Design Principle and Advantages

Application chain is an independent chain that can support customer business logic itself. It has its own staking mechanism and network of validators to guarantee its security. And because of its independency, Semita application chain can allow developers and users to optimize the chain to meet the particular needs of the business.

For example, to handle high throughput, the EVM logic and consensus logic can be optimized to meet the requirements without sacrificing the security of the network, it is especially true for the permissioned application chain as all the validators are added with permission. Since the validator set on the Application Chain is expected to be secure with a large amount of stake put up to back it, Application Chain should benefit from this security.

The design principle of Semita Application Chain:

  • High performance: NodeReal application chain targets to solve the enterprise business problems, therefore the throughput of the Application Chain is considered from the design phase. Not only the throughput of the chain but also the high-speed access layer, NodeReal Application Chain provides the scalable and high-speed RPC endpoint for enterprise applications.

  • Flexibility: Different from the parachain of Polkdot, Application Chain is an independent enterprise EVM compatible chain, which means it does not depend on any shared resources(like Polkadot Relay Chain, if any parachain data validation needs to be reverted, all parachains need to be reverted), and developers and customers can have the flexibility to optimize the chain to meet their business needs(for example, gas flow customization, high priority transactions, etc).

  • Data Sovereignty: Data sovereignty is critical for enterprise users. NodeReal Application Chain aims to protect the data by only allowing authorized accounts and nodes can access the data. The validator whitelist and validator inclusion process are designed from day 1. At the same time, for the permissioned network, because all p2p traffic is within the boundary of the enterprise network, data privacy could be protected by the customer`s existing IT security practices as well.

  • Interoperability: Application Chain supports the bi-direction bridging to the public chains.

  • High-Speed Elastic RPC: Application Chain supports the native high-speed RPC that is scalable when traffic spikes. Customers do not need to depend on the third-party RPC service to handle the high volume of traffic when their application business grows.

  • Native Explorer: Application Chain has a high-performance explorer with data indexing capabilities built-in. It is a one-stop solution for enterprise users, not only explorer but the customizable data indexing service and enhanced API.

TypeInteroperabilityFlexibilityPerformanceData SovereigntyRPC AccessExplorerNative Token
Semita Application ChainCross-Chain Bridge to public Chains(ETH, BSC)HighHighPublic Chain + Private ChainNative MegaNode SupportNative High-Performance Explorer(Public + Private)Yes, and customisable
Polkadot ParachainPolkadot Relay Chain, XCMMedieum(Depends on the shared relay chain)Medium(Bottleneck at relay chain)Public ChainNormal RPCPolkadot explorerDOT
AVAX SubnetAVAX BridgeHighHighPublic Chain + Private ChainNormal PRCPublic AVAX ExplorerAVAX
Polygon Edge/SupernetsBridge To Public ChainHighHighPublic Chain + Private ChainNormal RPCPolygon ExplorerMATIC