Blockchain: Architecture, Features, Challenges, and Applications

Verified

Added on  2023/06/13

|10
|2464
|67
AI Summary
This article discusses the architecture, features, challenges, and applications of blockchain technology. It covers the peer-to-peer network architecture, increased capacity, better security, immutability, and faster settlement. It also highlights the challenges of initial costs, integration with legacy systems, energy consumption, public perception, and privacy and security. The article concludes with the applications of blockchain in currency and smart contracts, and the socio-technical aspects of the technology.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORKED APPLICATION MANAGEMENT
NETWORKED APPLICATION MANAGEMENT
Name of Student
Name of University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORKED APPLICATION MANAGEMENT
Table of Contents
Introduction:...............................................................................................................................2
Part 1: Block chain.....................................................................................................................2
Architecture............................................................................................................................2
Features..................................................................................................................................2
Increased capacity..............................................................................................................3
Better security....................................................................................................................3
Immutability.......................................................................................................................3
Faster settlement.................................................................................................................4
Challenges..............................................................................................................................4
Initial costs.........................................................................................................................4
Integration with legacy systems.........................................................................................4
Energy consumption...........................................................................................................4
Public perception................................................................................................................5
Privacy and security...........................................................................................................5
Part2 Applications of Block chain.............................................................................................5
Currency.................................................................................................................................5
Smart contracts.......................................................................................................................6
Part2 Socio technical aspects.....................................................................................................6
Conclusion..................................................................................................................................7
Reference....................................................................................................................................7
Document Page
2NETWORKED APPLICATION MANAGEMENT
Introduction:
The blockchain is one of the most advanced and growing technology in the world now
a days. Block chain can be defined as the shared public decentralized ledger which is used in
all the type of the crypto currencies. In order words its works for recording transmission
transaction which occurs across many computer systems so that the records cannot be altered,
tampered without the alteration of the subsequent blocks of thee collusion network. This
paper will discuss about the architectures of the block chain, importance and features of the
block chain concept and the basic working application of the blockchain process.
Part 1: Block chain
Architecture
Block chain architecture is a type of network architecture which does not contain a
central server [1]. It is a mesh type of network where the computers are connected to each
other instead of a central computer [2]. The computers of a block chain work with a shared
state of data and adhere certain constraints implied on the data [3]. This is basically an
algorithmic and accurate globally spread ledger. The core application of block chain is
transaction database modeled as a safe ledger. It is mainly used for the crypto currency
transactions like bit coin, Montero and so on [4]. The block chain has a peer to peer
architecture for transactions without any middle organization like bank[5]. The architecture is
based on various blocks of data and the transaction is done.
Features
The four main features of block chain are
Document Page
3NETWORKED APPLICATION MANAGEMENT
Increased capacity
The block chain is a peer to peer technology which increases the capacity of whole
network. Many computers work together connectively has higher processing power than
centralized servers[6]. An example of increasing network capacity is Folding coin project
started by Stanford university. It created a distributed supercomputer that stimulated protein
folding for research related to medical technology. The research required very fast computers
as the proteins fold very fast and it can not be computed using single computers with low
processing power. Instead of using a costly supercomputer the work was done using several
low cost computers by distributed computing.
Better security
Block chain has high security because there is no single server which can be point of
failure and can be compromised by hacking[7]. The network is difficult to shut down in a
distributed computing system like block chain. It may be possible to hack individual key but
the whole network can not be compromised. Block chains are secured by many computers
that run nodes and confirm transactions on the networks[8]. Public block chains use their own
currency as an incentive mechanism to reward miners for securing transactions on the ledger.
Bitcoin system is one of the most secured example of crypto currency based on block chain
technology.
Immutability
The block chains have one of the most important propositions i.e creating immutable
ledgers. A centralized database may face issues like being corrupted and have to rely on third
party venders to keep the information secured[9]. Block chains like bitcoin keep the ledger in
a continuous state of forward momentum because millions of dollars worth of hashing power
ensure new transactions that are kept record of.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORKED APPLICATION MANAGEMENT
Faster settlement
The traditional banking system is very slow and generally has red tape culture
involved in most of the international transactions[10]. Block chains can usually settle the
transactions in short time and almost instantly. This can save money and time for entire
industry.
