Skip to content

Commit 4db590d

Browse files
committed
translate mining articles
1 parent 048dab7 commit 4db590d

File tree

4 files changed

+457
-1
lines changed

4 files changed

+457
-1
lines changed

docs/mining/concepts/acceptable-fee-rate-config.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,29 @@ sidebar_position: 7
33
---
44

55
# Acceptable Fee Rate Config
6+
7+
The acceptable fee rate refers to the minimum fee rate that miners are willing to accept during the mining process. If
8+
the transaction fee rate is lower than the acceptable fee rate, miners will not include that transaction. The acceptable
9+
fee rate is a crucial parameter for miners as it directly impacts their revenue.
10+
11+
Configuring the acceptable fee rate is an important mining strategy. Miners can set different acceptable fee rates based
12+
on their circumstances. If the acceptable fee rate set by the miner is too high, they might miss out on some low-fee
13+
transactions, thereby affecting their revenue. If the acceptable fee rate is set too low, they might accept some low-fee
14+
transactions, but these transactions might reduce the connectivity between miners and increase the risk of orphaned
15+
blocks. For more details, please refer to [Reorg and Orphaned Blocks](reorg-orphan-51attack.md).
16+
17+
Therefore, configuring an acceptable and reasonable fee rate is one of the important strategies for miners to
18+
participate in the network game and maximize their revenue.
19+
20+
## Fee Rate Configuration Methods
21+
22+
In the [node startup command](../../nodes/installation/start-up-command.md), there are two parameters related to
23+
transaction fee rates: `-blockmintxfee` and `-minrelaytxfee`.
24+
25+
- `-blockmintxfee`: The minimum transaction fee rate accepted for mining, measured in satoshis. Transactions with a fee
26+
rate lower than this configuration will not be included in the block by the node. The default value is 500 sat/KB.
27+
- `-minrelaytxfee`: The minimum transaction fee rate accepted by the node, measured in satoshis. Transactions with a fee
28+
rate lower than this configuration will not be forwarded by the node. The default value is 250 sat/KB.
29+
30+
To improve node connectivity and balance network performance, it is recommended to use the default configuration during
31+
mining.

docs/mining/concepts/asic.md

Lines changed: 134 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,137 @@ sidebar_position: 9
33
---
44

