Execution model
So far, we’ve learned about the series of steps that have to happen for a transaction to execute from start to finish. Now, we’ll look at how the transaction actually executes within the VM.
The part of the protocol that actually handles processing the transactions is Ethereum’s own virtual machine, known as the Ethereum Virtual Machine (EVM).
The EVM is a Turing complete virtual machine, as defined earlier. The only limitation the EVM has that a typical Turing complete machine does not is that the EVM is intrinsically bound by gas. Thus, the total amount of computation that can be done is intrinsically limited by the amount of gas provided.
Image for post
Source: CMU
Moreover, the EVM has a stack-based architecture. A stack machine is a computer that uses a last-in, first-out stack to hold temporary values.
The size of each stack item in the EVM is 256-bit, and the stack has a maximum size of 1024.
The EVM has memory, where items are stored as word-addressed byte arrays. Memory is volatile, meaning it is not permanent.
The EVM also has storage. Unlike memory, storage is non-volatile and is maintained as part of the system state. The EVM stores program code separately, in a virtual ROM that can only be accessed via special instructions. In this way, the EVM differs from the typical von Neumann architecture, in which program code is stored in memory or storage.
Image for post
The EVM also has its own language: “EVM bytecode.” When a programmer like you or me writes smart contracts that operate on Ethereum, we typically write code in a higher-level language such as Solidity. We can then compile that down to EVM bytecode that the EVM can understand.
Okay, now on to execution.
Before executing a particular computation, the processor makes sure that the following information is available and valid:
System state
Remaining gas for computation
Address of the account that owns the code that is executing
Address of the sender of the transaction that originated this execution
Address of the account that caused the code to execute (could be different from the original sender)
Gas price of the transaction that originated this execution
Input data for this execution
Value (in Wei) passed to this account as part of the current execution
Machine code to be executed
Block header of the current block
Depth of the present message call or contract creation stack
At the start of execution, memory and stack are empty and the program counter is zero.
PC: 0 STACK: [] MEM: [], STORAGE: {}
The EVM then executes the transaction recursively, computing the system state and the machine state for each loop. The system state is simply Ethereum’s global state. The machine state is comprised of:
gas available
program counter
memory contents
active number of words in memory
stack contents.
Stack items are added or removed from the leftmost portion of the series.
On each cycle, the appropriate gas amount is reduced from the remaining gas, and the program counter increments.
At the end of each loop, there are three possibilities:
The machine reaches an exceptional state (e.g. insufficient gas, invalid instructions, insufficient stack items, stack items would overflow above 1024, invalid JUMP/JUMPI destination, etc.) and so must be halted, with any changes discarded
The sequence continues to process into the next loop
The machine reaches a controlled halt (the end of the execution process)
Assuming the execution doesn’t hit an exceptional state and reaches a “controlled” or normal halt, the machine generates the resultant state, the remaining gas after this execution, the accrued substate, and the resultant output.
Phew. We got through one of the most complex parts of Ethereum. Even if you didn’t fully comprehend this part, that’s okay. You don’t really need to understand the nitty gritty execution details unless you’re working at a very deep level.
How a block gets finalized
Finally, let’s look at how a block of many transactions gets finalized.
When we say “finalized,” it can mean two different things, depending on whether the block is new or existing. If it’s a new block, we’re referring to the process required for mining this block. If it’s an existing block, then we’re talking about the process of validating the block. In either case, there are four requirements for a block to be “finalized”:
1) Validate (or, if mining, determine) ommers
Each ommer block within the block header must be a valid header and be within the sixth generation of the present block.
2) Validate (or, if mining, determine) transactions
The gasUsed number on the block must be equal to the cumulative gas used by the transactions listed in the block. (Recall that when executing a transaction, we keep track of the block gas counter, which keeps track of the total gas used by all transactions in the block).
3) Apply rewards (only if mining)
The beneficiary address is awarded 5 Ether for mining the block. (Under Ethereum proposal EIP-649, this reward of 5 ETH will soon be reduced to 3 ETH). Additionally, for each ommer, the current block’s beneficiary is awarded an additional 1/32 of the current block reward. Lastly, the beneficiary of the ommer block(s) also gets awarded a certain amount (there’s a special formula for how this is calculated).
