IP5 architecture
INTRODUCTION TO THE IP5 ARCHITECTURE
Welcome to the IP5 architecture, a revolutionary ecosystem that combines web3 services, a guarantee blockchain and a Distributed Encyclopedic Network (RED) with LLM artificial intelligence.
The user identity in IP5 is defined by the triad: Wallet (key pair), SSI identity and the Light Node. These elements are essential to interact with the vast IP5 ecosystem.
In this section, we'll break down how these components come together to deliver a unique user experience. We will highlight our consensus protocol, PoWOSA, which addresses the "trilemma" of scalability, security, and decentralization.
IP5 is not only a platform, but also access to a variety of integrated services, supported by a robust architecture that includes our Blockchain and the NETWORK. Below, we will delve into each component, showcasing the innovation that IP5 brings to the Blockchain and intelligence world. artificial.
Architecture
Front-end: The IP5 Platform
Web Browser with Integrated Wallet
The IP5 Platform is the gateway to a complete web3 ecosystem. The fulcrum of IP5 is its web browser with an integrated wallet. This browser not only allows for safe and efficient browsing but also acts as a digital wallet, allowing secure transactions and storage of cryptocurrencies or other tokenized assets.
Access to Web3 Services and dApps
The IP5 Platform is a web3 services aggregator, meaning that users can access a variety of decentralized applications (dApps) and other web3 services directly from the platform. This eliminates the need for multiple applications or platforms, centralizing the user experience in one place.
Experience and User Interface
The IP5 Platform user interface is designed to be intuitive and easy to use, offering an unprecedented user experience. From design to functionality, each element is designed to facilitate user interaction with the platform and the available services.
NETWORK Access and Artificial Intelligence Assistance
In addition to web3 services and dApps, the IP5 Platform also offers direct access to the Distributed Encyclopedic Network (RED). Users can receive integrated assistance from this LLM (Large Language Model) artificial intelligence, which further enriches the user experience when browsing, making transactions and using services.
Architecture
Back-end: IP5 Blockchain Nodes
Light Node and its Client (software)
At the heart of the IP5 backend is the Light Node and its client, which is the basis for all the other five node types. In other words, any of the different types of Nodes in the IP5 Blockchain are Light Nodes to which an additional specific piece of software is added.
This client is also the only access route to the frontend, and together with the wallet and the SSI identity, it constitutes a unique package that determines the user's identity in IP5.
RVM - RED Virtual Machine
The RVM, or RED Virtual Machine, is the virtual machine that resides on each Light Node and all other five node types on the IP5 Blockchain.
This virtual machine is EVM-compatible, meaning it can run smart contracts and other operations that are compatible with the Ethereum Virtual Machine. The RVM is the engine that drives the execution of all transactions and operations on the IP5 Blockchain, ensuring the coherence and security of the system.
TYPES OF NODES IN IP5
SUPERNODES
Supernodes are Datacenters with exceptional scalability and performance capabilities. During the private Blockchain phase, they act as miners.
When the Blockchain becomes public, they lose the ability to mine but remain critical as "pre-miners" and providers of computational resources to other nodes.
Supernodes have quantum computing components.
Clock Nodes
Clock Nodes are Oracle Networks essential for time synchronization on the IP5 blockchain. These nodes work closely with the Supernodes during the private phase to optimize connectivity and prepare the network for the transition to the public phase.
The Clock Nodes host the pool of transactions and are responsible for sending these transactions to the Supernodes during the mining process.
Mining Nodes
Mining Nodes are fundamental in the public phase of the blockchain. These nodes compete to mine new blocks and are selected through the PoWOSA consensus protocol.
Although they share an identical software base with the Supernodes, the Mining Nodes are public and are the Nodes that actually mine the blocks.
Lighthouse Nodes
Lighthouse Nodes come into play during the public phase of the blockchain. These nodes act as guides for the Light Nodes and any application that needs information about the IP5 Blockchain, facilitating communication and block validation.
Lighthouse Nodes are especially important for scalability and efficiently propagating state modifications.
Control Nodes
Control Nodes acting as supervisors and auditors of the network.
In the consensus protocol, they carry out simulation and control tasks, embodying other types of Nodes. When they need additional resources from other Nodes, the process is carried out without decrypting the data packets, thus maintaining security.
