To construct the block header, the mining node must fill in six fields, as listed in Table 8-3. By independently verifying every transaction as it is obtained and before propagating it, every node builds a pool of legitimate (but unconfirmed) transactions known as the transaction pool, memory pool or mempool.