1.2 Introduction To Distributed Ledger Technology 2
1.2 Introduction To Distributed Ledger Technology 2
Table of contents
1 Introduction
2 What is Blockchain Technology
3 What are Blockchain Protocols
4 Why are Blockchain Protocols Required
5 Blockchain Architecture
6 Blockchain Consensus
7 Participants of Blockchain Network
Introduction
The present century is all about technology. Today, with the increasing urge for innovation,
people are open to accepting various new technologies. Blockchain is one such revolutionary
technology that is envisioned to be as impactful as the internet. It is set to revolutionize not just
the finance or healthcare industry but many other industries, businesses, government, and even
our personal lives.
To assure the accuracy of digital information, Stuart Haber and Scott Stornetta created
blockchain technology in 1991. This technology was intended to timestamp digital documents
so that they could not be tampered with. They employed cryptographic techniques in a chain
of blocks to secure digital documents from data tampering. However, it went unused until it
was adopted by Satoshi Nakamoto in 2009 to create a digital cryptocurrency called Bitcoin.
The main hypothesis is that the blockchain establishes a system of creating a distributed
consensus in the digital information world. This allows participating entities to know for certain
that a digital event happened by creating an immutable record in a distributed ledger. Thus, it
has gained a lot of traction in recent years due to its features like transparency, immutability,
decentralization, and traceability. From enterprises to startups, banks, and governments,
everyone is interested in understanding how blockchain can bring a paradigm shift in their
work.
In this chapter, we will cover the basics of Blockchain technology, its origins, its key
technological features, and its different potential applications.
What Is a Blockchain Technology?
A blockchain is a secure, decentralized digital database of transactions that is maintained by a
network of computers that is responsible for recording transactions and tracking the movement
of digital assets inside its network. Each one of these computers called a node, stores a copy of
the blockchain database (also called a digital ledger). Any new entries to this digital ledger
must be first agreed upon before being added to the blockchain. Each block in the network is
securely linked to the one before and after it and remains in place even if the digital asset
changes hands. Neither the order of the blocks nor the blocks themselves can be altered, making
Page 1 of 25
the data contained irreversible, unchangeable, and essentially immune to tampering. Once
added, a new version of the digital ledger is sent to all nodes.
Page 2 of 25
Header: It is used to identify the block in the entire blockchain. It handles all blocks in the
blockchain. A block header is hashed periodically by miners by changing the nonce value as
part of regular mining activity, also Three sets of block metadata are contained in the block
header.
Previous Block Address/ Hash: It connects the i+1 block to the” i” block using the hash. In
short, it is a reference to the hash of the previous (parent) block in the chain.
Timestamp: It is a system that verifies the data into the block and assigns a time or date of
creation for digital documents. The timestamp is a string of characters that uniquely identifies
the document or event and indicates when it was created.
Nonce: A nonce number that is used only once. It is a central part of the proof of work in the
block. It is compared to the live target if it is smaller or equal to the current target. People who
mine, test, and eliminate many Nonce per second until they find that Valuable Nonce is valid.
Merkel Root: It is a type of data structure frame of different blocks of data. A Merkle Tree
stores all the transactions in a block by producing a digital fingerprint of the entire transaction.
It allows the users to verify whether a transaction can be included in a block or not.
Blockchain Consensus
Consensus is a method of reaching an agreement and it is a form of how nodes on the network
can resolve various network-related issues. Consensus is one of the core priorities of a
blockchain because, without it, thousands of nodes can never agree. These models exist to
create fairness and equality among all the participants. However, there is no one way to reach
a consensus within a system. There are lots of algorithms that various blockchain platforms
use. Every single one of them works differently and comes with its own set of flaws. The ones
that are currently in use are as follows:
• Proof of Work: It is one of the popular and first consensus algorithms introduced in
the blockchain. Here, nodes are called miners, and they will solve complex
mathematical issues with help from their device’s computational power to verify the
blocks.
