The internet plays a vital role in today’s world whether for personal or business use. It is completely weaved into our daily lives to a point of necessity that we can’t imagine a time when there is no internet.
Internet: A Brief History
Developed in 1962 by J.C.R. Licklider, an MIT & ARPA scientist, the first internet dubbed ad ARPA Network or ARPAnet was designed as a communication network tool for monitoring nuclear attack during the war. In 1983, ARPAnet was transitioned into open networking protocols TCP and IP accelerated its growth and spread of internetworking technology.
Then in 1989, a major breakthrough in internet communications occurred with the development of the hypertext transfer protocol (http) by Tim Berners-Lee of the European Organization for Nuclear Research (CERN). HTTP is a standardization that allow multiple computer platforms the ability to access the same internet site.
The Problem With TCP/IP Protocol
Despite its revolutionary beginning, the internet as we know it now is riddled with issues that remain unsolved for years. Below are the vulnerabilities of TCP/IP as described by Finjan Cybersecurity:
- IP and Source Routing
- TCP and Reassembly
- Predicting TCP Sequences
- TCP Blind Spoofing
- SYN Flooding
- Session Hijacking
- Man-in-the-Middle Attacks
- Web Application and Browser Security Weaknesses
- Cookie Poisoning
- Replay Attacks
- Cross-site Scripting
- DNS Protocol Attacks
And for a 50-year old technology, these issues are not surprising to see. But is there no hope? Skipjack dares to resolve these issues and more with the introduction of Zetanet.
Zetanet: The New Internet
Zetanet, or internet 2.0, is the new internet is one of the key technologies being developed by Skipjack Corporation. It is designed to improve the current IP address-based data routing to hashed-data naming for storing and data retrieval.
Zetanet is based on a mathematical algorithm called Jack’s Law which will be the basis for how data moves and flow on each node in the entirety of the Zetanet. To identify the region or country where data is often used, Zetanet uses an AI called Feistel Core Network. Then it copies the data on a node closest to the region for easier retrieval of each data request.
Each data in Zetanet is hashed for security before it is saved into any node on the network. Any data on the network cannot be corrupted, altered, manipulated or used maliciously by anyone without the data owner’s permission. It is also made more secure by Skipjack’s own encrypblock technology.
In addition, Zetanet features indexing capabilities on each node which helps each retrieval request identify the node holding the hashed data. Zetanet protocol is compatible with any transport layer protocols including TCP, UDP, Blockchain and similar technology.
A Step Forward: The Future of Zetanet
“We are changing the world with technology.” – Bill Gates
Technological innovations such as Zetanet are changing the world, and creating new solutions that make our lives better. To make these innovations possible, huge funding is required. For Zetanet, an ICO (Initial Coin Offering) was launched.