diff --git a/ch06.asciidoc b/ch06.asciidoc index bf3a81ef..9dff999b 100644 --- a/ch06.asciidoc +++ b/ch06.asciidoc @@ -251,7 +251,7 @@ The node setting the bloom filter can interactively add patterns to the filter b [[transaction_pools]] === Transaction Pools -((("bitcoin network","transaction pools")))((("transaction pools")))((("transactions","unconfirmed, pools of")))((("unconfirmed transactions")))Almost every node on the bitcoin network maintains a temporary list of unconfirmed transactions called the _memory pool_, or _transaction pool_. Nodes use this pool to keep track of transactions that are known to the network but are not yet included in the blockchain. For example, a node that holds a user's wallet will use the transaction pool to track incoming payments to the user's wallet that have been received on the network but are not yet confirmed. +((("bitcoin network","transaction pools")))((("transaction pools")))((("memory pool")))((("mempool")))((("transactions","unconfirmed, pools of")))((("unconfirmed transactions")))Almost every node on the bitcoin network maintains a temporary list of unconfirmed transactions called the _memory pool_, _mempool_, or _transaction pool_. Nodes use this pool to keep track of transactions that are known to the network but are not yet included in the blockchain. For example, a node that holds a user's wallet will use the transaction pool to track incoming payments to the user's wallet that have been received on the network but are not yet confirmed. As transactions are received and verified, they are added to the transaction pool and relayed to the neighboring nodes to propagate on the network. diff --git a/ch08.asciidoc b/ch08.asciidoc index 3ffa6870..b365e532 100644 --- a/ch08.asciidoc +++ b/ch08.asciidoc @@ -118,7 +118,7 @@ However, before forwarding transactions to its neighbors, every bitcoin node tha These conditions can be seen in detail in the functions +AcceptToMemoryPool+, +CheckTransaction+, and +CheckInputs+ in the bitcoin reference client. Note that the conditions change over time, to address new types of denial-of-service attacks or sometimes to relax the rules so as to include more types of transactions. -By independently verifying each transaction as it is received and before propagating it, every node builds a pool of valid new transactions (the transaction pool), roughly in the same order. +By independently verifying each transaction as it is received and before propagating it, every node builds a pool of valid (but unconfirmed) transactions known as the _transaction pool_, _memory pool_ or _mempool_. === Mining Nodes