Smart Contracts
Security and legality through Hooks
Smart contracts in IP5 are not just autonomous codes; They are powered by "Hooks", functions or set of functions that are executed automatically in response to certain events or predefined conditions, capable of guaranteeing safe and legal execution. This combination ensures that every transaction and operation on the platform is not only technically and automatically correct, but also legally sound and transparent for all parties involved.
This becomes especially relevant for Legal Smart Contracts, ERC-20 tokens and NFTs.
Communication Protocol with Oracle Networks
Communication and interoperability between the IP5 Blockchain, RED, Oracle Networks and IoT
The IP5 Blockchain, in conjunction with the NETWORK, uses a standardized communication protocol to interact with the Oracle Networks. This standardization guarantees fluid and coherent communication, allowing information to be transmitted and verified efficiently, and ensuring seamless interoperability between different systems and networks. The same principles and protocols are expected to also be applied in the IoT field.
IP5 Metaverse
A space for learning and experimentation
The IP5 Metaverse is not just a digital space, but an expanding universe where the NETWORK plays a central role. In this environment, users can immerse themselves in learning and experimentation experiences, taking advantage of the vast information and knowledge stored on the NETWORK. It is a confluence of technology and creativity, where education meets innovation in an immersive and collaborative environment.
In tandem with the NETWORK, the IP5 Blockchain represents the IP5 Metaverse database.
The eventual computational and graphical requirements of user experiences will be supported by auxiliary infrastructure, external to the RVM.
IDENTITY IN IP5:
WALLET y SSI
Identity in IP5 is a fundamental pillar, and is intrinsically linked to the operation of Light Nodes. This identity is made up of two essential elements: a digital wallet, which is a pair of keys (public and private key), and a Self-Sovereign Identity (SSI). These elements not only determine the identity of the user on the platform, but are also vital for the activation and operation of the Light Nodes.
The IP5 wallet, composed of a pair of keys, is not only a means to store and transact tokens securely. It is, in essence, an extension of the user's identity. This transaction capability is enhanced by the decentralized nature of IP5, where each transaction is transparent and verifiable.
Self-Sovereign Identity (SSI), on the other hand, ensures that users have full control over their own digital identity, without the need for intermediaries. This means that users can share, validate and revoke their information as they deem necessary, without compromising their privacy or security.
The software base of all nodes in IP5 is the Lightweight Node. This node, in particular, acts as the gateway to the frontend of the IP5 ecosystem. For a Light Node to be operational and able to interact with the platform, it is essential that the wallet and SSI tandem be provided. Without these credentials, the Light Node remains inactive.
When activated with these credentials, the Light Node becomes a functional extension of the user's identity, facilitating a secure and efficient interaction with the IP5 ecosystem. This relationship between the Light Node and the user's identity reinforces the decentralized and secure nature of IP5, where each user has full control over their interaction and transactions within the platform.
With IP5 each user is an autonomous and secure entity, capable of interacting and building in a decentralized ecosystem.
CONSENSUS PROTOCOL
In the world of technology, centralization and decentralization are often seen as opposites on a spectrum.
While decentralization is praised for its transparency and resistance to manipulation, we cannot deny the inherent advantages of centralized systems: their efficiency, performance, and scalability. However, the shadow of opacity and unilateral control often overshadows these benefits.
What if we could merge the best of both Architectures?
The PoWOSA (Proof of Work Over Secure Architecture) consensus protocol is our response to this challenge, seeking to combine the efficiency of centralization with the trust of decentralization.
PoA - PROOF OF AUTHORITY
During the initial development phase, the IP5 blockchain operates as a private blockchain. In addition to the ubiquitous Light Nodes, only two types of nodes are involved in this stage: Super Nodes and Clock Nodes.
The transactions generated by the Light Nodes are collected in the transaction pool of the Clock Nodes and subsequently mined by the Super Nodes.
The choice of PoA is due to its efficiency and speed, as it eliminates the need for competition in the mining process and ensures fast confirmation of transactions.
PoWOSA - PROOF OF WORK OVER SECURE ARCHITECTURE
Once the IP5 blockchain transitions to a public Blockchain, the consensus protocol evolves from PoA to PoWOSA. This consensus protocol combines the best of centralized and decentralized systems, offering a balance between performance and security. It participates in the principles of PoA, Proof of Stake and Proof of Work (different from Bitcoin).
PoWOSA is a revolutionary innovation that addresses current industry challenges, ensuring transparency, security and adaptability.
The PoWOSA involves all types of Nodes in the consensus process, ensuring with its mechanism that no actor has control or arbitrariness over the network.
