What Is A Crypto Layer 2 And How Does It Work? (2024)

With Ethereum’s 8th birthday coming up on July 30th, Web3 has certainly come a long way. As the space has grown, however, the technology's scaling limitations have become harder to ignore. Any regular cryptocurrency user will, inevitably, find themselves faced with high fees and slow transaction confirmations at some time. Layer 2 systems, called “L2s,” have emerged to address this scalability bottleneck, offering users cheaper and faster transactions while maintaining strong security guarantees.

The most popular L2 networks include Arbitrum (which my employer, Offchain Labs, is focused on) , Optimism, and zk-Sync, which run on Ethereum. In the Bitcoin ecosystem, the Lightning Network is the most widely used L2.

Networks like Arbitrum and Optimism are governed via corresponding tokens that have a combined global market cap of nearly $2 billion.

L2 systems help users overcome the scalability limitations of their underlying “Layer 1.” One can imagine “bridges” to L2s as on/off ramps on a highway, and “L2s” themselves as overpasses or side-streets that run parallel to the main blockchain road. When transacting on these side-streets, traders and other cryptocurrency users benefit from cheap and timely transactions.

As blockchain technology becomes a pillar of global marketplaces, L2s are the only way those tools and solutions can scale to serve mass audiences.

Why Blockchains Are Built in Layers

When we talk about the blockchain’s “Layer 1,” with the core properties of decentralization and disintermediation, we are referring to blockchain networks like Bitcoin BTC and Ethereum ETH. These systems use distributed ledgers (blockchains) to enable digital asset ownership and transfers without relying on any third parties. Since no trusted third parties are required, anybody can run the L1 software with a personal node, using a personal laptop or Raspberry Pi device.

The L1’s consensus mechanism ensures that all the nodes in the network will eventually agree on the state of the whole system system (for example, how much ETH a given user owns at a particular point in time). Right now, the Bitcoin network’s L1 can handle about 7 transactions per second; Ethereum can handle at most a few dozen. This limit (which is quite low, all things considered) creates competition for block space.

Users compete for space on the blockchain by bidding against each other via transaction fees. A user paying higher fees will get his or her transaction confirmed sooner than someone who paid a lower fee.

Enter Layer 2 Blockchain Scaling Solutions

To use an L2, a user deposits their L1 funds (like, say ether) into the L2 system via what’s known as a “bridge.” With their funds on L2, the user can transact. L2s utilize the underlying blockchain, but only minimally, which translates to L2 users paying lower fees.

Most L2s can be used with the same wallet software a user would use, like Metamask for Ethereum. For all major Ethereum L2s, fees are paid in the underlying chain’s currency ether. Generally speaking, a user will be able to do similar things on L2 that they would on L1, namely, sending and receiving payments and interacting with smart contract applications.

At any point, the proper owner of funds on L2 can use the bridge to “withdraw” their funds back to L1. An L2 user shouldn’t have to trust any designated parties to ensure that they have this withdrawal guarantee; in other words, fund security comes from the base layer blockchain itself.

Enforcing the L1’s security property is the core technical challenge of architecting L2 systems. There are two main categories of Ethereum L2s: Ethereum L2s that use “fraud proofs,” also known as “optimistic” L2s, and L2s that use validity proofs.

Fraud Proofs

Fraud proof-based L2s get their scaling benefits by enforcing what can be thought of as an “innocent until proven guilty” policy for their transactions.

When using a fraud proof based L2, the L1 “optimistically” assumes that all transactions are valid. If (and only if) something invalid has occurred (like, say, a user trying to spend funds that aren’t rightfully theirs), a fraud proof can prevent that invalid action from finalizing.

When simply using L1 directly, every L1 node must do the work of processing every transaction. Alternatively, with an optimistic L2 solution, transactions only require the software to do a lot of transaction work if there’s a problem, as if it were an assistant submitting a complaint report to the L1.

MORE FROMFORBES ADVISOR

Best Travel Insurance CompaniesByAmy DaniseEditor
Best Covid-19 Travel Insurance PlansByAmy DaniseEditor

Since in the most common, “happy” case, these fraud proofs aren’t necessary, the corresponding network nodes have to do much less work than they normally would. As such, users pay lower transaction fees.

One family of protocols designed to use fraud proofs are “Optimistic Rollups” like the Ethereum L2s Arbitrum ARB and Optimism OP. After L2 transactions are posted to the layered network, there is a “dispute window” — an interval of time over which anybody can use L1 to prove (and in turn, prevent) fraud, if the need arises. In this way, the L1 acts as the ultimate judge, enforcing the L2’s rules when necessary.

Bitcoin’s Lightning Network also gets its security via fraud proofs. To use the Lightning Network, two users can submit an L1 transaction to open up what’s called a “payment channel.” Once they have a Lightning channel open, they can send payments to each other entirely off-chain.

Eventually the users settle only their final balances back on the underlying L1, a bit like closing out a bar tab at the end of a night out (as opposed to swiping one’s card for each individual drink and waiting for the receipt each time). If a user tries to “close out” with an improper balance, then once again, the other user can rectify this with a fraud proof on L1, preventing this attempted theft.

Arbitrum and Optimism support general purpose smart contracts, similar to Ethereum. Lighting Network is predominately used for simple payments, although Lightning channels could also, in principle, be leveraged for some more limited smart-contract-like functionality.

Validity Proofs

Another type of L2 system uses an approach called “validity proofs.” The most widely used protocol family that leverage validity proofs are known as “ZK-Rollups.”

Unlike fraud-proof systems — which temporarily “allow” invalid transactions with the guarantee that they can be disputed — ZK-Rollups use cryptographic proofs to directly ensure that transactions are valid to begin with. The mechanism of these cryptographic proofs involves some advanced applied mathematics; in effect, the validity proof lets the underlying blockchain ensure that the L2 transactions are valid without actually having to process them directly.

The initial batch of ZK-Rollups that launched were all “application specific,” meaning they supported more limited functionality than general purpose smart contracts. Starkware’s dydx supports derivative exchange functionality; Loopring LRC supports token payments and some simple swaps; Aztec Connect supports privacy preserving transactions for limited DeFI applications. The upsides to L2s offering this more restricted, “application specific” functionality are technical simplicity and potentially better performance (which means lower fees).

ZK-Rollups that offer general purpose smart contracts are more complex, and thus have taken longer to develop. But recently, developers have made progress on this front with the release of L2s like Polygon’s zkEVM and zkSync Era.

Decentralization And L2s

Across all blockchain networks, although L2 protocols are designed to be decentralized in principle, any accurate description of how they actually exist in practice must include a fair amount of qualifiers and fine-print.

Bitcoin’s Lightning Network advocates can credibly claim that it is decentralized at the protocol level. However, most Lightning users opt to use custodial Lightning wallets and third party services. That’s because the user experience is simpler and easier. These trusted third parties, however, effectively have custody and control over users’ funds.

In the world of Ethereum — where the overwhelming majority of L2 activity occurs — L2s tend to launch with centralized components in place, with the promise of phasing them out — or “progressively decentralizing” — over time. These centralized components allow for companies to deploy quick software bug fixes; in some cases, they are necessary while critical parts of the L2 system are still under development. Virtually all widely used Ethereum L2s still have some such centralized (or at least, not entirely decentralized) parts as of today.

For users, sorting this out is tricky business. As such, the L2Beat project has emerged as a widely trusted source in tracking the state of decentralization of Ethereum’s many L2s. As with all things in the crypto space, users are advised to do their own research to understand the risks of anything they use, and generally err on the side of caution.

Disclosure: I am an employee of Offchain Labs, a company dedicated to advancing L2 Ethereum technologies, and am personally long-term holder of ARB tokens.

What Is A Crypto Layer 2 And How Does It Work? (2024)

FAQs

What Is A Crypto Layer 2 And How Does It Work? ›

TL;DR: Ethereum Layer-2 blockchains are solutions designed to enhance the scalability of the Ethereum network. They operate on top of the Ethereum blockchain (Layer-1), inheriting its security while striving to provide faster and less costly transactions.

What does layer 2 mean in crypto? ›

A Layer 2 solution is a secondary blockchain network, which reduces the load on the parent chain by handling part of its capabilities. Think of Ethereum as a boss whose desk is overflowing with paperwork (validating & executing transactions).

Is Coinbase a layer 2? ›

Base is a Layer-2 scaling solution for Ethereum built by Coinbase which aims to make transactions faster while leveraging the security of the Ethereum mainnet.

What is the difference between layer 1 and layer 2 Crypto? ›

Layer 1 refers to a base blockchain protocol, (e.g., Bitcoin or Ethereum) while layer 2 refers to a third-party protocol built to have integrated functionality with that base blockchain. There, that's it. If you wanted a high-level overview, that's pretty much all you needed to know.

What is the best layer 2 crypto? ›

Top Layer 2 Crypto Coins Today By Market Cap
#Name24H
1POL (ex-MATIC) ( POL )-0.93%
2Stacks ( STX )+1.30%
3Immutable ( IMX )+0.80%
4Optimism ( OP )+1.29%
39 more rows

What is a layer 3 crypto? ›

Layer 3, often referred to as the application layer, is built on top of Layer 1 (the base blockchain) and Layer 2 (scaling solutions). While Layers 1 and 2 focus on the infrastructure and scalability of the blockchain, Layer 3 focuses on creating user-facing applications and protocols.

Can Bitcoin have a layer 2? ›

Bitcoin Layer-2 networks are secondary protocols built on top of the Bitcoin blockchain to enhance its scalability and transaction efficiency. They enable faster, cheaper transactions by handling them off the main blockchain, thereby reducing congestion and fees on the Bitcoin network.

Is Bitcoin cash a Layer 2? ›

Bitcoin Cash decided not to utilize any side-chain or second-layer technologies, meaning that they intend to scale only by increasing their block size.

Is Bitcoin lightning a Layer 2? ›

The Lightning Network, developed by Lightning Labs, is a second layer for Bitcoin, which uses micropayment channels to scale the blockchain's capability and handle transactions more efficiently and cheaply. It is a solution designed to solve issues on the Bitcoin blockchain through off-chain transactions.

Is USDC a Layer 2? ›

USD Coin (USDC) on Polygon and Arbitrum: Polygon and Arbitrum networks are Layer 2 solutions for Ethereum, built to increase transaction speeds and reduce fees. With USDC on these networks, users can enjoy stablecoin transactions that are faster and more cost-effective.

How many layer 2 blockchains are there? ›

List of Layer 2 Blockchains. Discover 16 Layer 2 Blockchains across the most popular web3 ecosystems with Alchemy's Dapp Store. Also explore related collections including Layer 1 Blockchains (L1s), Sidechains, Testnets.

What is layer 0 crypto? ›

Layer-0 is the lowest layer in the blockchain stack, dealing with the core infrastructure of the blockchain network. It focuses on optimizing data transfer and communication between different blockchain layers.

How many layers of crypto are there? ›

Blockchain consists of five layers: hardware infrastructure, data, network, consensus, and application layers. These layers handle functions from data storage to user-facing applications.

Is a polygon a layer 2? ›

Polygon is a “layer two” or “sidechain” scaling solution that runs alongside the Ethereum blockchain — allowing for speedy transactions and low fees. MATIC is the network's native cryptocurrency, which is used for fees, staking, and more.

What are the examples of Layer 2 on Ethereum? ›

Common types of Layer-2 solutions on Ethereum include optimistic rollups and Zero-Knowledge rollups (ZK rollups). Optimistic rollups and ZK rollups are considered secure, as they inherit the Ethereum mainnet's security.

What is the first layer 2 crypto? ›

The Lightning Network is one of the earliest Layer 2 scaling solutions. It was proposed in 2015 by Joseph Poon and Thaddeus Dryja in their whitepaper. Lightning Network enables faster and cheaper transactions by conducting most transactions off-chain and settling them on the Bitcoin blockchain only when necessary.

Is Solana a layer 1 or 2? ›

Solana is a Layer 1 blockchain and component of the Smart Contract Platforms Crypto Sector (Exhibit 1). Compared to Ethereum—the largest smart contract platform by market capitalization—Solana provides faster and cheaper transactions on a single-layer network, without relying on additional scaling layers.

What is an example of a layer 2 protocol in a blockchain? ›

Examples of L1 chains include Bitcoin, Ethereum, and BNB Smart Chain. On the other hand, L2 are chains built on top of other networks. For example, Polygon (MATIC) is an L2 protocol built on the Ethereum blockchain, as seen in the diagram below.

What do crypto layers mean? ›

What are the primary layers of blockchain technology? Blockchain consists of five layers: hardware infrastructure, data, network, consensus, and application layers. These layers handle functions from data storage to user-facing applications.

Is Ethereum a layer 2? ›

Ethereum and Bitcoin are both layer 1 blockchains because they are the underlying foundation that various layer 2 networks build on top of.

Top Articles
No Drone Zone
Does the time you take your medicine matter?
Tattoo Shops Lansing Il
Knoxville Tennessee White Pages
Cintas Pay Bill
Www.craigslist Virginia
Occupational therapist
Erika Kullberg Wikipedia
PontiacMadeDDG family: mother, father and siblings
Craglist Oc
Chuckwagon racing 101: why it's OK to ask what a wheeler is | CBC News
Concacaf Wiki
Irving Hac
Bustle Daily Horoscope
Acbl Homeport
ExploreLearning on LinkedIn: This month's featured product is our ExploreLearning Gizmos Pen Pack, the…
Best Fare Finder Avanti
Current Time In Maryland
boohoo group plc Stock (BOO) - Quote London S.E.- MarketScreener
Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
NHS England » Winter and H2 priorities
3476405416
Erica Banks Net Worth | Boyfriend
Georgetown 10 Day Weather
Att.com/Myatt.
Breckie Hill Mega Link
Boscov's Bus Trips
Www.craigslist.com Austin Tx
Apartments / Housing For Rent near Lake Placid, FL - craigslist
1145 Barnett Drive
The Banshees Of Inisherin Showtimes Near Broadway Metro
Xxn Abbreviation List 2017 Pdf
897 W Valley Blvd
Till The End Of The Moon Ep 13 Eng Sub
Dailymotion
Chicago Pd Rotten Tomatoes
The Menu Showtimes Near Amc Classic Pekin 14
Average weekly earnings in Great Britain
Manuel Pihakis Obituary
Quake Awakening Fragments
Gpa Calculator Georgia Tech
Taylor University Baseball Roster
Chase Bank Zip Code
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
Professors Helpers Abbreviation
Dragon Ball Super Card Game Announces Next Set: Realm Of The Gods
Workday Latech Edu
Stoughton Commuter Rail Schedule
Smoke From Street Outlaws Net Worth
Heat Wave and Summer Temperature Data for Oklahoma City, Oklahoma
Jigidi Jigsaw Puzzles Free
8663831604
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 5785

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.