Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information Technology Engineering/
  4. IT Semester 6/
  5. Fundamentals of Blockchain (4361603)/

Foundation of Blockchain (4361603) - Summer 2025 Solution

·
Study-Material Solutions Blockchain 4361603 2025 Summer
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Question 1(a) [3 marks]
#

Differentiate between Private key and Public key in Blockchain.

Answer:

AspectPrivate KeyPublic Key
PurposeUsed for signing transactionsUsed for verification
SharingMust be kept secretCan be shared publicly
FunctionDecrypts data, creates signaturesEncrypts data, verifies signatures
OwnershipOnly owner knows itEveryone can access it
  • Private Key: Secret mathematical code that proves ownership
  • Public Key: Open address that others use to send transactions
  • Security: Private key loss = permanent fund loss

Mnemonic: “Private is Personal, Public is Posted”


Question 1(b) [4 marks]
#

Explain Distributed Ledger in detail.

Answer:

Distributed Ledger is a database spread across multiple locations and participants.

Table: Key Features

FeatureDescription
DecentralizedNo single control point
SynchronizedAll copies stay updated
TransparentAll participants can view
ImmutableCannot be easily changed

Diagram:

graph TD
    A[Participant 1] --> D[Distributed Ledger]
    B[Participant 2] --> D
    C[Participant 3] --> D
    D --> E[Synchronized Copy 1]
    D --> F[Synchronized Copy 2]
    D --> G[Synchronized Copy 3]
  • Benefits: Eliminates intermediaries, increases trust, reduces fraud
  • Working: All participants maintain identical copies of records

Mnemonic: “Distributed = Divided but Identical”


Question 1(c) [7 marks]
#

Define Blockchain. Describe applications and limits of Blockchain.

Answer:

Blockchain Definition: A chain of blocks containing transaction records, linked using cryptography.

Applications Table:

SectorApplicationBenefit
FinanceCryptocurrency, paymentsFaster, cheaper transfers
HealthcarePatient recordsSecure, accessible data
Supply ChainProduct trackingTransparency, authenticity
Real EstateProperty recordsFraud prevention
VotingDigital electionsTransparent, tamper-proof

Limits Table:

LimitationImpact
ScalabilitySlow transaction processing
Energy UsageHigh electricity consumption
ComplexityDifficult for users to understand
RegulationLegal uncertainty
StorageGrowing data size problems

Architecture Diagram:

graph LR
    A[Block 1] --> B[Block 2]
    B --> C[Block 3]
    C --> D[Block 4]
    
    A1[Hash] --> A
    B1[Hash] --> B
    C1[Hash] --> C
    D1[Hash] --> D
  • Security: Cryptographic linking makes tampering difficult
  • Transparency: All transactions visible to network participants

Mnemonic: “Blocks Chained = Blockchain, Apps Many = Limits Many”


Question 1(c) OR [7 marks]
#

Write a short note on: CAP Theorem in Blockchain

Answer:

CAP Theorem states that distributed systems can only guarantee 2 out of 3 properties simultaneously.

CAP Components Table:

PropertyDescriptionExample
ConsistencyAll nodes have same dataSame balance shown everywhere
AvailabilitySystem always respondsNetwork never goes down
Partition ToleranceWorks despite network failuresFunctions even if nodes disconnect

Blockchain Trade-offs:

graph TD
    A[CAP Theorem] --> B[Consistency]
    A --> C[Availability]
    A --> D[Partition Tolerance]
    
    E[Bitcoin] --> B
    E --> D
    F[Private Blockchain] --> B
    F --> C

Real-world Applications:

Blockchain TypeChoosesSacrifices
BitcoinConsistency + PartitionAvailability
EthereumConsistency + PartitionAvailability
Private NetworksConsistency + AvailabilityPartition Tolerance
  • Impact: Blockchain designers must choose which property to sacrifice
  • Trade-off: Perfect systems impossible in distributed networks

Mnemonic: “Can’t Always Please - Choose 2 of 3”


Question 2(a) [3 marks]
#

Explain Data Structure of a Blockchain.

Answer:

Blockchain Data Structure consists of linked blocks containing transaction data.

Block Structure Table:

ComponentPurpose
Block HeaderContains metadata
Previous HashLinks to previous block
Merkle RootSummary of all transactions
TimestampWhen block was created
TransactionsActual data/transfers

Visual Structure:

PMTNreio[BermnTTlvkecrXoilsea1coetn,kuassRmaTHopcXeHot2aati,dsoehnTrsX3]
  • Linking: Each block points to previous block using hash
  • Integrity: Changing one block breaks the entire chain

Mnemonic: “Header Holds, Transactions Tell”


Question 2(b) [4 marks]
#

What are the benefits of Decentralization?

