- Blockchain - Conclusion
- Bitcoin - Mitigating Attacks
- Blockchain - Privacy
- Blockchain - Resolving Conflicts
- Blockchain - Payment Verification
- Blockchain - Merkle Tree
- Blockchain - Incentives to Miners
- Blockchain - Network & Mining
- Blockchain - Proof of Work
- Blockchain - Chaining Blocks
- Bitcoin - Mining
- Blockchain - Hashing
- Public Key Cryptography
- Bitcoin - Brief History
- Blockchain - Double Spending
- Blockchain - Introduction
- Blockchain - Home
Blockchain Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Bitcoin - Mining
When Bob creates a purchase request for Lisa, he does not send it to Lisa alone. Rather the request message is broadcasted on the entire network to which he is connected. Bob’s network is depicted in image.
The message goes to all the connected nodes (machines). Some of the nodes in the diagram are marked as miners. These are the machines which run a piece of software for mining the bitcoin message. I will now explain you what this mining means.
Mining Process
As the entire network is widely distributed, every miner in the network is expected to receive multiple messages from multiple vendors at any given period of time. What the miner does is he combines these messages in a single block. This is illustrated in image −
After a block of messages is formed, the miner creates a hash on the block using the hashing function described earper. Now, as you know if any third party modifies the contents of this block, its hash would become invapd. Incidentally, each message is time-stamped so that nobody can modify its chronological order without affecting the block’s hash value. Thus, the messages in the block are perfectly secured from tampering. How this fact is used in securing all the transactions in the network is explained further.
Advertisements