What is AVAX?

About AVAX

Consensus

์•„๋ฐœ๋ž€์ฒด์˜ ๊ณต์‹ ๋ฌธ์„œ์—์„œ๋Š” Layer 1 ๋ธ”๋ก์ฒด์ธ์ค‘ ๊ฐ€์žฅ ๋น ๋ฅธ ํ•ฉ์˜ ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ์‚ฌ์šฉ์ค‘์ด๋ผ๊ณ  ๋งํ•œ๋‹ค.

ํ•ฉ์˜ ๋ฉ”์ปค๋‹ˆ์ฆ˜์ด ์–ด๋–ป๊ฒŒ ๋˜๋Š”์ง€ ์•Œ์•„๋ณด์ž.

์•„๋ฐœ๋ž€์ฒด ๊ณต์‹ ๋ฌธ์„œ์—์„œ ์ž๋ž‘ํ•˜๋Š” ์•„๋ฐœ๋ž€์ฒด ํ•ฉ์˜์˜ ๋„ค ๊ฐ€์ง€ ๊ธฐ๋Šฅ.

  • Speed: Avalanche consensus provides sub-second, immutable finality, ensuring that transactions are quickly confirmed and irreversible.

  • Scalability: Avalanche consensus enables high network throughput while ensuring low latency.

  • Energy Efficiency: Unlike other popular consensus protocols, participation in Avalanche consensus is neither computationally intensive nor expensive.

  • Adaptive Security: Avalanche consensus is designed to resist various attacks, including sybil attacks, distributed denial-of-service (DDoS) attacks, and collusion attacks. Its probabilistic nature ensures that the consensus outcome converges to the desired state, even when the network is under attack.

Avalanche ๊ณ„์—ด์˜ ํ•ฉ์˜ ํ”„๋กœํ† ์ฝœ์€ ๋ฐ˜๋ณต์ ์ธ ํ•˜์œ„ ์ƒ˜ํ”Œ๋ง ํˆฌํ‘œ๋ฅผ ํ†ตํ•ด ์ž‘๋™ํ•œ๋‹ค.

๋…ธ๋“œ๊ฐ€ ๊ฑฐ๋ž˜๋ฅผ ์ˆ˜๋ฝํ•ด์•ผ ํ•˜๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ ๊ฒฐ์ •ํ•  ๋•Œ ์†Œ์ˆ˜์˜ ๋ฌด์ž‘์œ„ ํ•˜์œ„ ์ง‘ํ•ฉ ๊ฒ€์ฆ์ธ ๋…ธ๋“œ์—๊ฒŒ "์„ ํ˜ธ ์‚ฌํ•ญ"์„ ์งˆ์˜ํ•œ๋‹ค.

์•„๋ฐœ๋ž€์ฒด ํ•ฉ์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ž‘๋™ ์›๋ฆฌ๋ฅผ ์˜ˆ๋กœ ๋“ค์–ด๋ณด์ž.

์–ด๋–ค ์—ฐ์˜ˆ์ธ์ด ์Šค์บ”๋“ค ์ด์Šˆ๊ฐ€ ์žˆ์„ ๋•Œ, ์šฐ๋ฆฌ๋Š” ํ•ด๋‹น ์ด์Šˆ๋ฅผ ์‹ ๋ขฐํ•˜๊ฑฐ๋‚˜ ์‹ ๋ขฐํ•˜์ง€ ์•Š๋Š” ๋‘ ๊ฐ€์ง€ ์„ ํƒ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค.

๋งŒ์•ฝ ์นœ๊ตฌ๊ฐ€ ์ด ์ด์Šˆ๊ฐ€ ์‚ฌ์‹ค์ด๋ผ๊ณ  ์ด์•ผ๊ธฐํ•ด์ค€๋‹ค๋ฉด ์ด ์Šค์บ”๋“ค์„ ์‹ ๋ขฐํ•˜๋Š” ๊ฒฝํ–ฅ์ด ๋†’๋‹ค.

์ ์  ๋” ๋งŽ์€ ์‚ฌ๋žŒ๋“ค์ด ์‚ฌ์‹ค์ด๋ผ๋Š” ๋‹ต์„ ์„ ํƒ ํ• ์ˆ˜๋ก ์Šค์บ”๋“ค ์ด์Šˆ์— ์ง‘์ค‘ํ•˜๋Š” ์‚ฌ๋žŒ๋“ค์€ ์ ์ฐจ์ ์œผ๋กœ ํ•ฉ์˜์— ๋„๋‹ฌํ•  ๊ฒƒ์ด๋‹ค.

์ฆ‰, ๋…ธ๋“œ ๊ฐ„์˜ ์ƒํ˜ธ ๊ฒ€์ฆ์ด ์ด๋ฃจ์–ด์งˆ ๋•Œ ์‹œ์Šคํ…œ์€ ๋‹ค๋ฅธ ๋…ธ๋“œ๋ฅผ ๋ฌด์ž‘์œ„๋กœ ์„ ํƒํ•˜์—ฌ ๊ฒ€์ฆ์„ ํ•œ๋‹ค.

