The developers of Avalanche DEX describe the Avalanche approval mechanism.

区块律动BlockBeats view 6606 2021-12-15 09:48
share to
Scan QR code with WeChat

This article or section needs sources or references that appear in credible third-party publications.

Avalanche (Avalanche Protocol) has changed every layer of the blockchain network, but with an innovation compared to the others. When I saw this, I immediately quit my old job and turned to the Avalanche business.

Here is a translation of the Avalanche.

First of all, what is an agreement?

An idea that allows multiple blocks in a single decision. When on a blockchain, the most important decision is that the block becomes a new block in the chain.

Before the Avalanche consensus, there were two consensus algorithms: Classical and Nakamoto.

The classic consensus was reached by multiple votes. Each part of the network must communicate with the other nodes and announce its decisions. Since nodes need to communicate with other nodes throughout the network, members of the network node need a list of member protocols.

The classic algorithm can be used when the number of nodes is low, but the time complexity of the O (n ^ 2) algorithm is very high, making the node network expensive to operate (usually proportional to the square of the number of nodes .). node n). At the same time, this algorithm cannot measure large distributions that support users.

Some blockchains use classic consensus algorithms to cover up dysfunctions. These blockchains typically allow certain low-level users to participate in opt-in mechanisms and blocking processes that can be used to deceive users. On the surface of this type of blockchain network there are 1000 validators, but in fact only 100 validators participate in the approval order.

The second type of faction of agreement algorithms is the Nakamoto Agreement. This is what Bitcoin and many other cryptocurrencies use. Strings which adopt the "longest string" and use the most functions will have basic information by default. Miners do not participate in the voting process, only hash numbers and distribute the results of their work to the outside world.

The advantage of Nakamoto's recognition algorithm is that it can measure for multiple users without any downtime. The problem, however, is that the performance is not very good.

Any number of minor nodes can join or exit the cracking process, which slows down the process blocks and changes the storage content of the chain as the blocking process can be done at any time.

You may have heard that Bitcoin network marketing is over after 6 new blocks were created. However, this is only a very effective result with a probability of 99% as estimated.

The more the new block and its chain are identified by the network system, the less likely it is to have a longer chain to replace it. However, this does not guarantee that long chains will not occur.

Next, we will present the Avalanche proposal. This is a new type of consent algorithm used by random subsampling.

The approval process was designed and developed by researchers at Cornell University, including Avalanche co-founders Emin Gün Sirer, Ted Yin, and kevin sekniqi.

Let me illustrate the avalanche approval mechanism by example.

Let's say you have 1,000 people attending a conference who have to decide what to eat for lunch. Pizza or Sandwich. Everyone has a preference at the start, but must agree on a final plan.

According to the participants, a small sample was selected and 10 participants were asked what they wanted to eat. Seven people say pizza. It's like most people want pizza so if someone asks you now you could say you want pizza too.

Then we do another type of random sampling. Another group of 10 applicants was asked a question and often said that they would change their preferences if they answered it was a sandwich, and most likely they would rather they say it was pizza. . This way you can get the same result after two tests.

You can repeat this process over and over again until you get the same result 100 times in a row. At this point, I think the final decision has been made.

Since the nodes only communicate with the number of nodes in each probe perimeter, the most difficult time to send messages in an instance is O (1) (usually not regularly). Unlike standard algorithms, the complexity of the transmission does not increase when the number of nodes n increases.

But how often does random sampling get the end result? It depends on the size of your network. But its complexity is controllable in O (log n) (proportional to logarithmic functions and 10 times less than linear functions).

Avalanche approval is based on an evaluation of the results. A node may draw incorrect conclusions by repeating only some of the nodes. However, the contract is negotiable. You can make the result of a small result, such as less than 0.0000000001%.

The high rating makes the Avalanche final. Once a network exchange has been determined, it is constantly chained into a chain. There is no block rebuilding in the Avalanche.

This is the vision of the Avalanche consensus mechanism.

https://twitter.com/das_connor/status/1470147125870841861

雪崩DEX开发者为你详解Avalanche共识机制

If you look closely, you will see that after an individual's example, the end result of many round examples is irreversible. It was like moving snow through an avalanche. It was called the Avalanche Agreement.

Now that you know how it works, why is it important? What can you do?

Feature 1: The process works great and the most common limitations are latency and network bandwidth.

This means that you can connect to the Avalanche network of devices at low cost. No special mining equipment required. Half-level server sufficient. Some users even run the Avalanche Validator Node on their Raspberry Pi.

Behavior 2: The process is static and only runs when there is a function, there is no “waste” like Proof of Work (POW) mechanisms.

Behavior 3: Avalanche's approval algorithm is environmentally friendly. Due to the minimum material requirements, the environmental impact is minimal. Avalanche also recently partnered with businessman Vinay to ensure carbon neutrality.

Tool 4: The rapid implementation of the avalanche approval algorithm is very fast. In our experience and practice, the Avalanche can do 4,500 conversions per second and be completed in 1-2 seconds.

Feature 5: Avalanche can use all types of Sybil defenses. Avalanche is a stake-based blockchain (PoS) platform. However, POS is not an algorithm, it is only a defensive algorithm against Sybil.

Sybil protection mechanisms can prevent a user from interfering with multiple packages and affecting multiple users. Many issues require a lot of witness work, and I think the issues are a small commodity.

The Avalanche protocol requires a Sybil protection mechanism, but an alternative is available. For example, you can build an avalanche using a proof of work (pow).

An avalanche approved mechanism can be put in place (the system can be set up based on operational requirements). In fact, this is a relatively new protocol and there is no stable rule implementation.

For example, you can set up a network without any security or functionality issues.

At Avalanche blockchain, we have orchestrated a very secure network. Unlike Bitcoin's "51% stop", the Avalanche invasion required 80% of the campaign node.

Bitcoin's "51% Resistance" is like a central organization that runs history and persecutes minorities. In Avalanche, 80% of security failures due to a combination of nodes force nodes in different parts of the network to make different decisions. Avalanche considers the balance of safety and importance. If one-third of the nodes in the network are offline, network operations may be slowed or stopped until they come back to threshold.

btcfans公众号

Scan QR code with WeChat

Disclaimer:

Previous: Search volume has skyrocketed over the past 3 months. What is the difference between web3.0? Next: Musk again supports Dogecoin business idea

Related