Challenges
The few challenges that block chain technology should overcome before it can be adopted in
huge scale are
Initial costs
The block chain if adopted can give long term benefits but on the contradiction it has
high cost of implementation. The block chain has high efficiency and productivity, timeliness
and low cost of maintenance [11]. The software used to maintain block chain technology is
generally used, made by some specific development companies for some specific companies.
The specific software development and operation needs trained personnel which is also
costly. The organizations have to pay huge salary to the personnel for the work related to
block chain [12]. So it is very difficult for a medium or small company to afford block chain
technology.
Integration with legacy systems
In order to implement the block chain the companies have to completely replace the
legacy systems. The problem lies in implementing the Block chain as it cannot cater all the
needs of an organization. As a result a major change has to be made to the existing system.
The expenses of such implementation are huge and also complicated.
Document Page
5NETWORKED APPLICATION MANAGEMENT
Energy consumption
The crypto currency technology of bit coin and ethereal consumes huge power for
mining so the block chain technology is very much energy consuming technology. The proof-
of-work mechanism is the reason of the high energy consumption. Apart from the energy
required to operate the computers huge energy is also needed to cool down the computers.
Public perception
The block chain technology is still alien to common public and difficult to make a
mainstream move. The public perception presently, block chain technology is nearly
synonymous with Bit coin. Though the value of bit coin continues to rise to unprecedented
levels, there is still an association of the crypto currency with the shadowy dealings of money
laundering, black market trade and other illegal activities.
Privacy and security
Block chains are according to its design are actually publicly visible. The Bit coin
Block chain is visible to all the users who have made transactions in the network. The
government and the corporations should be careful about protection and access of data as in
place of sensible data Block chain technology cannot be used.
Part2 Applications of Block chain
Currency
The block chain is the backbone of crypto currency technology it is the technology
used for bit coin and ether which is currency of ethereal [13]. The insurance claiming process
is also simplified by use of the block chain. The crypto currencies are based on the block
chain technology. The global payments sector is error-prone, costly, and open to money
laundering. It takes days if not longer for money to cross the world [14]. The block chain is
Document Page
6NETWORKED APPLICATION MANAGEMENT
already providing solutions with remittance companies such as Abra, Align
Commerce and Bitspark that offer end-to-end blockchain powered remittance services[15].
In 2004, Santander became one of the first banks to merge blockchain to a payments app,
enabling customers to make international payments 24 hours a day, while clearing the next
day.
Smart contracts
Block chain has helped to implement the smart contract system without the
involvement of any third party and made it hassle free. The technology basically based on the
concept of vendor machine where the buyer or seller can directly do business. Smart contract
enforces the same obligation automatically like a traditional pen paper based contract. Smart
contracts provide the users full autonomy and also it is trusted[16]. The safety of smart
contracts is maintained by cryptography. Hacking attacks can not affect the smart contracts.
The smart contract is less time consuming compared to the conventional pen paper based
contracts[17]. Automated contracts are accurate and do not contain any error like manual
contracts.
Part2 Socio technical aspects
The blockchain reduces the notary cost. It has made the transactions faster and
secured without any involvement of any third party like banking system or any middle
agency.. Cryptographically signed proofs of existence can be used to enforce the authorship
and ownership of data (in the latter case they are called “smart properties”). In the case, we
need to verify if any illegitimate registration ever occurred and we want to discourage anyone
willing to register illegitimately data they should not own, the blockchain transparency makes
a no-brainer to get the job done. Property right title could not be enforced easier nowadays.
The block chain network is difficult to close down in a distributed computing system like

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NETWORKED APPLICATION MANAGEMENT
block chain. It may be possible to hack individual key but the whole network can not be
hacked[18]. Block chains are secured by many computers that run nodes and confirm
transactions on the networks. Public block chains use their own currency as an incentive
mechanism to reward miners for securing transactions on the ledger. The distributed
computing
Conclusion:
Thus, concluding the topic it can be said that the concept of the blockchain is one of
the major thing technology which is becoming more and more advanced with passing days.
