SlideShare a Scribd company logo
1 of 32
POA based Side-Chain Architecture
2018.07
presented by Lambda256
INDEX
About Lambda256
Current Issue & Approaches
Reference Model
PoA Consensus
Inter-chain Architecture
Lambda Chain
Copyrightⓒ 2018. Lambda256. All rights reserved
About Lambda256 (Dunamu Blockchain Lab)01.
Research and development of BaaS 2.0 that can solve various
problems of existing block chain platform and provide total
solution for commercialization of block chain
Build the global BaaS 2.0
platform
Developing blockchain tech
company & cultivating it globally
Support economy model for
crypto currency
Copyrightⓒ 2018. Lambda256. All rights reserved
Current Issue & Approaches
 Requirements of DApp
• Support for millions of users
• High performance
 Sequential execution
 Parallel execution
• Great user experience
 Free for use (No Gas payment)
 Easy to access and use
• Easy Upgradable
 But,
• High transaction cost
• Low performance (10~20 TPS)
• Long block confirmation time
02.
Copyrightⓒ 2018. Lambda256. All rights reserved
Approaches
 How to solve it
1. Wait until Ethereum solves the scalability problem
• PoS (Casper), Sharding , Plasma, Raiden
2. Believe another blockchain platform’s whitepaper
3. Create a new blockchain platform from scratch
4. Develop new side chain based blockchain platform
5. …
Copyrightⓒ 2018. Lambda256. All rights reserved
What approach in Lambda256
Lambda256 developed the PoA based side-chain, main-chain, and
BaaS platform.
Today ,
It will be covered how to build PoA based high performance side-
chain and how to connect it to Ethereum based main-chain for high
trust and reliability.
Copyrightⓒ 2018. Lambda256. All rights reserved
Reference Model
 Consensus Algorithm
 POA (Proof of Authority)
03.
...
A
B
C
D
A
B
C
D
A
B
C
No. 2320
No. 2321
No. 2322
No. 2323
No. 2324
No. 2325
No. 2326
Copyrightⓒ 2018. Lambda256. All rights reserved
Reference Model
 Inter-Chain Architecture
 Multi-Sig Bridge
Copyrightⓒ 2018. Lambda256. All rights reserved
PoA Consensus
 What is POA (Proof of Authority)
 Utilizing the authority of miner for block consensus
• Every proposed block is signed with miner’s private key.
• Every propagated block is verified using signature. (If the signer is not known, given block is ignored)
 Authority governance
• The way to manage correct signer list in network.
• On-chain vote (add/remove signer)
• Vote threshold (i.e., 50%)
• Regulations and penalties useful to sustain the network
04.
Copyrightⓒ 2018. Lambda256. All rights reserved
Clique
 POA implementation of Go-Ethereum
 Rinkeby PoA testnet
https://www.rinkeby.io
Copyrightⓒ 2018. Lambda256. All rights reserved
Clique Consensus Engine
...
What happens if the node in turn
becomes unavailable?
No: 738
DF: 2
TD: 1476
No: 739
DF: 2
TD: 1478
No: 740
DF: 2
TD: 1480
No: 741
DF: 2
TD: 1482
No: 742
DF: 2
TD: 1484
genesis
network failure!
I was
too late..
No: 743
DF: 1
TD: 1485
State
DB
Clique
vote-
snapshot
No: 743
DF: 1
TD: 1485
It was
my turn..
It was
lucky!
On-Chain Vote
Signer[0]
Signer[1]
Signer[2]
Authority Governance
Newcomer
738 % 3 = 0
739 % 3 = 1
740 % 3 = 2
Block
Number % Total
Signers = Target
Index
Copyrightⓒ 2018. Lambda256. All rights reserved
Signers in POA
 Signer is an entity which has the authority to propose and verify the block.
 Signer owned node can participate to POA network as a miner and it is called as
authority node.
 Block proposal is only possible by authority node. (That is, any blocks proposed by
non-authority node are ignored.)
 Addresses of initial signers are written to Genesis block.
 Afterward, signer list is maintained in the memory and disk by Clique Engine of each
authority node.
 Signer list can be changed by the real time on-chain vote.
Copyrightⓒ 2018. Lambda256. All rights reserved
Example: Genesis.json
Copyrightⓒ 2018. Lambda256. All rights reserved
Block Proposal
 In Clique, is block proposal based on contention between authority nodes?
• Theoretically, Yes.
• But, practically in normal condition it doesn’t. (It runs in the turn based mode, which gives block
generation opportunities to every authority nodes evenly)
 In Clique, block proposer is determined by modular operation with block number.
(i.e., 190,000th % 5 = 0th )
• But, any authority node who is not in its turn can make block and propose block to
network. (So, it is possible that many side blocks are proposed and propagated to
network)
(*) To charge more penalty to authority node who is not in its turn,
it waits for more wiggle time in addition to the delta time which is the remaining time until the block period.
 select additional wait time randomly from following time window. [0, ((N. / 2) + 1) * wiggleTime(500ms)]
Copyrightⓒ 2018. Lambda256. All rights reserved
Block Consensus (Sealing / Verify-Seal)
 Sealing
 Adding signer’s signature into “Extra” field.
 Difficulty “2” is assigned to header of block proposed by authority node in its turn.
 For authority node not in its turn, Difficulty “1” is assigned.
 Verify Seal
 Verify signer’s signature in “Extra” field, check “Difficulty” field, and execute “Spam
Protection check”.
Copyrightⓒ 2018. Lambda256. All rights reserved
Signature for POA
 POA is totally based on the signature of block proposer.
• Every block header includes signature of authority node.  Blue box in figure
(1) 65 bytes-length (compact ECDSA)
• Digest of signature is header’s hash value of 32 bytes-length
(2) not including extra-seal area in Extra field
extra vanity
(32 bytes)
extra seal
(65 bytes)
extra vanity
(32 bytes)
