Mining is an integral part of blockchain technology. Some discussions have been discussed earlier. First, let's know what the mining key is. Bitcoin is a powerful computer or another computing device that has the complete block chains of Bitcoin, which itself is actually open Khatian (Public Laser) and download the 'Bakken Core' software; Each computer or machine has a node. The owner of the node is actually mine. A minor may have some machines.
All Bitcoin information and software download links can be found on www.bitcoin.org. This site is registered with Satoshi Nakamoto. The miner must register on Bitcoin site. Miner should have a wallet so that if he gets the prize, then he can get his bitcoin billed in his wallet.Now a large number of people are mining, so to survive in this competition, there is a high-power computer requirement. First, download the full block zipper. So there is a need to have good internet bandwidth. Bitcoin block chains are currently up to 20 gigabytes, but it is increasing daily CPUs are not being paid for mining, even GPU-which does not have much of its functionality. A special type of computer has been created for Pitkanen mining, which is called 'esc', whose full name is Application Specific Integrated Circuit. This computer will do just one thing, that is mining.
They use power tools and laptops or desktop computers, but at least use a GPU (graphical processing unit). But now it is no longer if anybody else can solve the problem, then no reward or fee will be available. So now many people are making a mining coalition (pool). It increases the chances of getting a reward.The mining software (Bitcoin Core) is actually doing mining work. Although its name is mining, it is not actually mining or extracting. Rather, it is a test conducted by conducting a transaction and certifying it. Many people will not be wrong in doing this. Then he has been 'hash' again, it will be thousands of machines. So there is no way to change or fake. Then working on solving a complex mathematical problem, which is called 'Proof of Work'. This Proof of Work can be completed before the machine comes to fight the machine. Finally, there is a prize for a winner, so there is no shortage of machines in combat.
Hash FunctionWorks with Block Chain Hash Function The hash function can make any small or big word or sentence equal to the length of time. Regardless of the length of the original word or sentence, the hash from the hash function will be the same length, its length is equal. Each transaction in Bitcoin is then synthesized by the hash function and then added to the block. Therefore, the hashtag or any cryptogram hash is important. SBH-52 hash is used in Bitcoin, which is the first row for cybersecurity. SHA-256 Discovery of the NSA (National Security Agency) in America. This hash function turns 256 signals into any word. The following is an example:Bangladesh: 8 E 07 DF 26128 D8 A 78474 DC 525 BF0 F0 A 16 AFA 49344 E1 ED 4229692 E 13 B 313 DE 46 A8Bangladesh: 2 F1 D 47 EB 679 BB 05 E6 D8 FE 039 AF 1563549588 CD 44 B 40 BE6 B 1013 EA8 CA 2268845 FDhaka: 50 FD 531 C 42 D3 E 81 F 37 A 89748 DFB4 F 55 E8 B 741390 BE 428449 A8 B9 BC 46582 FC 91 EIt is noteworthy that the second hash has only been different from the first hash in the first letter. That's why the information is slightly changed, but it will be easily caught in the hash. There is no way to understand the two hashes again, their main words were two closer.This hash and much more hash are one way. This means that a function or hash can be done to a word or phrase, but there is no way to find the word again from that hash. It is not possible to write any such function. Then the low is standing. Let's give an example of a password. Suppose, Dabir's password 'Flood 1988' He inserted it on the bank's website. The website hash has password hash using the hash-52 hash. That hash was kept in the database only. Now anyone who has a hash-based password will not know the actual password. It is not possible to write a function that can convert that hash to the inserted password.When the password will be inserted for login, then the system has will first. That hash will be exactly the same as before, then it will be matched with the hash stored in the database. Hash has to understand that the word is also matched. Then Dabir will be allowed to enter his account. If the database is found, or if the database is hacked, then the password will be hidden. It is understood that the common saying comes from here- the snake will die, the sticks will not break.Flood 1988's hash: 6 C 97031092 E 94 BEF2 B4 FD 77 A 67 AC4 B2 F6 A 6579 F 489 FADAA1 D 59 A 52 DC 97634 EDANow, if someone receives the above hash and adds a meaningful or meaningless word to the hash function, and if it matches the hash, then match it with the upper hash and when it matches, it will know the password of the debate. The reason is that the word is inserted into the hash function. Again the hash function creates the same hash for one word all the time. It is easy to understand that it is not easy.Another thing to say is, the Merkel-tree system is followed in the Block Chain. Holding the hash of another block in a block There is no other block hash in the marginal block. This results in a specific
Stopping proof-of-work method mining will be solution of bitcoin price. All the mining PoW must change to PoS or masternode