Answer:

Decentralization Benefits:

BenefitExplanation
No Single Point of FailureNetwork continues if one node fails
Censorship ResistanceNo authority can block transactions
TransparencyAll participants see same information
Reduced CostsEliminates intermediary fees
TrustNo need to trust central authority

Comparison Diagram:

graph LR
    subgraph Centralized
        A[Central Authority] --> B[User 1]
        A --> C[User 2]
        A --> D[User 3]
    end
    
    subgraph Decentralized
        E[User 1] --> F[User 2]
        F --> G[User 3]
        G --> E
    end
  • Security: Multiple copies prevent data loss
  • Democracy: All participants have equal rights
  • Resilience: System survives individual failures

Mnemonic: “Distributed = Durable, Democratic, Direct”


Question 2(c) [7 marks]
#

Differentiate between Public Blockchain and Private Blockchain.

Answer:

Comprehensive Comparison:

AspectPublic BlockchainPrivate Blockchain
AccessOpen to everyoneRestricted to specific users
PermissionPermissionlessRequires permission
ControlDecentralizedCentralized control
SpeedSlower (consensus needed)Faster (fewer validators)
SecurityHigh (many validators)Medium (fewer validators)
CostTransaction fees requiredLower operational costs
TransparencyFully transparentLimited transparency
ExamplesBitcoin, EthereumHyperledger, R3 Corda

Network Architecture:

graph TD
    subgraph "Public Blockchain"
        A[Anyone] --> B[Global Network]
        C[Anyone] --> B
        D[Anyone] --> B
    end
    
    subgraph "Private Blockchain"
        E[Authorized User 1] --> F[Private Network]
        G[Authorized User 2] --> F
        H[Authorized User 3] --> F
    end

Use Cases:

TypeBest For
PublicCryptocurrencies, public records
PrivateBanking, supply chain, healthcare
  • Trade-offs: Public offers more security, Private offers more control
  • Choice: Depends on transparency vs. privacy needs

Mnemonic: “Public = People’s, Private = Permitted”


Question 2(a) OR [3 marks]
#

Describe Core Components of Block Chain with suitable diagram.

Answer:

Core Components:

ComponentFunction
BlocksStore transaction data
Hash FunctionsCreate unique fingerprints
Digital SignaturesVerify transaction authenticity
Consensus MechanismAgree on valid transactions
Peer-to-Peer NetworkConnect all participants

System Architecture:

graph TD
    A[Peer-to-Peer Network] --> B[Consensus Mechanism]
    B --> C[Block Creation]
    C --> D[Hash Functions]
    D --> E[Digital Signatures]
    E --> F[Transaction Validation]
    F --> G[Block Addition]
    G --> H[Blockchain Updated]
  • Integration: All components work together for security
  • Purpose: Each component serves specific blockchain function

Mnemonic: “Blocks Build, Hash Holds, Signatures Secure”


Question 2(b) OR [4 marks]
#

Define and explain permissioned blockchain in detail.

Answer:

Permissioned Blockchain Definition: A blockchain where participation requires explicit permission from network administrators.

Characteristics Table:

FeatureDescription
Access ControlOnly approved users can join
Validation RightsSelected nodes validate transactions
GovernanceCentral authority manages network
PrivacyTransaction details can be private

Permission Levels:

graph TD
    A[Network Administrator] --> B[Full Access]
    A --> C[Read/Write Access]
    A --> D[Read Only Access]
    A --> E[No Access]
    
    B --> F[Can validate blocks]
    C --> G[Can submit transactions]
    D --> H[Can view data only]
    E --> I[Blocked from network]
  • Benefits: Better privacy, regulatory compliance, faster processing
  • Drawbacks: Less decentralized, requires trust in administrators

Mnemonic: “Permission = Participation Permitted”


Question 2(c) OR [7 marks]
#

Explain sidechain in brief.

Answer:

Sidechain Definition: A separate blockchain connected to main blockchain, allowing asset transfer between chains.

