SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
Blockchain Technology
Week 10
Unit IV – CAP Theorem, Byzantines General Problem
Ferdin Joe John Joseph, PhD
Faculty of Information Technology
Thai-Nichi Institute of Technology, Bangkok
Venue: D603
Week 10 – Unit IV
Agenda
• CAP Theorem
• Byzantines General Problem
Faculty of Information Technology, Thai-Nichi Institute of
Technology
2
Hyper Encryption Standards
Features
• Symmetrical
• Key length of 57,000 to 200,000 bits
• No delimitation in number system
• Insensitive to factorize
• No semantics in cipher
Faculty of Information Technology, Thai-Nichi Institute of
Technology
4
Visualization
Faculty of Information Technology, Thai-Nichi Institute of
Technology
5
Plain Text DES Chiffre Hyper Encryption
Availability
Faculty of Information Technology, Thai-Nichi Institute of
Technology
6
Highly Confidential
and Patented
Applications
• All applications of Banking
• Defense Technologies
• Telecommunication
• Health
• Plagiarism Protection
• Satellite Communication
Faculty of Information Technology, Thai-Nichi Institute of
Technology
7
CAP Theorem
CAP Theorem
• Also known as Brewer’s Theorem
• Named after Computer Scientist Erik Brewer in 2002
Faculty of Information Technology, Thai-Nichi Institute of
Technology
9
Theorem
• A distributed database can provide any two out of the three
gurantees only among those stated below.
1. Consistency: Every read receives the most recent write or an error
2. Availability: Every request receives a (non-error) response –
without the guarantee that it contains the most recent write
3. Partition tolerance: The system continues to operate despite an
arbitrary number of messages being dropped (or delayed) by the
network between nodes
Faculty of Information Technology, Thai-Nichi Institute of
Technology
10
Faculty of Information Technology, Thai-Nichi Institute of
Technology
11
CAP Expanded
Faculty of Information Technology, Thai-Nichi Institute of
Technology
12
C: Consistency – At any given time, all nodes in the network have
exactly the same (most recent) value.
CAP Expanded
• A: Availability – Every request to the network receives a response,
though without any guarantee that returned data is the most recent.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
13
CAP Expanded
• P: Partition tolerance – The network continues to operate, even if an
arbitrary number of nodes are failing.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
14
CAP Theorem Applied
• Due to the nature of distributed data stores (such as blockchain),
Partition tolerance is a given fact; there will always be
failing/unreachable nodes in the network (not least because of the
unstable nature of the internet). CAP Theorem states that one has to
choose between C (Consistency) or A (Availability) when in the
presence of P (Partition):
Faculty of Information Technology, Thai-Nichi Institute of
Technology
15
Availability + Partition Tolerance
• Every request to the network receives a response, even if the
network cannot guarantee it is up to date due to network partitioning
(failing nodes).
• Choosing Availability over Consistency for a world-wide distributed
system will make it highly available, but its data will be out of date for
99.99% of the time. Furthermore, no-one will be able to guarantee
that the data returned is in fact the most recent.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
16
Availability + Partition Tolerance
Faculty of Information Technology, Thai-Nichi Institute of
Technology
17
Consistency + Partition Tolerance
• The system will return an error or a time-out if particular information
cannot be guaranteed to be up to date due to network partitioning
(failing nodes).
• Choosing Consistency over Availability for a world-wide distributed
system will make it highly accurate, but it will most likely be
unavailable for 99.99% of the time.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
18
Consistency + Partition Tolerance
Faculty of Information Technology, Thai-Nichi Institute of
Technology
19
Does Blockchain Violate CAP Theorem ?
• NO
• Those interested in blockchain, opt for AP (Availability + Partition) +
Strong/Eventual Consistency.
• This doesn’t mean Consistency used to the fullest.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
20
Byzantine Generals Problem
Byzantine General
Faculty of Information Technology, Thai-Nichi Institute of
Technology
22
Byzantine - History
• Byzantine Empire, the eastern half of the Roman Empire, which
survived for a thousand years after the western half had crumbled
into various feudal kingdoms and which finally fell to Ottoman Turkish
onslaughts in 1453.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
23
Scenario
• Imagine that the grand Eastern Roman empire aka Byzantine empire
has decided to capture a city.
• The Byzantine army has completely encircled the city. The army has
many divisions and each division has a general.
• The generals communicate between each as well as between all
lieutenants within their division only through messengers.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
24
Attack Process
Faculty of Information Technology, Thai-Nichi Institute of
Technology
25
Faculty of Information Technology, Thai-Nichi Institute of
Technology
26
Commander
Lieutenant 1 Lieutenant 2
“attack”“attack”
“He said ‘retreat’”
Lieutenant 2 is corrupt and consensus cannot be reached.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
27
Commander
Lieutenant 1 Lieutenant 2
“retreat”“attack”
“He said ‘retreat’”
Commander is corrupt and consensus cannot be reached.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
28
Commander
Lieutenant 1 Lieutenant 2 Lieutenant 3
“attack” “attack” “attack”
“attack” “retreat”
Faculty of Information Technology, Thai-Nichi Institute of
Technology
29
Commander
Lieutenant 1 Lieutenant 2 Lieutenant 3
“attack” “retreat” “not sure”
“attack” “not sure”
“retreat” “retreat”
“attack”
“not sure”
How it applies to Blockchain
• Consensus Mechanism as it follows distributed mechanism
• In blockchain network, there is no commander
• Each node becomes a lieutenant and fall under equal hierarchy
Faculty of Information Technology, Thai-Nichi Institute of
Technology
30
How it applies to Blockchain
• All participating nodes have to agree upon every message that is
transmitted between the nodes.
• If a group of nodes is corrupt or the message that they transmit is
corrupt then still the network as a whole should not be affected by it
and should resist this ‘Attack’.
• In short, the network in its entirety has to agree upon every message
transmitted in the network. This agreement is called as consensus.
Faculty of Information Technology, Thai-Nichi Institute of
Technology
31
Practical Byzantine Fault Tolerance (PBFT)
• Faster
• Handle n Byzantine faults in a system with 3n+1 nodes
Faculty of Information Technology, Thai-Nichi Institute of
Technology
32
PBFT Process
Request Preprepare Prepare Commit Reply
Faculty of Information Technology, Thai-Nichi Institute of
Technology
33
PBFT by example
Faculty of Information Technology, Thai-Nichi Institute of
Technology
34
Client Alpha
Bravo
Delta
Charlie
PBFT REQUEST
Faculty of Information Technology, Thai-Nichi Institute of
Technology
35
Client Alpha
Bravo
Delta
Charlie
PBFT REQUEST
Faculty of Information Technology, Thai-Nichi Institute of
Technology
36
Client Alpha
Bravo
Delta
Charlie
PBFT PRE PREPARE
Faculty of Information Technology, Thai-Nichi Institute of
Technology
37
Client Alpha
Bravo
Delta
Charlie
PBFT PREPARE
Faculty of Information Technology, Thai-Nichi Institute of
Technology
38
Client Alpha
Bravo
Delta
Charlie
PBFT PREPARE
Faculty of Information Technology, Thai-Nichi Institute of
Technology
39
Client Alpha
Bravo
Delta
Charlie
PBFT COMMIT
Faculty of Information Technology, Thai-Nichi Institute of
Technology
40
Client Alpha
Bravo
Delta
Charlie
PBFT REPLY
Faculty of Information Technology, Thai-Nichi Institute of
Technology
41
Client Alpha
Bravo
Delta
Charlie
PBFT
Request Preprepare Prepare Commit Reply
Faculty of Information Technology, Thai-Nichi Institute of
Technology
42
Client
Alpha
Bravo
Delta
Charlie
PBFT
Request Preprepare Prepare Commit Reply
Faculty of Information Technology, Thai-Nichi Institute of
Technology
43
Client
Alpha
Bravo
Delta
Charlie
PBFT
Request Preprepare Prepare Commit Reply
Faculty of Information Technology, Thai-Nichi Institute of
Technology
44
Client
Alpha
Bravo
Delta
Charlie
PBFT
Request Preprepare Prepare Commit Reply
Faculty of Information Technology, Thai-Nichi Institute of
Technology
45
Client
Alpha
Bravo
Delta
Charlie
PBFT
Request Preprepare Prepare Commit Reply
Faculty of Information Technology, Thai-Nichi Institute of
Technology
46
Client
Alpha
Bravo
Delta
Charlie
Next Week
• Peer to Peer Networking
• Distributed Computing
Faculty of Information Technology, Thai-Nichi Institute of
Technology
47