• Proof of Stake: Proof of stake allows you to take part in the consensus in terms of how
many coins you staked in the network. If you have more coins, your possibility of
mining a block will increase.
• Delayed Proof of Work: Here, some notary nodes will add up data from one
blockchain platform to another and secure the power of hashing. Both blockchain
networks may use PoS or PoW to reach a consensus.
• Delegated Proof of Stake: In this one, there’s a concept of delegates and witnesses.
Each node is chosen using voting. Witnesses on the platform are responsible for
validating the transactions. On the other hand, delegates can change the parameters of
the system. Anyhow, all the nodes taking part in consensus will get paid.
• Leased Proof of Stake: In leased proof of stake, the smallholders can take part in
consensus. As the previous PoS would not let them stake their coins in the network, it
creates an unfair environment. That is why LPoS offers more fair ground.
Page 3 of 25
• Proof of Stake Velocity: Proof of stake velocity offers an extra incentive to keep the
users from staking into the network. Here, one can earn more if somebody maintains
an active wallet. This means the users who are not active quite often would not get the
extra payment for validating a block.
• Proof of Elapsed Time: All the nodes have to wait for a certain amount of time before
they can participate in consensus. The time limit is chosen randomly. Thus, one can
only create a block when they finish the wait time. There is no way to bypass it, as the
system tracks if the node waited or not.
• Practical Byzantine Fault Tolerance: Practical Byzantine Fault Tolerance gets rid of
the compromised node issue. So, before any node can harm the network, it assumes the
possibility of failure. The system gets information from other nodes as soon as a node
is compromised to dismiss that node.
• Simplified Byzantine Fault Tolerance: Here, the transactions are validated in a batch.
More so, the block generator collects all the transactions groups them accordingly, and
then gets them into one block. A validator then must validate the whole block to verify
the transactions.
• Delegated Byzantine Fault Tolerance: Here, the leader of the nodes is called a
delegate, and it has limited power. If the leader tries to manipulate the network, another
delegate will replace that node. More so, other nodes can disagree with the delegate and
can change their leader accordingly.
• Federated Byzantine Agreement: Here, all the general nodes get their separate
blockchain to run. And before any node can request a transaction, that node needs to be
verified and known from the start. Also, here, a node can choose who to trust on the
network.
• Proof of Activity: It is a combination of PoW and PoS Here, the miner’s pre-mine a
block template rather than a complete one. Later, a validator validates the remaining
block. The more stake a validator has in the network, the more valid his/her validation
would be.
• Proof of Authority: Here, the nodes participating in consensus will stake their
reputation. The validating nodes are selected based on their true identities. Additionally,
the validators must invest money and their reputation to earn their place on the platform.
• Proof of Reputation: It is quite like Proof of Authority; however, a validator needs to
have a good reputation to participate in the consensus. More so, if they try to cheat the
network, they will face severe consequences.
• Proof of History: Here, the system creates significant events on the network. A node
then can validate the transaction based on whether the transaction happened before or
after that event.
• Proof of Importance: Here, the blockchain works keeping a score of importance. The
more coins a user has, the higher his/her score will be. Once they are eligible for
participation, they can harvest a block. Additionally, if someone harvests more, their
importance score will increase.
• Proof of Capacity: Users would use their available hard drive capacity to select mining
rights instead of using computational power. So, the larger one’s hard drive would be,
the more he /she can validate blocks.
Page 4 of 25
• Proof of Burn: Here, the blockchain works by burning coins to keep the network stable.
So, the users would send some of their coins to an eater address and burn them so that
they can participate in consensus.
• Proof of Weight: Instead of only relying on how many coins one has staked; the system
takes other factors into account to weigh in. So, even if one has fewer coins, he/she may
still get to participate in consensus.
Participants of Blockchain Network
Each blockchain network has various participants, who play different roles, in its functioning.
They are:
• Blockchain users. Participants (typically business users) with permissions to join the
blockchain network and conduct transactions with other network participants.
• Regulators. Blockchain users with special permissions to oversee the transactions
happening within the network.
