L1X System Architecture
Last updated
Last updated
This section provides a comprehensive architectural overview of the Layer One X (L1X) network, delving into the underlying components and implementation details that drive its functionality.
The L1X System Architecture is designed to handle a seamless and secure flow of transactions through various stages, ensuring their proper execution and recording on the destination chain. At the core of this architecture is a sophisticated network of nodes that collaborate to process and validate transactions, maintaining data integrity and reliability.
The journey of a transaction begins with its submission to the Concierge Node. This node serves as the initial filter and gatekeeper for incoming transactions. It evaluates each transaction's characteristics, such as Transaction Type and Account, to determine its validity and appropriateness for processing. Additionally, the Concierge Node performs rigorous authenticity checks to ensure the transaction's legitimacy. Once validated, the transaction is dispatched to the mempool of the Transaction Execution Node.
The Transaction Execution Nodes play a pivotal role in the execution of transactions. They closely monitor event structures provided by the Event Listener Nodes, which act as sources of crucial transaction-related information. These event structures are meticulously scrutinized by the Event Listener Node for accuracy and legitimacy. Upon validation, confirmation is relayed to the Transaction Execution Nodes, giving them the green light to proceed.
With the confirmation from the Event Listener Nodes in hand, the Transaction Execution Nodes carry out the transaction processing in adherence to predefined rules. These rules serve as guidelines for executing transactions accurately and consistently, minimizing errors and ensuring compliance with the established standards.
Once the processing is complete, the Transaction Execution Node compiles the transaction details into an object or payload. This payload is then transmitted to the Sign and Broadcasting Nodes, which undertake the critical task of adding an extra layer of security. The Broadcasting Nodes affix digital signatures to the payload, safeguarding its integrity and authenticity.
Upon successful signing, the payload embarks on its journey to the destination chain. This phase involves transmitting the payload to the destination chain for final execution. The Event Listener Node closely monitors this process and promptly updates its own state based on the responses received from the destination chain. The result of the transaction deployment is communicated to the Transaction Execution Nodes, completing the feedback loop and providing a comprehensive view of the transaction's lifecycle.
With the confirmation and result information in hand, the Transaction Execution Node finalizes the transaction by adding it to the designated block on the destination chain. This marks the conclusive step in the transaction's journey, ensuring its official inclusion in the chain's ledger.
In essence, the described system architecture orchestrates a harmonious symphony of nodes, each with a specialized role, to process, validate, secure, and record transactions seamlessly. The collaboration between these nodes guarantees the reliability and accuracy of transactions within a dynamic and distributed ecosystem.
The above process can be summarized as under:
The signed transactions are sent to Concierge Node which filters transactions based on Transaction Type and Account.
The Concierge Node also verifies the transaction authenticity and sends the transaction to the Transaction Execution Node’s mempool.
The Transaction Execution Nodes listen to the event_struct from the Event Listener Nodes.
The Event Listener Node validates the event and sends the confirmation to the Transaction Execution Nodes.
After receiving confirmation from the Event Listener Nodes, the Transaction Execution Nodes processes the transactions based on pre-defined rules.
The Transaction Execution Node sends the object/payload to the Sign and Broadcasting Nodes.
The Broadcasting Nodes signs and then sends the payload to the destination chain.
The Event Listener Node updates its state on the destination chain response and passes the transaction deployment result to the Transaction Execution Nodes.
The Transaction Execution Node then confirms and adds the transaction to the block.
In the L1X blockchain network, there are various types of nodes, each serving specific roles to ensure the network's proper functioning.
The Event Listener Nodes monitor the blockchain for incoming events and data from other blockchain networks. They are actively involved in validating the events received. They also act as passive observers, detecting and recording changes to the blockchain, such as new transactions, smart contract interactions, or state updates, initiated by other blockchain networks.
Transaction and Execution nodes are also known as Full Validator Nodes. These nodes are responsible for validating and executing transactions on the L1X blockchain. These nodes check the transaction's validity, confirm the availability of sufficient funds, and ensure compliance with the network's consensus rules.
