There’s much to do with Matrix Network and its awesome features. Here is a
sneak peek:
Aggregation Acceleration
Node and client data transmission can take advantage of the aggregation speed of multi-point paths.In the network, the transmission efficiency increases with the increase of nodes, so more Matrix nodes can improve the throughput of the entire network on a large scale!
Interconnection Consensus
With unique and innovative consensus algorithm, it is highly scalable and supports any number of public nodes.
Security Group Policy
Network division of any size can be accomplished through security group policies.
Strategy of user identification
Network scoping by user certificate identities. Subtle settings or group settings can be made for different users.
Network Protocol Port Policy
Filter and control network access behavior through basic network communication elements such as network protocols, CIDR, and ports.
Zero Trust Authentication
Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless of whether they are sitting within or outside of the network perimeter. Certificate chain is the main technology associated with Zero Trust architecture; but Zero Trust is a holistic approach to network security that incorporates several different principles and technologies.More simply put: traditional IT network security trusts anyone and anything inside the network. A Zero Trust architecture trusts no one and nothing.
Subnet Route
No matter how complex the network organization is, Matrix can always flexibly adapt to your network environment to keep its mutual communication stable, secure and fast.
Socks5 Proxy
SOCKS5 proxy is an alternative to VPN. It uses a proxy server to route packets between the server and the client. This means that you can access any network at any time with the network permissions of the proxy node.
Port Forwarding
Port forwarding is critical for remote access to items on private networks. Since firewalls exist to keep unwanted visitors out, the visitors you want to get in are going to need a way to do so. Knowing the IP address isn’t enough: Requests need to be directed to the correct port as well. This extra required information helps keeps unwanted visitors out and adds a further layer of security against DDoS (direct denial of service) attacks.Port forwarding functions incredibly well alongside various identity management software. Multi-factor authentication software, single sign-on solutions, and the like create an extra layer of security towards allowing visitors into particularly secure areas like file servers and databases.
NAT Traversal
Gather Public IP Information
Device behind NAT asks the tower point to inform it what public IP and port it appears as to the rest of the world.
Public IP Returned & Relay Option Assigned
Matrix confirms how the device's local network's NAT has translated the device's private IP, and also issues a public tower list to relay option for use in case it's needed.
Direct Connectivity Test
Device shares the candidate IP/port to try direct streaming over by signaling it in SDP. Far end initiates a connectivity test to that IP to establish if peer‑to‑peer is possible.
Successful Peer‑to‑Peer Connection
If devices are able to contact each other directly through the candidate tower returned, session is set up with direct data streaming.
Via Tower Create Relay Connection
If devices are not able to connect to each other directly due to symmetric NAT or other issues, the SDP negotiates use of the offered tower point to relay IP so data streaming relays through the geographically nearest relay point.
Cross Platform
Support Windows/Linux/Raspberry Pi MacOS/Android/iOS/AMD64/X86/ARM/Loong64.
Not familiar with Matrix Network?
Once HiPer is up and running, you can immediately experience the security, speed and more convenience brought by Matrix Network.
Go to install
The Matrix Network community
Matrix Network has a superb community(HiPer) from all around the globe collaborating with each other. Work together to build a complete virtual network native world.