SlideShare a Scribd company logo
1 of 4
Download to read offline
TON Development Status
Overall progress towards the test version: 90%
January 28, 2019
1. TON Virtual Machine (TVM)
TON VM or TVM is the component required for executing smart contracts
in the TON Blockchain.
Implementation: 95% complete
TVM has been fully implemented and internally tested. Minor modifications
will likely be necessary during the process of binding TVM with the TON
Blockchain block generation and validation software.
In addition to TVM itself, a database required for storing on disk and
accessing large amounts of TVM data (e.g., smart-contract code and data,
old blocks, blockchain state) without loading all of it into memory has been
developed.
Documentation: 95% complete
The current version of TVM is fully described in Telegram Open Network
Virtual Machine (September 5, 2018). Minor modifications to the imple-
mentation may require corresponding changes in the documentation.
1
2. TON Network
The TON Network is the component required for delivering requests (e.g.,
proposed transactions) and propagating newly-generated TON Blockchain
blocks through the network.
ADNL (low-level overlay network protocol running over IP networks):
80% complete
All functionality required for the test version is complete, including ellip-
tic curve cryptography and the node lookup protocol. Some sophisticated
options and additional cryptographic options that are not required for the
launch of the test version will be implemented later (prior to the final launch).
Overlay networks over ADNL: 100% complete
Overlay networks are required to build node groups inside the ADNL net-
works. For instance, the validators for a shardchain create their separate
overlay network to propagate new block candidates and run a TON-specific
Byzantine Fault Tolerant (BFT) consensus protocol.
Broadcast protocols for overlay networks over ADNL: 100% complete
Simple broadcast protocols are used inside overlay networks to propagate
small messages, such as the BFT consensus protocol messages, to all members
of an overlay network. These protocols are required for the implementation
of validator BFT consensus.
CATCHAIN protocol: 100% complete
The CATCHAIN protocol is a variant of broadcast protocols tailored for im-
plementing BFT consensus protocols and for solving similar group consensus
tasks in a closed membership overlay network. As such, it is the first step in
implementing the validator BFT consensus protocol.
Streaming broadcast protocols: 100% complete
Streaming broadcast protocols are used to quickly propagate large amounts
of data, such as newly-generated TON Blockchain blocks (to all full nodes)
and block candidates (to the validators of the corresponding shardchain).
Streaming broadcast protocols employed by TON use Forward Error Correc-
tion (FEC) protocols as their component.
2
3. TON Blockchain Block Generation and Validation
The block generation and validation software relies heavily on TVM and
the TON Network to create new block candidates, validate them among the
validators, and propagate the signed blocks to all full nodes. Since the work
on the TVM and TON Network components listed above is largely complete,
the TON Blockchain is now in active development.
Documentation: 90% complete
The documentation is intended to present a complete description of the
masterchain and shardchain block format in the TON Blockchain. The
shardchain block description available in Telegram Open Network Blockchain
(September 5, 2018), while unchanged in the principal points, will require
some minor modifications based on changes that have arisen during the final
development phases. Some details of the masterchain blocks, such as the
list of all configurable parameters with their respective types, are not fully
documented at this time, because they are not completely finalized yet; they
will be added to the documentation during the testing phase.
Block manipulation library: 95% complete
The block manipulation library is intended to store entire blocks and their
parts in files, load these data into memory, and access or modify different
data structures present in a block. All methods originally intended have
been implemented. Some minor modifications may be required during the
final stages of validator software development.
Validator BFT Consensus protocol: 95% complete
The TON-specific Byzantine Fault Tolerant (BFT) consensus protocol is used
by validators during block generation to reach agreement on the next block
of a shardchain or the masterchain (as applicable). This custom BFT pro-
tocol, built upon TON CATCHAIN, has been completely implemented and
tested, yielding 2–3 second consensus time for a test network of 100 servers
distributed around the world. This is consistent with the five second block
generation interval proposed in the TON Whitepaper.
Validator software: 60% complete
Validator software uses the block manipulation library to generate block can-
didates, validate block candidates proposed by other validators, and achieve
3
consensus on the next block in a shardchain or the masterchain. It consists of
the network component (especially the BFT Consensus protocol) and of the
local block generation (collation) and validation component. The network
component is almost complete. The local block generation and validation
component is currently halfway complete, but most development efforts are
currently dedicated to the completion of this component.
Full node software: 80% complete
A full node of the TON Blockchain is a program that obtains and stores
local copies of all or some blocks, and may re-distribute these blocks to other
full nodes if required. It is also an important component of the validator
software, because validators are (specialized) full nodes as well. The network
component and the local storage component of the full node software are
currently in active development and nearing their completion.
Smart-contract development, test, and debug environment: 50% com-
plete
A test and debug environment for smart contracts is already implemented
and internally tested, along with low-level “TVM assembly” smart-contract
language. The compiler from a high-level smart-contract language is 20%
complete—its core functionality is ready, but more built-in functions and
operations need to be defined.
Fundamental and sample smart contracts: 20% complete
Some sample smart contracts are prepared in “TVM assembly”. The imple-
mentation of fundamental smart contracts—which reside in the masterchain
and run crucial tasks such as electing new validators and changing config-
urable parameters—requires the availability of the high-level smart-contract
compilers and development tools discussed above. However, the launch of a
test network with very basic versions of fundamental smart contracts is our
top priority. We plan to replace the basic versions of these smart contracts
with more sophisticated versions during the testing phase.
** This communication contains forward-looking statements, including state-
ments of plans, objectives, expectations, development status and intentions.
Any number of factors could cause actual results to differ materially from
those contemplated by any forward-looking statements, including but not lim-
ited to the risks identified in Appendix B to the Whitepaper **
4

