You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

81 lines
3.7 KiB

7 years ago
7 years ago
7 years ago
7 years ago
  1. # Overview
  2. This is a markdown specification of the Tendermint blockchain.
  3. It defines the base data structures, how they are validated,
  4. and how they are communicated over the network.
  5. If you find discrepancies between the spec and the code that
  6. do not have an associated issue or pull request on github,
  7. please submit them to our [bug bounty](https://tendermint.com/security)!
  8. ## Contents
  9. - [Overview](#overview)
  10. ### Data Structures
  11. - [Encoding and Digests](./blockchain/encoding.md)
  12. - [Blockchain](./blockchain/blockchain.md)
  13. - [State](./blockchain/state.md)
  14. ### Consensus Protocol
  15. - [Consensus Algorithm](./consensus/consensus.md)
  16. - [Creating a proposal](./consensus/creating-proposal.md)
  17. - [Time](./consensus/bft-time.md)
  18. - [Light-Client](./consensus/light-client.md)
  19. ### P2P and Network Protocols
  20. - [The Base P2P Layer](./p2p/): multiplex the protocols ("reactors") on authenticated and encrypted TCP connections
  21. - [Peer Exchange (PEX)](./reactors/pex/): gossip known peer addresses so peers can find each other
  22. - [Block Sync](./reactors/block_sync/): gossip blocks so peers can catch up quickly
  23. - [Consensus](./reactors/consensus/): gossip votes and block parts so new blocks can be committed
  24. - [Mempool](./reactors/mempool/): gossip transactions so they get included in blocks
  25. - [Evidence](./reactors/evidence/): sending invalid evidence will stop the peer
  26. ### Software
  27. - [ABCI](./software/abci.md): Details about interactions between the
  28. application and consensus engine over ABCI
  29. - [Write-Ahead Log](./software/wal.md): Details about how the consensus
  30. engine preserves data and recovers from crash failures
  31. ## Overview
  32. Tendermint provides Byzantine Fault Tolerant State Machine Replication using
  33. hash-linked batches of transactions. Such transaction batches are called "blocks".
  34. Hence, Tendermint defines a "blockchain".
  35. Each block in Tendermint has a unique index - its Height.
  36. Height's in the blockchain are monotonic.
  37. Each block is committed by a known set of weighted Validators.
  38. Membership and weighting within this validator set may change over time.
  39. Tendermint guarantees the safety and liveness of the blockchain
  40. so long as less than 1/3 of the total weight of the Validator set
  41. is malicious or faulty.
  42. A commit in Tendermint is a set of signed messages from more than 2/3 of
  43. the total weight of the current Validator set. Validators take turns proposing
  44. blocks and voting on them. Once enough votes are received, the block is considered
  45. committed. These votes are included in the _next_ block as proof that the previous block
  46. was committed - they cannot be included in the current block, as that block has already been
  47. created.
  48. Once a block is committed, it can be executed against an application.
  49. The application returns results for each of the transactions in the block.
  50. The application can also return changes to be made to the validator set,
  51. as well as a cryptographic digest of its latest state.
  52. Tendermint is designed to enable efficient verification and authentication
  53. of the latest state of the blockchain. To achieve this, it embeds
  54. cryptographic commitments to certain information in the block "header".
  55. This information includes the contents of the block (eg. the transactions),
  56. the validator set committing the block, as well as the various results returned by the application.
  57. Note, however, that block execution only occurs _after_ a block is committed.
  58. Thus, application results can only be included in the _next_ block.
  59. Also note that information like the transaction results and the validator set are never
  60. directly included in the block - only their cryptographic digests (Merkle roots) are.
  61. Hence, verification of a block requires a separate data structure to store this information.
  62. We call this the `State`. Block verification also requires access to the previous block.