Authorization & Incentives
Last updated
Last updated
Corex Network provides flexible options for authorized configurations such as:
Partial Authorized Cluster Configurations:
Partial Authorized Clusters are setups where an organization or institution controls some of the infrastructure, while also including external nodes to enhance the diversity of their node set. These clusters function under a hybrid system, offering the security of a cluster where, even if all external nodes were compromised, the majority of the protocol ensures the cluster remains functional and secure. At the same time, they gain the advantage of external oversight, adding an extra layer of monitoring to their otherwise fully-permissioned setup.
Completely Authorized Cluster Configurations:
Certain organizations or institutions may choose to manage the entire network infrastructure independently, including clusters made up solely of self-operated nodes, along with running their own middlelayer nodes. Even these isolated setups are encouraged to remain within our network, rather than creating a protocol fork as our network imposes no intermediary fees ensuring no loss of value for siloed computations.
The reward for completing a computation is evenly divided among all the nodes within the cluster where the computation is carried out. Within each node, the rewards are further distributed based on the proportion of stake delegated to that node. If a node receives more stake than is necessary for its hardware to be fully utilized, meaning the node’s hardware is already operating at full capacity, a sub-linear function is applied to the surplus stake. This ensures diminishing returns on excess stake beyond what is required for the node’s available resources.
The use of this sub-linear curve prevents the centralization of too much stake on any single node, ensuring that stake distribution remains balanced according to the level of service provided. This system helps maintain fairness within the network, giving other nodes the opportunity to receive third-party delegations and participate competitively.
To clarify, rewards within a cluster are solely based on the number of computations completed by that cluster, and the distribution of rewards among the nodes in a cluster is equally shared.