How blockchain works step by step?

Ameen Alam
8 min readNov 17, 2022

--

The basic principle behind blockchain is that each transaction is verified by multiple computers on the network, rather than by a single central authority. This verification process is known as consensus. When a new transaction is initiated, it is broadcast to the network of computers. Each computer on the network then verifies the transaction, and if it is valid, they add it to their copy of the blockchain. Once the transaction has been added to the blockchain, it is considered immutable, meaning it cannot be changed or reversed. This is because each subsequent block builds upon the previous one, and changing a single block would require changing all subsequent blocks. The distributed nature of the blockchain means that there is no single point of failure, and if one computer on the network goes down, the others can continue to operate as normal.

How does a blockchain transaction get into the blockchain?

Ledger

A ledger is a digital record of all the transactions made in a blockchain. The ledger is maintained by a network of computers called nodes, and every node has a copy of the ledger. When a new transaction is made, it is broadcast to all the nodes, and each node updates its ledger.

The most common type of blockchain is the Bitcoin blockchain, which uses a proof-of-work consensus algorithm. This algorithm rewards miners for verifying and committing transactions to the blockchain. Other popular consensus algorithms include proof-of-stake, delegated proof-of-stake, and practical byzantine fault tolerance.

Blockchains can be used to store any type of data. The most popular use case for blockchains is a cryptocurrency, but the technology can also be used to store data about smart contracts, identity management, supply chain, and more.

Distributed Ledger Technology

Consensus Protocols

Consensus protocols are mechanisms used to achieve agreement on a single data value amongst a distributed group of nodes. In a blockchain, these protocols are used to achieve consensus on the order and validity of transactions. The most common consensus protocols used in blockchain are based on proof-of-work (PoW) or proof-of-stake (PoS) algorithms.

Proof of Work

Proof-of-Work is the most common consensus algorithm used in blockchain. It is used to achieve consensus on the order and validity of transactions. PoW is a type of algorithm that requires a participant to verify a transaction by expending computational power. The first participant to verify the transaction is rewarded with a block reward, which is typically a portion of the transaction fees.

Proof of Stake

Proof-of-Stake is an alternative consensus algorithm to PoW. It is used to achieve consensus on the order and validity of transactions. PoS is a type of algorithm that requires a participant to verify a transaction by holding a stake in the network. The first participant to verify the transaction is rewarded with a block reward, which is typically a portion of the transaction fees.

Proof of Work and Proof of Stake

Delegated Proof of Stake

In a delegated proof of stake system, the blockchain is secured by delegates who are voted in by the community. The delegates are responsible for validating transactions and are rewarded with a certain amount of cryptocurrency.

Proof of Authority

Proof-of-authority is a type of algorithm used to validate transaction blocks and achieve consensus on a blockchain network. In a proof of authority system, a set of designated “authority” nodes are responsible for validating blocks and maintaining the blockchain. These authority nodes are typically operated by a single entity or a small group of entities, which gives them a high degree of control over the network.

Mining

Blockchain mining is the process of adding and verifying new blocks to the blockchain. This is done by miners, who use specialized hardware and software to solve complex mathematical problems. When a new block is added to the blockchain, the miner who found the solution to the problem is rewarded with a certain amount of cryptocurrency.

This is done by solving a complex mathematical problem called a “proof of work” (POW) and “proof of stack” (POS). The POW or POS is a complex mathematical problem that gets harder to solve as more blocks are added to the blockchain. This is because each new block contains a hash of the previous block. The hash is a unique identifier that links the new block to the previous block. The POW or POS is designed to be very difficult to solve, but easy to verify. This means that it is very difficult for a single miner to add a new block to the blockchain, but it is very easy for everyone else to verify that the new block is correct.

How do I start mining?

Mining can be done by anyone with a computer and an internet connection. You will need to download a mining program and join a mining pool.

What is a mining pool?

A mining pool is a group of miners that work together to find solutions to the POW or POS. The pool combines the resources of all the miners and shares the rewards among the miners according to their contribution.

What is a mining program?

A mining program is a program that runs on your computer and solves the POW or POS. The program then sends the solution to the mining pool.

What is a wallet?

A wallet is a program that stores your coins or tokens. You need a wallet to receive your mining rewards.