More Related Content

What's hot

Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68myrajendra
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Introduzione a Software Define Networking
Introduzione a Software Define NetworkingIntroduzione a Software Define Networking
Introduzione a Software Define Networkingfestival ICT 2016
 
Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...Steffen Gebert
 
Software Define Network
Software Define NetworkSoftware Define Network
Software Define NetworkSubith Babu
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsYoram Orzach
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layerSonaliAjankar
 
Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Radhika Hirannaiah
 
An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)Ammad Marwat
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 

What's hot (15)

Features of tcp (part 2) .68
Features of tcp  (part 2) .68Features of tcp  (part 2) .68
Features of tcp (part 2) .68
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Introduzione a Software Define Networking
Introduzione a Software Define NetworkingIntroduzione a Software Define Networking
Introduzione a Software Define Networking
 
Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...Investigating the Impact of Network Topology on the Processing Times of SDN C...
Investigating the Impact of Network Topology on the Processing Times of SDN C...
 
Software Define Network
Software Define NetworkSoftware Define Network
Software Define Network
 
Introduction to TCP
Introduction to TCPIntroduction to TCP
Introduction to TCP
 
Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocols
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
Ch21
Ch21Ch21
Ch21
 
Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1Open Flow Tutorial Series - Set 1
Open Flow Tutorial Series - Set 1
 
An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)An overview of TCP (Transmission Control Protocol)
An overview of TCP (Transmission Control Protocol)
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Telnet
TelnetTelnet
Telnet
 

Similar to Telegram open network development status (january 28, 2019)

Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...VLSICS Design
 
IT guide for Vocollect Voice Systems
IT guide for Vocollect Voice SystemsIT guide for Vocollect Voice Systems
IT guide for Vocollect Voice SystemsBoreal Technologies
 
crosstalk-monitoring
crosstalk-monitoringcrosstalk-monitoring
crosstalk-monitoringCA2009
 
SITE_6_Release_Highlights.pdf
SITE_6_Release_Highlights.pdfSITE_6_Release_Highlights.pdf
SITE_6_Release_Highlights.pdfBirodhShrestha1
 
Introduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control NetworkIntroduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control NetworkDony Riyanto
 
White paper: Software-Defined Networking Matrix Switching
White paper: Software-Defined Networking Matrix SwitchingWhite paper: Software-Defined Networking Matrix Switching
White paper: Software-Defined Networking Matrix SwitchingJoel W. King
 
Internet2: VoIP Phone Codec Testing White Paper
Internet2: VoIP Phone Codec Testing White PaperInternet2: VoIP Phone Codec Testing White Paper
Internet2: VoIP Phone Codec Testing White PaperJoshua Reola
 
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...confluent
 
Media Handling in FreeSWITCH
Media Handling in FreeSWITCHMedia Handling in FreeSWITCH
Media Handling in FreeSWITCHMoises Silva
 
cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...
cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...
cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...SamHoney6
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfssuserc77a341
 
Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Videoguy
 
Webrt integration by altanai bisht
Webrt integration by altanai bishtWebrt integration by altanai bisht
Webrt integration by altanai bishtALTANAI BISHT
 
Evaluating Wavelet Tranforms for Video Conferencing Applications
Evaluating Wavelet Tranforms for Video Conferencing ApplicationsEvaluating Wavelet Tranforms for Video Conferencing Applications
Evaluating Wavelet Tranforms for Video Conferencing ApplicationsVideoguy
 

Similar to Telegram open network development status (january 28, 2019) (20)

Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IT guide for Vocollect Voice Systems
IT guide for Vocollect Voice SystemsIT guide for Vocollect Voice Systems
IT guide for Vocollect Voice Systems
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
crosstalk-monitoring
crosstalk-monitoringcrosstalk-monitoring
crosstalk-monitoring
 
SITE_6_Release_Highlights.pdf
SITE_6_Release_Highlights.pdfSITE_6_Release_Highlights.pdf
SITE_6_Release_Highlights.pdf
 
Vcx 7.1.16c-readme
Vcx 7.1.16c-readmeVcx 7.1.16c-readme
Vcx 7.1.16c-readme
 
Introduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control NetworkIntroduction to BACnet: Building Automation & Control Network
Introduction to BACnet: Building Automation & Control Network
 
White paper: Software-Defined Networking Matrix Switching
White paper: Software-Defined Networking Matrix SwitchingWhite paper: Software-Defined Networking Matrix Switching
White paper: Software-Defined Networking Matrix Switching
 
Internet2: VoIP Phone Codec Testing White Paper
Internet2: VoIP Phone Codec Testing White PaperInternet2: VoIP Phone Codec Testing White Paper
Internet2: VoIP Phone Codec Testing White Paper
 
TR-069_Overview.ppt
TR-069_Overview.pptTR-069_Overview.ppt
TR-069_Overview.ppt
 
APIs at the Edge
APIs at the EdgeAPIs at the Edge
APIs at the Edge
 
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
 
Media Handling in FreeSWITCH
Media Handling in FreeSWITCHMedia Handling in FreeSWITCH
Media Handling in FreeSWITCH
 
Hyper ledger project
Hyper ledger projectHyper ledger project
Hyper ledger project
 
cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...
cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...
cupdf.com_chapter-11-system-level-verification-issues-the-importance-of-verif...
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
 
Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...
 
Webrt integration by altanai bisht
Webrt integration by altanai bishtWebrt integration by altanai bisht
Webrt integration by altanai bisht
 
Evaluating Wavelet Tranforms for Video Conferencing Applications
Evaluating Wavelet Tranforms for Video Conferencing ApplicationsEvaluating Wavelet Tranforms for Video Conferencing Applications
Evaluating Wavelet Tranforms for Video Conferencing Applications
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Telegram open network development status (january 28, 2019)

