Tron TRX Explain|| 10% To @tron-fan-club||

in hive-183397 •  2 years ago  (edited)
What is Tron (TRX)

Tron is a blockchain-based estimate created in 2017. It was a special project at the time, as it did not advertise any cryptography or design improvements. Decentralized request, smart contracts, tokens, and its delegated proof-of-stake consensus were all introduced by other projects.

20230426_121220_0000.png

Designed by me from canva

History of Tron

Tron was created in 2017 by the Tron Foundation. It started on the Ethereum blockchain before moving to its own blockchain in 2018. In July of the same year, it acquired the file sharing service BitTorrent and added it to the ecosystem.2020 was a record breaking year for Tron. The Samsung Play Store now has a Tron section, and JustSwap was launched in August, allowing traders to quickly exchange between TRC-20 tokens. In late 2020, Tron also surpassed Ethereum in terms of transaction volume.

How does Tron work

20230426_121752_0000.png

Designed by me from canva

  • The core layer serves as the foundation of the blockchain, performing critical functions required by the network. Block validation (which we'll talk about a bit later) and smart contract reading are particularly important parts of this layer and account management.

  • Next, you've got the storage layer. As the name suggests, it allows data to be stored. This layer can handle complex storage requirements using a distributed storage system using DB, a fast key-value storage protocol developed by Google.

  • Finally, we have the application layer. TRON's network is competent of hosting distribute applications, or DApps. Therefore, DApp builder need a way to transmit with the TRON matrix, and this is where the implementation layer comes in. planner can also use this layer to create wallets.

  • The TRON network uses a consensus mechanism called delegated proof-of-stake to validate blocks and add them to the blockchain. This mechanism is similar to the standard Proof of Stack protocol but uses user-assigned authenticators instead. This gives TRON users more control over who secures the network and reduces the chances of empowering malicious authenticators.

vM1pGHgNcyCXUWJECrZbvn1NMPj1oFGUo3gYfF3NNPRD9VBJqARvPr7nQp8yjNPx2ukEMSeeXYUFMMcBzyifipzWZQRmf7C5UC9CQ2QA8PNa6nz9tW8zZg1fVmACmtDi2V4LEYe.png

Best Regards By

@mumar

vM1pGHgNcyCXUWJECrZbvn1NMPj1oFGUo3gYfF3NNPRD9VBJqARvPr7nQp8yjNPx2ukEMSeeXYUFMMcBzyifipzWZQRmf7C5UC9CQ2QA8PNa6nz9tW8zZg1fVmACmtDi2V4LEYe.png

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!