Too Long; Didn't Read
This is Part 2 of an introduction to the <a href="https://ipfs.io/ipfs/QmUy4jh5mGNZvLkjies1RWM4YuvJh5o2FYopNPVYwrRVGV" target="_blank">Avalanche Protocol</a>. Part 1 looked at what Avalanche is, what it is trying to achieve and the assumptions and guarantees Team Rocket outline. It can be found <a href="https://medium.com/@flatoutcrypto/protocol-spotlight-avalanche-3f5dfd366a26" target="_blank">here</a>. I will now look at the <a href="https://hackernoon.com/tagged/protocols" target="_blank">protocols</a> that make up the Avalanche family and how they come together to form the leaderless protocol Avalanche.