website logo
ConnextBlogBridgeAcademy
⌘K
🚀CONNEXT WIKI
What is Connext?
Connext Bridge
NEXT Token
Supported Chains
Connextscan
FAQs
💢CONNEXT ECOSYSTEM
Connext Team
Backers
🤖ECOSYSTEM ROLES
Community Leaders
Amarok Pilot Dev
Ecosystem
Router Operator
Subgraph Provider
Testers
Connextooor
Bridgooor
Developer
Contributors
Quarantine
Status
🏅ROUTERS
What is a Router?
Router Requirements
Revenue Streams of Routers
Slashing Mechanism
Staking Mechanism
✨TECHNICAL DOCUMENTATION
Introduction
Connext Network
nxtp
🧁PROTOCOL UPDATES
Amarok
💥CONNEXT DAO
💫RESOURCES
Important Links
Brand Kit
Events
Telegram Groups
Newsletter
Docs powered by archbee 
3min

Connext Network

The Connext Network utilizes the nxtp protocol in combination with routers for its liquidity and transport layer. The messaging layer is provided through the partnership with Nomad.

This stack architecture helps Connext to achieve modular interoperability with crosschain communication. 



🔗Core Flow

Transaction lifecycle

🔗Connext vs. XYZ

How Connext differs

🔗Security Model

Connext’s core security model

Updated 22 Apr 2022
Did this page help you?
Yes
No
UP NEXT
Core Flow
Docs powered by archbee 
TABLE OF CONTENTS
🔗Core Flow
🔗Connext vs. XYZ
🔗Security Model