Contenu connexe

Tendances

Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain Technology - Week 4 - Hyperledger and Smart ContractsBlockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain Technology - Week 4 - Hyperledger and Smart ContractsFerdin Joe John Joseph PhD
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainFerdin Joe John Joseph PhD
 
Blockchain Technology - Week 3 - FinTech and Cryptocurrencies
Blockchain Technology - Week 3 - FinTech and CryptocurrenciesBlockchain Technology - Week 3 - FinTech and Cryptocurrencies
Blockchain Technology - Week 3 - FinTech and CryptocurrenciesFerdin Joe John Joseph PhD
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsSaad Zaher
 
Week 2: Virtualization and VM Ware - DSA 441 Cloud Computing
Week 2: Virtualization and VM Ware - DSA 441 Cloud ComputingWeek 2: Virtualization and VM Ware - DSA 441 Cloud Computing
Week 2: Virtualization and VM Ware - DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Bitcoin Addresses
Bitcoin AddressesBitcoin Addresses
Bitcoin Addressesashmoran
 
zkSync v2.0 for builders.pptx
zkSync v2.0 for builders.pptxzkSync v2.0 for builders.pptx
zkSync v2.0 for builders.pptxMarta Encode
 

Tendances (20)

Programming for Data Analysis: Week 3
Programming for Data Analysis: Week 3Programming for Data Analysis: Week 3
Programming for Data Analysis: Week 3
 
Week 10: Programming for Data Analysis
Week 10: Programming for Data AnalysisWeek 10: Programming for Data Analysis
Week 10: Programming for Data Analysis
 
Week 8: Programming for Data Analysis
Week 8: Programming for Data AnalysisWeek 8: Programming for Data Analysis
Week 8: Programming for Data Analysis
 
Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain Technology - Week 4 - Hyperledger and Smart ContractsBlockchain Technology - Week 4 - Hyperledger and Smart Contracts
Blockchain Technology - Week 4 - Hyperledger and Smart Contracts
 
Week 9: Programming for Data Analysis
Week 9: Programming for Data AnalysisWeek 9: Programming for Data Analysis
Week 9: Programming for Data Analysis
 
Data Wrangling Week 4
Data Wrangling Week 4Data Wrangling Week 4
Data Wrangling Week 4
 
Programming for Data Analysis: Week 4
Programming for Data Analysis: Week 4Programming for Data Analysis: Week 4
Programming for Data Analysis: Week 4
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Blockchain Technology - Week 3 - FinTech and Cryptocurrencies
Blockchain Technology - Week 3 - FinTech and CryptocurrenciesBlockchain Technology - Week 3 - FinTech and Cryptocurrencies
Blockchain Technology - Week 3 - FinTech and Cryptocurrencies
 
Data wrangling week 10
Data wrangling week 10Data wrangling week 10
Data wrangling week 10
 
Data wrangling week 6
Data wrangling week 6Data wrangling week 6
Data wrangling week 6
 
Data wrangling week3
Data wrangling week3Data wrangling week3
Data wrangling week3
 
Data wrangling week2
Data wrangling week2Data wrangling week2
Data wrangling week2
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
Introduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart ContractsIntroduction to Blockchain and Smart Contracts
Introduction to Blockchain and Smart Contracts
 
Week 2: Virtualization and VM Ware - DSA 441 Cloud Computing
Week 2: Virtualization and VM Ware - DSA 441 Cloud ComputingWeek 2: Virtualization and VM Ware - DSA 441 Cloud Computing
Week 2: Virtualization and VM Ware - DSA 441 Cloud Computing
 
