Node Types in the ISBE Network
The ISBE network is based on Hyperledger Besu and uses a defined set of nodes with differentiated roles. This separation ensures consensus stability, permissioning control, and use case operability.
This document describes the types of nodes present in ISBE environments (dev, pre, and pro) and their role within the network.
1. Overview
In the ISBE network, there are three main categories of nodes:
-
Validator nodes
Maintain IBFT 2.0 consensus and generate blocks. -
Permissioner nodes / bootnodes
Control entry authorizations to the P2P network. -
Regular nodes
Nodes used by use cases to interact with the network.
All nodes operate under the Hyperledger Besu client, with the same version and base configuration, changing only their functional role.
2. Validator Nodes
Validator nodes are responsible for:
- Executing IBFT 2.0 consensus.
- Proposing and validating blocks.
- Ensuring global network state consistency.
- Maintaining ledger availability and reliability.
Key Features
- They do not expose RPC for general use.
- They do not allow contract deployment or transaction execution from external applications.
- They are managed exclusively by the ISBE technical team.
- Their number is limited and stable over time to ensure controlled and predictable consensus.
What This Implies for Use Cases
Use cases do not interact directly with validators. The existence of these nodes is transparent, but critical for:
- Block time stability.
- Deterministic transaction confirmation.
- Absence of deep reorganizations.
3. Permissioner Nodes (Bootnodes)
Permissioner nodes maintain:
- The official list of authorized nodes to participate in the P2P network.
- Information on enodes, libp2p addresses, and metadata necessary for connection.
- The minimum topology structure required for the network to function correctly.
Specific Functions
- Verifying that the node wanting to join is authorized.
- Publishing discovery information for new nodes.
- Preventing unauthorized nodes from entering the network.
What They Imply for Use Cases
Use case teams:
- Never interact directly with permissioners.
- Only need to follow the
solicitud-permisionado.mdprocedure if they wish to set up their own regular node. - In most scenarios, they will use regular nodes managed by ISBE, without needing to go through the permissioning process.
4. Regular Nodes
Regular nodes are the natural interaction point for use cases.
They allow standard Ethereum ecosystem operations:
- State reading.
- Sending transactions.
- Event listening via WebSocket.
- Smart contract deployment.
Operational Features
- Run exactly the same Besu client as validators, but without a consensus role.
- Can be operated:
- By the use case itself (dedicated node).
- By ISBE (shared node for several teams).
- Expose JSON-RPC and WebSocket endpoints.
- Can connect via HTTP(s) or WSS depending on environment configuration.
Variable Use Case Parameters
If a use case deploys its own node, it must provide in the permissioning process:
- Node public IP:
<NODE_IP> - Node name:
<Node_Name> - Enode generated by Besu
When It Is Advisable to Have Your Own Regular Node
It can be recommended if:
- The use case generates high traffic.
- Intensive real-time events are needed.
- A higher level of isolation must be guaranteed.
- The team wants to fully monitor its transactions and local state storage.
In simpler cases, the shared node provided by ISBE is sufficient.
5. Observer Nodes (if enabled)
In some Besu deployments, "observer" or "read-only" nodes are enabled, whose purpose is:
- Consulting state without exposing writing.
- Mirroring blockchain information for analysis, audits, or dashboards.
In ISBE, these nodes are not part of the standard operation, but they could be enabled in scenarios of:
- Advanced monitoring.
- Analytical services with a high volume of queries.
- State reproduction outside the main cluster.
6. Comparative Summary
| Node Type | Main Role | RPC Exposure | Operator | Use by Use Cases |
|---|---|---|---|---|
| Validator | IBFT consensus, block generation | No | ISBE Team | No |
| Permissioner | P2P access control | Limited | ISBE Team | No |
| Regular | Blockchain read/write | Yes | ISBE / Participant | Yes |
| Observer | Intensive read (optional) | Yes (read-only) | ISBE / Participant | Optional |