์ด๋Ÿฌํ•œ ๊ฒ€์ฆ์€ ๋…ธ๋“œ ๊ฐ„์˜ ์ตœ์ข… ํ•ฉ์˜์— ๋„๋‹ฌํ•  ๋•Œ๊นŒ์ง€ ์—ฌ๋Ÿฌ ๋ฒˆ ๋ฐ˜๋ณต๋œ๋‹ค.

์ด ์‹œ์Šคํ…œ์—์„œ๋Š” ์ •ํ™•ํžˆ ์ ˆ๋ฐ˜์ด ์‹ ๋ขฐ๋ฅผ ์„ ํƒํ•˜๊ณ  ์ ˆ๋ฐ˜์ด ์‹ ๋ขฐํ•˜์ง€ ์•Š๊ธฐ๋กœ ์„ ํƒํ•˜๋Š” ๊ฐ€์žฅ ๋ชจ์ˆœ๋œ ์ƒํ™ฉ์—์„œ๋„ ๋ฌด์ž‘์œ„ ์ƒ˜ํ”Œ๋ง๊ณผ ์—ฐ์† ํˆฌํ‘œ๋ฅผ ํ†ตํ•ด ๋น ๋ฅธ ์‹œ๊ฐ„ ๋‚ด ํ•œ ์ชฝ์ด ์••๋„์ ์œผ๋กœ ์šฐ์„ธํ•˜๊ฒŒ ๋งŒ๋“ค ์ˆ˜ ์žˆ๋‹ค.

์ด๊ฒƒ์€ Gossip protocol ๊ณผ ๋‹ฎ์•„ ์žˆ๋‹ค.

Multichain

Avalanche๋Š” ๋‹ค์ค‘ ์ฒด์ธ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ํŠน์ง•์œผ๋กœ ํ•˜๋Š”๋ฐ, ๊ฐ๊ฐ ๋„คํŠธ์›Œํฌ ๋‚ด์—๋Š” ํŠน์ • ์ž‘์—…์— ์ตœ์ ํ™”๋œ 3๊ฐœ์˜ ํ•ต์‹ฌ ๋ธ”๋ก์ฒด์ธ์œผ๋กœ ๊ตฌ์„ฑ๋˜์—ˆ๋‹ค.

Avalanche

๊ธฐ๋ณธ ๋„คํŠธ์›Œํฌ์˜ ๋ชจ๋“  ๊ฒ€์ฆ์ž๋Š” ๋‹ค์Œ์„ ๊ฒ€์ฆํ•˜๊ณ  ๋ณดํ˜ธํ•ด์•ผ ํ•œ๋‹ค.

C-Chain

C-Chain ์€ EVM ๋„คํŠธ์›Œํฌ๋ฅผ ๊ตฌํ˜„ํ•œ ๊ฒƒ์ด๋‹ค. C-Chain ์€ Geth ์˜ API ๋ฅผ ์ง€์›ํ•˜๊ณ  Solidity ๋กœ ์ž‘์„ฑ๋œ ์Šค๋งˆํŠธ ์ปจํŠธ๋ž™ํŠธ์˜ ๋ฐฐํฌ ๋ฐ ์‹คํ–‰์„ ์ง€์›ํ•œ๋‹ค.

P-Chain

P-Chain ์€ ๋ชจ๋“  ๊ฒ€์ฆ์ธ ๋ฐ ์„œ๋ธŒ๋„ท ์ˆ˜์ค€์˜ ์ž‘์—…์„ ๋‹ด๋‹นํ•œ๋‹ค.

์ƒˆ๋กœ์šด ๋ธ”๋ก์ฒด์ธ ๋ฐ ์„œ๋ธŒ๋„ท ์ƒ์„ฑ, ์„œ๋ธŒ๋„ท์— ์œ ํšจ์„ฑ ๊ฒ€์‚ฌ๊ธฐ ์ถ”๊ฐ€, ์Šคํ…Œ์ดํ‚น ๋“ฑ ํ”Œ๋žซํผ ์ˆ˜์ค€์˜ ์ž‘์—…์„ ์ง€์›ํ•œ๋‹ค.

X-Chain

X-Chain ์€ Avalanche Native Tokens ์˜ ์šด์˜์„ ๋‹ด๋‹นํ•œ๋‹ค.

Subnet

์„œ๋ธŒ๋„ท ๋˜๋Š” ์„œ๋ธŒ๋„คํŠธ์›Œํฌ๋Š” P-Chain์— ๊ตฌ์ถ•๋œ ๋งž์ถคํ˜• ์ฒด์ธ์˜ ์œ ํšจ์„ฑ์„ ๊ฒ€์‚ฌํ•˜๋Š” ๋ฐ ์ฐธ์—ฌํ•˜๋Š” Avalanche์˜ ๊ธฐ๋ณธ ๋„คํŠธ์›Œํฌ ๋‚ด์˜ ๋…ธ๋“œ ๊ทธ๋ฃน์ด๋‹ค.

