Difference between revisions of "What makes up the DigiByte blockchain?"

From DigiByte Wiki
Jump to navigation Jump to search
(Created page with " '''<span style="font-size:x-large;">The Three DigiByte Blockchain Layers</span>'''   == 1. Applications / DigiAssets Layer ==   == 2. Digital Asset / Public Led...")
 
 
(6 intermediate revisions by the same user not shown)
Line 1: Line 1:
  
'''<span style="font-size:x-large;">The Three DigiByte Blockchain Layers</span>'''
+
'''<span style="font-size:x-large;">1. Applications / DigiAssets Layer</span>'''
 +
 
 +
This is the top layer of DGB that most people utilize in everyday applications. DGB also provides the DigiAssets layer here to build on.
 +
 
 +
The Top Layer is like an App Store with clear real-world uses.
 +
 
 +
&nbsp;
 +
 
 +
*DigiAssets
 +
 
 +
All types of Digital Assets can be created with the [https://www.dgbwiki.com/index.php?title=DigiAssets DigiAssets protocol] on top of DigiByte.
  
 
&nbsp;
 
&nbsp;
  
== 1. Applications / DigiAssets Layer ==
+
*DAPPS (Decentralized Apps)
 +
 
 +
Decentralized applications built on top of the DigiByte blockchain.
  
 
&nbsp;
 
&nbsp;
  
== 2. Digital Asset / Public Ledger Layer (Think Security) ==
+
*Smart Contracts
 +
 
 +
Smart contracts that leverage the rigidity and security of the DigiByte blockchain.
  
 
&nbsp;
 
&nbsp;
  
== 3. Core Communications Protocol / Global Network Layer ==
+
== '''<span style="font-size:x-large;">2. Digital Asset / Public Ledger Layer (Think Security)</span>''' ==
 +
 
 +
The digital asset layer is what incentivizes the security of the entire platform.
 +
 
 +
The Middle Layer&nbsp;provides&nbsp;Security and Administration.
  
 
&nbsp;
 
&nbsp;
 +
 +
*Digital Assets: DigiBytes
 +
 +
A '''digi'''tal '''byte''' of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things.
 +
 +
&nbsp;
 +
 +
*Immutable Public Ledger
 +
 +
An immutable public ledger where all transactions of DigiBytes are recorded.
 +
 +
&nbsp;
 +
 +
*Mining Security
 +
 +
DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining.
 +
 +
&nbsp;
 +
 +
== '''<span style="font-size:x-large;">3. Core Communications Protocol / Global Network Layer</span>''' ==
 +
 +
This is the bottom layer of the DigiByte that supports all infrastructure.
 +
 +
The Bottom Layer&nbsp;provides Communication and Operating Procedures.
 +
 +
&nbsp;
 +
 +
*Core Communications Protocol
 +
 +
A very low-level way&nbsp;nodes on the DigiByte global network communicate.
 +
 +
&nbsp;
 +
 +
*Global Network
 +
 +
Hundreds of thousands of people running DigiByte software all across the planet.
 +
 +
&nbsp;
 +
 +
*Decentralized Nodes
 +
 +
Any server, computer or mobile phone connected to the DigiByte network becomes a&nbsp;node that helps relay transactions.

Latest revision as of 01:09, 7 August 2019

1. Applications / DigiAssets Layer

This is the top layer of DGB that most people utilize in everyday applications. DGB also provides the DigiAssets layer here to build on.

The Top Layer is like an App Store with clear real-world uses.

 

  • DigiAssets

All types of Digital Assets can be created with the DigiAssets protocol on top of DigiByte.

 

  • DAPPS (Decentralized Apps)

Decentralized applications built on top of the DigiByte blockchain.

 

  • Smart Contracts

Smart contracts that leverage the rigidity and security of the DigiByte blockchain.

 

2. Digital Asset / Public Ledger Layer (Think Security)

The digital asset layer is what incentivizes the security of the entire platform.

The Middle Layer provides Security and Administration.

 

  • Digital Assets: DigiBytes

A digital byte of data, a representation of larger data or a unit that holds value, and cannot be counterfeited, duplicated or hacked. DigiBytes can be used to secure value for many things.

 

  • Immutable Public Ledger

An immutable public ledger where all transactions of DigiBytes are recorded.

 

  • Mining Security

DigiByte uses five separate mining algorithms for security. New DigiBytes come from mining.

 

3. Core Communications Protocol / Global Network Layer

This is the bottom layer of the DigiByte that supports all infrastructure.

The Bottom Layer provides Communication and Operating Procedures.

 

  • Core Communications Protocol

A very low-level way nodes on the DigiByte global network communicate.

 

  • Global Network

Hundreds of thousands of people running DigiByte software all across the planet.

 

  • Decentralized Nodes

Any server, computer or mobile phone connected to the DigiByte network becomes a node that helps relay transactions.