Bitcoin Addresses
Bitcoin AddressesBitcoin Addresses
Bitcoin Addresses
 
Blockchain .pptx
Blockchain .pptxBlockchain .pptx
Blockchain .pptx
 
zkSync v2.0 for builders.pptx
zkSync v2.0 for builders.pptxzkSync v2.0 for builders.pptx
zkSync v2.0 for builders.pptx
 
Blockchain Security
Blockchain SecurityBlockchain Security
Blockchain Security
 

Similaire à Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem

1 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_108881 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_10888Venkat Motamarri
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxtaruian
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Nasir Bhutta
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)80094859
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and StandardsJeffrey Des Binwag
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questionsTaleManju
 
PCCOER_Blockchain_FoP_Jan23.pptx
PCCOER_Blockchain_FoP_Jan23.pptxPCCOER_Blockchain_FoP_Jan23.pptx
PCCOER_Blockchain_FoP_Jan23.pptxSonaliPatil325517
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 

Similaire à Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem (20)

1 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_108881 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_10888
 
Newbies Approach to Blockchain Technology
Newbies Approach to Blockchain TechnologyNewbies Approach to Blockchain Technology
Newbies Approach to Blockchain Technology
 
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxIntroduction to IoT (Basics of Networking & Emergence of IoT).pptx
Introduction to IoT (Basics of Networking & Emergence of IoT).pptx
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)Ocd lec networks_10-11 (1)
Ocd lec networks_10-11 (1)
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
WEEK-01.pdf
WEEK-01.pdfWEEK-01.pdf
WEEK-01.pdf
 
Network Chap1
Network Chap1Network Chap1
Network Chap1
 
Telecom
TelecomTelecom
Telecom
 
Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
Deep Learning and CNN Architectures
Deep Learning and CNN ArchitecturesDeep Learning and CNN Architectures
Deep Learning and CNN Architectures
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and Standards
 
Computer network notes with company specific questions
Computer network notes with company specific questionsComputer network notes with company specific questions
Computer network notes with company specific questions
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
PCCOER_Blockchain_FoP_Jan23.pptx
PCCOER_Blockchain_FoP_Jan23.pptxPCCOER_Blockchain_FoP_Jan23.pptx
PCCOER_Blockchain_FoP_Jan23.pptx
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 

Plus de Ferdin Joe John Joseph PhD

Week 11: Cloud Native- DSA 441 Cloud Computing
Week 11: Cloud Native- DSA 441 Cloud ComputingWeek 11: Cloud Native- DSA 441 Cloud Computing
Week 11: Cloud Native- DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Week 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud ComputingWeek 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Week 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud Computing
Week 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud ComputingWeek 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud Computing
Week 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Week 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud Computing
Week 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud ComputingWeek 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud Computing
Week 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...
Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...
Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...Ferdin Joe John Joseph PhD
 
Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...
Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...
Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...Ferdin Joe John Joseph PhD
 
Week 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud Computing
Week 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud ComputingWeek 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud Computing
Week 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...
Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...
Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...Ferdin Joe John Joseph PhD
 
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud ComputingWeek 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud ComputingFerdin Joe John Joseph PhD
 
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculumSept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculumFerdin Joe John Joseph PhD
 
Transforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approachTransforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approachFerdin Joe John Joseph PhD
 

Plus de Ferdin Joe John Joseph PhD (19)

Invited Talk DGTiCon 2022
Invited Talk DGTiCon 2022Invited Talk DGTiCon 2022
Invited Talk DGTiCon 2022
 
Week 12: Cloud AI- DSA 441 Cloud Computing
Week 12: Cloud AI- DSA 441 Cloud ComputingWeek 12: Cloud AI- DSA 441 Cloud Computing
Week 12: Cloud AI- DSA 441 Cloud Computing
 
Week 11: Cloud Native- DSA 441 Cloud Computing
Week 11: Cloud Native- DSA 441 Cloud ComputingWeek 11: Cloud Native- DSA 441 Cloud Computing
Week 11: Cloud Native- DSA 441 Cloud Computing
 
