IP5 Architecture
INTRODUCTION TO IP5 ARCHITECTURE
Welcome to the IP5 architecture, a groundbreaking ecosystem that combines Web3 services, a compliant and secure blockchain, and a Distributed Encyclopedic Network (R.E.D.) powered by LLM-based artificial intelligence.
User identity in IP5 is defined by an indivisible triad: Wallet (key pair), Self-Sovereign Identity SSI (Verifiable Credentials), and the Light Node. These components are essential for interacting with the broader IP5 ecosystem.
In this section, we'll break down how these components come together to deliver a unique user experience. We'll highlight our PoWOSA consensus protocol, which addresses the "trilemma" of scalability, security, and decentralization.
IP5 is not just a platform, it's also the gateway to a wide range of integrated services, supported by a robust architecture that includes our propietary Blockchain and the R.E.D.. Below, In the following sections, we will explore each component, showcasing the innovation IP5 brings to the world of Blockchain and AI.
Architecture
Front-end: The IP5 Platform
Web Browser with Integrated Wallet
The IP5 Platform is the gateway to a complete Web3 ecosystem. At its core is a web browser with an integrated wallet. This browser not only enables secure and efficient navigation but also functions as a digital wallet, allowing users to safely transact and store cryptocurrencies or other tokenized assets.
Access to Web3 Services and dApps
The IP5 Platform acts as a Web3 service aggregator, meaning users can access a wide range of decentralized applications (dApps) and other Web3 services directly through the platform. This removes the need for multiple apps or platforms, centralizing the user experience in one secure and unified location.
User Experience and Interface
The IP5 Platform user interface is designed to be intuitive and user-friendly, offering an seamless and innovative experience. From layout to functionality, every element is crafted to siimplify the user's interaction with the platform and its services.
R.E.D. Access and AI Assistance
Beond web3 services and dApps, the IP5 Platform provides integrated access to the Distributed Encyclopedic Network (R.E.D.). Users benefit from-based IA Assistance which further enhances their experience when browsing, transacting, or using platform services.
Architecture
Back-end: IP5 Blockchain Nodes
Light Node and its Client (software)
At the core of IP5 backend is the Light Node and its dedicated client, which serves as the base layer for all other five node types. In other words, every node in the IP5 Blockchain starts as a Light Node with additional specific software layers added on.
This client is also the only access point to the frontend, and combined with the wallet and SSI identity, it forms a unique identity pack that defines the user's experience in IP5.
RVM - RED Virtual Machine
The
RVM (R.E.D. Virtual Machine) is the
EVM-compatible virtual machine that runs on every Light Node and on all five node types within the IP5 Blockchain. Being compatible with the Ethereum Virtual Machine, the RVM is capable of executing smart contracts and other decentralized operations. It serves as the computational engine that powers all transactions and ensures systemic security and consistency across IP5.
TYPES OF NODES IN IP5
SUPERNODES
Supernodes are high-performance data centers with exceptional scalability. In the private blockchain phase, they act as miners.
When the blockchain becomes public, they lose mining privileges but remain critical as "pre-miners" and providers of computing power to other nodes.
Clock Nodes
Clock Nodes are Oracle Networks essential for time synchronization within IP5 blockchain and for ensuring ecosystem interoperability. They work closely with Supernodes during the private phase to optimize connectivity and prepare the network for the transition to the public phase.
Clock Nodes host the transaction pool and are responsible for relaying transactions to Supernodes during the mining process.
Mining Nodes
Mining Nodes are essential to the public phase of the blockchain. These nodes compete to mine new blocks and are selected through the PoWOSA consensus protocol.
They share the same software base with Supernodes, but they are public and are the Nodes that actually perform block mining.
Lighthouse Nodes
Lighthouse Nodes are activated during the public phase of the blockchain. They guider Light Nodes and any applications that require real-time information from the IP5 Blockchain, facilitating communication and block validation.
They play a key role in scalability and in efficiently propagating state changes.
Control Nodes
Control Nodes serve as supervisors and auditors within the network.
In the consensus protocol, they simulate and verify operations by emulating other nodes types. When they require extra computational power, it's provided by other nodes without decrypting the data packets, preserving full security.
Smart Contracts
Security and legality through Hooks
Smart contracts on IP5 are not just autonomous code; they are powered by Hooks" functions or sets of functions that automatically execute in response to specific events events or conditions, ensuring secure and legally compliant execution. This combination guarantees that every transaction and operation on the platform is not only technically and automatically correct, but also legally sound and transparent for all involved parties .