  • 1. TON Development Status Overall progress towards the test version: 90% January 28, 2019 1. TON Virtual Machine (TVM) TON VM or TVM is the component required for executing smart contracts in the TON Blockchain. Implementation: 95% complete TVM has been fully implemented and internally tested. Minor modifications will likely be necessary during the process of binding TVM with the TON Blockchain block generation and validation software. In addition to TVM itself, a database required for storing on disk and accessing large amounts of TVM data (e.g., smart-contract code and data, old blocks, blockchain state) without loading all of it into memory has been developed. Documentation: 95% complete The current version of TVM is fully described in Telegram Open Network Virtual Machine (September 5, 2018). Minor modifications to the imple- mentation may require corresponding changes in the documentation. 1
  • 2. 2. TON Network The TON Network is the component required for delivering requests (e.g., proposed transactions) and propagating newly-generated TON Blockchain blocks through the network. ADNL (low-level overlay network protocol running over IP networks): 80% complete All functionality required for the test version is complete, including ellip- tic curve cryptography and the node lookup protocol. Some sophisticated options and additional cryptographic options that are not required for the launch of the test version will be implemented later (prior to the final launch). Overlay networks over ADNL: 100% complete Overlay networks are required to build node groups inside the ADNL net- works. For instance, the validators for a shardchain create their separate overlay network to propagate new block candidates and run a TON-specific Byzantine Fault Tolerant (BFT) consensus protocol. Broadcast protocols for overlay networks over ADNL: 100% complete Simple broadcast protocols are used inside overlay networks to propagate small messages, such as the BFT consensus protocol messages, to all members of an overlay network. These protocols are required for the implementation of validator BFT consensus. CATCHAIN protocol: 100% complete The CATCHAIN protocol is a variant of broadcast protocols tailored for im- plementing BFT consensus protocols and for solving similar group consensus tasks in a closed membership overlay network. As such, it is the first step in implementing the validator BFT consensus protocol. Streaming broadcast protocols: 100% complete Streaming broadcast protocols are used to quickly propagate large amounts of data, such as newly-generated TON Blockchain blocks (to all full nodes) and block candidates (to the validators of the corresponding shardchain). Streaming broadcast protocols employed by TON use Forward Error Correc- tion (FEC) protocols as their component. 2
  • 3. 3. TON Blockchain Block Generation and Validation The block generation and validation software relies heavily on TVM and the TON Network to create new block candidates, validate them among the validators, and propagate the signed blocks to all full nodes. Since the work on the TVM and TON Network components listed above is largely complete, the TON Blockchain is now in active development. Documentation: 90% complete The documentation is intended to present a complete description of the masterchain and shardchain block format in the TON Blockchain. The shardchain block description available in Telegram Open Network Blockchain (September 5, 2018), while unchanged in the principal points, will require some minor modifications based on changes that have arisen during the final development phases. Some details of the masterchain blocks, such as the list of all configurable parameters with their respective types, are not fully documented at this time, because they are not completely finalized yet; they will be added to the documentation during the testing phase. Block manipulation library: 95% complete The block manipulation library is intended to store entire blocks and their parts in files, load these data into memory, and access or modify different data structures present in a block. All methods originally intended have been implemented. Some minor modifications may be required during the final stages of validator software development. Validator BFT Consensus protocol: 95% complete The TON-specific Byzantine Fault Tolerant (BFT) consensus protocol is used by validators during block generation to reach agreement on the next block of a shardchain or the masterchain (as applicable). This custom BFT pro- tocol, built upon TON CATCHAIN, has been completely implemented and tested, yielding 2–3 second consensus time for a test network of 100 servers distributed around the world. This is consistent with the five second block generation interval proposed in the TON Whitepaper. Validator software: 60% complete Validator software uses the block manipulation library to generate block can- didates, validate block candidates proposed by other validators, and achieve 3
  • 4. consensus on the next block in a shardchain or the masterchain. It consists of the network component (especially the BFT Consensus protocol) and of the local block generation (collation) and validation component. The network component is almost complete. The local block generation and validation component is currently halfway complete, but most development efforts are currently dedicated to the completion of this component. Full node software: 80% complete A full node of the TON Blockchain is a program that obtains and stores local copies of all or some blocks, and may re-distribute these blocks to other full nodes if required. It is also an important component of the validator software, because validators are (specialized) full nodes as well. The network component and the local storage component of the full node software are currently in active development and nearing their completion. Smart-contract development, test, and debug environment: 50% com- plete A test and debug environment for smart contracts is already implemented and internally tested, along with low-level “TVM assembly” smart-contract language. The compiler from a high-level smart-contract language is 20% complete—its core functionality is ready, but more built-in functions and operations need to be defined. Fundamental and sample smart contracts: 20% complete Some sample smart contracts are prepared in “TVM assembly”. The imple- mentation of fundamental smart contracts—which reside in the masterchain and run crucial tasks such as electing new validators and changing config- urable parameters—requires the availability of the high-level smart-contract compilers and development tools discussed above. However, the launch of a test network with very basic versions of fundamental smart contracts is our top priority. We plan to replace the basic versions of these smart contracts with more sophisticated versions during the testing phase. ** This communication contains forward-looking statements, including state- ments of plans, objectives, expectations, development status and intentions. Any number of factors could cause actual results to differ materially from those contemplated by any forward-looking statements, including but not lim- ited to the risks identified in Appendix B to the Whitepaper ** 4