Constellation treats the mobile client as a full node, forming a robust fault-resistant, horizontally scalable distributed operating system. Moreover, Constellation uses an asynchronous ExtendedTrustChain, a Meme of Meme consensus model, and smart contracts as composable microservices executable on the JVM, thereby re-presenting secure consensus as a modern serverless architecture.
Project Advantages
Scalability
Network capacity scales proportionally with user adoption, becoming more secure as it grows. On Constellation (DAG), the more connections you establish, the more bandwidth both you and the network receive.
Genuine Decentralization
Reputation-based consensus stops centralization and manipulation. Constellation is based on integrity, whether individual or collective, rather than power.
Developer Ease
We dont require bespoke or complex programming languages. Constellation (DAG) uses existing programming and distributed computing standards. You can integrate existing applications or develop in the JVM.
Cross-Network Communication
Constellation supports interoperability between existing and new networks. Due to our consensus and reputation models, they can operate without security concerns.
Project Features
Use Cases
The Constellation network consists of DAG nodes, state channel nodes, and "hybrid" nodes that perform consensus over multiple state channels and DAGs. Each state channel can be "authorized" or share its data with accounts by granting access through DAG payments or throughput licenses, to verify data as a node operator (sole state channel node or hybrid). Hybrid nodes allow for direct license exchanges via atomic commits from hybrid nodes.
Output Value
Its important to understand that, compared to traditional blockchain solutions, the Constellation network architecture is based on the idea of microservices. This means that with the growth of network adoption, various types of application-specific or task-specific hybrid nodes can be anticipated. Hybrid nodes will eventually enable cross-chain liquidity, while the DAG is the financial aspect linking all types of state channels, data, or currencies.
Frequently Asked Questions about the Project
The asynchronous processing of data in DAG can lead to attackers exploiting information discrepancies between nodes for double-spending. If theres no clear parent-child relationship between two vertices, attackers can attempt double-spending of the same deposit at different nodes that only see one of these two vertices each.
Secondly, theres the issue of shadow chains. The DAGs ability to handle multiple parallel transactions allows attackers to secretly collude with multiple nodes to generate a high-weight shadow chain and periodically merge it with the main chain to evade detection algorithms. In extreme cases, this shadow chain could replace the main chain as the network-wide consensus.
Thirdly, under the current DAG model, many edge node transactions may not receive sufficient confirmation.
Project Evaluation
Overall, the DAG structure is currently suitable for specific application scenarios and has numerous issues that need addressing. Its consensus mechanism is just beginning to mature, offering significant room for development. I believe further optimization of DAG, particularly routing, is a trend. In a network, routing is crucial; its primary functions include preventing loops and finding the optimal path. With routing, the entire network can handle larger volumes of data more efficiently, ensuring greater stability and security.
Since IOTA was built for large-scale applications, a proprietary and temporary consensus mechanism: the Coordinator, was adopted for security reasons. Every two minutes, the IOTA Foundation creates a milestone transaction, which immediately confirms all transactions it validates with 100% confidence. The Coordinator served as a protective mechanism during the early stages of the IOTA network until the full Tangle distributed consensus algorithm could take over. At that point, the IOTA Foundation will shut down the Coordinator, allowing the Tangle to evolve and develop independently. This transition will occur iteratively as the network matures to the point where it can function without the Coordinator, becoming more efficient instantly.
Related Links:
https://www.chainwhy.com/coin/dag/
https://www.wanbizu.com/xinbi/20191227141835.html
*The above content has been compiled by Non-Small Numbers official team. If you wish to reproduce, please credit the source.