Sidechain Architecture:

graph LR
    A[Main Chain] <--> B[Sidechain 1]
    A <--> C[Sidechain 2]
    A <--> D[Sidechain 3]
    
    B --> E[Specific Purpose 1]
    C --> F[Specific Purpose 2]
    D --> G[Specific Purpose 3]

Benefits and Features:

AspectBenefit
ScalabilityReduces main chain load
ExperimentationTest new features safely
SpecializationOptimized for specific use cases
InteroperabilityConnect different blockchains

Transfer Process:

StepAction
1. LockAssets locked on main chain
2. ProofCryptographic proof generated
3. ReleaseEquivalent assets released on sidechain
4. UseAssets used on sidechain
5. ReturnReverse process to return assets

Real Examples:

SidechainPurpose
Lightning NetworkFast Bitcoin payments
PlasmaEthereum scaling
LiquidBitcoin trading
  • Security: Maintains connection to secure main chain
  • Flexibility: Each sidechain can have different rules
  • Innovation: Allows blockchain ecosystem expansion

Mnemonic: “Side Supports, Main Maintains”


Question 3(a) [3 marks]
#

Define Consensus Mechanism and explain any one in detail.

Answer:

Consensus Mechanism Definition: A protocol that ensures all network participants agree on the blockchain’s current state.

Proof of Work (PoW) Explanation:

ComponentFunction
MiningSolving complex mathematical puzzles
CompetitionMiners compete to solve first
VerificationNetwork verifies solution
RewardWinner gets cryptocurrency reward

PoW Process:

graph TD
    A[New Transaction] --> B[Miners Collect Transactions]
    B --> C[Create Block]
    C --> D[Solve Mathematical Puzzle]
    D --> E[First Solution Wins]
    E --> F[Block Added to Chain]
    F --> G[Miner Gets Reward]
  • Security: Computational work makes tampering expensive
  • Example: Bitcoin uses Proof of Work consensus

Mnemonic: “Consensus = Common Sense, Work = Win”


Question 3(b) [4 marks]
#

Why is Forking needed in Blockchain? List various types of Forks in Blockchain.

Answer:

Why Forking is Needed:

ReasonPurpose
UpgradesAdd new features to blockchain
Bug FixesCorrect security vulnerabilities
Rule ChangesModify consensus rules
Community DisagreementSplit when no consensus reached

Types of Forks:

Fork TypeDescriptionCompatibility
Soft ForkTightens rulesBackward compatible
Hard ForkChanges rules completelyNot backward compatible
Accidental ForkTemporary splitResolves automatically
Contentious ForkCommunity disagreementPermanent split

Fork Visualization:

graph TD
    A[Original Chain] --> B[Block N]
    B --> C[Soft Fork - Tighter Rules]
    B --> D[Hard Fork - New Rules]
    
    C --> E[Old nodes still work]
    D --> F[Old nodes rejected]
  • Impact: Forks can create new cryptocurrencies
  • Examples: Bitcoin Cash (hard fork), Ethereum updates (soft forks)

Mnemonic: “Fork = Future Options, Rules Kept”


Question 3(c) [7 marks]
#

What is Bitcoin Mining? Explain working, difficulty and benefits of Bitcoin mining in detail.

Answer:

Bitcoin Mining Definition: Process of adding new transactions to Bitcoin blockchain by solving computational puzzles.

Mining Process:

StepActionDetails
1. CollectionGather pending transactionsFrom mempool
2. Block CreationForm new blockInclude transactions
3. Puzzle SolvingFind correct nonceTrial and error
4. VerificationNetwork checks solutionValidates block
5. AdditionAdd block to chainPermanent record
6. RewardMiner gets BitcoinCurrently 6.25 BTC

Mining Workflow:

graph TD
    A[Pending Transactions] --> B[Miners Collect]
    B --> C[Create Block Header]
    C --> D[Guess Nonce Value]
    D --> E[Calculate Hash]
    E --> F{Hash < Target?}
    F -->|No| D
    F -->|Yes| G[Broadcast Solution]
    G --> H[Network Validates]
    H --> I[Block Added + Reward]

Difficulty Adjustment:

AspectMechanism
Target Time10 minutes per block
Adjustment PeriodEvery 2016 blocks (~2 weeks)
Auto-RegulationIncreases if blocks too fast
PurposeMaintain consistent block time

Benefits of Mining:

BenefitDescription
Financial RewardEarn Bitcoin for successful mining
Network SecurityMore miners = more secure network
Transaction ProcessingEnables Bitcoin transfers
DecentralizationNo central authority needed
  • Energy: Mining requires significant electricity
  • Competition: Difficulty increases with more miners
  • Hardware: Specialized ASIC miners most efficient

Mnemonic: “Mining = Money, Math, Maintenance”


Question 3(a) OR [3 marks]
#

Differentiate Soft fork and Hard fork.