Execution Environments

A blockchain execution environment is a computer system that is specifically designed to execute blockchain-based applications. These systems are often used to run smart contracts or to power decentralized applications (dApps).

There are multiple types of execution environments in blockchain, each with its own advantages and disadvantages.

Public blockchains, such as Bitcoin and Ethereum, offer the greatest degree of security and transparency, as all transactions are public and visible on the blockchain. However, public blockchains are also the most expensive and slow, as all transactions must be verified by the network.

Private blockchains, on the other hand, are much faster and cheaper, as they don’t require network consensus. However, private blockchains are less secure and transparent, as they are controlled by a single entity.

Hybrid blockchains, as the name suggests, are a combination of public and private blockchains. They offer the security and transparency of public blockchains with the speed and efficiency of private blockchains.

How secure is a blockchain network?

A blockchain network is very secure. It is difficult to hack because it is decentralized and spread out across many computers. However, the reality is that they can be quite insecure. For example, the Ethereum network has been hacked multiple times. This is because it is based on public-key cryptography, which is not very secure.

It is possible to secure a blockchain network by using different types of cryptography. For example, you could use a digital signature algorithm like ECDSA. You could also use a hashing algorithm like SHA-256. These algorithms are much more secure than public-key cryptography and would make it much more difficult for a hacker to attack a blockchain network.

Cryptography

Cryptography is a technique used to protect data or communication from unauthorized access. It uses mathematical algorithms to encode and decode data. Cryptography is used in a variety of applications, including email, file sharing, and secure communications.

There are two types of cryptography: symmetric and asymmetric. Symmetric cryptography uses the same key to encode and decode data. Asymmetric cryptography uses a different key to decode data that was encoded with a different key.

A common use of symmetric cryptography is the Advanced Encryption Standard (AES). AES is a block cipher that uses a shared secret key to encrypt and decrypt data. AES is used in many applications, including the transport layer security (TLS) protocol.

A common use of asymmetric cryptography is the RSA algorithm. RSA is an algorithm that uses a public key to encrypt data and a private key to decrypt data. RSA is used in many applications, including the SSL/TLS protocol.

Cryptoeconomics

Cryptoeconomics is the study of how economic incentives and disincentives affect behavior in digital communities. It is a relatively new field that combines economics, game theory, and computer science.

Cryptoeconomics is used to design and analyze decentralized systems, such as cryptocurrencies and blockchain protocols. These systems are often designed to incentivize participants to behave in certain ways, such as contributing to the network or maintaining the security of the system.

Cryptoeconomics can be used to understand and predict the behavior of people in digital communities. It can also be used to design policies or mechanisms that encourage or discourage certain behaviors.

Environmental Impact

The environmental impact of blockchain technology is twofold. First, the technology itself has a carbon footprint because it requires energy to run the computers that power the network. Second, the way blockchain transactions are structured means that they can result in a lot of wasted energy.

The impact of blockchain technology on the environment is largely unknown. However, it is possible that the decentralized nature of blockchain could lead to more efficient and sustainable systems. For example, blockchain-based decentralized energy markets could allow for more efficient allocation of resources and could help to reduce pollution.

The main impact comes from the electricity used to power the computers that run the blockchain. However, since blockchain is a distributed system, the overall impact is spread out and is much lower than traditional systems.

Doblier

Doblier Inc

Doblier is a decentralized labor and crowd leadership platform.

The Doblier is designed to provide a trustless and transparent way for people to connect and work together on projects. The Doblier Leadership Network is powered by the Doblier Leadership Token (DLT), which is used to reward users for their contributions to the network. The Doblier Leadership Network is an open-source project and is available to anyone who wishes to contribute.

Doblier is built on the Ethereum blockchain and is compatible with the ERC20 token standard. Doblier allows users to create, issue, and manage digital assets, as well as to exchange them with other users on the platform. Doblier also provides a user-friendly interface that makes it easy to manage your digital assets.

The Doblier platform is currently in beta and is available for use by anyone. However, please note that the platform is still under development and is subject to change.

Doblier is developed by a team of experienced developers and is backed by a strong community of supporters. If you would like to contribute to the development of Doblier, please visit our GitHub repository.

--

--