Part II. The Lightning Network in Detail

A detailed explanation of all the components of the Lightning Network and how they work. This part is highly technical and expects the reader to have some programming and computer science experience.

Chapter 6. Lightning Network Architecture

In the first part of this book we introduced the main concepts of the Lightning Network and worked through a comprehensive example of routing a payment and setting up the tools we can use to explore further. In the second part of the book we will explore the Lightning Network in a lot more technical detail, dissecting each of the building blocks.

In this section we will outline the components of the Lightning Network in more detail and provide a “big picture” perspective to guide you through the following chapters.

The Lightning Network Protocol Suite

The Lightning Network is composed of a complex collection of protocols that run on top of the internet. We can broadly classify these protocols into five distinct layers that make up a protocol stack, where each layer builds upon and uses the protocols in the layer below. Also, each protocol layer abstracts the underlying layers and “hides” some of the complexity.

The architecture diagram shown in Figure 6-1 provides an overview of these layers and their component protocols.

mtln 0601

Figure 6-1. The Lightning Network protocol suite

The five layers of the Lightning Network, from the bottom up, are:

Network connection layer

This contains the protocols that interact directly with the internet core protocols (TCP/IP), overlay protocols (Tor v2/v3), and internet services (DNS). This layer also contains the cryptographic transport protocols that protect Lightning messages.

Messaging layer

This layer contains the protocols that nodes use to negotiate features, format messages, and encode message fields.

Peer-to-peer (P2P) layer

This layer is the primary protocol layer for communication between Lightning nodes and contains all the different messages exchanged between nodes.

Routing layer

This layer contains the protocols used to route payments between nodes, end-to-end and atomically. This layer contains the core functionality of the Lightning Network: routed payments.

Payment layer

The highest layer of the network, which presents a reliable payment interface to applications.

Lightning in Detail

Over the next 10 chapters, we will dissect the protocol suite and examine each component of the Lightning Network in detail.

We spent quite some time trying to decide the best order of presenting this detail. It’s not an easy choice because there is so much interdependence between different components: as you start explaining one, you find that it pulls in quite a few of the other componenents. Instead of a top-down or bottom-up approach, we ended up choosing a more meandering path that starts with the most fundamental building blocks that are unique to the Lightning Network-Payment Channels and moves outward from there. But since that path is not obvious, we will use the Lightning Protocol Suite shown in Figure 6-1 as a map. In each chapter will focus on one or more related components, and you will see them highlighted in the protocol suite. Kind of like a map marker saying “You are here!”

Here’s what we will cover:

Chapter 7, “Payment Channels”

In this chapter we will look at how payment channels work, in significantly more depth than we saw in the earlier parts of the book. We will look at the structure and Bitcoin Script of the funding and commitment transactions, and the process used by nodes to negotiate each step in the protocol.

Chapter 8, “Routing on a Network of Payment Channels”

Next, we will put together several payment channels in a network and route a payment from one end to the other. In that process we will dive into the hash time-locked contract (HTLC) smart contract and the Bitcoin Script that we use to construct it.

Chapter 9, “Channel Operation and Payment Forwarding”

Putting together the concepts of a simple payment channel and a routed payment using HTLCs, we will now look at how HTLCs are part of each channel’s commitment transaction. We will also look at the protocol for adding, settling, failing, and removing HTLCs from the commitments.

Chapter 10, “Onion Routing”

Next, we will look at how the HTLC information is propagated across the network inside the onion routing protocol. We will look at the mechanism for layered encryption and decryption that gives the Lightning Network some of its privacy characteristics.

Chapter 11, “Gossip and the Channel Graph”

In this chapter we will look at how Lightning nodes find each other and learn about published channels to construct a channel graph that they can use to find paths across the network.

Chapter 12, “Pathfinding and Payment Delivery”

Next, we will see how the information from the gossip protocol is used by each node to build a “map” of the entire network, which it can use to find paths from one point to another to route payments. We’ll also look at the exiting innovations in pathfinding, such as multipart payments.

Chapter 13, “Wire Protocol: Framing and Extensibility”

Underpinning the Lightning Network is the peer-to-peer protocol that nodes use to exchange messages about the network and about their channels. In this chapter we look at how those messages are constructed and the extension capabilities built into messages with feature bits and Type-Length-Value (TLV) encoding.

Chapter 14, “Lightning’s Encrypted Message Transport”

Moving down to the lower-level part of the network, we will look at the underlying encrypted transport system that ensures the secrecy and integrity of all communications between nodes.

Chapter 15, “Lightning Payment Requests”

A key part of the Lightning Network is payment requests, also known as Lightning invoices. In this chapter we dissect the structure and encoding of an invoice.

Let’s dive in!

If you find an error or have any questions, please email us at admin@erenow.org. Thank you!