signer list
(variable-length: 20 bytes * N)
extra seal
(65 bytes)
Extra field
(Normal block)
Extra field
(Checkpoint block)
Copyrightⓒ 2018. Lambda256. All rights reserved
Block (Normal Block)
 Non 30,000th block
 It can include Cast-Vote information. (i.e., `Coinbase`, `Nonce`)
 Signer list is maintained in “on-chain vote consensus snapshot” by applying cast-
vote.
 Snapshot includes following information:
① List of signers who has been known to have the authority.
② List of signers who has mined block recently. (N / 2 + 1)
③ History of cast-vote for each signers.
④ Tally of vote.
extra vanity
(32 bytes)
extra seal
(65 bytes)
Copyrightⓒ 2018. Lambda256. All rights reserved
Block (Checkpoint Block)
 30,000th block.
 It does not include cast-vote information.
 Checkpoint block is a special block used to terminate current epoch and start a new
epoch by verifying and resetting any information like follows.
① Verifies entire signer list in “Extra” field.  Yellow box in figure
② Reset “history of cast-vote for each signers” and “tally of vote”.
extra vanity
(32 bytes)
signer list
(variable-length: 20 bytes * N)
extra seal
(65 bytes)
Copyrightⓒ 2018. Lambda256. All rights reserved
On-Chain Vote (Proposal)
 In Clique, following JSON RPC operations are provided to support on-chain vote.
(1) Registering Cast-Vote
(2) Deregistering Cast-Vote
(3) Listing registered Cast-Votes
 Once Cast-Vote proposal is registered, it is included in normal block.
• “Coinbase” field: Miner address which will be added/dropped
• “Nonce” field: Symbol for add/drop. (Add: 0xffff… / Drop: 0x0000…)
Copyrightⓒ 2018. Lambda256. All rights reserved
On-Chain Vote (Consensus)
• Miner received new block from network can determine whether received block
contains Cast-Vote information or not by checking `Coinbase` and `Nonce` field.
• The propagated vote proposal is reflected to the in-memory signer list as soon as
each receiving node counts the votes in real time and tally of vote is reaches the
majority.
Copyrightⓒ 2018. Lambda256. All rights reserved
Example: (Block including Cast-Vote)
Copyrightⓒ 2018. Lambda256. All rights reserved
Block Spam Protection
 Definition:
• This is a function that prevents further block generation and propagation until "(N / 2) + 1" blocks
have elapsed since the last block was generated.
 Purpose:
• To prevent the nodes in the list from continuously generating and propagating blocks.
Copyrightⓒ 2018. Lambda256. All rights reserved
vs ETHASH (PoW)
 No block reward
 No uncle calculation & compensation
 No hashimoto, No DAG, No mixed-digest
Copyrightⓒ 2018. Lambda256. All rights reserved
Possibility of POA freezing
 Symptom:
 If more than half of nodes are in failure state, all remaining nodes can not generate additional block
and become wait state. As a result, whole POA network is stopped.
 Cause:
 "Block Spam Protection" function which suppresses the block generation for a certain period. (i.e.,
until (N / 2) + 1 additional block is generated)
 What would happen if miner’s private key is lost ?
• Block proposal and consensus of the POA chain may be stopped.
(It is possible when such an account loss occurs on multiple nodes)
• If an unrecoverable H / W failure occurs during POA chain operation or operator accidentally
deletes a node instance, the keystore containing the signer's private key information is also lost.
Copyrightⓒ 2018. Lambda256. All rights reserved
Experiment Environments
 S/W requirements
 OS: Ubuntu 16.04 LTS
 Go-Lang: 1.10.3
 Go-Ethereum: v1.8.11 (stable)
 Web3.js: v1.0 (websocket provider)
 Node.js: v8.11.3
 H/W requirements
 AWS EC2
 Miner-node: 12*EA (c5.4xlarge)
 Tx-node: 12*EA (c5.4xlarge)
 Go-Ethereum configurations
 Block time: 1sec
 Block sync mode: fullsync
 Block gas limit: 0x6422C40
 Max transactions per block: 2,000 (src
fixed)
Copyrightⓒ 2018. Lambda256. All rights reserved
Experiment Result
Scenario Configurations Result
Threshold Performance Test
Repeated ether transfer between users.
Execution time: 30min
VU: 12 EA
Think time: 2ms
TPS: 2,000 TPS
Aging Test
Repeated ether transfer between users for 24
hours.
Execution time: 24h
VU: 12 EA
Think time: 5ms
TPS: 1,500+ TPS
Failover/Failback Test
Disabling randomly selected nodes up to “2/N +
1”. Then, enable nodes again.
Execution time: 10min
VU: 12 EA
Think time: 10ms
OK
Copyrightⓒ 2018. Lambda256. All rights reserved
Experiment Result
12 miners, 12 agents, 2ms
Copyrightⓒ 2018. Lambda256. All rights reserved
Inter-Chain Architecture (Multi-Sig Bridge)
 Bridge is an entity which connects two chains and relays assets or values between
them.
 Generally, bridge assumes that two chains are running same block chain protocol.
(i.e., Ethereum based chain  bridge  Ethereum based chain)
 If not, translator needs to be adapted.
 In Ethereum based chains, bridge can be implemented easily using contract.
 Staking/Redeem  SimpleToken
 Deposit/Withdraw  Parity Bridge
 Above reference models designed DApp to deploy two contracts in both chains.
05.
Copyrightⓒ 2018. Lambda256. All rights reserved
Bridge Architecture Example: Parity-Bridge
Copyrightⓒ 2018. Lambda256. All rights reserved
Lambda Chain
 What is Lambda Chain ?
Cloud VPC based security and performance assured
chain solution for BaaS platform.
 What does the Lambda Chain
provide ?
Provisioned high performance
High availability & scalability
Fast block confirmation time
Easy to use
(sign-up, sign-in, and Tx with MSISDN/PIN)
No-Gas fee
Easy integration of token economy for DApp
06.
UDC 2018, September
Q&A
Thanks