Week 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud ComputingWeek 10: Cloud Security- DSA 441 Cloud Computing
Week 10: Cloud Security- DSA 441 Cloud Computing
 
Week 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud Computing
Week 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud ComputingWeek 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud Computing
Week 9: Relational Database Service Alibaba Cloud- DSA 441 Cloud Computing
 
Week 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud Computing
Week 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud ComputingWeek 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud Computing
Week 7: Object Storage Service Alibaba Cloud- DSA 441 Cloud Computing
 
Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...
Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...
Week 6: Server Load Balancer and Auto Scaling Alibaba Cloud- DSA 441 Cloud Co...
 
Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...
Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...
Week 5: Elastic Compute Service (ECS) with Alibaba Cloud- DSA 441 Cloud Compu...
 
Week 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud Computing
Week 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud ComputingWeek 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud Computing
Week 4: Big Data and Hadoop in Alibaba Cloud - DSA 441 Cloud Computing
 
Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...
Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...
Week 3: Virtual Private Cloud, On Premise, IaaS, PaaS, SaaS - DSA 441 Cloud C...
 
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud ComputingWeek 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
Week 1: Introduction to Cloud Computing - DSA 441 Cloud Computing
 
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculumSept 6 2021 BTech Artificial Intelligence and Data Science curriculum
Sept 6 2021 BTech Artificial Intelligence and Data Science curriculum
 
Hadoop in Alibaba Cloud
Hadoop in Alibaba CloudHadoop in Alibaba Cloud
Hadoop in Alibaba Cloud
 
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba CloudCloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
 
Transforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approachTransforming deep into transformers – a computer vision approach
Transforming deep into transformers – a computer vision approach
 
Deep learning - Introduction
Deep learning - IntroductionDeep learning - Introduction
Deep learning - Introduction
 
Data wrangling week 11
Data wrangling week 11Data wrangling week 11
Data wrangling week 11
 
Data wrangling week 9
Data wrangling week 9Data wrangling week 9
Data wrangling week 9
 
Data Wrangling Week 7
Data Wrangling Week 7Data Wrangling Week 7
Data Wrangling Week 7
 

Dernier

Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareGraham Ware
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...HyderabadDolls
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...kumargunjan9515
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?RemarkSemacio
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...HyderabadDolls
 
Introduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxIntroduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxAniqa Zai
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxronsairoathenadugay
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...kumargunjan9515
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowgargpaaro
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...nirzagarg
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime GiridihGiridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridihmeghakumariji156
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Dernier (20)

Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?Case Study 4 Where the cry of rebellion happen?
Case Study 4 Where the cry of rebellion happen?
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
Introduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptxIntroduction to Statistics Presentation.pptx
Introduction to Statistics Presentation.pptx
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Nandurbar [ 7014168258 ] Call Me For Genuine Models...
 
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime GiridihGiridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
Giridih Escorts Service Girl ^ 9332606886, WhatsApp Anytime Giridih
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem

  • 1. Blockchain Technology Week 10 Unit IV – CAP Theorem, Byzantines General Problem Ferdin Joe John Joseph, PhD Faculty of Information Technology Thai-Nichi Institute of Technology, Bangkok Venue: D603
  • 2. Week 10 – Unit IV Agenda • CAP Theorem • Byzantines General Problem Faculty of Information Technology, Thai-Nichi Institute of Technology 2
  • 4. Features • Symmetrical • Key length of 57,000 to 200,000 bits • No delimitation in number system • Insensitive to factorize • No semantics in cipher Faculty of Information Technology, Thai-Nichi Institute of Technology 4
  • 5. Visualization Faculty of Information Technology, Thai-Nichi Institute of Technology 5 Plain Text DES Chiffre Hyper Encryption
  • 6. Availability Faculty of Information Technology, Thai-Nichi Institute of Technology 6 Highly Confidential and Patented
  • 7. Applications • All applications of Banking • Defense Technologies • Telecommunication • Health • Plagiarism Protection • Satellite Communication Faculty of Information Technology, Thai-Nichi Institute of Technology 7
  • 9. CAP Theorem • Also known as Brewer’s Theorem • Named after Computer Scientist Erik Brewer in 2002 Faculty of Information Technology, Thai-Nichi Institute of Technology 9
  • 10. Theorem • A distributed database can provide any two out of the three gurantees only among those stated below. 1. Consistency: Every read receives the most recent write or an error 2. Availability: Every request receives a (non-error) response – without the guarantee that it contains the most recent write 3. Partition tolerance: The system continues to operate despite an arbitrary number of messages being dropped (or delayed) by the network between nodes Faculty of Information Technology, Thai-Nichi Institute of Technology 10
  • 11. Faculty of Information Technology, Thai-Nichi Institute of Technology 11
  • 12. CAP Expanded Faculty of Information Technology, Thai-Nichi Institute of Technology 12 C: Consistency – At any given time, all nodes in the network have exactly the same (most recent) value.
  • 13. CAP Expanded • A: Availability – Every request to the network receives a response, though without any guarantee that returned data is the most recent. Faculty of Information Technology, Thai-Nichi Institute of Technology 13
  • 14. CAP Expanded • P: Partition tolerance – The network continues to operate, even if an arbitrary number of nodes are failing. Faculty of Information Technology, Thai-Nichi Institute of Technology 14
  • 15. CAP Theorem Applied • Due to the nature of distributed data stores (such as blockchain), Partition tolerance is a given fact; there will always be failing/unreachable nodes in the network (not least because of the unstable nature of the internet). CAP Theorem states that one has to choose between C (Consistency) or A (Availability) when in the presence of P (Partition): Faculty of Information Technology, Thai-Nichi Institute of Technology 15
  • 16. Availability + Partition Tolerance • Every request to the network receives a response, even if the network cannot guarantee it is up to date due to network partitioning (failing nodes). • Choosing Availability over Consistency for a world-wide distributed system will make it highly available, but its data will be out of date for 99.99% of the time. Furthermore, no-one will be able to guarantee that the data returned is in fact the most recent. Faculty of Information Technology, Thai-Nichi Institute of Technology 16
  • 17. Availability + Partition Tolerance Faculty of Information Technology, Thai-Nichi Institute of Technology 17
  • 18. Consistency + Partition Tolerance • The system will return an error or a time-out if particular information cannot be guaranteed to be up to date due to network partitioning (failing nodes). • Choosing Consistency over Availability for a world-wide distributed system will make it highly accurate, but it will most likely be unavailable for 99.99% of the time. Faculty of Information Technology, Thai-Nichi Institute of Technology 18
  • 19. Consistency + Partition Tolerance Faculty of Information Technology, Thai-Nichi Institute of Technology 19
  • 20. Does Blockchain Violate CAP Theorem ? • NO • Those interested in blockchain, opt for AP (Availability + Partition) + Strong/Eventual Consistency. • This doesn’t mean Consistency used to the fullest. Faculty of Information Technology, Thai-Nichi Institute of Technology 20
  • 22. Byzantine General Faculty of Information Technology, Thai-Nichi Institute of Technology 22
