Home  >  Article  >  What is Data Availability DA? DA track core project inventory

What is Data Availability DA? DA track core project inventory

WBOY
WBOYOriginal
2024-06-15 10:09:28896browse

What is data availability DA? DA track core project inventory! With the development of blockchain technology, decentralized data availability has become one of the important directions to solve one of the three major problems of blockchain. In this context, projects such as Celestia, EigenLayer, Avail DA, and NEAR DA have emerged. They attempt to solve the scalability and performance issues of blockchain through innovative technologies and designs, thereby promoting the development of the blockchain ecosystem. develop.

Today the editor of this website will share with you what is data availability DA? An inventory of the core projects of the DA track, please take a look at it if you need it!

Data availability issues

Introduction to data availability

In today’s blockchain architecture, data availability (DA) is a crucial component. Unlike traditional single blockchains, modular blockchains decompose the network into different functional layers, including execution, data availability (DA), consensus and settlement levels. Among these layers, the Data Availability (DA) layer is responsible for storing the data required to verify the validity of transactions.

What is Data Availability DA? DA track core project inventory

Data availability issue

In blockchain and distributed ledger technology, data availability issue is a crucial challenge. At its core, it ensures that all transaction data is publicly accessible and verifiable on the network, which is critical to maintaining the integrity and security of the blockchain system.

In the blockchain system, the transaction data of each block needs to be verified by network nodes. However, ensuring that this data can be reliably distributed throughout the network and equally accessible to all participants is a critical issue.

Why is data availability important?

Off-chain transactions: L2 solutions are designed to handle transactions outside the main chain to improve the scalability of the entire system. However, this approach may present some challenges, as L2 does not immediately record all transaction data on the L1 blockchain, which may lead to difficulties in verifying the completeness and accuracy of all transaction data.

Security Dependence on Layer 1: Although L2 networks have the ability to operate independently and process transactions, they still rely on the L1 network to ensure overall security. Ensuring that data transmission from L2 to L1 is complete and accurate is critical to maintaining the integrity of the entire network.

Resolution mechanisms rely on data: L2 networks can apply mechanisms such as fraud proof to resolve potential disputes. The effectiveness of these mechanisms lies in the availability and accessibility of transaction data.

Transparency and trust issues: In blockchain technology, transparency is a vital principle. In an L2 network, any issue regarding data availability may trigger a crisis of trust, as users may not be able to autonomously verify the authenticity of transactions.

Increased complexity of verification: The introduction of L2 increases the complexity of ensuring the accuracy of data returned to the main chain, which also brings the risk of data availability issues, thus affecting the reliability of the network.

DA Solution

There are many solutions for the DA layer. Generally speaking, they can be divided into two main types: on-chain and off-chain.

Data availability in L2 solutions usually takes two different ways:

  • On-chain data availability: All transaction data is stored on the L1 chain, this The method is more secure, but also more expensive. This means that L2 still uses Ethereum as the DA layer and relies on Ethereum to reduce the cost of data availability.

  • Off-chain data availability: Data is stored off-chain, and only the digest (hash value) of the encrypted information is stored on-chain. This approach is more cost-effective but requires reliance on external entities to retrieve the data. That is, instead of using Ethereum as a DA layer, we are looking for more economical ways to obtain data availability. Depending on the degree of decentralization and security, off-chain solutions can be divided into four types: Validium, Data Availability Committee (DAC), Volition and general DA solutions.

DA Track Project Review

There are relatively few participants in the data availability (DA) field. In addition to Ethereum, there are also some key projects, such as Celestia, Eigenlayer, Avail and Near DA, etc., have their own characteristics in terms of project progress. In DA projects, factors such as security, customizability, interoperability, and cost are crucial.

Celestia

Celestia is the first project to adopt a modular Data Availability (DA) network designed to scale as the number of users grows in a secure manner. Its modular design makes it easy for anyone to launch an independent blockchain.

As a leader in modular public chains, Celestia is developed based on the Cosmos SDK and is committed to improving data availability. On mainnet, Celestia has achieved a significant competitive advantage.

Technical Features

Celestia is designed to separate execution, consensus, settlement and data availability. This modular structure allows for specialization and optimization at every level, improving the overall efficiency and scalability of the network.

What is Data Availability DA? DA track core project inventory

Source: https://docs.celestia.org/learn/how-celestia-works/monolithic-vs-modular

Data Availability Sampling (DAS)

Data Availability Sampling ( DAS) is a method that allows light nodes to verify the availability of data without downloading the entire block. By randomly sampling blocks of data, light nodes can verify that the data can be successfully retrieved and verified, thereby inferring whether the data for the entire block is available.

Source: https://docs.celestia.org/learn/how-celestia-works/data-availability-layer

Namespace Merkle Trees (NMTs)

NMTs enable block data to be divided into separate namespaces for different applications. This means each application only needs to download and process the data relevant to it, significantly reducing data processing requirements.

What is Data Availability DA? DA track core project inventory

Source: https://docs.celestia.org/learn/how-celestia-works/data-availability-layer

Feature Analysis

Celestia's Rollups are different from Ethereum Rollups in that the way they run on Celestia independently determines the canonical state. This independence increases the autonomy of the node. Nodes can freely choose operating methods through soft and hard forks, reducing reliance on centralized governance, thus promoting more experimentation and innovation.

Celestia’s Rollups are execution-agnostic, meaning they are not limited to an EVM-compatible design. This openness provides a wider space for innovation in virtual machines and helps promote the development of technology.

Celestia simplifies the blockchain deployment process. Using tools like Optimint, developers can quickly deploy new chains without worrying about the complexity and high cost of consensus mechanisms.

Celestia handles activity state growth and historical data storage separately, providing a more effective resource pricing mechanism. This approach reduces the interaction between execution environments and improves the user experience.

Celestia’s architecture supports the creation of trust-minimized bridges, enabling different chains to securely interconnect, thereby enhancing the security and interoperability of blockchain clusters.

Celestia is the first modularly designed DA network with the primary goal of scaling securely as the number of users grows. Through its modular structure, launching independent blockchains is simple. With its unique approach and technological innovation, Celestia is expected to play an important role in the blockchain industry. Its focus on solving blockchain challenges, particularly scalability issues, while maintaining security and decentralization makes it an important player in the growing blockchain ecosystem.

Eigen DA

EigenLayer is a re-pledge protocol that allows users to re-pledge ETH, lsdETH and LP Token on other side chains, oracles and other platforms, and receive verification rewards as nodes. Eigen DA is a decentralized data availability (DA) service built on Ethereum, built using EigenLayer Restaking, and will become the first Active Verification Service (AVS) on EigenLayer.

Technical Features

Enhance Ethereum’s data availability capabilities: Eigen DA utilizes Blob block data and KZG commitments, with the help of Cancun’s upgraded Blob block data and KZG commitments, thereby enhancing Ethereum’s data availability capabilities. The node verification work is participated by Ethereum’s Validators, and the entire process is completed around Ethereum’s existing infrastructure.

No autonomous consensus and P2P network: Eigen DA nodes re-mortgage ETH in the EigenLayer contract on Ethereum L1, becoming a subset of Ethereum validators. With proof of escrow, each operator must periodically compute and submit the value of a function that can only be computed if they have stored all blob blocks allocated to them within a specified storage period. If they prove a blob without computing this function, anyone with access to its data items can slash the ETH held by that node, ensuring the security and reliability of the network.

EigenLayer Consensus Mechanism: ETH stakers can choose to validate the Eigen DA network and accept Eigen DA-specific slashing conditions. It then acts as a POS validator, proving the status of the network.

Data Availability Layer: Eigen DA breaks call data into small chunks and performs erasure coding and KCG polynomial commitment on these chunks to facilitate a system where each node downloads only a small portion even if half of the nodes leave , will not affect the system. They can do this because erasure coding can reconstruct the complete data state even if some blocks are lost, and KZG proofs ensure that the blocks they receive are the same blocks claimed by the node.

Source: https://www.blog.eigenlayer.xyz/intro-to-eigenda-hyperscale-data-availability-for-rollups/

Feature Analysis

The nodes of Eigen DA are a subset of the re-staking nodes in the EigenLayer network. There is no additional staking cost to become an Eigen DA node.

Existing DA solutions use P2P networks to transfer blobs, where operators receive blobs from their peers and then rebroadcast the same blobs to others. This greatly limits the achievable DA rates. In EigenDA, the disperser sends blobs directly to EigenDA operators. By relying on direct communication to decentralize data, data dissemination is no longer limited by the consensus protocol and P2P network throughput, thereby shortening communication, network delays and confirmation times, and increasing data submission speed.

Eigen DA inherits part of the security of Ethereum and has higher security than other DA solutions.

Eigen DA also supports Rollup to flexibly choose different pledge token models, erasure coding ratios, etc., providing higher flexibility.

Since the final confirmation of Eigen DA relies on the Eigen DA contract on the Ethereum mainnet, the cost of Eigen DA will be significantly higher than other DA solutions in terms of time overhead for final confirmation.

Eigen DA adopts advanced technologies such as erasure coding, KZG commitment, ACeD, etc., and decouples data availability (DA) from consensus, making it perform well in terms of transaction throughput, node load and DA cost. , far more than the Ethereum DA solution. Compared with other DA solutions, Eigen DA has lower startup and staking costs, faster network communication and data submission speeds, and higher flexibility. Therefore, Eigen DA is expected to become an emerging competitor in the DA market and is expected to host part of Ethereum's DA services.

TNA Protocol

What is Data Availability DA? DA track core project inventory

Source: https://tna-btc.com/

TNA Protocol is a collection of full-chain domain name asset issuance Bitcoin asset and security protocol integrated with DA solution. Based on in-depth research on the availability of Bitcoin data, TNA Protocol launched TNA Core, a BLOB-based DA framework that can synchronize status between the Bitcoin main network and the second-tier network, and can also be implemented on multiple Bitcoin second-tier networks. between layers of networks, and combines security and economy. TNA Core's solution can be well integrated into major Bitcoin DA solutions, such as Nubit, B Squared, etc., to help achieve more efficient data availability.

In addition, TNA Core's DA solution and its domain name asset Tapnames that can be issued on the whole chain can be closely integrated to directly define the standards for cross-chain interoperability, allowing users to use domain names to seamlessly conduct transactions across various networks. And the safety barrier is provided by TNA Core.

TNA Protocol’s narrative upgrade is of great significance, reflected in the dual benefits to currency prices and products. First of all, the narrative upgrade and the accompanying new economic model help TNA Protocol seek new liquidity and trading scenarios for the token, which makes the potential price growth opportunities of the token larger and clearer; through domain name and DA layer-based The cross-chain interoperability standards defined by the plan will also increase the use scenarios of TNA Protocol-related tokens, thereby helping to increase the value of the tokens.

Secondly, this narrative upgrade will also bring significant benefits to the product. By promoting the improvement of user experience and the adoption of more second-layer networks, the new Bitcoin cross-chain interoperability standard will make Tapnames domain names more competitive and attract more users to participate and use them.

Therefore, this narrative upgrade will not only have a direct positive effect on the community and currency prices, but will also promote the development of products and the prosperity of the ecosystem, laying a solid foundation for the long-term sustainable development of the entire ecosystem. Base.

Avail DA

Avail DA is designed to address the needs of next-generation trust-minimized applications and sovereign aggregation. Its outstanding advantage is its innovative security approach that allows light clients to easily verify data availability through peer-to-peer network sampling. With the unparalleled data availability interfaces and powerful security features provided by Avail DA, developers can more efficiently and easily create blockchain applications based on zero-knowledge or fraud-proof technologies.

What is Data Availability DA? DA track core project inventory

Source: https://blog.availproject.org/the-avail-vision-reshaping-the-blockchain-landscape/

Avail DA Analysis

Avail is a blockchain compatible with the Ethereum Virtual Machine (EVM). Its features include efficient transaction ordering and recording, and provides data storage and feasibility verification. Compared to traditional smart contracts and base layer dependencies, Avail allows Rollup to publish data directly to it and verify it through the light client network. This modular design allows developers to store data on Avail and choose other networks for settlement, providing more flexibility and choice.

Avail’s consensus mechanism inherits from the BABE and GRANDPA consensus mechanisms of the Polkadot SDK, and adopts Polkadot’s Nominated Proof of Stake (NPoS) to support up to 1,000 verification nodes. In addition to its powerful consensus mechanism, Avail also has decentralized features, sampling data through the P2P network of light clients, and providing an efficient and reliable backup mechanism to ensure data availability, even in the event of a failure.

Avail excels in transaction ordering, recording, and data viability verification, supporting Ethereum Virtual Machine (EVM)-compatible blockchains. Its light client network verification mechanism allows Rollup on Avail to verify status through the light client network without relying on smart contracts and base layers. Due to its modular nature, developers can store data in Avail and choose other networks for settlement.

Node Type

Full nodes: These nodes are responsible for downloading and verifying the correctness of blocks, but do not participate in the consensus process. Their role is critical to ensuring the integrity of the network.

  • Validation nodes: These nodes are the core of the Avail DA consensus mechanism. They are responsible for generating blocks, determining included transactions, and maintaining the order of the network. Validator nodes obtain incentives through consensus participation, which is the basis for DA layer operations.

  • Light Client: Running with limited resources, light clients rely on block headers to participate in the network. They can query full nodes for specific transaction data on demand and are critical to maintaining decentralization and accessibility of the network.

Near DA

On November 8, 2023, the NEAR Foundation announced the launch of the NEAR Data Availability (NEAR DA) layer to provide ETH rollup and Ethereum developers provides powerful, cost-effective data availability. First users include StarkNet’s Madara, Caldera, Fluent, Vistara, Dymension RollApps and Movement Labs.

What is Data Availability DA? DA track core project inventory

Source: https://docs.near.org/zh-CN/concepts/basics/protocol

Technical Architecture

NEAR DA leverages an important part of the NEAR consensus mechanism, Nightshade, which parallelizes the network into multiple shards.

Each shard on NEAR generates a small portion of the block, called a chunk. These chunks are aggregated to produce blocks. When a block producer processes a receipt, consensus needs to be reached on the corresponding receipt. Once the block has been processed and included in the block, the receipt is no longer needed for consensus and can be removed from the blockchain's state. Therefore, NEAR will not slow down its consensus if there is more data than needed, but any user of NEAR DA will have ample time to query transaction data. Therefore, scalable and cost-effective data availability is critical for any Rollup scenario. As the NEAR protocol moves to stateless verification, it will further reduce the hardware requirements for certain types of validators (block validators). By storing state in memory, NEAR can support more shards, making the system more decentralized.

Advantage Analysis

In NEAR DA, consensus verification is provided by NEAR validators who reach consensus when processing blob submissions. In terms of data durability, full nodes store function input data for at least three days, while archive nodes can store data for longer.

The design of NEAR DA ensures efficient utilization of consensus and will not waste excessive data. Additionally, the data has been indexed by all major browsers on NEAR, providing indexer support.

Finally, for long-term availability of promises, NEAR DA takes an easy-to-create approach that anyone can build with limited expertise and tools.

NEAR-Polygon CDK integration allows developers to build their own Rollups and become part of the Polygon ecosystem.

This is the first integration of NEAR DA with a zero-knowledge-based Layer 2 stack, providing more options for developers looking for scalable data availability solutions.

Summary

In the blockchain field, competition among DA projects such as Celestia, EigenLayer, Avail DA and NEAR DA is fierce. Although DA layer projects are springing up like mushrooms after rain, their core technology is not complex, and each project has its unique technology and competitive advantages. These projects demonstrate the diversity and innovation in the field of blockchain technology. In the future, as these projects continue to develop and mature, they are expected to make important contributions to the further growth and development of the blockchain ecosystem.

The above is the detailed content of What is Data Availability DA? DA track core project inventory. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn