Once upon a time, miners could work in solo mining mode. With the exponential increase in complexity, their work in solo mode has become extremely risky.
This predetermined for them actually mandatory participation in joint mining on centralized pools. Both options have their advantages and disadvantages.
Disadvantages of working in a centralized pool:
The main advantage of solo mining is fairness - the correspondence of the reward to the work done. The advantage of centralized pools is the stability of the income received.
With the advent of the Eä blockchain, miners have a new unique opportunity - combining the advantages of solo mining with the advantages of working in a pool.
Disadvantages of Solo Mining
The main disadvantage of solo mining is the low probability of finding a block and getting a reward.
Advantages
Blockchain Eä creates a transparent and comfortable ecosystem for miners.
Solution Architecture
Network Diagram
Creating And Distributing Templates
Network rules:
- New templates are sent to all nodes.
- Each node collects the found solutions into a block.
- Each node selects the appropriate Proof of Work difficulty for its block.
- Once such a Proof of Work hash is found, this block is sent to the network to all nodes.
- Nodes accept a block only if all decisions in it are correct and fully verified.
- Nodes express their agreement with the new data by working on creating the next block in the chain and using the hash of the previous block and the new template as a basis.
The longest chain will always be considered correct, and the nodes will work to lengthen it. If two nodes simultaneously publish different versions of the next block, then one of the other nodes will receive one version earlier, and someone else. In this case, the nodes will work on the node that was received first, but keeping the other branch of the chain in case it becomes longer. The final decision will come as soon as a Proof of Work is received for a new block that will continue any of the branches, and those nodes that were working on the disputed branch of the chain will switch to the correct one.
PPLNS Accrual System
With A Window Length Of 7 Days
The element of luck (chance) of the pool is important in the short term and levels out in the long run.
Therefore, it is important that miners remain active participants in the network for as long as possible. To do this, the network uses a smoothed proportional distribution PPLNS (Pay Per Last N Shares) with a window length of 7 days in the past from the current time, the most efficient for both the pool and stable miners. The participant's payment is calculated as a proportion of the sum of the products of all his shares, multiplied by their complexity, stored in the network's blockchain for the last seven days relative to all the saved shares of all participants, multiplied by their complexity. Payments occur after the pool (node) finds the next block.
Security
Critical solution nodes provide high availability against any th/reat or attack on the network.
Архитектура решения подразумевает технологическое разделения P2P рабочей сети нод и стратум интерфейса
Chain
Work
To increase the level of information security, a digital signature management solution was implemented similar to the work of certification centers.
The traditional pooling model maintains a level of confidentiality where only the parties involved and a trusted intermediary have access to information. The need to publicly announce all transactions precludes this method, but privacy can still be maintained by keeping the public keys anonymous. Public information will be that someone has found a hash, but no information linking a particular hash to a particular person.
Conclusion
Eä Mining Network is a collaborative mining system that is not based on trust. The construction of the structure began with a description of the main problems of centralized pools. We have solved this problem by means of a peer-to-peer network and a Proof of Work scheme to record the public history of all the shares found. Attempts to attack the network, without having most of the resources of the network, to change old records, become computationally impracticable. The network is reliable in its unstructured simplicity. All nodes work independently with little coordination among themselves. They do not need to be identified, as the messages are not routed to any specific location, and are delivered only following the "least cost" principles.