Difference between revisions of "What makes up the DigiByte blockchain?"
Line 12: | Line 12: | ||
| | ||
− | *DigiAssets | + | *DigiAssets |
All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte. | All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte. | ||
Line 18: | Line 18: | ||
| | ||
− | *DAPPS (Decentralized Apps) | + | *DAPPS (Decentralized Apps) |
Decentralized applications built on top of the DigiByte blockchain. | Decentralized applications built on top of the DigiByte blockchain. | ||
Line 24: | Line 24: | ||
| | ||
− | *Smart Contracts | + | *Smart Contracts |
Smart contracts that leverage the rigidity and security of the DigiByte blockchain. | Smart contracts that leverage the rigidity and security of the DigiByte blockchain. | ||
− | |||
− | |||
− | |||
− | |||
| | ||
Line 42: | Line 38: | ||
| | ||
− | *Digital Assets: DigiBytes | + | *Digital Assets: DigiBytes |
A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things. | A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things. | ||
Line 48: | Line 44: | ||
| | ||
− | *Immutable Public Ledger | + | *Immutable Public Ledger |
An immutable public ledger where all transactions of DigiBytes are recorded. | An immutable public ledger where all transactions of DigiBytes are recorded. | ||
Line 54: | Line 50: | ||
| | ||
− | *Mining Security | + | *Mining Security |
DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining. | DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining. | ||
− | |||
− | |||
− | |||
− | |||
| | ||
Line 72: | Line 64: | ||
| | ||
− | *Core Communications Protocol | + | *Core Communications Protocol |
A very low-level way nodes on the DigiByte global network communicate. | A very low-level way nodes on the DigiByte global network communicate. | ||
Line 78: | Line 70: | ||
| | ||
− | *Global Network | + | *Global Network |
Thousands of people running DigiByte software all across the planet. | Thousands of people running DigiByte software all across the planet. | ||
Line 84: | Line 76: | ||
| | ||
− | *Decentralized Nodes | + | *Decentralized Nodes |
Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions. | Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions. | ||
− | |||
− | |||
− | |||
− |
Revision as of 13:07, 26 July 2019
The Three DigiByte Blockchain Layers
1. Applications / DigiAssets Layer
This is the top layer of DGB that most people utilize in everyday applications. DGB also provides the DigiAssets layer here to build on.
The Top Layer is like an App Store with clear real-world uses.
- DigiAssets
All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte.
- DAPPS (Decentralized Apps)
Decentralized applications built on top of the DigiByte blockchain.
- Smart Contracts
Smart contracts that leverage the rigidity and security of the DigiByte blockchain.
2. Digital Asset / Public Ledger Layer (Think Security)
The digital asset layer is what incentivizes the security of the entire platform.
The Middle Layer provides Security and Administration.
- Digital Assets: DigiBytes
A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things.
- Immutable Public Ledger
An immutable public ledger where all transactions of DigiBytes are recorded.
- Mining Security
DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining.
3. Core Communications Protocol / Global Network Layer
This is the bottom layer of the DigiByte that supports all infrastructure.
The Bottom Layer provides Communication and Operating Procedures.
- Core Communications Protocol
A very low-level way nodes on the DigiByte global network communicate.
- Global Network
Thousands of people running DigiByte software all across the planet.
- Decentralized Nodes
Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions.