Do you want to publish a course? Click here

How Much Communication Resource is Needed to Run a Wireless Blockchain Network?

82   0   0.0 ( 0 )
 Added by Hao Xu
 Publication date 2021
and research's language is English




Ask ChatGPT about the research

Blockchain is built on a peer-to-peer network that relies on frequent communications among the distributively located nodes. In particular, the consensus mechanisms (CMs), which play a pivotal role in blockchain, are communication resource-demanding and largely determines blockchain security bound and other key performance metrics such as transaction throughput, latency and scalability. Most blockchain systems are designed in a stable wired communication network running in advanced devices under the assumption of sufficient communication resource provision. However, it is envisioned that the majority of the blockchain node peers will be connected through the wireless network in the future. Constrained by the highly dynamic wireless channel and scarce frequency spectrum, communication can significantly affect blockchains key performance metrics. Hence, in this paper, we present wireless blockchain networks (WBN) under various commonly used CMs and we answer the question of how much communication resource is needed to run such a network. We first present the role of communication in the four stages of the blockchain procedure. We then discuss the relationship between the communication resource provision and the WBNs performance, for three of the most used blockchain CMs namely, Proof-of-Work (PoW), practical Byzantine Fault Tolerant (PBFT) and Raft. Finally, we provide analytical and simulated results to show the impact of the communication resource provision on blockchain performance.



rate research

Read More

A pair of quantum observables diagonal in the same incoherent basis can be measured jointly, so some coherence is obviously required for measurement incompatibility. Here we first observe that coherence in a single observable is linked to the diagonal elements of any observable jointly measurable with it, leading to a general criterion for the coherence needed for incompatibility. Specialising to the case where the second observable is incoherent (diagonal), we develop a concrete method for solving incompatibility problems, tractable even in large systems by analytical bounds, without resorting to numerical optimisation. We verify the consistency of our method by a quick proof of the known noise bound for mutually unbiased bases, and apply it to study emergent classicality in the spin-boson model of an N-qubit open quantum system. Finally, we formulate our theory in an operational resource-theoretic setting involving genuinely incoherent operations used previously in the literature, and show that if the coherence is insufficient to sustain incompatibility, the associated joint measurements have sequential implementations via incoherent instruments.
Blockchain protocols come with a variety of security guarantees. For example, BFT-inspired protocols such as Algorand tend to be secure in the partially synchronous setting, while longest chain protocols like Bitcoin will normally require stronger synchronicity to be secure. Another fundamental distinction, directly relevant to scalability solutions such as sharding, is whether or not a single untrusted user is able to point to *certificates*, which provide incontrovertible proof of block confirmation. Algorand produces such certificates, while Bitcoin does not. Are these properties accidental? Or are they inherent consequences of the paradigm of protocol design? Our aim in this paper is to understand what, fundamentally, governs the nature of security for permissionless blockchain protocols. Using the framework developed in (Lewis-Pye and Roughgarden, 2021), we prove general results showing that these questions relate directly to properties of the user selection process, i.e., the method (such as proof-of-work or proof-of-stake) which is used to select users with the task of updating state. Our results suffice to establish, for example, that the production of certificates is impossible for proof-of-work protocols, but is automatic for standard forms of proof-of-stake protocols. As a byproduct of our work, we also define a number of security notions and identify the equivalences and inequivalences among them.
When the linear measurements of an instance of low-rank matrix recovery satisfy a restricted isometry property (RIP)---i.e. they are approximately norm-preserving---the problem is known to contain no spurious local minima, so exact recovery is guaranteed. In this paper, we show that moderate RIP is not enough to eliminate spurious local minima, so existing results can only hold for near-perfect RIP. In fact, counterexamples are ubiquitous: we prove that every x is the spurious local minimum of a rank-1 instance of matrix recovery that satisfies RIP. One specific counterexample has RIP constant $delta=1/2$, but causes randomly initialized stochastic gradient descent (SGD) to fail 12% of the time. SGD is frequently able to avoid and escape spurious local minima, but this empirical result shows that it can occasionally be defeated by their existence. Hence, while exact recovery guarantees will likely require a proof of no spurious local minima, arguments based solely on norm preservation will only be applicable to a narrow set of nearly-isotropic instances.
115 - Axel Schmidt 2019
One possible explanation for the proton form factor discrepancy is a contribution to the elastic electron-proton cross section from hard two-photon exchange (TPE), a typically neglected radiative correction. Hard TPE cannot be calculated in a model-independent way, but it can be determined experimentally by looking for deviations from unity in the ratio of positron-proton to electron-proton cross sections. Three recent experiments have measured this cross section ratio to quantify hard TPE. To interpret the results of these experiments, it is germane to ask: How large of a deviation from unity is necessary to fully resolve the form factor discrepancy? With a minimal set of assumptions and using global fits to unpolarized and polarized elastic scattering data, I estimate the necessary size of the TPE correction in the kinematics of the three recent experiments and compare to their measurements. I find wide variation when using different global fits, implying that the magnitude of the form factor discrepancy is not well-constrained. The recent hard TPE measurements can easily accommodate the hypothesis that TPE underlies the proton form factor discrepancy.
The data collected from Internet of Things (IoT) devices on various emissions or pollution, can have a significant economic value for the stakeholders. This makes it prone to abuse or tampering and brings forward the need to integrate IoT with a Distributed Ledger Technology (DLT) to collect, store, and protect the IoT data. However, DLT brings an additional overhead to the frugal IoT connectivity and symmetrizes the IoT traffic, thus changing the usual assumption that IoT is uplink-oriented. We have implemented a platform that integrates DLTs with a monitoring system based on narrowband IoT (NB-IoT). We evaluate the performance and discuss the tradeoffs in two use cases: data authorization and real-time monitoring.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا