<style type="text/css"> .wpb_animate_when_almost_visible { opacity: 1; }</style>

Introduction

UTI chain is a smart cloud network platform based on blockchain. At the same time, UTI links the community and builds a computing network beyond AWS. Youtaichain is a more secure, stable and efficient computing operating system. UTI OS is a KVM (Kernel-based Virtual Machine) program that is installed on machines, such as PCs, smartphones, and IoT devices. It is used to create multiple types of virtual machine (VM) instances. It also supports Docker and WASM.

Multiple types of VMs will share the resources of a physical machine, including VM instances that include commonly used operating systems (such as Windows, MacOS, which provide normal work, entertainment, and gaming platforms for personal PC users; and include various types of computing VM instances for the task environment. By using multiple independent VM instances, Youtaichain can simultaneously meet the diverse needs of customers.

Edge computing

Edge computing is an open platform that integrates core capabilities of networks, computing processing, data storage, and applications on the edge of the network near the physical terminals and data sources.

图标
Distributed, low-latency computing

The vast majority of data is generated by sensors, and it is impossible to make real-time decisions through cloud platform processing and analysis. For example, the visual service using a wearable camera needs a response time between 25ms and 50ms, and the use of cloud computing will cause delays; for example, the real-time performance of industrial system detection, control, and execution is high, and the real-time performance of some scenes is less than 10ms. If the data analysis and control logic are all implemented in the cloud, it is difficult to provide timely feedback; including mobile applications that generate large data streams, such as live streaming platforms or cloud-based mobile games.

图标
Beyond the resource limits

Compared with servers in data centers, the hardware conditions of user terminals are relatively limited. These terminal devices obtain data input in the form of text, audio, video, and motion. However, due to the limitations of middleware and hardware, the terminal device cannot perform complex analysis of large amounts of data, and the execution process consumes energy. Therefore, it is usually necessary to send data to the cloud for processing and calculation, and then return meaningful information to the terminal through the relay. However, not all data from terminal devices need to be executed by cloud computing. Data can be filtered or analyzed at edge nodes using idle computing resources suitable for data management tasks.

图标
Sustainable energy consumption

According to data surveys, cloud computing will consume huge amounts of energy. The amount of energy consumed by data centers in the next ten years will be ten times larger than the current one. The energy demand will increase day by day and can't be met now. Therefore, it is particularly urgent to adopt a calculation strategy for maximizing energy efficiency. The basic information collection and processing of some embedded small devices can be completed on the end, that is, after the sensor transmits the data to the gateway, the data is filtered and processed by the edge nodes. It is not necessary to transfer each original data to the cloud, which saves A lot of network transmission costs and storage costs.

图标
Dealing with data explosion and network traffic pressure

The number of edge devices is growing at a rapid rate. At present, more than a third of the world's population will have smartphones or wearable devices. By 2020, these devices are expected to generate 43 trillion GB of data. Processing this data requires a highly scalable data center, which has once again caused widespread concern about network traffic pressure. Data analysis on edge devices can shorten the response time of the device, reduce the data traffic from the device to the cloud data center, effectively respond to the data explosion, and reduce the pressure of network transmission. Make resources more efficient on the network.

application

The largest application of UTI chain currently comes from the CDN field. The full name of CDN is Content Delivery Network, which is also called content delivery network. This concept started in 1996. It was proposed by a research group of Massachusetts Institute of Technology in the United States to improve the quality of Internet service. It can publish rich broadband media content on traditional IP networks, and can build on the existing Internet specifically for The website provides a service content distribution platform.

CDN's load balancing and distributed storage technology can enhance the reliability of the website, which is equivalent to adding a protection umbrella to your website, which can respond to most Internet attack events. Anti-attack systems also protect websites from malicious attacks. Various factors, such as interconnections, regional ISP geographical limitations, and limited export bandwidth, have made the website regionally inaccessible. CDN acceleration can cover global lines. By cooperating with operators, deploying IDC resources, and reasonably deploying CDN edge distribution storage nodes at backbone node vendors nationwide, make full use of bandwidth resources and balance source site traffic.

product

Introduction of mining mechanism:
Among the resources dispatched by the UTI chain system, there are a variety of network resources. In order to ensure the stability of the currency value, it also provides a market-oriented mechanism to facilitate price discovery through the market. UTI uses a two-layer currency model. One layer is a market-oriented currency, and the other is a resource token for asset endorsement. A token is issued for each resource type, including distributed storage, CDN, computing power, memory, and more. Therefore, UTI has multiple mining pools corresponding to multiple cloud computing resources. In the early days, distributed storage and CDN mining pools will be opened, and the corresponding mining mechanism is POST.

POST mechanism
PoSt (Proof of Spacetime), the time-space proof consensus mechanism, is the consensus mechanism adopted by the IPFS project. The spatio-temporal proof is essentially a kind of storage proof. The data stored by the user itself serves as a proof of the amount of computing power. It is used to prove the amount of data owned by a miner over a period of time, and then use this amount of data as proof of the amount of computing power.

Architecture

mining

Node pledge:
In order for the UTI chain system to provide services more stably, nodes must pledge a certain number of UTIs during the mining cycle, and the number and period of different nodes' pledges are different. When the node miner is offline and often exceeds the system requirements, the pledged tokens are automatically confiscated. When the node applies for the withdrawal of the pledged tokens and meets the withdrawal mechanism, the system will automatically release it to the original wallet.

Payment and consumption:
C-side users can use it to purchase mining machines to participate in the mining project of the subsystem. Band B users can use the bandwidth, storage, and computing power of the UTI exchange system.

partners

media
×