RELICTUM PRO: A BLOCKCHAIN OF THE LATEST GENERATION

in #relictum5 years ago (edited)

IMG_20200601_154212.jpg

Relictum Pro is a blockchain of the latest generation, Blockchain 5.0, which has all the necessary fundamental and sufficient condition to ensure the work of the fourth generation of blockchain
At the moment, they use the type of P2P network on which not only message transfer is built, but also storage of file fragments — distributed storages (based on packet switching (Internet), which implies delivery confirmation, unnecessary headers in the packet body, and also uses the central processor for the assembly of fragments. P2P was used for transferring files – for file sharing services. File sharing services were needed so that you could download movies, programs, and documents.

Principle of operation: One node connects to several and in parts downloads data from other nodes. Thus, the download speed was close to the maximum value of the network card and the speed of a provider.

The disadvantage of P2P: Today, it does not allow to work with a large number of nodes. Having a large number of nodes, the P2P network starts working with segments. Until one segment closes, the second does not unfold. Segmentation constantly occurs and from different sides, the segments start overlapping, the transaction confirmation time by all nodes increases, this affects the speed of distribution and the time of data transfer.

Networking is the first distinctive mechanism The existing network organization of modern blockchains is peer-to-peer (P2P) network. Relictum blockchain platform uses a unique protocol based on the TCP/IP protocol, in which a virtual communication channel with each node is formed over the Internet. The advantages of this network are its reliable stability and isolation from the general segment of the Internet. In this virtual channel, only Relictum Pro information is transmitted, which increases the data transfer speed several times.

51% ATTACK PROBLEM:
The 51% attack (actually from 46%, since not all network participants are able to vote at some point of time) is a term that means that an attacker must have more power than the rest of a network, a kind of "controlling stake" of generating capacity. This is achieved due to the fact that the Network with a consensus makes the decision to conduct a transaction. For example, Ethereum network. (The larger is the network size, the lower is its performance) Many attempts were made to solve this problem using additional consensus. (For example, Casper in the air). The problem of key loss: A private key and a public key. After signing a transaction with a private key, a public key is needed to verify and authenticate the signed transaction.

SOLUTION.
Proof of Tsar Part: Solution. Proof of Tsar 28 Whitepaper Blockсhain 5.0 Whitepaper In order to solve existing problems, we propose several changes in the architecture of the blockchain, affecting communication protocols, network infrastructure, inter-network agreements, consensus algorithms, and so on. Relictum Pro platform does not depend on the communication method, it is just a node, and how the message is delivered does not matter; At the moment, _HyperNet's own communications technology is being used; it works over or on top of the Internet; The following networking method in the future can be used based on Bluetooth, WiFi, satellite comTemunications, i.e., channel switching based on Bluetooth and/or WiFi and other promising protocols

For more information please use the link below :
Website : https://relictum.pro/
Whitepaper : https://relictum.pro/cabinet/docs/whitepaper_en.pdf
Medium : https://medium.com/@relictumpro
Telegram: https://t.me/Relictum_Pro_Official
My bitcointalk profile: https://bitcointalk.org/index.php?action=profile;u=2281902;sa=summary
My bitcointalk name: funex

Coin Marketplace

STEEM 0.18
TRX 0.24
JST 0.036
BTC 95282.29
ETH 3279.60
USDT 1.00
SBD 3.07