How do transactions work in the String network?

Bersipa
11 min readApr 3, 2022

--

There have been three main concerns in the blockchain world ever since Bitcoin arose in 2008. These concerns have not diminished over time, but appear to have grown even more ever since. The three concerns are:

. Scalability

. Security

. Decentralization

These three parameters are still the most important in all blockchain networks. Many networks have entered the circuit in recent years in an attempt to solve or improve these parameters, but the truth that cannot be hidden or ignored is that after 14 years there is still no network that can accept and incorporate all three aspects of the triangle

Some examples:

All blockchain networks still prioritize these three parameters. There have been many networks in recent years that have attempted to solve or improve these parameters, but the reality remains that after 14 years, no network has yet to accept and incorporate all three aspects of the triangle.

All acknowledged the scalability of the ether network — even those who did not believe in it — as well as accepted a major and unacceptable bug for such a large network. Although the Atrium Foundation has supported and updated this issue to an acceptable level over the years and is constantly fixing network bugs, Ethernet network security has always been a topic of discussion.

Ether is now a decentralized network with good security but very limited scalability, and only two out of the triangle’s three aspects are responsive. Although there has been a significant reduction in gas fees in Ether networks with new networks like Arbitrum, this problem is still a big problem for corporate companies and high-transaction platforms to continue to work with this network. Fundamental problem.

1- Solana is one of the world’s most important networks, a network that strives for high scalability. In comparison with Ether, this network claims to support 400 times more transactions per second its accuracy is largely confirmed. Nevertheless, this is just one side of this triangle. A hacker attacked Solana’s network in the summer of 2021, using malware to send more than one million transactions per second in an attempt to disrupt the network. It was enough to cause Solana to question two of the three sides of the triangle, causing the network to be shut down for hours by its developers. Two major network bugs were caused by an issue that prevented a hacker attack. It is a major problem for the network to deal with large-scale hacking transactions, and the other question is whether or not a network should be decentralized, if so, then why did the network developers take the network out of orbit without the users’ permission?

Experts have noted two shortcomings in the discussion of decentralization and security with Solana, despite its ability to greatly improve scalability. Several days after the initial hacking attack, the network was shut down once again due to another hacking attempt. This arbitrary behavior over time caused suspicions about this network and the price of this network currency also fell sharply.

2- The lack of a complete network in the blockchain is still a major concern for the cryptocurrency community, and any network that has been unveiled on the blockchain has had its problems. In 2020, at the BERSIPA Institute of Technology in California, USA, we began extensive research to create a new network with better performance than networks on blockchain to respond to the essential and entail demands of the users.

3- A small laboratory sample of a new network was created. The network is called BERSIPA String, and it operates parallel to the blockchain network’s structural programming, which began in early 2021. Triangular coefficient with the highest answer from the grid. By combining several new technologies with the best blockchain technologies, our development team created a network that is highly responsive to security as well as a global network that even those with the least assets can benefit from. Currency ciphers can also play an important role in the network as well as offer almost infinite scalability.

1- How to make transactions in the string network:

The new string network is the first platform in the world that has both private and public nodes in its heart through POS protocol. Private nodes in the BERSIPA network are a function of public nodes. This means that if there are no public nodes — or people — no transaction will be completed in the network and the network will be shut down.

The BERSIPA network is designed in a way that anyone who has at least one SIPA coin in their wallet can be considered a node. Those with SIPA among their inventory in the exchange will operate the same way. Unlike other decentralized networks, the string network believes that in order to have a secure and decentralized network at the same time, both public and private nodes should cooperate within the network. Decentralization is enhanced with public nodes and security is enhanced with private nodes. The security of a network is related to its decentralized structure. In order to practice the theory, private nodes are subordinate to public nodes.

BERSIPA Transaction Network decodes a complex system to prove security, scalability, and decentralization within itself to reach final approval. Of course, this whole process occurs in less than ten seconds and will not significantly reduce the network speed.

Transactions diagram in the string network

1–1 Network Transactions :

Transactions in the string network are sent in parallel to the network. Contrary to the general nature of blockchain, where transactions must take place in a single block at the same time. After the completion of that block, the next block is created.

In this module, transactions can be sent to the network at once even in large volumes, and get approved. A string network consists of connecting parallel strings that maintain the integrity of the network but can also move in parallel, providing the network with a high degree of scalability of transaction volume. How to string data is connected to each other is created by pointers at the end of each string. Pointers are the order of the end of a long string and the beginning of a new string. The strings cannot move together and have different lengths from each other.

The transaction that enters the string network is first sent to the public nodes in the network. As mentioned earlier, every person who has at least one SIPA in their wallet is considered a public node for the network. This feature will be added to the wallets holding SIPA coins over time.

Since proving the transaction process is mandatory in the string network, no interest is considered for the public nodes as they have to approve at least three other transactions before their transaction is getting approved. In this way, all SIPA holders will be considered mandatory public nodes, and a decentralized network perform in this regard. In the first layer of public nodes in the string network, more than three public nodes may approve a transaction. Not only does increasing the number of approvals cause no problems for the network, but also it happens to be a sign of acceptance for the network. Yet, the minimum node approval value for transactions should be at least three approvals.

2–1- How to become a public node in the string network?

The process of generalizing a node in a string network is not a complicated process

Users can become a public node in a string network quickly in two ways:

- Install the BERSIPA wallet and deposit at least one SIPA coin in the wallet

- Create the wallets address in exchanges that support the SIPA coin and deposit at least one SIPA coin in that wallet

As soon as you add the SIPA coin to your wallet on the string network, the wallet will automatically upload a panel indicating that you are now part of the string network. From now on you should confirm at least three transactions for each transaction you tend to make in the string network, otherwise, your transaction panel will be returned. This panel will be removed for you again if your SIPA inventory drops below one unit.

As a result, the string network depends on the wallets and wallet addresses in exchanges that hold the SIPA coin. If this coin is in high concentration somewhere, it is bound to congregate there and incline to empty other wallets. In turn, this will disrupt security and perhaps even the entire network process.

Due to SIPA’s tokonomic distribution, this problem can be easily solved.

3–1- Equal-Weight index :

Due to the nature of the blockchain network, which is block-to-block distribution, currencies are based on networks. Although different processes take place in them, their overall structure is essentially the same. The process by which a transaction is either approved by miners or by private nodes and the transaction is finalized.

As a result, the string network seeks security, accuracy, and speed. It is believed that the current process for the blockchain network is no longer relevant and functional for the current and future market needs.

As an example, the difficulties that Solana’s and Ethereum’s networks encounter when it comes to controlling and scalability.

Using artificial intelligence, the string network carries a technology called EWI, in which the network examines each transaction from several angles in a maximum of 10 seconds and based on the classification of transactions, sorts them into steps, respectively. As can be seen from the figure, the five main characteristics in this section are evaluated.

3–1–1- Transaction values:

Transactions that are performed simultaneously in EWI technology are always sent from low to high values in the network, and the network is sensitive to high-volume transactions and requires further investigation. Therefore, if there are two transactions in a string network in the one-time unit, if only this part is the criterion, the transaction with a smaller value will reach the final destination and be approved earlier.

3–1–2- Network:

An array of strings is a network of networks and chains that can support many other networks at the same time. In this system, the priority is always assigned to transactions that are conducted in this network. Transactions with origins and destinations other than strings receive second priority.

In string networks, the main network and the destinations always take precedence, and then the sources follow, whether they have been sent from one string network source to another or not!

3–1–3- Origin:

In the string network, it always selects the same transactions from the sources in which the transaction has been created more often from the safe and secure source. In this way, a security screening situation is created between the old safe wallets and the new wallets which greatly reduces the possibility of a hacker attack on the new ones.

3–1–4- Destination:

For string networks, familiar destinations with a history of secure transactions are preferred over those with a history of security risks. A transaction that enters the network at a specific time unit — If only this index parameter matters in a transaction — is more likely to arrive and be confirmed earlier to the destination.

3–1–5- General Nodes:

The network pays special attention to public nodes in transactions and also prioritizes transactions sent by trusted network nodes or with a secure history. This creates a security screening on the network and largely empties the network of unsecured public nodes. Each node in the BERSIPA network has a quantitative and security history, which makes this history play a decisive role in network security screening in the future. All data on these nodes is stored and processed within multiple servers.

Each of these five transactions is examined and processed by the EWI system in a matter of seconds. Transactions with unknown origins, large quantities, anonymous destinations, multiple exchanges, and nodes with a small number of approvals or new public exchanges will enter the string screening system and must pass the network security coefficients to proceed to the next stage of the transaction.

4- 1 Integrated network node aggregators system:

As mentioned earlier, there are both public and private nodes in the string network. The network interface, security, and function are programmed and compiled ISNS knowledge-based system. In this technology, which is monopolized by the BERSIPA Institute of Technology, public nodes enter the ISNS system after initial transaction approval and screening in EWI, that transactions receive the final order for sending to private nodes.

Suspicious transactions will be deleted or rejected. Low volume transactions with high frequency will also be rejected to be resent to prove their security and accuracy. In this security and communication system, secure transactions are finalized and sent to private nodes. In the five indicators considered in the EWI system, if the transactions cannot get the required values ​​in all five sections, they will be rejected in the ISNS system so that the sender needs to resent their request so that there is no discussion about hacking, robots and so on to prove.

In the string network, the transactions that are rejected at this stage will receive a yellow score, and if the transactions are sent again with the same conditions, the source will be deprived of the transaction for hours. However, due to the super-security structure of the string network, it is unlikely that more than one-thousandth of one percent of the transactions will be rejected because this network will be a public network and hackers will think less about infiltrating it.

5–1- String network private nodes system:

The string network idea democratically believes creating a secure network is impossible unless people and professionals are present in the network at the same time. This has been resolved by using both public and private nodes.

The network of private nodes is actually monitored and verified by professionals and trusted individuals. Whenever a transaction passes the ISNS stage, it must be approved by at least three nodes. There is no maximum approval for the network, but at least three nodes must approve it.

One of the most important parameters in a private node network is the existence of a fast artificial intelligence that can detect the most private and secure online nodes online and send transactions to them for faster execution.

source :

https://bersipa.io/

https://github.com/bersipa/bersipa-String-theory

--

--

Responses (1)