55
# ASIC
6+
7+
Introduction to the evolution of POW mining equipment.
8+
9+
## Evolution of Bitcoin Mining Equipment
10+
11+
The evolution of Bitcoin mining equipment reflects technological advancements and increased competition. From the
12+
initial use of CPUs to GPUs, and eventually to Application-Specific Integrated Circuits (ASICs), each type of equipment
13+
represents a different technological stage with its own characteristics.
14+
15+
### 1. CPU (Central Processing Unit)
16+
17+
**Significance**: When Bitcoin first emerged, mining primarily relied on the CPUs of ordinary computers. This was
18+
because Bitcoin's computational difficulty was low, and there were few participants, allowing substantial rewards even
19+
with CPU mining.
20+
21+
**Characteristics**:
22+
23+
- **High Availability**: Almost all computers have CPUs, making the initial entry barrier low.
24+
- **Versatility**: CPUs can perform various computational tasks, not just mining.
25+
- **Limited Computational Power**: CPUs have weaker parallel computing capabilities, resulting in lower mining speed and
26+
efficiency.
27+
28+
**Hash Rate Range**:
29+
Early CPU hash rates were very limited, typically ranging from a few MegaHashes per second (MH/s) to several hundred
30+
MegaHashes.
31+
Modern multicore CPUs can reach tens of MegaHashes per second, but they still lag significantly behind later mining
32+
devices.
33+
34+
### 2. GPU (Graphics Processing Unit)
35+
36+
**Significance**: As Bitcoin gained popularity and mining difficulty increased, miners began seeking more efficient
37+
solutions. GPUs, with their powerful parallel computing capabilities, gradually replaced CPUs as the mainstream mining
38+
equipment.
39+
40+
**Characteristics**:
41+
42+
- **Strong Parallel Computing Ability**: GPUs have numerous computational cores, allowing them to handle multiple tasks
43+
simultaneously, which is well-suited for Bitcoin mining's proof-of-work algorithm.
44+
- **High Efficiency**: Compared to CPUs, GPUs perform hash calculations faster and with lower power consumption.
45+
- **Wide Application**: Besides mining, GPUs are widely used in graphics rendering, scientific computing, and machine
46+
learning.
47+
48+
**Hash Rate Range**:
49+
GPUs' hash rates are significantly higher than CPUs, especially in parallel computing.
50+
Early GPUs had hash rates around 100 MH/s to several hundred MH/s.
51+
Later high-performance GPUs can reach hash rates of several GigaHashes per second (GH/s).
52+
53+
### 3. ASIC (Application-Specific Integrated Circuit)
54+
55+
**Significance**: To further enhance mining efficiency, ASIC devices specifically designed for Bitcoin mining emerged.
56+
ASICs have taken Bitcoin mining's specificity and efficiency to the extreme, fundamentally changing the mining market
57+
landscape.
58+
59+
**Characteristics**:
60+
61+
- **High Efficiency**: ASICs are custom-designed for specific tasks, and their computational power and energy efficiency
62+
far exceed those of CPUs and GPUs.
63+
- **Strong Specialization**: ASICs can only perform specific algorithm calculations, making them suitable for mining
64+
Bitcoin and other specific cryptocurrencies.
65+
- **High Cost**: Developing and manufacturing ASICs require significant investment, and the equipment is also expensive.
66+
- **Market Concentration**: Due to ASICs' high efficiency and cost, the mining market has gradually become dominated by
67+
a few professional miners with substantial capital.
68+
69+
**Hash Rate Range**:
70+
ASIC devices are designed specifically for mining, with hash rates far surpassing CPUs and GPUs.
71+
Early ASIC devices had hash rates of several GigaHashes per second (GH/s) to hundreds of GigaHashes.
72+
Modern efficient ASIC devices, like Bitmain's Antminer S19 Pro, can reach hash rates of 200 TeraHashes per second (TH/s)
73+
or higher.
74+
75+
Currently, MVC's mining algorithm is the same as Bitcoin's SHA-256, using ASIC devices.
76+
77+
## Introduction to ASIC
78+
79+
### Principle of ASIC
80+
81+
ASIC stands for Application-Specific Integrated Circuit, designed for specific uses. Unlike general-purpose CPUs and
82+
GPUs, ASICs are specifically designed for particular computational tasks. In Bitcoin mining, ASICs' primary task is to
83+
perform the SHA-256 hash algorithm, the core of Bitcoin's proof-of-work mechanism.
84+
85+
ASICs directly implement the steps of the SHA-256 algorithm through hardware circuits, avoiding the complex instruction
86+
decoding and pipeline control needed by general-purpose processors, thereby significantly improving computational
87+
efficiency and energy efficiency. This allows ASICs to perform the same tasks faster and with less power consumption
88+
than CPUs and GPUs.
89+
90+
### Design Philosophy
91+
92+
1. **Specialization**: The design goal of ASICs is to focus on specific computational tasks. In Bitcoin mining, this
93+
means ASICs are dedicated to performing SHA-256 hash calculations. The design team optimizes the circuits, removing
94+
all unnecessary functions to maximize hash rate and energy efficiency.
95+
96+
2. **High Efficiency**: ASICs achieve extremely high computational efficiency through hardware-level optimization. Since
97+
they do not need to handle other tasks, ASICs can complete massive hash calculations with minimal power consumption,
98+
giving them an edge in the competitive mining market.
99+
100+
3. **Customization**: Each ASIC chip is meticulously designed and tuned to meet specific performance and energy
101+
efficiency requirements. This customized design philosophy ensures significant performance improvements with each
102+
generation of ASIC devices.
103+
104+
### Implementation Overview
105+
106+
1. **Circuit Design**: The first step in designing ASICs is circuit design. Engineers design efficient logic circuits
107+
based on the SHA-256 algorithm's requirements, including arranging logic gates, registers, and clock signals. The
108+
goal of the circuit design phase is to ensure that each hash calculation step can be completed in the shortest time.
109+
110+
2. **Logic Simulation**: After completing the circuit design, engineers use simulation tools for logic verification.
111+
Through simulation, they can confirm the correctness and performance of the circuit design. This stage is crucial as
112+
it can detect and correct design errors, ensuring the final chip's functionality and performance.
113+
114+
3. **Layout Design**: Following logic verification, the process moves to layout design. This involves translating the
115+
logic circuit into a physical circuit layout, ensuring each component's actual position and connection on the chip.
116+
Layout design must consider signal delay, power distribution, and heat dissipation to ensure the chip's stability and
117+
high performance in real-world operation.
118+
119+
4. **Manufacturing and Testing**: After completing the layout design, the design files are sent to a semiconductor
120+
manufacturing plant for chip production. Once manufactured, the chips undergo rigorous testing, including
121+
functionality and performance tests, to ensure each ASIC chip meets design requirements.
122+
123+
5. **Packaging and Deployment**: Chips that pass testing are packaged and integrated into mining devices. Packaging not
124+
only protects the chip but also provides necessary interfaces for installation and use. Finally, the packaged ASIC
125+
chips are deployed in mining farms, starting efficient Bitcoin mining operations.
126+
127+
## Conclusion
128+
129+
The emergence and application of ASICs have ushered Bitcoin mining into an era of efficiency and specialization. Through
130+
specialized circuit design, hardware-level optimization, and precise manufacturing processes, ASIC devices achieve
131+
extremely high hash rates and energy efficiency, far surpassing traditional CPUs and GPUs. In the future, as
132+
semiconductor technology continues to advance, ASIC performance and efficiency will further improve, providing more
133+
robust support for Bitcoin and MVC mining and other specialized computing tasks.
134+
135+
The evolution from CPUs to ASICs also illustrates continuous technological progress and innovation, laying a solid
136+
foundation for the development of cryptocurrencies and blockchain technology. The application of ASICs not only propels
137+
Bitcoin mining forward but also offers new ideas and solutions for specialized computing in other fields. In the future,
138+
ASIC devices will continue to play a crucial role, injecting new vitality into the development of blockchain and
139+
cryptocurrencies.

