dc.contributor.advisor | 陳恭 | zh_TW |
dc.contributor.advisor | Chen, Kung | en_US |
dc.contributor.author (Authors) | 柯炯名 | zh_TW |
dc.contributor.author (Authors) | Ko, Juing-Ming | en_US |
dc.creator (作者) | 柯炯名 | zh_TW |
dc.creator (作者) | Ko, Juing-Ming | en_US |
dc.date (日期) | 2022 | en_US |
dc.date.accessioned | 5-Oct-2022 09:01:05 (UTC+8) | - |
dc.date.available | 5-Oct-2022 09:01:05 (UTC+8) | - |
dc.date.issued (上傳時間) | 5-Oct-2022 09:01:05 (UTC+8) | - |
dc.identifier (Other Identifiers) | G0109356028 | en_US |
dc.identifier.uri (URI) | http://nccur.lib.nccu.edu.tw/handle/140.119/142066 | - |
dc.description (描述) | 碩士 | zh_TW |
dc.description (描述) | 國立政治大學 | zh_TW |
dc.description (描述) | 資訊管理學系 | zh_TW |
dc.description (描述) | 109356028 | zh_TW |
dc.description.abstract (摘要) | 區塊鏈技術從比特幣的問世到以太坊的研發,迄今已經10幾年過去,隨著區塊鏈技術發展日漸成熟以及開發者社群的日漸茁壯,越來越多實務上區塊鏈的運用被提出以及探討,建構區塊鏈的四大特性也在不斷演進的過程中發展出不一樣的呈現方式。其中認許式區塊鏈便是在最小程度影響到去中心化此特性的同時,控管使用者對於區塊鏈的訪問以維持該區塊鏈的安全性。然而隨著各種運用層出不窮,鮮少有開發者抑或研究者注重在區塊鏈系統維運議題。本文從一次實務案例作為出發點,探討認許式區塊鏈在系統維運、節點同步維護上可能面臨的問題。最後,將維運議題歸納出系統架構以及系統環境文件兩項重點,而節點同步維護上則歸納出記憶體大小、認證節點數量以及容錯空間此三項重點。 | zh_TW |
dc.description.abstract (摘要) | It has been more than 10 years since the advent of blockchain technology which is from Bitcoin to the development of Ethereum. As the development of blockchain technology matures and the developer community grows stronger, more and more practical blockchain applications have been established. The applications have been proposed and discussed, and the four characteristics of building the blockchain have also developed different presentation methods in the process of continuous evolution. Among them, the permission blockchain controls the user`s access to the blockchain to maintain the security of the blockchain while minimizing the impact on the decentralization feature. However, with the emergence of various applications, few developers or researchers focus on the maintenance and operation of a blockchain systems. This thesis takes a practical case as the starting point to discuss the issues that the permission blockchain may face in system maintenance and node synchronization maintenance. Finally, the maintenance and operation issues are summarized into two key points: system architecture and system environment files, while node synchronization maintenance is summarized into three key points: memory size, number of authentication nodes, and fault tolerance space. | en_US |
dc.description.tableofcontents | 第一章、緒論 1第一節、研究背景與動機 1第二節、研究目的 2第三節、研究貢獻與限制 2第二章、技術背景及文獻回顧 3第一節、區塊鏈 3第二節、共識機制 4一、工作量證明(Proof of Work) 5二、權益證明(Proof of Stake) 5三、權威證明(Proof of Authority) 6第三節、以太坊 7一、Go-Ethereum 7二、節點 8三、同步機制 9第四節、認許式區塊鏈(PERMISSIONED BLOCKCHAINS) 9一、私有鏈(Private Blockchain) 10二、聯盟鏈(Consortium Blockchain) 11第五節、小結 11第三章、個案說明 13第一節、區塊鏈常見系統架構 13一、使用者 13二、後台主機 14三、區塊鏈 14第二節、個案系統架構 15一、系統架構 15二、系統區塊鏈架構 16第三節、個案案例 17一、系統議題 18二、區塊鏈同步議題 18三、案例小結 19第四章、實驗設計 20第一節、錯誤歸納 20一、Sanitizing cache to Go’s GC limit 21二、Truncating freezer table 21三、Truncating ancient chain 22四、小結 22第二節、實驗設計 23一、實驗目的 23二、實驗設計 23第五章、實驗結果與討論 26第一節、實驗結果 26第二節、討論 27一、記憶體 27二、認證節點 28第六章、結論與未來研究 29第一節、結論 29一、系統層面 29二、區塊鏈層面 29第二節、未來研究 30一、限制 30二、未來研究 30參考文獻 32 | zh_TW |
dc.format.extent | 1948161 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.source.uri (資料來源) | http://thesis.lib.nccu.edu.tw/record/#G0109356028 | en_US |
dc.subject (關鍵詞) | 認許式區塊鏈 | zh_TW |
dc.subject (關鍵詞) | 系統維運 | zh_TW |
dc.subject (關鍵詞) | 認證節點 | zh_TW |
dc.subject (關鍵詞) | 同步 | zh_TW |
dc.subject (關鍵詞) | Permissioned blockchains | en_US |
dc.subject (關鍵詞) | System maintenance | en_US |
dc.subject (關鍵詞) | Authentication nodes | en_US |
dc.subject (關鍵詞) | Synchronization | en_US |
dc.title (題名) | 基於以太坊的認許式區塊鏈之維運議題探討 | zh_TW |
dc.title (題名) | An Investigation of the Operation and Maintenance Issues of Ethereum-Based Permissioned Blockchains | en_US |
dc.type (資料類型) | thesis | en_US |
dc.relation.reference (參考文獻) | 1.Buterin, V. (2013). "A next-generation smart contract and decentralized application platform."2.Dwork, C. and M. Naor (1993). Pricing via Processing or Combatting Junk Mail, Springer Berlin Heidelberg: 139-147.3.Hu, Q., et al. (2020). Sync or Fork: Node-Level Synchronization Analysis of Blockchain, Springer International Publishing: 170-181.4.Jakobsson, M. and A. Juels (1999). Proofs of Work and Bread Pudding Protocols(Extended Abstract), Springer US: 258-272.5.Kufeoglu, S. and M. Ozkuran (2019). Energy Consumption of Bitcoin Mining.6.Nakamoto, S. (2008). "Bitcoin: A peer-to-peer electronic cash system." Decentralized Business Review: 21260.7.Nethermind (n.d.) Sync mode Retrieved September 1, 2022, from https://docs.nethermind.io/nethermind/ethereum-client/sync-modes8.Ethereum foundation blog(n.d.) Geth v1.10.0 Retreved September 5, 2022 from https://blog.ethereum.org/2021/03/03/geth-v1-10-09.Ethereum foundation blog(n.d.) Geth v1.9.0 Retreved September 5, 2022 from https://blog.ethereum.org/2021/03/03/geth-v1-10-010.Ethereum org(n.d.) Glossary Retreved September 5,2022 from https://ethereum.org/en/glossary/#state11.Etherscan(n.d.) Ethereum node tracker Retreved September 5,2022 from https://etherscan.io/nodetracker12.Ethereum org(2022) ETHEREUM VIRTUAL MACHINE (EVM) Retreved September 5,2022 from https://ethereum.org/en/glossary/#state | zh_TW |
dc.identifier.doi (DOI) | 10.6814/NCCU202201619 | en_US |