2.3 Nodes, Consensus, and Mining: Keeping the Chain Honest

So far, we’ve explored how blocks are linked together; now, let’s examine how new blocks are added to the chain in a secure and consistent manner. This is where nodes, consensus mechanisms, and miners come in.
Nodes: What They Are and How They Work
1. What is a Node?
A blockchain node is a computer or a software program that participates in the blockchain network by storing all or part of the ledger, validating data, and helping maintain the system’s integrity. In essence, nodes act as custodians of the ledger, each playing a role in upholding a decentralized and trustless system.
The term “node” reflects how these participants are connection points—or nodes—in the network's peer-to-peer structure, enabling decentralized communication.
2. Why the Name “Node”?
In networking, a node refers to any point that can send, receive, or store data. In blockchain, each node is a participant in the distributed ledger system, connecting peers, sharing updates, and reinforcing network resilience.
3. Core Functions of Nodes
New nodes find peers using bootstrap addresses, exchange connection requests, and establish P2P links.
Nodes verify incoming transactions: timestamps, signatures, balance checks, and protocol compliance—including double-spending protection.
Nodes confirm that blocks follow protocol rules, reference previous blocks, and then broadcast validated blocks across the network.
Nodes contribute to agreement (consensus) via mechanisms like Proof of Work (PoW) or Proof of Stake (PoS), enabling trustless validation.
Based on their type (full, light, archive), nodes store complete or partial blockchain data, continuously syncing with the network.
4. Types of Nodes and Their Roles
Blockchain networks include several types of nodes, each serving a unique function. Some are lightweight and limited in capability, while others are critical to the operation and security of the network.
Below is an overview of the most common node types:
Full Node
- Stores the entire blockchain history (every block and transaction).
- Independently verifies all transactions and blocks.
- Helps enforce network rules.
- Required for decentralization and security.
Use case: Ideal for developers, researchers, or users who want full control and trust no third party.
Light Node (also called SPV — Simplified Payment Verification)
- Stores only block headers, not full transaction data.
- Relies on full nodes to confirm if a transaction is valid.
- Uses less storage and computing power.
Use case: Mobile wallets and lightweight applications that don’t need the full chain.
Pruned Full Node
- Works like a full node but deletes old data to save disk space.
- Keeps only the most recent part of the blockchain, while still validating all transactions.
Use case: Users who want full-node verification but have limited storage capacity.
Archive Node
- Stores the entire blockchain history plus all previous states (balances, smart contracts, etc).
- Required for deep historical analysis and full data indexing.
Use case: Block explorers, analytics platforms, or applications that need historical state data.
Miner Node
- A full node that also competes to create new blocks (in Proof of Work systems).
- Uses computational power to solve cryptographic puzzles and earn rewards.
Use case: Participants in networks like Bitcoin or Ethereum (pre-merge) aiming to mine new coins.
Validator Node
- Used in Proof of Stake systems.
- Instead of mining, validator nodes stake their cryptocurrency to propose and confirm new blocks.
Use case: Users who participate in staking networks (like Ethereum post-merge) to earn rewards and help secure the network.
Masternode
- A specialized node with extra responsibilities, such as processing instant or private transactions.
- Requires a large amount of collateral (staked coins) to operate.
- Usually receives a portion of block rewards.
Use case: Common in networks like Dash; supports governance and advanced features.
Authority Node
- Used in permissioned (private) blockchains.
- Operated by approved participants who are trusted to validate blocks.
- Prioritizes speed and control over decentralization.
Use case: Enterprises or consortiums that run private blockchains for internal use.
Lightning Node
- Supports off-chain transactions via the Lightning Network (e.g. for Bitcoin).
- Handles fast, low-cost microtransactions between users.
Use case: Businesses or users who need real-time payments without waiting for full blockchain confirmations.
Specialized Nodes (Oracle, Indexer, RPC Node, etc.)
- Serve unique functions such as:
- Oracles: Bring external data into the blockchain (e.g. weather, prices).
- RPC Nodes: Provide data access for developers and applications.
- Indexer Nodes: Organize and search blockchain data quickly.
Use case: Infrastructure providers, data platforms, or apps that interact with blockchain networks.
5. Why Nodes Are Crucial
Nodes are considered the backbone of blockchain networks because they maintain the distributed ledger, enforce consensus rules, validate transactions, and ensure the network remains secure, decentralized, and fault-tolerant. Each node independently verifies data and propagates transactions and blocks across the network, making censorship and tampering virtually impossible. Importantly, each node type plays a different role in the blockchain ecosystem: some prioritize security and verification, others optimize for speed and convenience, while certain nodes are tailored to offer specialized services for applications or developers.
Choosing the right type depends on specific needs, such as full control for comprehensive validation, lightweight interaction for user convenience, or specialized services for developers building applications. Together, these diverse nodes uphold the integrity, efficiency, and adaptability of blockchain networks.
"Nodes are the backbone of blockchains, but did you know there are many different kinds of nodes?"
Proof-of-Work: Powering Blockchain Mining
The original and most famous consensus mechanism is Proof of Work (PoW), used by Bitcoin and many early blockchains. In PoW, the network rewards special participants called miners for the work of creating new blocks. Miners gather new transactions from the network, form a candidate block, and then perform a computationally intensive task: they repeatedly adjust a number called a nonce and hash the block data until they find a hash meeting certain criteria (e.g. a hash with a specified number of leading zeros). This process effectively requires trillions of guesses (and energy)–in Bitcoin, the network dynamically adjusts the difficulty so that on average a new block is found approximately every 10 minutes.

Miners play a crucial role in maintaining the blockchain by acting as auditors—they verify new transactions and add them to the blockchain by opening new blocks. In return for this essential work, they receive compensation. The reward typically consists of newly-created cryptocurrency (the block reward) plus any transaction fees from the included transactions. This incentive aligns each miner’s interests with network security: miners aim to solve the puzzle fastest, because whoever finds the valid block first earns the reward.
Because finding the correct hash is like a lottery, “computers across the globe … compete to ‘mine’ new blocks”. When one miner succeeds, they announce the new block to the network. Other nodes check it, and if valid, they add it to their copy of the blockchain and move on to mining the next block. A key point is that PoW forces miners to do “work”–using real electricity–making it prohibitively expensive to maliciously try rewriting history. To subvert the chain, an attacker would have to redo the PoW for the tampered block and all blocks after it faster than honest miners, which becomes infeasible as more blocks are added.
Alternative Consensus Mechanisms
While PoW is the most well-known consensus mechanism, it is not the only method available. Several alternative consensus mechanisms have emerged, aiming to address PoW’s drawbacks, such as high energy consumption and scalability limitations.
One of the most prominent alternatives is Proof-of-Stake (PoS). Instead of requiring energy-intensive computational power, PoS relies on validators who lock up (or “stake”) their cryptocurrency as collateral. Validators are chosen to create new blocks based on the size of their stake and other factors like random selection or coin age. This increases efficiency and uses far less energy, since no competition to solve hashes is needed. However, PoS shifts trust dynamics – for example, critics say it may encourage wealth hoarding. Ethereum, the second-largest blockchain, transitioned from PoW to PoS with its 2022 upgrade known as The Merge, significantly reducing its energy usage by over 99%, according to the Ethereum Foundation.
Other notable consensus mechanisms include:
- Proof-of-History (PoH): Developed by Solana, PoH is not a standalone consensus mechanism but rather a cryptographic clock that works in tandem with PoS to enhance scalability. PoH establishes a historical record that proves an event occurred at a specific moment in time. This allows validators to agree on the order of transactions without waiting for block confirmations, enabling extremely fast throughput—reportedly up to 65,000 transactions per second.
- Proof-of-Burn (PoB): In PoB systems, participants gain the right to validate transactions by burning (i.e., permanently destroying) a certain amount of cryptocurrency. This "sacrifice" demonstrates commitment to the network. PoB is intended to mimic the resource expenditure of PoW but with reduced environmental impact. Projects like Counterparty and Slimcoin have experimented with this model.
- Delegated Proof-of-Stake (DPoS): Used by networks like EOS and Tron, DPoS introduces a voting system where stakeholders (token holders) elect a small group of trusted validators. This enhances performance and transaction speed but can introduce centralization risks.
- Proof-of-Authority (PoA): Suitable for permissioned or enterprise blockchains, PoA relies on a set of pre-approved validators whose identities are known and trusted. It offers high efficiency but less decentralization.
- Byzantine Fault Tolerance (BFT) Variants: Consensus protocols like Tendermint (used in Cosmos) and HotStuff (used in Diem) are based on BFT principles, allowing a network to reach agreement even in the presence of malicious actors. These models offer fast finality and are ideal for high-performance blockchains.
Each mechanism offers trade-offs in terms of security, decentralization, energy efficiency, and performance. As blockchain technology evolves, the diversity of consensus models continues to grow, enabling different networks to tailor their approach to the specific needs of their ecosystems.
In this section, we've explored how nodes maintain the network, how consensus mechanisms enable agreement, and how mining secures the blockchain. These processes form the foundation of a decentralized system.
Next, we'll examine how these elements contribute to Immutability, Security, and Trust—core principles that give blockchain its strength and reliability.