• Blockchain network operators. Individuals who have special permissions and
authority to define, create, manage, and monitor the blockchain network.
• Certificate authorities. Individuals who issue and manage the different types of
certificates required to run a permissioned blockchain.
Types of Blockchain
The evolution of decentralized networks has led to the development of different types of blockchain
technology. In this blog post, we are going to explore the different types of blockchains there are,
including those listed below:
• Public blockchain
• Private blockchain
Page 5 of 25
• Hybrid blockchain
The broader goal of any project creator can also influence the kinds of blockchain technology to adopt.
If there is a need to rollout cryptocurrencies, a public blockchain may come in handy and if the ultimate
goal is to keep a part of the data open while another part is kept private, then a hybrid blockchain is
ideal.
1. Public Blockchain
The first of the different blockchains we would be talking about is the public or permissionless
blockchain networks. Public blockchains are one of the most popular and they are the foundational
frameworks for digital currencies like Bitcoin, Ethereum, Lite coin, and many other altcoins.
In a public blockchain, anyone can join to make the network operational by conducting transactions and
joining the group of validators. Leveraging the web or internet connection, anyone from anywhere can
contribute to the management of the network. In a public blockchain, each participant can be a node
operator and keeps a copy of the transactions that take place on the network.
Public blockchains have a decentralized form of governance and the verification of transactions follows
a predefined consensus. There is a diverse type of consensus that is used for transaction validation in
the public blockchain space and these include but are not limited to; Proof of work (PoW), Proof of
Stake (PoS), and Proof of space and time. All great towards immutability.
The proof-of-work model involves the solving of complex mathematical computations before
transactions are registered within the block, it is energy-intensive and is relatively being replaced by the
proof-of-stake method featuring the verification of transactions by validators. These validators usually
have a stake in the blockchain network, authorizing them to contribute effectively to the management
of the network.
Page 6 of 25
Public blockchain networks usually incentives participation, and guarantee a high level of security due
to the spread of the network participants. Should the node operators, miners, or validators not be
motivated enough to work, the public blockchain network will become non-functional and can cause
network collapse.
2. Private Blockchain
Private Blockchain is designed to operate in a more restricted or closed manner. Private blockchains
thrive under a permissioned model in which access to transactions and validations of entries is
restrictive. Private Blockchain is usually more centralized when compared to public blockchain
networks.
Private Blockchain is ideal for an organization that wants to leverage the technology to revamp its
internal operations. The organization defines the accessibility requirements to the network, who can
conduct transactions as well as who can validate the transactions that take place on-chain. Private
Blockchain is also ideal for a group of businesses that share similar data in their day-to-day activities.
The same way they are used for IoT applications (Internet of Things).
Many may point to the centralization of control as a point of weakness for the private blockchain,
however, this does not negate its infrastructural security. Just like others, permissioned blockchain
networks are encrypted and feature a high level of data cryptography making them less prone to attacks
compared to traditional distributed ledger technologies or digital databases.
Page 7 of 25
Tokenization may or may not be an integral part of running a private blockchain, as incentivization may
not be necessary, or typically takes other forms. Some popular examples of a private blockchain network
are owned by Ripple Labs and BurstIQ amongst others.
Just as the name suggests, a consortium blockchain is such that is managed by two or more individuals,
associations, companies, or business outfits. Based on its composition, we can say that a consortium
blockchain is a semi-decentralized network in which both public and private blockchain features are
inherent. This way, certain data are opened to all the participating members while others are restricted.
Consortium blockchains are also known as federated blockchains in which the consensus mechanism is
attained based on a predefined number of nodes. It should be noted that the fact that consortium
blockchains have a public element does not mean it is less of a decentralized network. No single
organizations call the shots as all the participating organizations help maintain the trust upon which the
network operates.
In all Federated blockchain networks, every node or participating entity can initiate and receive a
transaction, while also being empowered to be able to validate transactions in a broader sense.
Page 8 of 25
Consortium blockchains bring to life the typical features of a private blockchain while leveraging the
security infusion of a public blockchain.