More Related Content

What's hot

Mobageの技術を体験(MyDNS編)
Mobageの技術を体験(MyDNS編)Mobageの技術を体験(MyDNS編)
Mobageの技術を体験(MyDNS編)Daisuke Ikeda
 
어릴 적 할머니가 들려주신 옛 wsgi
어릴 적 할머니가 들려주신 옛 wsgi어릴 적 할머니가 들려주신 옛 wsgi
어릴 적 할머니가 들려주신 옛 wsgiHyun-Mook Choi
 
犬でもわかる公開鍵暗号
犬でもわかる公開鍵暗号犬でもわかる公開鍵暗号
犬でもわかる公開鍵暗号akakou
 
難読化PowerShell芸入門
難読化PowerShell芸入門難読化PowerShell芸入門
難読化PowerShell芸入門xztaityozx
 
いまさら聞けないselectあれこれ
いまさら聞けないselectあれこれいまさら聞けないselectあれこれ
いまさら聞けないselectあれこれlestrrat
 
謎の言語Forthが謎なので実装した
謎の言語Forthが謎なので実装した謎の言語Forthが謎なので実装した
謎の言語Forthが謎なので実装したt-sin
 
ライブストリーミング低遅延化の取り組み @ DeNA
ライブストリーミング低遅延化の取り組み @ DeNAライブストリーミング低遅延化の取り組み @ DeNA
ライブストリーミング低遅延化の取り組み @ DeNAakirahiguchi
 
0章 Linuxカーネルを読む前に最低限知っておくべきこと
0章 Linuxカーネルを読む前に最低限知っておくべきこと0章 Linuxカーネルを読む前に最低限知っておくべきこと
0章 Linuxカーネルを読む前に最低限知っておくべきことmao999
 
ニューラル・ネットワークと技術革新の展望
ニューラル・ネットワークと技術革新の展望ニューラル・ネットワークと技術革新の展望
ニューラル・ネットワークと技術革新の展望maruyama097
 
Xbyakの紹介とその周辺
Xbyakの紹介とその周辺Xbyakの紹介とその周辺
Xbyakの紹介とその周辺MITSUNARI Shigeo
 
Utiliser des outils collaboratifs en BU
Utiliser des outils collaboratifs en BUUtiliser des outils collaboratifs en BU
Utiliser des outils collaboratifs en BUAnne-Gaëlle Gaudion
 
深さ優先探索による塗りつぶし
深さ優先探索による塗りつぶし深さ優先探索による塗りつぶし
深さ優先探索による塗りつぶしAtCoder Inc.
 
