{"id":31651,"date":"2019-06-05T03:41:48","date_gmt":"2019-06-05T07:41:48","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31651"},"modified":"2019-06-05T03:41:48","modified_gmt":"2019-06-05T07:41:48","slug":"why-new-protocol-marconi-is-restructuring-core-internet-technology","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/05\/why-new-protocol-marconi-is-restructuring-core-internet-technology\/","title":{"rendered":"Why New Protocol Marconi Is Restructuring Core Internet Technology"},"content":{"rendered":"\n<p> <a href=\"https:\/\/www.inc.com\/author\/kenny-kline\"><strong>By\u00a0Kenny Kline<\/strong><\/a> &#8211;  The surge in\u00a0<a href=\"https:\/\/www.inc.com\/kenny-kline\/how-migration-to-proof-of-stake-consensus-is-opening-up-new-blockchains-potential.html\">blockchain-related projects<\/a>\u00a0has brought about myriad proposed solutions to everything from\u00a0<a href=\"https:\/\/www.inc.com\/kenny-kline\/how-tron-is-working-toward-a-decentralized-internet-a-sustainable-cryptocurrency-model.html\">decentralized storage<\/a>\u00a0and computing to censorship-resistant mediums of value transfer. However, blockchains are still built on the existing <strong>Internet <\/strong>stack, something which Marconi, a new <strong>networking<\/strong> and distributed ledger protocol, cites as a significant\u00a0<a href=\"https:\/\/www.inc.com\/darren-heitner\/the-new-internet-isnt-just-a-silicon-valley-joke-heres-what-you-should-know-about-it.html\">infrastructure<\/a> vulnerability.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/06\/network-3537401__340-1.jpg\" alt=\"\" class=\"wp-image-31653\" width=\"269\" height=\"172\"\/><\/figure><\/div>\n\n\n\n<p>&#8220;All these blockchain projects build atop the same network infrastructure consisting of switches and routers connected by Ethernet,&#8221; details Jong Kim, Chief Architect of Marconi. &#8220;Ethernet is a <strong>networking<\/strong> technology that has improved in terms of bandwidth but otherwise has gone relatively unchanged for the past 30 years.&#8221;<\/p>\n\n\n\n<p>The problem is that Ethernet was originally designed with connectivity as its foremost consideration, rather than privacy or security, which are usually addressed higher in the Internet&#8217;s&nbsp;<a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/OSI_model\">OSI model<\/a>&nbsp;&#8212; such as TLS and&nbsp;<a href=\"https:\/\/www.inc.com\/john-lincoln\/get-read-for-upcoming-ssl-requirement-a-web-security-change-that-will-impact-all-websites-everywhere.html\">SSL<\/a>.<\/p>\n\n\n\n<p>However, the lack of inherent privacy and security at the Ethernet level is not the only problem.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.inc.com\/kenny-kline\/why-new-protocol-marconi-is-restructuring-core-internet-technology.html&amp;ct=ga&amp;cd=CAEYACoTNTU3MzM5OTkwNjczMDE3NjAzOTIaMmMyZWEyOGNkOTkxOWZhZTpjb206ZW46VVM&amp;usg=AFQjCNGem88F4-NBMlOnOp2lVrzlklQSDQ\">Read more:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Kenny Kline &#8211; The surge in\u00a0blockchain-related projects\u00a0has brought about myriad proposed solutions to everything from\u00a0decentralized storage\u00a0and computing to censorship-resistant mediums of value transfer. However, blockchains are still built on the existing Internet stack, something which Marconi, a new networking and <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/05\/why-new-protocol-marconi-is-restructuring-core-internet-technology\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[111,23],"tags":[264,209],"class_list":["post-31651","post","type-post","status-publish","format-standard","hentry","category-internet","category-networking","tag-internet","tag-networking"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31651"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31651\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}