Signing and Broadcasting Nodes are involved in the process of interoperability by securely signing and broadcasting transactions to target blockchain networks. They ensure data integrity and authenticity, as the signature acts as cryptographic proof that the transaction originates from a legitimate source. They broadcast the signed transaction across the respective networks, allowing the destination chain to receive and verify the transaction.
The forthcoming section on L1X Infrastructure delves into the innovative design principles that underpin a versatile and forward-looking foundation for projects within the blockchain ecosystem. This infrastructure is ingeniously structured into modular components, serving as a strategic blueprint that not only caters to the present operational needs but also empowers projects to architect for the future. By embracing these modular elements, projects gain the flexibility to adapt, scale, and integrate evolving technologies, ensuring sustained relevance and growth in a rapidly changing landscape. This section offers a comprehensive exploration of how L1X Infrastructure empowers projects to navigate the complexities of today while strategically positioning themselves for the opportunities of tomorrow.
The L1X Node Software stands as the core container within the blockchain network, orchestrating a multitude of essential services for seamless operation. This versatile software encompasses a diverse range of functionalities, including managing the consensus mechanism that ensures agreement among nodes, hosting Cassandra services for robust data storage, facilitating the speedy execution of L1X Virtual Machines for smart contracts, and providing a host of other critical services vital to the network's performance. Through its integration of these elements, the L1X Node Software establishes a foundation of stability, efficiency, and versatility, enabling the L1X blockchain network to thrive and fulfill its potential.
The L1X Consensus Mechanism is based on Proof of X which is a hybrid consensus mechanism based on Proof of Stake and Democratic Validation. The objective of this is to progressively move towards a Clustered environment where low powered devices will be a part of the consensus in the long run allowing to leverage eBPF byte-code stack and the ability for devices to initiate transactions on the network.
The consensus mechanism grows like a leaf where we have three main types of nodes on the protocol and you will see later how this beautifully works with X-Talk and the new State Management design that we have implemented.
We have three main types of nodes on the network which are Event listeners, Execution nodes and Signing-Broadcasting nodes that work together to facilitate X-Talk transactions.
Event Listener Nodes allow to listen to Oracle and Events from outside the protocol whereby the these nodes will validate the message and transfer it to the smart contract execution environment which will then handle the further processing of it. These replace the Oracle, Routers and Event validators which you will be familiar with in the unstructured Bridge environment.
Execution Nodes are responsible to execute X-Talk which we will get into a bit later. They control cross contract call dependencies and make sure that the contracts are executed deterministically. Serialisation and Deserialisation of the payload which can be transformed based on business logic will take place here where the payload created are validated and stored to be executed by the next node category.
Signing-Broadcasting nodes which are responsible to pickup the payload, sign it and broadcast it to the right target chain, contract and function.
This allows for a modular design framework which; if you were to take a further step than to just build a cross-chain dApp; will let you pick and modify a certain module as per your need for example implementing your own kind of event listening and validation or signing and broadcasting nodes based on a custom business logic.
Next in the service is the State Management which we have chosen a Decentralised Column Family Relationship database structure which allows for immense performance in the new type of data that you will generate through your transactions.
The L1X Galaxy introduces a sophisticated and scalable network model comprising three distinct types of nodes: Event Listening Nodes, Execution Nodes, and Signing-Broadcasting Nodes. Each node type performs a specialised function critical to the seamless operation of the blockchain network.
The beauty of the L1X Galaxy architecture lies in its scalability. As the network experiences increased demand and workload, both vertical and horizontal scaling approaches are employed. Vertical scaling involves optimising the existing nodes for enhanced performance, enabling them to handle larger transaction volumes efficiently. On the other hand, horizontal scaling is achieved by adding more nodes to the network, distributing the load across multiple instances and thereby increasing overall capacity.
