Explain Byzantine Agreement Problem
The Pease, Shostak and Lamport study was one of the first to consider the problem of implementing coordinated behavior between processors in a distributed system in the presence of failures . Since the publication of the document, this topic has become a broad area of research. Below is a presentation of the key findings on the specific issues that will be addressed in their paper. In some cases, this entry uses the terminology currently accepted in this area and not the original terminology used by the authors. To make the interactive problem of coherence more understandable, Lamport has developed a colorful allegory in which a group of army geneticists formulates a plan to attack a city. In the original version, the generals were designated as commanders of the Albanian army. The name was changed and eventually placed in “Byzantine,” on Jack Goldberg`s proposal, to make any possible insult safe for the future.  This formulation of the problem, along with some additional findings, were presented by the same authors in their 1982 paper “The Byzantine Generals Problem.”  What is interesting about distributed systems is that more than two-thirds of participants must be “loyal” for it to work. In fact, Berkely.edu did an interesting thought experiment to see if a three-knot system can or may not handle the problem of Byzantine generals. The solution to the problem is based on an algorithm that can guarantee it: let`s now return to the problem of Byzantine generals and see how POW mitigates the initial problem. When Lamport, Pease and Shostak first identified the problem, they created an algorithm to solve the problem. The algorithm thinks my son`s almost 10 years old. A few days ago, I shared the problem of the Byzantine general.
Almost an hour before bed, he struggled with the problem and the solution – unsurprisingly! It`s a fictitious problem, but it`s one of the toughest problems of all time. It was first mentioned in the 1982 document entitled “The Problem of Byzantine Generals.” It should be noted that the POW algorithm is not error-intolerant because it has a mathematical or algorithmic magic. This is only for sure because the mining process itself is extremely expensive.