Merge branch 'main' of git.ourworld.tf:tfgrid/info_tfgrid
This commit is contained in:
commit
b2ff6058c5
@ -6,7 +6,7 @@
|
|||||||
- [Basic Hero mdBook Commands](#basic-hero-mdbook-commands)
|
- [Basic Hero mdBook Commands](#basic-hero-mdbook-commands)
|
||||||
- [Install and Use Hero](#install-and-use-hero)
|
- [Install and Use Hero](#install-and-use-hero)
|
||||||
- [Create a New mdBook](#create-a-new-mdbook)
|
- [Create a New mdBook](#create-a-new-mdbook)
|
||||||
- [Notes for Repo Owners](#notes-for-repo-owners)
|
- [Contribute](#contribute)
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
@ -42,6 +42,9 @@ To install and use Hero on a full VM running on the grid, read the [full VM guid
|
|||||||
|
|
||||||
To create a new mdbook, read the [mdbook creation guide](https://git.ourworld.tf/tfgrid/info_tfgrid/src/branch/main/docs/hero_create_mdbook.md).
|
To create a new mdbook, read the [mdbook creation guide](https://git.ourworld.tf/tfgrid/info_tfgrid/src/branch/main/docs/hero_create_mdbook.md).
|
||||||
|
|
||||||
## Notes for Repo Owners
|
## Contribute
|
||||||
|
|
||||||
> todo: kristof some content does not belong here, move to other repo
|
To contribute to this repository, make a pull request of your changes.
|
||||||
|
|
||||||
|
1. Fork the repository and make a pull requests with your changes
|
||||||
|
2. If you have access, create a new branch in this repo and make a pull request with your changes
|
@ -1,7 +1,6 @@
|
|||||||
|
- [Introduction](tfgrid3/intro.md)
|
||||||
- [Intro](tfgrid3/intro.md)
|
|
||||||
- [Ecosystem](tfgrid3/ecosystem.md)
|
- [Ecosystem](tfgrid3/ecosystem.md)
|
||||||
- [Who we are](tfgrid3/who_are_we.md)
|
- [Who We Are](tfgrid3/who_are_we.md)
|
||||||
- [Promotion](tfgrid3/promotion.md)
|
- [Promotion](tfgrid3/promotion.md)
|
||||||
- [Messaging](tfgrid3/messaging.md)
|
- [Messaging](tfgrid3/messaging.md)
|
||||||
- [Chapters](tfgrid3/chapters.md)
|
- [Chapters](tfgrid3/chapters.md)
|
||||||
@ -13,13 +12,15 @@
|
|||||||
- [Governance](tfgrid3/governance.md)
|
- [Governance](tfgrid3/governance.md)
|
||||||
- [Guardians](tfgrid3/guardians.md)
|
- [Guardians](tfgrid3/guardians.md)
|
||||||
- [Grid Enhancement Proposals](tfgrid3/gep.md)
|
- [Grid Enhancement Proposals](tfgrid3/gep.md)
|
||||||
- [Change Management GEP's](tfgrid3/gep2.md)
|
- [GEP Community Brainstorm](tfgrid3/gep_comm_brainstorm.md)
|
||||||
|
- [Change Management of GEP](tfgrid3/gep2.md)
|
||||||
- [Farming GEP 3.14](tfgrid3/farming_update_3_14.md)
|
- [Farming GEP 3.14](tfgrid3/farming_update_3_14.md)
|
||||||
- [The Internet today](tech/internet_today.md)
|
- [The Internet today](tech/internet_today.md)
|
||||||
- [history c64](tech/history/c64.md)
|
- [History c64](tech/history/c64.md)
|
||||||
- [too many layers](tech/history/layers.md)
|
- [Too many layers](tech/history/layers.md)
|
||||||
- [Values](values/planet_people_first.md)
|
- [Values](values/planet_people_first.md)
|
||||||
- [Tech Key Innovations](tech/key_innovations_overview.md)
|
- [Tech Key Innovations](tech/key_innovations_overview.md)
|
||||||
|
- [Key Innovations](tech/key_innovations.md)
|
||||||
- [Mycelium Network](tech/mycelium_innovation.md)
|
- [Mycelium Network](tech/mycelium_innovation.md)
|
||||||
- [Zero-OS](tech/zos_innovation.md)
|
- [Zero-OS](tech/zos_innovation.md)
|
||||||
- [Quantum Safe Storage](tech/zstor_innovation.md)
|
