SlideShare a Scribd company logo
1 of 19
Download to read offline
™
AnuuTech ID
& Network
ANUUTECH ID & NETWORK
page 2
WWW.ANUUTECH.COM
page xy
page 3
Table of Contents
Table of Contents								 Page 3
Intro Page 4
The Basics of AnuuTech ID							 Page 4
The Basics of AnuuTech ID diagram 1 Page 4
The Basics of AnuuTech ID diagram 2, Network entities 			 Page 5
Diagram- a simple AnuuTech ID sequence Page 6
AnuuTech Network - The new internet of services Page 7
Diagram- new internet of services Page 7
AnuuTech Network-Peers Page 8
Connection Layers Page 8
Diagram 1- Connection Layers						 Page 9
Diagram 2- Connection Layers, two entities	 Page 9
Diagram 3- Connection Layers, multi tunnels Page 9
Entry Layer Page 10
Diagram 1- Entry Layer Page 10
Diagram 2- Entry Layer, six entities Page 11
Diagram 3- Entry Layer, new connections Page 12
The Routing Layer Page 13
Diagram- Routing Layer Page 14
Transport Layer Page 15
Diagram- Transport Layer Page 15
Functional Application Service Group Layer Page 16
Diagram 1- Functional Application Service Group Layer 			 Page 16
Diagram 2- Example Functional Application Service Group Layer Page 17
AnuuTech Network Entity Lifecycle Page 18
Code agnostic – JSON							 Page 18
Glossary Page 19
page xy
AnuuTech Network
Intro
AnuuTech Network brings a new dimension to traditional networks. Its layered structures, dynamic gateways,
trusted connections and network consensus optimizes the communication, security and speed of the network. On
top of that, our functional layers make the scalability infinite, the more entities join our network the faster it
becomes. Possibilities become endless, as for example suddenly your mobile phone gets a ton of computing power
as its fingertips, your intercompany connections become faster and hugely redundant, and companies that have
spare hardware can make money by simply outsourcing that unused computer power. AnuuTech Network is the
next generation of networks.
The basics of AnuuTech ID
Before we dive into AnuuTech Network, there are some things you need to understand about AnuuTech IDs. ID is
what we call, the next generation of IP addresses. It is a collection of smart data properties for a giving network
entity, that provides identification, application specifics and virtual geographical position within the ecosystem
which is represented via the ID #. The AnuuTech ID number can be thought of as the“GEN2 IP Address” of the
virtual entity.
Network entities communicate and understand the locations of other entities leveraging the smart data contained in
the AnuuTech ID. Each eco-layer, Entry, Routing, APP, Node, and functional application groups will have an
AnuuTech ID #. Additionally, the AnuuTech ID properties contains the necessary information and keys for secured
encrypted communication between peers and entities within the ecosystem – which allows for pre-built P2P like
connections between functional application/service groups.
Virtual Geographical Position
Identification
Αpplication Specifics
Smart Data
Properties
(contained in AnuuTech ID)
AnuuTech™
ecosystem
#
AnuuTech ID (collection of Smart Data Properties) is
provided within the ecosystem in the form of an
AnuuTech ID number.
ID ID
page 4
WWW.ANUUTECH.COM
WWW.ANUUTECH.COM
page xy
This implies that AnuuTech ID also stores various information keys (certificate of transport and certificates of payload
encryption) to allow for identification, authorization, encrypted communication between peers. These sets of
properties within AnuuTech ID are represented via a hash, which is stored locally within the network entity. The
characteristics and behavior of AnuuTech ID can be described as a special local encrypted database that houses
several data properties as described previously.
Virtual Geographical Position
Identification
Αpplication Specifics
Smart Data
Properties
(contained in AnuuTech ID)
c
o
n
t
a
i
n
t
he necessary information and keys for secured encrypted communication
between entities within the ecosystem
c
o
n
t
a
i
n
the necessary information and keys for secured encrypted communication
between peers within the ecosystem*
#6
#1
#2
#3
#4
#5
Eco-layer
Entry Routing
Functional Appliacation
APP
Node
ID
*AnuuTech ID also stores various information keys
(certificate of transport and certificates of payload
encryption) to allow for identification, authorization,
encrypted communication between peers. These sets of
properties within AnuuTech ID are represented via a hash,
which is stored locally within thenetwork entity.
ID number
(collection of Smart
Data Properties)
, ...
#1 #2
Network Entity
• Eco-layer
• Entry
• Routing
• APP
• Node
• Functional
Application
page 5
WWW.ANUUTECH.COM
page xy
A simple AnuuTech ID sequence
Private key of AnuuTech ID address is stored locally
but encrypted using a password
Each AnuuTech ID entity is using its own
private key for encryptions.
Conenction and sync via AnuuTech Network
ALICE
#1
AnuuTech ID NUMBER
00000000-00000001
AnuuTech ID Serial
0001
Software ID
AA00-01
Hardware ID
HW0000-0001
Connected AnuuTech IDS
None
BOB
#2
AnuuTech ID NUMBER
00000000-00000002
AnuuTech ID Serial
0001
Software ID
AA00-01
Hardware ID
HW0000-0001
Connected AnuuTech IDS
0002
BOB
#2
AnuuTech ID NUMBER
00000000-00000002
AnuuTech ID Serial
0002
Software ID
AA00-01
Hardware ID
HW0000-0002
Connected AnuuTech IDS
0001
page 6
Connected AnuuTech IDS
Connected AnuuTech IDS
WWW.ANUUTECH.COM
page xy
AnuuTech Network – The new internet of services
When comparing traditional networks used today to AnuuTech Network, we clearly see that the speed of network
convergence between network entities is much slower as a result of classic IP level connections structures – for
example, IP:PORT < -- > IP:PORT and application/web components geographically dispersed in different servers. This
typically results in longer initial connection generation and a high number of independent connections to various
destinations.
Traditional networks will build the connection when required, such as SSL validation of webpages. Before any data is
transmitted, the SSL handshake process must be completed, slowing down the overall connection and processing of
data. This legacy way of building encrypted connections before data is able to send, via data transmissions, allows
for latency and degraded network and application performance.
On the AnuuTech Network, all of the necessary connections are already pre-built. Data can be sent instantly which
makes the whole process way faster than on a traditional network.
AnuuTech Network will leverage pre-authenticated and pre-established connections which allows data
communication and transfers to take place immediately – removing the need to continuously build authenticated
new connections that depend on a number of external factors. This allows a high level of efficiency leveraging
prebuilt encrypted tunnels between applications resulting in immediate execution of data communication and data
transmission between functional application groups.
This eventually translates to faster initial application communication generation times and overall end to end
request/reply data transmissions, such as (multi)IP:(multi)PORT connections. The result is a more secured and trusted
communication between multiple AnuuTech ID identified entities.
network
• classic IP-level connections structures
• build the connection when required
(encrypted connections before data is able to send)
• application/web components geographically dispersed
in different servers
High number of independent connections to various destinations
Slowing down the overall connection and processing of data
Degraded network and application performance
Longer initial connection generation
Speed of network convergence between network entities is very slow
Latency
AnuuTech Network
Traditional Networks
• all of the necessary connections are already pre-built
• leveraging of pre-authenticated and pre-established connections
• no need to continuously build authenticated new connections
that depend on a number of external factors
• faster overall end to end request/reply
• faster initial application communication
Speed of network convergence between network entities is very fast
Faster initial application communication generation times
Data can be sent instantly
The result is a more secured and trusted communication
between multiple AnuuTech ID identified entities.
page 7
WWW.ANUUTECH.COM
page xy
AnuuTech Network, is a specialized network that allows for VPN like P2P communication (AnuuTech ID-EPPP
protocol), via UDP packets, between authorized peers and functional application service layers (also service-groups)
involved in the static ecosys-tem leveraging AnuuTech ID encrypted properties. These functional application service
layers will be comprised of the following:
1) Entry/Connection Layer
2) Routing/AnuuTech ID Adjacency Map
Layer
3) Transport Layer
4) Functional Application Service Group Layer
5) PARLEY – communication language
The AnuuTech ID gateway groups towards other functional group layers exist out of multiple entities, not only
making it a redundant setup at all time but also making the throughput scalable to the needs of the network.
This makes the AnuuTech Network suited for many new services that can’t be provided using a traditional network
such as download boosting and offline receiving similar to our e-mail systems, but with other services.
AnuuTech Network-Peers
AnuuTech Network-Peers are two AnuuTech Network entities that have established a connection for exchanging
PARLEY information. These AnuuTech Network-peers exchange various AnuuTech ID and adjacency mapping
information between them via sessions.
Connection layers
In this paragraph, we’ll talk about how entities connect to the rest of the network. We’ll be talking about entities in
the network, these entities can be nodes, Node service providers, ANUU clients, storage servers, applications and
other various virtual elements and groups.
The AnuuTech Network is made out of entities connected to their closest neighbors. These are trusted connections
and are maintained until a neighboring entity leaves the network or the consensus rules are broken. We’ll get back to
these rules later on.
page 8
WWW.ANUUTECH.COM
page xy
When a connection between 2 entities is established, this becomes a private and trusted tunnel.
Network Entity
Trusted
connection
(maintained)
Trusted
connection
(not-maintained)
AnuuTech
Network
Entity y leaving network
or consensus is broken
AnuuTech Network
Entity x
Entity z
Entity y
Entity y
connection between two entities is established creation of a private and trusted tunnel
Network Entity Private and trusted tunnel
page 9
WWW.ANUUTECH.COM
page xy
...
tunnel n
(consensus n)
Entry layer
This layer provides strict authentication and authorization processes for users and node service providers. This
process includes various validation steps to determine if a new or returning node can be trusted. To establish its
trustworthiness, the remote host must provide an acceptable authentication certificate which is then validated to
form a chain of trust.
The entry layer leverages an authentication technology known as AnuuTech ID protocol. As described above,
AnuuTech ID maintains multiple fields that are used to validate a node trust level.
This form of authentication allows nodes to securely access the static network by exchanging AnuuTech ID digital
hash signatures instead of a username and password. This means the candidate node is not sending a username or
password to the server which helps in preventing phishing, keystroke logging and man-in-the-middle (MITM) attacks
among other common problems with password-based authentication.
Multiple tunnels exist between 2 entities, each respecting their own consensus. The consensus of each tunnel
controls the usage of it. For example, you won’t be able to use a“routing message tunnel”to transmit other types of
data as these are on other layers. Having these trusted connections between entities makes for much faster
transmissions throughout the network, as there’s no need to constantly recreate and authenticate these tunnels.
The required keys for these secure, encrypted connections are stored in the AnuuTech ID’s.
tunnel 1
(consensus 1)
tunnel 2
(consensus 2)
tunnel 3
(consensus 3)
Network entity 1 Network entity 2
provides an authentication certificate
not sending usernames or passwords
sending AnuuTech ID digital hash signatures
certificate gets accepted
and node trust level is validated
Candidate Node Node
ID
AnuuTech™Network
Node
AnuuTech ID authentication allows nodes to securely access the AnuuTEch™ network by
exchanging AnuuTech ID digital hash signatures instead of a username and password.
Candidate
Node
Authentication
Certificate (sent)
Authentication
Certificate (accepted)
page 10
WWW.ANUUTECH.COM
page xy
E
It’s within this layer where new and returning nodes will provide identity credentials in the form of a hash to the
static entry protocol to validate the candidate node’s signature to join the static network. The result is forming the
nodes AnuuTech ID trustworthiness.
In this drawing, you see a network of 6 entities connected to each other. Each entity has a connection to its
closest neighbor. They use the PARLEY language for the communication between entities.
A
F
B
C
D
PARLEY
PARLEY
P
A
R
L
E
Y
P
A
R
L
E
Y
PARLEY
PARLEY
PARLE
Y
P
A
R
L
E
Y
P
A
R
L
E
Y
PARLEY
page 11
WWW.ANUUTECH.COM
page xy
When a new entity joins the
network, it sends out a PARLEY
discovery/registration message
looking to build a connection to its
closest neighbors. These requests
are forwarded by the other entities
to its future closest neighbor. After
the others receive this message, the
procedure for new connections will
be initiated.
In this example, X is the new entity
and the blue lines are the new
connections. The closest neighbor
in the network will initialize the
connection. This existing member
entity will send an invite to the new
entity to join the network. This
connection enables the new entity
to get a list of possible future
connections through PARLEY.
X : New Entity
New
connection
(1) request is forwarded by Entity E to New Entity’s future closest neighbors (A,F)
(2) request is forwarded by Entity D to New Entity’s future closest neighbors (F,C)
X
E
D
A
F
B
C
X
(closest neighbor to New Entity)
E
(closest neighbor to New Entity)
D
s
e
n
d
s
o
u
t
a
PARLEY
is
covery/registration message
l
o
o
k
i
n
g
t
o
b
u
i
l
d
a
connection to its closest neighbor (E)
E
n
t
i
t
y
E
s
e
n
d
s
a
n
invite to the New Entity to
j
o
i
n
t
h
e
n
e
t
w
o
r
k. This connection enables
t
h
e
N
e
w
E
n
t
i
ty to get a list of possible
f
u
t
u
r
e
c
o
n
n
ections throughPARLEY.
sends out a PARLEY iscovery/registration message
l
o
oking to build a connection to its closest neighbor (D)
E
n
t
i
t
y
D
sends an invite to the New Entity
j
o
i
n
t
h
e
network. This connection enables
t
h
e
N
ew
Entity to get a list of possible
f
u
t
ure
connections through PARLEY.
(1)
(2)
(1)
(2)
page 12
WWW.ANUUTECH.COM
page xy
The routing (Network map) layer and AnuuTech Network consensus
The base of the AnuuTech Network is the network map or routing layer. On this layer, every entity has an AnuuTech
ID number and every connection (gateway) to reach another layer exists. The Transport Layer provides logical
PARLEY communication between entities, and their associated functional application service groups, leveraging the
adjacency map provided by AnuuTech Network routing layer. Within the layer, responsibility for communication
management will involve error correction during the send and receive actions for each entity over the AnuuTech
Network.
The network map is updated every time a client or entity enters or leaves the network. It’s important to notice here
that as stated before, only a small part of the network map needs to be refreshed whenever an event takes place.
The routing layer leverages AnuuTech Network, a special VPN solution that will allow the initial communication
between all peers included in the Node ecosystem – forming direct connections between targeted AnuuTech ID
entities. When the routing layer process is initiated, nodes establish information gather via the AnuuTech ID
certificate profile, which contains geographical location position information. When this geographical location is
shared between trusted entities, it will know and keep record of each entity’s physical position – establishing an
entity neighbor position map.
When establishing the routing path, the routing layer will ensure that only the best-known paths are in place to get
proper PARLEY communication via the transport layer. This suggests that each entity will have a direct AnuuTech
Network connection to each other without path entanglement – forming a connection consensus.
As new entities join the network and connections are made, it could happen that these connections cross the
existing ones. The consensus forbids connections crossing each other and prioritizes the shortest connections
between the entities.
We’ll explain this with an example of another entity (Z) joining the network.
The entity is now connected to the AnuuTech Network, but the connection between F and Z is crossing the
connection between D and E. Because of the connection between D and E is longer than the one between F and Z,
this connection (red line) is terminated.
X
E
D
A
F
B
E
Z
Z : New Entity
New
connection
Old
connection
(terminated)
page 13
WWW.ANUUTECH.COM
page xy
This means that every new connection to the network can cause a change to the network map. The big advantage is
that these structural changes only affect a very small part of the network, being the neighbors of the new or discon-
necting entity. In the next drawing, you’ll see entity A leaving the network.
With entity A having left the network, this could be a client closing its ANUU app or a node going offline, the neigh-
bors re-evaluate and/or rebuild their connections to the other neighbors. At this point, the network map is changed
but only a slight part of the entities are affected by this.
The tunnels that existed when entity A was connected to the network are cached. When the entity comes online
again it will try to use the cached tunnel information to rebuild its new tunnels, if no consensus rules are broken.
With AnuuTech Network connection consensus algorithm, changes in adjacencies get handled in an efficient way
that establishes those connections quickly and without connection entanglement.
X
E
D
F
B
C
Z
page 14
WWW.ANUUTECH.COM
page xy
Transport layer
A client requesting a specific service is routed to the correct layer via AnuuTech ID gateway groups. These layers are
called Functional layers and will be explained later on in this document.
An AnuuTech ID gateway group exists out of multiple entities that have connections between layers. This AnuuTech
ID gateway group is used by entities that require a passthrough to another functional group layer. The AnuuTech ID
gateway groups have an AnuuTech ID number of their own. When a connection is directed towards the AnuuTech ID
number of a gateway group, one of the members inside the AnuuTech ID gateway group handles the connection.
Within this layer, all authentications and tunnel connections are established during the routing adjacency layer stage
between entities, allowing the elimination for communication initialization.
Each functional group layer has its own network map. On this map, entities are connected to each other using the
nearest neighbor and respecting the AnuuTech Network consensus. Because this is a whole new layer, the
connections between entities may vary from the initial layer they connected on as their position on this layer is
different. The map and all of its layers are permanently connected to each other through neighboring trusted
tunnels.
The next drawing shows a visual understanding of the layers, AnuuTech ID gateway groups and direct connections:
Network Map
Layer
Z
E
D
F
B
C
X
G
AnuuTech ID Gateway Group
Functional group layer:
Storage
F
X
A
B
D
Functional group layer:
Computing Power
D
A
Χ F
page 15
WWW.ANUUTECH.COM
page xy
Functional Application Service Group Layer
The various services within the DAPP ecosystem are organized in functional groups within different AnuuTech
Network function layers.
Each layer has its own consensus and AnuuTech ID data. The access to a layer is controlled by both the consensus
rules active on the layer and the data stored in the AnuuTech ID, dependent on for example the DAPP a client wants
to use.
Each functional layer is grouped by functionality, resulting in private functional groups that are peered together via
layer-gateways. These functional groups each have AnuuTech ID properties that allow AnuuTech Network entities,
belonging to different functional layers, to send PARLEY messages to other AnuuTech Network entities residing in
different functional groups - leveraging the functional group address information found in the AnuuTech ID
certificate.
AnuuTech ID Gateway
Functional group B
Functional group A
Optional direct link
between FG members
page 16
WWW.ANUUTECH.COM
page xy
Example:
An ANUU mobile client logs on to the network, looking for a temporary computing power solution. The client makes
a connection to the AnuuTech Network (assuming it wasn’t already connected) where it gets an AnuuTech ID number
with the necessary information, including the rights to access the functional layer on which the nodes reside provid-
ing this service. The connection travels through the neighbors to eventually reach the AnuuTech ID gateway group,
connecting the initial network map layer to the needed functional group layer.
The ANUU mobile client gains access to a direct connection to the“computing power”layer on the network, and
suddenly you have a mobile phone with computing power equivalent to a server network!
The ANUU client connects to the AnuuTech Network The ANUU client gets an AnuuTech ID number
with the necessary information *
AnuuTech
network
#
* including the rights to access the functional layer on which the nodes reside providing this service
The ANUU mobile client gains access to a direct connection
to the“computing power”layer on the network
Functional group layer:
Computing Power
The connection travels through the neighbors
to eventually reach the AnuuTech ID gateway
Functional group layer
Network Map
Layer
a conection between the initial network map layer
and the functional group layer is established
AnuuTech Gateway
page 17
WWW.ANUUTECH.COM
page xy
page 18
AnuuTech Network entity lifecycle
The connection lifecycle of an AnuuTech Network Entity is one that may exist on many different functional layers –
those being Entry, Routing and Service Function layers. These together form what is known as the AnuuTech Global
Network.
The first layer, as described above, is the Entry layer. When a new AnuuTech Network Entity candidate attempts to
join the network, it will contact an entity node that exists within the Entry layer. This entity uses both standard IPv4/6
along with AnuuTech ID AnuuTech Network addressing to communicate with entity candidates and with the Routing
(Adjacency Map) layer.
Once the AnuuTech Network Entity candidate initiates and makes the PARLEY request to the Entry Layer
participating entity nodes, that PARLEY request will contain the candidate entity’s AnuuTech ID information that will
be routed within the Entry Layer to the closest entity leveraging the AnuuTech ID position ID and routing layer.
Once the AnuuTech ID authentication consensus has been completed, the new entity will be granted access to the
routing layer – allowing new adjacency routes to be formed. In this phase, the entity will build direct connections
through the AnuuTech ID gateway groups to either entities in the required functional layers itself, or to the AnuuTech
ID gateways in case the network consensus doesn’t allow the direct connection for as long as the entity stays within
the network.
Code agnostic – JSON
Our network will be available through an API interface which supports JSON formatted payloads, this enables devel-
opers to connect to our network using every programming language out there as long as it supports network calls
and JSON payloads. This functionality is supported by all current major programming languages that are commonly
used.
Our API will be fully documented and fitted with examples for each possible call in the most common programming
languages so developers can start right away connecting their applications to the AnuuTech network.
WWW.ANUUTECH.COM
page xy
Glossary
DAPP:
PARLEY:
AnuuTech ID:
IP:
SSL:
Nodes
UDP:
VPN:
A Decentralized Application is a computer application that runs on a distributed computing
system. DAPPS have been popularized by distributed ledger technologies (DLT) such as the
Ethereum Blockchain, where DAPPS are often referred to as smart contracts.
AnuuTech Network: On the AnuuTech Network, all of the necessary connections are already
pre-built. Data can be sent instantly which makes the whole process way faster than on a
traditional network.
The next generation of IP addresses. It is a collection of smart data properties for a given
network entity, that provides identification, application specifics and virtual geographical
position within the ecosystem.
Internet Protocol, principal communication protocol in the internet protocol suite.
Secure Sockets Layer is a standard security technology for establishing an encrypted link
between a server and a client.
Nodes form the backbone of the AnuuTech network. They perform a crucial role in the
consensus, security, and governance of the platform.
User Datagram Protocol is a communications protocol that is primarily used for establishing
low-latency and loss-tolerating connections between applications on the internet. It speeds
up transmissions by enabling the transfer of data before an agreement is provided by the
receiving party.
Virtual Private Network describes the opportunity to establish a protected network con-
nection when using public networks.
ANUU: As the name suggests, ANUU is an exciting and easy-to-use application designed
to help you securely store, track, and manage your crypto assets and portfolio.
All documents, reports and other incidental or derivative work or materials furnished herein remains the sole property
of AnuuTech. None of the documents, reports and other incidental or derivative work or furnished materials shall be
used by the reader without the express written consent of AnuuTech.
page 19
WWW.ANUUTECH.COM

More Related Content

Similar to AnuuTech ID and Network.pdf

IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...TELKOMNIKA JOURNAL
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET Journal
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformIRJET Journal
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 

Similar to AnuuTech ID and Network.pdf (20)

Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
G04734450
G04734450G04734450
G04734450
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...
 
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...KAFA: A novel interoperability open framework to utilize Indonesian electroni...
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
Design of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android PlatformDesign of A Home Surveillance System Based on the Android Platform
Design of A Home Surveillance System Based on the Android Platform
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

AnuuTech ID and Network.pdf

  • 2. ANUUTECH ID & NETWORK page 2 WWW.ANUUTECH.COM
  • 3. page xy page 3 Table of Contents Table of Contents Page 3 Intro Page 4 The Basics of AnuuTech ID Page 4 The Basics of AnuuTech ID diagram 1 Page 4 The Basics of AnuuTech ID diagram 2, Network entities Page 5 Diagram- a simple AnuuTech ID sequence Page 6 AnuuTech Network - The new internet of services Page 7 Diagram- new internet of services Page 7 AnuuTech Network-Peers Page 8 Connection Layers Page 8 Diagram 1- Connection Layers Page 9 Diagram 2- Connection Layers, two entities Page 9 Diagram 3- Connection Layers, multi tunnels Page 9 Entry Layer Page 10 Diagram 1- Entry Layer Page 10 Diagram 2- Entry Layer, six entities Page 11 Diagram 3- Entry Layer, new connections Page 12 The Routing Layer Page 13 Diagram- Routing Layer Page 14 Transport Layer Page 15 Diagram- Transport Layer Page 15 Functional Application Service Group Layer Page 16 Diagram 1- Functional Application Service Group Layer Page 16 Diagram 2- Example Functional Application Service Group Layer Page 17 AnuuTech Network Entity Lifecycle Page 18 Code agnostic – JSON Page 18 Glossary Page 19
  • 4. page xy AnuuTech Network Intro AnuuTech Network brings a new dimension to traditional networks. Its layered structures, dynamic gateways, trusted connections and network consensus optimizes the communication, security and speed of the network. On top of that, our functional layers make the scalability infinite, the more entities join our network the faster it becomes. Possibilities become endless, as for example suddenly your mobile phone gets a ton of computing power as its fingertips, your intercompany connections become faster and hugely redundant, and companies that have spare hardware can make money by simply outsourcing that unused computer power. AnuuTech Network is the next generation of networks. The basics of AnuuTech ID Before we dive into AnuuTech Network, there are some things you need to understand about AnuuTech IDs. ID is what we call, the next generation of IP addresses. It is a collection of smart data properties for a giving network entity, that provides identification, application specifics and virtual geographical position within the ecosystem which is represented via the ID #. The AnuuTech ID number can be thought of as the“GEN2 IP Address” of the virtual entity. Network entities communicate and understand the locations of other entities leveraging the smart data contained in the AnuuTech ID. Each eco-layer, Entry, Routing, APP, Node, and functional application groups will have an AnuuTech ID #. Additionally, the AnuuTech ID properties contains the necessary information and keys for secured encrypted communication between peers and entities within the ecosystem – which allows for pre-built P2P like connections between functional application/service groups. Virtual Geographical Position Identification Αpplication Specifics Smart Data Properties (contained in AnuuTech ID) AnuuTech™ ecosystem # AnuuTech ID (collection of Smart Data Properties) is provided within the ecosystem in the form of an AnuuTech ID number. ID ID page 4 WWW.ANUUTECH.COM WWW.ANUUTECH.COM
  • 5. page xy This implies that AnuuTech ID also stores various information keys (certificate of transport and certificates of payload encryption) to allow for identification, authorization, encrypted communication between peers. These sets of properties within AnuuTech ID are represented via a hash, which is stored locally within the network entity. The characteristics and behavior of AnuuTech ID can be described as a special local encrypted database that houses several data properties as described previously. Virtual Geographical Position Identification Αpplication Specifics Smart Data Properties (contained in AnuuTech ID) c o n t a i n t he necessary information and keys for secured encrypted communication between entities within the ecosystem c o n t a i n the necessary information and keys for secured encrypted communication between peers within the ecosystem* #6 #1 #2 #3 #4 #5 Eco-layer Entry Routing Functional Appliacation APP Node ID *AnuuTech ID also stores various information keys (certificate of transport and certificates of payload encryption) to allow for identification, authorization, encrypted communication between peers. These sets of properties within AnuuTech ID are represented via a hash, which is stored locally within thenetwork entity. ID number (collection of Smart Data Properties) , ... #1 #2 Network Entity • Eco-layer • Entry • Routing • APP • Node • Functional Application page 5 WWW.ANUUTECH.COM
  • 6. page xy A simple AnuuTech ID sequence Private key of AnuuTech ID address is stored locally but encrypted using a password Each AnuuTech ID entity is using its own private key for encryptions. Conenction and sync via AnuuTech Network ALICE #1 AnuuTech ID NUMBER 00000000-00000001 AnuuTech ID Serial 0001 Software ID AA00-01 Hardware ID HW0000-0001 Connected AnuuTech IDS None BOB #2 AnuuTech ID NUMBER 00000000-00000002 AnuuTech ID Serial 0001 Software ID AA00-01 Hardware ID HW0000-0001 Connected AnuuTech IDS 0002 BOB #2 AnuuTech ID NUMBER 00000000-00000002 AnuuTech ID Serial 0002 Software ID AA00-01 Hardware ID HW0000-0002 Connected AnuuTech IDS 0001 page 6 Connected AnuuTech IDS Connected AnuuTech IDS WWW.ANUUTECH.COM
  • 7. page xy AnuuTech Network – The new internet of services When comparing traditional networks used today to AnuuTech Network, we clearly see that the speed of network convergence between network entities is much slower as a result of classic IP level connections structures – for example, IP:PORT < -- > IP:PORT and application/web components geographically dispersed in different servers. This typically results in longer initial connection generation and a high number of independent connections to various destinations. Traditional networks will build the connection when required, such as SSL validation of webpages. Before any data is transmitted, the SSL handshake process must be completed, slowing down the overall connection and processing of data. This legacy way of building encrypted connections before data is able to send, via data transmissions, allows for latency and degraded network and application performance. On the AnuuTech Network, all of the necessary connections are already pre-built. Data can be sent instantly which makes the whole process way faster than on a traditional network. AnuuTech Network will leverage pre-authenticated and pre-established connections which allows data communication and transfers to take place immediately – removing the need to continuously build authenticated new connections that depend on a number of external factors. This allows a high level of efficiency leveraging prebuilt encrypted tunnels between applications resulting in immediate execution of data communication and data transmission between functional application groups. This eventually translates to faster initial application communication generation times and overall end to end request/reply data transmissions, such as (multi)IP:(multi)PORT connections. The result is a more secured and trusted communication between multiple AnuuTech ID identified entities. network • classic IP-level connections structures • build the connection when required (encrypted connections before data is able to send) • application/web components geographically dispersed in different servers High number of independent connections to various destinations Slowing down the overall connection and processing of data Degraded network and application performance Longer initial connection generation Speed of network convergence between network entities is very slow Latency AnuuTech Network Traditional Networks • all of the necessary connections are already pre-built • leveraging of pre-authenticated and pre-established connections • no need to continuously build authenticated new connections that depend on a number of external factors • faster overall end to end request/reply • faster initial application communication Speed of network convergence between network entities is very fast Faster initial application communication generation times Data can be sent instantly The result is a more secured and trusted communication between multiple AnuuTech ID identified entities. page 7 WWW.ANUUTECH.COM
  • 8. page xy AnuuTech Network, is a specialized network that allows for VPN like P2P communication (AnuuTech ID-EPPP protocol), via UDP packets, between authorized peers and functional application service layers (also service-groups) involved in the static ecosys-tem leveraging AnuuTech ID encrypted properties. These functional application service layers will be comprised of the following: 1) Entry/Connection Layer 2) Routing/AnuuTech ID Adjacency Map Layer 3) Transport Layer 4) Functional Application Service Group Layer 5) PARLEY – communication language The AnuuTech ID gateway groups towards other functional group layers exist out of multiple entities, not only making it a redundant setup at all time but also making the throughput scalable to the needs of the network. This makes the AnuuTech Network suited for many new services that can’t be provided using a traditional network such as download boosting and offline receiving similar to our e-mail systems, but with other services. AnuuTech Network-Peers AnuuTech Network-Peers are two AnuuTech Network entities that have established a connection for exchanging PARLEY information. These AnuuTech Network-peers exchange various AnuuTech ID and adjacency mapping information between them via sessions. Connection layers In this paragraph, we’ll talk about how entities connect to the rest of the network. We’ll be talking about entities in the network, these entities can be nodes, Node service providers, ANUU clients, storage servers, applications and other various virtual elements and groups. The AnuuTech Network is made out of entities connected to their closest neighbors. These are trusted connections and are maintained until a neighboring entity leaves the network or the consensus rules are broken. We’ll get back to these rules later on. page 8 WWW.ANUUTECH.COM
  • 9. page xy When a connection between 2 entities is established, this becomes a private and trusted tunnel. Network Entity Trusted connection (maintained) Trusted connection (not-maintained) AnuuTech Network Entity y leaving network or consensus is broken AnuuTech Network Entity x Entity z Entity y Entity y connection between two entities is established creation of a private and trusted tunnel Network Entity Private and trusted tunnel page 9 WWW.ANUUTECH.COM
  • 10. page xy ... tunnel n (consensus n) Entry layer This layer provides strict authentication and authorization processes for users and node service providers. This process includes various validation steps to determine if a new or returning node can be trusted. To establish its trustworthiness, the remote host must provide an acceptable authentication certificate which is then validated to form a chain of trust. The entry layer leverages an authentication technology known as AnuuTech ID protocol. As described above, AnuuTech ID maintains multiple fields that are used to validate a node trust level. This form of authentication allows nodes to securely access the static network by exchanging AnuuTech ID digital hash signatures instead of a username and password. This means the candidate node is not sending a username or password to the server which helps in preventing phishing, keystroke logging and man-in-the-middle (MITM) attacks among other common problems with password-based authentication. Multiple tunnels exist between 2 entities, each respecting their own consensus. The consensus of each tunnel controls the usage of it. For example, you won’t be able to use a“routing message tunnel”to transmit other types of data as these are on other layers. Having these trusted connections between entities makes for much faster transmissions throughout the network, as there’s no need to constantly recreate and authenticate these tunnels. The required keys for these secure, encrypted connections are stored in the AnuuTech ID’s. tunnel 1 (consensus 1) tunnel 2 (consensus 2) tunnel 3 (consensus 3) Network entity 1 Network entity 2 provides an authentication certificate not sending usernames or passwords sending AnuuTech ID digital hash signatures certificate gets accepted and node trust level is validated Candidate Node Node ID AnuuTech™Network Node AnuuTech ID authentication allows nodes to securely access the AnuuTEch™ network by exchanging AnuuTech ID digital hash signatures instead of a username and password. Candidate Node Authentication Certificate (sent) Authentication Certificate (accepted) page 10 WWW.ANUUTECH.COM
  • 11. page xy E It’s within this layer where new and returning nodes will provide identity credentials in the form of a hash to the static entry protocol to validate the candidate node’s signature to join the static network. The result is forming the nodes AnuuTech ID trustworthiness. In this drawing, you see a network of 6 entities connected to each other. Each entity has a connection to its closest neighbor. They use the PARLEY language for the communication between entities. A F B C D PARLEY PARLEY P A R L E Y P A R L E Y PARLEY PARLEY PARLE Y P A R L E Y P A R L E Y PARLEY page 11 WWW.ANUUTECH.COM
  • 12. page xy When a new entity joins the network, it sends out a PARLEY discovery/registration message looking to build a connection to its closest neighbors. These requests are forwarded by the other entities to its future closest neighbor. After the others receive this message, the procedure for new connections will be initiated. In this example, X is the new entity and the blue lines are the new connections. The closest neighbor in the network will initialize the connection. This existing member entity will send an invite to the new entity to join the network. This connection enables the new entity to get a list of possible future connections through PARLEY. X : New Entity New connection (1) request is forwarded by Entity E to New Entity’s future closest neighbors (A,F) (2) request is forwarded by Entity D to New Entity’s future closest neighbors (F,C) X E D A F B C X (closest neighbor to New Entity) E (closest neighbor to New Entity) D s e n d s o u t a PARLEY is covery/registration message l o o k i n g t o b u i l d a connection to its closest neighbor (E) E n t i t y E s e n d s a n invite to the New Entity to j o i n t h e n e t w o r k. This connection enables t h e N e w E n t i ty to get a list of possible f u t u r e c o n n ections throughPARLEY. sends out a PARLEY iscovery/registration message l o oking to build a connection to its closest neighbor (D) E n t i t y D sends an invite to the New Entity j o i n t h e network. This connection enables t h e N ew Entity to get a list of possible f u t ure connections through PARLEY. (1) (2) (1) (2) page 12 WWW.ANUUTECH.COM
  • 13. page xy The routing (Network map) layer and AnuuTech Network consensus The base of the AnuuTech Network is the network map or routing layer. On this layer, every entity has an AnuuTech ID number and every connection (gateway) to reach another layer exists. The Transport Layer provides logical PARLEY communication between entities, and their associated functional application service groups, leveraging the adjacency map provided by AnuuTech Network routing layer. Within the layer, responsibility for communication management will involve error correction during the send and receive actions for each entity over the AnuuTech Network. The network map is updated every time a client or entity enters or leaves the network. It’s important to notice here that as stated before, only a small part of the network map needs to be refreshed whenever an event takes place. The routing layer leverages AnuuTech Network, a special VPN solution that will allow the initial communication between all peers included in the Node ecosystem – forming direct connections between targeted AnuuTech ID entities. When the routing layer process is initiated, nodes establish information gather via the AnuuTech ID certificate profile, which contains geographical location position information. When this geographical location is shared between trusted entities, it will know and keep record of each entity’s physical position – establishing an entity neighbor position map. When establishing the routing path, the routing layer will ensure that only the best-known paths are in place to get proper PARLEY communication via the transport layer. This suggests that each entity will have a direct AnuuTech Network connection to each other without path entanglement – forming a connection consensus. As new entities join the network and connections are made, it could happen that these connections cross the existing ones. The consensus forbids connections crossing each other and prioritizes the shortest connections between the entities. We’ll explain this with an example of another entity (Z) joining the network. The entity is now connected to the AnuuTech Network, but the connection between F and Z is crossing the connection between D and E. Because of the connection between D and E is longer than the one between F and Z, this connection (red line) is terminated. X E D A F B E Z Z : New Entity New connection Old connection (terminated) page 13 WWW.ANUUTECH.COM
  • 14. page xy This means that every new connection to the network can cause a change to the network map. The big advantage is that these structural changes only affect a very small part of the network, being the neighbors of the new or discon- necting entity. In the next drawing, you’ll see entity A leaving the network. With entity A having left the network, this could be a client closing its ANUU app or a node going offline, the neigh- bors re-evaluate and/or rebuild their connections to the other neighbors. At this point, the network map is changed but only a slight part of the entities are affected by this. The tunnels that existed when entity A was connected to the network are cached. When the entity comes online again it will try to use the cached tunnel information to rebuild its new tunnels, if no consensus rules are broken. With AnuuTech Network connection consensus algorithm, changes in adjacencies get handled in an efficient way that establishes those connections quickly and without connection entanglement. X E D F B C Z page 14 WWW.ANUUTECH.COM
  • 15. page xy Transport layer A client requesting a specific service is routed to the correct layer via AnuuTech ID gateway groups. These layers are called Functional layers and will be explained later on in this document. An AnuuTech ID gateway group exists out of multiple entities that have connections between layers. This AnuuTech ID gateway group is used by entities that require a passthrough to another functional group layer. The AnuuTech ID gateway groups have an AnuuTech ID number of their own. When a connection is directed towards the AnuuTech ID number of a gateway group, one of the members inside the AnuuTech ID gateway group handles the connection. Within this layer, all authentications and tunnel connections are established during the routing adjacency layer stage between entities, allowing the elimination for communication initialization. Each functional group layer has its own network map. On this map, entities are connected to each other using the nearest neighbor and respecting the AnuuTech Network consensus. Because this is a whole new layer, the connections between entities may vary from the initial layer they connected on as their position on this layer is different. The map and all of its layers are permanently connected to each other through neighboring trusted tunnels. The next drawing shows a visual understanding of the layers, AnuuTech ID gateway groups and direct connections: Network Map Layer Z E D F B C X G AnuuTech ID Gateway Group Functional group layer: Storage F X A B D Functional group layer: Computing Power D A Χ F page 15 WWW.ANUUTECH.COM
