====== 2.2.2.1 Network View ====== [[dido:public:ra:1.2_views:2_tech_views:2-nodenet:start|return to Node Network View ]] The Network View looks at the DIDO as a single [[dido:public:ra:xapend:xapend.a_glossary:e:entity|entity]]. Even though the network is comprised of a collection of individual [[dido:public:ra:xapend:xapend.a_glossary:n:node|nodes]], individual nodes work as one because they: * Interact as a peer in community of peers (i.e., [[dido:public:ra:xapend:xapend.a_glossary:p:p2p]] ) * Use a single [[dido:public:ra:xapend:xapend.a_glossary:d:data_object|Data Object]] (i.e., base coinage) * Process transactions according to the rules of the community For example, there is a system of nodes involved in the lifecycle of [[dido:public:ra:xapend:xapend.a_glossary:b:bitcoin|Bitcoins]]. However, it makes no sense for public records such as births, deaths, marriages, and divorces to be in the Bitcoin system of nodes. Thus, the public records could form their own system of nodes using the Bitcoin software but restrict this network to storage of pubic records. Obviously, Bitcoin’s main purpose is to transfer assets around the world at high speed and with low overhead. However, these are not the capabilities motivating the use of DIDO networks for low volatility public records such as those which reflect the natural rates of births, deaths, marriages, and divorces. Such applications are usually under the jurisdiction of a single country or countries that have reciprocity agreements or treaties. Similarly, the need to establish a private system of nodes might exist for internal use only users (e.g., government enclaves, large corporations) that have enough distributed resources to support the network. Although the current cryptographic protocols provide “security” to a DIDO, with the advent of quantum computing (( MIT Technology Review, "Quantum Computers Pose Imminent Threat to Bitcoin Security," 8 November 2017. [[https://www.technologyreview.com/s/609408/quantum-computers-pose-imminent-threat-to-bitcoin-security/]] )), a reliance on these algorithms in the future for highly classified or private data may not be acceptable. These risks provide even more justification for the development of private DIDO networks. As a general rule, the larger the system of nodes, the more secure and tamper-proof the data held within the network becomes, which means that for networks to be viable from a security perspective, the number of nodes in the collection might have a minimum. * [[dido:public:ra:1.2_views:2_tech_views:2-nodenet:2_net:1_msg]] * [[dido:public:ra:1.2_views:2_tech_views:2-nodenet:2_net:2_trn]] * [[dido:public:ra:1.2_views:2_tech_views:2-nodenet:2_net:3_sec]] * [[dido:public:ra:1.2_views:2_tech_views:2-nodenet:2_net:4_pro]] * [[dido:public:ra:1.2_views:2_tech_views:2-nodenet:2_net:5_dist]] /**=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- /* To add a discussion page to this page, comment out the line that says ~~DISCUSSION:off~~ */ ~~DISCUSSION:on|Outstanding Issues~~ ~~DISCUSSION:off~~