Some of the information present in this page might not apply to private and purpose-built iterations of the PHI Smart Chain protocol. PHI Network features 3 base layers: Core Layer (previously known as Layer Zero), Bridging Layer (previously known as Layer One), and Execution Layer (previously known as Layer Two). It also leverages a Subnet Layer on top of its Execution Layer, which allows for further scaling and broadening of the network's applications in the future, including purpose-built networks for enterprises, governmental, or public usage. Each one of these layers play a key role on securing the network and allowing participants to interact with it. Validators make up the entirety of the Execution Layer, and aside from compliance checks, they need to consign PHI 625,000 to be granted a validator key.
PHI Network currently leverages on 2 publicly accessible ledgers, that participants can use to connect and interact with the network on a trust-less and decentralized environment. These ledgers were initially deployed by PHI Labs, but are maintained by validators spread across the globe to ensure decentralization, security, and mitigate tampering of the network's state.
PL1: PHI Smart Chain
Used as PHI Network's mainnet, it leverages PHI as its native currency, and can be used by individuals, institutions, governments, and enterprises to develop, deploy, and maintain trustless and unstoppable applications.
Enterprise, Governmental, and Private Applications
Our technology can be used to deploy private infrastructure, that can further bolster productivity and allow for better and trustless workflow for individuals, governments, and enterprises. PHI Network. is constantly updating and upgrading its enterprise-level suite of applications, that like no other mainstream platforms, allow for setup and deployment of a private production-grade blockchain in less than one minute.
PHI Network is built to be scalable and future proof. Its multilayering mechanism allows for further development on top of its Execution Layer, making possible the implementation of subnets using different consensus mechanisms. This enables massive scaling potential without compromising the core security and decentralization elements of the core network.
As the name suggests, this is the core layer of the network, and it's comprised by several Core Layer Nodes. Each one of these nodes stores a complete history of the network, and can also act as a Validator in case of major problem or even complete failure of the Execution and Bridging layers. It guarantees that the network is unstoppable and resilient.
The bridging layer is comprised by an array of nodes acting as active bridges between the Execution Layer and the Core Layer. All transactions submitted to an Execution Layer node passes through a Bridging Layer node, which then broadcasts it to a Core Layer node, that permanently records and seals the information into the network's history book, or ledger. This mechanism allows easy mitigation of attacks, or tampering attempts from any Execution Layer nodes by breaking the link between the attacking node and the main network ledger. In these cases a fork with the tampered records is created and disconnected away, instead of it being sealed and recorded as a legitimate part of the main public ledger.
It is comprised by the Validator Nodes, which are used to seal new network blocks, as well as to allow connection and communication with the network via public or private RPCs.
Built on top of the execution layer, Subnet Layer nodes allow for seamless future implementation of scaling solutions, including purpose-built public subnet ledgers and private or public third-party blockchains or DAGs.