World logo

訂閱 World 電子報

搶先了解更具真人性經濟體系背後的思維、理念和技術

輸入你的電子信箱地址並點選「訂閱」,即表示你同意接收電子報、行銷資訊和生態系統的最新動態。若想了解我們如何處理你個人資料的詳細資訊,包括你的權利以及如何行使這些權利,請參閱我們的隱私聲明。

World ID
World App
World Chain
關於 World
World 旗艦地點
World 部落格
World 觀點
World 技術
World 企業應用
World 開發者專區
關於 Orb
尋找 Orb
個人營運者
社區營運者
零售營運者
白皮書
開源
隱私
媒體中心
World Foundation
學習中心
客服
常見問題
人才招募

X

WhatsApp

LinkedIn

Discord

Telegram

YouTube

Instagram

TikTok

Reddit

*Worldcoin(WLD)代幣的領取和使用資格依據地理位置、年齡和其他因素受到限制。WLD 無法透過 World App 分發給居住在紐約州或其他受限制地區的個人、公司或組織,或位於或註冊於該等地區的實體。World Assets, Ltd. 和 World Foundation 不負責 WLD 在第三方平台(如中心化或去中心化交易所)上的可用性。詳情請參閱:https://world.org/legal/user-terms-and-conditions 加密貨幣產品可能具有高風險。重要使用者資訊請參閱 https://world.org/risks。


™ 2026 World

Cookie 設定Cookie 政策隱私權聲明商標政策資料要求使用者條款風險社群提醒
學習中心BlockchainWhat’s a Blockchain Node?

What’s a Blockchain Node?

2023年7月17日 ▪ 5 分鐘閱讀
What are nodes used for?Characteristics of nodesTypes of nodesFull nodesLight nodesMasternodesWhy node size mattersHow do you run a node?Wrapping up

What are nodes used for?

Nodes can create, send, and receive blockchain data. Their primary purpose is to validate, record, and broadcast each transaction on the network. They ensure that the blockchain is functioning properly and has the ability to reject transactions if they’re malicious. They’re also responsible for executing each blockchain’s consensus mechanism, which is a process that blockchains follow to confirm and validate transactions. The two most common consensus mechanisms are proof-of-work (PoW) and proof-of-stake (PoS).

Miners use nodes, or mining nodes, to carry out crypto mining, a process that requires advanced hardware and software to solve complex mathematical equations and generate new blocks.

Specific nodes are also used as crypto wallets, like traditional physical wallets, but store cryptocurrency instead of cash and cards.

Characteristics of nodes

Nodes are the fundamental components of a blockchain. They ensure blockchains are decentralized (if applicable), allowing any individual on the planet to participate as a node if they have the will and resources to do so. Since individuals maintain nodes at random, information and data remain democratized and open-sourced.

This helps make crypto a completely independent landscape, maintaining the philosophic integrity that Bitcoin creator Satoshi Nakamoto intended.

Nodes help facilitate every operation on the blockchain, but each node performs a different function. Therefore, different types of nodes exist that serve specific use cases and specialized functions.

Types of nodes

Nodes receive and broadcast transactions across a blockchain to keep it running, but they might differ depending on the blockchain and its function. Here are the three main types of blockchain nodes:

Full nodes

Full nodes contain a full blockchain. Each block on the chain is kept in full nodes. The individuals behind full nodes often have an extensive understanding of the blockchain, making them ideal validators for transactions.

Containing entire blockchains needs a large amount of storage space to hold the blocks. However, blockchain nodes can be "compressed" through pruning, which involves deleting unnecessary surplus data to save storage space. This allows more room for future transactions and faster network speeds.

Light nodes

Light nodes, also called lightweight nodes, don't contain data from the entire history of a blockchain. Instead, they only store a partial set of the data, still ensuring transactions are accurate. Many serve as crypto wallets. Light nodes link to full nodes and act as a bridge between wallets and the blockchain. This provides a straightforward approach to buying, selling, and trading cryptocurrency on a crypto exchange via the blockchain.

Masternodes

Masternodes are similar to full nodes. However, they're solely used to validate and store transactions and can’t contribute new blocks to the blockchain. Masternode owners receive incentives for validating efforts in the form of the blockchain's native cryptocurrency.

Why node size matters

Some centralized blockchains require you to go through a registration process if you want to establish a node. This, some argue, leads to centralization as the only nodes that are run are approved. 

Depending on the blockchain, nodes have different technical requirements. It’s important for decentralization that requirements are not too bulky, as it prevents every day people from running a node. Many have critiqued Solana’s node requirements for being too bulky, meaning the protocol can be construed as more centralized.

How do you run a node?

Remember, you’ll need a good amount of storage, memory, and processing power to run a blockchain node. You’ll also require high internet speeds and the latest operating system version.

Ensure your system can run for a minimum of six hours daily without interruptions. Many operating systems and computer models enter a "low-power" or "sleep" mode to save energy when the system is left idle. Make sure your system has this option turned off and can function for extended periods without overheating or slowing down.

Once you have the proper hardware, you’ll need the appropriate software to run your node. Blockchain nodes don’t come with universally compatible software, so you’ll need to download the software that works on the blockchain you want to run a node on.

Running a node will require considerable space, time, and energy, so plan accordingly.

Wrapping up

Running a node can be a great way to participate in a cryptocurrency’s blockchain, especially if you’re looking for rewards as a miner or a validator. However, mining, staking, and running light nodes all require advanced software and technical know-how to run.

Subscribe to our blog to stay updated on all the latest offers and news from the world of cryptocurrency.

加入真人網路。

取得 World App

Related resources

Crypto Bridge Hacks 101: Types and Causes

Bridges help Web3 users transfer crypto between blockchains, but they're a major target for hackers. Here’s what you need to know about crypto bridge hacks.

What Is Crypto Mining?

Crypto mining is a complex subject and sometimes controversial. Learn what it’s all about and how it works.

What Is a Sybil Attack? A 101 Guide

In a Sybil attack, a person or a bot spoofs a peer-to-peer network with many fake accounts. Learn what a Sybil attack is and how it applies to blockchain technology.

Ethereum 2.0: What Was the Merge?

Many Web3 developers claim Ethereum's Merge is the most significant upgrade in crypto history. So what was the Merge?