Question 1(a) [3 marks]#
Explain benefits of using distributed ledger systems.
Answer:
Table: Benefits of Distributed Ledger Systems
Benefit | Description |
---|---|
Transparency | All participants can view transaction history |
Security | Cryptographic protection against tampering |
Decentralization | No single point of failure or control |
Immutability | Records cannot be altered once confirmed |
Mnemonic: “T-S-D-I” (Transparent, Secure, Decentralized, Immutable)
Question 1(b) [4 marks]#
Define: 1) Blockchain 2) Distributed systems
Answer:
Table: Key Definitions
Term | Definition |
---|---|
Blockchain | A chain of blocks containing transaction data, linked using cryptographic hashes |
Distributed Systems | Network of independent computers working together as a single system |
Key Features:
- Blockchain: Uses hash pointers, consensus mechanisms, and merkle trees
- Distributed Systems: Fault tolerance, scalability, and resource sharing
Mnemonic: “Chain-Hash-Consensus” for Blockchain, “Network-Independent-Together” for Distributed
Question 1(c) [7 marks]#
Illustrate CAP theorem with the help of Blockchain network.
Answer:
Table: CAP Theorem Components
Property | Description | Blockchain Context |
---|---|---|
Consistency | All nodes see same data | All nodes have identical ledger |
Availability | System remains operational | Network stays accessible |
Partition Tolerance | Works despite network failures | Continues during node disconnections |
Diagram:
graph TD
A[CAP Theorem] --> B[Consistency]
A --> C[Availability]
A --> D[Partition Tolerance]
B --> E[Bitcoin prioritizes C+P]
C --> F[Some systems choose A+P]
D --> G[Essential for blockchain]
Key Points:
- Trade-off: Can only achieve 2 out of 3 properties simultaneously
- Blockchain Choice: Most blockchains choose Consistency + Partition Tolerance
- Example: Bitcoin may become temporarily unavailable but maintains consistency
Mnemonic: “CAP-2-out-of-3” (Choose Any 2 Properties out of 3)
Question 1(c) OR [7 marks]#
List and explain applications of blockchain network.
Answer:
Table: Blockchain Applications
Application | Description | Example |
---|---|---|
Cryptocurrency | Digital money transactions | Bitcoin, Ethereum |
Supply Chain | Track products from origin | Walmart food tracing |
Healthcare | Secure patient records | Medical data sharing |
Voting | Transparent elections | Estonia e-voting |
Real Estate | Property ownership records | Land registries |
Key Benefits:
- Transparency: All transactions visible to participants
- Security: Cryptographic protection against fraud
- Efficiency: Reduced intermediaries and costs
Mnemonic: “C-S-H-V-R” (Crypto, Supply, Health, Vote, Real estate)
Question 2(a) [3 marks]#
Define and explain a permissionless blockchain in detail.
Answer:
Definition: A blockchain where anyone can participate without requiring permission from a central authority.
Table: Permissionless Blockchain Features
Feature | Description |
---|---|
Open Access | Anyone can join and participate |
Public Verification | All transactions are publicly verifiable |
Decentralized | No central controlling authority |
Key Characteristics:
- Consensus: Uses proof-of-work or proof-of-stake
- Examples: Bitcoin, Ethereum mainnet
Mnemonic: “Open-Public-Decentralized” (OPD)
Question 2(b) [4 marks]#
Draw a figure and provide a brief explanation of a data structure of a blockchain.
Answer:
Diagram: Blockchain Data Structure
Key Components:
- Previous Hash: Links blocks together creating chain
- Merkle Root: Summary of all transactions in block
- Timestamp: When block was created
- Nonce: Number used once for proof-of-work
Mnemonic: “P-M-T-N” (Previous, Merkle, Time, Nonce)
Question 2(c) [7 marks]#
Explain the core components of blockchain with suitable diagrams.
Answer:
Table: Core Components of Blockchain
Component | Function | Purpose |
---|---|---|
Blocks | Data containers | Store transaction information |
Hash Functions | Create digital fingerprints | Ensure data integrity |
Merkle Trees | Transaction summaries | Efficient verification |
Consensus Mechanism | Agreement protocol | Validate new blocks |
Digital Signatures | Identity verification | Authenticate transactions |
Diagram: Merkle Tree Structure
graph TD
A[Root Hash] --> B[Hash AB]
A --> C[Hash CD]
B --> D[Hash A]
B --> E[Hash B]
C --> F[Hash C]
C --> G[Hash D]
D --> H[Transaction A]
E --> I[Transaction B]
F --> J[Transaction C]
G --> K[Transaction D]
Key Points:
- Immutability: Hash functions make tampering detectable
- Efficiency: Merkle trees allow fast verification
- Decentralization: Consensus mechanisms eliminate central authority
Mnemonic: “B-H-M-C-D” (Blocks, Hash, Merkle, Consensus, Digital)
Question 2(a) OR [3 marks]#
Define and explain permissioned blockchain in detail.
Answer:
Definition: A blockchain where participation requires explicit permission from a governing authority.
Table: Permissioned Blockchain Features
Feature | Description |
---|---|
Restricted Access | Only authorized users can participate |
Private Network | Controlled membership |
Centralized Control | Governing body manages permissions |
Key Characteristics:
- Privacy: Enhanced confidentiality for sensitive data
- Performance: Faster transactions due to fewer validators
- Examples: Hyperledger Fabric, R3 Corda
Mnemonic: “Restricted-Private-Centralized” (RPC)
Question 2(b) OR [4 marks]#
Explain types of wallets in the context of blockchain. Also discuss the factors to be considered while selecting wallet for the specific need.
Answer:
Table: Types of Blockchain Wallets
Wallet Type | Description | Security Level |
---|---|---|
Hot Wallets | Connected to internet | Medium |
Cold Wallets | Offline storage | High |
Hardware Wallets | Physical devices | Very High |
Paper Wallets | Printed keys | High (if stored safely) |
Selection Factors:
- Security Requirements: Higher value needs better security
- Frequency of Use: Regular use favors hot wallets
- Technical Expertise: Simple wallets for beginners
Mnemonic: “H-C-H-P” (Hot, Cold, Hardware, Paper)
Question 2(c) OR [7 marks]#
Explain sidechain in detail with suitable diagrams.
Answer:
Definition: A separate blockchain that is attached to a parent blockchain using a two-way peg.
Diagram: Sidechain Architecture
graph LR
A[Main Chain] <--> B[Two-Way Peg]
B <--> C[Sidechain]
A --> D[Bitcoin/Ethereum]
C --> E[Specialized Functions]
E --> F[Smart Contracts]
E --> G[Privacy Features]
E --> H[Faster Transactions]
Table: Sidechain Benefits
Benefit | Description |
---|---|
Scalability | Reduces load on main chain |
Experimentation | Test new features safely |
Specialized Functions | Custom applications |
Interoperability | Connect different blockchains |
Key Mechanisms:
- Two-Way Peg: Allows asset transfer between chains
- SPV Proofs: Simplified payment verification
- Federated Control: Multiple parties manage transfers
Mnemonic: “S-E-S-I” (Scalability, Experimentation, Specialized, Interoperability)
Question 3(a) [3 marks]#
With respect to transaction in a blockchain network, define the terms “Confirmation” and “Finality”.
Answer:
Table: Transaction States
Term | Definition |
---|---|
Confirmation | Number of blocks built on top of transaction block |
Finality | Point where transaction becomes irreversible |
Key Points:
- Confirmation Count: More confirmations = higher security
- Bitcoin Standard: 6 confirmations for high-value transactions
- Finality Types: Probabilistic (Bitcoin) vs Absolute (some PoS systems)
Mnemonic: “Count-Blocks-Security” for Confirmation, “Irreversible-Point” for Finality
Question 3(b) [4 marks]#
Differentiate Proof of Work and Proof of Stake.
Answer:
Table: PoW vs PoS Comparison
Aspect | Proof of Work (PoW) | Proof of Stake (PoS) |
---|---|---|
Resource | Computational power | Stake ownership |
Energy Use | High | Low |
Security | Hash rate dependent | Stake dependent |
Rewards | Mining rewards | Staking rewards |
Examples | Bitcoin, Ethereum (old) | Ethereum 2.0, Cardano |
Key Differences:
- Mechanism: PoW uses mining, PoS uses validators
- Environmental Impact: PoS is more eco-friendly
- Barriers to Entry: PoS requires initial stake, PoW needs hardware
Mnemonic: “Work-vs-Stake” (Computational Work vs Financial Stake)
Question 3(c) [7 marks]#
With respect to blockchain network, explain 51% attack.
Answer:
Definition: An attack where a single entity controls more than 50% of the network’s mining power or stake.
Diagram: 51% Attack Scenario
graph TD
A[Network Hash Rate] --> B[Honest Miners 49%]
A --> C[Attacker 51%]
C --> D[Can Create Longer Chain]
D --> E[Double Spending]
D --> F[Transaction Reversal]
D --> G[Block Withholding]
Table: Attack Capabilities and Limitations
Can Do | Cannot Do |
---|---|
Double spend own coins | Steal others’ coins |
Reverse recent transactions | Create coins from nothing |
Block specific transactions | Change consensus rules |
Fork the blockchain | Access private keys |
Prevention Measures:
- Diversified Mining: Encourage multiple mining pools
- Checkpoint Systems: Periodic finality markers
- Economic Incentives: Make attacks unprofitable
Impact:
- Network Disruption: Temporary service interruption
- Economic Loss: Reduced trust and value
- Recovery: Network usually recovers after attack ends
Mnemonic: “Majority-Control-Attack” (51% = Majority Control = Attack Power)
Question 3(a) OR [3 marks]#
Define the terms “Hard fork” and “Soft fork”
Answer:
Table: Fork Types
Fork Type | Definition | Compatibility |
---|---|---|
Hard Fork | Non-backward compatible protocol change | Not compatible |
Soft Fork | Backward compatible protocol change | Compatible |
Key Characteristics:
- Hard Fork: Creates new blockchain branch, requires all nodes to upgrade
- Soft Fork: Tightens rules, old nodes can still operate
Examples:
- Hard Fork: Bitcoin Cash split from Bitcoin
- Soft Fork: SegWit activation in Bitcoin
Mnemonic: “Hard-Breaks-Compatibility” vs “Soft-Keeps-Compatibility”
Question 3(b) OR [4 marks]#
List various types of consensus mechanisms and explain any one in detail.
Answer:
Table: Consensus Mechanisms
Mechanism | Description | Energy Use |
---|---|---|
Proof of Work | Computational puzzle solving | High |
Proof of Stake | Stake-based validation | Low |
Delegated PoS | Voted representatives validate | Very Low |
Proof of Authority | Pre-approved validators | Minimal |
Detailed Explanation - Proof of Stake (PoS):
Process:
- Validator Selection: Based on stake amount and randomization
- Block Creation: Selected validator proposes new block
- Validation: Other validators verify and attest to block
- Rewards: Validators earn fees and new tokens
Advantages: Lower energy consumption, reduced centralization risk Disadvantages: “Nothing at stake” problem, initial distribution issues
Mnemonic: “Stake-Select-Validate-Reward” (PoS Process)
Question 3(c) OR [7 marks]#
With respect to blockchain network, explain sybil attack.
Answer:
Definition: An attack where a single adversary creates multiple fake identities to gain disproportionate influence in the network.
Diagram: Sybil Attack Structure
graph TD
A[Attacker] --> B[Fake Identity 1]
A --> C[Fake Identity 2]
A --> D[Fake Identity 3]
A --> E[Fake Identity N]
B --> F[Network Influence]
C --> F
D --> F
E --> F
F --> G[Consensus Manipulation]
Table: Attack Methods and Defenses
Attack Method | Description | Defense |
---|---|---|
Identity Flooding | Create many fake nodes | Proof of Work/Stake |
Routing Manipulation | Control network paths | Reputation systems |
Consensus Disruption | Influence voting | Resource requirements |
Impact on Blockchain:
- Network Partitioning: Isolate honest nodes
- Double Spending: Facilitate fraudulent transactions
- Consensus Failure: Prevent network agreement
Prevention Mechanisms:
- Resource Requirements: PoW/PoS make attacks expensive
- Identity Verification: KYC/AML procedures
- Network Monitoring: Detect suspicious behavior patterns
- Reputation Systems: Track node behavior over time
Real-world Examples:
- P2P Networks: BitTorrent, Gnutella vulnerabilities
- Social Networks: Fake account creation
- Blockchain: Potential threat to permissionless networks
Mnemonic: “Single-Multiple-Influence” (Single Attacker, Multiple Identities, Network Influence)
Question 4(a) [3 marks]#
Define the terms “Merkle Tree” and “Hyperledger”.
Answer:
Table: Key Definitions
Term | Definition |
---|---|
Merkle Tree | Binary tree of hashes that efficiently summarizes all transactions |
Hyperledger | Open-source blockchain platform hosted by Linux Foundation |
Key Features:
- Merkle Tree: Enables efficient verification without downloading full blockchain
- Hyperledger: Enterprise-focused, modular architecture, multiple frameworks
Mnemonic: “Tree-Hash-Efficient” for Merkle, “Enterprise-Modular-Linux” for Hyperledger
Question 4(b) [4 marks]#
Explain classic Byzantine generals problem in detail.
Answer:
Scenario: Multiple generals must coordinate attack on a city, but some may be traitors.
Table: Problem Components
Component | Description |
---|---|
Generals | Network nodes/participants |
Messages | Transactions/communications |
Traitors | Malicious/faulty nodes |
Consensus | Agreement on action |
Solution Requirements:
- Agreement: All honest generals decide on same action
- Validity: If all honest generals want to attack, they should attack
- Termination: Decision must be reached in finite time
Blockchain Relevance: Ensures network agreement despite malicious nodes
Mnemonic: “Generals-Messages-Traitors-Consensus” (GMTC)
Question 4(c) [7 marks]#
Explain the process of Merkle tree creation with suitable example and supporting diagrams.
Answer:
Process Steps:
- Hash each transaction individually
- Pair hashes and hash the pairs
- Continue until single root hash remains
Example: 4 Transactions
Table: Merkle Tree Benefits
Benefit | Description |
---|---|
Efficiency | Verify transactions without full data |
Security | Any change affects root hash |
Scalability | Log(n) verification complexity |
Verification Process:
- To verify Tx A: Need Hash(B), Hash(CD), and Root Hash
- Path verification: Hash(A) + Hash(B) = Hash(AB)
- Hash(AB) + Hash(CD) = Root Hash
Applications:
- Bitcoin: Block headers contain Merkle root
- SPV Clients: Light wallets use Merkle proofs
- Git: Version control system uses similar structure
Mnemonic: “Hash-Pair-Repeat-Root” (Merkle Tree Creation Process)
Question 4(a) OR [3 marks]#
List various types of Hyperledger projects.
Answer:
Table: Hyperledger Projects
Project | Type | Purpose |
---|---|---|
Fabric | Framework | Permissioned blockchain platform |
Sawtooth | Framework | Modular blockchain suite |
Iroha | Framework | Simple blockchain for mobile/web |
Burrow | Framework | Ethereum Virtual Machine |
Caliper | Tool | Blockchain performance benchmark |
Composer | Tool | Business network development |
Categories:
- Frameworks: Core blockchain platforms
- Tools: Development and testing utilities
Mnemonic: “F-S-I-B-C-C” (Fabric, Sawtooth, Iroha, Burrow, Caliper, Composer)
Question 4(b) OR [4 marks]#
Explain Practical Byzantine Fault Tolerance algorithm in detail.
Answer:
Definition: Consensus algorithm that works correctly even when up to 1/3 of nodes are faulty or malicious.
Table: PBFT Phases
Phase | Description | Purpose |
---|---|---|
Pre-prepare | Primary broadcasts request | Initiate consensus |
Prepare | Nodes validate and broadcast | Verify proposal |
Commit | Nodes commit to decision | Finalize agreement |
Algorithm Steps:
- Client sends request to primary replica
- Primary broadcasts pre-prepare message
- Backups send prepare messages if valid
- After receiving 2f+1 prepares, send commit
- Execute after receiving 2f+1 commits
Key Properties:
- Safety: Never produces inconsistent results
- Liveness: Eventually produces results
- Fault Tolerance: Works with f < n/3 faulty nodes
Mnemonic: “Pre-Prepare-Commit” (3 Phases of PBFT)
Question 4(c) OR [7 marks]#
“Eventual consistency is evident in the context of bitcoin.” Justify the given statement.
Answer:
Definition: Eventual consistency means the system will become consistent over time, even if it’s temporarily inconsistent.
Bitcoin Implementation:
Table: Bitcoin Consistency Mechanisms
Mechanism | Description | Purpose |
---|---|---|
Chain Reorganization | Replace shorter chain with longer | Maintain consensus |
Confirmation Delays | Wait for multiple blocks | Increase certainty |
Fork Resolution | Longest chain wins | Resolve conflicts |
Scenarios Demonstrating Eventual Consistency:
- Temporary Forks: When two miners find blocks simultaneously
- Network Partitions: Isolated nodes may have different views
- Double Spending Attempts: Conflicting transactions in different blocks
Resolution Process:
- Mining Continues: Miners build on their preferred chain
- Longest Chain Rule: Network adopts chain with most work
- Automatic Convergence: All nodes eventually agree
Diagram: Fork Resolution
graph TD
A[Block N] --> B[Block N+1a]
A --> C[Block N+1b]
B --> D[Block N+2a]
C --> E[Dies - Shorter Chain]
D --> F[Becomes Main Chain]
Justification Points:
- Probabilistic Finality: Longer confirmation time = higher certainty
- No Immediate Consistency: New transactions aren’t instantly final
- Convergence Guarantee: Network will eventually agree on single chain
- Time-based Resolution: Consistency improves with time
Practical Implications:
- Merchant Waiting: Wait for confirmations before accepting payment
- Exchange Policies: Different confirmation requirements for different amounts
- Risk Management: Balance speed vs security based on transaction value
Mnemonic: “Time-Brings-Consistency” (Eventual Consistency = Time + Convergence)
Question 5(a) [3 marks]#
Explain advantages of ERC 20.
Answer:
Table: ERC-20 Token Advantages
Advantage | Description |
---|---|
Standardization | Common interface for all tokens |
Interoperability | Works with all Ethereum wallets/exchanges |
Liquidity | Easy trading and exchange |
Key Benefits:
- Developer Friendly: Simple implementation standard
- Market Adoption: Widely supported across platforms
- Smart Contract Integration: Easy DeFi integration
Mnemonic: “Standard-Interoperable-Liquid” (SIL)
Question 5(b) [4 marks]#
Describe working mechanism of a smart-contract in detail.
Answer:
Table: Smart Contract Workflow
Step | Description |
---|---|
Code Deployment | Contract uploaded to blockchain |
Trigger Conditions | Predefined conditions monitored |
Automatic Execution | Contract executes when conditions met |
State Update | Blockchain state modified |
Working Process:
- Development: Write contract in Solidity/Vyper
- Compilation: Convert to bytecode
- Deployment: Upload to blockchain network
- Execution: Triggered by transactions or events
Mnemonic: “Deploy-Trigger-Execute-Update” (DTEU)
Question 5(c) [7 marks]#
What is smart-contract? Explain features and applications of smart-contract in detail.
Answer:
Definition: Self-executing contracts with terms directly written into code, running on blockchain.
Table: Smart Contract Features
Feature | Description | Benefit |
---|---|---|
Autonomous | Executes without intermediaries | Cost reduction |
Transparent | Code visible on blockchain | Trust building |
Immutable | Cannot be changed once deployed | Security |
Deterministic | Same input produces same output | Predictability |
Diagram: Smart Contract Architecture
graph TD
A[Smart Contract] --> B[Trigger Conditions]
B --> C[Automatic Execution]
C --> D[State Changes]
D --> E[Event Emissions]
A --> F[External Calls]
F --> G[Other Contracts]
Applications:
Table: Smart Contract Applications
Domain | Use Case | Example |
---|---|---|
Finance | Automated lending | DeFi protocols |
Insurance | Claim processing | Flight delay insurance |
Supply Chain | Product tracking | Food provenance |
Real Estate | Property transfers | Automated escrow |
Gaming | Digital assets | NFT marketplaces |
Advantages:
- Efficiency: Reduced processing time and costs
- Trust: No need for trusted third parties
- Accuracy: Eliminates human errors
- Global Access: Available 24/7 worldwide
Limitations:
- Immutability: Difficult to fix bugs after deployment
- Oracle Problem: Need external data sources
- Gas Costs: Execution costs can be high
- Complexity: Requires technical expertise
Development Considerations:
- Security Audits: Essential before deployment
- Testing: Extensive testing on testnets
- Upgradability: Design patterns for updates
- Gas Optimization: Minimize execution costs
Mnemonic: “Auto-Transparent-Immutable-Deterministic” (ATID) for features
Question 5(a) OR [3 marks]#
Explain disadvantages of ERC20.