docs/mining/concepts/asicboost.md

Lines changed: 161 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,164 @@ sidebar_position: 11
33
---
44

55
# ASICBoost
6+
7+
Introduction to a method to optimize mining power—ASICBoost.
8+
9+
In the field of Bitcoin mining, as competition becomes increasingly fierce, various optimization techniques have
10+
emerged. Among them, ASICBoost is a technology that can significantly improve the efficiency of mining machines. This
11+
article will analyze what ASICBoost is from a professional technical perspective, its implementation principles, why it
12+
can improve the efficiency of mining machines, and how mining pools support ASICBoost.
13+
14+
## What is ASICBoost
15+
16+
ASICBoost is a technology proposed by Dr. Timo Hanke in 2016 that improves Bitcoin mining efficiency by optimizing the
17+
SHA-256 hash calculation process. ASICBoost reduces the power consumption and time required for each hash calculation by
18+
eliminating certain repetitive steps in the hash computation. This optimization can be implemented on existing ASIC
19+
hardware without requiring physical modifications to the chip.
20+
21+
For a detailed understanding of the ASICBoost technology, please refer to the
22+
paper: [AsicBoost - A Speedup for Bitcoin Mining](https://arxiv.org/pdf/1604.00575).
23+
24+
## Introduction to ASICBoost Principles
25+
26+
The core idea of ASICBoost is to utilize intermediate states of the SHA-256 hash calculation. The SHA-256 algorithm is
27+
an iterative process where each round of computation depends on the output of the previous round. ASICBoost reduces the
28+
total computation by introducing "intermediate state reuse" in the hash calculation.
29+
30+
Specifically, ASICBoost can be implemented in two ways:
31+
32+
1. **Explicit ASICBoost**:
33+
- Explicit ASICBoost is a public and transparent method that optimizes proof-of-work (PoW) calculations by modifying
34+
specific fields in the Bitcoin block header. This method requires changes to a part of the Bitcoin protocol and
35+
can be detected by other nodes on the network.
36+
- Explicit ASICBoost is mainly achieved by modifying the version field in the block header. This method requires
37+
miners to make specific optimizations in their mining equipment and software. By adjusting the version field in
38+
the block header to produce the same intermediate state, it reduces the computational load. Different version
39+
numbers can map to the same intermediate hash state, allowing the reuse of previously cached intermediate states
40+
when calculating new hashes.
41+
42+
2. **Covert ASICBoost**:
43+
- Covert ASICBoost is a concealed method that optimizes PoW calculations without altering significant fields in the
44+
block header. This method is difficult for other nodes on the network to detect, hence the term "covert."
45+
- Covert ASICBoost is more complex and typically requires specific circuit design and optimization at the hardware
46+
level to reduce the computational load.
47+
48+
**Differences**:
49+
50+
- **Transparency**: Explicit ASICBoost is open and transparent, easily detectable; covert ASICBoost is concealed and
51+
hard to detect.
52+
- **Implementation**: Explicit ASICBoost mainly involves modifying the version field in the Bitcoin protocol; covert
53+
ASICBoost involves optimization through hardware circuit design.
54+
- **Community Reaction**: Covert ASICBoost, being hard to detect and considered potentially unfair, is controversial
55+
within the community. Explicit ASICBoost, being transparent, faces relatively less controversy.
56+
57+
Currently, the mainstream implementation of ASICBoost is explicit ASICBoost because it is relatively simple and easy to
58+
implement, and it is also more detectable by other network nodes.
59+
60+
## Reasons for Increased Efficiency
61+
62+
The primary reasons ASICBoost can improve mining machine efficiency are:
63+
64+
1. **Reduced Computation**: By reusing intermediate states, ASICBoost reduces the total computational load required for
65+
each hash calculation. This means that mining machines can perform more hash calculations in the same amount of time,
66+
increasing overall hash power.
67+
68+
2. **Lower Power Consumption**: With fewer unnecessary computational steps, mining machines consume less power for each
69+
hash calculation. This is particularly important for large-scale mining farms, as electricity costs are a significant
70+
part of their operating expenses.
71+
72+
3. **Hardware Optimization**: ASICBoost does not require physical modifications to existing ASIC hardware and can be
73+
