Marconi ICO Review by Coincrunch

Marconi ICO Review: Improving security, privacy and net neutrality with programmable packets.


Marconi Protocol is a new blockchain protocol which intends to enhance and can even replace existing network infrastructure, allowing any network to realize the full benefits of decentralization because of its 2nd layer OSI design model.

With the impressive goal of becoming and acting as a network of networks, the Marconi Network will embed a global construction working under the rules defined by the Marconi Protocol. Marconi will enable powerful decentralized network applications which will enhance security, networking, and decentralization.

PROS

  • Strong team with full stack experience including networking and security
  • Ambitious project to improve the security of the Internet and the blockchain via solid and new innovations
  • Strong advisory team and investors
  • Team is also looking to venture into the hardware world too

CONS

  • Project has set out ambitious goals but there is no timeline listed in the white paper
  • No clear business plan within white paper
  • Tokenomics are not listed in the white paper

Once you get involved in the crypto space, the desire to know more takes over you and you become obsessed with seeking out more knowledge and information. No one can deny that this is an awesome experience and it is in this moment of learning and discovery where we long to stay.

As soon as you start researching ICOs or new projects after a while trying to figure out “how the hell” every consensus algorithm works, one specific question that finally comes to mind…sooner or later…. 😉

¨Yeah… cool codes, nice “Proof of everything”, great protocols, off-chain and on-chain stuff, scalability… but in the end… isn’t all of this running through the same physical elements/hardware? Fiber optics, the same ones I have at home…or Wifi signals? Isn’t that “old” technology limiting this new revolution?”

7-layer Open Systems Interconnection model (OSI)

You get the point? That’s exactly how it is, the vast majority of blockchain projects continue being built on top the same underlying network infrastructure consisting of switches, routers and other hardware devices connected by Ethernet.

As you may’ve imagined, this implies several issues that we will go through in depth in the coming sections and it is here were our new review gets interesting.

Marconi Protocol is a new blockchain protocol which intends to enhance and can even replace existing network infrastructure, allowing any network to realize the full benefits of decentralization because of its 2nd layer OSI design model.

With the impressive goal of becoming and acting as a network of networks, the Marconi Network will embed a global construction working under the rules defined by the Marconi Protocol.
Marconi will enable powerful decentralized network applications which will enhance security, networking, and decentralization.

We aim to crunch down the whole crypto-space one project at a time and make it understandable for the awakened mind. Will you join us on this ride?


Problem

Marconi is an exciting project that is taking a unique approach to other projects, many of the projects that we have reviewed to date are taking the new technology and are trying to fit it on top of the Internet and the existing stacks – “New wine in old wine skins”.

The problem with this approach is that the Internet and the technology around it was developed in a time when security was not at the forefront of people’s minds or designs so anything that has been done to improve security is really a “band-aid-type” solution and not a major change to the original design.

Marconi has recognized this and has concluded that, one of the ways to move this technology forward is to fix the Internet and the issues that currently exist and not just build on top of the existing structures.

So what are the problems that the Marconi project is trying to solve:

  1. Network infrastructure is insecure
  2. Core network infrastructure is inflexible and difficult to manage
  3. Equipment is expensive
  4. Internet is centrally controlled
Network Infrastructure is insecure

As mentioned, the Internet was designed in a time when security was not as essential as it is today. Add-on solutions do improve the security of the Internet but they are basically “bolt-ons” applied at a certain layer of the stack, it is not a change to the overall design of the network. So while the incremental bolt on improvement does make the Internet and the traffic on the Internet more secure, it still leaves the traffic vulnerable to attacks like distributed denial of service or worse, packet injections.

Core network infrastructure is inflexible and difficult to manage

Almost due to the design of the network and networking protocols, changes are very difficult to make. Any organization has to balance the desire of implementing new services, with the complexity of managing and integrating newer technology with legacy tech that may have been around anywhere from a few years to a dozen years.

Equipment is expensive

If you’ve worked in Information Technology for awhile or worked in a business that made extensive use of Information Technology, at one point or another, you would have used the corporate network to access basic services, critical applications and the like.

If you aren’t aware or directly involved – the equipment that makes up the core network infrastructure is expensive, the hardware and software involved with making those services available is highly specialized and only sold by a few companies AND it is priced accordingly.

In addition, the professionals that maintain these networks need multiple certifications and on-going training to keep up with the maintenance of the equipment to improve on the security of the network and add or remove connectivity as the business changes.

The Internet is centrally controlled

While we all know that the Internet’s backbone is fairly safe from being shutdown completely or even disappearing. The primary carriers still have the ability to control the type of traffic that is on their networks.

This traffic ‘filtering’ could include:

  • Blocking certain types of traffic (e.g. block all blockchain packets)
  • De-prioritizing the traffic of a smaller organization in favor of a large paying customer.
  • Capping the amount of bandwidth a particular type of traffic can utilize (give low bandwidth cap to streaming video content from YouTube, Hulu, Netflix, etc)

While this all could happen there hasn’t been any widely publicized cases of this actually happening but the technology is available to do so. Of course, what actually matters going forward is how Marconi and other projects in the future will tackle some of these issues.

Marconi’s plans to deal with the problems mentioned above will be outlined below in the Solutions section and then in more detail in the Main section.  Continue along with us to learn more about the Marconi project.


Solution

So now that we have an idea of some of the problems related to the current ethernet/internet infrastructure, which a majority of blockchain projects are planning to build on, we are going to jump into what this project plans to do, to tackle these issues.

Marconi will work on 2 key points, as we can see in the diagram. The Marconi Protocol, and Marconi Network.

Each of these technologies implements different features that when working synchronously , end up solving the proposed problems.

Marconi Protocol:

It helps to enhance network capabilities by securing communications, creating a flexible infrastructure, and by forming what they call “mesh networks”. The supporting technology can be broken down into the three major components:

1- Marconi Pipe – provides the secure channel for transporting network traffic between peers.

It works directly with the 2nd layer of the OSI model, increasing its processing capabilities, enhancing security through encryption and improving flexibility through routing.

It also has the added advantage of working with current wired technology so that it can be used directly with existing Internet infrastructure

Not forgetting about wireless connectivity, they designed Marconi Link, to work with both public and private wireless standards such as Bluetooth, Wi-Fi, and the U-NII radio band to power scalable mesh networks.

2- Smart Packet Contracts. Smart contracts can indeed be used to route and process Network packets, which at the same time unleash numerous use cases for smart decentralized networking applications.

Anti-phishing and anti-malware protection, intrusion detection and prevention systems, and distributed virtual private networks just to name a few.

3- Branch Chains.

They take a global chain and branch-off it, creating what is called a branch chain.

In other words…new blockchains. Each of them will have its own custom rules, specified via branch contracts (a special type of smart contract).

They will be able to use this to create a new token, or to migrate the existing token of a specific blockchain to a different dedicated chain.

Branch chains can also be used to organize nodes participating in the mesh network, alleviating their dependency on a global blockchain. This is called a mesh chain.

Marconi Network:

On right side of the diagram, we have Marconi Network.

To create the “Network of Networks”, they need to form several different autonomous networks between peers, and after that organize them. That’s exactly what Marconi Network does.

It can be the end users, any kind of internet computing device or infrastructure service nodes. Marconi will make them agree through their contracts defining and specifying their interaction, such us:

how much data will be exchanged, for how long, what types of smart packet contracts will be enabled, and at what fuel price…

Each participant within the network will contribute with computing resources/power or with bandwidth to the network, obtaining compensation for their participation with Marconi tokens, called MARCOS.

The MARCO is the base unit of measurement for distributed networking and computing and is the fuel consumed for network usage, administration, and smart contract processing.

As we have said in Marconi Protocol, Marconi Network can interoperate with existing internet infrastructure.

On the other hand it is also self-sustaining. That means that it can form direct peer-to-peer connections to facilitate mesh networks, removing the need for hardware switches, routers, and bridges.

Therefore, Marconi Network enables and incentivizes users to assemble and securely exchange resources without the limitations of traditional approaches.

End users can utilize the network and the platform it’s built on, to manage their infrastructure and develop smart distributed networking services.

Now that we understand what they are trying to do to solve the problem, we will move to understand HOW will they accomplish that with their unique architecture and approach.


Main Features

Marconi Network Architecture

In the Main Feature we will take a look at the architectural structure of the Marconi network and how it interfaces with the internet and the existing infrastructure.

The Marconi Network is made up of 3 major components that all work together to allow seamless connectivity between network peers.

  • Network Pipe
  • Smart Packet Contracts
  • Marconi Link
Marconi Pipe (mPipe):

Is a virtual data link which provides a link/pipe of communication between peers, transporting network traffic. These pipes are created all the way down to the layer 2 of the OSI model and are a key component in the Marconi Network, allowing increased packet routing and processing, increased security via packet level encryption, and discovery of neighbouring peers transmitting on the same level.