The concept has not only helped the crypto currency owner to keep a track of the transactions
but has also helped them in securing the data from the foul players of the internet. The
concept of this is rising day by day as more and more people are learning of the concept.IT
has also helped the society to understand the concept and the working principal of the system.
The cryptography hashing helps to encrypt the transactions and keep the sensible data and
transaction safe from hacking attempts. . It is an important feature of the crypto currencies to
be visible to the users.
Reference
[1]M. Swan, Blockchain. Sebastopol, CA: O'Reilly, 2015.
[2]Zyskind, G. and Nathan, O., May. Decentralizing privacy: Using blockchain to protect
personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE
2015.
[3]Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C., May. Hawk: The blockchain
model of cryptography and privacy-preserving smart contracts. In Security and Privacy (SP),
2016 IEEE Symposium on (pp. 839-858). IEEE,2016.
Document Page
8NETWORKED APPLICATION MANAGEMENT
[4]Eyal, I., Gencer, A.E., Sirer, E.G. and Van Renesse, R., March. Bitcoin-NG: A Scalable
Blockchain Protocol. In NSDI(pp. 45-59),2016
[5]Cachin, C., July. Architecture of the Hyperledger blockchain fabric. In Workshop on
Distributed Cryptocurrencies and Consensus Ledgers, 2016.
[6]Iansiti, M. and Lakhani, K.R.. The truth about blockchain. Harvard Business
Review, 95(1), pp.118-127, 2017
[7] Swan, M., March. Blockchain thinking: The brain as a dac (decentralized autonomous
organization). In Texas Bitcoin Conference (pp. 27-29), 2015.
[8] Underwood, S., Blockchain beyond bitcoin. Communications of the ACM, 59(11), pp.15-
17, 2016.
[9] Korpela, K., Hallikas, J. and Dahlberg, T., January. Digital supply chain transformation
toward blockchain integration. In proceedings of the 50th Hawaii international conference
on system sciences, 2017
[10] Rückeshäuser, N., Do we really want blockchain-based accounting? Decentralized
consensus as enabler of management override of internal controls, 2017.
[11] Zheng, Z., Xie, S., Dai, H.N. and Wang, H., Blockchain challenges and opportunities: A
survey. Work Pap.–2016, 2016
[12] Porru, S., Pinna, A., Marchesi, M. and Tonelli, R., May. Blockchain-oriented software
engineering: challenges and new directions. In Proceedings of the 39th International
Conference on Software Engineering Companion (pp. 169-171). IEEE Press, 2017.
Document Page
9NETWORKED APPLICATION MANAGEMENT
[13] Herrera-Joancomartí, J. and Pérez-Solà, C., September. Privacy in bitcoin transactions:
new challenges from blockchain scalability solutions. In Modeling Decisions for Artificial
Intelligence (pp. 26-44). Springer, Cham, 2016.
[14] Nofer, M., Gomber, P., Hinz, O. and Schiereck, D., Blockchain. Business & Information
Systems Engineering, 59(3), pp.183-187, 2017.
[15] Lin, I.C. and Liao, T.C., A Survey of Blockchain Security Issues and Challenges. IJ
Network Security, 19(5), pp.653-659, 2017.
[16] Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C., May. Hawk: The
blockchain model of cryptography and privacy-preserving smart contracts. In Security and
Privacy (SP), 2016 IEEE Symposium on (pp. 839-858). IEEE, 2016.
[17] Christidis, K. and Devetsikiotis, M., Blockchains and smart contracts for the internet of
things. IEEE Access, 4, pp.2292-2303, 2016.
[18] Luu, L., Chu, D.H., Olickel, H., Saxena, P. and Hobor, A., October. Making smart
contracts smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and
Communications Security (pp. 254-269). ACM, 2016.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]