Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Network Upgrade

A network upgrade is a coordinated change to a blockchain's core protocol rules, often requiring a hard fork and consensus among node operators.
Chainscore © 2026
definition
BLOCKCHAIN GOVERNANCE

What is a Network Upgrade?

A network upgrade is a coordinated, non-backward-compatible change to a blockchain's core protocol rules, requiring all participating nodes to update their software to remain in consensus.

In blockchain technology, a network upgrade (often called a hard fork) is a fundamental change to the protocol that introduces new rules or features incompatible with previous versions. This creates a definitive split in the chain's history: nodes that upgrade follow the new rules, while nodes that do not upgrade continue on the old chain, potentially creating two separate networks. Upgrades are used to implement significant improvements such as new consensus mechanisms, enhanced scalability solutions, or novel cryptographic primitives. For example, Ethereum's London upgrade introduced EIP-1559, fundamentally altering its transaction fee market.

The process is governed by a blockchain's specific governance model. In decentralized networks like Bitcoin or Ethereum, upgrades are typically proposed and refined through community discussion and formal improvement proposals (e.g., BIPs or EIPs). Once consensus is reached among core developers, miners/validators, and the broader community, an activation block height or timestamp is set. All node operators must install the new client software before this point to avoid being orphaned from the canonical chain. This contrasts with a soft fork, which is a backward-compatible upgrade.

Successful execution requires near-universal adoption by the network's hash power (Proof-of-Work) or stake (Proof-of-Stake). A contentious upgrade without sufficient consensus can lead to a chain split, where the original chain and the new chain persist independently, as seen with Ethereum and Ethereum Classic. Network upgrades are critical for the evolution of blockchain protocols, enabling them to fix security vulnerabilities, improve efficiency, and add functionality without requiring developers to build an entirely new network from scratch.

key-features
CONSENSUS & GOVERNANCE

Key Features of a Network Upgrade

A network upgrade is a coordinated change to a blockchain's core protocol, typically involving modifications to its consensus rules, transaction processing, or cryptographic primitives.

01

Hard Fork

A hard fork is a permanent divergence in the blockchain's protocol that creates two separate networks. It introduces new rules that are incompatible with previous versions, requiring all nodes to upgrade to continue participating in the new chain. Examples include Ethereum's London Upgrade (EIP-1559) and Bitcoin's SegWit activation. It is often used for major feature additions or security fixes.

02

Soft Fork

A soft fork is a backward-compatible upgrade where new rules are a subset of the old rules. Non-upgraded nodes can still validate new blocks, though they may not understand all new features. It is achieved by tightening the rule set. A classic example is Bitcoin's Pay-to-Script-Hash (P2SH) implementation. Soft forks require only a majority of miners to upgrade, not all nodes.

03

Activation Mechanism

This defines the process by which new protocol rules become active. Common mechanisms include:

  • Miner/Signer Activation: A specified percentage of blocks must signal readiness.
  • Time-based Activation: Rules activate at a predetermined block height or timestamp.
  • Flag Day Activation: A fixed date set by developers, requiring node operators to upgrade by then. These mechanisms coordinate the network's transition to the new state.
04

Backward Compatibility

A critical design consideration determining if old software can interact with the new network. Soft forks maintain backward compatibility, while hard forks break it. Maintaining compatibility reduces network fragmentation and user disruption but can limit the scope of changes. The choice impacts the required coordination effort and the risk of chain splits.

05

Governance & Coordination

The social process of proposing, debating, and approving an upgrade. It involves multiple stakeholders:

  • Core Developers: Propose and implement code changes.
  • Miners/Validators: Signal support and run the new software.
  • Node Operators: Must upgrade their clients.
  • Token Holders: May vote in on-chain governance systems (e.g., in Proof-of-Stake networks). Effective coordination is essential to avoid chain splits.
how-it-works
PROTOCOL EVOLUTION

How a Network Upgrade Works

A network upgrade is a coordinated, consensus-driven process for modifying the core rules of a blockchain protocol, introducing new features, fixing bugs, or improving performance.