Consortium blockchains are majorly seen in Hyperledger Fabric, Corda, and Quorum amongst others.
4. Hybrid Blockchain
A hybrid blockchain also utilizes the combined features of private and public blockchain networks. At
first glance, hybrid blockchains maintain a huge similarity with consortium blockchains but the
difference between both is striking. Unlike consortium blockchains with multiple participants
collectively helping to maintain the network, a hybrid blockchain can have a single entity network
administrator.
Hybrid blockchains work best when an organization needs some of its data open access and others kept
private for in-house use. The multichain model of hybrid blockchain can give room to a lot of
Page 9 of 25
allowances, as defined by the owner of the system. Transparency can be open or closed depending on
how the rules are set.
The decentralization model in hybrid blockchains is partial, as against that of consortium blockchains
in which all participants take full control of the network. Hybrid blockchains allow businesses to eat
their cakes and have them at the same time. This means they can achieve the transparency they need
while also keeping their most important data private.
Incentivization is also another key decision every blockchain project that seeks to utilize the hybrid
model must decide on. The decision to roll out incentives depends on the business model and whether
such benefits will contribute to the growth of the system.
The top examples of hybrid blockchain systems include DragonChain and XinFin’s Hybrid blockchain.
Page 10 of 25
Criteria to choose types of Blockchain
Choosing the right blockchain platform will not only save you time but also shield you from future
business troubles. With the blockchain app development market advancing incredibly, it’s crucial to
know which one is most suitable for your enterprise. There is a sheer number of blockchain platforms
available; this makes it more pressing to make an informed decision while picking one for your
business/service/product.
Below is a detailed view of characteristics most innovation leaders and development architects advise
considering.
1. Adoption Rate
The adoption rate is nothing but the level of implementation or adoption a particular
blockchain technology has received. It is advised to choose technology with a higher
adoption rate over one with a poor adoption level. The reason is simple – technology and
requirements are changing at a faster pace. This implies that the more embraced a
particular technology is, the more assuredly it will be reinforced and advanced shortly.
2. Programming Language
There are multiple variations of programming languages that one can have for blockchain
development. Some of the top-picked blockchain programming languages include
Solidity, Go, Python, Java, Cadence, and many more.
Page 11 of 25
If a blockchain platform offers a low throughput (transaction speed), the users on the
platform will have to pay higher fees to the miners. Considering speed as a parameter is
important but it should never be a substitute for low levels of security.
4. Transaction Cost
Cost-effectiveness is another feature to view while selecting a suitable blockchain for your
project. While these costs associated are necessary for blockchain, you can take steps to
lower the cost or reduce the risk of overpaying as well. You can even select a blockchain
that offers a feeless structure.
5. Consensus Mechanism
You will have to choose between Proof of Work (PoW) and Proof of Stack (PoS). Most
modern blockchain-based applications are operating on PoS, as it is more energy-
efficient. You can look into LPos, DPos, Proof-of-history (PoH), and proof of staked
authority (PoSA).
6. Development Capability
You must take into consideration the development know-how of any blockchain platform.
Whether you can hire blockchain developers for developing a product/service on the
platform? Will it get support from the blockchain community?
7. Scalability
In terms of blockchain, scalability refers to the transaction per second rate of the platform.
For instance, bitcoin can perform around 7 transactions in a second, Ethereum (which is
more popular among businesses given it offers smart contract support) can handle 20
transactions per second, while Stellar, a payment platform can drive up to 1000
transactions per second.
So, if you are planning to use blockchain technology for your next product, you must
consider the transaction capabilities of the platform before selecting it. For example, a
business that is developing a payment gateway utilizing blockchain essentially requires a
TPS of more than 7. While those developing an in-house data management platform or
something similar would not need a blockchain platform with a higher transaction rate.
8. Security
Security is the aspect of utmost importance especially if the company or organization is
dealing with sensitive information. To avoid security breaches and prevent your data from
falling into wrong hands, you need to track the security records of all the available
platforms and pick the best among them. Platforms such as Bitcoin, Ethereum, Ripple,
NEO, EOS, and BUMO are all go-to options with extremely good security records.
