WEB3.0 protocol
Last updated
Last updated
Web3.0 is a more open, fair, and secure network. Its network form is not a simple upgrade of the current Web2.0. The core problem it wants to solve is actually the distribution of platform benefits. Web3.0 should try to solve the problem of benefit distribution on the basis of motivating people's subjective initiative and value creation.
In order to achieve a fairer and more open network, the Formless blockchain network operates through different layers, and its stack is as follows.
State layer: The state layer is located at the top. It captures and saves the state of every activity, interaction, or event that occurs in the lower layers. The state layer is provided by the blockchain, is open, and can be accessed by authorization.
Computing layer: Through the computing layer, developers can interact with the state layer and give it instructions. The complexity of the instructions varies with the blockchain network.
Component layer: The component layer includes those elements built on top of the computing layer. Its use cases include native cryptocurrencies, fungible and non-fungible tokens (NFT), stable coins, and digital identity solutions.
Protocol layer: In order for the component to work, developers must add functionality and create a set of standardized rules in the form of a protocol. For example, dYdX for derivatives, Kyber Network for trading, and Aave for lending.
Scalable layer: Compatible with the computing layer, the scalable layer can include side chains and other solutions to improve the performance of the blockchain network
User control layer: The main function of the user control layer includes managing users' private keys, and at the same time, providing them with the ability to sign transactions through the state layer. For this reason, both hosting (such as AAX) and user-controlled wallets (such as MetaMask) reside in this layer.
Application layer: The application layer includes third-party decentralized applications (DApps), built on top of the above-mentioned layers.
The Web3.0 protocol uses proof of time and space, and proof of replication, to ensure that miners correctly store the data they promise to store.
Proof-of-Space-time (PoSTs, Proof-of-Space-time)
As a storage miner, you need to submit collateral, and the time-space proof can confirm whether the storage miner has stored the data safely. If the storage miner does something harmful to the system, the collateral will be confiscated in whole or in part.
Proof-of-Replication (PoRep, Proof-of-Replication)
Proof of replication is an improved PoS (Proof-of-Storage). PoRep can prove that the data is stored by the miner, and it can ensure that the storage of each piece of data is independent, so it can prevent sybil attacks, external source attacks, and spawning attacks.