When people describe blockchains as decentralized, what they usually mean is that no single server controls the data. But that statement raises an obvious follow-up: if there's no central server, how does information spread?
When you broadcast a transaction from your wallet, it doesn't go to some central authority that forwards it to miners. It enters a peer-to-peer network where thousands of independent computers share data directly with each other. The mechanics of how that actually happens — node discovery, message propagation, connection management — don't get explained often. Most explanations of blockchain skip straight from "decentralized" to "the network confirms your transaction," as if the middle part isn't interesting.
It is. And it matters for understanding what the network's resilience and latency actually depend on.
Bitcoin's network — and most public blockchains that followed — uses a peer-to-peer (P2P) topology. There's no hierarchy. Every full node is, in principle, an equal participant. A node can connect to any other node directly, and typically maintains somewhere between 8 and 125 simultaneous connections.
When a new node comes online for the first time, it faces a bootstrapping problem: how do you find other nodes if you don't know any yet? Bitcoin solves this with DNS seeds — a small set of domain names maintained by trusted contributors that return IP addresses of known active nodes. Once you have a few initial peers, you start building a local address book. Subsequent startups can skip the DNS step and dial previously known peers directly.
After making initial connections, nodes exchange address messages to share what other peers they know about. This is sometimes called peer exchange — essentially, a distributed phone book that spreads organically across the network.
Once connected, nodes communicate using a gossip protocol. When a node learns about a new transaction or block, it tells its peers. Those peers tell their peers. Within seconds, a valid transaction has typically reached most of the network.
The specific mechanism works like this: a node first sends an INV (inventory) message to its peers, advertising that it has a new item — say, a transaction identified by a specific hash. Peers that haven't seen this transaction respond with a GETDATA message requesting the full content. The originating node sends the transaction data. Peers then rebroadcast using the same INV → GETDATA cycle.
This two-step design — announce, then deliver on request — prevents nodes from flooding their peers with duplicate data. If five of your peers already know about a given transaction, only one of them will ask you for the full data; the others recognize they already have it and ignore the announcement.
Blocks propagate the same way, though they're much larger. A full Bitcoin block can be up to 4 MB (with SegWit witness data), and relay latency matters more for blocks than for transactions — the longer it takes a block to reach all miners, the higher the chance of an unnecessary fork where two miners produce competing blocks simultaneously.
The main constraint on propagation speed is bandwidth and latency. Nodes with poor connections slow down whatever path data has to travel through them. The network's effective propagation time depends on the average path length between any two nodes and the quality of the connections along that path.
There's also the problem of eclipse attacks: a targeted attack where an adversary surrounds a specific node with their own controlled peers, preventing it from seeing the honest network. If all of a node's outbound connections go to attacker-controlled nodes, that node can be fed false information about the state of the chain. Bitcoin's defense involves limiting how many connections can come from the same IP range and enforcing minimum diversity among outbound connections.
A related risk is network partitioning — where a segment of the network genuinely can't communicate with another, leading to competing blockchain states. This is mostly theoretical for mature networks with globally distributed nodes, but it's a real concern for smaller or geographically concentrated ones.
The main efficiency improvement in active development for Bitcoin is Erlay (BIP 330), a proposed bandwidth reduction technique. Standard transaction relay, where nodes broadcast INV messages to every peer, consumes substantial bandwidth — even just advertising transaction hashes rather than full data. Erlay proposes using set reconciliation: nodes periodically compare which transactions they each have and exchange only the differences. Early estimates suggest this could reduce transaction relay bandwidth by around 40%.
Compact block relay (BIP 152) is already deployed. Instead of sending full block data when a new block is found, nodes send a compact representation containing short transaction IDs. Receiving nodes reconstruct most of the block from their own mempool, requesting only the missing pieces. This significantly reduces data volume per block and speeds up propagation.
The core gossip protocol itself hasn't changed much since Bitcoin's early years. What's evolving is the efficiency of the announcement layer on top of it.
Erlay adoption would show up as measurable bandwidth reduction for participating nodes. Sustained low orphan rates — blocks produced but not included in the eventual main chain — suggest propagation is working efficiently. Increased node count across diverse geographies indicates a healthier network topology overall.
Sustained high orphan rates would indicate propagation problems at the network level. A documented eclipse attack affecting economically significant nodes would signal that peer diversity requirements aren't sufficient. If Erlay's set reconciliation implementation introduces transaction delays or consensus edge cases, that would slow or halt the rollout.
Now: The gossip protocol and compact block relay are operational infrastructure. Understanding how nodes share data is relevant for anyone running a node or evaluating network-level security claims.
Next: Erlay's deployment timeline is in progress. The improvements are real but incremental — not a step change in how the network fundamentally operates.
Later: Theoretical work on structured overlay networks and topology optimization remains research-stage. Worth monitoring for the technically curious, but nothing actionable in the near term.
This covers how nodes find each other and propagate data. It doesn't address mempool policy decisions — which determine whether a transaction gets relayed in the first place — or how miners select transactions for inclusion in blocks. Those are related but distinct systems.
The P2P layer is the plumbing. Most of the time it works without anyone thinking about it — which is exactly what you want from infrastructure.




