Somnia - Understanding Autobahn, the idea behind Somnia Consensus
1. IntroductionSomnia, a new EVM-compatible Layer 1 blockchain, recently announced that it can achieve 1 million TPS with sub-second finality, tested on a network of 100 globally distributed nodes. While this high TPS was tested using ERC-20 transfers, it represents a significant breakthrough in blockchain scalability. To achieve this level of performance, Somnia introduces four key innovations that improve efficiency compared to traditional EVM chains:Autobahn-inspired BFT consensus – a seam...
Somnia - Understanding Autobahn, the idea behind Somnia Consensus
1. IntroductionSomnia, a new EVM-compatible Layer 1 blockchain, recently announced that it can achieve 1 million TPS with sub-second finality, tested on a network of 100 globally distributed nodes. While this high TPS was tested using ERC-20 transfers, it represents a significant breakthrough in blockchain scalability. To achieve this level of performance, Somnia introduces four key innovations that improve efficiency compared to traditional EVM chains:Autobahn-inspired BFT consensus – a seam...

Introduction to Walrus: A Note on How the Red Stuff Protocol Works
1. IntroductionSo far, we’ve discussed two decentralized storage networks: Celestia [1] and Espresso [2]. Unlike traditional decentralized storage systems that rely on full replication, where every node stores a complete copy of the original data, Celestia and Espresso use erasure coding. This method splits data into encoded fragments, allowing reconstruction from only a subset of these fragments. By requiring nodes to store only a small fraction of the encoded data (much smaller than the ful...

Introduction to Walrus: A Note on How the Red Stuff Protocol Works
1. IntroductionSo far, we’ve discussed two decentralized storage networks: Celestia [1] and Espresso [2]. Unlike traditional decentralized storage systems that rely on full replication, where every node stores a complete copy of the original data, Celestia and Espresso use erasure coding. This method splits data into encoded fragments, allowing reconstruction from only a subset of these fragments. By requiring nodes to store only a small fraction of the encoded data (much smaller than the ful...

A Deep Dive into Mysticeti: The New Consensus Powering Sui
Written by Fieldlnwza007, infographics by EarthMysticetiIn July, Sui announced a shift from using Narwhal and Bullshark as their consensus protocol to Mysticeti[1]. In this article, I will do my best to simplify the Mysticeti paper and explain how Mysticeti works and why it was chosen from my perspective, while preserving the core ideas.Narwhal and Bullshark RecapTo understand the need for Mysticeti, let’s first review Narwhal and Bullshark. If you’re familiar with these protocols, feel free ...

A Deep Dive into Mysticeti: The New Consensus Powering Sui
Written by Fieldlnwza007, infographics by EarthMysticetiIn July, Sui announced a shift from using Narwhal and Bullshark as their consensus protocol to Mysticeti[1]. In this article, I will do my best to simplify the Mysticeti paper and explain how Mysticeti works and why it was chosen from my perspective, while preserving the core ideas.Narwhal and Bullshark RecapTo understand the need for Mysticeti, let’s first review Narwhal and Bullshark. If you’re familiar with these protocols, feel free ...

Allora: A Self-Improving Decentralized Network for AI and ML
Written by Fieldlnwza007, infographics by Earth, special thanks to Michael Zacharski for his valuable suggestions.IntroductionArtificial Intelligence (AI) and Machine Learning (ML) have garnered significant attention in the blockchain space, leading to the launch of many projects that integrate AI to attract users and investors. However, many of these projects either use AI merely as a marketing buzzword or struggle to effectively leverage AI within decentralized networks. In this article, we...

Allora: A Self-Improving Decentralized Network for AI and ML
Written by Fieldlnwza007, infographics by Earth, special thanks to Michael Zacharski for his valuable suggestions.IntroductionArtificial Intelligence (AI) and Machine Learning (ML) have garnered significant attention in the blockchain space, leading to the launch of many projects that integrate AI to attract users and investors. However, many of these projects either use AI merely as a marketing buzzword or struggle to effectively leverage AI within decentralized networks. In this article, we...
Celestia: A Summary of How Fraud Proofs and Data Availability Proofs Work
1 OverviewData availability (DA) is crucial to the functionality and security of blockchains. In traditional monolithic blockchain structures, full nodes retrieve blocks from peers to verify the integrity of the entire history of their chain based on predefined rules. This process relies on the assumption that data on the blockchain remains consistently "available" for access by all nodes in the network. This principle holds not just for layer-1 blockchains but also for layer-2 blockchains, w...
Celestia: A Summary of How Fraud Proofs and Data Availability Proofs Work
1 OverviewData availability (DA) is crucial to the functionality and security of blockchains. In traditional monolithic blockchain structures, full nodes retrieve blocks from peers to verify the integrity of the entire history of their chain based on predefined rules. This process relies on the assumption that data on the blockchain remains consistently "available" for access by all nodes in the network. This principle holds not just for layer-1 blockchains but also for layer-2 blockchains, w...