Answer:

Fork Comparison:

AspectSoft ForkHard Fork
CompatibilityBackward compatibleNot backward compatible
RulesMakes rules stricterChanges rules completely
Node UpdatesOptional for old nodesMandatory for all nodes
Chain SplitNo permanent splitCan create permanent split
ConsensusEasier to implementRequires majority agreement
ExamplesSegWit (Bitcoin)Bitcoin Cash, Ethereum Classic

Visual Representation:

graph TD
    A[Original Blockchain] --> B[Fork Point]
    B --> C[Soft Fork - Stricter Rules]
    B --> D[Hard Fork - New Rules]
    
    C --> E[Old nodes still valid]
    D --> F[Old nodes incompatible]
    
    E --> G[Single chain continues]
    F --> H[Two separate chains]
  • Risk: Hard forks can split community and create competing currencies
  • Safety: Soft forks are generally safer and less disruptive

Mnemonic: “Soft = Same Direction, Hard = Huge Difference”


Question 3(b) OR [4 marks]
#

What is the importance of Finality in the World of Blockchain?

Answer:

Finality Definition: The guarantee that once a transaction is confirmed, it cannot be reversed or altered.

Importance Table:

AspectImportance
TrustUsers confident transactions are permanent
Business UseCompanies can rely on completed transactions
Legal CertaintyCourts can enforce blockchain records
SettlementFinancial institutions can clear payments

Types of Finality:

TypeDescriptionTime
ProbabilisticBecomes more certain over timeBitcoin: ~1 hour
AbsoluteImmediate guaranteeSome private chains
EconomicCost of reversal too highVaries by network

Finality Process:

graph LR
    A[Transaction Submitted] --> B[First Confirmation]
    B --> C[Multiple Confirmations]
    C --> D[Probabilistic Finality]
    D --> E[Practical Finality]
  • Bitcoin: 6 confirmations generally considered final
  • Ethereum: Moving toward faster finality with Proof of Stake
  • Challenge: Balance between speed and security

Mnemonic: “Final = Forever, Important = Irreversible”


Question 3(c) OR [7 marks]
#

What is a 51% attack in Blockchain? Explain in brief.

Answer:

51% Attack Definition: When a single entity controls more than 50% of network’s mining power or validators, allowing them to manipulate the blockchain.

Attack Mechanism:

StepAttacker ActionImpact
1. ControlGain >50% mining powerDominate network
2. Double SpendCreate secret chainPrepare alternative history
3. ExecuteRelease longer chainNetwork accepts fake version
4. ProfitSpend coins twiceSteal from victims

Attack Visualization:

graph TD
    A[Honest Chain] --> B[Block N]
    C[Attacker's Secret Chain] --> D[Block N']
    
    B --> E[Block N+1]
    D --> F[Block N'+1]
    D --> G[Block N'+2 - Longer Chain]
    
    G --> H[Network Accepts Attacker's Chain]
    E --> I[Honest Chain Abandoned]

Possible Attacks:

Attack TypeDescription
Double SpendingSpend same coins twice
Transaction ReversalCancel confirmed transactions
Mining MonopolyBlock other miners’ work
CensorshipPrevent specific transactions

Prevention Methods:

MethodHow It Helps
DecentralizationSpread mining across many participants
High Hash RateMake attack economically unfeasible
Proof of StakeAttackers lose their staked coins
MonitoringDetect suspicious mining activity

Real Examples:

BlockchainStatus
BitcoinNever successfully attacked
Ethereum ClassicAttacked multiple times
Small AltcoinsMore vulnerable due to low hash rate
  • Cost: Attacking major networks extremely expensive
  • Detection: Attacks usually detected quickly
  • Recovery: Networks can implement countermeasures

Mnemonic: “51% = Majority Mischief, Control = Chaos”


Question 4(a) [3 marks]
#

Describe various types of Hyperledger projects.

Answer:

Hyperledger Project Types:

ProjectPurposeUse Case
FabricModular blockchain platformEnterprise applications
SawtoothScalable blockchain suiteSupply chain, IoT
IrohaMobile-focused blockchainIdentity management
IndyDigital identity platformSelf-sovereign identity
BesuEthereum-compatible clientPublic/private Ethereum
BurrowSmart contract platformPermissioned networks

Project Categories:

graph TD
    A[Hyperledger Projects] --> B[Frameworks]
    A --> C[Tools]
    
    B --> D[Fabric - Enterprise]
    B --> E[Sawtooth - Scalable]
    B --> F[Iroha - Mobile]
    
    C --> G[Caliper - Performance]
    C --> H[Composer - Development]
    C --> I[Explorer - Monitoring]
  • Focus: Enterprise and business blockchain solutions
  • Open Source: All projects are freely available

Mnemonic: “Hyper = High Performance, Ledger = Large Enterprise”


Question 4(b) [4 marks]
#

Differentiate between Blockchain and Bitcoin.