This combination of horizontal and vertical scaling ensures that the network can accommodate growing user needs without compromising on performance or reliability. The modular nature of the architecture enables seamless integration of new nodes, ensuring a flexible and adaptable ecosystem that can readily adjust to changing demands.
In summary, the L1X Galaxy architecture, with its three distinct node types and scalable design, offers a holistic approach to building a robust and future-ready blockchain network. By enabling efficient communication, secure execution, and reliable transaction dissemination, this architecture paves the way for sustained growth and innovation within the blockchain ecosystem.
Mobile Devices
In the evolving landscape of the L1X Galaxy, the integration of mobile devices as a fundamental component marks a groundbreaking advancement. These mobile devices play a pivotal role by becoming active participants in the network's infrastructure and consensus, offering unique capabilities that contribute to the network's decentralization and resilience.
Mobile Device Participation: In this visionary approach, mobile devices are seamlessly integrated into the network's fabric. They are entrusted with storing registers, which are essential data structures containing transaction-related information. These registers serve as local caches for critical data, enabling rapid access and efficient synchronization across various nodes. By actively participating in this data storage and synchronization process, mobile devices amplify the network's ability to distribute data, enhancing fault tolerance and reducing latency.
Enabling Register Sync: Mobile devices take on the vital responsibility of facilitating register synchronisation across the network. They act as intermediaries, relaying data between nodes and ensuring that all nodes possess consistent and up-to-date information. This dynamic sync mechanism minimises data discrepancies and promotes a harmonious flow of information within the network.
Empowering Transaction Capabilities: The integration of mobile devices goes beyond data management. These devices, in the first phase, are not only capable of initiating transactions but also validating them. This introduces a new dimension to the network's decentralization, as the collective power of mobile devices contributes to transaction verification. This distributed validation process enhances the network's security and resilience.
Evolution towards Device Subnets: This pioneering step sets the stage for an even more ambitious future. As the network progresses, mobile devices are poised to evolve into a cohesive subnet. This subnet architecture involves mobile devices forming interconnected clusters with specialized roles, similar to the structure of the larger blockchain network. This decentralized subnet concept presents a transformative potential, enabling mobile devices to collectively process transactions, maintain consensus, and contribute to the overall integrity of the blockchain.
The inclusion of mobile devices in the L1X Galaxy signifies a paradigm shift in blockchain infrastructure. Beyond serving as passive endpoints, these devices actively contribute to data storage, synchronization, validation, and eventually, the formation of decentralized subnets. This innovative approach not only leverages the ubiquity of mobile devices but also aligns with the principles of decentralization and democratization, enhancing the resilience and adaptability of the network in an increasingly interconnected world.
PoX Consensus Metrics
In the quest for achieving consensus and decentralization, the participation of network participants holds the utmost importance. Trust in the L1X blockchain network and the availability of trusted participants are crucial factors that drive the success and sustainability of the blockchain ecosystem. To address this, a mechanism that efficiently considers both old and new participants in the PoX consensus is proposed. By incorporating metrics such as StakeScore, KinScore, and XScore, we aim to evaluate participants' stake holdings, active involvement, and adherence to security measures. These metrics play a vital role in achieving consensus, promoting decentralization, and ensuring the integrity and security of the network. In the subsequent sections, we will delve into the significance of each metric, highlighting their importance in maintaining a robust and reliable PoX consensus mechanism.
StakeScore: This is a measure of a node's commitment to the network, based on the amount of L1X coins they have staked, the length of time they have been staking, and the length of time they have agreed to lock up their coins. A high StakeScore indicates that a node is more likely to behave honestly, as they have more to lose if they are caught cheating.
KinScore: This is a measure of a node's reliability and trustworthiness, based on their uptime, participation history, response time, and security measures. A high KinScore indicates that a node is more likely to be able to participate in the consensus process reliably and without disruption.
XScore: This is a combined measure of StakeScore and KinScore, which is used to determine which nodes are eligible to participate in the PoX consensus. A higher XScore indicates that a node is more likely to be a reliable and trustworthy participant in the consensus process.
