NEAR Protocol ($NEAR) | Host to the Next Generation of DApps

Written By
Matt
First Published
February 20, 2022
Last Updated
September 5, 2024
Estimated Reading Time
4 minutes
near protocol
In this article...

What Is Near Protocol?

NEAR Protocol is a Layer 1, smart-contract enabled, delegated proof-of-stake blockchain that is designed to be user/developer friendly and usher in the next generation of dApps (Decentralized Applications). The protocol was created in 2017 by former Microsoft software developer Alexander Skidanov and former engineering manager at Google Research, Ilya Polosukhin with the mainnet going live in early 2020. NEAR intends to scale its network using sharding, a technology which splits a blockchain’s network into smaller partitions to improve latency. The native token on the network is called $NEAR. It is primarily used within the ecosystem to pay for transaction fees and as collateral for storing data on the blockchain. Holders can also stake their NEAR tokens via their native, web-based wallet.

Nightshade

How can a network scale to handle increased transaction activity without compromising on security and decentralization? NEAR’s solution to this problem is what they have termed ‘Nightshade Sharding’. Phase 0 (Simple Nightshade) of this implementation was launched in November, 2021 and this was a major milestone for the network as it embarked on a journey towards becoming a fully sharded blockchain that will be super-fast, very secure, and capable of onboarding millions of users into the world of Web3.

The initial Nightshade phase shards the state, significantly increasing the throughput of the network up to 100,0000 transactions per second, with near instant finality (less than 2 seconds) and transactions which cost just a fraction of a cent. With the implementation of Nightshade, NEAR has built a mechanism to split a shard into multiple parts through live upgrades. While sharding technology is not unique to NEAR, it’s aiming to take things to the next level by introducing what is known as ‘dynamic sharding’ in a future phase of the implementation (scheduled for Q4, 2022). This is a process by which the number of shards on the blockchain is not static, rather adjustable based on user demand, enabling transaction fees and throughput to be optimized at all times.

While there are many new blockchains and layer 2 solutions claiming to have thousands of transactions per second, due to their non-sharded designs they will all hit an upper limit of what their network can eventually handle. NEAR’s Nightshade sharding allows the protocol to scale linearly with the number of shards, thereby having the ability to satisfy the demand for more transactions as the number of users increase. Ultimately it prepares NEAR for the mass adoption of billions of users.

Aurora

Aurora is an EVM (Ethereum Virtual Machine) built on the NEAR Protocol, delivering a turn-key solution for developers to operate their apps on an Ethereum-compatible, high-throughput, scalable and future-safe platform, with low transaction costs for their users.

In December, 2021 Aurora announced an important partnership with ConsenSys, the enterprise blockchain company, to provide access to its suite of developer tools including Metamask, Infura, Truffel and more. Aurora provides an Ethereum Layer 2-like experience for both users and developers and is a vital part of the ongoing development of the NEAR ecosystem.

Wallet Support

The NEAR wallet is an easy-to-use, non-custodial, web-based wallet for the NEAR blockchain….

You're missing out on the goods!
Become a Premium Wealth Mastery Subscriber to read the whole article + get weekly investment strategies on crypto, altcoins, NFTs and more
Discussion on "NEAR Protocol ($NEAR) | Host to the Next Generation of DApps"
You must Subscribe or Login to post a comment.
Additional Resources
Wealth Mastery
Subscribe Today!
Join the Wealth Mastery Investor Report

Join the Wealth Mastery Investor Report

By Lark Davis
Privacy Policy

Who we are

Our website address is: https://thewealthmastery.io.

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Join the Wealth Mastery Investor Report

By Lark Davis