Answer:

Comprehensive Comparison:

AspectBlockchainBitcoin
DefinitionTechnology/PlatformDigital Currency
ScopeBroader conceptSpecific application
PurposeRecord keeping systemPeer-to-peer payments
ApplicationsMany industriesPrimarily financial
FlexibilityCan be customizedFixed protocol
CreatorMultiple contributorsSatoshi Nakamoto
LaunchConcept evolved over timeLaunched 2009

Relationship Diagram:

graph TD
    A[Blockchain Technology] --> B[Bitcoin Cryptocurrency]
    A --> C[Ethereum Platform]
    A --> D[Supply Chain Apps]
    A --> E[Healthcare Records]
    
    B --> F[Digital Payments]
    B --> G[Store of Value]

Key Differences:

CategoryBlockchainBitcoin
TypeInfrastructureApplication
UsageMultiple purposesCurrency only
ModificationsCan be changedProtocol fixed
  • Analogy: Blockchain is like the internet, Bitcoin is like email
  • Dependency: Bitcoin needs blockchain, but blockchain doesn’t need Bitcoin

Mnemonic: “Blockchain = Building Block, Bitcoin = Specific Brick”


Question 4(c) [7 marks]
#

Write a short note on: Merkle Tree

Answer:

Merkle Tree Definition: A binary tree structure where each leaf represents a transaction hash, and each internal node contains the hash of its children.

Structure and Components:

ComponentDescription
Leaf NodesIndividual transaction hashes
Internal NodesHash of two child nodes
Root HashSingle hash representing entire tree
PathRoute from leaf to root

Merkle Tree Diagram:

HTaXshAAHashHTaXAsRBhBooBtHTHaXasshChHaCshCHTDaXshDD

Construction Process:

StepAction
1Hash each transaction individually
2Pair hashes and hash them together
3Continue pairing until single root
4Store root hash in block header

Benefits Table:

BenefitExplanation
EfficiencyQuick verification without downloading all data
SecurityAny change detected immediately
ScalabilityVerification time stays constant
StorageOnly root hash needed in block header

Verification Process:

graph TD
    A[Transaction to Verify] --> B[Get Merkle Path]
    B --> C[Hash with Sibling Nodes]
    C --> D[Compute Path to Root]
    D --> E[Compare with Stored Root]
    E --> F{Match?}
    F -->|Yes| G[Valid Transaction]
    F -->|No| H[Invalid Transaction]

Real-world Applications:

Use CaseApplication
BitcoinTransaction verification
GitVersion control
IPFSDistributed storage
Certificate TransparencySSL certificate logs
  • Inventor: Named after Ralph Merkle (1988)
  • Efficiency: Allows verification with O(log n) complexity
  • Security: Tampering with any transaction changes root hash

Mnemonic: “Merkle = Many Made One, Tree = Trustworthy”


Question 4(a) OR [3 marks]
#

Discuss briefly about Hash pointer and how it is used in Merkle tree.

Answer:

Hash Pointer Definition: A data structure containing both the location of data and cryptographic hash of that data.

Components:

ComponentPurpose
PointerShows where data is stored
HashProves data hasn’t changed
CombinationLinks data with integrity check

Hash Pointer in Merkle Tree:

HaTsXHhaAsAhRPotortHAaTHBsXahsBhBPoHiaTnsXtHheaCrsChPtrHCaTDsXhDD

Usage in Merkle Tree:

LevelHash Pointer Function
Leaf LevelPoints to transaction, contains transaction hash
Internal NodesPoints to children, contains combined hash
RootPoints to tree structure, contains overall hash
  • Verification: Can detect any change in tree structure
  • Navigation: Allows efficient traversal of tree

Mnemonic: “Hash Pointer = Location + Verification”


Question 4(b) OR [4 marks]
#

What is Hashing in Blockchain? How it is useful in Bitcoin?

Answer:

Hashing Definition: Mathematical function that converts input data into fixed-size string of characters.