This is especially relevant for Legal Smart Contracts, ERC-20 tokens, and NFTs.
Communication Protocol with Oracle Networks
Communication and interoperability between the IP5 Blockchain, R.E.D., Oracle Networks and IoT
The IP5 Blockchain, in synergywith the R.E.D., uses a standardized communication protocol to interact with Oracle Networks. This standard ensures smooth and consistent communication, allowing efficient transmission and verification of data, and enabling seamless interoperability between different systems and networks. The same principles and protocols are expected to be applicable in the IoT ecosystem as well.
IP5 Metaverse
A space for Learning and Experimentation
The IP5 Metaverse is not just a digital space, it's an expanding universe where the Internet plays a central role. Within this environment, users can immerse themselves in learning and experimentation experiences, leveraging the vas knowledge and data stored within the R.E.D.. It is a convergence of technology and creativity, where education meets innovation in an immersive and collaborative context.
Working in tandem with the R.E.D., the IP5 Blockchain serves as Metaverse's data layer.
Any computational or graphical demands required by user experiences will be handled by auxiliary infrastructure, external to the RVM.
IDENTITY IN IP5:
WALLET and SSI
Identity in IP5 is a fundamental pillar, intrinsically connected to the functioning of Light Nodes.
This identity consists of two essential elements: a digital wallet (a key pair: public and private) and a Self-Sovereign Identity (SSI). These elements not only define a user’s identity on the platform, but they are also vital for activating and operating Light Nodes.
The wallet in IP5 is more than just a secure way to store and transact tokens — it is essentially an extension of the user's identity. This transactional capability is enhanced by IP5’s decentralized nature, where every transaction is transparent and verifiable.
The Self-Sovereign Identity (SSI) ensures that users have full control over their digital identity,
without relying on intermediaries. Users can share, validate, or revoke their credentials as needed, without compromising privacy or security.
All nodes in IP5 are based on
the Light Node software architecture, which serves as the gateway to the platform’s frontend.
For a Light Node to operate and interact with the ecosystem, it must be activated using the wallet and SSI.
Without these credentials, the node remains inactive.
Once activated, the Light Node becomes a functional extension of the user's identity,
enabling secure and efficient interaction with IP5’s ecosystem. This close link between identity and node reinforces IP5’s decentralized and secure architecture, where each user has full control over their interactions and transactions.
With IP5, every user becomes an autonomous and secure entity, empowered to interact and build within a truly decentralized ecosystem.
CONSENSUS PROTOCOL
In the world of technology, centralization and decentralization are often seen as opposite ends of a spectrum.
While decentralization is praised for its transparency and resistance to manipulation, we cannot deny the inherent advantages of centralized systems: their efficiency, performance, and scalability. Yet, these benefits are often overshadows tby opacity and unilateral control.
But what if we could fuse the best of both Architectures?
The PoWOSA (Proof of Work Over Secure Architecture) is our answer to this challenge, aiming to combine the efficiency of centralization with the trust of decentralization.
PoA - PROOF OF AUTHORITY
During the initial development phase, the IP5 blockchain operates as a private blockchain. In addition to the omnipresent Light Nodes, only two types of nodes are active at this stage: Supernodes and Clock Nodes.
Transactions generated by Light Nodes are collected in the transaction pool of the Clock Nodes and then mined by the Supernodes.
The choice of PoA (Proof of Authority) is due to its efficiency and speed, as it removes the need for mining competition and ensures rapid transaction confirmation.
PoWOSA - PROOF OF WORK OVER SECURE ARCHITECTURE
Once the IP5 blockchain transitions to a public blockchain, the consensus protocol evolves from PoA to PoWOSA. This protocol combines the strengths of both centralized and decentralized systems, offering a balance between performance and security. It incorporates principles from PoA, Proof of Stake, and Proof of Work (different from Bitcoin’s model).
PoWOSA is a groundbreaking innovation that addresses today’s industry challenges, ensuring transparency, security, and adaptability.
PoWOSA involves all node types in the consensus process, ensuring that no single actor has control or arbitrary influence over the network.
Consensus Protocol
PoWOSA
Continuity Enforcement
Clock Nodes marktime, allowing the stystem to determine the start of each mining round and the phases involved in mining each block.
No Arbitrary Actions
The protocol does not allow any arbitrary behaviour by any type of Node. The order and number of transactions follow deterministic dynamics which miners cannot alter.
Cross-Validation
The protocol ensures that five independent decentralized systems perform or validate the mining of each block.
Resistant to a 100% Miner Node Attack
Miner Nodes execute a deterministic process known to the protocol. Any inconsistencies are detected during mining, automatically invalidating malicious alterations.
Quotas Applied to Verified Identities
Similar to usage limits in cloud services, IP5 wallets are assigned usage quotas. This is made possible by user's SSI identities. Users may request to expand their "quotas. if needed.
System Failure Mode
With PoWOSA, chain forks are not possible. If a protocol inconsistency, is detected, the system enters a failure mode, invalidated the block and starts a new mining round, excluding the nodes responsible for the inconsistency.
"IP5's architecture and its tokenomics are so deeply intertwined that one cannot function effectively without the other."
The IP5 Architecture is not merely a technological framework; it's a carefully designed ecosystem where each component serves as specific function and is influenced by multiple interdependent factors.
The Tokenomics provide the incentives and economic rules, while the architecture ensures structure and functionality. Together, they form a robust, secure, and user-centric ecosystem that is truly revolutionary.
ARCHITECTURE DESIGNED TO GUARANTEE LEGAL SECURITY
The nature of the utility token, the identity system, and the PoWOSA consensus protocol are all functional to a right-based framework that ensures legal guarantees.
The nature of the utility token, the identity system, and the PoWOSA consensus protocol are all functional to a rights-based framework that ensures legal guarantees.
In today’s digital landscape, where trust and security are crucial—especially in data handling and transactions—IP5 stands out with an architecture meticulously designed to deliver unparalleled legal security.
This structure, supported by key components, ensures that users interact with the certainty that their rights and operations are protected at every step.
Beyond its cutting-edge technology, IP5 prioritizes a framework where legal protection is foundational.
THE RVM AND DECENTRALIZED FINANCE IN IP5
EVM compatibility means that the RVM can seamlessly execute a wide range of smart contracts originally developed for Ethereum. This allows developers to migrate, deploy, and experiment with applications on the IP5 network without rewriting their code. It’s an open gateway to innovation, where existing solutions can find a new home and evolve.
But beyond simple migration and adaptation, this compatibility unlocks unprecedented potential for decentralized finance (DeFi) on the IP5 blockchain. By leveraging all the proven functionalities of Ethereum’s DeFi ecosystem, IP5’s RVM positions itself as an independent platform for the creation and management of decentralized financial products.
From peer-to-peer lending and financing to derivatives markets, decentralized exchanges, and liquidity pools—everything that has revolutionized finance on Ethereum can be brought to IP5. Even more promising, these DeFi applications can benefit from IP5’s unique features such as enhanced security, verifiable identity, and legal accountability, creating a more trustworthy and regulation-ready decentralized financial ecosystem.
SMART CONTRACTS AND TOKENIZATION
The IP5 blockchain, being fully compatible with the Ethereum Virtual Machine (EVM), not only inherits Ethereum’s robustness and versatility but also goes a step further. This compatibility ensures that any standard or smart contract developed for Ethereum can be seamlessly implemented on IP5. However, what truly sets IP5 apart is its capacity for innovation and creation.
Beyond simply adopting existing standards, IP5 enables the development of new token and tokenization standards tailored to the specific needs and unique characteristics of its network. This means that while Ethereum tokens and smart contracts are fully compatible, IP5 can also introduce new formats and frameworks, expanding the horizon of what is possible in the blockchain space.
The IP5 blockchain not only adapts to the decentralized finance landscape as we know it but also holds the potential to redefine and expand it—paving the way for the future of tokenization.
“Real-life NFTs” are a prime example of innovation, blending the benefits of IP5’s blockchain with IoT technology.
Machine to Machine (M2M) Comunication
Machine-to-Machine (M2M) communication refers to the direct interaction between devices without human intervention. Thanks to the integration of the R.E.D. into the IP5 ecosystem, a bridge has been established between artificial intelligence and M2M communication. This synergy allows devices not only to communicate with each other but also to make decisions based on patterns, data analysis, and machine learning provided by the R.E.D..
The decentralized infrastructure of IP5 enables faster, more secure, and efficient M2M communication. By operating in a distributed environment, single points of failure are eliminated, latency is reduced, and greater resilience against potential attacks or system failures is ensured.