• Keine Ergebnisse gefunden

Explain Byzantine failure: types, why is it different from the others 4

N/A
N/A
Protected

Academic year: 2021

Aktie "Explain Byzantine failure: types, why is it different from the others 4"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Prüfung: Blockchain Technologies Prüfer: Prof. Dr. Florian Tschorsch Semester: Sommersemester 2020

1. Serialization vs. 2PL

 How do they work

 What are the weaknesses

 Example scenario: one node fails (any node). Probability is equal. Which alrorithm is more dangerous in this scenario? (Answer: 2PL)

2. Types of Failures:

 Fail-stop

 Fail-recover

 Byzantine

3. Explain Byzantine failure: types, why is it different from the others 4. Problem of Byzantine general and lieutenants

5. Oral messaging algorithm: apply on the example:

 Nodes: A, B, C, D

 Messages: North, West, South, East

 A, B want to go North

 C wants to go South

 D is Byzantine: he tells A and B to go East, and to C – South

 Choose any of the nodes to be a commander

 Apply the oral messaging algorithm and solve the problem 6. Scalability

 Bitcoin problems regarding scalability My answer: transaction rate

 Transaction rate formula + explanation.

 What happens if we make the block size bigger or reduce the block generation time?

 Why shouldn’t we do it (give exact explanations)

Couldn’t explain very good why is it bad if the block size will increase so he asked on an example of a network what will happen if one part of the network will be busy propagating a big block?

Answered: an attacker could have more time to propagate his false information/block in the rest of the network. Mentioned selfish mining.

 Explain selfish mining and reasons behind it. Why doesn’t the selfish miner publish his block immediately after mining it?

Referenzen

ÄHNLICHE DOKUMENTE

Now that you are sure that the system comes up correctly under AMOS/L 1.3, you can make your LSYS.MON file the default so that the system will use this file to boot when you

COmmunications Management User's Guide binder for more specific information about remote access connections and setups using the optional AT&T UNIX PC

Of course most applications are sharable so the savings would not be as great if for example you had one user going directly into Fortune:Word for example

Since statistics is the science of data, we welcome research on both statistical theory of networks and the statistical modeling of data arising from network

The authors detail the problems in four domains – (i) funding of teaching and research; (ii) the ‘market’ for political science education; (iii) career development, salaries, and

The parameters you can change in set up include communication and printing features, and also such functions as terminal control mode, display characteristics,

CP/M has several control characters and single-key commands that allow you to edi t a complex command line before you send it to the computer with a

Rahel Brunschwiler