The core concept of Layer 2 can be summed up as: computations are performed off-chain, and results are confirmed on-chain.
In traditional Layer 1, every transaction must be executed and verified by all nodes. This “network-wide redundant computation” model is secure but extremely inefficient. In the Layer 2 architecture, a large number of transactions are moved off-chain for execution in dedicated environments, and only the results or summaries are submitted to the main chain.
This mechanism brings several changes:
Through this layered design, Layer 2 significantly optimizes performance without altering the underlying consensus mechanism.
From an overall perspective, a typical Layer 2 system is usually composed of multiple components that together handle transaction execution, data submission, and state updates.
Generally, Layer 2 includes the following key parts:
Different Layer 2 solutions (such as Rollup, state channels, etc.) implement these components in various ways, but their overall goal is the same: enhance performance and reduce costs while ensuring security.
It is worth noting that in most current Layer 2 solutions, the sequencer is often centralized. While this improves efficiency, it also introduces certain trust issues—an important area for future improvement.
The design of Layer 2 is essentially a trade-off: while boosting performance, the system’s security model needs to be redefined. Different solutions have clear differences in “who to trust” and “how to verify.”
Take Rollup as an example; its security typically relies on the following mechanisms:
The shared goal of these mechanisms is to reduce on-chain computational load while still ensuring the system cannot be compromised by malicious behavior.
However, this design also brings new challenges. For example, if a sequencer acts maliciously or data becomes unavailable, users may risk being unable to withdraw funds promptly. Therefore, the evolution of Layer 2 is not only about performance improvements but also a continuous process of optimizing trust models and security mechanisms.