DAG-EVM Hybrid Layer 1
Last updated
Last updated
A Proof of Stake (PoS) network is a consensus mechanism used by various blockchains to achieve secure distributed consensus. In a PoS network, validators stake their cryptocurrency as collateral, which can be forfeited if they act dishonestly. Validators are responsible for verifying new blocks proposed by users across the network.
Under this model, validators who stake their tokens earn transaction fees as rewards. The selection process for validating a block is random, but validators with a higher stake have increased odds of being chosen. To execute a 51% attack on a PoS network, an attacker would need to control 51% of the staked tokens, making such attacks economically unfeasible.
A Directed Acyclic Graph (DAG) is a distributed ledger technology similar to blockchain but with a different execution model. Unlike blockchains, which follow a linear chain structure, a DAG consists of interconnected individual transactions. If a blockchain is analogous to a linked list, a DAG can be likened to a tree, branching out from one transaction to another.
In a DAG, transactions validate each other, meaning there is little or no need to pay fees. Since users (both miners and validators) are part of the network but cannot validate their own transactions, DAG-based networks are well suited for handling high transaction volumes with reduced energy consumption, eliminating the need for traditional miners.
What purpose does the PoS network serve?
The PoS network handles specific functions such as executing transactions (contracts, imports) that are DAG-fueled.
Initial transactions occur on the DAG, while the PoS network records them using Proof of Authority (PoA).
The DAG ensures fast transaction propagation via its gossip protocol, while the EVM chain connects to other blockchains and records transactions linearly.
What purpose does the DAG network serve?
Each node maintains a local DAG composed of event blocks, which contain transactions.
The DAG captures the "happens-before" relationship between transactions and determines the final order of events independently on each node.
TPS measures the number of transactions processed per second within an information system. In blockchain protocols, TPS is calculated as:
TPS = Number of transactions per block ÷ Block time in seconds
Time to finality (TTF) is a more accurate measure of transaction speed, as it tracks the time from submission to irreversible confirmation. TTF is analogous to latency in networking, representing the round-trip transmission time for information.
Transactions per block: ~45 transactions per block
Block time: Less than a minute
Transactions per second (TPS): 45 TPS
Time to finality (TTF): Dependent on the number of active validator nodes
Programming language: Solidity
Operational Bridges
Volary ↔ Avalanche
Volary ↔ Binance
Volary ↔ Ethereum
Volary ↔ Klaytn
Volary ↔ Polygon
Volary ↔ Solana
Difference Between Standard Bridges and NEST Bridges
Standard blockchain bridges transfer assets by locking them into an escrow contract on the original network and recreating them on another network. This means that multiple instances of an asset can exist across different chains, creating centralized points of attack where hackers can exploit and steal assets.
NEST bridges operate differently: instead of locking assets, they are sent to a null contract, making them unrecoverable. This ensures that the asset is truly recreated on the new network, while the old instance ceases to exist, eliminating attack vectors associated with escrow-based bridges.
What are Click-to-Create Nodes?
Click-to-create nodes are nodes within the Volary network that do not participate in validation but support the security protocol and contribute to data storage.
Why Host a Click-to-Create Node on a Mobile or Desktop?
Users who operate click-to-create (helper) nodes receive financial incentives for contributing to network security and data storage. Rewards are distributed based on uptime and activity levels. The longer a node remains active, the higher its trust level, resulting in increased rewards.
Payments for hosting these nodes come from:
Data storage revenue
Transaction fees collected on the network
Interaction Between Click-to-Create Nodes and the Primary Network
Click-to-create nodes are read-only nodes that synchronize with the network while running on a user’s local machine.
How Do Click-to-Create Nodes Improve Security?
The presence of more nodes increases the number of validators, improving decentralization and security.
These nodes monitor network activity to ensure compliance with protocol rules, preserving blockchain integrity.
Each piece of data stored on the Volary network undergoes:
Encryption
Splintering into 10 pieces
Re-encryption and distribution across the network with a redundancy factor of 3
Each file shard is stored in three locations.
A total of 30 encrypted data fragments exist per file at any time.
Validator nodes store one piece of each file, while helper nodes store two.
If a validator node is compromised, helper nodes serve as a failsafe backup.
Supported Smart Contracts
Bridges - Facilitates interoperability between blockchain networks.
Swaps - Enables asset exchanges between separate blockchains.
Token Minting - Generates new coins through PoS-based validation.
RWSC (Real World Smart Contracts) - Smart contracts designed for real-world applications.
SSDID (Self-Sovereign Distributed/Decentralized Identity Contracts) - Manages digital identities securely.
Oracles - Fetches off-chain data and integrates it into on-chain smart contracts.