1-6-3. Low Power Consumption
Last updated
Last updated
Please find below a brief explanation of PoC:
It stands for Proof of Capacity, which is a mining process by capacity. This consensus algorithm requires significantly less power than the others.
The FRUITS mining system does not use a method that calculates hash values for each block created but instead, it uses a method that searches for hash values from cryptographic data created in advance (e.g., a plot file containing nonce with a scoop consisting of pairs of hash values). Therefore, the system can perform mining with low power, low noise, and low heat, and is an excellent system in terms of energy efficiency. In addition, since a hard disk drive can be used as a storage medium for storing cryptographic data, compared to dedicated hardware such as ASICs, there is no need for expensive investment, many miners can participate, and mining can be conducted relatively equally.
Of each node, the node with plotter function, called a full node, calculates hash values by a certain hash function in the background during free time like software updates. These cryptographic data are stored in the free space on the hard disk or other storage devices. The node in charge of the mining process is selected by a random draw based on the labeling of the hash values. All of the selected nodes will perform the mining process at 100% power because the mining process will be divided among them and will be performed simultaneously. This means that no power is wasted. As a side note, it is generally reported that more than 99% of power is wasted in the mining process. In comparison, PoC minimizes the number of instantaneous calculations and makes effective use of them. In the process of adding cryptographic data, cryptographic data for additional mining is created and stored in a storage medium. Specifically, a plot file is created and stored as the cryptographic data.
A plot file (mentioned above), contains one or more groups of data, called nonce, for example, and one nonce, for example, contains 8192 hashes. Hashes usually consist of pairs, and a pair of hashes is referred to as a scoop. The method of creating cryptographic data for mining is not particularly limited, but for example, a creation method (software, etc.) that can create a plot file containing nonce (nonce including the hashes mentioned above) can be used. The created plot file is tied to a specific account ID. This account ID is different for each miner. Thus, the same nonce number can be found in different miners.
Since cryptographic data is stored on a storage medium, for example, a hard disk drive, increasing the hard disk drive can increase the amount of cryptographic data used for mining. The addition of cryptographic data and mining are separate operations and can be done simultaneously or separately.