Hashing Properties:

PropertyDescription
DeterministicSame input always produces same output
Fixed SizeOutput always same length (256 bits for SHA-256)
Avalanche EffectSmall input change = completely different output
One-wayCannot reverse to find original input
Collision ResistantExtremely hard to find two inputs with same output

Bitcoin Usage:

Use CasePurpose
Block LinkingEach block contains hash of previous block
MiningFind hash meeting difficulty requirement
Transaction IDsUnique identifier for each transaction
Merkle RootSummarize all transactions in block
AddressesCreate Bitcoin addresses from public keys

Hashing Process:

graph LR
    A[Input Data] --> B[SHA-256 Function]
    B --> C[256-bit Hash Output]
    
    D[Small Change in Input] --> E[SHA-256 Function]
    E --> F[Completely Different Hash]
  • Algorithm: Bitcoin uses SHA-256 hashing
  • Security: Makes blockchain tamper-evident
  • Efficiency: Quick to compute and verify

Mnemonic: “Hash = Fingerprint, Bitcoin = Built on Hashing”


Question 4(c) OR [7 marks]
#

Explain classic Byzantine generals problem and Practical Byzantine Fault Tolerance in detail.

Answer:

Byzantine Generals Problem: A classic computer science problem about achieving consensus in distributed systems with potentially unreliable participants.

Problem Scenario:

ElementDescription
GeneralsRepresent network nodes
CityRepresents the system state
Attack PlanRepresents consensus decision
TraitorsRepresent malicious/faulty nodes
CommunicationMessages between nodes

Problem Visualization:

graph TD
    A[General A - Honest] --> D[City Under Siege]
    B[General B - Traitor] --> D
    C[General C - Honest] --> D
    E[General D - Honest] --> D
    
    A --> F[Vote: Attack]
    B --> G[Vote: Attack to A, Retreat to C]
    C --> H[Vote: Attack]
    E --> I[Vote: Attack]

Practical Byzantine Fault Tolerance (pBFT):

pBFT Algorithm Phases:

PhaseActionPurpose
Pre-prepareLeader broadcasts proposalInitiate consensus round
PrepareNodes validate and broadcast agreementEnsure proposal is seen by all
CommitNodes commit to decisionFinalize consensus

pBFT Process Flow:

sequenceDiagram
    participant C as Client
    participant P as Primary Node
    participant B1 as Backup Node 1
    participant B2 as Backup Node 2
    
    C->>P: Request
    P->>B1: Pre-prepare
    P->>B2: Pre-prepare
    B1->>B2: Prepare
    B2->>B1: Prepare
    B1->>B2: Commit
    B2->>B1: Commit
    P->>C: Reply

Fault Tolerance:

AspectCapability
Maximum Faulty NodesCan tolerate up to 1/3 faulty nodes
Network RequirementSynchronous or partially synchronous
Message ComplexityO(n²) messages per consensus
FinalityImmediate finality achieved

Applications:

SystemUsage
Hyperledger FabricConsensus mechanism
TendermintByzantine fault tolerant consensus
ZilliqaPractical Byzantine fault tolerance
  • Advantage: Fast finality, good for permissioned networks
  • Limitation: High communication overhead, doesn’t scale well

Mnemonic: “Byzantine = Bad actors, pBFT = Practical Fix”


Question 5(a) [3 marks]
#

List and explain cryptocurrency wallets in blockchain.

Answer:

Cryptocurrency Wallet Types:

Wallet TypeDescriptionSecurity Level
Hardware WalletPhysical device storing keysVery High
Software WalletApplication on computer/phoneMedium to High
Paper WalletKeys printed on paperHigh (if stored safely)
Web WalletOnline wallet serviceMedium
Brain WalletKeys memorizedVariable

Storage Methods:

MethodAccessibilitySecurity
Hot WalletAlways onlineLower security
Cold WalletOffline storageHigher security

Wallet Functions:

graph TD
    A[Cryptocurrency Wallet] --> B[Store Private Keys]
    A --> C[Generate Addresses]
    A --> D[Sign Transactions]
    A --> E[Check Balances]
    A --> F[Send/Receive Crypto]
  • Key Point: Wallets don’t store coins, they store keys to access coins
  • Backup: Always backup wallet seed phrase

Mnemonic: “Wallet = Key Keeper, Not Coin Container”


Question 5(b) [4 marks]
#

Write advantages and disadvantages of ERC-20 token.

Answer:

ERC-20 Token Definition: Standard protocol for creating tokens on Ethereum blockchain.

