You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Mar 24, 2023. It is now read-only.
Currently, node-types are mostly defined by the data they process. While this gives a relatively good idea of what the different node-types are, it does not really inform the implementation as there are open questions around what the node-types actually do.
Suggestions
Think of the node-types more from a less theoretic perspective and fully clarify their roles and responsibilities in the network beyond what the current definitions cover (data and fraud proofs only).
clarify what other network messages a node-type is intended to process/gossip etc (e.g. consensus messages and others) and if this is optional or not
clarify further node types and their relation in the network that are not yet covered (e.g. seed nodes, sentry nodes, etc)
if not obvious after the above is done: clarify the relation to the node-types in the specs and existing tendermint "modes" (not sure if this belongs in the specs or rather an adr but we really need this; either way, tracking it here as it should obviously be thought about when writing the specs too)
this all must result in an overview diagram (!) (could come first actually as it is way easier to discuss and faster to draft than writing a lot of text)
Just to spark discussion and for my own clarification, I have a few questions.
From what I can tell, the only nodes that do not need the full commit, DAH, and header are the superlight nodes(no bodies), which do not need the DAH. Is this correct? Which of these nodes are participating in gossiping consensus messages as opposed to simply subscribing to a header/commit/dah from a full/partial node?
side note: If we begin to propagate the DAH via IPFS, then this changes as we no longer need to include the DAH in consensus messages as the DataHash will be included in the Header, and the DAH can be downloaded with that. Then the question is how much time does downloading the DAH from IPFS add to each node’s operations and if that added time is worth not including the DAH?
As for how each node will be bootstrapped, the only nodes that do not need some form of seed and DHT bootstrapping nodes are again the superlight nodes. Is this correct?
What are the security differences between a partial node that downloads 1% block data and 24%, if any? (If it downloads the right 25% of block data, then it’s basically a full node that doesn’t repair the entire square.)
Summary
Currently, node-types are mostly defined by the data they process. While this gives a relatively good idea of what the different node-types are, it does not really inform the implementation as there are open questions around what the node-types actually do.
Suggestions
Think of the node-types more from a less theoretic perspective and fully clarify their roles and responsibilities in the network beyond what the current definitions cover (data and fraud proofs only).
Action Items
Related
The text was updated successfully, but these errors were encountered: