Skip to content

Commit 6ba4714

Browse files
committed
docs: clean up
1 parent 373696b commit 6ba4714

File tree

3 files changed

+88
-99
lines changed

3 files changed

+88
-99
lines changed

docs/workshop/day-3-recap.md

Lines changed: 5 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -70,13 +70,13 @@ We briefly discussed an alternative design choice, in which IBs reference an EB
7070
In this design, one gets a ledger state for each RB which gives a ledger state for each EB to be reused and IBs are validated with respect to that same state. On the contrary, due to EBs referencing an RB, there is still the same trade-off to be made as in the [IB-to-RB reference approach](#ib-to-rb-reference-approach) - having to chose more or less stable RBs for EBs resulting in higher latency or higher loss in EBs.
7171

7272

73-
##### 2. **EB Chain/ IB-to-EB-(to-EB)*-to-RB**
73+
##### 2. **EB Chain/ IB-to-EB(-to-EB)*-to-RB**
7474

7575
In this approach IBs reference an EB which itself may reference another EB, which creates this chain of EBs that anchors on some older RB reference. Thus, EBs may have an RB reference or another EB reference of an EB that has not made it into an RB yet (full Leios variant). RBs on the other hand can only exactly reference one certified EB. IBs reference one of these EBs.
7676

7777
This approach allows for more recent state references while maintaining security through the chain of certified EBs, and handles edge-case scenarios, where multiple EBs have been produced:
7878

79-
- from different pipelines in parallel
79+
- from different pipelines in parallel (see EB ordering below)
8080
- from the same pipeline
8181

8282
![EB Chain Approach](eb-reference-02.svg)
@@ -85,9 +85,7 @@ This approach allows for more recent state references while maintaining security
8585

8686
- **Minimum Age Requirement**: A constraint where EBs must reference an RB that is at least a certain age (e.g., 5 minutes old) to ensure it's widely available in the network.
8787

88-
- **EB Ordering by Slot**: In the Leios protocol, multiple pipelines run in parallel, each ideally producing one RB. With parameters set for 1.5 EBs per stage (with randomness via VRF functions potentially producing more), there may be multiple EBs to choose from for inclusion in an RB. This approach orders EBs by slot number and VRF hash, with a predefined ordering function to resolve conflicts when multiple EBs exist for the same slot or from different pipelines.
89-
90-
- **Orphan Prevention**: A mechanism where RBs should not include EBs that reference orphaned EBs (those not included in previous RBs), helping to maintain a clear reference chain across pipelines.
88+
- **EB Ordering by Slot**: In the Leios protocol, multiple pipelines run in parallel, each ideally producing one RB. With parameters set for 1.5 EBs per stage (with randomness via VRF functions potentially producing more), there may be multiple EBs to choose from for inclusion in an RB.
9189

9290
- **EB State Reuse**: An optimization technique where, when computing ledger states for EBs in a chain, we reuse the ledger state from referenced EBs and only replay the IBs in the current EB, reducing computational overhead, especially important when dealing with multiple pipelines and stages.
9391

@@ -108,18 +106,9 @@ This approach allows for more recent state references while maintaining security
108106

109107
3. **Certification**: Certified EBs provide stability similar to RBs but with lower latency, making them a promising middle ground.
110108

111-
4. **Implementation Complexity**: The IB reference approach, while offering the lowest latency, introduces significant complexity in validation and security guarantees.
112-
113109
### Next Steps
114110

115-
1. Further analysis of the EB reference approach, particularly around:
111+
Further analysis of the EB reference approach, particularly around:
116112
- EB ordering mechanisms
117-
- State reconstruction efficiency
113+
- State reconstruction efficiency (computational cost)
118114
- Security guarantees
119-
120-
2. Simulation studies to quantify:
121-
- Latency improvements
122-
- State management overhead
123-
- Security properties
124-
125-
3. Consider hybrid approaches that combine elements from different strategies based on specific use cases.

docs/workshop/eb-reference-02.d2

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
...@styles
22

33
title: {
4-
label: "EB Chain/ IB-to-EB-(to-EB)*-to-RB Reference Approach"
4+
label: "EB Chain/ IB-to-EB(-to-EB)*-to-RB Reference Approach"
55
near: top-center
66
style.font-size: 24
77
style.bold: true

0 commit comments

Comments
 (0)