Joke Collection Website - Public benefit messages - Why is YottaChain (Oil Tower) mining so popular?

Why is YottaChain (Oil Tower) mining so popular?

YottaChain: Blockchain storage has overwhelming advantages over existing centralized storage (AWS/Alibaba Cloud/EMC/Huawei) in the persistent storage market. Data reliability has been improved exponentially, which is very important. Excellent anti-DDos and disaster recovery features, and the cost is reduced several times. Taking YottaChain as an example, the details are as follows:

First of all, let’s talk about the cost. Compared with centralized storage, the cost of YottaChain storage is significantly lower. The reasons are:

(1) YottaChain adopts With TruPrivacy technology, data can be safely deduplicated, and the hard disk space occupied by storing the same data is reduced by 5-10 times, which is equivalent to using one hard disk as 5-10 hard disks;

(2) Absolutely Some storage nodes have only a few storage devices and do not require a special cooling system (which accounts for one-third or even half of the data center's power consumption). They can dissipate heat by natural ventilation, and both CapEx and OpEx are significantly reduced.

(3) Home storage mining machines do not require additional bandwidth costs, no rental costs, and household electricity bills are cheaper than industrial electricity.

(4) Most of YottaChain’s storage nodes do not require professional operation and maintenance engineers to be on site. Each node runs automatically and if there is an unexpected failure, other nodes will automatically take over, saving expensive operation and maintenance. Cost;

(5) A large number of YottaChain’s storage nodes use idle hard disk space, which is a sunk cost and the marginal cost is close to zero.

Secondly, let’s talk about data reliability. Compared with centralized storage, the reliability of data stored in YottaChain has been improved exponentially.

(1) YottaChain’s persistent storage service uniformly adopts redundant coding, and any data is automatically encoded into N (for example, 100, the specific number will be determined by the community governance committee in the future) fragments, as long as there are any M (For example, 70) fragments can recover the data, and then store these N fragments in N storage nodes respectively, each node saves one fragment, so as long as there are not N-M 1 (31 in this example) nodes at the same time Failure can ensure that the data is intact and not lost;

(2) When any node fails, the system will immediately select another node to rebuild the data of the failed node. In this case, only the first failed node will be reconstructed. Before the node is completed, another 30 nodes will not fail one after another, which ensures that data will never be lost.

(3) Each node will monitor and verify each other. Once any node fails, it can be quickly discovered.

(4) When rebuilding the data of a failed node, it will be divided into many nodes and rebuilt at the same time to speed up the reconstruction. For example, if each fragment of 10,000 files is stored on a failed node, it takes an average of 0.5 seconds to rebuild a fragment (mainly due to network transmission time). If 100 nodes are selected to participate in the reconstruction, each node only needs to rebuild 100 fragments. It takes an average of 50 seconds to complete the entire reconstruction work. As long as another 30 nodes of the same file do not fail at the same time within 50 seconds, the file data will not be lost.

(5) Due to good redundancy and geographical dispersion, there is no need to worry about hard disk damage, individual node operation and maintenance errors (it was revealed in August 2018 that Tencent Cloud lost user data due to operation and maintenance errors), lightning weather (In September 2018, Microsoft's Azure services in some areas were down for more than 20 hours due to lightning strikes), power outages, cut optical fibers, earthquakes and fires, and other reasons for data failure.

(6) Because the nodes are dispersed and have good redundancy, they are not afraid of DDOS attacks.