Smart Packet Contracts:

Gives developers the ability to run smart contracts against network packets to do smart routing and packet processing. Marconi creates a platform where developers can build networking dapps using smart packet contracts.

All applications are written in Marconi script, a Turning-complete language which has access to network packets and compiles down to bytecode. The Marconi Network Library provides 3 tiers of APIs:

  1. Control API:- for operations that affect routing and traffic flow
  2. Content API:- for operations like inspecting payloads
  3. Intelligence API:- for pattern analysis and machine learning.

Marconi wants to make sure that they support a lot of the open-source projects in the space, that’s why they designed their smart packet contract as outlined above making easily accessible to developers in the open source community.

Marconi Link (mLink):

Is the projects solution for wireless communication, allowing secure wireless transmission between network nodes designed all the way down to layer 2 of the OSI model, providing access to network packets enabling, smart packets contracts.

Marconi Links are the core building blocks for mesh networks which solves the issue of wireless proliferation – when trying to connect to the internet over a wireless network you can be bombarded by various network names. Via mLink, nodes can easily join the same network and are incentivized to do so, allowing nodes the ability to coordinate to transmit data more efficiently.

It’s also very important to note that Marconi Link is compatible with existing wireless standards like Bluetooth and wifi through their Marconi Wireless Driver, mitigating the need for any specialized equipment for shorter ranges in the 0-100 range and of course if someone wants to use specialized equipment they can take advantage of the new U-NII-3 radio band. The Wireless Driver is also really good and handling any network congestion that could occur.

Marconi has also thought earnestly about “mass adoption” and have implemented the feature where when the Marconi Protocol interfaces with the internet, Marconi Pipes will be a top layer on the IP-based connections by using standard IP and UDP headers.


Team + Advisors

Jong Kim – Blockchain Developer

  • Jong has 11+ years’ experience in the Software Engineering space.
  • He is currently the CEO/CTO & Co-founder of Neji, Inc. Neji is a software/hardware company specializing in developing the next generation networking and security technologies and was found by networking and security experts from Google, Apple and Microsoft.
  • He held the title Appurify Infrastructure Lead at Google. He was involved with Mobile development technology.
  • Before Google he held the role Principal Software Engineer at Appurity Inc. Which was Acquired by Google.
  • Another key role Jong held was Founder & board Director at IHubNet Ltd a Technology company.
  • He has been involved in the crypto space for 7+ years for various of Startups.
  • Bitcoin miner since 2011, proprietor of tier-1 data center mining operations – supporting hashing power for blockchain launches
  • Early investments on well-known blockchain projects including Litecoin (2013), Dogecoin (2013), Ethereum (2014), Tierion (2016/Seed) and Ripple (2016/Series B)
  • Creator of HashLayer.com (2014-2015), was one of the first multi blockchain explorer which supported, Bitcoin, Litecoin, Dogecoin and Vertcoin
  • Jong graduated with a B.S, Computer Science at University of Southern California.
  • Jon holds 3 Patents related to mobile technology.
  • He is also a Bitcoin Foundation Member.

Darryl DeWeese – Network

  • Darryl’s LinkedIn has no photo so we won’t review his profile.

Albert Yuen – Security

  • Albert has 8+ years’ experience as a Software Engineer.
    • He is also currently Senior Software Engineer at Neji, Inc.
  • Notable previous roles:
    • Senior Software Engineer/Software Engineer at Zynga. Here he worked on all aspects of Mobile games:
    • Core gameplay
    • Created Unity editor tools to allows artist to update details easily and quickly.
    • Developed gameplay features.
  • Short stints as a Associate/Junior Software Engineer at Electronic Arts, XMG studio, IBM.
  • Graduated with BSE in Software Engineering at University of Waterloo

Di Wu – Platform

  • Di has 7+ years as a Senior Software Engineer.
    • He currently also holds the role at Neji. Inc like most of the team.
  • Notable previous roles at ServiceNow (corporate software company), Zynga (video game company)
  • Short stints at Microsoft, Intel, BlackBerry.
  • Graduated with BS in Software Engineering at University of Waterloo.