Tensor flow usergroup 2016 (公開版)
Tensor flow usergroup 2016 (公開版)Tensor flow usergroup 2016 (公開版)
Tensor flow usergroup 2016 (公開版)Hiroki Nakahara
 
深さ・幅優先探索の仕組み・特徴・応用
深さ・幅優先探索の仕組み・特徴・応用深さ・幅優先探索の仕組み・特徴・応用
深さ・幅優先探索の仕組み・特徴・応用Sho Kamura
 
圖書館之寄存制度發展管理
圖書館之寄存制度發展管理圖書館之寄存制度發展管理
圖書館之寄存制度發展管理Chihwei Liu
 
Wavelet matrix implementation
Wavelet matrix implementationWavelet matrix implementation
Wavelet matrix implementationMITSUNARI Shigeo
 
Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)
Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)
Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)zoran radovic
 

What's hot (20)

Mobageの技術を体験(MyDNS編)
Mobageの技術を体験(MyDNS編)Mobageの技術を体験(MyDNS編)
Mobageの技術を体験(MyDNS編)
 
어릴 적 할머니가 들려주신 옛 wsgi
어릴 적 할머니가 들려주신 옛 wsgi어릴 적 할머니가 들려주신 옛 wsgi
어릴 적 할머니가 들려주신 옛 wsgi
 
犬でもわかる公開鍵暗号
犬でもわかる公開鍵暗号犬でもわかる公開鍵暗号
犬でもわかる公開鍵暗号
 
難読化PowerShell芸入門
難読化PowerShell芸入門難読化PowerShell芸入門
難読化PowerShell芸入門
 
いまさら聞けないselectあれこれ
いまさら聞けないselectあれこれいまさら聞けないselectあれこれ
いまさら聞けないselectあれこれ
 
謎の言語Forthが謎なので実装した
謎の言語Forthが謎なので実装した謎の言語Forthが謎なので実装した
謎の言語Forthが謎なので実装した
 
ライブストリーミング低遅延化の取り組み @ DeNA
ライブストリーミング低遅延化の取り組み @ DeNAライブストリーミング低遅延化の取り組み @ DeNA
ライブストリーミング低遅延化の取り組み @ DeNA
 
0章 Linuxカーネルを読む前に最低限知っておくべきこと
0章 Linuxカーネルを読む前に最低限知っておくべきこと0章 Linuxカーネルを読む前に最低限知っておくべきこと
0章 Linuxカーネルを読む前に最低限知っておくべきこと
 
ニューラル・ネットワークと技術革新の展望
ニューラル・ネットワークと技術革新の展望ニューラル・ネットワークと技術革新の展望
ニューラル・ネットワークと技術革新の展望
 
Xbyakの紹介とその周辺
Xbyakの紹介とその周辺Xbyakの紹介とその周辺
Xbyakの紹介とその周辺
 
Utiliser des outils collaboratifs en BU
Utiliser des outils collaboratifs en BUUtiliser des outils collaboratifs en BU
Utiliser des outils collaboratifs en BU
 
深さ優先探索による塗りつぶし
深さ優先探索による塗りつぶし深さ優先探索による塗りつぶし
深さ優先探索による塗りつぶし
 
Apache Solr 検索エンジン入門
Apache Solr 検索エンジン入門Apache Solr 検索エンジン入門
Apache Solr 検索エンジン入門
 
Tensor flow usergroup 2016 (公開版)
Tensor flow usergroup 2016 (公開版)Tensor flow usergroup 2016 (公開版)
Tensor flow usergroup 2016 (公開版)
 
Java start01 in 2hours
Java start01 in 2hoursJava start01 in 2hours
Java start01 in 2hours
 
深さ・幅優先探索の仕組み・特徴・応用
深さ・幅優先探索の仕組み・特徴・応用深さ・幅優先探索の仕組み・特徴・応用
深さ・幅優先探索の仕組み・特徴・応用
 
圖書館之寄存制度發展管理
圖書館之寄存制度發展管理圖書館之寄存制度發展管理
圖書館之寄存制度發展管理
 
Wavelet matrix implementation
Wavelet matrix implementationWavelet matrix implementation
Wavelet matrix implementation
 
Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)
Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)
Srebrena zvijezda 002. hikok (drzeko&folpi&sinisa04)
 
Glibc malloc internal
Glibc malloc internalGlibc malloc internal
Glibc malloc internal
 

Similar to POA based Side-Chain Architecture

J.burke HackMiami6
J.burke HackMiami6J.burke HackMiami6
J.burke HackMiami6Jesse Burke
 
Block chain by harsh biltu agarwal
Block chain by harsh biltu agarwalBlock chain by harsh biltu agarwal
Block chain by harsh biltu agarwalN V Jagadeesh Kumar
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related questionLin Lin (Wendy)
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of BlockchainSota Watanabe
 