๊ฐ ์‚ฌ์šฉ์ž ์ •์˜ ์ฒด์ธ์€ ํ•˜๋‚˜์˜ ์„œ๋ธŒ๋„ท์— ์˜ํ•ด ๊ฒ€์ฆ๋˜๋ฉฐ ๊ฐ ์„œ๋ธŒ๋„ท์€ ์—ฌ๋Ÿฌ ์‚ฌ์šฉ์ž ์ •์˜ ์ฒด์ธ์„ ๊ฒ€์ฆํ•  ์ˆ˜ ์žˆ๋‹ค.

๋˜ํ•œ ๊ฐ ๋…ธ๋“œ๋Š” ์—ฌ๋Ÿฌ ๋‹ค๋ฅธ ์„œ๋ธŒ๋„ท์— ์ฐธ์—ฌํ•  ์ˆ˜ ์žˆ๋‹ค.

์„œ๋ธŒ๋„ท์€ Primary ๋„คํŠธ์›Œํฌ์˜ ๊ฒ€์ฆ์ž๋“ค(validators)๋กœ ๊ตฌ์„ฑ๋˜์ง€๋งŒ ๊ฐ ์„œ๋ธŒ๋„ท์€ ์ž์œจ์„ฑ์„ ๊ฐ–๋Š”๋‹ค.

๊ฐ๊ฐ์˜ ์„œ๋ธŒ๋„ท๋“ค์€ ์ž์ฒด์ ์ธ ์‹คํ–‰ ๋…ผ๋ฆฌ, ์š”๊ธˆ ๊ตฌ์กฐ, ์ƒํƒœ, ๋„คํŠธ์›Œํฌ ๋ฐ ๋ณด์•ˆ์„ ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋‹ค.

์„œ๋ธŒ๋„ท์€ ๊ธฐ๋ณธ ๋„คํŠธ์›Œํฌ์—์„œ ํŠธ๋ž˜ํ”ฝ์„ ๊ฒฉ๋ฆฌํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋˜๋ฉฐ ๋‚ฎ์€ ๋Œ€๊ธฐ ์‹œ๊ฐ„, ๋†’์€ TPS ๋ฐ ๋‚ฎ์€ ํŠธ๋žœ์žญ์…˜ ๋น„์šฉ์„ ์œ ์ง€ํ•˜๋ฉด์„œ ๋„คํŠธ์›Œํฌ๋ฅผ ํ™•์žฅํ•  ์ˆ˜ ์žˆ๋‹ค.

์„œ๋ธŒ๋„ท์˜ ๋ชจ๋“  ๊ฒ€์ฆ์ž๋Š” ๊ธฐ๋ณธ ๋„คํŠธ์›Œํฌ๋„ ๊ฒ€์ฆ ํ•ด์•ผ ํ•œ๋‹ค.

์„œ๋ธŒ๋„ท๊ณผ C-Chain ์— Dapp ์„ ์˜ฌ๋ฆฌ๋Š” ๊ฒƒ์„ ๋น„๊ตํ•œ ์ž๋ฃŒ๊ฐ€ ์žˆ์–ด ํผ์™”๋‹ค.

์ฐธ์—ฌ ๊ฒ€์ฆ์ž๋Š” ํŠน์ • ํ•˜๋“œ์›จ์–ด ์š”๊ตฌ ์‚ฌํ•ญ์ด ์žˆ๊ฑฐ๋‚˜ ํŠน์ • ์œ„์น˜์— ์žˆ๊ฑฐ๋‚˜ KYC/AML ํ™•์ธ์ด ์žˆ์–ด์•ผ ํ•œ๋‹ค.

ํŠน์ • ๊ฒ€์ฆ์ž๋งŒ ๊ฐ€์ž…ํ•  ์ˆ˜ ์žˆ๋„๋ก ์„œ๋ธŒ๋„ท์„ ์‚ฌ์šฉ์ž ์ง€์ •ํ•  ์ˆ˜ ์žˆ๋‹ค.

๊ฐ ์กฐ์ง๋“ค์€ ๋ธ”๋ก์ฒด์ธ์˜ ์ฝ˜ํ…์ธ ๊ฐ€ ๊ฒ€์ฆ์ž๋งŒ ๋ณผ ์ˆ˜ ์žˆ๋Š” ํ”„๋ผ์ด๋น— ์„œ๋ธŒ๋„ท์„ ๋งŒ๋“ค ์ˆ˜ ์žˆ๋‹ค.

๊ฐœ๋ฐœ์ž๋Š” ์ƒˆ๋กœ์šด ํ•˜์œ„ ์ง‘ํ•ฉ์„ ๋งŒ๋“ค๊ฑฐ๋‚˜ ๊ธฐ์กด ํ•˜์œ„ ์ง‘ํ•ฉ์— ๊ฐ€์ž…ํ•˜๊ธฐ ์œ„ํ•ด $AVAX๋กœ ์š”๊ธˆ์„ ์ง€๋ถˆํ•œ๋‹ค.

Sources

Last updated