The whole technological framework can be broadly understood in terms

of ‘Neutrino Framework’, powering the fesschain ecosystem. Apart from

that, this part of the document will also explain how fesschain will

improvise the way DApps till date are being developed and run. In fact, it

is also one of the major reasons which made way for the existence of

fesschain.

We will understand both of these forebodings on case by case basis.

7.1 Neutrino Framework

The fesschain is majorly driven by the powerful Neutrino Framework

which is the key to its speed amplification with the increasing volume of

data. This Framework makes sure the blockchain doesn’t clog with the

unnecessary data so that the maximum transaction speed can be

ensured even at the high transaction requests. The goodness of another

plus point in this framework that brings up the bitcoin’s blockchain

security to the next level.

The Framework

The Whole Neutrino Framework is divided into 5 Phases or 9 Stages.

These stages sums each and every activity takes place during any odd

transaction on the fess blockchain.

1. Inputs Initiated

In this phase, the transaction requests are initiated and forwarded

to the Data Optimisation Phase.

Stage-1

At the first stage, there are multiple transactions are requested

from the users’ end on the blockchain.

2. Data Optimisation

This phase is completed in two crucial stages. The received inputs

in the phase 1 will be converted into a data type which is blockchain

friendly and then the process of trimming of the raw data into

relevant data will be initiated. Another important step, the

fragmentation of the data takes place under this phase.

Stage-2

In the second step, the requested Transaction Data is developed

into the respective blocks in order to make it system friendly

09

TECHNOLOGICAL FRAMEWORK

Stage-3

Once the blocks are developed then the third stage comes into

existence where these blocks are sent to the parent node. This is a

very important step as all blocks are processed to churn out the

relevant data. This is achieved through the ‘Data Fragmentation’.

Under fragmentation, data is broken into the smallest unit parts

possible so that the unnecessary data and space both can be taken

care of.

3. Data Validation

This phase comprises three stages. The fragmented data converted

into blocks from the previous phase is arranged into random

manner with the versatility of artificial intelligence. Thereafter the

data verification starts to make sure only relevant data is stored on

the blockchain.

Stage-4

In the 4th stage, the freshly processed data is sent to randomly

arranged virtual nodes with the help of artificial intelligence so that

the networks can process it.

Stage-5

Once the data is moved into the randomly ordered virtual nodes

the next process comes into action. In this stage, the available

Sub-nodes validate the entries. After verification, the data from

here is forwarded to the next stage where the entries will be

recorded on the blockchain.

Stage-6

The verified and relevant blocks now become part of the

blockchain.

4. Data Aggregation

Once the data is fragmented, optimised and validated to find his

mainstay in the blockchain. It’s high time the data is aggregated so

that every irrelevant data request can be dropped and the precious

block space on the blockchain can be saved.

Stage-7

Once the entries are received then all blocks are verified with the

Bitcoin’s mined blocks for aggregation.

10

Stage-8

Now as the data has been sorted, fragmented, validated and

aggregated. The 8th step is what is visible to the user that is the

DATA, the Relevant data which has now been saved in the

Fesschain’s blockchain.

5. Completion

Stage-9

Now the relevant entries are recorded and the Transaction has

been successfully completed.

It may sound like 9 different long stages that are going to take

some several minutes or so. But the story is completely different.

The Algorithm of Fesschain is optimized to deliver up to 900 such

transactions within a second. All this without compromising even

an iota of security.