It is why I'm calling it a suicide attempt, you are sicking consensus in a mysterious undiscovered environment:
when you rush in reply, your comment becomes inaccurate - Haj_Ali_Agha [it was Persian
]
what you call it mysterious undiscovered environment is a formal ring topology in computer networking with its own advantages/disadvantages that suits it for PoC's decentralization approach. from wikipedia: (
https://en.wikipedia.org/wiki/Ring_network )
"Rings can be unidirectional, with all traffic traveling either clockwise or anticlockwise around the ring, or bidirectional. Because a unidirectional ring topology provides only one pathway between any two nodes, unidirectional ring networks may be disrupted by the failure of a single link. A node failure or cable break might isolate every node attached to the ring. In response, some ring networks add a "counter-rotating ring" (C-Ring) to form a redundant topology: in the event of a break, data are wrapped back onto the complementary ring before reaching the end of the cable, maintaining a path to every node along the resulting C-Ring."
so we use the unidirectional mode of ring in PoC and in the case of any mismatch inside data packets (failure), the initial isomorphic shape transforms into a non-isomorphic shape, which works as a virtual C-Ring inside a real star format of internet among nodes:
"..also known as IBM token ring networks - avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a media access unit (MAU) to imitate a ring at the datalink layer."
and look at the advantages part of ring topology:
~ Very orderly network where every device has access to the token and the opportunity to transmit
~
Does not require a central node to manage the connectivity between the computers~ Point to point line configuration makes it easy to identify and isolate faults.
~ Reconfiguration for line faults of bidirectional rings can be very fast
and while as a disadvantage we have : "One malfunctioning workstation can create problems for the entire network. This can be solved by using a dual ring or a switch that closes off the break." we could use this limited amount of fault tolerance as an immediate traitor detection inside the ring.
1- It is not possible to arrange nodes in this weird topology! How would nodes join/back-off?
just like Ring networks that work with MAC addresses, the PoC works with "Wallet Address" of nodes inside the ring. as we wrote inside document, nodes that hold per-mined transactions (HolderNodes) begin broadcasting their (Wallet Address + IP + Listening Port + [Wallet Addresses of Miners that they hold their jobs including their hash value of their End-of-File] ) and
sync them inside a storage unit sorted by Miners Wallet Address[/u], just like classic mempool (lets call it RingPool) does in PoW. therfore, each HolderNodes will understand its next HolderNode to communicate. with this simple use of ring topology in computer networking, we could build a virtual ring and nodes must follow its rules. any misbehavior of nodes will immediately detect and runs its related procedure.
based on the EOF hash value in RingPool, all HolderNodes must fill their dedicated space for the incoming pre-mined transactions that they will receive from the ring. if not, they could directly call the absent node (the non-isomorphic phase).
2- It is absolutely necessary to follow Butterin's proposal for this schema, nodes should sign the message one by another to prove consensus otherwise who decides about whether a block has enough votes?
no, no. look.. all nodes could access the RingPool and see the situation. when finally after several round of data circulation in virtual ring, each HolderNode will generate its RNOG (the final hash root of the block), so other nodes could see any early forks of candidate blocks. if they all do not generate a same hash value, then nodes understand there is a fork situation inside the ring and need to check the submitted process of miners' Dither Hash Value to evaluate the results and understand the winner block. refer to the whitepaper, each miner entity need to submit its Dither Hash Value to the built-in pool system of PoC to get its transaction fee - this will consider as the miners vote too.
while "the longer chain is the valid one" law of PoW is banned in PoC, under heaviest attack to the network, the attackers only could postpone the process of other transactions - for a while, nothing more. legitimate pre-mined transactions will move to the next ring and this time attackers for another delay need to generate MORE extra illegitimate transactions to postpone the process again. generating illegitimate transactions need to spend Power for mining and Network fee of PoC (that wipes out in the process).. really no incentives exist here.
anyways the protocol enforces the miners to submit their Dither Hash Value, but this would be a good idea to ask miners (not all nodes) to sign their approved block hash too. miners with more submitted pre-mined transactions in the current round have more power in voting, so when 51% of votes goes for a block hash value, the winner block will identified by the protocol.
3- For a message/block being circulating and getting signed in the ring there should be a time frame to avoid orphans getting into blockchain too. Again like what Butterin has suggested.
no, look, you know that one-time-passwords algorithms work both in time-based and counter-based modes. just like that, the PoW works in time-based mode, and PoC in counter-based mode, which means once you don't have enough time for block creation, this simply postpones the counter and buys another time frame for the delayed process. of cource there will be a timeout limit for miners to submit their Dither Hash Value (votes), otherwise the protocol ignores them for the round and do not renew the delay. HolderNodes act as a buffer in this situation.
but, I need to remind you that - refer to the whitepaper - in PoC we also have a reward fee for ALL nodes, if their wallet address matches to the hash value of a winner block. Winner nodes also need to submit and claim their reward too, but I think their votes should not consider in identifying the new block (still thinking about it). I only use miner's vote here to simulate the effect of classic PoW on miners incentives.
and with competition people go selfish and try to put their own minted blocks in the chain
there is no reward / benefit in putting mined transactions in the chain and ban others! as you know, in PoC disk space should be wide and the protocol is allowed to put as much transaction as it needs inside the new block..
I am really going to kill the time, space and bandwidth - but save ENERGY for the planet