The PoX consensus metrics are designed to achieve consensus and decentralization by rewarding nodes that are committed to the network, reliable, and trustworthy. By ensuring that the network is sufficiently decentralized, the PoX consensus helps to protect the network from attack and ensure that it is fair and transparent.
PoX Consensus Process
XScore, StakeScore, and KinScore are integral components of the sophisticated block proposer selection process in the L1X blockchain ecosystem.
To calculate XScore, the process considers all nodes that have staked a minimum balance and are actively available within the network. These nodes undergo evaluation to determine their XScore, which subsequently plays a significant role in determining their eligibility for the next epoch of the consensus process. Nodes with an XScore exceeding the defined XScore Threshold (that varies based on network dynamics) are deemed eligible for participation.
To ensure data privacy and security, homomorphic encryption is applied to XScore. This cryptographic technique enables computations to be performed on encrypted data without compromising its confidentiality. By leveraging homomorphic encryption, the privacy of XScore calculations is preserved, allowing for a secure evaluation process.
Furthermore, a randomized algorithm is applied to the homomorphically encrypted XScores. This algorithm introduces an element of randomness in the selection of the block proposer. By employing a randomized approach, the consensus protocol mitigates potential biases and ensures a fair and decentralized block proposer selection process.
Overall, the intricate interplay between XScore, StakeScore, KinScore, homomorphic encryption, and randomized algorithms forms a robust framework that enables accurate evaluation, privacy preservation, and fair selection within the L1X blockchain network. The randomness injected into the selection process prevents any undue advantage or bias towards specific nodes, fostering a level playing field for all participants. Furthermore, the use of homomorphic encryption ensures that the privacy of the nodes is preserved, enhancing the overall security posture of the L1X blockchain.
X-Talk
X-Talk represents a pioneering leap in the realm of blockchain technology, emerging as an innovative Communication and Logic Validation Infrastructure that revolutionizes the decentralization of business logic and state. This cutting-edge framework is meticulously designed to unlock the potential of cross-chain communication, fostering a new era of interoperability and collaboration between disparate blockchain networks.
Decentralized Business Logic and State: At its core, X-Talk empowers developers and users alike to decentralize their business logic and state. This means that the traditional paradigm of centralized decision-making and data management is shifted towards a distributed and trustless model, ensuring heightened security, transparency, and resilience.
Enabling Cross-Chain Communication: The hallmark feature of X-Talk is its remarkable ability to facilitate seamless cross-chain communication. In a landscape marked by various isolated blockchain networks, X-Talk serves as the bridge that connects these islands of data and functionality. This ensures that information and transactions can flow fluidly between distinct blockchains, overcoming the limitations of siloed ecosystems.
The Vision of X-Talk: The overarching vision of X-Talk is to empower developers to construct contracts that go beyond the confines of a single blockchain. By employing predefined rules and logic, these contracts become capable of executing complex business operations and transactions that span multiple chains. This visionary approach breaks down barriers, enabling new applications and services that were once thought to be beyond the realm of possibility.
Example: Consider a cross-chain application that leverages X-Talk. Imagine a scenario where users can seamlessly join a Balancer Pool—a decentralized financial platform—based on predefined rules. These rules could stipulate that if the price of a particular token decreases below a certain threshold, the user's holdings in that token should be automatically sold. The proceeds from the sale could then be used to acquire another token, which is subsequently added to the Balancer Pool. All of this can occur in a fully automated and trustless manner, transcending the limitations of individual blockchains.
Agnostic Chains: One of X-Talk's remarkable attributes is its agnosticism towards the location of the participating chains. Whether the chains are hosted on different networks, protocols, or even ledgers, X-Talk bridges these gaps and allows them to function cohesively as part of a unified ecosystem. This versatility liberates developers and users from the constraints of chain-specific considerations.
