• NEC Website
  • GitHub
  • Discord Community

Quick Start

  • Get Started

Staking

  • Quick Start
  • Overview
  • Stake on NCOG
  • Run NCOGEarthChain
  • Run Validator Node
  • Running Testnet
  • Operating a private network (fakenet)
  • Running the demo
  • Run a Read-only node
  • Testnet Faucet
  • Run a Full node
  • Run a Testnet read node

API

  • Public API End Points
  • Getting Started
  • Installation
  • GraphQL Schema Basics
  • Schema Structure
  • Implementation Details and Notes

Tutorials

  • Create a ERC721 Contract
  • Deploy a Smart Contract
  • Verify a Deployed Smart Contract
  • Setup MetaMask Wallet
  • Import NFT
  • Create a Local Test Network

Technology

  • Overview
  • Forest Protocal
  • Tolerance to Byzantine Fault (BFT)
  • Proof of Stake
  • Transaction Fees
  • FAQ

Best Practices

  • MANAGE NEC ASSETS WITH LEDGER NANO S
  • How to Navigate NCOG NEC
  • How to Check Your Account Balance
  • How to Receive NCOG Assets
  • How to Send NCOG Assets
  • Leager FAQ
  • Home
  • Docs
  • Technology
  • Tolerance to Byzantine Fault (BFT)

Tolerance to Byzantine Fault (BFT)

Table of Contents
  • Tolerance to Byzantine Fault (BFT)
  • How BFT works?
  • Understanding the Consensus Algorithm with BFT: Why Use BFT?
  • BFT optimizations

Tolerance to Byzantine Fault (BFT) #

The Byzantine Fault Tolerance method has been used as a consensus mechanism. It works well with asynchronous systems, with a time limit on when your request will be granted! BFT was created with minimal overhead in mind, and its application areas include distributed computing and blockchain technology. That means it’s ideal for answering inquiries about how blockchains function or what they’re used for.

What is the definition of Byzantine Fault Tolerance? Byzantine Fault Tolerance (BFT) is a distributed network characteristic that allows it to achieve agreement even when some nodes fail. Collective decision-making reduces the effect of both accurate and incorrect decisions, allowing system failures to be protected against BFT techniques arising from the Byzantine Generals’ Problem.

How BFT works? #

BFT does its best to provide a feasible answer to the Byzantine generals’ difficulty. In this system, nodes are arranged progressively, with one serving as the main node and the rest serving as secondary or backup nodes. If an administrator is malfunctioning on your end, any qualified member may advance from second-tier to first-tier rank. Distributed systems are much more complex than they seem. Majority rules, not simply one-third of nodes, may sign off on new data to guarantee that the system continues to run properly and that transactions are executed. If someone attempts to change anything with a malevolent purpose inside their community’s version (or representation) of reality, it will become forever history – although this percentage falls significantly when a lot is going on!

A realistic Byzantine Fault Tolerant System works best when there are no more fraudulent players in any particular area. The BFT consensus rounds are divided into four stages. The client attempts to contact the principal (leader) node. The request is received by all secondary (backup) nodes from the principal (leader) node. The main and secondary nodes reply to the request by returning a response to the client. The request has been properly fulfilled when a client receives ‘m+1’ answers with the same answer from various nodes in the network, where m is the maximum number of defective nodes permitted. Every 24 hours, the leadership of the consensus protocol is handed from node to node. A backup may take over if their predecessor fails to broadcast a request for two weeks without fail, or if a majority vote of honest network members functioning as part-time leaders is obtained. Who give their time to help those who are seeking a solution concerning the future of truth preservation technology.

Understanding the Consensus Algorithm with BFT: Why Use BFT? #

BFT (Practical Byzantine Fault Tolerance) is a strong consensus mechanism in industry consortiums when corporate members are only partially trustworthy. This method of security strengthens the network. It prevents harmful collaboration between nodes in various regions of responsibility caused by faulty software or human mistake. However, it also means that some parties must have a better understanding than others of what’s going on with their local copy of a project being worked on by all participants as one team, which can make them feel less confident sharing sensitive information due to uncertainty about whether another party will misuse whatever insights were revealed during a discussion between those closely collaborating peers.

BFT optimizations #

The primary limitation of BFT is that it cannot be reduced to a single message. That implies there is no method for us since we only have one transaction and need evidence such as signatures from both sides of the agreement, with a total counterpart equating to BTCs. MAC Codes are more CPU-heavy than RSA digital Signatures, making them perfect candidates given how much simpler things might theoretically be on both sides. RSA digital signatures are only needed to promote a backup replica into the main and for view updates and new views. View updates are not possible until one of two conditions is met: there are no longer any operational primaries in use, or all requests have been handled, whichever comes first! All other communications, on the other hand, need MACs such as SHA256 authentication. Miguel Castro and Barbara Liskov of the Massachusetts Institute of Technology discovered that three-dimensional calculating MACs is three times quicker than computing digital signatures, even when comparing MD5 and RSA 1024 bits, which we now have SHA256 and 2048 bits.

What are your Feelings
Share This Article :
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on November 27, 2023
Forest ProtocalProof of Stake

Powered by BetterDocs

Table of Contents
  • Tolerance to Byzantine Fault (BFT)
  • How BFT works?
  • Understanding the Consensus Algorithm with BFT: Why Use BFT?
  • BFT optimizations
© 2023. NCOG Earth Chain. All Rights Reserved.