ACChain is composed of three protocol layers: Communication Protocol layer, Consensus Protocol layer and the Smart Protocol layer.

The Communication layer is built on http protocol, supporting breakpoint transmission of data. This layer is mainly responsible for data transmission on the blockchain network.

The Consensus layer is built on ABFT, a combination of consensus algorithm of DPOS and PBFT. This layer is in charge of packing transactions and correct creation of blocks.

The Smart Protocol layer supports side chain construction (which are the digital assets that can be issued as tokens under ACChain). DApps run on the side chain. Each side chain corresponds to one DApp. Asset exchange between the main chain and the DApp is completed through a cross-chain protocol. This layer is mainly used for issuing tokens and publishing applications.

The Distributed Ledger

Replication and creation of the distributed ledger occurs through block consensus.

As soon as a round of consensus gets started (ACChain takes 10s for each block), every active node in the whole network instantly knows whether it is entitled to keep accounts (namely the right to create block).

If a node has the right to create block, it will run block data through the Hash algorithm, thus creating a to-be-verified data packet (proposal), which is the broadcast to all other nodes.

Those nodes without bookkeeping rights will have to wait for the broadcast of the proposal. The proposal is then supported through the verification of the other nodes after it is received — by vote.

If 2/3 of node signatures cast a vote in favour, the proposal is passed, and the bookkeeper will write this verified block into the blockchain and broadcast it to other nodes, who then verify the block and write this legit block into their own blockchain, thus ensuring replication and consistent creation of blocks through every node into the blockchain thereafter.

However, should the proposal fail to have 2/3 of votes (the block may be an illegitimate attack), this round of block consensus fails too, and all nodes will have to wait for a new round of consensus.

Security

The security of the ACChain blockchain structure is designed mainly into two facets: the defensive systems and overall system structure.

Blockchain’s decentralized architecture allows itself to use any node on the network as its own server. Thus, even when most nodes on the network are under attack, the blockchain can still remain intact so long as there is still one active node.

Seed nodes provide a defensive network, ensuring that active nodes are available on the chain at all times and the blockchain can be operated normally regardless of attack.

The safety of data is mostly embodied in the algorithm and consensus mechanism. The Algorithm of the ACChain wallet is generated through a private key, guaranteeing the uniqueness and privacy of the address.

Meanwhile, a secondary transaction password is setup by the user to establish a double layer of protection.

Every transaction on the chain is based on a complicated Hash signature algorithm, hence every transaction is immutable and the data produced is legitimate.

As for consensus mechanism, the creation of each block requires verification from the consensus agreement of DPOS and PBFT.

As a result, legitimate blocks are recorded on the block-chain whilst illegitimate blocks are discarded, ensuring authenticity and trustworthiness of data on the blockchain.

Want to know more?

Join the ACChain Telegram : t.me/acchainorg