The core of Bridge Network is controlled by on-chain smart contracts powering the protocol, oracles that broadcast data from one network to another and validators that authenticate transactions on the network. The network is uncontrolled and maintains security by ensuring validators run the same process upon receiving the various chains events. Only when 70% of validators have signed the same transaction with their key collectively, the network achieves consensus.
The Bridge Network protocol consists of three main layers:
- 1.Application Layer - Made up of all the cross-chain toolsAny cross-chain tool can be built on the Bridge Network application layer and plugged into the blockchain and protocol layer. The Application layer supports different kinds of applications like the Bridge-builder, NFT bridge, cross-chain trading, Token bridge and others in the works.
- 2.Blockchain Layer - Contains all Bridge Network(BN) smart contracts for supported blockchains and oracles that act as data relayers.
- 3.Protocol Layer - Combines the blockchain layer with the validators.Every cross-chain transaction initiated through Bridge Network is assigned a unique identifier (hash). Bridge validators track every transaction that passes through the smart contract of the protocol and soon as the transaction achieves its entirety, each validator is required to sign by its private key a unique identifier of the transaction all while the oracle broadcast the data to different networks.