βΊοΈWelcome to Berylbit (BRB)
For money, apps, and hosting, use Berylbit
Berylbit is a decentralized cryptocurrency blockchain with smart contract functionality that aims to be the leader in hosting applications on its network.
Did you know that Berylbit received its name from the element Beryllium in the periodic table? The atomic weight was assigned to the Chain ID of the berylbit network (9012).
Introduction
Berylbit is a decentralized cryptocurrency blockchain with smart contract capability that aspires to be the market leader in application hosting on its network. Being an open-source platform for launching Decentralized apps, providing developers with scalable development opportunities, and providing a setting for business blockchain deployments. Berylbit aspires to be the top development ecosystem for all sorts of developers by providing simple tools and build environments. Not only are we creating using solidity, but we also hope to pave the way for other sorts of developers and builders in other programming languages.
The consensus protocol is a fundamental differentiator between Berylbit and other decentralized networks. People have begun to follow blockchain touted initiatives that offer high speeds such as transactions per second (TPS) or cheap gas prices, neglecting and sacrificing two of the most critical blockchain trilemma; Decentralization and Security. Berylbit is a Proof-Of-Work consensus protocol that uses Ethash to produce a robust protected network. It is targeted at block miners competing with hash-power, increasing the network difficulty, and providing a safe network for investors, data storage, and applications. Having stated that, Proof-Of-Work is the only genuine nature of a true decentralized network on which everyone can agree.
BRB The Native Gas Coin
BRB is the native gas coin of Berylbit. It is inflationary, having an annual growth rate of 5.23%. The supply is continually burned on every transaction to reduce circulation; it is used to pay fees, defend the network by paying miners' gas expenses and in mining block rewards, and provides a primitive demand mechanism across the berylbit ecosystem.
Berylbit Consensus Protocol (ETHASH)
The Ethash mining algorithm is the algorithm that runs the mining on Berylbit. A high-quality algorithm that employs highly sophisticated computer techniques to provide maximum security.
Origin
When we talk about Dagger-Hashimoto, we're referring about a mining algorithm that was used to create Ethash. This algorithm attempted to develop a safe algorithm based on two pillars:
-Be resistant to ASIC mining. (You can Mine with ASIC)
-Highly efficient and readily verified by thin clients.
These two pillars are essential to Dagger-functioning. Hashimoto's The creators of this algorithm are Vitalik Buterin and Thaddeus Dryja, who worked on it between 2013 and 2014. As you've seen, the term originates from the fact that the method is a combination of two separate algorithms.
First and foremost, there is Dagger, a Vitalik Buterin technique that employs directed acyclic graphs (DAG) to construct a huge data structure. Initially, this structure consumes a large amount of storage space. On this structure, a series of memory computations are performed, adding a significant amount of effort. This structure is what allows the mining process carried out by the Hashimoto algorithm.
Hashimoto It is an algorithm created by Thaddeus Dryja that tries to increase ASIC resistance and perform hash mining. This is accomplished by increasing the RAM usage, which is a restriction of ASICs. Essentially, Hashimoto takes the produced DAG, adds network information about the difficulty and transactions, and generates a hash that identifies the block being mined.
By merging both methods, we gain a single algorithm that allows us to construct a mining system complicated enough that ASIC miners will have difficulty efficiently implementing it. The structure is sufficiently sophisticated and safe that it was proposed as a replacement for Scrypt. At the moment, Ethash outperforms alternative proof-of-work algorithms such as Scrypt, Dragger-Hashimoto, and SHA-256.
How Ethash works?
Up until the moment where mining begins, a computed seed is constructed using the block headers.
This seed is then calculated and used to construct a 16 MB pseudorandom cache.
This cache is then utilized to build a data set larger than 4 GB in size (the DAG). This data collection is semi-permanent, with updates occurring every 30 thousand blocks. As a result, the DAG fluctuates with each "mining season."
Mining begins when the DAG is formed. This algorithm takes random values from the DAG and mixes them with network data and the transactions to be verified.
Finally, verification is performed using a method that regenerates particular sections of the dataset utilizing cache memory, hence speeding up the process.
Features
It is heavily reliant on RAM memory operations, which use a huge amount of bandwidth; this is essential for Ethash to work properly. These properties are critical to the activities necessary to create the DAG and the Ethash working cache.
The method is GPU compatible. You're probably aware that today's graphics cards, or GPUs, have enormous capacity. In reality, animated visuals like those found in today's games need massive quantities of memory and exceptional parallel processing. If you mine using Ethash, you may leverage the GPU RAM to keep the full DAG in memory, along with the cache, and conduct all computations in a high-speed workspace. As a result, you can mine considerably more quickly.
Provides strong thin client verification capabilities. With roughly 16 MB of RAM, it is possible to build a thin client capable of verifying transactions rapidly and simply. A thin client may also be up and running and performing the verification procedure in as little as 30 seconds.
It is quick, and the usage of a memory structure (DAG), cache, and the Keccak function make this method an efficient procedure for producing blocks. As a result, Berylbit can depend on a production time that can be adjusted to meet the demands of the network, always seeking a balance between security and scalability.
Reference
Pagliari, E. (2019) Mining algorithms (proof of work): SHA-256, scrypt, CryptoNight, ethash and X11, The Cryptonomist. Available at: https://en.cryptonomist.ch/2019/06/15/mining-algorithms-proof-of-work/ (Accessed: November 28, 2022).
What is the ethash mining algorithm? (2022) Bit2Me Academy. Available at: https://academy.bit2me.com/en/que-es-algoritmo-de-mineria-ethash/ (Accessed: November 28, 2022).
Get Started On The Berylbit Network
We've put together some helpful links for you.
Last updated