AMAZINGWEBSYSTEM AWS Project White Paper

AMAZINGWEBSYSTEM AWS Project White Paper

AMAZINGWEBSYSTEM AWS project white paper Summary We are reconstructing the Internet's transport layer protocol, and we are redefining the Internet. Each user and each terminal is no longer just the bottom layer of the food chain, but should be the provider and co-builder of the Internet and services. AWS Amazon is a series of infrastructure for building a decentralized Internet. It is a distributed intelligent virtual network built on the physical network layer and the ISP network layer. AWS Tube Amazon uses blockchain, distributed network and asymmetric encryption technologies to provide a series of distributed services, such as automatic proxy services, multi-layer anonymous networks, IM instant messaging, pollution-free DNS resolution, and even CDN content acceleration Distribution and DDoS defense, etc. Internet access restrictions in different regions, traditional centralized CDNs are expensive, nodes are limited, cost and efficiency have huge optimization potential, distributed network technology is mature, in recent years, the rapid development of blockchain technology and cryptocurrency technology, more Users can participate in blockchain network collaboration even if they don't understand technology. · Document purpose This document is a preliminary introduction to the AWS ecosystem, which has a certain reading threshold. The suitable readers are employees, investors or consumers who have a certain understanding of the blockchain industry, as well as those who have a certain understanding of digital currencies such as Bitcoin and Ethereum. personnel. · Document scope Distributed network, infrastructure, communication protocol, freedom of communication, agency service, CDN, idle bandwidth mining, privacy protection, network security. · Abbreviation In the website, documents and various articles in the AWS Tube Amazon ecosystem: AWS Tube Amazon abbreviation will be used to refer to Amazing Web System Tube Amazon and the entire project. AWS abbreviation is used to refer to Amazon Coin AWS - the only token in the ecosystem. 1 BACKGROUND We are reconstructing the Internet's transport layer protocol, and we are redefining the Internet. Each user and each terminal is no longer just the bottom layer of the food chain, but should be the provider and co-builder of the Internet and services. The AWS Amazon ecosystem is a series of infrastructure for building a decentralized Internet. It is a distributed intelligent virtual network built on the physical network layer and the ISP network layer. The AWS Amazon ecosystem uses technologies such as blockchain, distributed networks, and asymmetric encryption to provide a series of distributed services, such as automatic proxy services, multi-layer anonymous networks, IM instant messaging, pollution-free DNS resolution, and even CDN content acceleration Distribution and DDoS defense, etc. Use the Amazon Coin AWS with a stable value scale--the only token in the ecosystem as the ecological "currency" incentive. It is a growing distributed Internet infrastructure built by infinite nodes around the world, making the Internet more open and more equal , More stable, more efficient, safer and more free. Our philosophy: yearning for freedom. Freedom, openness, equality, and sharing are not just personal values and ideological preferences. These things are written to death in the basic protocols of the Internet and are the inevitable result of the design of early geniuses. The fact that a network can grow to the size it is today is not because of ideology and administrative relations, but a series of basic communication protocols. An email sent from Microsoft can be delivered to Gmail because there are many intermediate servers that undertake the delivery task. This delivery is neither a commercial task nor an administrative task. It does not bring direct commercial benefits, nor does it exist. Any administrative affiliation. The existence of this open network, just because you want to participate in this game, you must accept the rules of the open game. Internet giants, such as Google and Facebook, are all beneficiaries of the open architecture of the Internet. Whether in terms of benefiting all living beings or in terms of providing more business opportunities, the open and free spirit of the Internet will indeed benefit us a lot. Perhaps not everyone agrees with this concept. In some areas, for some reasons, network services are more like a large local area network, not as interconnected, open and inclusive as the original intention of the Internet. We, as a group of technical geeks Although it is understandable, we look forward to enjoying an Internet infrastructure that is exactly the same as the original design, free, open, equal, and sharing. Like you, our team members also need barrier-free, secure, stable, and smooth network communication services to explore the world through Google and Wikipedia, and share their work and work with friends around the world on Facebook / Instagram. Live, use YouTube / Twitter to see a lively and colorful world, not only can learn about the latest technological trends, academic research, cutting-edge information, but also freely communicate, discuss and collaborate. The Internet belongs to all those who build and use it. The future of the Internet should not be kidnapped and controlled by any centralized organization. The billions of users around the world who use and participate in the Internet, as well as the experts who build and maintain the Internet, should have free browsing and freedom. The right to speak. We are taking some actions, through a series of technologies and standards, to create a borderless, barrier-free and more growing distributed Internet infrastructure to provide a basis for user mutual assistance services, Not only includes the most basic interconnection services, but also expects to build distributed and secure content distribution, address resolution, security protection, and even shareable computing and storage services through mature and innovative technical methods. Of course, all of this starts with barrier-free interconnection. We look forward to your blessings and support. All people with lofty ideals are welcome to participate in building a healthy basic ecology. 2 PROJECTINTRODUCTION AWS Amazon is the Internet's next-generation file sharing protocol. The current mainstream public blockchain platform focuses on computing tasks, but lacks cost- effective, scalable and high-performance file storage and sharing solutions. At the same time, centralized storage systems inherently contain many problems: Centralized trust, easy to be censored, high maintenance cost, locking effect, low fault tolerance Main body The AWS Chain network architecture includes several microservices, which are services for the user (to consume the storage space of the AWS Chain network by paying for AWS) and the provider (to provide storage space for the AWS Chain network by paying for RAM and obtain AWS rewards) services . The following microservices are running in the AWS Chain network. 1. State server 2. AWS hub 3. AWS Guard 4. pull pipe service The state server stores the network system indicators used to improve the AWS Chain network. This data can enhance the functionality of other microservices. AWS hub AWS Hub is committed to providing storage tenants with the most reliable host on the AWS Chain network. The hub achieves this goal by using important indicators such as available storage space, host uptime and longevity, and proximity to file storage tenants to calculate scores for each AWS host. The hub provides support for host recommendations based on the preferences and needs of the tenant. AWS Guard One of the core guarantees of any large file storage system is the availability of stored files. When a file is stored on the AWS network, the file is Reed-Solomon encoded and then split into 30 shards and stored on 30 selected hosts. With AWS Guard, the host can be challenged with storage certification on a regular basis to ensure file integrity and availability. If the number of fragments reaches the threshold due to the host being unavailable on the network, AWS Guard will proactively perform a file repair process to ensure the integrity of all tenants' files. Escrow AWS hosting services can ensure safe and reliable fund transactions between tenants and providers in accordance with the storage contract agreement. 3 DESIGNCONCEPTANDDESIGNOVERVIEW Avoid gimmick innovation Although packaging some fresh concepts is indeed easier to catch the eye, innovation for packaging is not what we want. Innovation-driven development is a complex system engineering. In AWS system solutions and ecosystems, we advocate harmony Encourage innovations that can solve practical problems, improve efficiency, reduce costs, and solve problems. Prioritize the use of safe, proven and mature technical solutions In the field of communication, encryption and privacy protection between distributed nodes, and blockchain technology, many predecessors have completed a lot of meaningful work, and some of the mature technical solutions have been actually verified in business scenarios. And the performance is stable. For example, the DHT technology represented by S/Kademlia DHT, which has completed multiple generations of updates, intranet penetration and node discovery and online update technology, reverse proxy technology, and a distributed file sharing system represented by BitTorrent. Acyclic graph DAG, Merkle Tree Merkle Tree, asymmetric encryption and decryption technology

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    26 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us