  • 23. Byzantine - History • Byzantine Empire, the eastern half of the Roman Empire, which survived for a thousand years after the western half had crumbled into various feudal kingdoms and which finally fell to Ottoman Turkish onslaughts in 1453. Faculty of Information Technology, Thai-Nichi Institute of Technology 23
  • 24. Scenario • Imagine that the grand Eastern Roman empire aka Byzantine empire has decided to capture a city. • The Byzantine army has completely encircled the city. The army has many divisions and each division has a general. • The generals communicate between each as well as between all lieutenants within their division only through messengers. Faculty of Information Technology, Thai-Nichi Institute of Technology 24
  • 25. Attack Process Faculty of Information Technology, Thai-Nichi Institute of Technology 25
  • 26. Faculty of Information Technology, Thai-Nichi Institute of Technology 26 Commander Lieutenant 1 Lieutenant 2 “attack”“attack” “He said ‘retreat’” Lieutenant 2 is corrupt and consensus cannot be reached.
  • 27. Faculty of Information Technology, Thai-Nichi Institute of Technology 27 Commander Lieutenant 1 Lieutenant 2 “retreat”“attack” “He said ‘retreat’” Commander is corrupt and consensus cannot be reached.
  • 28. Faculty of Information Technology, Thai-Nichi Institute of Technology 28 Commander Lieutenant 1 Lieutenant 2 Lieutenant 3 “attack” “attack” “attack” “attack” “retreat”
  • 29. Faculty of Information Technology, Thai-Nichi Institute of Technology 29 Commander Lieutenant 1 Lieutenant 2 Lieutenant 3 “attack” “retreat” “not sure” “attack” “not sure” “retreat” “retreat” “attack” “not sure”
  • 30. How it applies to Blockchain • Consensus Mechanism as it follows distributed mechanism • In blockchain network, there is no commander • Each node becomes a lieutenant and fall under equal hierarchy Faculty of Information Technology, Thai-Nichi Institute of Technology 30
  • 31. How it applies to Blockchain • All participating nodes have to agree upon every message that is transmitted between the nodes. • If a group of nodes is corrupt or the message that they transmit is corrupt then still the network as a whole should not be affected by it and should resist this ‘Attack’. • In short, the network in its entirety has to agree upon every message transmitted in the network. This agreement is called as consensus. Faculty of Information Technology, Thai-Nichi Institute of Technology 31
  • 32. Practical Byzantine Fault Tolerance (PBFT) • Faster • Handle n Byzantine faults in a system with 3n+1 nodes Faculty of Information Technology, Thai-Nichi Institute of Technology 32
  • 33. PBFT Process Request Preprepare Prepare Commit Reply Faculty of Information Technology, Thai-Nichi Institute of Technology 33
  • 34. PBFT by example Faculty of Information Technology, Thai-Nichi Institute of Technology 34 Client Alpha Bravo Delta Charlie
  • 35. PBFT REQUEST Faculty of Information Technology, Thai-Nichi Institute of Technology 35 Client Alpha Bravo Delta Charlie
  • 36. PBFT REQUEST Faculty of Information Technology, Thai-Nichi Institute of Technology 36 Client Alpha Bravo Delta Charlie
  • 37. PBFT PRE PREPARE Faculty of Information Technology, Thai-Nichi Institute of Technology 37 Client Alpha Bravo Delta Charlie
  • 38. PBFT PREPARE Faculty of Information Technology, Thai-Nichi Institute of Technology 38 Client Alpha Bravo Delta Charlie
  • 39. PBFT PREPARE Faculty of Information Technology, Thai-Nichi Institute of Technology 39 Client Alpha Bravo Delta Charlie
  • 40. PBFT COMMIT Faculty of Information Technology, Thai-Nichi Institute of Technology 40 Client Alpha Bravo Delta Charlie
  • 41. PBFT REPLY Faculty of Information Technology, Thai-Nichi Institute of Technology 41 Client Alpha Bravo Delta Charlie
  • 42. PBFT Request Preprepare Prepare Commit Reply Faculty of Information Technology, Thai-Nichi Institute of Technology 42 Client Alpha Bravo Delta Charlie
  • 43. PBFT Request Preprepare Prepare Commit Reply Faculty of Information Technology, Thai-Nichi Institute of Technology 43 Client Alpha Bravo Delta Charlie
  • 44. PBFT Request Preprepare Prepare Commit Reply Faculty of Information Technology, Thai-Nichi Institute of Technology 44 Client Alpha Bravo Delta Charlie
  • 45. PBFT Request Preprepare Prepare Commit Reply Faculty of Information Technology, Thai-Nichi Institute of Technology 45 Client Alpha Bravo Delta Charlie
  • 46. PBFT Request Preprepare Prepare Commit Reply Faculty of Information Technology, Thai-Nichi Institute of Technology 46 Client Alpha Bravo Delta Charlie
  • 47. Next Week • Peer to Peer Networking • Distributed Computing Faculty of Information Technology, Thai-Nichi Institute of Technology 47