implemented through firmware or software updates. This allows existing mining machines to quickly deploy and utilize
74+
this technology to improve mining efficiency.
75+
76+
## How Mining Pools Support ASICBoost
77+
78+
To support ASICBoost, mining pools need to make some adjustments and configurations. This mainly involves the
79+
verification and management of the work submitted by miners. Specifically, mining pools need to:
80+
81+
1. **Work Task Generation**: When generating work tasks, the mining pool needs to create tasks that can utilize
82+
ASICBoost. This includes adjusting the version field in the block header to fit the ASICBoost computation model.
83+
84+
2. **Work Verification**: The solutions submitted by miners need to be verified by the mining pool. The mining pool must
85+
be able to recognize and validate the hash calculation results using ASICBoost to ensure their legality and validity.
86+
87+
3. **Software Compatibility**: The mining pool needs to update its software to ensure compatibility with miners using
88+
ASICBoost. This includes protocol adjustments and optimizations to support ASICBoost features.
89+
90+
4. **Collaboration and Coordination**: Mining pool operators need to collaborate with miners and ASIC manufacturers to
91+
ensure the smooth implementation and deployment of ASICBoost technology. This includes providing technical support
92+
and assistance to help miners implement and optimize ASICBoost.
93+
94+
## Stratum Protocol Changes
95+
96+
The [Stratum protocol](stratum-protocol.md) is a commonly used communication protocol between miners and mining pools.
97+
To support ASICBoost technology, mining pools can make corresponding adjustments and optimizations through the Stratum
98+
protocol. This includes:
99+
100+
**Protocol Extensions**: Mining pools can extend the Stratum protocol to add support for ASICBoost. This includes
101+
defining new message types and fields to transmit ASICBoost-related information. Compared to the ordinary Stratum
102+
protocol, ASICBoost extends the following plugins:
103+
104+
* "version-rolling"
105+
* "minimum-difficulty"
106+
* "subscribe-extranonce"
107+
108+
**mining.configure**: The mining pool can send ASICBoost-related configuration information to miners via the
109+
mining.configure message. This includes specifying the method of using ASICBoost and version field adjustments, among
110+
other things. This is also a way to distinguish ASICBoost miners from ordinary miners.
111+
112+
```json
113+
{
114+
"method": "mining.configure",
115+
"id": 1,
116+
"params": [
117+
[
118+
"minimum-difficulty",
119+
"version-rolling"
120+
],
121+
{
122+
"minimum-difficulty.value": 2048,
123+
"version-rolling.mask": "1fffe000",
124+
"version-rolling.min-bit-count": 2
125+
}
126+
]
127+
}
128+
```
129+
130+
**Using the version-rolling Plugin**: The version-rolling plugin is a crucial part of ASICBoost, used to adjust the
131+
version field in the block header. Mining pools can send version field adjustment information to miners via the
132+
version-rolling plugin to support the ASICBoost computation model.
133+
134+
```json
135+
{
136+
"method": "mining.configure",
137+
"id": 1,
138+
"params": [
139+
[
140+
"version-rolling"
141+
],
142+
{
143+
"version-rolling.mask": "1fffe000",
144+
"version-rolling.min-bit-count": 2
145+
}
146+
]
147+
}
148+
```
149+
150+
The mask field specifies the mask for the version field, and the min-bit-count field specifies the minimum number of
151+
bits for version adjustment. These two fields determine the range that the version can be adjusted.
152+
153+
When handling work submitted by ASICBoost miners, the mining pool needs to adjust and verify the block header
154+
accordingly based on this configuration to correctly package the transactions.
155+
156+
For more details, please refer
157+
to [Stratum Extensions](https://github.com/slushpool/stratumprotocol/blob/master/stratum-extensions.mediawiki).
158+
159+
## Conclusion
160+
161+
As a technology to optimize Bitcoin mining efficiency, ASICBoost significantly improves the computational efficiency and
162+
energy efficiency of mining machines by reducing repetitive steps in the SHA-256 hash calculation. Its implementation
163+
principle mainly relies on reusing intermediate states, which can reduce computation and lower power consumption. Mining
164+
pools can support ASICBoost technology through appropriate adjustments and configurations, providing a more efficient
165+
mining environment for miners. As the Bitcoin network continues to develop, innovative technologies like ASICBoost will
166+
play an important role in improving mining efficiency and reducing operational costs.

0 commit comments

Comments
 (0)