20190606 blockchain101
20190606 blockchain10120190606 blockchain101
20190606 blockchain101Hu Kenneth
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Codemotion
 
Ergo Presentation - Tokyo
Ergo Presentation - TokyoErgo Presentation - Tokyo
Ergo Presentation - TokyoAlex Chepurnoy
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platformif kakao
 
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ... Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...Hyperleger Tokyo Meetup
 
Blockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationBlockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationPaperchain
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchainBellaj Badr
 
EthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptxEthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptxWijdenBenothmen1
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding BlockchainTony Willenberg
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017Jeff Garzik
 
Segregated witness and bitcoin scaling debate
Segregated witness and bitcoin scaling debateSegregated witness and bitcoin scaling debate
Segregated witness and bitcoin scaling debatedalcanto
 

Similar to POA based Side-Chain Architecture (20)

J.burke HackMiami6
J.burke HackMiami6J.burke HackMiami6
J.burke HackMiami6
 
Block chain by harsh biltu agarwal
Block chain by harsh biltu agarwalBlock chain by harsh biltu agarwal
Block chain by harsh biltu agarwal
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related question
 
The Basic Theories of Blockchain
The Basic Theories of BlockchainThe Basic Theories of Blockchain
The Basic Theories of Blockchain
 
Ergo details
Ergo detailsErgo details
Ergo details
 
20190606 blockchain101
20190606 blockchain10120190606 blockchain101
20190606 blockchain101
 
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
Simone Bronzini - Weaknesses of blockchain applications - Codemotion Milan 2018
 
Ergo Presentation - Tokyo
Ergo Presentation - TokyoErgo Presentation - Tokyo
Ergo Presentation - Tokyo
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
 
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ... Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
Practical Tools for Enterprise Uses of Hyperledger Fabric (Audit and System ...
 
Blockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentationBlockchain, cryptography and tokens — NYC Bar presentation
Blockchain, cryptography and tokens — NYC Bar presentation
 
Security in the blockchain
Security in the blockchainSecurity in the blockchain
Security in the blockchain
 
EthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptxEthereumBlockchainMarch3 (1).pptx
EthereumBlockchainMarch3 (1).pptx
 
Blockchain on AWS
Blockchain on AWSBlockchain on AWS
Blockchain on AWS
 
Ergo Hong Kong meetup
Ergo Hong Kong meetupErgo Hong Kong meetup
Ergo Hong Kong meetup
 
Understanding Blockchain
Understanding BlockchainUnderstanding Blockchain
Understanding Blockchain
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017
 
Segregated witness and bitcoin scaling debate
Segregated witness and bitcoin scaling debateSegregated witness and bitcoin scaling debate
Segregated witness and bitcoin scaling debate
 

More from Luniverse Dunamu

2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO)
2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO) 2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO)
2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO) Luniverse Dunamu
 
2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기)
2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기) 2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기)
2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기) Luniverse Dunamu
 
2nd Luniverse Partners Day - Luniverse Partnership
2nd Luniverse Partners Day - Luniverse Partnership2nd Luniverse Partners Day - Luniverse Partnership
2nd Luniverse Partners Day - Luniverse PartnershipLuniverse Dunamu
 
Luniverse Partners Day - Smart Contract Assessment(Sooho)
Luniverse Partners Day - Smart Contract Assessment(Sooho)Luniverse Partners Day - Smart Contract Assessment(Sooho)
Luniverse Partners Day - Smart Contract Assessment(Sooho)Luniverse Dunamu
 
Luniverse Partners Day - Jay
Luniverse Partners Day - JayLuniverse Partners Day - Jay
Luniverse Partners Day - JayLuniverse Dunamu
 
Luniverse Partners Day - Game Case Study & Partnership (Evan)
Luniverse Partners Day - Game Case Study & Partnership (Evan)Luniverse Partners Day - Game Case Study & Partnership (Evan)
Luniverse Partners Day - Game Case Study & Partnership (Evan)Luniverse Dunamu
 
Luniverse Partners Day - Allbit(Ozys)
Luniverse Partners Day - Allbit(Ozys) Luniverse Partners Day - Allbit(Ozys)
Luniverse Partners Day - Allbit(Ozys) Luniverse Dunamu
 
Luniverse Partners Day - Hyperledger Fabric(Keyinside)
Luniverse Partners Day - Hyperledger Fabric(Keyinside)Luniverse Partners Day - Hyperledger Fabric(Keyinside)
Luniverse Partners Day - Hyperledger Fabric(Keyinside)Luniverse Dunamu
 
Luniverse Partners Day - Bitberry(Rootone)
Luniverse Partners Day - Bitberry(Rootone)Luniverse Partners Day - Bitberry(Rootone)
Luniverse Partners Day - Bitberry(Rootone)Luniverse Dunamu
 