Thus, X-Talk represents a groundbreaking leap towards the future of blockchain technology. Its ability to enable cross-chain communication, decentralize business logic, and maintain state across disparate chains reshapes the landscape of possibilities for blockchain applications. By fostering interoperability and automating intricate operations, X-Talk aligns with the broader ethos of decentralisation, transparency, and efficiency that underpins the blockchain revolution.
L1X-VM
Introducing the L1X VM platform, an innovation that empowers developers to seamlessly execute smart contracts. L1X VM stands out by employing a unique approach, compiling from WASM to eBPF, thereby enhancing efficiency and performance. This dynamic platform not only facilitates the deployment of Ethereum contracts but also enables smooth interaction with these contracts directly from the VM. What sets L1X VM apart is its remarkable flexibility, allowing developers to channel their expertise in smart contract development, including proficiency in Solidity Contracts. By streamlining the development process and capitalising on existing skills, L1X VM emerges as a catalyst for accelerating innovation in the realm of smart contract execution. The L1X core discerns the type of contract from three possible options: L1XVM
, EVM
, and XTALK
. Let's have a look in more detail.
Smart Contract Execution and Compilation: The L1X VM emerges as a transformative tool that empowers developers to execute smart contracts within the platform's ecosystem. At its core, the VM acts as a bridge between high-level programming languages and the blockchain's execution environment. This is achieved through a two-step compilation process: the VM first compiles smart contracts written in languages like Solidity into WebAssembly (WASM) bytecode, followed by a translation into extended Berkeley Packet Filter (eBPF) instructions. This process optimises contract execution speed and ensures compatibility with various system architectures, enhancing the efficiency of contract deployment and interaction. More details in this section.
Cross-Chain Compatibility and Ethereum Integration: A standout feature of the L1X VM is its remarkable capacity to seamlessly integrate Ethereum contracts into the ecosystem. Developers can deploy Ethereum contracts directly onto the L1X platform, effectively expanding the scope of their applications beyond a single blockchain. Moreover, the VM facilitates interaction with these deployed Ethereum contracts, enabling the creation of cross-chain functionalities. This interoperability between Ethereum contracts and the L1X ecosystem opens doors to a wider array of possibilities, such as decentralised finance (DeFi) applications that span multiple chains. More details in this section.
Empowering Developers with Familiar Tools: One of the L1X VM's most compelling attributes is its focus on developer convenience and familiarity. The VM acknowledges that many developers are well-versed in Ethereum's Solidity programming language and the associated tooling. With this in mind, the L1X VM lets developers leverage their existing smart contract development skills by allowing them to work with Solidity Contracts. This strategic decision significantly reduces the learning curve for developers transitioning to the L1X ecosystem, ensuring that their expertise remains valuable and applicable.
Enhanced Focus on Development: The flexibility afforded by the L1X VM aligns with the ethos of empowering developers to focus on what truly matters: the development of innovative and impactful blockchain applications. By abstracting away complexities related to cross-chain interactions and compilation intricacies, the VM empowers developers to channel their energies into refining the functionality, security, and user experience of their applications.
L1X VM ability to compile to WASM → eBPF, integrate Ethereum contracts seamlessly, and prioritise developer familiarity showcases its commitment to both innovation and user convenience. As the blockchain landscape continues to evolve, the L1X VM represents a pivotal step toward enhancing the accessibility, scalability, and impact of blockchain applications.
L1X Storage System
The foundation of the L1X System Storage is deeply rooted in the innovative principles of the Cassandra Multiple Column practice. This strategic choice in architecture serves as the backbone for efficient data management, excelling in the storage and retrieval of large volumes of data characterised by varying attributes. The utilization of Cassandra's column-family structure provides a dynamic platform that elegantly addresses the challenges posed by data diversity, making it an optimal solution for storing and handling complex data structures within a decentralised network.
