From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1Vi5pb-00033a-95 for bitcoin-development@lists.sourceforge.net; Sun, 17 Nov 2013 17:08:19 +0000 X-ACL-Warn: Received: from tyrell.rbrune.de ([83.169.16.173]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.76) id 1Vi5pZ-0006GW-8I for bitcoin-development@lists.sourceforge.net; Sun, 17 Nov 2013 17:08:19 +0000 Received: from [127.0.0.1] (localhost [127.0.0.1]); authenticated by tyrell.rbrune.de with ESMTPSA id 07F454240E8D for ; Sun, 17 Nov 2013 17:43:15 +0100 (CET) From: Rafael Brune Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Message-Id: <63B3BF21-C487-4D62-8BB8-18C90F2C3F4C@rbrune.de> Date: Sun, 17 Nov 2013 17:43:14 +0100 To: bitcoin-development@lists.sourceforge.net Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\)) X-Mailer: Apple Mail (2.1822) X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: github.com] -0.5 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain X-Headers-End: 1Vi5pZ-0006GW-8I Subject: [Bitcoin-development] Bitcoin Network Simulator X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 17 Nov 2013 17:08:19 -0000 Over the last days I spent some time working on a simple Bitcoin network = simulator. It is a stochastic event-based continuous-time simulation of Bitcoin = miners exchanging messages and building block chains. It simulates latency, = bandwidth=20 and also verification speed but it currently does not simulate = propagation/inclusion of transactions and instead uses random block sizes. The simulator includes two examples, one for a 51% attack and the other = is an implementation of selfish mining (pretty much 1:1 as described in the = paper). With the random parameters I picked it seems like it pays off to mine = selfish with >=3D30% of the hashing power - but take this with a huge grain of salt = as this is with a very small network and randomly chosen parameters. And of = course it is not a perfect replica of the real world network. Since this is based on my understanding of the Bitcoin network and = protocol it would be great if others would take a look and help improve it. The project can be found on my github: https://github.com/rbrune/btcsim Regards, Rafael Brune=