Kyle Fischer – Infrastructure

  • Kyle has 8+ years work experience as a System Administrator.
    • Currently holding a role at Neji Inc. as most of the Marconi team. Where he supports the backend network.
  • Notable previous roles at eTouch Systems, Google.
    • While at Google, he designed and built multiple mobile labs consisting of over 1000 android devices each.
  • Graduated with Honors, BS in Celtic Studies at University of California, Berkeley also completed Associate of Arts – AA, Computer Science at Gavilan College.

Peter Lai – Operations

  • Peter has 13+ years as leader in all of his previous roles.
    • Currently holds the roles of Co-founder and COO at Neji.
    • Startup Investor that are blockchain/Crypto related fields
  • Notable previous roles:
    • Co-founder and CPO at LiveCanary. LiveCanary is a insights/intelligence platform powered by mobile behavioral data.
    • Senior Director of Product at Zynga. He oversaw creation, launch and operation of Words on Tour – Number 1 grossing and downloaded world game in 50+ countries and awarded best new app by Apple and Google.
    • Senior Program Manager at HealthUnity Corporation. Led the consulting and services for production-development teams that created infrastructure for larger healthcare enterprises.
    • Program Manager at Microsoft and Software Engineer Amazon.
  • Graduated with MBA in Business at The Wharton School.
  • Also completed BASc in Computer Engineering at University of Waterloo,
  • He owns 8 Patents that are in Tech, Sales, Gaming.

Christopher Lee – Product & SDK

  • Christopher’s LinkedIn has no photo so we won’t review his profile.

George Li – Advisor

  • George brings years of experience as an advisor. He has 3+ years in the crypto and Blockchain space.
  • Current Roles:
    • CEO, Co-founder at WeTrust Platform.
    • Advisor at INS Ecosystem.
    • Advisor at Bounty0x.
  • George also has 10+ years at Google, McKinsey & Company, Motorola, Verizon.
  • Graduated with MS in Management Science and Engineering at Stanford University.
  • BS in Electrical and Computer Engineering at Rutgers University.

Matthew Liu – Advisor

  • Matthew’s LinkedIn has no photo so we won’t review his profile.

Jay Srinivasan – Advisor

  • Jay brings 15+ years of experience at many big name companies to the project.
    • Currently the Co-founder and CEO at Spoke (askspoke.com). Software company that helps teams manage request.
    • Advisor at Blue (Seed) Capital.
  • Noteable previous roles:
    • Product Management, Developer Products Groups at Google.
    • Co-founder and CEO at Appurifym Inc.
    • Revenue Product Manager at Zynga.
    • Associate Principal McKinsey and Company.
    • Other Roles at IBM and Intel.
  • Graduated with PHD and MS in Computer Science at University of Illinois Urbana-Champaign.
  • Completed B.Tech, Electrical Engineering at Indian Institute of Technology, Madras.
  • 12 Publications and 3 Patents in Computer programming.

Joyce Kim – Advisor

  • Joyce has 12+ years in the academic field. She is currently an:
    • 7+ years as Graduate Researcher at UC Berkeley, Center for Built Environment. She worked with IoT and machine learning.
  • Graduated with PhD in Building Science, a Masters in Science, and Bachelor of Applied Science In Engineering at Universities of California Berkeley, Philadelphia, and Waterloo.
  • 7 Publications. Focused on Behavior, machine learning, IoT and Building info.

Tom Pageler – Advisor

  • Tom has 13+ years work experience he brings in more Security experience to this project. He holds current roles:
    • CSO at BiGo, Inc
    • Advisory Board Member at Carnegie Mellon University.
  • Notable previous positions:
    • CRO and CSO at Neustart Inc.
    • CRO at DocSign.
    • Advisory Board Member at Sharitive
    • Deputy CISO/Executive Director in Global Security & Investigations at JPMorgan Chase.
    • Special Agent for US Secret Service.
  • Graduated with Masters of Public Administration at Harvard, Global MBA at Thunderbird School Of Global Management, BS of School of Business, Public Administration at University of Arizona.

Glenn Entis – Advisor

  • Glenn is another advisor with 35+ years work experience as a serial Entrepreneur. Current roles:
    • Co-founder & Senior Advisor at Vanedge Capital.
    • Advisor & Creative Consultant at Freelance
  • Notable previous roles as:
    • SVP, Chief Visual and Technical Officer at Electronic Arts.
    • CEO of Dreamworks Interactive.
  • Completed BA, BRA in Philosophy in Fine Arts with Honors at Ohio Wesleyan University.
  • BSc in Computer Science at Polytechnic Institute of New York.

Investors

Sources

Leave a Comment