- [Quantum Safe Storage](tech/zstor_innovation.md)
|
||||||
@ -43,5 +44,4 @@
|
|||||||
- [File System](tech/qss_filesystem.md)
|
- [File System](tech/qss_filesystem.md)
|
||||||
- [Network](tech/networking.md)
|
- [Network](tech/networking.md)
|
||||||
- [Mycelium](tech/mycelium.md)
|
- [Mycelium](tech/mycelium.md)
|
||||||
- [Web Gateway](tech/webgw.md)
|
- [Web Gateway](tech/webgw.md)
|
||||||
|
|
@ -5,7 +5,7 @@
|
|||||||
|
|
||||||
### TF Nodes (or 3Nodes)
|
### TF Nodes (or 3Nodes)
|
||||||
|
|
||||||
The network of nodes which make up the cloud, each node provides compute, storage and network capacity.
|
The network of nodes which make up the cloud. Each node provides compute, storage and network capacity.
|
||||||
|
|
||||||
### TF Routers
|
### TF Routers
|
||||||
|
|
||||||
@ -17,7 +17,7 @@ These TF Routers are not only compatible with Wi-Fi but also with 4G and 5G netw
|
|||||||
|
|
||||||
### Web3 & Decentralized AI Compatibility
|
### Web3 & Decentralized AI Compatibility
|
||||||
|
|
||||||
The TFGrid is the ideal platform for hosting any Web3 and AI workloads. Our Zero-OS operating system already supports integrated GPUs, ensuring optimal performance for decentralized AI applications.
|
The TFGrid is the ideal platform for hosting any web3 and AI workloads. Our Zero-OS operating system already supports integrated GPUs, ensuring optimal performance for decentralized AI applications.
|
||||||
|
|
||||||
|
|
||||||
> Any workload (web2/3 and AI) can run on TFGrid.
|
> Any workload (web2/3 and AI) can run on TFGrid.
|
@ -1,6 +1,10 @@
|
|||||||
# energy efficient
|
# Energy Efficient
|
||||||
|
|
||||||
|
Below are some of the ways in which ThreeFold achieves energy efficiency as compared to traditional models.
|
||||||
|
|
||||||
![alt text](energy_efficient.png)
|
![alt text](energy_efficient.png)
|
||||||
|
|
||||||
> Depending the usecase the ThreeFold approach can lead to 10x energy savings.
|
In addition, a decentralized peer-to-peer infrastructure which finds the shortest path between end points is by nature energy-efficient. Data needs to travel a much shorter distance.
|
||||||
|
|
||||||
|
> Depending on the use case the ThreeFold approach can lead to 10x energy savings.
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
## we forgot to use hardware well
|
## Hardware Is No Longer Used Efficiently
|
||||||
|
|
||||||
The IT world fails to harness the full potential of computer hardware.
|
The IT world fails to harness the full potential of computer hardware.
|
||||||
|
|
||||||
@ -10,4 +10,4 @@ The original Commodore 64, with only 64 KB of memory, was a remarkably capable m
|
|||||||
|
|
||||||
This highlights a regression in our ability to fully utilize computer hardware.
|
This highlights a regression in our ability to fully utilize computer hardware.
|
||||||
|
|
||||||
At Threefold, we are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential.
|
At Threefold, we are committed to bridging this gap by optimizing our approach to hardware utilization, thereby unlocking its full potential.
|
@ -1,4 +1,4 @@
|
|||||||
|
|
||||||
## FList: a new way how to deal with OS Images
|
## FList: A New Way Of Dealing With OS Images
|
||||||
|
|
||||||
!!wiki.include page:flist_innovation_short
|
!!wiki.include page:flist_innovation_short
|
@ -1,28 +1,28 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Why?
|
### The Problem
|
||||||
|
|
||||||
The current method of deploying workloads in the cloud using Docker containers and virtual machine images has inherent issues. These images consume significant storage space, result in slow and bandwidth-intensive transfers to the internet's edge, drive up costs, introduce complexity, and pose security risks due to difficulties in tracking their contents over time.
|
The current method of deploying workloads in the cloud using Docker containers and virtual machine images has inherent issues. These images consume significant storage space, result in slow and bandwidth-intensive transfers to the internet's edge, drive up costs, introduce complexity, and pose security risks due to difficulties in tracking their contents over time.
|
||||||
|
|
||||||
For instance, a complete Ubuntu image can easily be 2 GB in size, comprising millions of files. In contrast, the Flist for a full Ubuntu image is less than 2 MB (1000 times smaller), containing only the necessary files required to launch an application.
|
For instance, a complete Ubuntu image can easily be 2 GB in size, comprising millions of files. In contrast, the Flist for a full Ubuntu image is less than 2 MB (1000 times smaller), containing only the necessary files required to launch an application.
|
||||||
|
|
||||||
### What?
|
### Introducing Flist
|
||||||
|
|
||||||
A new image format that separates the image data (comprising files and subfile parts) from the metadata describing the image structure.
|
A new image format that separates the image data (comprising files and subfile parts) from the metadata describing the image structure.
|
||||||
|
|
||||||
An Flists format uniquely encompasses comprehensive file descriptions along with all relevant metadata such as size, modification and creation timestamps, and POSIX attributes. Additionally, it incorporates a fingerprint for each component, ensuring deterministic behavior—a crucial feature for security-focused use cases.
|
An Flist's format uniquely encompasses comprehensive file descriptions along with all relevant metadata such as size, modification and creation timestamps, and POSIX attributes. Additionally, it incorporates a fingerprint for each component, ensuring deterministic behavior—a crucial feature for security focused use cases.
|
||||||
|
|
||||||
Flists provide the flexibility to manage metadata and data as separate entities, offering a versatile approach to handling various build and delivery scenarios.
|
Flists provide the flexibility to manage metadata and data as separate entities, offering a versatile approach to handling various build and delivery scenarios.
|
||||||
|
|
||||||
### Benefits
|
### The Benefits
|
||||||
|
|
||||||
- **Rapid Deployment:** Zero-OS enables containers and virtual machines to launch up to 100 times faster, especially in decentralized scenarios.
|
- **Rapid deployment:** Zero-OS enables containers and virtual machines to launch up to 100 times faster, especially in decentralized scenarios.
|
||||||
- **Enhanced Security:** Zero-OS prevents tampering with images, ensuring higher security levels.
|
- **Enhanced security:** Zero-OS prevents tampering with images, ensuring higher security levels.
|
||||||
- **Reduced Storage and Bandwidth:** Zero-OS significantly reduces storage and bandwidth requirements, potentially achieving up to a 100-fold improvement.
|
- **Reduced storage and bandwidth:** Zero-OS significantly reduces storage and bandwidth requirements, potentially achieving up to a 100-fold improvement.
|
||||||
- **Deterministic Deployments:** Engineers can precisely define deployments beforehand, ensuring predictable outcomes without changes during deployment.
|
- **Deterministic deployments:** engineers can precisely define deployments beforehand, ensuring predictable outcomes without changes during deployment.
|
||||||
- **100% compatible:** with existing standards, docker, virtual machines... The same format is useful for VM's as well as any container technology.
|
- **100% compatible:** with existing standards, docker and virtual machines. The same format is useful for VM's as well as any container technology.
|
||||||
|
|
||||||
### Status?
|
### Status
|
||||||
|
|
||||||
- Usable for years, see Zero-OS.
|
Usable for years, see Zero-OS.
