Glossary and Abbreviations
An account consists of a unique identifier / address, an amount of tokens referred to as balance and possibly some additional properties used in other parts of the blockchain application.
Addresses are unique identifiers for accounts in the Lisk blockchain.
They are the 20-byte hash value of the public key that controls the account initially.
In all front-end products, addresses are displayed in a human-readable representation called [Lisk32-representation].
An example for an address in Lisk32 presentation is
When referring to addresses in Lisk, we always assume the Lisk32 representation, without explicitly having to mention it.
In the Lisk protocol and SDK only the 20 byte value is stored for efficiency and sometimes the hexadecimal representation of the address is used.
Further details regarding other address representations can be seen here in the table for different data types on the schema reference page.
An active delegate can mostly be considered as a forging delegate, who is able to forge new blocks for the Lisk blockchain. Rank 1-101.
The Advanced Encryption Standard (AES), has a key length of 256 bits and is a block cipher adopted as an encryption standard by the U.S. government for military and government use. CBC (Cipher Blocker Chaining), is an advanced form of block cipher encryption. A detailed description of how AES functions can be found here.
BCH codes are error-correcting codes. The Bose, Chaudhuri and Hocquenghem (BCH) codes form a large class of powerful random error-correcting cyclic codes.
A Beddow is the smallest unit of a LSK token. 100 million Beddows is equal to 1 LSK.
In a system whereby components need to come to an agreement to reach consensus, byzantine failures will prevent those components from reaching an agreement, (usually caused by errors that are hard to detect). A Byzantine Fault Tolerant system ensures that measures are taken to manage such failures.
A Bitcoin Improvement Proposal (BIP), can be defined as a standard for proposing changes to the Bitcoin protocol. For example, BIP39 is one of many bitcoin improvement proposals. In this particular proposal it describes the mnemonic code or mnemonic sentence implementation, and how to create a human readable mnemonic sentence including how to convert that mnemonic into a seed.
A content delivery network, or content distribution network, is a geographically distributed network of proxy servers and their data centers.
Cross Origin Resource Sharing is a protocol that enables scripts running on a browser client to interact with resources from a different origin.
CRUD refers to the four functions that are considered necessary to implement a persistent storage application, namely create, read, update and delete.
Accounts can vote for delegates by sending a delegate vote transaction. The tokens used to vote for delegates will be locked, although the locked tokens can be unlocked again if required, by unvoting the delegate again. The weight of a delegate will determine the sum of all votes for this delegate. To maintain a secure and effective setup, the delegate weight is bound to 10 times the self-votes.
A blockchain network for development purposes. The Lisk SDK provides dedicated genesis block and configurations to conveniently set up a local Devnet during development of a blockchain application.
The Dynamic Host Configuration Protocol can be defined as a client/server protocol that automatically provides a host with its IP address. This also includes additional related configuration information such as the default gateway and the subnet mask.
DPoS is the mechanism of determining eligible block creators achieved by voting for registered delegate accounts, which are then able to create blocks depending on their vote weight. It is part of the consensus algorithm of a blockchain and used on Lisk Mainnet and in the Lisk SDK.
Ed25519 is a public-key signature system with several attractive features: Fast single-signature verification. Ed25519 signatures are elliptic-curve signatures, carefully engineered at several levels of design and implementation to achieve very high speeds without compromising security.
FireHOL is a shell script designed as a wrapper for iptables written in order to ease the customization of the Linux kernel’s firewall netfilter. FireHOL does not have a graphical user interface, but is configured through a user-friendly and easy to understand plain text configuration file.
A fork can basically be defined as an occurrence of a blockchain diverging into two forward paths in the network. In other words it is whereby an alternative version of the blockchain is created by generating two blocks on different parts of the network simultaneously. For further detailed information regarding forking in the Lisk network, see the following Lisk Mainnet hard fork process description in the Lisk Mainnet Regenesis page
The genesis block describes the very first block in the blockchain. It defines the initial state of the blockchain on start of the network. A genesis block must be given to the application, and all networks should have a different genesis block.
The hash onion stores the random seeds of the delegate and is required for each forging round, this can be generated by the Lisk Commander. More details can be found in the enable forging section.
The Internet of Things refers to a wide variety of physical ''things'' or objects that are embedded with some form of technology, i.e. software and sensors to enable connection possibilities with other systems and devices over the Internet.
Inter process communication is defined as a set of programming interfaces allowing programmers to coordinate activities between various program processes that can run simultaneously.
Internet Protocol version 4 is the fourth version of the Internet Protocol. An example of an IPv4 address is shown here: 198.51.100.1
A light dependent resistor is a passive component, whereby when it is exposed to light the internal resistance changes according to the light intensity that falls upon it. Hence, they are deployed in light sensing circuits.
A LIP is a document usually structured by the research team defining technical changes in the Lisk protocol. In addition, it can also cover an implementation or a non technical process surrounding Lisk. Furthermore, a LIP also describes the requirements, rationale and motivation for the required changes.
