Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 25 of 80
In Progress

25. Scalability of blockchain technology – what is it?

Blockchain is a decentralized technology, acting as a distributed ledger to power transactions. Because each transaction is decentralized, each node can autonomously initiate transactions. Of course, according to the contract, more specifically – a smart  contract. All without third-party interference.

As more and more people use blockchain technology, the number of problems related to its scalability is growing. As a result, transactions are delayed. In today’s lesson, we will discuss blockchain scaling solutions and how to make transactions on time.

Blockchain scalability

Scalability is the ability of the system to handle an increasing amount of work. If the blockchain networks too much data, it will not work properly. Then the blockchain will have very low scalability.

Blockchain is scalable when it achieves a higher TPS than other systems by changing its consensus method and adapting the system to current needs.

So, what is the issue?

Public blockchains, they are inefficient. This is a bold statement, but true. Blockchain is a ledger that manages cryptographically signed transactions in P2P networks. They store and process a huge number of transactions. For this reason, blockchain encounters scalability issues, especially with more nodes and transactions.

To solve this problem, blockchains require more computing power, a fast Internet connection and good on-chain memory. Latency and throughput of transactions are two features that affect blockchain. It is known that increased use cases cannot affect the performance of the blockchain platform.

So, how to solve the problem? Many experts on the subject suggest compromise on security and the level of decentralization. Then there is a chance that we will increase the scalability in blockchain. Now let’s check what solutions they offer us.

Blockchain scalability – solutions

Layer 1 (Layer1) scalability solutions. They improve the most important properties and attributes of blockchain networks. We are talking here about increasing the block size limit or shortening the time of its verification. The scalability of the first layer also includes: sharding, SEGWIT and hard forks. Tier 1 solutions are often called on-chain scaling solutions because they require changes to the main network codebase. Let’s take a look at them:

  1. Sharding – its task is to divide the blockchain network into smaller and easily managed networks, called shards. The network then runs the shards side-by-side. With each shard, the performance of network transaction processing increases.
  2. SEGWIT – its task is to improve the protocol in the blockchain network, mainly Bitcoin. It modifies the method and structure of data storage. It removes data from the signature associated with each transaction and thus increases the capacity and space for storing transactions.
  3. Hard fork – introduces changes to the properties of the blockchain network. A fork may involve increasing the size of a block or reducing the time it takes to create it.

Second layer (Layer 2). Layer two solutions offer us additional protocols, installed on top of the main one blockchain. They are used to relieve the main chain. Layer 2 options also include state channels and off-side chains.

  1. State Channels. They offer two-way communication between off-chain transaction channels and blockchain networks. They do not require the immediate involvement of miners to approve the transaction. Furthermore, they are integrated into the network using a smart contract or multi-signature mechanism.
  2. Sidechain. It’s also an excellent choice for layer 2 solutions. As the name suggests, a sidechain is a side chain that is adjacent to the main chain and serves as a transaction chain.
  3. Plasma. It uses the so-called “child chains” that “exit” from the main chain, with each of the child chains serving as independent blockchain. They process their transactions while providing security from the main chain.
  4. Lightning network. Off-chain solution. It uses smart contract functionality over the main blockchain network. Off-chain channels offer faster transactions with reduced fees.

5. Scaling scattered books. It is worth noting here that blockchain, they are basically part of a larger DLT (distributed ledger technology) ecosystem. Apart from blockchain, there are more types of ledgers that could be used to increase scalability. As an example, to solve blockchain scalability, we can provide Directed Acyclic Graphs or DAG’s. Both run asynchronously, which gives you the ability to run transactions independently. What’s more, DAG’s use a linear data structure in their operation, which allows data to flow from before later sections. This allows you to process an unlimited amount of data.

6. Scaling the consensus mechanism. You know that there are many consensus algorithms, tailored to the needs of the platform. However, scaling them is one way to increase the scalability of the blockchain.

Summary

Demand for services offered by Blockchain will grow. Current demand has already led to scalability issues. The more users, the more transactions. As you can see, there are many solutions, be it layer 1 or the scalability of the consensus mechanism. Note, however, that many of these solutions are still in the early stages of development.