9. Public or Private
Blockchain is essentially divided into two categories – centralized and decentralized. In a
centralized or private network, a single person controls the network and the access of the
information to the users. While, in a decentralized network, anyone can access the
information and participate in the network.
If the system you are planning to develop deals with private information such as sensitive
patient data in healthcare systems, then you should go with a private system that is not
decentralized. On the other hand, if you want to keep transparency through your platform,
then you should put the data on the public blockchain development platform.
Page 12 of 25
like Discord, Reddit, or LinkedIn as well. As you progress along with your blockchain
project, you will need a good amount of feedback and support. Also, try and gain an
understanding of the availability of supporting developer tools to increase the developer
experience.
A. Hyperledger Fabric
Page 13 of 25
3. Quality Code:
• The Hyperledger Fabric blockchain maintains a focus on quality over quantity.
• All code undergoes careful inspection and rigorous testing before implementation.
• The open-source community actively contributes to refining the codebase, ensuring a
high level of quality in Hyperledger Fabric samples.
4. Higher Efficiency:
• Hyperledger Fabric is designed for efficiency compared to other blockchain
platforms.
• Its internal structure facilitates high efficiency by assigning different tasks to each
node.
• Nodes can process multiple transactions simultaneously without slowing down the
system.
• This design minimizes time consumption and accelerates overall functionality.
• Some nodes are dedicated to ledger maintenance or authentication, reducing the
burden on transaction processing nodes.
5. Modular Design:
• Hyperledger Fabric boasts a modular structure, enhancing network functionality.
• Users can choose different algorithms for encryption, identity, and consensus,
plugging them into the Hyperledger Fabric blockchain.
• This flexibility allows for the use of diverse algorithms, avoiding being limited to a
single type.
2. Chaincode:
• Chaincode is the business logic defining assets and their modifications.
• It runs separately from transaction orders for enhanced security, enforcing rules
for database state changes.
• Think of chaincode as a smart contract, although the terms are used
interchangeably.
Page 14 of 25
3. Ledger:
• The ledger records transaction history in an unchangeable format.
• Sequenced and tamper-proof; once on the ledger, a transaction's state cannot be
altered.
• Includes read-only queries, access control lists, and configurations for uniform
block structures.
4. Identity:
• Hyperledger Fabric is permissioned, requiring identity management.
• It provides a membership identity service to manage identities, limiting access to
the network.
• Ideal for enterprises safeguarding competitive information.
6. Security Protocols:
• High-level security protocols protect the network from attacks.
• Encryption mechanisms safeguard ledger information.
• Ideal for enterprise companies facing cyber threats.
7. Consensus:
• Hyperledger Fabric's consensus algorithms operate on a Kafka model.
• Users can set consensus protocols without limitations, allowing multiple
consensus mechanisms.
• Supports BFT-based algorithms, and the new version introduces Raft for crash
fault-tolerance.
• Liveliness ensures non-faulty nodes receive submitted transactions, and safety
guarantees consistent state changes for identical transaction sequences.
1. Endorsement
2. Ordering
3. Validation
Page 15 of 25
• A client wants to do something.
• The application prepares a request and sends it to specific peers for approval.
• Peers check if the request is valid and if the client is allowed to do it.
• The application checks everything and shares the request with other relevant parties.
• All peers add the block to the chain and update their databases.
1. Ledger:
• The ledger is like a super-organized database where all transactions are stored.
2. World State:
• You can directly access current values instead of calculating them from logs.
3. Block Structure:
• Divided into three parts: Block Header, Block Data, and Block Metadata.
• Block Header has block number, current block hash, and previous block hash.
• Block Metadata includes time, certification, and more, indicating block validity.
4. Transaction Structure:
Page 16 of 25
• Header includes transaction essentials and chaincode version metadata.
