Comment on page


Zentanode is not different than a node, a device, or a data point in the Zentamesh.


Zentanodes are Zentachain's own nodes for offline communication through Zentamesh. Using a mesh topology, Zentamesh relays data from node to node. A Zentanode can be viewed as a node, a device, or a data point in a network. Nodes are also active network components like cell phones, routers, switches, bridges, and gateways. A unique Hash-Id is assigned to each node. Any mobile phone, tablet, or computer using the Zentalk messenger application functions as a node within Zentamesh.


‌Zentagate runs the service that allows data and transactions to be routed in the network with a node and allows the user to stay connected without internet access. It ensures extra encryption by AES and an anti-hack layer, to provide the user is engaged and secured safely. The gateway connects to the ecosystem for the usage of the Zentamesh such as the Internet. All Zentanodes in the network can also act as their Gateway to expand the network. Since each node owner has its own ID, they can isolate their node with a pin code to connect to their nodes.


The root node is the top node in the network and serves as the only interface between the Zentamesh and an external IP network which is protected with the Tor Network. Once the root node has connected to the router, idle nodes in the range of the root node will begin connecting with the root node thereby, forming the second layer of the network.
The root node can also be designated by a user which will entail the designated root node to directly connect with the router and forgo the election process. When the root node is designated, all other nodes within the network must also forget the election process to prevent the occurrence of a root node conflict.

Beacon Layer

Beacons are packets that are regularly announced by nodes and unprovisioned devices. The mesh beacon payload is contained in a Bluetooth GAP AD type called mesh beacon AD type. More information about AD types in general can be found in the Bluetooth Core Specification Supplement.
Currently, two types of mesh beacons are defined: Unprovisioned Device Beacon and Secure Network Beacon. The Unprovisioned Device Beacon allows a provisioner to discover the device and initiate the provisioning process.
The Secure Network Beacon is used to indicate the security status of a node with respect to a particular subnet to which the node belongs, in terms of the IV Update and Key Refresh security procedures.

Hop Latency

No of Hops from Root
Throughput (Mbps)
Bridge Delay (ms)
54 Mbps
1 ms
54 Mbps
2 ms
54 Mbps
3 ms
54 Mbps
4 ms

Scalability & Functionality

Zentanodes serve as the cornerstone of Zentamesh, Zentachain's innovative network designed for secure, offline communication. Acting as individual nodes within the network, these vital hardware components are more than mere data relay points; they form the fundamental infrastructure that ensures the network's scalability, resilience, and reach.
Each Zentanode is an active participant in the network's mesh topology, capable of linking an array of devices such as mobile phones, routers, switches, and gateways. This broad compatibility highlights the flexibility and adaptability of the Zentanode, accommodating diverse user requirements and varying technological contexts. To maintain distinct identification within the network, every Zentanode is assigned a unique Hash-Id, emphasizing the network's commitment to security and precision.
Scalability lies at the heart of the Zentanode design philosophy. With each new Zentanode addition, the Zentamesh network's coverage area expands, effectively turning scalability from a challenge into an asset. Moreover, every new node increases the number of potential data transmission paths or "hops," adding a layer of redundancy and resilience to the network. This decentralization fortifies the system against potential single points of failure and ensures reliable data transfer even as the network grows.
In synergy with the Zentalk messenger application, any device—whether a mobile phone, tablet, or computer—can function as a Zentanode. This level of integration allows the network to benefit from an ever-expanding user base, fueling its growth and reinforcing its reach.
In conclusion, the Zentanode is more than a hardware component; it's a catalyst for the network's growth, adaptability, and high performance. By ensuring that the Zentamesh network can effortlessly scale with increasing demand, the Zentanode contributes to the evolution of the network, making scalability not just a consistent strength but a defining feature.

