0417 VPN and Blockchain learning summary

PPTP: PPTP by itself doesn’t provide dataencryption, but it has supports multi protocol VPNs with 40 bit or 128 bit. It usesMicrosoft point-to-point encryption.

L2TP: it provides the security of IPsecover tunneling of tunneling protocol. Right now Internet Service Provider also can provide L2TP to their dial-in users.

Data tunneling: means using tunneling toadd another layer 3 address to hide the original ip that produces the data. In somecases, it could be a issue, like in some websites it doesn’t allow some particularIPs from some specific countries, so now you need tunneling protocol to hideyour real IP to access in the websites.

Data integrity: it is important to verify the data hasn’t been changed during the transit.

Data authentication: it is also important to verify the identity of the source that sends the data.

Anti replay: this function is to detect there played data that might be from spoofing with bad means.

===================================================================

BLOCKCHAIN

Cryptocurrency has a “production” role for compensating miners asrewards when they successfully win validating transactions.

It also has a consumption role as paying a small for running smartcontract or a transaction fee on Ripples or Bitcoins.

Token also can be used as a unit of interval values.

Its just like currencies, but it has a friction whenever every time itis into real world of traditional currency.

Software infrastructure.

Blockchain is like well-designed software, powered by servers as ifthey are bound together to operate but physically located around the world, andwhat is really amazing is the developers don’t need to set up these servers.

As contrasted with web where HTTP request is sent to server, withblockchain apps, the network makes request to blockchain.

0419

Tunneling requires 3 protocols


Passenger:Original data

Encapsulating protocol

Carrier protocol

For site-to-site VPNs, the encapsulating protocol are usually IPsec and Generic Routing Protocol.

For remote access VPNs, usually use PPP protocol, part of TCP/IP stack, point-to-point protocol.

Authentication, authorization and Accounting. Used for more secure access, a validate username and passwords are required. They can be stored in device itself or AAA external server which can provide authentication to other databases such as Window NT, Novell, LDAP and so on.?

==================================================================

Blockchain can be a transaction platform, capable of handlingmicrotransactions and largely value transactions. It can validate transactionsthat have been digitized and later verified that these transactions have takenplace. They are recorded as a “block” which is a storage space.

Blockchain’s TPS(transaction per second) is far less than current VisaNet or PayPal, but people are looking forwarding increasing TPS on the blockchain in the future.


Blockchain is like a decentralized database, it will shatter database and change the way

people see it. The author has asserted since 2014 that blockchain is going to

be the trend and developer

最后編輯于
?著作權歸作者所有,轉載或內容合作請聯系作者
平臺聲明:文章內容(如有圖片或視頻亦包括在內)由作者上傳并發布,文章內容僅代表作者本人觀點,簡書系信息發布平臺,僅提供信息存儲服務。

推薦閱讀更多精彩內容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi閱讀 7,424評論 0 10
  • 一. 2D轉換模塊 2D轉換模塊 二. 2D轉換模塊-形變中心點 默認情況下所有的元素都是以自己的中心點作為參考來...
    壹點微塵閱讀 330評論 0 0
  • 要說這個詞,是因為最近翻譯一個擔保協議,里面擔保債務處于流動狀態,到一定時間點截止固定,里面的“固定”我用了cry...
    魚子醬閱讀 1,148評論 0 1
  • 此前讀書的數量并不是很多,而且所讀之書一般也是基于兩個出發點:愉悅自己和增長知識。愉悅自己的書比如小說不能說沒有營...
    高大白real閱讀 3,455評論 0 2
  • ?打開手機,通話記錄里最近的一頁除了工作往來基本沒有撥出電話;短信里除了垃圾短信還是垃圾短信;微信對話框到是留了不...
    運營獅訓練營閱讀 511評論 0 1