A comprehensive reference to rollups, bridges, and the architecture of blockchain scalability
Introduction to Layer 2
Layer 2 (L2) refers to a secondary framework or protocol built on top of an existing blockchain system (Layer 1). The primary purpose of these protocols is to solve the transaction speed and scaling difficulties faced by major cryptocurrency networks. By moving a portion of transactional throughput off-chain, Layer 2 solutions inherit the security guarantees of the underlying Layer 1 while dramatically increasing capacity.
The fundamental insight behind Layer 2 scaling is that not every transaction needs to be individually validated by every node on the base chain. Instead, transactions can be processed in bulk off-chain, with only a compressed summary or cryptographic proof submitted to Layer 1 for final settlement. This architectural pattern reduces congestion, lowers gas fees, and enables blockchain technology to serve applications requiring high throughput.
This wiki serves as a comprehensive reference for understanding the different categories of Layer 2 solutions, their trade-offs, security assumptions, and the emerging landscape of multi-layer blockchain architecture.
The Scaling Problem
Ethereum's base layer processes approximately 0 transactions per second (TPS). By comparison, traditional payment networks like Visa handle over 0 TPS at peak capacity. This disparity — known as the scalability trilemma — arises because increasing throughput on a decentralized network typically requires sacrificing either security or decentralization.
The trilemma posits that a blockchain can optimize for at most two of three properties: decentralization, security, and scalability. Layer 2 solutions attempt to circumvent this constraint by anchoring security to the base layer while executing transactions in a separate, higher-throughput environment.
L1 — Settlement Layer
The base chain provides consensus finality and data availability. Every full node validates the canonical state. Transaction capacity is deliberately limited to maintain decentralization: the computational cost of validating blocks must remain accessible to consumer hardware.
L2 — Execution Layer
Layer 2 protocols move transaction execution off the base chain. Users interact with the L2 environment (submitting transactions, deploying contracts), while the L2 operator periodically commits compressed state updates back to L1. The security of user funds depends on the specific mechanism by which L1 can verify L2 state transitions.
Rollups Overview
Rollups are the dominant Layer 2 scaling paradigm. They execute transactions off-chain but post transaction data (or compressed state diffs) to Layer 1, inheriting its security guarantees. The term "rollup" refers to the process of rolling up hundreds or thousands of transactions into a single batch that is then committed to the base chain.
All rollup designs share a common architecture: an off-chain execution environment where transactions are processed, a sequencer that orders and batches transactions, and a smart contract on L1 (the rollup contract) that verifies state transitions and stores compressed data. The two major categories differ in how they prove correctness to L1.
Property
Optimistic Rollups
ZK Rollups
Proof mechanism
Fraud proofs (dispute period)
Validity proofs (cryptographic)
Withdrawal time
~7 days (challenge window)
Minutes (after proof verification)
Computation cost
Low (off-chain only)
High (proof generation)
EVM compatibility
Full (EVM-equivalent)
Partial to full (zkEVM)
Data posted to L1
Full transaction data
State diffs + validity proof
Optimistic Rollups
Optimistic rollups operate under an optimistic assumption: all submitted state transitions are presumed valid unless challenged. The system relies on a dispute resolution mechanism — fraud proofs — to detect and penalize invalid state claims. Any observer can submit a fraud proof during a challenge window (typically 0 days), causing the invalid batch to be reverted and the malicious operator to be slashed.
This model is called "optimistic" because the system optimistically accepts all state transitions, only reverting them if a verifier can demonstrate fraud. The key advantage is simplicity: no complex cryptographic proofs are needed for normal operation. The trade-off is the mandatory withdrawal delay, which prevents users from rapidly moving funds back to L1.
Major optimistic rollup implementations include Optimism (using the OP Stack) and Arbitrum (using Nitro). Both have achieved significant adoption and are evolving toward decentralized sequencing and multi-proof verification systems.
ZK Rollups
Zero-Knowledge rollups (ZK rollups) use validity proofs — cryptographic proofs that mathematically guarantee the correctness of off-chain state transitions without revealing the underlying data. Rather than assuming honesty and relying on dispute mechanisms, ZK rollups prove every batch is correct before it is accepted by the L1 contract.
The primary advantage of ZK rollups is immediate finality: once a validity proof is verified on L1, the state transition is irrefutably correct. There is no challenge period. This enables fast withdrawals and stronger security guarantees. The trade-off is computational complexity — generating ZK proofs (particularly for general-purpose computation via zkEVM) requires significant prover resources.
Notable ZK rollup projects include zkSync Era, StarkNet (using STARKs), Polygon zkEVM, and Scroll. The field is rapidly advancing toward full EVM equivalence, where any existing Ethereum smart contract can run on a ZK rollup without modification.
Cross-Chain Bridges
Bridges are protocols that enable the transfer of assets and data between distinct blockchain networks. In the Layer 2 context, bridges are essential infrastructure connecting L1 to various L2 environments, as well as connecting different L2 chains to each other. Each bridge design represents a different set of trade-offs between speed, security, and trust assumptions.
The canonical bridge model follows a lock-and-mint pattern: assets are locked in a smart contract on the source chain, and equivalent wrapped tokens are minted on the destination chain. When the user wishes to return, the wrapped tokens are burned and the original assets are unlocked. Variations include liquidity networks (using pre-funded pools on both sides) and message-passing bridges (relaying arbitrary calldata between chains).
Bridge security remains one of the most challenging problems in the L2 ecosystem. Bridges have been the target of several high-profile exploits, often involving compromised validator sets or vulnerabilities in the bridge contract logic. The industry is moving toward trust-minimized bridges that leverage ZK proofs or optimistic verification to reduce reliance on honest-majority assumptions.
Sidechains
Sidechains are independent blockchains that run parallel to the main chain, connected via a two-way bridge. Unlike rollups, sidechains have their own consensus mechanism and validator set, which means they do not inherit the security of the Layer 1 chain. This distinction is architecturally significant: a sidechain's security is only as strong as its own validator set.
The most well-known sidechain is Polygon PoS (formerly Matic), which operates a Proof-of-Stake network with its own validator set but checkpoints state to Ethereum periodically. Other examples include Gnosis Chain (formerly xDai) and various application-specific sidechains. While sidechains offer high throughput and low fees, their weaker security guarantees have led the ecosystem to increasingly favor rollup-based architectures for high-value applications.
Security Models
The security of a Layer 2 solution is fundamentally determined by how it proves the correctness of off-chain state transitions to the base layer. Understanding these security models is essential for evaluating the trust assumptions of any L2 protocol.
Optimistic Security
Relies on at least one honest verifier to detect fraud. Security assumption: during the challenge period, at least one participant will submit a fraud proof if an invalid state transition is posted. This is a 1-of-N trust model — the system is secure as long as a single honest party is watching.
Validity Proof Security
Relies on mathematical certainty. Every batch includes a cryptographic proof that the L1 verifier contract can check. No trust in external parties is required — the proof itself is the guarantee. This is the strongest security model, equivalent to L1 security minus any bugs in the proof system or verifier contract.
Sidechain Security
Relies on an honest-majority validator set. If more than two-thirds of sidechain validators collude or are compromised, funds can be stolen. This is an N/3 + 1 trust model — weaker than either rollup model, as it does not inherit L1 security.
Future of Layer 2
The Layer 2 landscape is evolving rapidly toward a multi-rollup future. Several key developments are shaping the next phase of scaling:
Decentralized Sequencing
Current rollups rely on centralized sequencers operated by the rollup team. The next generation is building shared sequencing networks — decentralized protocols where multiple sequencers compete to order transactions, eliminating single points of failure and reducing censorship risk.
EIP-4844 and Proto-Danksharding
Ethereum's EIP-4844 introduces blob transactions — a new data type optimized for rollup data posting. Blobs provide cheaper data availability on L1, reducing rollup operating costs by an estimated 0%. This is the first step toward full Danksharding, which will further increase L1 data capacity.
Layer 3 and App-Specific Chains
Building on the rollup primitive, Layer 3 refers to application-specific chains that settle on a Layer 2 rather than directly on L1. This creates a recursive scaling architecture: L3 settles on L2, L2 settles on L1, each layer optimizing for different properties (cost, latency, security).
Cross-Rollup Interoperability
As the number of rollups grows, seamless cross-rollup communication becomes critical. Projects are developing shared bridge standards, atomic cross-rollup transactions, and unified liquidity layers to prevent fragmentation of the multi-rollup ecosystem.