This article presents the implementation of a reliable decentralized network protocol through the Linux kernel.
The proposed protocol provides a safe peer-to-peer link between decentralized network nodes. At the same time, establish and maintain a consensus among all nodes on the network about its status. A scheme called proof of work is used to determine the true state of a decentralized network. Data that determines the health of the network is stored in a distributed registry called blockchain. Blockchain is a chain of transaction blocks (a data structure containing data from multiple transactions). These blocks are connected, allowing the action of a single block to depend on its hash function and on the previously created block. As blockchain grows, security becomes stronger. At the time of writing, there was no known way to compromise the blockchain.
1.1 Linux Networks
Linux networks on the Internet are very similar to other operating systems. Linux users rely on the same protocols as Internet users around the world. These protocols are used for what has become a common means of communication, such as SMTP for email, HTTP, used for websites, and SIP used by Voice Over Internet Protocol (VOIP) services. These protocols are used every day and are important tools for doing business in the ordinary world. Because of the basic complexity, these services require that the people and businesses that use them depend on a third party to provide the necessary tools for their use on the Internet. Sometimes they rely on their ISP to provide access to various other internet protocols.
1.2 Identifying problems
This dependence on third parties for Internet services has given the Internet a seemingly centralized architecture. When people depend on the provider rather than getting access to the resource directly from the environment. In this case, the environment is the Internet. Centralized systems are efficient, scalable and workable, but they depend on people’s fairness when they are seduced by the possibility of profiting from dishonesty. They also provide a central access point to sensitive data stored on the network, making one successful attack powerful enough to disable the entire network. Because of these constraints, centralized systems pose extraordinary risks and have proved to be the point of rejection in our society for the reasons outlined here.
- PROPOSED SOLUTION
2.1 Bitcoin Protocol
In October 2008, Satoshi Nakamoto published an article explaining a digital currency called bitcoin. In addition to describing the digital currency, he also explained a protocol of a stable and secure decentralized network in which consensus can be successfully reached between nodes. The Bitcoin currency is an experiment in which a decentralized implementation of the network protocol was attempted. To date, Bitcoin has excelled in many areas where existing centralized financial systems have failed. Any flaws found in the Bitcoin protocol will be the result of new application problems. In the complex and demanding financial industry, Bitcoin has proven to be able to solve many other real problems that we face on the Internet today. Using Bitcoin as a decentralized development platform in the Linux kernel will simplify, improve the security, reliability, and decentralization of the most popular Internet protocols used today. Protocols can be integrated into operating systems using decentralized technology. This approach will free Internet users from third-party dependence to access services such as SMTP, VOIP, DNS and other Internet services. As a result, Internet services will be decentralized, less expensive to operate, and their service policies more accessible to the user’s influence.