Token platform based on sidechain
Token platform based on sidechainToken platform based on sidechain
Token platform based on sidechainLuniverse Dunamu
 

More from Luniverse Dunamu (13)

2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO)
2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO) 2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO)
2nd Luniverse Partners Day - 보다 안전한 트랜젝션을 위한 KYC/AML/CTF 솔루션 (SOOHO)
 
2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기)
2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기) 2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기)
2nd Luniverse Partners Day - 루트원 비지니스 플랫폼 (당신이 모르는 비트베리 이야기)
 
2nd Luniverse Partners Day - Luniverse Partnership
2nd Luniverse Partners Day - Luniverse Partnership2nd Luniverse Partners Day - Luniverse Partnership
2nd Luniverse Partners Day - Luniverse Partnership
 
Luniverse_Welcome_Speech
Luniverse_Welcome_SpeechLuniverse_Welcome_Speech
Luniverse_Welcome_Speech
 
Luniverse Partners Day - Smart Contract Assessment(Sooho)
Luniverse Partners Day - Smart Contract Assessment(Sooho)Luniverse Partners Day - Smart Contract Assessment(Sooho)
Luniverse Partners Day - Smart Contract Assessment(Sooho)
 
Luniverse Partners Day - Jay
Luniverse Partners Day - JayLuniverse Partners Day - Jay
Luniverse Partners Day - Jay
 
Luniverse Partners Day - Game Case Study & Partnership (Evan)
Luniverse Partners Day - Game Case Study & Partnership (Evan)Luniverse Partners Day - Game Case Study & Partnership (Evan)
Luniverse Partners Day - Game Case Study & Partnership (Evan)
 
Luniverse Partners Day - Allbit(Ozys)
Luniverse Partners Day - Allbit(Ozys) Luniverse Partners Day - Allbit(Ozys)
Luniverse Partners Day - Allbit(Ozys)
 
Luniverse Partners Day - Hyperledger Fabric(Keyinside)
Luniverse Partners Day - Hyperledger Fabric(Keyinside)Luniverse Partners Day - Hyperledger Fabric(Keyinside)
Luniverse Partners Day - Hyperledger Fabric(Keyinside)
 
Luniverse Partners Day - Bitberry(Rootone)
Luniverse Partners Day - Bitberry(Rootone)Luniverse Partners Day - Bitberry(Rootone)
Luniverse Partners Day - Bitberry(Rootone)
 
Introduction of Luniverse
Introduction of LuniverseIntroduction of Luniverse
Introduction of Luniverse
 
Token platform based on sidechain
Token platform based on sidechainToken platform based on sidechain
Token platform based on sidechain
 
Introduction of Luniverse
Introduction of LuniverseIntroduction of Luniverse
Introduction of Luniverse
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

