Skip to main content

Protocol High-level Overview

To orientate the reader, we provide a high-level overview of the protocol, following the natural life cycle of a block. The first module usedwhile the block is still being created, is the Tip Selection module. Here, the node must choose a certain number (from two to eight) of other blocks to reference, meaning that the newly created block will be cryptographically attached to these referenced blocks. An honest node must always choose tips uniformly at random from a tip pool, i.e., from a set of still unreferenced blocks that satisfy a certain set of conditions, as discussed on the Tangle component. In the diagram below, the issuance process being described now is represented in the context of the complete protocol.

Each node in the network has limited bandwidth, CPU, and memory. In order to avoid any node from being overloaded, the right to write in everybody else's Tangle is regulated by the Rate and Congestion Control Modules. The first one dictates the maximum rate of issuance of blocks by the introduction of a small amount of proof of work. However, if an attacker accelerates the block issuanceeffectively flooding the network, the difficulty of the proof of work for that node will increase exponentially. Eventually, the attacker will be incapable of issuing new blocks.

Later, the Congestion control module fairly allocates the network resources accordingly to a quantity called Access Mana, which acts as a Sybil protection mechanism. We can summarize Access Mana as a scarce resource, that makes an effective Sybil protection mechanism. Thus, each node has the right to issue blocks at a rate proportional to their Access Mana. This fair rate is not constant (since the utilization of the network may fluctuate), and to correctly set its own individual rate of issuance of blocks, each node uses a mechanism called the Rate Setter, that makes the average issuance rate of the node converge to the fair rate guaranteed by Access Mana. Nodes that do not use the rate Setter will be punished by either the Rate Control or the Congestion Control Module.

Between the Rate Setter and the actual gossip of the block, several steps will take place, butfor the sake of clearnesswe ignore these steps for now and return to this subject later. Then, assuming that the block was properly created, it will be propagated to the rest of the network. Since we deal with a large number of nodes, the communication graph cannot be complete. Thus, the network topology will be dictated by the Neighbor Selection (aka Autopeering) module.

Protocol Overview Received Block

We turn our attention now to another point of view: the one of the nodes receiving new blocks, represented in the diagram above. After receiving a block, the node will perform several syntactical verifications, that will act as a filter to the blocks. Additionally, the block has to be solidified, meaning that the node must know all the past cone of the block (i.e., the set of all blocks directly or indirectly referenced by the block in question). After this step, the node places all the blocks left into an inbox. At a fixed global rate (meaning that all nodes use the same rate), the node uses a scheduler to choose a block from the inbox. This schedulerthat, technically, is part of the aforementioned congestion control mechanismworks as a gatekeeper, effectively regulating the use of the most scarce resources of the nodes. Since the scheduler works at a fixed rate, the network cannot be overwhelmed. The scheduler is designed to ensureeven in the presence of attackersthe following properties:

  1. Consistency: all honest nodes will schedule the same blocks
  2. Fair access: the nodes' blocks will be scheduled at a fair rate according to their Access Mana
  3. Bounded latency: the processing time of all blocks will be bounded

Only after passing the scheduler the blocks can be written into the local Tangle. To do that, the nodes perform most of the semantic validation, such as the search for irreconcilable conflicts in the block's past cone or (in the case of value transfers) unlock condition checks. At this point (if the block passes these checks), the block will be booked into the local Tangle of the node and be gossiped to the rest of the network. Additionally, in the case of a value transfer, the ledger state and two vectors called Access Mana Vector and Consensus Mana Vector are updated accordingly. The Consensus Mana is another Sybil protection mechanism whichsince it is applied to different modules than Access Manahas the need of a different calculation.

Protocol Overview Booking

After having the block booked, the node is free to gossip it, but a crucial step of the protocol is still missing: the Opinion Setter and the voting protocol, that deal with the most subjective parts of the consensus mechanism (notice that, until now, the protocol has mostly dealt with objective checks). The voting protocol used here is the FPC (or Fast Probabilistic Consensus), which is a binary voting protocol that allows a large group of nodes to come to a consensus on the value of a single bit. The FPC begins with each node having an initial opinion, set using the node's local time perception and ordering of the blocks. The nodes must set opinions about two subjects:

  1. The legitimacy of the timestamp of the block: Whenever a node issues a block, it adds a timestamp to it, which should represent the local time of issuance (as seen by the issuer node). The other nodes will judge if this timestamp is reasonable, by checking if it is too far away from their own local clock.
  2. In the case of a value transfer, whether it is a conflict: We use the FCoB Rule. Roughly, the node will have a positive opinion about a transaction A if and only if all its conflicts arrived later than a certain time interval after A's arrival.

In each round, nodes randomly choose other nodes to query about their opinions about one of the subjects above. The querying node changes its own opinion if the number of responses with a different opinion than it is greater than a certain threshold. In order to prevent liveness attacks, this threshold is determined by a random number issued by a committee of high Consensus Mana nodes via the dRNG application. Without the random threshold, an attacker could lie about its responses in a way that could prevent the protocol from terminating. Finally, a node will finalize on a certain opinion after holding it for a certain number of rounds.

When selecting which other nodes to query, a node must weight the list of all nodes by Consensus Mana. Thus, high Consensus Mana nodes are queried more often than low Consensus Mana nodes. This makes it difficult for an attacker to manipulate the outcome of the voting. Unless the attacker controls more than 1/3 of the Consensus Mana in the system, with high probability, we know that FPC has the following properties:

  1. Termination: every honest node will finalize on some opinion before a maximum round number.
  2. Agreement: all honest nodes will finalize on the same opinion.
  3. Integrity: if a super majority of nodese.g. more than 90% weighted by Consensus Mana, have the same initial opinion, then FPC will terminate with that value.

Protocol Overview Consensus

Analogously to Bitcoin's six blocks rule, our protocol has certain measures of the probability of a certain block being considered valid permanently by all nodes. This is achieved by the use of the Approval Weight. The Approval weight represents the weight of conflicts (and blocks). Different to the classical Nakamoto consensus, instead of selecting a leader based on a puzzle (PoW) or stake (PoS), it allows every node to express its opinion by simply issuing any block and attaching it in a part of the Tangle it likes based on a Like switch. Through the like switch, a block can even reference blocks of conflicts it doesn't like (thereby reduce orphanage), by explicitly expressing which ones it likes instead. This process is known as On-Tangle-Voting.