Advantages:

AdvantageBenefit
StandardizationAll tokens work the same way
InteroperabilityCompatible with all Ethereum wallets
Easy DevelopmentSimple to create new tokens
Wide SupportSupported by exchanges and services
Smart Contract IntegrationCan interact with DeFi protocols

Disadvantages:

DisadvantageProblem
Gas FeesExpensive transactions during network congestion
ScalabilityLimited by Ethereum’s transaction throughput
Security RisksSmart contract bugs can cause token loss
CentralizationMany tokens have centralized control
Environmental ImpactHigh energy consumption

Comparison Table:

AspectAdvantageDisadvantage
AdoptionWidely acceptedMarket oversaturation
DevelopmentEasy to createEasy to create scam tokens
FunctionalityStandard featuresLimited customization
  • Usage: Most popular standard for creating cryptocurrency tokens
  • Examples: USDT, LINK, UNI are ERC-20 tokens

Mnemonic: “ERC-20 = Easy and Expensive”


Question 5(c) [7 marks]
#

What are dApps used for? Explain advantages and disadvantages of dApps.

Answer:

dApps Definition: Decentralized Applications that run on blockchain networks without central authority.

dApps Usage Categories:

CategoryExamplesPurpose
DeFiUniswap, CompoundFinancial services
GamingCryptoKitties, Axie InfinityBlockchain games
Social MediaSteemit, MindsCensorship-resistant platforms
MarketplacesOpenSea, RaribleNFT trading
GovernanceAragon, DAOstackDecentralized organizations
StorageFilecoin, StorjDistributed file storage

dApp Architecture:

graph TD
    A[Frontend - User Interface] --> B[Web3 Connection]
    B --> C[Smart Contracts]
    C --> D[Blockchain Network]
    D --> E[Distributed Storage]
    
    F[Traditional App] --> G[Central Server]
    G --> H[Central Database]

Advantages:

AdvantageDescription
Censorship ResistanceNo single point of control
TransparencyCode and data publicly verifiable
Global AccessAvailable worldwide without restrictions
No DowntimeDistributed across many nodes
User OwnershipUsers control their data and assets
TrustlessNo need to trust intermediaries

Disadvantages:

DisadvantageDescription
Poor User ExperienceComplex interfaces, slow transactions
Scalability IssuesLimited transaction throughput
High CostsGas fees for every interaction
Technical ComplexityDifficult for non-technical users
Regulatory UncertaintyUnclear legal status
Energy ConsumptionHigh environmental impact
Immutable BugsCannot easily fix smart contract errors

Development Challenges:

ChallengeImpact
Gas OptimizationMust minimize transaction costs
Security AuditingCritical to prevent hacks
User OnboardingDifficult to attract mainstream users
Scalability SolutionsNeed Layer 2 or alternative chains

Popular dApp Platforms:

PlatformCharacteristics
EthereumMost established, highest fees
Binance Smart ChainLower fees, more centralized
PolygonEthereum Layer 2, faster and cheaper
SolanaHigh throughput, newer ecosystem
  • Future: Moving toward better user experience and lower costs
  • Adoption: Still early stage but growing rapidly

Mnemonic: “dApps = Decentralized but Difficult”


Question 5(a) OR [3 marks]
#

Explain tokenized and token less Blockchain in detail.

Answer:

Tokenized Blockchain:

FeatureDescription
DefinitionBlockchain with native cryptocurrency token
Token PurposeIncentivize network participation
ExamplesBitcoin (BTC), Ethereum (ETH)
FunctionPay transaction fees, reward miners/validators

Token-less Blockchain:

FeatureDescription
DefinitionBlockchain without native cryptocurrency
AccessPermission-based participation
ExamplesHyperledger Fabric, R3 Corda
FunctionRecord keeping, process automation

Comparison Table:

AspectTokenizedToken-less
Incentive ModelEconomic rewardsPermission-based
AccessOpen to anyone with tokensRestricted access
GovernanceToken holder votingCentralized control
Use CasePublic networksPrivate/enterprise
SecurityEconomic game theoryTraditional security

Architecture Differences:

graph TD
    subgraph "Tokenized Blockchain"
        A[Token Rewards] --> B[Miners/Validators]
        B --> C[Secure Network]
        C --> D[Public Access]
    end
    
    subgraph "Token-less Blockchain"
        E[Permission System] --> F[Authorized Nodes]
        F --> G[Secure Network]
        G --> H[Private Access]
    end
  • Choice: Depends on whether you need public participation or private control
  • Trend: Most public blockchains are tokenized, most private ones are token-less

Mnemonic: “Token = Public Participation, Token-less = Private Permission”


Question 5(b) OR [4 marks]
#

Write advantages and disadvantages of Hyperledger.

Answer:

Hyperledger Definition: Open-source collaborative framework for developing enterprise-grade blockchain solutions.