A network upgrade (also known as a hard fork or soft fork) is a planned, protocol-level change that alters the rules governing how a blockchain validates transactions and creates new blocks. This process is initiated through a Blockchain Improvement Proposal (BIP) or Ethereum Improvement Proposal (EIP), which details the technical specifications and rationale for the change. Once a proposal gains sufficient community and developer consensus, a specific block height or timestamp is set as the activation trigger for the new rules to take effect across the entire network.

The execution of an upgrade depends on its type. A hard fork is a backwards-incompatible change; nodes that do not upgrade to the new client software will be unable to validate blocks created under the new rules, resulting in a permanent divergence or split. In contrast, a soft fork is backwards-compatible; non-upgraded nodes can still validate transactions, but they may be unable to propose new blocks. Major upgrades, such as Ethereum's London hard fork (which introduced EIP-1559) or Bitcoin's Taproot upgrade, require extensive coordination among node operators, miners/validators, and wallet providers to ensure a smooth transition.

For the upgrade to succeed, a super-majority of the network's hash power (for Proof-of-Work) or staked tokens (for Proof-of-Stake) must adopt the new client software before the activation point. This ensures the network continues to produce a single, canonical chain. If consensus is not reached, it can lead to a chain split, creating two separate blockchains, as seen with Ethereum and Ethereum Classic. Post-upgrade, developers monitor the network for stability, and ecosystem projects update their infrastructure to remain compatible with the new protocol rules.

types-of-upgrades
CATEGORIES

Types of Network Upgrades

Blockchain networks evolve through different types of upgrades, each with distinct technical characteristics, governance requirements, and impacts on the protocol's state and consensus.

01

Hard Fork

A hard fork is a permanent divergence from the previous version of a blockchain, creating two separate networks. It introduces backward-incompatible changes to the protocol's consensus rules. Nodes that do not upgrade to the new rules will be unable to validate blocks on the upgraded chain, resulting in a permanent split.

  • Examples: Ethereum's London Upgrade (EIP-1559), Bitcoin Cash's split from Bitcoin.
  • Impact: Can create a new, separate cryptocurrency if a significant portion of the network rejects the upgrade.
02

Soft Fork

A soft fork is a backward-compatible upgrade that tightens the consensus rules. Nodes running the older software version will still see new blocks as valid, as long as they adhere to the stricter subset of rules. It requires only a majority of miners or validators to upgrade to enforce the new rules.

  • Examples: Bitcoin's Segregated Witness (SegWit) upgrade, which was a soft fork.
  • Key Feature: Avoids a chain split, as non-upgraded nodes remain on the same chain but cannot produce new blocks that violate the stricter rules.
03

Activation Mechanisms

Upgrades are deployed via specific activation mechanisms that define how and when the new rules become active on the network, ensuring a coordinated transition.

  • Block Height Activation: The upgrade activates at a predetermined block number (e.g., Bitcoin halvings).
  • Time-Based Activation: The upgrade activates at a specific timestamp.
  • Flag Day Activation: A fixed date is set for the upgrade to become mandatory.
  • Miners/Validator Signaling: A threshold of hash power or stake must signal readiness before activation (e.g., Bitcoin's BIP 9).
04

Scheduled Upgrades

Scheduled upgrades (or planned hard forks) are pre-coordinated, non-contentious protocol improvements that are agreed upon by the core development community and ecosystem stakeholders. They are typically bundled into a single release and activated at a pre-defined point in the future.

  • Purpose: Introduce new features, improve performance, or implement pre-defined technical roadmaps.
  • Governance: Follows the established governance process of the protocol (e.g., Ethereum Improvement Proposals - EIPs).
  • Examples: Ethereum's regular network upgrades (Shanghai, Cancun, Dencun).
05

Contentious Fork

A contentious fork occurs when a proposed upgrade creates a fundamental disagreement within the community regarding the protocol's direction, often leading to a permanent chain split. This is a social and governance event, not a technical category.

  • Causes: Disputes over block size, monetary policy, or core philosophical principles.
  • Outcome: Results in two competing blockchains and cryptocurrencies, each with its own community and development roadmap.
  • Examples: Ethereum Classic (split from Ethereum post-DAO hack), Bitcoin Cash (split from Bitcoin over block size).
06

State & Consensus Changes

Upgrades can be categorized by what they modify in the protocol's core logic.

  • Consensus Rule Changes: Alter the rules for validating transactions and producing blocks (e.g., proof-of-stake transition, difficulty adjustment). These often require a hard or soft fork.
  • State Transition Changes: Modify how the protocol's state is updated (e.g., changing gas costs, introducing new opcodes).
  • Execution Layer Changes: Upgrades to the Virtual Machine or transaction processing logic (common in Ethereum EIPs).
  • Social Consensus: The most critical layer, requiring broad agreement from users, node operators, and developers.
NETWORK UPGRADE TYPES

Hard Fork vs. Soft Fork

A comparison of the two primary mechanisms for implementing protocol changes in a blockchain network.

FeatureHard ForkSoft Fork

Backward Compatibility

Node Upgrade Requirement

Mandatory for all nodes

Only required for validating new rules

Network Split Risk

High (creates a new chain)

Low (if majority adopts)

Rule Change Type

Relaxing or changing rules

Tightening existing rules

Consensus Mechanism

Requires majority economic/mining support

Requires majority hash power

Example

Ethereum London Upgrade (EIP-1559)

Bitcoin SegWit activation (BIP 141)

Typical Use Case

Major protocol changes, new features

Bug fixes, minor rule adjustments

ecosystem-usage
HISTORICAL MILESTONES

Examples of Major Network Upgrades

Network upgrades are pivotal events where a blockchain's core protocol is modified through a coordinated hard fork. These examples demonstrate how upgrades address scalability, security, and functionality.

governance-mechanisms
GOVERNANCE & COORDINATION

Network Upgrade

A network upgrade is a coordinated, protocol-level change to a blockchain's core software, requiring consensus among node operators to activate new features, fix bugs, or improve performance.

A network upgrade is a planned, non-backward-compatible change to a blockchain's consensus rules or state transition function, implemented through a coordinated software update. Unlike a simple client patch, an upgrade modifies the fundamental protocol, meaning nodes running the old software will be unable to validate blocks produced under the new rules, creating a hard fork. Successful execution requires a critical mass of network participants—miners, validators, and node operators—to adopt the new client software before a predefined activation block height or epoch.

The governance process preceding an upgrade is critical. Proposals typically originate from core developers, are debated within the community and on-chain governance systems, and are formally specified in an Ethereum Improvement Proposal (EIP), Bitcoin Improvement Proposal (BIP), or equivalent. For permissionless networks, upgrades rely on voluntary adoption, creating a coordination game where the economic majority must signal readiness. Failure to coordinate can result in a chain split, where the network permanently diverges into two separate blockchains, as historically seen with Ethereum and Ethereum Classic.

Upgrades are categorized by their scope and impact. A hard fork introduces breaking changes, while a soft fork tightens rules in a backward-compatible way. Major upgrades often bundle multiple changes; for example, Ethereum's London upgrade introduced EIP-1559's fee market change and the Ice Age difficulty bomb delay. The upgrade process is managed through client teams like Geth, Erigon, or Lighthouse, which release software implementing the new consensus rules, and is often preceded by extensive testing on testnets like Goerli or Sepolia.

The technical mechanism for activation varies. Proof-of-Work chains like Bitcoin historically used miner signaling, where blocks include a version bit to indicate readiness. Proof-of-Stake chains like Ethereum use epoch-based activation, where the upgrade triggers once a supermajority of validators have updated their client software. Some networks employ flag day upgrades, where the change activates at a specific time regardless of node adoption, which carries a higher risk of chain splits if consensus is not achieved.

For developers and users, network upgrades necessitate preparation. Smart contract developers must audit code for compatibility with new EVM opcodes or precompiled contracts. DApp front-ends and infrastructure providers like block explorers and RPC nodes must update their services. End-users typically only need to ensure their wallet software is updated, though they should be aware of potential temporary network instability during the transition period surrounding the activation block.

security-considerations
NETWORK UPGRADE

Security & Coordination Risks

Network upgrades are critical, planned changes to a blockchain's protocol that introduce new features, fix bugs, or improve performance. They present unique challenges in security validation and achieving decentralized consensus among node operators.

