Some of the information present in this page might not apply to private and purpose-built iterations of the Nova Network protocol.
Nova Network features 3 base layers: Core Layer (previously known as Layer Zero), Bridging Layer (previously known as Layer One), and Execution Layer (previously known as Layer Two). It also leverages a Subnet Layer on top of its Execution Layer, which allows for further scaling and broadening of the network's applications in the future, including purpose-built networks for enterprises, governmental, or public usage. Each one of these layers play a key role on securing the network and allowing participants to interact with it. Validators make up the entirety of the Execution Layer, and aside from compliance checks, they need to consign SNT 625,000 to be granted a validator key.
Nova Network currently leverages on two publicly accessible ledgers, that participants can use to connect and interact with the network on a trustless and decentralised environment. These ledgers were initially deployed by Nova Network's incorporated entity, but are maintained by validators spread across the globe to ensure decentralisation, security, and mitigate tampering of the network's state.
Used as Nova Network's mainnet, it leverages SNT as its native currency, and can be used by individuals, institutions, governments, and enterprises to develop, deploy, and maintain trustless and unstoppable applications.
Our technology can be used to deploy private infrastructure, that can further bolster productivity and allow for better and trustless workflow for individuals, governments, and enterprises.
Nova Network Inc. is constantly updating and upgrading its enterprise-level suite of applications, that like no other mainstream platforms, allow for setup and deployment of a private production-grade blockchain in less than one minute.
Nova Network is built to be scalable and future proof. It's multilayering mechanism allows for further development on top of its Execution Layer, making possible the implementation of subnets using different consensus mechanisms. This enables massive scaling potential without compromising the core security and decentralisation elements of the core network.
As the name suggests, this is the core layer of the network, and it's comprised by several Core Layer Nodes. Each one of these nodes stores a complete history of the network, and can also act as a Validator in case of major problem or even complete failure of the Execution and Bridging layers. It guarantees that the network is unstoppable and resilient.
The bridging layer is comprised by an array of nodes acting as active bridges between the Execution Layer and the Core Layer. All transactions submitted to an Execution Layer node passes through a Bridging Layer node, which then broadcasts it to a Core Layer node, that permanently records and seals the information into the network's history book, or ledger. This mechanism allows easy mitigation of attacks, or tampering attempts from any Execution Layer nodes by breaking the link between the attacking node and the main network ledger. In these cases a fork with the tampered records is created and disconnected away, instead of it being sealed and recorded as a legitimate part of the main public ledger.
Built on top of the execution layer, Subnet Layer nodes allow for seamless future implementation of scaling solutions, including purpose-built public subnet ledgers and private or public third-party blockchains or DAGs.