Pi Nodes Explained!


[Music] Hello everybody I am Poorboycrypto and welcome back to my channel. In today’s video I’m going to explain Nodes, specifically PI Nodes, so have a seat and let’s get started. So I’ve made some pictures in a diagram and try to present this in a way that is not too boring. I’ve simplified it as best as I can so it’s a little bit easier to understand this process. I hope this helps anyone who wishes to understand it better or who might be confused. As soon as phase 2 Testnet rolls out around the world Pioneers will be installing Nodes on their PCs and laptops. Eeach Node will be networked and every Node will contain a ledger. Every few seconds the Nodes will come to a consensus and update the ledgers. This confirms / validates transactions by conforming consensus. This will also remove invalid entries. These Ledgers not only contain transactions, but a list of accounts and balances. Nodes will likely have more applications and uses on the PI network using this. Stellar Consensus Protocol or SCP is pretty cool, but how does it remain safe and secure? Simple it uses the Federated Byzantine Agreement or FBA. I know this sounds complicated, but I’ll break it down. To become a validator / Node you’ll have to be added into a valid node quorum slice. Now I know I’m throwing around some complicated terms here, but this can be explained simply. A quorum slice is a group of nodes that an individual Node trusts and added each quorum slice can intersect with other quorum slices allowing the updated ledger to remain secure. By using this system the network remains secure not only from raw computing power but from bad actors trying to infiltrate the PI Network. Now with PI Network, quorum slices will be chosen a little differently using a trust graph. Let’s jump over to the Whitepaper and get an idea of how this will work. I’ve actually jumped over to minepi.com and on the Whitepaper there, you can actually view it inside the app as well if you prefer to watch it there, but I just kind of wanted to go over how the nodes are, how are the quorum slices are selected. All right so I noticed this on my browser, sorry about that… Okay so when picking their quorum slices these Nodes must take into consideration the trust graph provided by the contributors including their own security circle. Now this is kind of interesting because you know that security circle that we formed in our Contributor Team will be taken into account, so I thought that was kind of interesting and I figured I’d pointed out now there are some other factors and they don’t exactly explain how your quorum slices will be selected, however it’s interesting to note that there is a couple of things that are gonna take into consideration here. All right so rank list of nodes ordered by their distance from the current node in the trust graph. All right so a location is important here and then of course ranking lists of nodes based on page rank. Now I’m not sure how a page rank will be ranked, I’m not sure if it to knows how many miners or sorry how many pioneers are on your earning team or if it has to do a thumbs up or if it just has to do with overtime how many people use your node and are able to use it successfully. Alright so you know it’s something to consider right and then you know a list of bulky Nodes so you know if any Nodes are you know redoing bad reports and are continuously rejected then you know this will have something to do with it and then of course you know if you are listed as a bad Node or misbehaving node on any web site or you know that type of thing you know this will take you to account that as well and then I’m not sure what this is but I actually wanted to take you into this to kind of show you something. It’s a lot better than the kind of rinky-dinky pictures I had earlier This one shows you, this is kind of kind of making my eyes a little bit happy here but as you can see this is something what the PI network knows would look like a more accurate representation than what I was doing earlier. Now you see there’s a couple red ones and if you zoom in they’re not connected alright so if you come over here you can see these ones that are up higher on the rank list they are more connected and they’re kind of on their inner circle there so this is really cool as you can see you know there’s only a few dozen on here and with the PI Network they’re hoping to have tens and tens of thousands possibly hundreds of thousands of Nodes so it’s really cool to see a representation of what that would look like here. All right you know that’s just a little bit of my inner nerd speaking there, so anyways one more thing I kind of want to go over with here too is just right here and I wanted you to read that over quickly how it works. All right so when a pioneer needs to confirm that a given transaction needs to be executed at that point the mobile app connects to one or more nodes to inquire if the transaction has to be recorded on the ledger and also to get back the most recent block number and a hash value of the block. All right if that pioneer is running a Node it would connect to that pioneers own Node, if he is not then the app connects to multiple Nodes to cross-check this information. Pioneers will have the ability to set nodes which they want to connect to, but to make it simple for most users the app should have a reasonable default set of Nodes so you know that that explains how that phone will work with the Nodes. All right so our phones will actually sort of be part of the system. Well I hope you understand how the PI Nodes will work a little bit better. There are a couple more things I’d like to go over with you just a couple notes to note about the Node. Alright, so on the stellar network the nodes are actually run by companies and institutions however on the PI network we will run the Nodes and we will create a secure Network. The larger amount of nodes on the network is directly relative to how secure the network is. And now this next part, I’m actually, I actually don’t have the exact requirements at this point however I’m going to put it on the background as soon as I get that information an average PC and laptop will be able to run a node it will require a reasonable amount of this space and again I’ll put those exact requirements on the background as soon as it comes to me, so you will be seeing that on a later then when the video is released. All right let’s move on. This SCP system takes just seconds to confirm transactions, between 3 & 5, so this is very fast. This SCP can’t be compromised by any known computing power, so to compromise something like this you would essentially have to break into each computer and I’m not sure exactly how Pi will work, but you would need to get their password or their key for their Node which is an extremely complicated process and no single computer can actually do that yet. Alright, so next part I want to get to is Testnet or Phase 2 may not be available to everyone. All right, so if it’s not available to you when it comes out, wait patiently and you’ll know in your due time you will get it available to you and then you can go on from there. Alright folks that’s about it. I hope I’ve helped you understand Nodes a little bit better and if you like my PI content, I have lots of it lots of other videos so, please like, subscribe. Additionally I have other content pertaining to earning other Cryptos in my YouTube channel, so if that’s something that interests you please check those out as well. Until next time. Get mining! [Music]

0 thoughts on “Pi Nodes Explained!”

Leave a Reply

Your email address will not be published. Required fields are marked *