptx
Integrating Blockchain Technology into Mobile DApps.pptx
 
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense StrategyBKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
BKNIX Peering Forum 2017 : DDoS Attack Trend and Defense Strategy
 
Nadicent_Cloud_Brochure
Nadicent_Cloud_BrochureNadicent_Cloud_Brochure
Nadicent_Cloud_Brochure
 
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
SPRINT 13 Workshop 3 Assuring identity in a digital environment Amanda Derric...
 
Hyperledger Blockchain Development Services
Hyperledger Blockchain Development ServicesHyperledger Blockchain Development Services
Hyperledger Blockchain Development Services
 
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
TDD 2022 - Federica Guelfi - DNV - How Blockchain can build trust in the risi...
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
Blockhain Ecosystem Development
Blockhain Ecosystem DevelopmentBlockhain Ecosystem Development
Blockhain Ecosystem Development
 
The Power of Blockchain: Unveiling Cryptocurrencies' Backbone
The Power of Blockchain: Unveiling Cryptocurrencies' BackboneThe Power of Blockchain: Unveiling Cryptocurrencies' Backbone
The Power of Blockchain: Unveiling Cryptocurrencies' Backbone
 
Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)Understanding the Basics of Decentralized Applications (dApps)
Understanding the Basics of Decentralized Applications (dApps)
 
How Respect Network Will Make VRM Work
How Respect Network Will Make VRM WorkHow Respect Network Will Make VRM Work
How Respect Network Will Make VRM Work
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Where the Rubber Hits the Road: Real World Cloud Computing Implementations
Where the Rubber Hits the Road: Real World Cloud Computing ImplementationsWhere the Rubber Hits the Road: Real World Cloud Computing Implementations
Where the Rubber Hits the Road: Real World Cloud Computing Implementations
 
DApps Development Company
DApps Development CompanyDApps Development Company
DApps Development Company
 

More from Hedera Hashgraph

Hedera Hashgraph - Back to the Basics
Hedera Hashgraph -  Back to the BasicsHedera Hashgraph -  Back to the Basics
Hedera Hashgraph - Back to the BasicsHedera Hashgraph
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionHedera Hashgraph
 
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...Hedera Hashgraph
 
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetupHedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetupHedera Hashgraph
 
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency APIWebinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency APIHedera Hashgraph
 
Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18Hedera Hashgraph
 
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18Hedera Hashgraph
 
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18Hedera Hashgraph
 
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18Hedera Hashgraph
 
Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18Hedera Hashgraph
 
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18Hedera Hashgraph
 
Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18Hedera Hashgraph
 
Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18Hedera Hashgraph
 
Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18Hedera Hashgraph
 
Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18Hedera Hashgraph
 
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18Hedera Hashgraph
 
The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18Hedera Hashgraph
 
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18Hedera Hashgraph
 

More from Hedera Hashgraph (18)

Hedera Hashgraph - Back to the Basics
Hedera Hashgraph -  Back to the BasicsHedera Hashgraph -  Back to the Basics
Hedera Hashgraph - Back to the Basics
 
Quantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief IntroductionQuantum Computing & Cryptography: A Brief Introduction
Quantum Computing & Cryptography: A Brief Introduction
 
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
 
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetupHedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
 
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency APIWebinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
 
Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18
 
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
 
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
 
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
 
Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18
 
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
 
Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18
 
Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18
 
Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18
 
Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18
 
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
 
The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18
 
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Using the Hedera Consensus Service with Hyperledger Fabric