Consensus Protocol
PoWOSA
Continuity Solution
The Clock Nodes mark the time, thus allowing the start of each mining and the mining stages for each block to be determined.
Absence of Arbitrariness
The protocol does not support any arbitrary action by any type of Node. The order and quantity of transactions follow deterministic dynamics, they cannot be modified by miners.
Cross Review
The protocol ensures that five independent decentralized systems perform or validate mining on each block.
Resistant to a 100% attack from Mining Nodes
The Mining Nodes carry out a deterministic process that is known by the protocol. Possible inconsistencies are detected during mining, invalidating any malicious alteration.
Quotas Applied to Known Identities
In the style of the restrictions or "quotas" of cloud providers, IP5 wallets have usage quotas assigned. This order is possible thanks to the SSI of each user. Users can request to extend their "quotas."
System Failure Mode
With PoWOSA, branching of the chain is not possible. In case of inconsistency in the protocol, the system enters system failure mode; invalidating the block to proceed with a new mining excluding the nodes responsible for the inconsistency.
"IP5's architecture and its tokenomics are intertwined in a way that one cannot function efficiently without the other."
The IP5 Architecture is not simply a technological structure; It is an intricately designed ecosystem where each component has a specific role and is influenced by various factors.
Tokenomics provide the incentives and economic rules, while the architecture provides the structure and functionality. Together, they create a robust, secure, user-centric ecosystem that is truly revolutionary.
ARCHITECTURE DESIGNED TO ENSURE LEGAL SECURITY
The nature of the utility token, the identity system and the PoWOSA consensus protocol are functional to a guarantee environment that provides legal guarantees.
In the contemporary digital sphere, where trust and security are vital, especially in transactions and data management, IP5 emerges with an architecture meticulously conceived to guarantee unparalleled legal certainty. This structure, supported by key elements, ensures that users interact with the certainty that their rights and operations are safeguarded at every step. Beyond its technological cutting edge, IP5 prioritizes an environment where legal protection is essential.
THE RVM AND DECENTRALIZED FINANCE IN IP5
Compatibility with the EVM means that the RVM can seamlessly run a wide variety of smart contracts originally designed for Ethereum. This allows developers to migrate, deploy and experiment with applications on the IP5 network without having to rewrite their code. It is an open door to innovation, where existing solutions can find a new home and evolve.
But beyond simple migration and adaptation, this compatibility unlocks unprecedented potential for decentralized finance (DeFi) on the IP5 blockchain. By leveraging each and every feature already known and tested in the Ethereum DeFi ecosystem, IP5's RVM positions itself as an independent platform for the creation and management of decentralized financial products.
From peer-to-peer lending and financing, to derivatives markets, to decentralized exchanges and liquidity pools, everything that has revolutionized the financial world on Ethereum can be transferred to the IP5 network. And what's even more promising is that these DeFi applications can benefit from the unique features of IP5, such as reinforced security, verifiable identity, and legal accountability, thus creating a more trusted and regulated decentralized financial ecosystem.
SMART CONTRACTS AND TOKENIZATION
The IP5 blockchain, being compatible with the Ethereum Virtual Machine (EVM), not only inherits the robustness and versatility of Ethereum, but goes one step further. This compatibility ensures that any standard or smart contract developed for Ethereum can be implemented on IP5 without complications. But what really sets IP5 apart is its ability to innovate and create.
Beyond simply adopting existing standards, IP5 offers the ability to generate new token and tokenization standards, tailored to the specific needs and unique characteristics of your network. This means that, while Ethereum tokens and smart contracts are fully compatible, IP5 can also introduce new formats and standards, expanding the horizon of what is possible in the world of blockchain.
The IP5 blockchain not only fits the world of decentralized finance as we know it, but has the potential to redefine and expand it, leading the way into the future of tokenization.
"Real-life NFTs" are an example of innovation that merges the advantages of the IP5 blockchain with IoT technology.
Machine to Machine (M2M) Comunication
Machine to Machine (M2M) communication refers to direct interaction between devices without human intervention. Thanks to the integration of the NETWORK into the IP5 ecosystem, a bridge has been established between artificial intelligence and M2M communication. This synergy allows devices to not only communicate with each other, but also make decisions based on patterns, data analysis and machine learning provided by the NETWORK.
IP5's decentralized infrastructure facilitates safer, faster and more efficient M2M communication. Operating in a decentralized environment eliminates single points of failure, reduces latency, and ensures greater resilience against potential attacks or system failures.