The deeper chain is a truly decentralized public blockchain
characterized by high security, high efficiency, and micro-energy
There are two layers in the deeper chain. The top layer consists of hundreds of validator nodes and is secured by credit scores of deeper devices; the more people involved in bandwidth sharing, the more secure the network will be. The bottom layer is called the deeper layer, and it consists of peer-to-peer connected Deeper devices. These devices earn token rewards by sharing their bandwidth with each other. Mining rewards distributed to Deeper devices will incentivize more people to share their bandwidth. This closed-loop increases the security of the whole network; Deeper's PoC consensus protocol ensures the network is resistant to various common threats such as Sybil, Eclipse, and 51% attacks.
Deeper proposes an innovative consensus algorithm called PoC (Proof
of Credit) that emulates the credit system in our daily life. PoC
ensures true decentralization as every participant on the network is
given an equal chance to contribute and earn rewards. It prevents
one class of participants from dominating over others.
Unlike the standard Nakamoto consensus protocols, PoC does not rely on solving a complex computation puzzle to achieve consensus, instead, PoC allows Deeper devices to mine new tokens via bandwidth sharing and enables mining rigs to participate with extremely low computing resources. The deeper chain miner tops out at a slim 15 watts, which is significantly lower than traditional ASIC/GPU miners.
Each device will be associated with an account i.e. public address. The more bandwidth a device shares, the more credit score it will earn. Each device will delegate its voting power (a function determined by its credit score) to a validator. Consensus will be reached if more than ⅔ of total validators' voting power agrees on a new block. After a new block is mined, the accounts will be rewarded proportional to their credit scores. Each account’s credit score is capped by at a maximum value. PoC is similar to proof of stake, but a validator’s voting power depends on both staked tokens and delegated credit scores.
Deeper Network uses its native token called DPR for economic
incentivization, as well as for service provider micro-payments. It
serves as the main unit of value in the Deeper Network.
New DPR is created through staking by validators and the total supply is capped at 10 billion. The value of DPR created during each block decays over time, similarly to, e.g., Bitcoin. The emission amount per block is recalculated every 518400 blocks to remainder/77760000, where the remainder is the difference between 10 billion and the current supply.
Deeper Connect allows users to make part of their home network bandwidth available to the public to earn DPR as a service fee. The users can configure the shared bandwidth or shared time period to ensure that their normal network use is not affected. When another user takes advantage of that shared bandwidth, the user must pay a service fee in DPR based on the traffic volume and throughput. It’s the fact that users can employ Deeper Connect as a mining rig to mine DPR.
AtomOS is the world’s first lock-free network operating system build
with speed and security in mind.
Via an original HIPE data structure and a lock-free design, multiple CPUs can filter and subcontract data packets making their processing highly scalable. It also guarantees that the data packet arrangement is consistent with its original order. AtomOS uses zero-copy technology to read data packets directly from network devices and hand them over for processing. This increases data packet forwarding speeds tenfold, as compared to traditional operating systems (such as Linux, FreeBSD, etc.). AtomOS also serves the function of a 7-layer firewall, performing deep high-speed filtering of data packets on generous hardware requirements. This results in a 10x reduction in costs compared to professional hardware used by traditional network firewalls.
The Trident protocol is a decentralized, shared communications protocol based on blockchain technology. It circumvents network censorship, secures data transmissions, maximizes the use of network bandwidth, and reduces delays in the data packet transmission process. This is achieved thanks to the efficient integration of network technologies such as intranet penetration, data encryption, protocol camouflage, and tunnel layer congestion control.
AtomOS integrates an application identification engine that is reliable, efficient, and scalable. It identifies common network traffic and performs flow control or smart routing to optimize the user experience for key applications. Also, it guarantees smooth tunnel service without consuming excessive local resources.