System Architecture
ComputeNet is built on a modular architecture where each component can evolve independently while preserving protocol interoperability.
High-Level Architecture
The protocol consists of validator nodes, deterministic compute runners, proof engines, receipt engines, consensus coordinators, and telemetry systems.
Deterministic Execution
Receipt Generation
Validator Consensus
Core Components
Validator Nodes
Validators receive compute receipts, verify deterministic outputs, attest validity, and participate in consensus.
- Receipt validation
- Output verification
- Validity attestation
- Consensus participation
- FastAPI-based services
Deterministic Runner
The execution layer ensures workloads produce reproducible outputs with stable execution and predictable results.
- Stable execution
- Predictable outputs
- Reproducible hashing
- Deterministic receipts
- Workload isolation
Receipt Engine
Execution results are transformed into structured receipts containing job metadata and proof payloads.
- Job identifiers
- Manifest hashes
- Execution hashes
- Validator metadata
- Timestamps & proofs
Proof Engine
Verifies compute validity through local deterministic proofs and placeholder ZK integration layers.
- Local proofs
- ZK placeholders
- Aggregate structures
- Future zkVM
- Hardware attestation
Consensus Layer
Validators independently verify receipts, cast weighted attestations, and finalize accepted compute.
- Independent verification
- Weighted attestations
- Consensus ratios
- Finalization
- Future BFT research
Telemetry Systems
Protocol telemetry for validator uptime, peer liveness, receipt activity, and consensus reports.
- Validator uptime
- Peer liveness
- Receipt activity
- Consensus reports
- Runtime metrics
Peer Registry
Validators maintain peer registries with bootstrap lists, gossip sync, and liveness scoring.
- Bootstrap peers
- Gossip synchronization
- Liveness scoring
- Trust weighting
- Discovery protocols
Public Observer
Public-facing infrastructure providing readable telemetry and bootstrap peer visibility.
- Public telemetry
- Peer visibility
- Genesis candidates
- Explorer access
- Read-only mode
Verification Pipeline
The protocol approaches verification through a layered pipeline where verification is designed to be cheaper than execution.
Job Manifest
Deterministic execution blueprint
Execution
Reproducible workload processing
Hashing
Immutable output fingerprint
Receipt
Portable evidence artifact
Validation
Independent re-execution
Consensus
Distributed agreement
Data Flow Architecture
The protocol processes compute through a structured flow: manifests define workloads, runners execute deterministically, receipts capture evidence, and validators reach consensus.
Input Layer
Job manifests define deterministic workloads
Execution Layer
Reproducible compute with stable outputs
Evidence Layer
Receipts capture execution proof
Consensus Layer
Validators attest and finalize
Long-Term Architecture Goals
The architecture is designed to evolve. Future research directions may include zkVM integrations, recursive proof systems, hardware attestation, and trusted execution environments.
View ResearchzkVM Integration
ResearchRecursive Proofs
PlannedHardware Attestation
ExplorationAsync BFT
Research