Layer 1, the System Layer

The System Layer plays a central role in the NetX architecture by hosting EVM-compatible chains and implementing DevOps toolchains for managing chain applications’ lifecycles.

NetX Smart Chains are built on NetX’s Layer ‘-1’ and Layer 0 capabilities. They are built with several noteworthy features that enhance their functionality and trustworthiness:

  1. Shared Trusted Base: One of the critical strengths of the NetX Smart Chains is their shared trusted base. All nodes across the various NetX Smart Chains are interconnected through the Layer '-1' web-of-trust. This interconnectedness enables all participating nodes to run mutual verification protocols defined by the Trias Layer '-1'. Consequently, regardless of the number of nodes within a specific NetX Smart Chain, all nodes connected through Layer '-1' thoroughly verify the chain's integrity. Even if a NetX Smart Chain has a relatively small number of nodes, it remains highly secure when linked to a web-of-trust containing thousands of nodes. This dual-layered design effectively separates system integrity verification from transaction integrity verification, allowing a NetX Smart Chain to achieve high speed (due to a smaller node count in Layer 1) while maintaining trustworthiness (due to the extensive Layer '-1' connectivity).

  2. Heterogeneous Deployment: NetX Smart Chains are highly flexible regarding deployment options. Leveraging the shared Layer '-1' as the trusted base, these chains can be easily deployed as private, federated, or public chains. As long as their Layer '-1' connections are maintained, each deployment benefits from a significantly larger trusted base. Consequently, when multiple NetX Smart Chains join the shared Layer '-1', the overall trustworthiness of the NetX Smart Chains ecosystem increases. Furthermore, each NetX Smart Chain handles its transaction verifications, resulting in substantially higher TPS compared to a scenario where each chain operates with the same number of nodes as the entire network.

  3. Hyper-Sharding with Cross-Chain Bridges: NetX Smart Chains can leverage cross-chain bridges to connect transaction ledgers. This interconnection effectively transforms the NetX Smart Chains into a larger, unified chain while preserving their high TPS and trustworthiness properties. Hyper-sharding techniques efficiently partition network load, facilitating high-speed transactions and data processing. Cross-chain bridges ensure that the interconnected NetX Smart Chains work seamlessly together, creating a larger chain while retaining their high performance and trustworthiness characteristics.

  4. Off-chain Native Cloud Computation and Big Data Analytics: The NetX Smart Chains further benefit from the capability of off-chain native computation and big data analytics, which is facilitated by the Layer 0 capabilities of Leviatom and Behemotum. These two foundational components open interfaces to the NetX Smart Chains, directly enabling smart contracts to invoke micro-services hosted on Leviatom and AI models for big data processing on Behemotum. With the consensus-oriented programming protocols supported by Leviatom and Behemotum, the smart contracts on NetX Smart Chains gain the ability to verify the genuine execution of off-chain computations and big data analytics easily. This integration enables the ultimate scaling for EVM-compatible chains, as it harnesses the power of off-chain resources and big data analytics while maintaining trust and verification through the consensus mechanisms provided by Leviatom and Behemotum.

Divina streamlines the critical functions for crafting and disseminating software components, i.e. smart contracts for NetX Smart Chains and micro-services for Leviatom and Behemotum. Notably, it diligently records the entire construction process for each software component, ensuring that every element can be traced back to its source code, along with the properties of the building environment. This comprehensive tracking capability empowers developers to thoroughly examine source codes and building environments, uncovering valuable properties of the software components. These newly discovered properties are then integrated into Leviatom Ledgers, augmenting node-to-node and service-to-service verification capabilities, ultimately enhancing trust and security within the NetX ecosystem.

Divina also plays a pivotal role in revolutionising the integration of Web 2.0 applications into the Web 3.0 era. It offers a transformative solution by seamlessly migrating all Web 2.0 applications to Leviatom and Behemotum. This migration addresses whether previous Web 2.0 applications need redevelopment and provides a clear answer: all cloud-native and containerised Web 2.0 applications can effectively run on Leviatom and Behemotum. Divina also envisions an open ecosystem that welcomes Web 2.0 developers worldwide. This openness fosters a vibrant and intricate microservices biosphere on Leviatom and Behemotum. Here, large-scale software programs are no longer developed solely through top-down approaches. Instead, each application actively seeks and dynamically links with other software, forming expansive distributed software clusters that adapt and evolve in response to user needs. Moreover, Divina's incentive mechanism encourages Web 2.0 developers to engage in software development and release it on Leviatom, contributing to a robust off-chain scaling solution for public chains.

Triathon is at the forefront of ensuring the security and reliability of smart contracts and micro-services. It employs an advanced AI-driven testing framework combining static scanning and dynamic fuzzing techniques to thoroughly assess these software components' functionality and vulnerabilities. Triathon continuously trains its internal AI model with the insights it gains, leading to more rapid and extensive examinations. This enriches the properties of smart contracts on Layer 1 and micro-services on Layer 0, allowing users to set testing criteria for these vital components before deployment. Additionally, Triathon serves as a real-time threat intelligence service, vigilantly monitoring the performance of these elements to identify and promptly address any malfunctions or vulnerabilities.

Triathon's integration of AI training and fuzzy testing methods empowers its internal AI to self-train, marking a significant leap forward in the field, reminiscent of the achievements of AlphaGo and AlphaZero in the game of Go. Much like AlphaZero surpassed the skills of its predecessor, AlphaGo, through self-improvement and reinforcement learning, Triathon is actively developing self-learning capabilities. In contrast to employing human security analysts to obtain training data, Triathon's AI doesn't rely on external guidance but instead engages in continuous testing, fuzzy test validation, and reinforcement learning to enhance its contract vulnerability detection capabilities. This unique approach also encourages active participation from community members in the training process, enabling them to contribute to Triathon's evolution and earn rewards. With advancements in its model and reinforcement learning techniques, Triathon aspires to become the industry's most advanced contract vulnerability detection platform, ensuring the security and integrity of the NetX ecosystem.

Last updated