IP5 Architecture

INTRODUCTION TO IP5 ARCHITECTURE

Welcome to the IP5 architecture, a revolutionary ecosystem that combines Web3 services, a secure blockchain, and a Distributed Encyclopedic Network (RED) with LLM artificial intelligence.


User identity in IP5 is defined by the following triad: Wallet (key pair), SSI (Verifiable Credentials), and the Lightweight Node. These elements are essential for interacting with the vast IP5 ecosystem.


In this section, we'll break down how these components integrate to deliver a unique user experience. We'll highlight our consensus protocol, PoWOSA, which addresses the "trilemma" of scalability, security, and decentralization.


IP5 is not just a platform, but also access to a variety of integrated services, supported by a robust architecture that includes our Blockchain and the NETWORK. Below, we'll dive into each component, showcasing the innovation that IP5 brings to the world of Blockchain and AI.

More information

Architecture

Front-end: The IP5 Platform

Web Browser with Integrated Wallet

The IP5 Platform is the gateway to a complete Web3 ecosystem. The fulcrum of IP5 is its web browser with an integrated wallet. This browser not only enables secure and efficient browsing but also acts as a digital wallet, enabling secure transactions and storage of cryptocurrencies or other tokenized assets.

Access to Web3 Services and dApps

The IP5 Platform is a Web3 service aggregator, meaning users can access a variety of decentralized applications (dApps) and other Web3 services directly from the platform. This eliminates the need for multiple applications or platforms, centralizing the user experience in a single location.

User Experience and Interface

The IP5 Platform user interface is designed to be intuitive and easy to use, offering an unprecedented user experience. From design to functionality, every element is designed to facilitate user interaction with the platform and available services.

Network Access and Artificial Intelligence Assistance

In addition to web3 services and dApps, the IP5 Platform also offers integrated access to the Distributed Encyclopedic Network (RED). Users can receive integrated assistance from this LLM (Large Language Model) artificial intelligence, further enriching the user experience when browsing, transacting, and using services.

Architecture

Back-end: IP5 Blockchain Nodes

Lightweight Node and its Client (software)


At the heart of the IP5 backend is the Lightweight Node and its client, which is the foundation for all the other five node types. In other words, any of the different node types in the IP5 Blockchain are Lightweight Nodes with a specific additional piece of software added.

This client is also the only way to access the frontend, and together with the wallet and SSI identity, it constitutes a unique package that determines the user's identity in IP5.

RVM - RED Virtual Machine


The RVM, or RED Virtual Machine, is the virtual machine that resides on each Light Node and all other five types of nodes in the IP5 Blockchain.

This virtual machine is EVM-compatible, meaning it can execute smart contracts and other operations compatible with the Ethereum Virtual Machine. The EVM is the engine that drives the execution of all transactions and operations on the IP5 Blockchain, ensuring the consistency and security of the system.

TYPES OF NODES IN IP5


SUPERNODOS

Supernodes are data centers with exceptional scalability and performance capabilities. During the private blockchain phase, they act as miners.

When the blockchain goes public, they lose the ability to mine but remain critical as "pre-miners" and providers of computing resources to other nodes.

Clock Nodes

Clock Nodes are Oracle Networks essential for time synchronization on the IP5 blockchain and ecosystem interoperability. These nodes work closely with Super Nodes during the private phase to optimize connectivity and prepare the network for the transition to the public phase.

Clock Nodes host the transaction pool and are responsible for sending these transactions to Super Nodes during the mining process.

Mining Nodes

Mining Nodes are fundamental to the public phase of the blockchain. These nodes compete to mine new blocks and are selected through the PoWOSA consensus protocol.

Although they share an identical software base with Supernodes, Mining Nodes are public and are the Nodes that actually mine the blocks.

Lighthouse Nodes

Beacon Nodes come into play during the public phase of the blockchain. These nodes act as guides for Light Nodes and any applications that need information about the IP5 Blockchain, facilitating communication and block validation.

Beacon Nodes are especially important for scalability and for efficiently propagating state changes.

Control Nodes

Control Nodes acting as supervisors and auditors of the network.

In the consensus protocol, they perform simulation and control tasks, embodying other types of nodes. When they need additional resources from other nodes, the process is carried out without decrypting the data packets, thus maintaining security.

