X

Download Block Chain Technology PowerPoint Presentation

SlidesFinder-Advertising-Design.jpg

Login   OR  Register
X


Iframe embed code :



Presentation url :

Home / Computers & Web / Computers & Web Presentations / Block Chain Technology PowerPoint Presentation

Block Chain Technology PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

PowerPoint is the world's most popular presentation software which can let you create professional Block Chain Technology powerpoint presentation easily and in no time. This helps you give your presentation on Block Chain Technology in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Block Chain Technology powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by sfpptteam in Computers & Web ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more.

About This Presentation

Block Chain Technology Presentation Transcript

Slide 1 - Block Chain Technology By : S.Naganandhini, AP/CSE, PSNACET
Slide 2 - Definition of Blockchain A blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way without the need for a central authority.
Slide 3 - Key Characteristics to be remembered Open: Anyone can access blockchain. Distributed or Decentralised: Not under the control of any single authority. Efficient: Fast and Scalable. Verifiable: Everyone can check the validity of information because each node maintains a copy of the transactions. Permanent: Once a transaction is done, it is persistent and can’t be altered.
Slide 4 - Contents of a Block Blockchain starts with a block called genesis block. Each block stores the following information in it: Index: Position of the block in blockchain. Index of genesis block is 0. Time stamp: The time when that particular block was created. Hash: Numeric value that uniquely identifies data just like our fingerprints. Previous hash: Hash value of the previous block. For genesis block, this value is 0. Data: Data stored on the node. For example, transactions. Nonce: It is a number used to find a valid hash. To generate this number, the processing power is used.
Slide 5 - ppt slide no 5 content not found
Slide 6 - Mechanism of Blockchain
Slide 7 - Blockchain works like a public ledger. Any small change in the data value can affect the hash value. Hence, affecting the whole block chain. Every peer in a Blockchain network maintains a local copy of the Blockchain. All the replicas need to be updated with the last mined block. All the replicas need to be consistent — the copies of the Blockchain at different peers need to be exactly similar.
Slide 8 - Cryptographic Hash Function Map any sized data(x) to a fixed size(H(x)). e.g. H(x) = x % n, where x, n = integers % = modular (remainder after division by n) operations. x can be of any arbitrary length, but H(x) is within the range [0,n-1]. You can calculate H(x) from x but the reverse is not possible. For even a small change in the value of x, value of H(x) changes. This is called Avalanche Effect.
Slide 9 - Merkle Tree/Hash Tree Every leaf node is labelled with the hash of a data block. Every non-leaf node is labelled with the cryptographic hash of the labels of its child nodes. You can traverse this tree just like you traverse a binary tree. Uses of Merkle Tree: Peer to Peer Networks. Bitcoin implementation.
Slide 10 - ppt slide no 10 content not found
Slide 11 - Bitcoin Bitcoin is a completely decentralised, peer-to-peer, permissionless cryptocurrency put forth in 2009 by Satoshi Nakamoto. Bitcoin is the first blockchain application. It is permissionless , i.e. open to anyone. Bitcoin blockchain size is growing exponentially.
Slide 12 - ppt slide no 12 content not found
Slide 13 - Structure of a Block(Reference: Bitcoin). A block has two main components: Block Header List of Transactions 1. Block Header: Contains metadata about a block which includes the following: Version: Block version number Previous Block hash: This is used to compute new block hash. Hence, making the blockchain temper proof. Merkle Tree Root: The root of the Merkle tree is a verification of all the transactions. Timestamp: The time at which block is mined. Bits/Difficulty: Difficulty in Bitcoin is expressed by the hash of a Bitcoin block header being required to be numerically lower than a certain target. Nonce:A 32-bit random number used in blockchain, while calculating the cryptographic hash for a Block. The last three are collectively called mining statistics.
Slide 14 - A block is identified by its hash which is computed using Double SHA256 algorithm.
Slide 15 - 2. List of Transactions Transactions are organised as a Merkle Tree. The Merkle Root is used to construct the block hash. If you change a transaction, you need to change all the subsequent block hash. The difficulty of the mining algorithm determines the toughness of tampering with a block in a blockchain.
Slide 16 - ppt slide no 16 content not found
Slide 17 - Mining It is a mechanism to generate hash of the block. Mining involves creating a hash of a block of transactions that cannot be easily forged, protecting the integrity of the entire blockchain without the need for a central system. Bitcoin Mining: H(k) = Hash(H(k-1) || T || Nonce) Here, H(k-1) = Previous block hash T = List of transactions Nonce = Miners find this nonce as per the complexity(number of zeros at the prefix)
Slide 18 - Distributed Consensus Consensus is the process by which peers agree to the addition of next block in the blockchain. Distributed Consensus ensures that different nodes in the network see the same data at nearly the same point of time. Hence in case of any failure, the system can still provide a service as the data is decentralised. To maintain anonymity in this large network, the permission less protocol is used where you don’t need to record your identity while participating in the consensus.
Slide 19 - Challenge Response System The network poses a challenge and each node tries to solve the challenge. The node which solves the challenge first, gets to dictate what set of data or state elements to be added in the network. This process continues iteratively and ensures that different nodes win the challenge at different runs. Hence, no single node will be able to control the network. Bitcoin Proof-of-work (PoW) algorithm ensures consensus over a permission less setting based on challenge response.
Slide 20 - Challenge Response System Every node spends a large amount of computational power to solve the mathematical challenge in each iteration of consensus. The computational effort expended by the nodes in achieving consensus would be paid for by cryptocurrency generated and managed by the network.
Slide 21 - Blockchain as tree. Suppose two miners found the nonce at the same time, then they will add the mined blocks (2,3) to the previous block (1). Then, the next miners mined another three blocks (4,5,6) and added them to the previous blocks they found (2,3). This process of mining continues and the blockchain looks like a tree as following:
Slide 22 - The longest chain is the accepted chain which is in green colour in the above figure. Other blocks (red colour) which are not the part of blockchain are called orphaned blocks.
Slide 23 - Cryptocurrency Applications using Blockchain.
Slide 24 - Cryptocurrency Applications using Blockchain
Slide 25 - Permissioned Model (Private Blockchain) Users/Participants are known already. Security and Privacy are the main factors in this blockchain. Only the entities participating in a particular transaction will have knowledge and access to it — other entities will have no access to it. The Linux Foundation’s Hyperledger Fabric is an example of a permissioned blockchain framework implementation.
Slide 26 - Applications Asset Movement and Tracking Provenance Tracking: Tracking the origin and movement of high-value items across a supply chain.
Slide 27 - Thank You