Answer:
Table: ERC-20 Token Disadvantages
Disadvantage | Description |
---|---|
Limited Functionality | Only basic token operations |
No Built-in Security | Vulnerable to common attacks |
Gas Dependency | Requires ETH for transactions |
Key Issues:
- Transfer Limitations: Cannot handle complex transfers
- Approval Risks: Double spending vulnerabilities
- Network Congestion: High fees during peak times
Mnemonic: “Limited-Vulnerable-Dependent” (LVD)
Question 5(b) OR [4 marks]#
Describe steps for Launching of a Decentralized Autonomous Organization (DAO)?
Answer:
Table: DAO Launch Steps
Step | Description |
---|---|
Concept Design | Define purpose and governance rules |
Smart Contract Development | Code governance mechanisms |
Token Distribution | Allocate voting rights |
Community Building | Attract members and contributors |
Detailed Process:
- Whitepaper Creation: Document vision and tokenomics
- Technical Implementation: Deploy governance contracts
- Initial Funding: Raise capital through token sales
- Operations Launch: Begin decentralized operations
Mnemonic: “Design-Develop-Distribute-Deploy” (4D Launch)
Question 5(c) OR [7 marks]#
What is Decentralized Autonomous Organization (DAO)? Explain its advantages and disadvantages in detail.
Answer:
Definition: A blockchain-based organization governed by smart contracts and token holders rather than traditional management.
Table: DAO Structure
Component | Description | Function |
---|---|---|
Smart Contracts | Governance rules in code | Automated decision execution |
Tokens | Voting rights and ownership | Democratic participation |
Proposals | Suggested changes or actions | Community-driven initiatives |
Treasury | Shared funds | Resource allocation |
Diagram: DAO Governance Flow
graph TD
A[Token Holders] --> B[Submit Proposals]
B --> C[Community Discussion]
C --> D[Voting Period]
D --> E[Execution if Passed]
E --> F[Smart Contract Updates]
F --> G[Treasury Actions]
Advantages:
Table: DAO Benefits
Advantage | Description | Impact |
---|---|---|
Decentralization | No single point of control | Reduced corruption risk |
Transparency | All decisions on blockchain | Enhanced accountability |
Global Participation | Anyone can join | Diverse perspectives |
Efficiency | Automated execution | Faster decision implementation |
Democratic Governance | Token-based voting | Fair representation |
Disadvantages:
Table: DAO Challenges
Disadvantage | Description | Risk |
---|---|---|
Technical Complexity | Smart contract bugs | System failures |
Legal Uncertainty | Unclear regulatory status | Compliance issues |
Coordination Problems | Difficult decision making | Slow progress |
Token Concentration | Wealthy holders control votes | Centralization risk |
Security Vulnerabilities | Code exploits possible | Financial losses |
Types of DAOs:
- Investment DAOs: Collective investment decisions
- Protocol DAOs: Blockchain protocol governance
- Social DAOs: Community-driven organizations
- Collector DAOs: NFT and art collecting
Success Factors:
- Clear Purpose: Well-defined mission and goals
- Robust Governance: Effective voting mechanisms
- Community Engagement: Active member participation
- Technical Security: Audited smart contracts
- Legal Compliance: Regulatory compliance where applicable
Notable Examples:
- MakerDAO: Decentralized finance protocol
- Uniswap: Decentralized exchange governance
- Compound: Money market protocol
Future Outlook:
- Regulatory Clarity: Evolving legal frameworks
- Technical Improvements: Better governance tools
- Mainstream Adoption: Growing corporate interest
- Integration: Hybrid traditional-DAO models
Mnemonic: “Decentralized-Autonomous-Organization” (DAO = Democratic Automated Ownership)