Node Roles and Data Distribution: A core feature of the L1X System Storage revolves around the allocation of specific roles to network nodes. Each node is tasked with maintaining a particular category of data, directly related to its designated role. This strategic data distribution methodology has a twofold benefit: it not only streamlines data retrieval by reducing the distance between the requester and the data source but also significantly minimises latency. This role-based approach enhances the overall efficiency of the system and ensures that data can be accessed with remarkable speed, fostering an environment conducive to quick decision-making and seamless interactions.
Dynamic Scalability: The L1X System Storage introduces a groundbreaking approach to network scalability. Built to be adaptable and responsive, the system exhibits the remarkable ability to adjust its structure according to evolving network demands. This dynamic scalability ensures that the system remains optimized and performs optimally even as usage patterns change. For instance, if there's a surge in demand for resources such as Event Listener nodes from Chain B, the protocol can seamlessly allocate additional nodes to meet these requirements. This capability safeguards the system's performance while accommodating growth without compromising on stability.
By carefully integrating the Cassandra Multiple Column practice, implementing role-based data distribution, and offering dynamic scalability, the L1X System Storage redefines the paradigm of data management within distributed networks. It's a testament to innovation that not only optimises data storage and retrieval but also positions the system as a flexible and adaptive solution for the challenges of today's rapidly changing decentralized landscapes.
L1X Transaction Lifecycle (Can be a new Section)
The L1X Transaction Lifecycle follows a precisely orchestrated process, encompassing submission, validation, execution, verification, and eventual integration into the same chain. This section provides an in-depth exploration of this journey, highlighting the stages in ensuring a seamless and secure transaction flow.
The transaction lifecycle within the L1X network is a meticulously orchestrated process that ensures the secure and reliable execution of user-initiated transactions. Here's a detailed breakdown of the steps involved:
Transaction Initiation: The process begins when a user digitally signs a transaction using the ECDSA (Elliptic Curve Digital Signature Algorithm) encryption method. Once signed, the transaction is submitted to the L1X network.
Transaction Verification and MemPool Addition: A full node within the L1X network takes charge of verifying the authenticity of the incoming transaction. Upon successful verification, the transaction is considered authenticated and is subsequently added to the network's MemPool, a temporary storage area for pending transactions.
Cluster Information Query: The full node initiates a query to the network's validator nodes, which often consist of mobile devices. The objective is to retrieve cluster-related information that helps guide the transaction's trajectory within the network.
Cluster Details Transmission: Validator nodes respond by furnishing details about similar clusters and the respective full nodes within these clusters. This information forms the foundation for effective transaction distribution.
Transaction Broadcasting: With the cluster context in hand, the full node broadcasts the authenticated transaction to the nodes within its designated cluster. This step ensures the efficient dissemination of the transaction throughout the network.
Logical Validation by Cluster Nodes: All nodes within the cluster embark on a critical phase of logical validation for the received transaction. This process evaluates the transaction against predefined rules and criteria, ensuring its integrity and legitimacy.
Block Proposer Selection: The network's PoX (Proof of Execution) consensus mechanism comes into play. Through a randomized process, a Block Proposer is selected. This node takes on the responsibility of constructing a block that will include multiple validated transactions.
Block Creation and Zero Knowledge Proof: The Block Proposer assembles a block comprising the validated transactions. Prior to broadcasting, a layer of security is added through the application of Zero Knowledge Proof, enhancing data confidentiality.
Block Broadcast: The Block Proposer transmits the completed block to all connected nodes within similar clusters. This broadcasting ensures that all relevant nodes are informed of the newly created block.
Block Validation and Peer Communication: Full nodes across the network engage in the verification of the received block. Upon successful validation, the block is shared with peers to maintain synchronization and consistency.
Transaction Completion Intimation: Once the network confirms the successful addition of the block containing the user's transaction, an intimation is sent back to the user. This notification marks the completion of the transaction lifecycle.
In essence, the transaction lifecycle within the L1X network represents a harmonious collaboration between digital signatures, consensus mechanisms, logical validation, and broadcasting protocols. This intricate process ensures the secure, transparent, and efficient execution of transactions while leveraging the collective power of nodes within the network's clusters.