2023-05-22 11:53:23 +01:00

3.0 KiB

title
Protocols

Waku takes a modular approach, providing a range of protocols that enable applications to control the trade-offs involved in the Anonymity Trilemma. This flexibility empowers applications to make informed choices regarding the desired balance between anonymity, scalability, and latency. Here are the main protocols provided by Waku:

Relay

The Relay protocol employs a Pub/Sub architecture to facilitate message routing among peers. It extends the libp2p GossipSub protocol to create a privacy-focused peer-to-peer messaging protocol that enables secure communication channels, encryption, and protection against censorship.

Filter

The Filter protocol allows light nodes to selectively subscribe to specific messages transmitted by other peers. It is designed to be a lightweight alternative to the Relay protocol, particularly tailored for devices with limited bandwidth.

Store

The Store protocol is responsible for storing messages relayed on the network, making it possible to query and retrieve them later. This functionality benefits offline peers by enabling them to retrieve missed messages upon reconnection.

:::info Using Relay and Filter protocols is recommended when a node is online, as Store does not guarantee data availability. The Store protocol is suitable for retrieving messages when connecting to the network, like when a dApp starts. :::

Light Push

Light Push is a Request/Reply protocol for nodes with limited bandwidth and short connection windows. It allows a client to receive an acknowledgment when sending messages, indicating that at least one peer has received them.

:::info While the Light Push protocol acknowledges the receipt by the remote peer, it does not guarantee network-wide propagation. :::

Message

Message specifies the message structure used in the Waku network. It defines metadata fields, such as content topics and timestamps, that other protocols can use.

Payload

Payload provides guidelines for implementing secure and private communication in the network. It covers encryption, decryption, and signing methods for message payloads, focusing on confidentiality, authenticity, integrity, and unlinkability.

RLN Relay

The RLN Relay protocol extends the Relay protocol by adding spam protection using Rate Limiting Nullifiers (RLN). It enforces a global messaging rate for all peers to prevent spam in the Waku network. Spammers face financial penalties and removal from the system. This protocol provides efficient and economic spam prevention suitable for resource-constrained environments.