Overview
Validators
Introduction
Validators form a critical component of Pingnet’s decentralized infrastructure.
Operating on a specialized Layer 2 (L2) system constructed atop Solana, they are tasked with validating network activity, managing access permissions, and distributing rewards.
validators are a core part of the Pingnet Network
They help keep the network secure, fair, and operational by handling key responsibilities:
- This focuses on evaluating how well nodes are functioning.
- This emphasizes the dynamic and current nature of the provider registry.
- This highlights the goal of a fluid and uninterrupted network experience.
They play a vital role in the Pingnet Network, without compromising on speed, privacy, or decentralization.
Pingnet’s architecture is built with strict data boundaries — validators never have access to user traffic or private content.
Discovery AVS
The Discovery AVS system is integrated within Pingnet's backend infrastructure.
Its purpose is to enable nodes to identify available validators and transmit essential data to the web interface.
The system is also responsible for surveilling the network to detect irregular conduct.
If a node with malicious intent is found, AVS cryptographically approves a penalty transaction and transmits it across the L2 ledger, which sets enforcement actions in motion.
Detection of a compromised node prompts the AVS to sign and broadcast a penalty transaction onto the L2 ledger, leading to the execution of disciplinary actions.
Its role is to maintain the integrity of the system without compromising privacy.
NCN — Node Consensus Network
Through the Node Consensus Network (NCN), nodes and validators can discover and communicate without relying on trust.
- An oracle built on Solana receives and stores node metadata (including IP, uptime, and performance) published by validators.
- Nodes consult this oracle to identify validators that are currently available.
- Following discovery, nodes provide validators with signed attestations.
Validator setup and registry management is supported by the Cambrian SDK, which also enables governance operations and validator coordination.
Proofs & Smart Contracts (L2)
Smart contracts drive Pingnet's Layer 2 validator system, managing the rules for validation, reward distribution, and reputation tracking.
Validators are responsible for processing two key proof types:
- Proof-of-Contribution (PoC): Nodes submit Proof-of-Contribution (PoC) to validate their bandwidth usage, uptime, and the level of service they provide.
- Proof-of-Fraud (PoF): When a node behaves maliciously or incorrectly, a Proof-of-Fraud (PoF) is generated, signed by AVS, and sent to the Layer 2.
Smart contracts involved:
- Rewards Oracle: It determines node compensation by evaluating their engagement and historical data.
- Reputation Oracle: It keeps track of node performance metrics and dynamically modifies reward distribution accordingly.
Staking & Security (Jito Restaking)
Staking $VRT is a prerequisite to become a validator, enabling you to participate in validator functions and earn rewards.
The L2 ledger's security is reinforced through Jito Restaking, which also provides stakers with supplementary yield.
Reward calculations take into account:
- Stake size
- How well the network functions.
- The design of Pingnet's token economy and its reward distribution system.
In early phases, validators are directly paid for securing the network.
If a validator misbehaves and a majority confirms it,slashing is applied — burning part of their funds.