Arch Network Logo
Setup Infrastructure

Architecture Overview

Understanding the core components and architecture of Arch Network

Core Components

Arch VM

The Arch Virtual Machine (VM) is built on eBPF technology, providing a secure and efficient environment for executing programs.

Key features:

  • ๐Ÿ”„ Manages program execution
  • โšก Handles state transitions
  • ๐ŸŽฏ Ensures deterministic computation
  • ๐Ÿ”— Provides syscalls for Bitcoin UTXO operations
  • ๐Ÿ’ฐ Supports compute budget management
  • ๐ŸŽญ Handles program upgrades and migrations

Bitcoin Integration

Arch Network interacts directly with Bitcoin through:

  • ๐Ÿ’ผ Native UTXO management via bitcoin-internal crate
  • โœ… Transaction validation and synchronization
  • ๐Ÿ” Multi-signature coordination
  • ๐Ÿ“ State commitment to Bitcoin
  • ๐Ÿ”„ Real-time Bitcoin network monitoring
  • ๐Ÿ“Š UTXO graph processing and rollback support

Distributed Key Generation (DKG)

The DKG system enables secure multi-signature operations:

  • ๐Ÿ”‘ Threshold signature schemes (t-of-n)
  • ๐ŸŒ Peer-to-peer key generation
  • ๐Ÿ”„ Dynamic participant management
  • ๐Ÿ›ก๏ธ Malicious participant detection
  • ๐Ÿ“ก Network message routing and validation

Validator Network

The validator network consists of multiple node types that work together:

Node Types

Node TypePrimary Responsibilities
Leader Nodeโ€ข Coordinates transaction signing
โ€ข Submits signed transactions to Bitcoin
โ€ข Manages validator communication
โ€ข Orchestrates DKG sessions
Validator Nodesโ€ข Execute programs in the Arch VM
โ€ข Validate transactions
โ€ข Participate in multi-signature operations
โ€ข Maintain network state
โ€ข Contribute to DKG operations
Bootnodeโ€ข Handles initial network discovery
โ€ข Similar to Bitcoin DNS seeds
โ€ข Helps new nodes join the network
โ€ข Manages peer information distribution

Core Programs

Arch Network includes several built-in programs that provide essential functionality:

APL Token Program

  • ๐Ÿช™ Fungible token creation and management
  • ๐Ÿ” Multi-signature support
  • โ„๏ธ Account freezing and thawing
  • ๐Ÿ“Š Supply management and minting
  • ๐ŸŽญ Authority management and delegation

Associated Token Account (ATA)

  • ๐Ÿ”— Automatic token account creation
  • ๐Ÿ’ฐ Rent-exempt account management
  • ๐ŸŽฏ Deterministic address derivation
  • ๐Ÿ”„ Account lifecycle management

Compute Budget Program

  • โšก Transaction compute unit management
  • ๐Ÿ’ฐ Fee calculation and optimization
  • ๐ŸŽฏ Resource allocation control
  • ๐Ÿ“Š Performance monitoring

System Program

  • ๐Ÿ—๏ธ Account creation and management
  • ๐Ÿ”„ Ownership transfers
  • ๐Ÿ’ฐ Lamport management
  • ๐Ÿ”— UTXO anchoring

Transaction Flow

Security Model

Arch Network implements a robust multi-layered security model that directly leverages Bitcoin's security guarantees:

1. UTXO Security

  • ๐Ÿ”’ Ownership Verification

    • Public key cryptography using secp256k1
    • BIP322 message signing for secure ownership proofs
    • Double-spend prevention through UTXO consumption tracking
  • ๐Ÿ”— State Management

    • State anchoring to Bitcoin transactions
    • Atomic state transitions with rollback capability
    • Cross-validator state consistency checks
    • Real-time UTXO graph validation

2. Transaction Security

pub struct SecurityParams {
    pub min_confirmations: u32,    // Required Bitcoin confirmations
    pub signature_threshold: u32,   // Multi-sig threshold
    pub timelock_blocks: u32,      // Timelock requirement
    pub max_witness_size: usize,   // Maximum witness data size
    pub dkg_timeout: Duration,     // DKG operation timeout
    pub malicious_threshold: u32,  // Malicious participant threshold
}
  • ๐Ÿ“ Multi-signature Validation
    • ROAST protocol for distributed signing
    • Threshold signature scheme (t-of-n)
    • Malicious signer detection and removal
    • Binding factor verification for signature shares
    • Dynamic participant management

3. Network Security

  • ๐ŸŒ Peer Validation

    • Authenticated peer discovery
    • Message integrity verification
    • Rate limiting and DoS protection
    • Network topology validation
  • ๐Ÿ”„ State Synchronization

    • Consensus-driven state updates
    • Rollback capability for invalid states
    • Cross-validator state verification
    • Real-time conflict resolution

Performance Characteristics

Scalability

  • ๐Ÿ“ˆ Horizontal Scaling: Add more validators for increased throughput
  • ๐Ÿ”„ Parallel Processing: Multiple transactions processed simultaneously
  • ๐Ÿ’พ Efficient Storage: Optimized data structures for fast access
  • ๐ŸŒ Network Optimization: Efficient peer-to-peer communication

Throughput

  • โšก High TPS: Optimized for high transaction throughput
  • ๐Ÿ’ฐ Low Latency: Fast transaction confirmation
  • ๐Ÿ”„ Batch Processing: Efficient handling of multiple operations
  • ๐Ÿ“Š Resource Management: Compute budget optimization

Reliability

  • ๐Ÿ›ก๏ธ Fault Tolerance: Continues operation despite node failures
  • ๐Ÿ”„ Recovery: Automatic recovery from network partitions
  • ๐Ÿ“ Audit Trail: Complete transaction history and state changes
  • ๐Ÿ” Monitoring: Real-time performance and health monitoring

Development Workflow

Local Development

# Start complete local environment
arch-cli orchestrate start --local "$(pwd)"

# Use configuration profiles for different environments
arch-cli config create-profile dev --bitcoin-node-endpoint http://127.0.0.1:18443

# Deploy and test programs
arch-cli deploy target/deploy/

Testing and Validation

  • ๐Ÿงช Unit Testing: Individual component testing
  • ๐Ÿ”„ Integration Testing: End-to-end workflow validation
  • ๐ŸŒ Network Testing: Multi-node network simulation
  • ๐Ÿ“Š Performance Testing: Throughput and latency measurement

Deployment

  • ๐Ÿš€ Staged Rollouts: Gradual feature deployment
  • ๐Ÿ”„ Rollback Capability: Quick reversion to previous versions
  • ๐Ÿ“Š Monitoring: Real-time performance and error tracking
  • ๐Ÿ” Debugging: Comprehensive logging and error reporting