Smart Contracts

Security and legality through Hooks

Smart contracts in IP5 are not just standalone code; they are powered by "hooks," functions or sets of functions that execute automatically in response to certain predefined events or conditions, capable of ensuring safe and legal execution. This combination ensures that every transaction and operation on the platform is not only technically and automatically correct, but also legally sound and transparent for all parties involved.


This becomes especially relevant for Legal Smart Contracts, ERC-20 tokens, and NFTs.

Communication Protocol with Oracle Networks

Communication and interoperability between the IP5 Blockchain, RED, Oracle Networks and IoT

The IP5 Blockchain, in conjunction with the RED, uses a standardized communication protocol to interact with Oracle Networks. This standardization guarantees fluid and consistent communication, allowing information to be transmitted and verified efficiently, and ensuring seamless interoperability between different systems and networks. The same principles and protocols are expected to be applied to the IoT.

IP5 Metaverse

A space for learning and experimentation

The IP5 Metaverse is not just a digital space, but an expanding universe where the Internet plays a central role. In this environment, users can immerse themselves in learning and experimentation experiences, leveraging the vast amount of information and knowledge stored online. It is a confluence of technology and creativity, where education meets innovation in an immersive and collaborative environment.


In tandem with the RED, the IP5 Blockchain represents the database of the IP5 Metaverse.

Any computational and graphical requirements for user experiences will be supported by auxiliary infrastructure, external to the RVM.

IDENTITY IN IP5:

WALLET and SSI


Identity in IP5 is a fundamental pillar and is intrinsically linked to the functioning of Light Nodes. This identity is composed of two essential elements: a digital wallet, which is a key pair (public and private keys), and a Self-Sovereign Identity (SSI). These elements not only determine the user's identity on the platform, but are also vital to the activation and operation of Light Nodes.


The IP5 wallet, consisting of a key pair, is not just a means of securely storing and transacting tokens. It is, in essence, an extension of the user's identity. This transaction capability is enhanced by the decentralized nature of IP5, where every transaction is transparent and verifiable.


Self-Sovereign Identity (SSI), on the other hand, ensures that users have complete control over their own digital identity, without the need for intermediaries. This means users can share, validate, and revoke their information as they see fit, without compromising their privacy or security.


The software foundation of all nodes in IP5 is the Light Node. This node, in particular, acts as the gateway to the IP5 ecosystem's frontend. For a Light Node to be operational and able to interact with the platform, it is essential that it be provided with the wallet and SSI pair. Without these credentials, the Light Node remains inactive.

When activated with these credentials, the Light Node becomes a functional extension of the user's identity, facilitating secure and efficient interaction with the IP5 ecosystem. This relationship between the Light Node and the user's identity reinforces the decentralized and secure nature of IP5, where each user has complete control over their interactions and transactions within the platform.

With IP5, each user is an autonomous and secure entity, capable of interacting and building within a decentralized ecosystem.

CONSENSUS PROTOCOL


In the world of technology, centralization and decentralization are often seen as opposites on a spectrum.

While decentralization is praised for its transparency and resistance to manipulation, we cannot deny the inherent advantages of centralized systems: their efficiency, performance, and scalability. However, the shadow of opacity and unilateral control often overshadows these benefits.


What if we could merge the best of both Architectures?

The PoWOSA (Proof of Work Over Secure Architecture) consensus protocol is our answer to this challenge, seeking to combine the efficiency of centralization with the trust of decentralization.

Learn more

PoA - PROOF OF AUTHORITY


During the initial development phase, the IP5 blockchain operates as a private blockchain. Aside from the ubiquitous Light Nodes, only two types of nodes are involved at this stage: Super Nodes and Clock Nodes.


Transactions generated by Light Nodes are collected into the Clock Nodes' transaction pool and subsequently mined by Super Nodes.


The choice of PoA is due to its efficiency and speed, as it eliminates the need for competition in the mining process and guarantees rapid transaction confirmation.

PoWOSA - PROOF OF WORK OVER SECURE ARCHITECTURE


Once the IP5 blockchain transitions to a public blockchain, the consensus protocol evolves from PoA to PoWOSA. This consensus protocol combines the best of centralized and decentralized systems, offering a balance between performance and security. It utilizes the principles of PoA, Proof of Stake, and Proof of Work (unlike Bitcoin).

PoWOSA is a revolutionary innovation that addresses current industry challenges by ensuring transparency, security, and adaptability.

PoWOSA involves all types of nodes in the consensus process, ensuring that no single actor has control or arbitrariness over the network.