5. Ordering Service:
• Ledgers don't fork; what peers agree on becomes final after passing through the
ordering service.
6. Private Data:
Page 17 of 25
• Collaborates for transparent supply chain management.
4. ANZ and Westpac:
• Digitizes bank guarantee processes.
• Enhances efficiency, reduces corruption, and ensures proper document
verification.
5. CLS:
• Uses Hyperledger Fabric for payment netting solution (CLSNet).
• Reduces risks, optimizes liquidity, and promotes real-time awareness in
foreign exchange.
6. UBS:
• Collaborates for a global trade platform named "Batavia."
• Empowers organizations, irrespective of size, to enter the trading space
transparently.
7. TenneT Energy Community:
• Uses Fabric smart contracts to manage electricity supply insufficiency.
• Allows households to lend stored electricity for compensation.
8. Change Healthcare:
• Develops "Intelligent Healthcare Network™" using Fabric for claims
management.
• Enhances auditing, development, and tracing of healthcare claims.
9. Maple Leaf Foods:
• Utilizes Fabric for transparent and efficient supply chain management.
• Aims to reduce losses and enhance transparency in supply chain processes.
10. Naturipe Farms:
• Implements Hyperledger Fabric for tracking blueberries from harvesting to
customer hands.
• Adds QR codes for tracking and ensuring quality of blueberries.
11. Nestlé:
• Works on a food traceability platform with Carrefour using Hyperledger
Fabric.
• Trials for six months to track Mousseline purée production for transparency.
Page 18 of 25
12. Walmart:
• Implements Hyperledger Fabric for tracing food supply chain.
• Initially tracks mangoes and pork, extends to 25 items, ensuring product
authenticity.
13. Unilever:
• Collaborates with IBM to improve digital ad supply chain transparency.
• Aims to balance ad flows and reduce false advertisements.
14. Russia’s Central Depository:
• Sberbank uses Hyperledger Fabric for commercial bond transactions.
• Enhances transparency and security in large-scale bond transactions.
15. Banco Bilbao Vizcaya Argentaria and Bank Danamon Indonesia:
• IBM collaborates with various financial institutions globally for a transparent
payment process.
• Aims for improved currency flow and transparency in financial transactions.
16. Rwanda Tantalum Project:
• Uses Hyperledger Fabric to ensure purity of tantalum, a rare mineral.
• Streamlines verification processes, reduces costs, and increases revenue.
B. IOTA (Tangle)
What is IOTA?
The IOTA Tangle stands out as an innovative form of distributed ledger technology (DLT)
crafted specifically for the Internet of Things (IoT) landscape. Unlike the traditional blockchain
model, IOTA utilizes a novel approach to DLT. Originating from the efforts of the non-profit
IOTA Foundation based in Germany, the Tangle addresses the design limitations of
conventional blockchain systems, especially concerning applications in the Internet of Things.
The IOTA Tangle caters to the unique demands of an IoT environment, where numerous
network-enabled devices, ranging from smart appliances to wearable technology, communicate
seamlessly. It was conceived to facilitate micro-transactions within this expanding ecosystem
without imposing fees. Offering key features such as high scalability, feeless transactions, and
nearly instantaneous transfers, the Tangle serves as a promising solution for the evolving
landscape of IoT devices.
Working of IOTA
Page 19 of 25
1. Directed Acyclic Graph (DAG) Structure: The IOTA Tangle utilizes a DAG structure
rather than a linear blockchain. Each transaction approves two previous transactions,
forming a web-like structure. This structure eliminates the need for blocks and miners.
3. Tip Selection and MCMC: When a user initiates a transaction, they choose two tips
(unconfirmed transactions) to validate. The selection is done through a Markov Chain
Monte Carlo (MCMC) algorithm, ensuring a fair and probabilistic choice.
1. Scalability: One of the primary advantages of the IOTA Tangle is its scalability.
Traditional blockchain networks face challenges as the number of participants increases,
leading to potential congestion. The Tangle, however, becomes more efficient as more
participants engage with the network, making it highly scalable.