POA based Side-Chain Architecture

  • 1. POA based Side-Chain Architecture 2018.07 presented by Lambda256
  • 2. INDEX About Lambda256 Current Issue & Approaches Reference Model PoA Consensus Inter-chain Architecture Lambda Chain
  • 3. Copyrightⓒ 2018. Lambda256. All rights reserved About Lambda256 (Dunamu Blockchain Lab)01. Research and development of BaaS 2.0 that can solve various problems of existing block chain platform and provide total solution for commercialization of block chain Build the global BaaS 2.0 platform Developing blockchain tech company & cultivating it globally Support economy model for crypto currency
  • 4. Copyrightⓒ 2018. Lambda256. All rights reserved Current Issue & Approaches  Requirements of DApp • Support for millions of users • High performance  Sequential execution  Parallel execution • Great user experience  Free for use (No Gas payment)  Easy to access and use • Easy Upgradable  But, • High transaction cost • Low performance (10~20 TPS) • Long block confirmation time 02.
  • 5. Copyrightⓒ 2018. Lambda256. All rights reserved Approaches  How to solve it 1. Wait until Ethereum solves the scalability problem • PoS (Casper), Sharding , Plasma, Raiden 2. Believe another blockchain platform’s whitepaper 3. Create a new blockchain platform from scratch 4. Develop new side chain based blockchain platform 5. …
  • 6. Copyrightⓒ 2018. Lambda256. All rights reserved What approach in Lambda256 Lambda256 developed the PoA based side-chain, main-chain, and BaaS platform. Today , It will be covered how to build PoA based high performance side- chain and how to connect it to Ethereum based main-chain for high trust and reliability.
  • 7. Copyrightⓒ 2018. Lambda256. All rights reserved Reference Model  Consensus Algorithm  POA (Proof of Authority) 03. ... A B C D A B C D A B C No. 2320 No. 2321 No. 2322 No. 2323 No. 2324 No. 2325 No. 2326
  • 8. Copyrightⓒ 2018. Lambda256. All rights reserved Reference Model  Inter-Chain Architecture  Multi-Sig Bridge
  • 9. Copyrightⓒ 2018. Lambda256. All rights reserved PoA Consensus  What is POA (Proof of Authority)  Utilizing the authority of miner for block consensus • Every proposed block is signed with miner’s private key. • Every propagated block is verified using signature. (If the signer is not known, given block is ignored)  Authority governance • The way to manage correct signer list in network. • On-chain vote (add/remove signer) • Vote threshold (i.e., 50%) • Regulations and penalties useful to sustain the network 04.
  • 10. Copyrightⓒ 2018. Lambda256. All rights reserved Clique  POA implementation of Go-Ethereum  Rinkeby PoA testnet https://www.rinkeby.io
  • 11. Copyrightⓒ 2018. Lambda256. All rights reserved Clique Consensus Engine ... What happens if the node in turn becomes unavailable? No: 738 DF: 2 TD: 1476 No: 739 DF: 2 TD: 1478 No: 740 DF: 2 TD: 1480 No: 741 DF: 2 TD: 1482 No: 742 DF: 2 TD: 1484 genesis network failure! I was too late.. No: 743 DF: 1 TD: 1485 State DB Clique vote- snapshot No: 743 DF: 1 TD: 1485 It was my turn.. It was lucky! On-Chain Vote Signer[0] Signer[1] Signer[2] Authority Governance Newcomer 738 % 3 = 0 739 % 3 = 1 740 % 3 = 2 Block Number % Total Signers = Target Index
  • 12. Copyrightⓒ 2018. Lambda256. All rights reserved Signers in POA  Signer is an entity which has the authority to propose and verify the block.  Signer owned node can participate to POA network as a miner and it is called as authority node.  Block proposal is only possible by authority node. (That is, any blocks proposed by non-authority node are ignored.)  Addresses of initial signers are written to Genesis block.  Afterward, signer list is maintained in the memory and disk by Clique Engine of each authority node.  Signer list can be changed by the real time on-chain vote.
  • 13. Copyrightⓒ 2018. Lambda256. All rights reserved Example: Genesis.json
  • 14. Copyrightⓒ 2018. Lambda256. All rights reserved Block Proposal  In Clique, is block proposal based on contention between authority nodes? • Theoretically, Yes. • But, practically in normal condition it doesn’t. (It runs in the turn based mode, which gives block generation opportunities to every authority nodes evenly)  In Clique, block proposer is determined by modular operation with block number. (i.e., 190,000th % 5 = 0th ) • But, any authority node who is not in its turn can make block and propose block to network. (So, it is possible that many side blocks are proposed and propagated to network) (*) To charge more penalty to authority node who is not in its turn, it waits for more wiggle time in addition to the delta time which is the remaining time until the block period.  select additional wait time randomly from following time window. [0, ((N. / 2) + 1) * wiggleTime(500ms)]
  • 15. Copyrightⓒ 2018. Lambda256. All rights reserved Block Consensus (Sealing / Verify-Seal)  Sealing  Adding signer’s signature into “Extra” field.  Difficulty “2” is assigned to header of block proposed by authority node in its turn.  For authority node not in its turn, Difficulty “1” is assigned.  Verify Seal  Verify signer’s signature in “Extra” field, check “Difficulty” field, and execute “Spam Protection check”.
  • 16. Copyrightⓒ 2018. Lambda256. All rights reserved Signature for POA  POA is totally based on the signature of block proposer. • Every block header includes signature of authority node.  Blue box in figure (1) 65 bytes-length (compact ECDSA) • Digest of signature is header’s hash value of 32 bytes-length (2) not including extra-seal area in Extra field extra vanity (32 bytes) extra seal (65 bytes) extra vanity (32 bytes) signer list (variable-length: 20 bytes * N) extra seal (65 bytes) Extra field (Normal block) Extra field (Checkpoint block)
