Skip to content

gelinas-lambda/Sprint-Challenge--Hash-BC

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Sprint Challenge: Hash Tables and Blockchain

This challenge allows you to practice the concepts and techniques learned over the past week and apply them in a concrete project. This Sprint, we learned how hash tables combine two data structures to get the best of both worlds and were introduced into the fascinating world of blockchains. In your challenge this week, you will demonstrate proficiency by solving algorithms in Python using hash tables and add another key feature to your blockchain.

Instructions

Read these instructions carefully. Understand exactly what is expected before starting this Sprint Challenge.

This is an individual assessment. All work must be your own. Your challenge score is a measure of your ability to work independently using the material covered through this sprint. You need to demonstrate proficiency in the concepts and objectives introduced and practiced in preceding days.

You are not allowed to collaborate during the Sprint Challenge. However, you are encouraged to follow the twenty-minute rule and seek support from your PM and Instructor in your cohort help channel on Slack. Your work reflects your proficiency in Python and your command of the concepts and techniques in related to hash tables and blockchains.

You have three hours to complete this challenge. Plan your time accordingly.

Commits

Commit your code regularly and meaningfully. This helps both you (in case you ever need to return to old code for any number of reasons and your project manager.

Description

This sprint challenge is divided up into three parts: Hash tables coding, blockchain coding, and a short interview covering parts of hash tables and blockchain.

Interview Questions

Explain in detail the workings of a dynamic array:

  • What is the runtime complexity to access an array, add or remove from the front, and add or remove from the back? ANSWER Accessing an array is O(1), add or remove from back is also O(1) - constant runtime. If you search, insert, delete, it's linear runtime O(n). Adding to front is an example of an insertion. It's O(n) because you have to make copies of the data to shift it.

  • What is the worse case scenario if you try to extend the storage size of a dynamic array? ANSWER When you extend the storage size, you have to do a for loop to copy over the old storage to the new memory address. That is an O(n) constant runtime operation.

  • Explain how a blockchain is structured. What are the blocks, what is the chain? How is the data organized? ANSWER Blocks are pieces of data, including transactions, a hash of the previous block, and a cryptographic proof. The cryptographic proof is a piece of data that when added to the previous block hashes to something with the requested number of leading zero's. The chain is how each block immutable links to past blocks through the hashing of previous blocks-- any chance to any block with irreparably alter all future blocks.

  • Explain how proof of work functions. How does it operate. How does this protect the chain from attack. What kind of attack is possible? ANSWER Proof of work function by requiring a difficult cryptographic puzzles to be solved to create new blocks -- namely determining a proof that will hash the old block to the desired new number of leading zeros. Since hash functions have good uniformity, it's impossible to predict or quickly guess or predict what a future proof will be. This prevents the chain from attach by making it extremely improbable an attacker could computer proofs for false transactions faster than the consensus network is computing proofs for valid transactions. If the attacked had over 51% of the computing power dedicated to the network however, this kind of attack would be possible and the chain could be rewritten.

Project Set Up

[Hash Tables]

For the hash tables portion of the sprint challenge, you'll be working through two algorithm problems that are amenable to being solved efficiently using a hash table. You know the drill at this point. Navigate into each exercise's directory, read the instructions for the exercise laid out in the README, implement your solution in the .py skeleton file, then make sure your code passes the tests by running the test script with make tests.

A hash table implementation has been included for you already. Your task is to get the tests passing (using a hash table to do it). You can remind yourself of what hash table functions are available by looking at the hashtable.py file that is included in each exercise directory (note that the hash table implementations for both exercises differ slightly).

You may not use any advanced, built-in Python functions to solve these problems.

[Blockchain]

For the blockchain portion of the challenge, you will be writing code for a new miner that will solve a different Proof of Work algorithm than the one we have been working with.

Your goal is to mine at least one coin. Keep in mind that with many people competing over the same coins, this may take a long time. By our math, we expect that an average solution should be the first to find a solution at least once in an hour or two of mining.

Minimum Viable Product

Rubric

OBJECTIVE TASK 1 - DOES NOT MEET EXPECTATIONS 2 - MEETS EXPECTATIONS *3 - EXCEEDS EXPECTATIONS
implement and describe how high-level array functions work down to the memory level Interview Question The student fully explains two or fewer of the bulleted items in the solution repo. The student fully explains at least 3 of the items in the bulleted list. The student fully explains 4 or more items from the bulleted list.
implement and utilize basic hash table + handle collisions and resizing in a hash table Hash Problem 1 & 2 Tests do not pass on one or both problems, or solutions do not use hash tables. Tests pass on both problems. Solution utilizes a hash table. Tests pass on on both problems with solutions utilizing hash tables, linear runtime complexity, no flake8 complaints.
diagram and code a simple blockchain, utilizing a cryptographic hash Interview Question The student fully explains two or fewer of the bulleted items in the solution repo. The student fully explains at least 3 of the items in the bulleted list. The student fully explains 4 or more items from the bulleted list.
utilize a Proof of Work process to protect a blockchain from attack Blockchain Problem The student is unable to mine a coin before the end of lunch. The student was able to mine a coin before the end of lunch. The student presented a unique solution that was able to mine more than 100 coins before the end of lunch.
build a protocol to allow nodes in a blockchain network to communicate to share blocks and determine consensus. Interview Question The student fully explains two or fewer of the bulleted items in the solution repo. The student fully explains at least 3 of the items in the bulleted list. The student fully explains 4 or more items from the bulleted list.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%