  • 1. Donald Thibeau, Director of Product Mangement donald@hedera.com Xin Li, Senior Software Engineer xin.li@swirlds.com
  • 2. HEDERA GOVERNING COUNCIL NETWORK SERVICES CRYPTOCURRENCY SMART CONTRACTS FILE SERVICE CONSENSUS SERVICE HASHGRAPH CONSENSUS HEDERA MAINNET & MIRROR NODES END USERS 3RD PARTY APPLICATIONS LEGALGAMING LOGISTICSCOMMUNICATIONS PRIVATE DLT MEDIAHEALTHREAL ESTATE SOCIAL CAUSESFINANCIAL Individuals Enterprises Devices Governments
  • 3. Public vs. Private Advantage Disadvantage Private • Privacy configuration • Governance • Centralization • Scale • Vendor lock in Public • Decentralization • Performance • Anonymity • Regulatory concerns
  • 4. The Hedera Consensus Service Hedera: Providing decentralization of a public network with privacy and compliance controls of a private network.
  • 5. PRIVACY FINALITY TRUST AVAILABILITY HEDERA CONSENSUS PRIVATE NETWORK PRIVATE NETWORK CUSTOMIZATION DATA ENCRYPTION PERFORMANCE IDENTITYMANAGEMENT Encrypted transaction Transaction timestamp Pluggable Consensus with HCS Hedera Consensus Service provides auditable log of transaction for distinct tokens. Permissioned networks now share a single consensus engine, enabling: • Custom data access and encryption • Custom token definitions • Verifiable timestamps • Decentralized, shared service • Finality of transaction order • High performance Hedera supports integrations between the Hedera Consensus Service, Hyperledger Fabric, and R3’s Corda
  • 6. Hedera mainnet Hedera mirrornet • Message • TopicID • Submitting Account Hedera HCS Message Submission
  • 7. Hedera mainnet Hedera mirrornet • Consensus Timestamp • Sequence Number • Running Hash Hedera HCS Message Response
  • 8. A quick refresher on Hyperledger Fabric • Fabric Network • Peer • Orderer • Certificate Authority • Chaincode • Channel
  • 9. Lifecycle of a transaction 1 Transaction proposed to Fabric peer 2 Client application broadcast transaction to orderer Client Fabric peer Fabric orderer HCS plug-in Consensus nodes Mirror nodes Hedera Hashgraph
  • 10. Lifecycle of a transaction 3 Transaction fragmented into messages, associated with topicID 4 Messages submitted to topic using HCS Client Fabric peer Fabric orderer HCS plug-in Hedera Hashgraph Consensus nodes Mirror nodes
  • 11. Lifecycle of a transaction 5 Event reaches consensus, receiving consensus timestamp and state proof Client Fabric peer Fabric orderer HCS plug-in Hedera Hashgraph Consensus nodes Mirror nodes
  • 12. Lifecycle of a transaction 6 Notify of message order Client Fabric peer Fabric orderer HCS plug-in Consensus nodes Mirror nodes Hedera Hashgraph
  • 13. Lifecycle of a transaction Client Fabric peer Fabric orderer HCS plug-in Consensus nodes Mirror nodes 7 Transaction reassembled, put in block 8 Ordered transactions given to peers 9 Endorsed responses collected Hedera Hashgraph
  • 14. HCS-based Orderer Orderer Hedera SDK Common HCS Plug-in Config handling Channel mgmt Common txn handling Block cutter AtomicBroadcast Config handling Channel mgmt Txn handling Consenter Chain Broadcast transaction to orderer Deliver ordered blocks Notify of consensus messages from mirror node Submit messages to mainnet

Editor's Notes

  1. Hey good afternoon everybody! I’m excited to talk to you all today about Hedera Hashgraph — we’re an enterprise-grade public network for decentralized applications.
  2. In September of 2019, Hedera launched it global public network – the mainnet. A network that everyone in the world can leverage. A public ledger where the nodes operate at the highest known level of trust - – Asynchronous Byzantine Fault Tolerence – or ABFT for short. Attack resistant and able to come to consensus independently in a matter of seconds. Since the launch of the network - anyone anywhere has been able to create accounts and build decentralized applications. CLICK Importantly, unlike other networks, Hedera does not store state. Data does not reside on the network for more than a few minutes. Therefore Hedera - and several third parties – have launched mirror nodes so that transaction history can be managed. While Mirror nodes do not participate in consensus, mirror nodes can provide a public record of transactions and the state. In addition, mirror nodes offer flexibility for the owner to choose what to store and for how long. So the mirror node is a means for storing and retrieving transaction history long after the record has ceased to exist on the Hedera mainnet. CLICK And finally we have the concept of an application network – or appnet for short. An appnet is simply software that is executed collectively across Hedera’s global public network. These applications interact in order to achieve a specific common goal or task – settlement between airlines for example, or payments between two organizations or individuals. Importantly, the party’s that interact do not need to trust one another as they inherit the trust from Hedera. Trust in the order of transactions, the time they happen and proof that they occurred.
  3. In September of 2019, Hedera launched it global public network – the mainnet. A network that everyone in the world can leverage. A public ledger where the nodes operate at the highest known level of trust - – Asynchronous Byzantine Fault Tolerence – or ABFT for short. Attack resistant and able to come to consensus independently in a matter of seconds. Since the launch of the network - anyone anywhere has been able to create accounts and build decentralized applications. CLICK Importantly, unlike other networks, Hedera does not store state. Data does not reside on the network for more than a few minutes. Therefore Hedera - and several third parties – have launched mirror nodes so that transaction history can be managed. While Mirror nodes do not participate in consensus, mirror nodes can provide a public record of transactions and the state. In addition, mirror nodes offer flexibility for the owner to choose what to store and for how long. So the mirror node is a means for storing and retrieving transaction history long after the record has ceased to exist on the Hedera mainnet. CLICK And finally we have the concept of an application network – or appnet for short. An appnet is simply software that is executed collectively across Hedera’s global public network. These applications interact in order to achieve a specific common goal or task – settlement between airlines for example, or payments between two organizations or individuals. Importantly, the party’s that interact do not need to trust one another as they inherit the trust from Hedera. Trust in the order of transactions, the time they happen and proof that they occurred.