|
@ -1,22 +1,25 @@
|
|||||||
|
|
||||||
|
|
||||||
### Why?
|
### The Problem
|
||||||
|
|
||||||
Existing blockchain, internet, and P2P content delivery and storage systems suffer from sluggish performance and are too expensive. Content retrieval is often slow, and the overhead for ensuring redundancy is excessive. We require innovative approaches to facilitate efficient information sharing among users.
|
Existing blockchain, internet, and P2P content delivery and storage systems suffer from sluggish performance and are too expensive. Content retrieval is often slow, and the overhead for ensuring redundancy is excessive. We require innovative approaches to facilitate efficient information sharing among users.
|
||||||
|
|
||||||
Content delivery frequently represents the most significant expense for social networks. Running a basic social video network for 10 million users currently costs approximately $2 million per month using traditional cloud providers. We have the potential to reduce this cost by several orders of magnitude.
|
Content delivery frequently represents the most significant expense for social networks. Running a basic social video network for 10 million users currently costs approximately $2 million per month using traditional cloud providers. We have the potential to reduce this cost by several orders of magnitude.
|
||||||
|
|
||||||
|
|
||||||
### What?
|
### Introducing FungiStor
|
||||||
|
|
||||||
FungiStor is a peer-to-peer (P2P) content delivery layer designed to store and distribute an extensive range of objects, including images, videos, files, and more. It has the capability to handle trillions of objects and files efficiently. FungiStor serves as an excellent solution for content delivery networks (CDNs), significantly reducing costs for organizations seeking to stream or deliver substantial data volumes to their user base.
|
FungiStor is a peer-to-peer (P2P) content delivery layer designed to store and distribute an extensive range of objects, including images, videos, files, and more. It has the capability to handle trillions of objects and files efficiently. FungiStor serves as an excellent solution for content delivery networks (CDNs), significantly reducing costs for organizations seeking to stream or deliver substantial data volumes to their user base.
|
||||||
|
|
||||||
Furthermore, FungiStor will act as the backend infrastructure for the Flists within our own system. However, it is versatile and can be utilized by anyone in need of a global-level content delivery system for files, objects, and images.
|
Furthermore, FungiStor will act as the backend infrastructure for the Flists within our own system. It is versatile and can be utilized by anyone in need of a global-level content delivery system for files, objects, and images.
|
||||||
|
|
||||||
### Benefits?
|
### The Benefits
|
||||||
|
|
||||||
- **Global Scalability, Sub-50ms Lookups:** FungiStor scales worldwide with ultra-fast data retrieval under 50 milliseconds.
|
- **Global scalability, sub-50ms lookups:** FungiStor scales worldwide with ultra-fast data retrieval under 50 milliseconds.
|
||||||
- **Localized Content Delivery:** Prioritizes local data access for optimized speed and efficiency.
|
- **Localized content delivery:** prioritizes local data access for optimized speed and efficiency.
|
||||||
- **Quantum-Safe Security:** Incorporates robust quantum security measures.
|
- **Quantum-Safe security:** incorporates robust quantum security measures.
|
||||||
- **Interoperability:** Works seamlessly with IPFS, Torrent, and more.
|
- **Interoperability:** works seamlessly with IPFS, Torrent, and more.
|
||||||
- **Cost Efficiency:** Offers significant cost savings, potentially 10 to 100 times less than conventional solutions.
|
- **Cost efficiency:** offers significant cost savings, potentially 10 to 100 times less than conventional solutions.
|
||||||
|
|
||||||
|
### Status
|
||||||
|
Planned for the end of 2024
|
@ -5,9 +5,9 @@
|
|||||||
|
|
||||||
|
|
||||||
- [Mycelium: a new network layer for the internet](mycelium_innovation.md)
|
- [Mycelium: a new network layer for the internet](mycelium_innovation.md)
|
||||||
- [Zero-OS: a minimalistic more efficient server operating system](zos_innovation)
|
- [Zero-OS: a minimalistic and more efficient server operating system](zos_innovation)
|
||||||
- [Quantum Safe Storage](zstor_innovation.md)
|
- [Quantum Safe Storage](zstor_innovation.md)
|
||||||
- [Quantum Safe Filesystem](qsfs_innovation.md)
|
- [Quantum Safe Filesystem](qsfs_innovation.md)
|
||||||
- [FList: a new way how to deal with OS Images](flist_innovation.md)
|
- [FList: a new way to deal with OS Images](flist_innovation.md)
|
||||||
- [FungiStor](fungistor_innovation.md)
|
- [FungiStor](fungistor_innovation.md)
|
||||||
- [Network Wall](network_wall_innovation.md)
|
- [Network Wall](network_wall_innovation.md)