01

Hard Fork Coordination

A hard fork is a backward-incompatible upgrade that requires all node operators to update their software to the new rules. The primary risk is a chain split, where non-upgraded nodes continue following the old chain, creating two separate networks. Successful coordination requires overwhelming consensus from miners/validators, exchanges, and application developers to adopt the new chain, as seen in Ethereum's transition to Proof-of-Stake (The Merge).

02

Soft Fork Activation

A soft fork is a backward-compatible upgrade where new rules are a subset of the old rules. Non-upgraded nodes can still validate blocks but may not understand new transaction types. Activation mechanisms like BIP 9 (version bits) or MASF ( Miner Activated Soft Fork) require a supermajority of hash power to signal readiness. The key risk is inadvertent chain splits if activation thresholds are not met cleanly or if there is significant opposition from a mining minority.

03

Governance & Social Consensus

Before code is written, upgrades require social consensus from the decentralized community. This involves proposals, discussions on forums, and signaling by stakeholders. Risks include:

  • Governance attacks: Concentrated entities influencing the process.
  • Controversial changes: Contentious upgrades (e.g., block size increases) can fracture communities.
  • Implementation drift: Different client teams (like Geth and Nethermind for Ethereum) must independently implement specs correctly and simultaneously.
04

Security Audits & Bug Bounties

Upgrade code must undergo rigorous security audits by multiple independent firms to identify vulnerabilities in new consensus rules or cryptographic primitives. Bug bounty programs incentivize white-hat hackers to find flaws before launch. A critical failure, like the 2010 Bitcoin value overflow incident, could be catastrophic. The process is time-consuming and expensive but non-negotiable for mainnet deployments.

05

Node Operator Adoption

The upgrade's success depends on node operator adoption. If a critical mass of miners, validators, and full nodes does not upgrade in time, the network can stall or split. Challenges include:

  • Operational complexity: Manual updates for thousands of nodes.
  • Dependency management: Ensuring compatibility with infrastructure and tooling.
  • Grace periods: Networks use activation epochs or block heights to give operators a deadline, but late adopters risk being orphaned.
06

Post-Upgrade Monitoring

After activation, the network enters a critical monitoring phase. Developers watch for:

  • Chain stability: Ensuring block production/validation continues smoothly.
  • Performance metrics: Checking for unintended impacts on throughput or latency.
  • Economic security: Monitoring validator participation rates and slashing events in Proof-of-Stake systems. Emergency procedures or rollback plans must be prepared in case a critical bug is discovered post-launch.
NETWORK UPGRADES

Common Misconceptions

Clarifying frequent misunderstandings about the processes and implications of blockchain protocol changes.

A hard fork is a permanent divergence in a blockchain's protocol that makes previously invalid blocks and transactions valid, requiring all nodes to upgrade to the new rules. It does not inherently create a new coin; a new cryptocurrency is only created if a subset of the community continues to operate the old chain, resulting in a chain split. For example, Ethereum's London upgrade was a planned hard fork that did not create a new asset, whereas the Ethereum Classic split was a contentious hard fork that did. The creation of a new asset is a social and economic outcome, not a technical inevitability of the fork itself.

NETWORK UPGRADE

Frequently Asked Questions

Essential questions and answers about blockchain network upgrades, including hard forks, soft forks, and their impact on nodes, users, and applications.

A hard fork is a permanent divergence in a blockchain's protocol that creates two separate, incompatible chains, requiring all network nodes and users to upgrade their software to the new rules to remain on the canonical chain. It introduces backward-incompatible changes, such as altering block size, consensus mechanism, or adding new opcodes. Nodes that do not upgrade are rejected by the upgraded network. Hard forks are used for major protocol improvements (e.g., Ethereum's London upgrade introducing EIP-1559) or to create entirely new cryptocurrencies (e.g., Ethereum Classic splitting from Ethereum). They require broad community coordination and carry a risk of chain splits if consensus is not achieved.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Network Upgrade: Definition & Blockchain Protocol Changes | ChainScore Glossary