AMM

AMM: Automated Market Making

Automated Market Makers use mathematical formulas to price assets and facilitate trading without traditional order books. They're like vending machines for cryptocurrency trading.

An Automated Market Maker (AMM) is a decentralized exchange mechanism that uses mathematical algorithms to price assets and facilitate trading through liquidity pools instead of order books. AMMs enable constant liquidity availability for supported trading pairs.

How AMMs Work

Liquidity pools contain reserves of two or more tokens that traders can swap against using predetermined mathematical formulas.

Pricing algorithms like the constant product formula (x * y = k) automatically adjust prices based on pool ratios and trade sizes.

Liquidity providers deposit tokens into pools and earn fees from trades proportional to their share of total pool liquidity.

[IMAGE: AMM mechanism showing liquidity pools → mathematical pricing → automatic trades → fee distribution to providers]

Real-World Examples

  • Uniswap popularized the constant product AMM model and dominates Ethereum DEX trading
  • Curve Finance specializes in stablecoin trading with low-slippage algorithms
  • Balancer enables pools with multiple tokens and customizable weight ratios

Why Beginners Should Care

Always available trading since AMMs provide liquidity 24/7 without requiring human market makers.

Earning opportunities through liquidity provision that generates fees from trading activity.

Impermanent loss risks when providing liquidity to volatile trading pairs that can result in losses compared to holding tokens separately.

Related Terms: Liquidity Pool, Impermanent Loss, DEX, Slippage

Back to Crypto Glossary


Similar Posts

  • Stable Yield

    Stable Yield: Predictable DeFi Returns Stable yield refers to DeFi strategies that provide consistent returns with lower volatility than traditional yield farming. It’s like finding the boring but reliable investment in a casino full of slot machines. Stable yield strategies focus on generating consistent returns from DeFi protocols with lower risk and volatility than high-APY…

  • Layer 1

    Layer 1: The Foundation Blockchain Layer 1 refers to the base blockchain protocol that processes transactions and maintains consensus. It’s the foundation that everything else builds on top of. Layer 1 (L1) is the main blockchain network that handles transaction processing, consensus, and security independently without relying on other blockchains. These are the foundational networks…

  • Rollups

    Rollups: Scaling Through Bundling Rollups process hundreds of transactions off-chain then bundle the results into single on-chain transactions. It’s like carpooling for blockchain transactions – everyone shares the gas costs. Rollups are Layer 2 scaling solutions that execute transactions off the main blockchain but post transaction data on-chain for security. They inherit the security of…

  • Liquidity Bootstrapping

    Liquidity Bootstrapping: Fair Token Launch Mechanism Liquidity bootstrapping uses gradually declining prices to enable fair token distribution while building trading liquidity. It’s like having a reverse auction that creates a fair market price. Liquidity bootstrapping is a token launch mechanism that starts with high prices that gradually decrease over time, allowing market forces to discover…

  • Community

    Community: Decentralized Project StakeholdersCommunity refers to the users, developers, investors, and supporters who participate in and contribute to cryptocurrency projects. They're like the citizens of a digital nation working toward common goals.Community encompasses all stakeholders who participate in cryptocurrency projects including users, developers, investors, validators, and supporters who collectively contribute to project success. Strong communities drive…

  • VPN

    VPN: Virtual Private Network for Crypto PrivacyA VPN creates secure, encrypted connections between your device and the internet to protect privacy and bypass restrictions. It's like having a private tunnel through the public internet highway.A Virtual Private Network (VPN) encrypts internet traffic and routes it through remote servers to hide user location and protect online…