Advantages:

AdvantageDescription
Enterprise FocusDesigned for business use cases
Modular ArchitectureCustomize components as needed
PrivacyConfidential transactions possible
PerformanceHigher transaction throughput
GovernanceProfessional development standards
No CryptocurrencyAvoids regulatory crypto issues
Permissioned NetworkControl who can participate

Disadvantages:

DisadvantageDescription
CentralizationLess decentralized than public blockchains
ComplexityRequires technical expertise to implement
Limited AdoptionSmaller ecosystem compared to Ethereum
Vendor Lock-inMay depend on specific technology providers
ScalabilityStill faces some scaling challenges
No Token EconomyCannot leverage crypto incentives

Hyperledger Projects Comparison:

ProjectStrengthsLimitations
FabricMature, flexibleComplex setup
SawtoothScalableLess documentation
IrohaSimple, mobile-friendlyLimited features

Use Case Suitability:

Good ForNot Ideal For
Supply chain trackingPublic cryptocurrencies
Healthcare recordsFully decentralized systems
Banking consortiumsHigh-frequency trading
Government systemsAnonymous transactions
  • Target: Large enterprises and consortiums
  • Support: Backed by Linux Foundation

Mnemonic: “Hyperledger = High Performance, Low Publicity”


Question 5(c) OR [7 marks]
#

Explain Smart contract. Write various applications of smart contract.

Answer:

Smart Contract Definition: Self-executing contracts with terms directly written into code, automatically enforced on blockchain.

Key Characteristics:

FeatureDescription
AutomatedExecutes automatically when conditions met
ImmutableCannot be changed after deployment
TransparentCode is publicly visible
TrustlessNo intermediaries needed
DeterministicSame input always produces same output

Smart Contract Workflow:

graph TD
    A[Contract Created] --> B[Deployed to Blockchain]
    B --> C[Conditions Monitored]
    C --> D{Conditions Met?}
    D -->|Yes| E[Contract Executes]
    D -->|No| F[Continue Monitoring]
    E --> G[Automatic Settlement]
    F --> C

Applications by Industry:

IndustryApplicationBenefit
FinanceAutomated loans, insurance claimsFaster processing, lower costs
Real EstateProperty transfers, rental agreementsReduced fraud, instant settlements
Supply ChainProduct tracking, quality assuranceTransparency, automated compliance
HealthcarePatient consent, insurance claimsPrivacy protection, automated payouts
EntertainmentRoyalty distribution, content licensingFair payment, transparent accounting
GamingIn-game assets, tournamentsTrue ownership, automated prizes

Specific Smart Contract Examples:

ApplicationFunctionPlatform
UniswapAutomated token tradingEthereum
CompoundLending and borrowingEthereum
CryptoKittiesDigital pet ownershipEthereum
ChainlinkOracle data feedsMultiple platforms
AaveFlash loansEthereum

Development Platforms:

PlatformLanguageFeatures
EthereumSolidityMost mature ecosystem
Binance Smart ChainSolidityLower fees, faster
CardanoPlutusAcademic approach
SolanaRustHigh performance

Benefits:

BenefitTraditional ContractSmart Contract
SpeedDays to weeksMinutes to hours
CostHigh legal feesLow gas fees
TrustRequires intermediariesTrustless execution
AccuracyHuman error possibleCoded precision

Limitations:

LimitationDescription
Code BugsErrors can cause financial loss
Oracle ProblemDifficulty getting real-world data
ImmutabilityHard to fix after deployment
Gas CostsCan be expensive on congested networks
Legal StatusUnclear regulatory framework

Real-world Impact:

SectorTransformation
DeFi$100+ billion locked in smart contracts
NFTsNew digital ownership models
DAOsDecentralized governance systems
InsuranceParametric insurance products
  • Future: Integration with IoT, AI, and traditional business systems
  • Evolution: Moving toward more user-friendly development tools

Mnemonic: “Smart Contract = Self-executing, Solves Problems”

Related

Foundation of Blockchain (4361603) - Summer 2024 Solution
Study-Material Solutions Blockchain 4361603 2024 Summer
Mobile Computing and Networks (4351602) - Summer 2025 Solution
Study-Material Solutions Mobile-Computing 4351602 2025 Summer
OOPS & Python Programming (4351108) - Summer 2025 Solution
Study-Material Solutions Python 4351108 2025 Summer
Renewable Energy & Emerging Trends in Electronics (4361106) - Summer 2025 Solution
Study-Material Solutions Renewable-Energy 4361106 2025 Summer
Software Engineering (4353202) - Summer 2025 Solution
18 mins
Study-Material Solutions Software-Engineering 4353202 2025 Summer
Electronic Measurements and Instruments (4331102) - Summer 2025 Solution
Study-Material Solutions Electronic-Measurements 4331102 2025 Summer