  • 16. page xy Functional Application Service Group Layer The various services within the DAPP ecosystem are organized in functional groups within different AnuuTech Network function layers. Each layer has its own consensus and AnuuTech ID data. The access to a layer is controlled by both the consensus rules active on the layer and the data stored in the AnuuTech ID, dependent on for example the DAPP a client wants to use. Each functional layer is grouped by functionality, resulting in private functional groups that are peered together via layer-gateways. These functional groups each have AnuuTech ID properties that allow AnuuTech Network entities, belonging to different functional layers, to send PARLEY messages to other AnuuTech Network entities residing in different functional groups - leveraging the functional group address information found in the AnuuTech ID certificate. AnuuTech ID Gateway Functional group B Functional group A Optional direct link between FG members page 16 WWW.ANUUTECH.COM
  • 17. page xy Example: An ANUU mobile client logs on to the network, looking for a temporary computing power solution. The client makes a connection to the AnuuTech Network (assuming it wasn’t already connected) where it gets an AnuuTech ID number with the necessary information, including the rights to access the functional layer on which the nodes reside provid- ing this service. The connection travels through the neighbors to eventually reach the AnuuTech ID gateway group, connecting the initial network map layer to the needed functional group layer. The ANUU mobile client gains access to a direct connection to the“computing power”layer on the network, and suddenly you have a mobile phone with computing power equivalent to a server network! The ANUU client connects to the AnuuTech Network The ANUU client gets an AnuuTech ID number with the necessary information * AnuuTech network # * including the rights to access the functional layer on which the nodes reside providing this service The ANUU mobile client gains access to a direct connection to the“computing power”layer on the network Functional group layer: Computing Power The connection travels through the neighbors to eventually reach the AnuuTech ID gateway Functional group layer Network Map Layer a conection between the initial network map layer and the functional group layer is established AnuuTech Gateway page 17 WWW.ANUUTECH.COM
  • 18. page xy page 18 AnuuTech Network entity lifecycle The connection lifecycle of an AnuuTech Network Entity is one that may exist on many different functional layers – those being Entry, Routing and Service Function layers. These together form what is known as the AnuuTech Global Network. The first layer, as described above, is the Entry layer. When a new AnuuTech Network Entity candidate attempts to join the network, it will contact an entity node that exists within the Entry layer. This entity uses both standard IPv4/6 along with AnuuTech ID AnuuTech Network addressing to communicate with entity candidates and with the Routing (Adjacency Map) layer. Once the AnuuTech Network Entity candidate initiates and makes the PARLEY request to the Entry Layer participating entity nodes, that PARLEY request will contain the candidate entity’s AnuuTech ID information that will be routed within the Entry Layer to the closest entity leveraging the AnuuTech ID position ID and routing layer. Once the AnuuTech ID authentication consensus has been completed, the new entity will be granted access to the routing layer – allowing new adjacency routes to be formed. In this phase, the entity will build direct connections through the AnuuTech ID gateway groups to either entities in the required functional layers itself, or to the AnuuTech ID gateways in case the network consensus doesn’t allow the direct connection for as long as the entity stays within the network. Code agnostic – JSON Our network will be available through an API interface which supports JSON formatted payloads, this enables devel- opers to connect to our network using every programming language out there as long as it supports network calls and JSON payloads. This functionality is supported by all current major programming languages that are commonly used. Our API will be fully documented and fitted with examples for each possible call in the most common programming languages so developers can start right away connecting their applications to the AnuuTech network. WWW.ANUUTECH.COM
  • 19. page xy Glossary DAPP: PARLEY: AnuuTech ID: IP: SSL: Nodes UDP: VPN: A Decentralized Application is a computer application that runs on a distributed computing system. DAPPS have been popularized by distributed ledger technologies (DLT) such as the Ethereum Blockchain, where DAPPS are often referred to as smart contracts. AnuuTech Network: On the AnuuTech Network, all of the necessary connections are already pre-built. Data can be sent instantly which makes the whole process way faster than on a traditional network. The next generation of IP addresses. It is a collection of smart data properties for a given network entity, that provides identification, application specifics and virtual geographical position within the ecosystem. Internet Protocol, principal communication protocol in the internet protocol suite. Secure Sockets Layer is a standard security technology for establishing an encrypted link between a server and a client. Nodes form the backbone of the AnuuTech network. They perform a crucial role in the consensus, security, and governance of the platform. User Datagram Protocol is a communications protocol that is primarily used for establishing low-latency and loss-tolerating connections between applications on the internet. It speeds up transmissions by enabling the transfer of data before an agreement is provided by the receiving party. Virtual Private Network describes the opportunity to establish a protected network con- nection when using public networks. ANUU: As the name suggests, ANUU is an exciting and easy-to-use application designed to help you securely store, track, and manage your crypto assets and portfolio. All documents, reports and other incidental or derivative work or materials furnished herein remains the sole property of AnuuTech. None of the documents, reports and other incidental or derivative work or furnished materials shall be used by the reader without the express written consent of AnuuTech. page 19 WWW.ANUUTECH.COM