6 Transactions and Calls
“If debugging is the process of removing software bugs, then programming must be the process of putting them in.”
— Edsger Dijkstra
This chapter covers:
- Differentiating transaction types
- Examining identity management at the node level
- Interpreting the visibility of transactions
In the last chapter, we deployed our first multi-node network and talked a bit about consensus algorithms. We saw how nodes stay in sync over the data that has been put on the blockchain. And then we learned how to deploy a contract on to this network and how to send transactions to a deployed contract. However, we never really explained what a transaction is. We simply used it. In this chapter, we’ll get a better understanding of all they do and highlight their uses in DLT frameworks. While we are at it, we will look at the visibility of data in a DLT network to see what information transactions leak.