The Lisk32 representation of [account-addresses] starts with the letters "lsk" followed by a custom Base32 encoding of the 20 bytes of the address appended with a BCH checksum. The checksum is used to check for small errors in the address. Any errors in up to 4 characters are guaranteed to be detected and errors in more than 5 characters are likely to be detected. The choice of the Lisk32 representation of addresses does not modify the address, but is introduced to provide a safer and more pleasant experience to users.
This transaction is only part of Lisk Core and not the Lisk SDK. A LSK reclaim transaction type on the Mainnet converts a previously non-initialized legacy account’s address to the new address system. This is required because the public key is required to convert from the old address system to the new address system. Non-initialized accounts don’t have a public key associated with them yet.
A transaction type on all networks based on the Lisk protocol which registers a multisignature group. This transaction registers the sender account as a multisignature group account.
A blockchain application built with the Lisk SDK, e.g. Lisk Core, which is connected to other nodes. Together, they form a blockchain network. Nodes fulfill many important roles in the network, like synchronising new events in the network between each other, adding new blocks to the blockchain, and providing APIs for external services in order to communicate with the network.
A nonce is an abbreviation for "number only used once" and is a random number that can only be used one time. In the Lisk network it can be defined as an integer that represents for the number of outgoing transactions of an account. For a transaction to be valid, transaction nonce has to be equal to the nonce stored in the sender account. If due to network congestion, a transaction was not included in a block because its fee was too low, a user can broadcast a new transaction using the same nonce value but with a higher fee. Once one of the two transactions is included in the blockchain, the other one becomes invalid as the nonce has already been used.
A set of 12 words used to access an Account.
PBKDF2 can be defined as key derivation functions with a sliding computational cost, in order to reduce vulnerabilities to brute force attacks.
Proof of Stake is a type of consensus mechanism used to achieve agreement over a distributed network.
With PoS the consensus is determined based upon the stake of each user in the network.
With PoS users are required to stake their tokens in order to become a validator in the network. Validators are responsible for ordering transactions and creating new blocks, so that all nodes are able to agree on the current state of the network.
Proof of Work is a type of consensus mechanism used to achieve agreement over a distributed network. With PoW in order to complete the transactions on a given network, the miners have to solve complex mathematical problems in order to be rewarded with the tokens. In a nutshell, the PoW consensus algorithm is used to confirm transactions and produce new blocks to the chain. The miners have to compete against each other to complete transactions on the network to receive their rewards. Hence, the PoW mechanism allows consensus to be reached whilst simultaneously maintaining the network security.
A proposed new version of Lisk Core for the testnet.
A release candidate can be described as a software build released internally for testing purposes and not usually for production deployment. It is also defined as a version of the software, which should be functional but not necessarily ready to be released.
REST refers to the Representational State Transfer, which is a client-server, stateless, cacheable communications protocol. In the majority of cases HTTP is used.
RocksDB is a high performance embedded database. An embedded persistent key value store for fast storage.
RPC is a request–response protocol. An RPC is initiated by the client, which sends a request message to a known remote server to execute a specified procedure with supplied parameters. The remote server sends a response to the client, and the application continues its process.
The set of tools that allow you to build blockchain applications replicating Lisk’s technology stack and architecture.
Semantic versioning (also referred as SemVer), is a versioning system that provides a universal way of versioning software development projects in order to track changes and updates, such as plugins, add-ons, libraries and extensions.
Further details regarding SemVer can be found here.
The SHA is a 256 bit algorithm designed for cryptographic security.
A standby delegate, as each delegate is not an Active Delegate. Rank 102-∞.
TLS is the transport layer security. The application-layer protocol negotiation is a transport layer security extension that allows the application layer to negotiate over a secure connection which protocol should be performed. This occurs in a manner that avoids additional round trips and which is independent of the application-layer protocols.
A token refers to LSK or any sidechain token. A digital token is designated to a cryptocurrency that is built on top of an existing blockchain, and represents a particular tradable and fungible asset.
An interaction with the Lisk blockchain which permanently writes data to it. A transaction can have multiple purposes, e.g. a balance transfer or a delegate registration.
A transaction type which transfers tokens from one account to another one. A token transfer transaction will transfer the amount of tokens specified in the amount property, from the sender of the transaction to the specified recipient.
A custom message you can attach to a Token transfer.
UTF-8 is a variable width encoding system which enables the translation of any unicode charater to a matching binary string.
A URL is a reference to a web resource and possesses a mechanism for retrieving the web site specified in the URL.
Wallets can be broken down into three distinct categories: Software, Hardware, and Paper wallets. Software wallets can be defined as either desktop, mobile or online.
In short a wallet will store the public and private keys and can interface with various blockchains, enabling the users to monitor their balance, send tokens and conduct other operations.
A Lisk wallet is available on both Lisk Desktop and Lisk Mobile. They are actively maintained and provide the most secure and easiest way to access the users LSK tokens.