Consensus Protocol

By WASHING

Continuity Solution

Clock Nodes keep time, allowing the start of each mining operation and the mining stages for each block to be determined.

Absence of Arbitrariness

The protocol does not allow any arbitrary action by any node type. The order and quantity of transactions follow deterministic dynamics and cannot be modified by miners.

Cross-Review

The protocol ensures that five independent decentralized systems perform or validate mining for each block.

Resistant to a 100% attack from Mining Nodes

Mining Nodes perform a deterministic process known to the protocol. Any inconsistencies are detected during mining, invalidating any malicious alterations.

Quotas Applied to Known Identities

Similar to the restrictions or "quotas" of cloud providers, IP5 wallets are assigned usage quotas. This order is made possible by each user's SSI. Users can request to increase their "quotas."

System Failure Mode

With PoWOSA, chain forks are not possible. In the event of a protocol inconsistency, the system enters system failure mode, invalidating the block and allowing new mining to proceed, excluding the nodes responsible for the inconsistency.

"IP5's architecture and its tokenomics are intertwined in such a way that one cannot function efficiently without the other."

The IP5 Architecture is not simply a technological framework; it's an intricately designed ecosystem where each component has a specific role and is influenced by various factors.


Tokenomics provides the incentives and economic rules, while architecture provides the structure and functionality. Together, they create a robust, secure, and user-centric ecosystem that is truly revolutionary.

ARCHITECTURE DESIGNED TO GUARANTEE LEGAL SECURITY


The nature of the utility token, the identity system, and the PoWOSA consensus protocol are functional to a guaranteed environment that provides legal guarantees.

In today's digital environment, where trust and security are vital, especially in transactions and data management, IP5 emerges with a meticulously designed architecture to guarantee unparalleled legal security. This structure, supported by key elements, ensures that users interact with the certainty that their rights and operations are safeguarded at every step. Beyond its technological forefront, IP5 prioritizes an environment where legal protection is essential.


Legal

THE RVM AND DECENTRALIZED FINANCE IN IP5


EVM compatibility means the RVM can seamlessly run a wide variety of smart contracts originally designed for Ethereum. This allows developers to migrate, deploy, and experiment with applications on the IP5 network without having to rewrite their code. It opens the door to innovation, where existing solutions can find a new home and evolve.


But beyond simple migration and adaptation, this compatibility unlocks unprecedented potential for decentralized finance (DeFi) on the IP5 blockchain. By leveraging each and every feature already known and proven in the Ethereum DeFi ecosystem, the IP5 RVM positions itself as an independent platform for the creation and management of decentralized financial products.


From peer-to-peer lending and financing, to derivatives markets, to decentralized exchanges and liquidity pools, everything that has revolutionized the financial world on Ethereum can be brought to the IP5 network. Even more promising is that these DeFi applications can benefit from IP5's unique features, such as enhanced security, verifiable identity, and legal accountability, thus creating a more trustworthy and regulated decentralized financial ecosystem.

SMART CONTRACTS AND TOKENIZATION


The IP5 blockchain, by being compatible with the Ethereum Virtual Machine (EVM), not only inherits Ethereum's robustness and versatility, but goes a step further. This compatibility ensures that any standard or smart contract developed for Ethereum can be implemented on IP5 without complications. But what truly sets IP5 apart is its ability to innovate and create.


Beyond simply adopting existing standards, IP5 offers the ability to generate new token and tokenization standards, tailored to the specific needs and unique characteristics of your network. This means that, while Ethereum tokens and smart contracts are fully supported, IP5 can also introduce new formats and standards, expanding the horizon of what's possible in the blockchain world.


The IP5 blockchain not only fits into the world of decentralized finance as we know it, but has the potential to redefine and expand it, paving the way for the future of tokenization.


Real-life NFTs are an example of innovation that merges the advantages of the IP5 blockchain with IoT technology.

Machine to Machine (M2M) Comunication

Machine-to-Machine (M2M) communication refers to the direct interaction between devices without human intervention. Thanks to the integration of the Internet into the IP5 ecosystem, a bridge has been established between artificial intelligence and M2M communication. This synergy allows devices to not only communicate with each other but also make decisions based on patterns, data analysis, and machine learning provided by the Internet.


IP5's decentralized infrastructure facilitates more secure, faster, and more efficient M2M communication. By operating in a decentralized environment, single points of failure are eliminated, latency is reduced, and greater resilience is ensured against potential attacks or system failures.

Contact us

Contact