2. Feeless Transactions: Unlike many blockchain networks that involve transaction fees,
IOTA Tangle allows feeless transactions. This is particularly advantageous for
microtransactions, making it suitable for the Internet of Things (IoT) ecosystem, where
countless small transactions may occur.
4. Fast Confirmation: Transactions on the Tangle are confirmed at a rapid pace. As more
transactions occur, the network's ability to confirm transactions increases, providing near-
instantaneous validation.
Page 20 of 25
Disadvantages of IOTA Tangle:
1. Security Concerns (in the past): In the past, there have been security concerns related to
IOTA. Vulnerabilities were identified and exploited, leading to the network's temporary
shutdown. However, the IOTA Foundation has been actively working to address these
issues and enhance the platform's security.
2. Adoption Challenges: While IOTA holds great potential, widespread adoption is crucial
for its success. Achieving mass adoption can be challenging, especially when dealing with
established technologies like traditional blockchains.
C. Hedera
Until now, we have discussed the closed ecosystem of Hashgraph, its technical workings, and
how it claims to be fast, secure, and fair. However, the biggest roadblock to the Hashgraph is
its private nature. It is enterprise ready.
Meet Hedera Hashgraph, a Hashgraph network that is public and takes advantage of Hashgraph
consensus algorithm. It takes full utilization of asynchronous Byzantine Fault-
Tolerant Algorithm(aBFT). It offers guaranteed Byzantine fault-tolerance for replicated state
machines.
Hedera Hashgraph establishes its idea on the top of Byzantine-Fault Tolerant (BFT)
consensus(aBFT). The improved model will ensure that businesses can bring more value by
using Hedera Hashgraph. It is also managed by the Hedera Hashgraph Council. The ultimate
goal is to provide public access to Hashgraph capabilities and make the public utilize a secure
and fast system for distributed ledger purposes.
Under the hood, both Hashgraph and the Hedera Hashgraph are similar. They both utilize the
“gossip about gossip” protocol, which utilizes aBFT agreement to reach consensus. It also uses
virtual voting, which means that there is no need for a central authority. It is entirely
decentralized and offers a trustless environment for its uses.
The use of aBFT ensures fairness in all conditions — even when the network contains
malicious actors. All the properties of Hashgraph are utilized within Hedera Hashgraph.
However, to make sure that the Hedera Hashgraph is protected from DDoS attacks, the
consensus algorithm doesn’t use the leader format.
With Hedera Hashgraph, you can build on trust. Some of the key applications of Hedera
Hashgraph include cryptocurrency, smart contracts, and file services.
Services offered by Hedera Platform
With Hedera platform, you can enable some key services including the following:
Page 21 of 25
▪ Cryptocurrency: Allows intermediates to use the network for cryptocurrency
payments and let them take advantage of lower cost and simple design.
▪ Smart Contracts: You can also build smart contracts on top of the Hedera
platform. To develop smart contracts, you need to use Solidity. As a developer,
you can do atomic swaps, create assets, and deploy completely new applications.
▪ File Services: You can also use the Hedera platform to do file services, i.e.,
verify files. It is also a GDPR complaint.
Governance
The governance in the Hedera Hashgraph works differently. It can be divided into two tiers –
The Governing Board and the Open Consensus.
The Governing Board is a centralized control system which is not an ideal solution for any
network that wants to offer its services for the distributed ledger. The community is also not
happy with its approach, and it is still one of the most significant criticisms of the Hedera
Hashgraph.
The Open Consensus, on the other hand, is the consensus mechanism that we already discussed
above. It governs how nodes can join and become part of the network, and also make it more
decentralized. To ensure that there is a proper weighted voting model, it utilizes Proof-of-
Stake. It ensures that collision is adequately mitigated, and there is also an appropriate incentive
for users to run nodes.
▪ Internet Layer: The layer takes care of the communication between computers
on the internet. It deploys TCP/IP connections with TLS encryption.