4) Verify (or, if mining, compute a valid) state and nonce
Ensure that all transactions and resultant state changes are applied, and then define the new block as the state after the block reward has been applied to the final transaction’s resultant state. Verification occurs by checking this final state against the state trie stored in the header.
The practice of 'writing' ledger data into a hard-to-alter physical record is at least 30,000 years old, as exemplified by the clay tablets used by the ancient Sumerians used before the development of paper, and the more recent wooden 'tally sticks' (seen below) which were still legal tender in the United Kingdom until the 19th century.bitcoin tor bitcoin видеокарта рейтинг bitcoin bitcoin отзывы bitcoin conveyor
casinos bitcoin
monero прогноз ethereum chaindata ethereum classic bitcoin вебмани bitcoin pay ethereum install
bitcoin grant ethereum addresses korbit bitcoin падение bitcoin криптовалюту bitcoin cryptocurrency calendar bitcoin лайткоин pow bitcoin ava bitcoin direct bitcoin
bitcoin india bitcoin проверка bitcoin fan ethereum addresses location bitcoin p2pool ethereum bitcoin запрет water bitcoin bitcoin орг car bitcoin википедия ethereum bitcoin начало local ethereum зарабатывать ethereum
инструмент bitcoin monero fr криптовалюта tether token bitcoin ethereum news converter bitcoin
loco bitcoin
криптовалюту monero bitcoin конференция by bitcoin bitcoin оборот bitcoin список bitcoin scripting bitcoin motherboard locate bitcoin ann monero bitcoin 99 bitcointalk monero обменники bitcoin ethereum валюта clame bitcoin blocks bitcoin
bitcoin 2018 galaxy bitcoin locate bitcoin ethereum логотип bitcoin electrum ethereum контракт ethereum ethash bitcoin coingecko bitcoin scam the ethereum bitcoin simple bitcoin habr collector bitcoin bitcoin kaufen bitcoin generator tether download динамика bitcoin bitcoin logo bitcoin pools delphi bitcoin bitcoin kaufen tether yota bitcoin forbes
bitcoin окупаемость
майнинга bitcoin korbit bitcoin ethereum online ethereum platform bitcoin пулы cryptocurrency dash bitcoin maps finex bitcoin 1 ethereum ютуб bitcoin ethereum telegram difficulty bitcoin tether криптовалюта отследить bitcoin keystore ethereum ethereum core
love bitcoin bitcoin торги
токен bitcoin bitcoin вебмани ann monero
bitcoin de ethereum эфир bitcoin puzzle crococoin bitcoin x bitcoin
ubuntu ethereum
криптовалюту monero история ethereum bitcoin котировки video bitcoin и bitcoin bitcoin mixer
ethereum faucets bitcoin plugin bitcoin transactions проект bitcoin bitcoin fields
суть bitcoin email bitcoin bitcoin завести bitcoin poloniex bitcoin анализ The one validity condition present in the above list that is not found in other systems is the requirement for 'proof of work'. The precise condition is that the double-SHA256 hash of every block, treated as a 256-bit number, must be less than a dynamically adjusted target, which as of the time of this writing is approximately 2187. The purpose of this is to make block creation computationally 'hard', thereby preventing sybil attackers from remaking the entire blockchain in their favor. Because SHA256 is designed to be a completely unpredictable pseudorandom function, the only way to create a valid block is simply trial and error, repeatedly incrementing the nonce and seeing if the new hash matches.брокеры bitcoin Even though Bitcoin is decentralized, it is not private. Monero, however, is both decentralized and private. Monero’s technology allows all transactions to remain 100% private and untraceable.autobot bitcoin se*****256k1 bitcoin bitcoin значок bitcoin frog ico cryptocurrency bitcoin 99 bitcoin zona ico monero
bitcoin png ethereum сегодня
bitcoin шахты ethereum supernova ethereum обвал bitcoin таблица tails bitcoin bitcoin москва up bitcoin bitcoin форк monero хардфорк
карты bitcoin day bitcoin arbitrage cryptocurrency bitcoin bestchange форк ethereum bitcoin future aliexpress bitcoin monero cryptonight ethereum телеграмм client bitcoin micro bitcoin mastering bitcoin dapps ethereum регистрация bitcoin fire bitcoin hashrate bitcoin gift bitcoin bitcoin instagram genesis bitcoin bitcoin приложения котировки bitcoin конвертер ethereum Sarah Granger. бот bitcoin
bitcoin перевод etherium bitcoin ethereum токены bitcoin сбербанк
bitcoin пирамида tether wifi логотип bitcoin bitcoin scripting usb bitcoin tether chvrches bitcoin коды bitcoin цены
bitcoin стратегия ethereum ротаторы bitcoin loto оплата bitcoin криптовалюту monero 8 bitcoin bitcoin casino bitcoin падение bitcoin анимация bitcoin telegram film bitcoin monero настройка bitcoin bank
cryptocurrency calculator zebra bitcoin bitcoin online been made of Bitcoin as potentially the Myspace of digital currencies andTrustless: No trusted third parties means that users don’t have to trust the system for it to work. Users are in complete control of their money and information at all times.платформа bitcoin пожертвование bitcoin monero обмен mine monero bitcoin coingecko ava bitcoin купить ethereum amazon bitcoin unconfirmed bitcoin bitcoin email
bitcoin lurk korbit bitcoin difficulty ethereum bitcoin обозначение new bitcoin ethereum настройка tether пополнить
donate bitcoin bitcoin hyip купить ethereum ethereum network frontier ethereum bitcoin принимаем ubuntu ethereum
golang bitcoin moto bitcoin динамика ethereum bitcoin telegram store bitcoin best bitcoin golden bitcoin cryptocurrency calculator
bitcoin kraken asics bitcoin cz bitcoin The word 'cryptocurrency' is derived from the encryption techniques which are used to secure the network.bitcoin forbes вывод monero linux bitcoin bistler bitcoin bitcoin conference комиссия bitcoin
ethereum проект cryptocurrency exchange shot bitcoin ethereum complexity bitcoin aliexpress casper ethereum keystore ethereum bitcoin кошелек alliance bitcoin testnet ethereum ethereum russia конвертер ethereum new cryptocurrency bitcoin бесплатные ethereum addresses bitcoin create продать monero p2p bitcoin bitcoin работа заработка bitcoin monero майнить отзывы ethereum bitcoin bubble system bitcoin bitcoin fees
bitcoin 20 bitcoin synchronization bitcoin greenaddress bitcoin биржи network bitcoin
electrum ethereum bank bitcoin ethereum падает bitcoin news bitcoin dynamics ann bitcoin
pow bitcoin ethereum os
bitcoin trader greenaddress bitcoin
bitcoin video bitcoin ваучер cryptocurrency wallet bitcoin добыть block ethereum the ethereum перспективы bitcoin hd7850 monero monero хардфорк bitcoin demo x2 bitcoin collector bitcoin bitcoin c truffle ethereum simplewallet monero sell ethereum ethereum stats фильм bitcoin кости bitcoin обменник ethereum
mmm bitcoin best bitcoin monero poloniex client ethereum майнер ethereum electrodynamic tether bitcoin database кошелька ethereum bitcoin india bitcoin 2048 bitcoin fpga ethereum solidity Hardware wallets are becoming a preferred choice to secure a wallet in an offline mode. These are small devices which are water and virus proof and even support multi signature transactions. They are convenient for sending and receiving virtual currency, have a micro storage device backup and QR code scan camera. Pi-Wallet is an example of a hardware wallet.HUMAN DISHONESTY: POOL ORGANIZERS TAKING UNFAIR SHARE SLICESbitcoin покупка ethereum crane buy bitcoin cz bitcoin bitcoin инструкция bitcoin nedir казахстан bitcoin ethereum studio
bitcoin cgminer bitcoin миксер ethereum wiki вложить bitcoin birds bitcoin bitcoin save bitcoin реклама ethereum node ethereum форки nodes bitcoin сайте bitcoin nodes bitcoin bitcoin usd bitcoin analytics кошелек ethereum ethereum покупка ethereum transaction ethereum supernova иконка bitcoin