  • 17. Copyrightⓒ 2018. Lambda256. All rights reserved Block (Normal Block)  Non 30,000th block  It can include Cast-Vote information. (i.e., `Coinbase`, `Nonce`)  Signer list is maintained in “on-chain vote consensus snapshot” by applying cast- vote.  Snapshot includes following information: ① List of signers who has been known to have the authority. ② List of signers who has mined block recently. (N / 2 + 1) ③ History of cast-vote for each signers. ④ Tally of vote. extra vanity (32 bytes) extra seal (65 bytes)
  • 18. Copyrightⓒ 2018. Lambda256. All rights reserved Block (Checkpoint Block)  30,000th block.  It does not include cast-vote information.  Checkpoint block is a special block used to terminate current epoch and start a new epoch by verifying and resetting any information like follows. ① Verifies entire signer list in “Extra” field.  Yellow box in figure ② Reset “history of cast-vote for each signers” and “tally of vote”. extra vanity (32 bytes) signer list (variable-length: 20 bytes * N) extra seal (65 bytes)
  • 19. Copyrightⓒ 2018. Lambda256. All rights reserved On-Chain Vote (Proposal)  In Clique, following JSON RPC operations are provided to support on-chain vote. (1) Registering Cast-Vote (2) Deregistering Cast-Vote (3) Listing registered Cast-Votes  Once Cast-Vote proposal is registered, it is included in normal block. • “Coinbase” field: Miner address which will be added/dropped • “Nonce” field: Symbol for add/drop. (Add: 0xffff… / Drop: 0x0000…)
  • 20. Copyrightⓒ 2018. Lambda256. All rights reserved On-Chain Vote (Consensus) • Miner received new block from network can determine whether received block contains Cast-Vote information or not by checking `Coinbase` and `Nonce` field. • The propagated vote proposal is reflected to the in-memory signer list as soon as each receiving node counts the votes in real time and tally of vote is reaches the majority.
  • 21. Copyrightⓒ 2018. Lambda256. All rights reserved Example: (Block including Cast-Vote)
  • 22. Copyrightⓒ 2018. Lambda256. All rights reserved Block Spam Protection  Definition: • This is a function that prevents further block generation and propagation until "(N / 2) + 1" blocks have elapsed since the last block was generated.  Purpose: • To prevent the nodes in the list from continuously generating and propagating blocks.
  • 23. Copyrightⓒ 2018. Lambda256. All rights reserved vs ETHASH (PoW)  No block reward  No uncle calculation & compensation  No hashimoto, No DAG, No mixed-digest
  • 24. Copyrightⓒ 2018. Lambda256. All rights reserved Possibility of POA freezing  Symptom:  If more than half of nodes are in failure state, all remaining nodes can not generate additional block and become wait state. As a result, whole POA network is stopped.  Cause:  "Block Spam Protection" function which suppresses the block generation for a certain period. (i.e., until (N / 2) + 1 additional block is generated)  What would happen if miner’s private key is lost ? • Block proposal and consensus of the POA chain may be stopped. (It is possible when such an account loss occurs on multiple nodes) • If an unrecoverable H / W failure occurs during POA chain operation or operator accidentally deletes a node instance, the keystore containing the signer's private key information is also lost.
  • 25. Copyrightⓒ 2018. Lambda256. All rights reserved Experiment Environments  S/W requirements  OS: Ubuntu 16.04 LTS  Go-Lang: 1.10.3  Go-Ethereum: v1.8.11 (stable)  Web3.js: v1.0 (websocket provider)  Node.js: v8.11.3  H/W requirements  AWS EC2  Miner-node: 12*EA (c5.4xlarge)  Tx-node: 12*EA (c5.4xlarge)  Go-Ethereum configurations  Block time: 1sec  Block sync mode: fullsync  Block gas limit: 0x6422C40  Max transactions per block: 2,000 (src fixed)
  • 26. Copyrightⓒ 2018. Lambda256. All rights reserved Experiment Result Scenario Configurations Result Threshold Performance Test Repeated ether transfer between users. Execution time: 30min VU: 12 EA Think time: 2ms TPS: 2,000 TPS Aging Test Repeated ether transfer between users for 24 hours. Execution time: 24h VU: 12 EA Think time: 5ms TPS: 1,500+ TPS Failover/Failback Test Disabling randomly selected nodes up to “2/N + 1”. Then, enable nodes again. Execution time: 10min VU: 12 EA Think time: 10ms OK
  • 27. Copyrightⓒ 2018. Lambda256. All rights reserved Experiment Result 12 miners, 12 agents, 2ms
  • 28. Copyrightⓒ 2018. Lambda256. All rights reserved Inter-Chain Architecture (Multi-Sig Bridge)  Bridge is an entity which connects two chains and relays assets or values between them.  Generally, bridge assumes that two chains are running same block chain protocol. (i.e., Ethereum based chain  bridge  Ethereum based chain)  If not, translator needs to be adapted.  In Ethereum based chains, bridge can be implemented easily using contract.  Staking/Redeem  SimpleToken  Deposit/Withdraw  Parity Bridge  Above reference models designed DApp to deploy two contracts in both chains. 05.
  • 29. Copyrightⓒ 2018. Lambda256. All rights reserved Bridge Architecture Example: Parity-Bridge
  • 30. Copyrightⓒ 2018. Lambda256. All rights reserved Lambda Chain  What is Lambda Chain ? Cloud VPC based security and performance assured chain solution for BaaS platform.  What does the Lambda Chain provide ? Provisioned high performance High availability & scalability Fast block confirmation time Easy to use (sign-up, sign-in, and Tx with MSISDN/PIN) No-Gas fee Easy integration of token economy for DApp 06. UDC 2018, September
  • 31. Q&A