|
@ -1,25 +1,25 @@
|
|||||||
|
|
||||||
### Why?
|
### The Problem
|
||||||
|
|
||||||
The current centralized state of the internet poses significant security risks, with compromised routers and growing cyber threats (trillions of USD per year now), making everyone vulnerable to hacking. Industry responses involve disabling original features, hindering true peer-to-peer connectivity and personal server capabilities. Workarounds and system hacks have become the norm.
|
The current centralized state of the internet poses significant security risks, with compromised routers and growing cyber threats (trillions of USD per year now), making everyone vulnerable to hacking. Industry responses involve disabling original features, hindering true peer-to-peer connectivity and personal server capabilities. Workarounds and system hacks have become the norm.
|
||||||
|
|
||||||
**Our Internet is seriously broken, we need new ways how to communicate**
|
**Our Internet is seriously broken. We need new ways to communicate**
|
||||||
|
|
||||||
### What?
|
### Introducing Mycelium
|
||||||
|
|
||||||
Mycelium is an overlay network layer designed to enhance the existing internet infrastructure while remaining compatible with all current applications. It empowers true peer-to-peer communication. By installing a Network Agent on your device, you gain the ability to securely connect with any other participant on this network. Mycelium intelligently reroutes traffic to maintain connectivity taking location of you and your peer into consideration.
|
Mycelium is an overlay network layer designed to enhance the existing internet infrastructure while remaining compatible with all current applications. It empowers true peer-to-peer communication. By installing a Network Agent on your device, you gain the ability to securely connect with any other participant on this network. Mycelium intelligently reroutes traffic to maintain connectivity taking location of you and your peer into consideration.
|
||||||
|
|
||||||
### Benefits?
|
### The Benefits
|
||||||
|
|
||||||
- **Continuous Connectivity:** Mycelium ensures uninterrupted connectivity by dynamically rerouting traffic through available connections (friends, satellites, 4/5G, fiber).
|
- **Continuous connectivity:** Mycelium ensures uninterrupted connectivity by dynamically rerouting traffic through available connections (friends, satellites, 4/5G, fiber).
|
||||||
- **End-to-End Encryption:** Robust encryption stops man-in-the-middle attacks, guaranteeing secure communication.
|
- **End-to-end encryption:** robust encryption stops man-in-the-middle attacks, guaranteeing secure communication.
|
||||||
- **Proof of authenticity ([POA](p2p:poa.md))**: make sure we know who we communicate with
|
- **Proof of authenticity ([POA](p2p:poa.md))**: ensures that we know who we are communicating with
|
||||||
- **Optimized Routing:** Mycelium finds the shortest path between network participants, reducing latency and keeping traffic localized.
|
- **Optimized routing:** Mycelium finds the shortest path between network participants, reducing latency and keeping traffic localized.
|
||||||
- **Universal Server Capability:** Empowers individuals to act as servers, a foundational element for any peer-to-peer system.
|
- **Universal server capability:** empowers individuals to act as servers, a foundational element for any peer-to-peer system.
|
||||||
- **Full Compatibility:** Mycelium seamlessly integrates with the current internet, supporting any application.
|
- **Full Compatibility:** Mycelium seamlessly integrates with the current internet, supporting any application.
|
||||||
- **Impressive Speed:** Achieves 1 Gbps per Network Agent, ensuring rapid data transfer.
|
- **Impressive speed:** achieves 1 Gbps per Network Agent, ensuring rapid data transfer.
|
||||||
|
|
||||||
### Status?
|
### Status
|
||||||
|
|
||||||
- In beta and usable from TFGrid 3.13, its our 3e generation approach to networking and took us years to do. We are looking forward to your feedback.
|
In beta and usable from TFGrid 3.13, its our 3e generation approach to networking and took us years to do. We are looking forward to your feedback.
|
||||||
|
|
||||||
|
@ -1,10 +1,10 @@
|
|||||||
|
|
||||||
|
|
||||||
### Why?
|
## The Problem
|
||||||
|
|
||||||
Traditional firewalls are increasingly ineffective in addressing modern security challenges. They struggle to mitigate emerging threats, particularly against backdoors and man-in-the-middle attacks. Backdoors can render firewalls obsolete as attackers find ways to bypass them. New, innovative approaches to cybersecurity are necessary to address these evolving security problems.
|
Traditional firewalls are increasingly ineffective at addressing modern security challenges. They struggle to mitigate emerging threats, particularly against backdoors and man-in-the-middle attacks. Backdoors can render firewalls obsolete as attackers find ways to bypass them. New and innovative approaches to cybersecurity are necessary to address these evolving security problems.
|
||||||
|
|
||||||
## What?
|
## Introducing NetworkWall
|
||||||
|
|
||||||
Imagine a scenario where you deploy applications within secure, liquid-cooled physical containers or smaller POD's that operate without relying on traditional TCP/IP or Ethernet protocols. By avoiding the use of standard low-level protocols, the existing backdoors are unable to communicate with the external world.
|
Imagine a scenario where you deploy applications within secure, liquid-cooled physical containers or smaller POD's that operate without relying on traditional TCP/IP or Ethernet protocols. By avoiding the use of standard low-level protocols, the existing backdoors are unable to communicate with the external world.
|
||||||
|
|
||||||
@ -12,9 +12,12 @@ Incoming traffic is intercepted at the application level and securely transporte
|
|||||||
|
|
||||||
It's important to note that this solution is primarily intended for commercial use cases, but its existence is valuable knowledge in the realm of cybersecurity and network security.
|
It's important to note that this solution is primarily intended for commercial use cases, but its existence is valuable knowledge in the realm of cybersecurity and network security.
|
||||||
|
|
||||||
## Benefits
|
## The Benefits
|
||||||
|
|
||||||
- **Enhanced Security and Privacy:** The solution offers significantly improved security and privacy measures, mitigating potential risks and vulnerabilities.
|
- **Enhanced security and privacy:** the solution offers significantly improved security and privacy measures, mitigating potential risks and vulnerabilities.
|
||||||
- **Ultra-Fast Connectivity:** Within the POD/Container, the connectivity is exceptionally fast, ensuring rapid data transfer and application performance.
|
- **Ultra-fast connectivity:** within the POD/Container, connectivity is exceptionally fast, ensuring rapid data transfer and application performance.
|
||||||
- **Robust Data and Application-Aware Proxies:** Secure proxies between the Internet and the protected backend application provide an additional layer of security, safeguarding data and ensuring application-level awareness.
|
- **Robust data and application aware proxies:** secure proxies between the Internet and the protected backend application provide an additional layer of security, safeguarding data and ensuring application-level awareness.
|
||||||
- **Seamless Integration:** The solution is designed for ease of integration within existing environments, minimizing disruptions and complexities during implementation.
|
- **Seamless integration:** the solution is designed for ease of integration within existing environments, minimizing disruptions and complexities during implementation.
|
||||||
|
|
||||||
|
## Status
|
||||||
|
To be completed
|
@ -1,14 +1,11 @@
|
|||||||
|
|
||||||
|
### The Problem
|
||||||
|
|
||||||
|
|
||||||
### Why?
|
|
||||||
|
|
||||||
There is a growing need for more accessible and user-friendly solutions to store and manage large volumes of data efficiently.
|
There is a growing need for more accessible and user-friendly solutions to store and manage large volumes of data efficiently.
|
||||||
|
|
||||||
While Zero-Stor addresses numerous storage challenges effectively, it may not be accessible or user-friendly for typical developers or system administrators. QSFS has been developed to bridge this gap and provide a more approachable storage solution.
|
While Zero-Stor addresses numerous storage challenges effectively, it may not be accessible or user-friendly for typical developers or system administrators. QSFS has been developed to bridge this gap and provide a more approachable storage solution.
|
||||||
|
|
||||||
### What?
|
### Introducing QSFS
|
||||||
|
|
||||||
A FUSE-based filesystem utilizing Zero-Stor as its backend. Metadata is safeguarded to prevent loss, inheriting Zero-Stor's benefits and simplifying usage for developers and system administrators.
|
A FUSE-based filesystem utilizing Zero-Stor as its backend. Metadata is safeguarded to prevent loss, inheriting Zero-Stor's benefits and simplifying usage for developers and system administrators.
|
||||||
|
|
||||||
@ -26,4 +23,8 @@ This filesystem can be mounted under various storage-aware applications, such as
|
|||||||
- Provides a user-friendly interface for seamless integration with a wide range of applications.
|
- Provides a user-friendly interface for seamless integration with a wide range of applications.
|
||||||
- Offers considerable scalability capabilities, although not unlimited in scale.
|
- Offers considerable scalability capabilities, although not unlimited in scale.
|
||||||
- Achieves reasonable performance data transfer rates of up to 50 MB/sec, particularly for larger files.
|
- Achieves reasonable performance data transfer rates of up to 50 MB/sec, particularly for larger files.
|
||||||
- Can scale to about 2 million files per filesystem.
|
- Can scale to about 2 million files per filesystem.
|
||||||
|
|
||||||
|
|
||||||
|
### Status
|
||||||
|
To be completed
|
@ -11,13 +11,13 @@ This unique operating system doesn't require installation on hard disks or SSDs;
|
|||||||
|
|
||||||
### The Benefits
|
### The Benefits
|
||||||
|
|
||||||
- **Compatible with existing workloads:** our primary goal is to ensure that Zero-OS is compatibile with over 99% of the workloads commonly hosted in centralized cloud environments today. This includes support for Docker containers, virtual machines, Kubernetes, and more.
|
- **Compatibility with existing workloads:** our primary goal is to ensure Zero-OS compatibility with over 99% of the workloads commonly hosted in centralized cloud environments today. This includes support for Docker containers, virtual machines, Kubernetes, and more.
|
||||||
- **Reduced attack surface:** Zero-OS boasts a smaller hacking surface, enhancing security by minimizing potential vulnerabilities.
|
- **Reduced attack surface:** Zero-OS boasts a smaller hacking surface, enhancing security by minimizing potential vulnerabilities.
|
||||||
- **Stateless design:** its statelessness simplifies deployment and updates, making it easier to maintain while ensuring that it's always up to date.
|
- **Stateless design:** its statelessness simplifies deployment and updates, making it easier to maintain while ensuring it's always up to date.
|
||||||
- **Autonomous operation:** whether you have one instance or a billion, Zero-OS operates autonomously, streamlining management and maintaining consistency across all instances.
|
- **Autonomous operation:** whether you have one instance or a billion, Zero-OS operates autonomously, streamlining management and maintaining consistency across all instances.
|
||||||
- **Rapid deployment:** with Zero-OS, you can deploy 1000 virtual machines in just 2 minutes, ensuring agility and efficiency in scaling up resources.
|
- **Rapid deployment:** with Zero-OS, you can deploy 1000 virtual machines in just 2 minutes, ensuring agility and efficiency in scaling up resources.
|
||||||
- **Unique security features:** Zero-OS offers support for distinctive security features to enhance protection and fortify your infrastructure.
|
- **Unique security features:** Zero-OS offers support for distinctive security features to enhance protection and fortify your infrastructure.
|
||||||
- **Lower cost and easier maintenance:** Zero-OS significantly reduces the operational expenses associated with cloud infrastructure by automating most processes. This results in minimal operational costs and eliminates the need for extensive engineering efforts.
