Difference between revisions of "What makes up the DigiByte blockchain?"

From DigiByte Wiki
Jump to navigation Jump to search
Line 12: Line 12:
 
 
 
 
  
*DigiAssets
+
*DigiAssets  
  
 
All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte.
 
All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte.
Line 18: Line 18:
 
 
 
 
  
*DAPPS (Decentralized Apps)
+
*DAPPS (Decentralized Apps)  
  
 
Decentralized applications built on top of the DigiByte blockchain.
 
Decentralized applications built on top of the DigiByte blockchain.
Line 24: Line 24:
 
 
 
 
  
*Smart Contracts
+
*Smart Contracts  
  
 
Smart contracts that leverage the rigidity and security of the DigiByte blockchain.
 
Smart contracts that leverage the rigidity and security of the DigiByte blockchain.
 
 
 
 
[https://digibyte.io/sites/default/files/apps.png https://digibyte.io/sites/default/files/apps.png]
 
  
 
 
 
 
Line 42: Line 38:
 
 
 
 
  
*Digital Assets: DigiBytes
+
*Digital Assets: DigiBytes  
  
 
A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things.
 
A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things.
Line 48: Line 44:
 
 
 
 
  
*Immutable Public Ledger
+
*Immutable Public Ledger  
  
 
An immutable public ledger where all transactions of DigiBytes are recorded.
 
An immutable public ledger where all transactions of DigiBytes are recorded.
Line 54: Line 50:
 
 
 
 
  
*Mining Security
+
*Mining Security  
  
 
DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining.
 
DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining.
 
 
 
 
[https://digibyte.io/sites/default/files/crypto.png https://digibyte.io/sites/default/files/crypto.png]
 
  
 
 
 
 
Line 72: Line 64:
 
 
 
 
  
*Core Communications Protocol
+
*Core Communications Protocol  
  
 
A very low-level way nodes on the DigiByte global network communicate.
 
A very low-level way nodes on the DigiByte global network communicate.
Line 78: Line 70:
 
 
 
 
  
*Global Network
+
*Global Network  
  
 
Thousands of people running DigiByte software all across the planet.
 
Thousands of people running DigiByte software all across the planet.
Line 84: Line 76:
 
 
 
 
  
*Decentralized Nodes
+
*Decentralized Nodes  
  
 
Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions.
 
Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions.
 
 
 
 
[https://digibyte.io/sites/default/files/global_0.png https://digibyte.io/sites/default/files/global_0.png]
 

Revision as of 13:07, 26 July 2019

The Three DigiByte Blockchain Layers

 

1. Applications / DigiAssets Layer

This is the top layer of DGB that most people utilize in everyday applications. DGB also provides the DigiAssets layer here to build on.

The Top Layer is like an App Store with clear real-world uses.

 

  • DigiAssets

All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte.

 

  • DAPPS (Decentralized Apps)

Decentralized applications built on top of the DigiByte blockchain.

 

  • Smart Contracts

Smart contracts that leverage the rigidity and security of the DigiByte blockchain.

 

2. Digital Asset / Public Ledger Layer (Think Security)

The digital asset layer is what incentivizes the security of the entire platform.

The Middle Layer provides Security and Administration.

 

  • Digital Assets: DigiBytes

A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things.

 

  • Immutable Public Ledger

An immutable public ledger where all transactions of DigiBytes are recorded.

 

  • Mining Security

DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining.

 

3. Core Communications Protocol / Global Network Layer

This is the bottom layer of the DigiByte that supports all infrastructure.

The Bottom Layer provides Communication and Operating Procedures.

 

  • Core Communications Protocol

A very low-level way nodes on the DigiByte global network communicate.

 

  • Global Network

Thousands of people running DigiByte software all across the planet.

 

  • Decentralized Nodes

Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions.