Term

Layer-2

Layer-2 solutions build on top of Layer-1 to increase throughput and reduce costs, settling results back to the base chain.

Type:
scaling
architecture
Also known as:
L2
second layer
1
concept

L2s offload execution from L1 while inheriting security properties via proofs or channel mechanisms. Examples include payment channels, rollups, and sidechains with periodic checkpoints.

Example 1.1

"Payment channels like the Lightning Network batch many transfers with final settlement on L1."

Example 1.2

"Rollups post compressed data and validity proofs to L1, scaling throughput while preserving security."

2
tradeoffs

Tradeoffs involve latency, capital lockup, operator trust assumptions, and withdrawal delays. Designs vary in how much they rely on L1 for data availability and fraud/validity proofs.

Example 2.1

"Channels require online availability for dispute windows; rollups impose exit periods to prevent fraud."

Example 2.2

"Sidechains provide fast execution but may rely on separate validator sets and bridges."

All terms and definitions may update as the Cryptionary improves.