▪ Hashgraph Consensus Layer (Middle): The middle layer contains the nodes
which participate in the network. These nodes take part in the consensus method
using the Hashgraph consensus algorithm and gossip protocol.
▪ Services Layer: The topmost layer has their its own subgroups – File
Storage, Cryptocurrency, and Hashgraph Smart Contracts.
The nodes earn the cryptocurrency for taking participating in the network. It is a native currency
and ensures that the users get their incentive for participating.
The file storage, on the other hand, is Merkle-based. Moreover, if you are a developer, then
you can also use Solidity as it is supported by the Hedra. Lastly, it offers smart contract support
on the top of the network — giving you the ability to create scalable dApps.
Page 22 of 25
o Hedera Java SDK – SDK in Java for Hedera Hashgraph. It is maintained by Hedera LLC.
o Hedera Rust SDK – SDK in Rust, community-maintained
o Hedera Go SDK – SDK in Go, community-maintained
o Hedera Test – Test Hedera in action
o Hedera Java Keygen tool – A keygen tool used in Hedera Hashgraph for managing
ED25519 key pairs. It is a command-line utility.
D. Holochain
What is Holochain?
Unlike traditional blockchain systems, which heavily rely on energy-intensive processes like
mining, Holochain takes a more sustainable approach. For instance, Bitcoin's Proof-of-Work
consensus algorithm demands substantial computational power to solve cryptographic puzzles,
leading to significant energy consumption. In contrast, Holochain utilizes the energy-efficient
Go programming language, allowing applications to be written in Lisp or JavaScript.
Features of Holochain
• Energy Efficiency: Holochain addresses the energy consumption issues associated with
traditional blockchain platforms, offering a more sustainable and eco-friendly solution.
• Better Model for Transfer and Storage: Introduces an improved model for data transfer
and storage, enabling edge devices like smartphones to seamlessly integrate into the
network, fostering scalability.
• Holochain Apps: These distributed applications strike a balance between public and
private networks, offering a unique approach within an open-source framework.
• Uniquely Configurable: Provides each app with its own network, allowing
customization of standards, protocols, consensus algorithms, scalability, latency,
throughput, resilience, governance, and privacy.
• Uniquely Connectable: Different apps can bridge among themselves using native APIs,
ensuring secure and integrated connectivity even when offline or partitioned.
Page 23 of 25
• Microservices Architecture: Holochain relies heavily on microservices, making each
app a collection of standalone microservices for improved ecosystem and future-proofing.
• Secure: The architecture ensures app reliability by confining each app to its ecosystem,
providing developers with flexibility in setting security restrictions and utilizing
cryptography for tamper resistance and data proof-of-authorship.
• Scalable: Holochain offers scalability by allowing new apps to join the network and
contribute to computing power, leveraging Rust programming language for
WebAssembly compilation. The architecture's scalability is also influenced by the local
number of peers, ensuring stability with reduced network latency and sensitivity.
To give you a good idea about its usability, let’s go through the list of apps that you can create
using Holochain technology.
▪ Collaborative apps
▪ Platform-related apps
▪ Social media apps
▪ Relationship management apps
▪ Supply chain-oriented apps
▪ Resource management apps
▪ Reputation systems
The wide use-case makes Holochain technology a valid alternative to Ethereum, which is also
a dApp platform. It is not the only alternative Distributed Ledger technology (DLT) out there.
We also covered Hashgraph which offers a viable alternative DLT solution over the blockchain.
Holochain Architecture
Page 24 of 25
It achieves it with the help of Shared Data Integrity. It is a way of handling data in peer-
to-peer systems where it is much more challenging to secure data compared to
centralized data.
With shared data integrity, it offers robust data security without bringing limitations such
as high computation demand.
The key component here is the distributed hash table (DHT), which provides great value
to the ecosystem. It offers eventual consistency while ensuring that the data is propagated
safely through the network. This way, each peer is accountable for his actions.
The architecture is also efficient as it ensures that the overhead is as feasible as possible.
In fact, phones or other devices can join the network and improve computing power.
Page 25 of 25