Real-World Applications

Zentachain's potential extends to various practical applications due to its encrypted, decentralized, and offline communication capabilities. This flexibility can revolutionize several sectors, offering potential solutions for numerous real-world scenarios:
  1. 1.
    Telecommunications: Zentachain can offer a robust alternative to traditional networks, which may be susceptible to various disruptions. With Zentanodes and Zentagates forming a resilient mesh network, connectivity can be preserved even when conventional networks fail.
  2. 2.
    Emergency Services: In natural disasters such as earthquakes, conventional communication infrastructures may become inoperative. Zentachain can provide a vital lifeline in these scenarios, enabling emergency response teams to communicate and coordinate efforts through the mesh network.
  3. 3.
    Secure Business Communications: Zentachain can be a valuable tool for businesses handling sensitive information, providing a platform for secure, encrypted communications, transactions, and confidential data transfers.
  4. 4.
    IoT Integration: Zentachain's ability to handle a large number of nodes makes it an ideal solution for the Internet of Things (IoT), where secure, reliable, and scalable connectivity is required.
  5. 5.
    Rural Connectivity: For areas with limited or no access to traditional internet services, Zentachain can provide an alternative means of communication, enabling access to digital services in remote or rural locations.
  6. 6.
    Financial Services: With compatibility for transactions involving various cryptocurrencies, Zentachain offers a secure, user-friendly platform for digital asset management and financial transactions.
  7. 7.
    Event Management: In large-scale events, traditional cellular networks can become overloaded. Zentachain can offer an alternative communication network, allowing attendees, vendors, and security staff to communicate effectively.
  8. 8.
    GPS Tracking: Zentachain's network can provide a platform for secure GPS tracking. This could have numerous applications, from logistics and delivery services to wildlife tracking and outdoor recreation.
  9. 9.
    Earthquake Monitoring: Zentachain could be used to create a decentralized network of seismic sensors, providing real-time data and enabling faster response times in the event of an earthquake.
These examples illustrate Zentachain's expansive range of applications. With potential uses in sectors like telecommunications, emergency services, business communications, IoT, rural connectivity, financial services, event management, GPS tracking, and even earthquake monitoring, it's clear that we at Zentachain is set to make a significant impact in various fields.

Development & Maintenance

Keeping the Zentamesh network and Zentanode devices functioning optimally is a task that the Zentachain team takes very seriously. A dedicated group of developers is always at work, ensuring the smooth operation and continuous improvement of the network and devices.
The team has developed the Zentanode Updater, a convenient software tool, to simplify the update process. Users can connect their Zentanode devices via USB and follow an intuitive process to update their software to the latest version. This approach ensures Zentanodes always have the most recent features and security measures, and it is straightforward enough for any user to handle.
In terms of bug fixes and network issues, the mesh structure of Zentamesh helps to significantly reduce potential problems. Mesh networks, due to their decentralized design and lack of a single point of failure, are inherently robust and resilient to many common network issues. Most issues that do arise tend to be associated with the framework or APIs rather than the mesh network itself.
However, in the event of a bug or network issue, the Zentachain team has the expertise to respond swiftly and effectively. The team can quickly diagnose and address any issues, with patches distributed through the Zentanode Updater to minimize disruption to users. Their proactive approach to maintaining and updating the network and devices ensures Zentamesh and Zentanode continue to provide reliable, secure, and efficient communication tools for users.


The Zentanode process flow is a complex, multi-step procedure that involves multiple components, including the root node, gateways, additional nodes, and data transmission. Here is a detailed description of each step of the process:
  1. 1.
    Zentanode Device Start: The process begins when a Zentanode device is powered on. The starting device, by default, becomes the root node of the network, serving as the primary interface with the external internet.
  2. 2.
    Root Node: As the initial node of the network, the root node plays a critical role in establishing the foundation of the Zentamesh network.
  3. 3.
    Establish Gateway: Following its designation as the root node, the device establishes a gateway. This critical step allows connectivity for additional nodes within the network, ensuring data can be relayed across the network seamlessly.
  4. 4.
    Zentamesh Network Formation: With the root node and gateway in place, the formation of the Zentamesh network begins. This involves the addition of extra nodes to the network, extending its reach and capacity.
  5. 5.
    Add Zentanode: Additional Zentanodes are added to the network, each contributing to the overall network capacity and range. These nodes also initiate the process of message transmission.
  6. 6.
    Message Transmission: Once a node is added to the network, it can begin to send and receive encrypted messages.
  7. 7.
    Encrypt and Send Message: Messages to be transmitted over the network are first encrypted, providing a secure layer of protection for data in transit. These encrypted messages are then sent across the network.
  8. 8.
    Decrypt and Receive Message: Upon receipt, the encrypted messages are decrypted by the receiving node. This ensures that the content of the message remains secure until it reaches its intended recipient.
  9. 9.
    Expand Network: As more nodes are added to the network, its range and capacity increase. This growth in network size is accommodated by the addition of new nodes, extending the network's reach.
  10. 10.
    Add Zentanode: The ongoing expansion of the network involves the continued addition of Zentanodes. These additional nodes increase the network's range, allowing for more extensive and efficient data transmission.
This detailed description of the process should provide a solid understanding of how Zentanodes operate within the Zentamesh network. With each step, from the establishment of the root node to the continuous expansion of the network, the Zentamesh network ensures secure, efficient, and extensive data transmission.