4.2 Algorithm
Last updated
Last updated
Hybrid POW+A blockchain, as the term suggests, is a PoW-based hybrid blockchain. As mentioned above, private blockchain-style control is followed, but transactions such as data disclosure and block security follow the public blockchain format. POW+A restricts node participation for approximately three years after Genesis block creation. This restriction is on the number of nodes, not the right to participate. In fact, by limiting mining participation for the first three years, POW+A can provide sufficient rewards for forming the nodes needed to operate the initial mainnet.
As a result, nodes that take part in POW+A's PoW throughout the lifetime of the private blockchain will receive a token reward that is comparatively higher than their node payout. They will now have hope for a lucrative income down the road.
DANGNN mainnet is a decentralized network with enhanced mining security. Because it was forked from the existing stable network, Ethereum, it is safely compatible with the current Ethereum Virtual Machine. So you can use any application or robustness contract, like Ethereum. The consensus mechanism is Ethash POW+A (PoW+ Authority) and uses the default algorithm, the GHOST algorithm. The Ethereum algorithm uses a base currency (DGC). DGC units have been moved to 10^16, a lower unit than the ETHER unit (10^18). The design of each DANGNN token block is as follows:
Mining is done at an address that has mining rights. Mining rights are added through one of the following: The first is the address and voting system contributed or donated to the DANGNN Foundation from the Genesis block. Everything is recorded on the blockchain through a voting system. Each address that creates a block while holding mining rights agrees to it. The other POW+A must be executed as permission for proof-of-work. POWs are used to create blocks to build the network. Because POWs use high computing power, it is usually relatively inefficient and difficult to prove their work. However, mining with low hashes is reliable because it can be done in a secure system with POW+A. This makes proof of work possible with low computing power. It also protects against any attacks.