|
- **Lower Cost and easier maintenance:** Zero-OS significantly reduces the operational expenses associated with cloud infrastructure by automating most processes. This results in minimal operational costs and eliminates the need for extensive engineering efforts.
|
||||||
- **Ready for a decentralized world:** Zero-OS empowers individuals to become hosts for required Internet capacity (storage, network, compute, gpu), allowing them to be rewarded for providing computing resources and internet connectivity. This aligns with the vision of a truly decentralized and distributed computing ecosystem.
|
- **Ready for a decentralized world:** Zero-OS empowers individuals to become hosts for required Internet capacity (storage, network, compute, gpu), allowing them to be rewarded for providing computing resources and internet connectivity. This aligns with the vision of a truly decentralized and distributed computing ecosystem.
|
||||||
|
|
||||||
### Status
|
### Status
|
||||||
|
@ -1,40 +1,43 @@
|
|||||||
|
|
||||||
## Zero-Stor : a quantum safe backend storage system.
|
## Zero-Stor : A Quantum Safe Backend Storage System.
|
||||||
|
|
||||||
### Why?
|
### The Problem
|
||||||
|
|
||||||
Traditional backend storage systems have their roots in centralized environments, focusing on low-latency and closed security setups. However, these characteristics make them less suitable for use in decentralized cloud contexts.
|
Traditional backend storage systems have their roots in centralized environments, focusing on low-latency and closed security setups. However, these characteristics make them less suitable for use in decentralized cloud contexts.
|
||||||
|
|
||||||
Newer-generation storage systems like protocol-driven or blockchain-based solutions may face scalability and performance limitations and may not fulfill certain critical requirements that we consider essential.
|
Newer generation storage systems such as protocol-driven or blockchain-based solutions may face scalability and performance limitations and may not fulfill certain critical requirements that we consider essential.
|
||||||
|
|
||||||
### What?
|
### Introducing Zero-Stor
|
||||||
|
|
||||||
A redesigned storage system which can scale to planet level, is super secure private and fast enough for more usecases. Its designed to operate in a decentralized context. Data can never be lost of corrupted.
|
A redesigned storage system which can scale to planet level. It is super secure, private and fast enough for more use cases. It is designed to operate in a decentralized context and data can never be lost or corrupted.
|
||||||
|
|
||||||
This storage system is a backend storage system, cannot be used by end users, its meant to be integrated with a front end storage system like e.g. S3 or a filesystem (see next section).
|
This storage system is:
|
||||||
|
- A backend storage system
|
||||||
|
- It cannot be used by end users
|
||||||
|
- It's meant to be integrated with a front end storage system like e.g. S3 or a filesystem (see next section).
|
||||||
|
|
||||||
|
|
||||||
### Benefits?
|
### The Benefits
|
||||||
|
|
||||||
|
|
||||||
- **Data Resilience:** Ensures data is never lost or corrupted.
|
- **Data resilience:** ensures data is never lost or corrupted.
|
||||||
- **Planetary Scalability:** Capable of scaling to a global level.
|
- **Planetary scalability:** capable of scaling to a global level.
|
||||||
- **Cost-Efficient:** Offers exceptional cost efficiency.
|
- **Cost-efficient:** offers exceptional cost efficiency.
|
||||||
- **Versatility:** Suitable for various use cases, including archiving, backup, files, and CDNs.
|
- **Versatility:** suitable for various use cases, including archiving, backup, files, and CDNs.
|
||||||
- **Low Overhead:** Requires only a 20% overhead for building a storage network where any four nodes can be lost simultaneously, compared to a 400% overhead in traditional storage systems.
|
- **Low overhead:** requires only a 20% overhead for building a storage network where any four nodes can be lost simultaneously, compared to a 400% overhead in traditional storage systems.
|
||||||
- **Security and Privacy:** Provides robust security, even impervious to quantum computers.
|
- **Security and privacy:** provides robust security and is even impervious to quantum computers.
|
||||||
- **Data Sovereignty:** Users have complete control over data placement.
|
- **Data sovereignty:** users have complete control over data placement.
|
||||||
- **Empowering Front-End Applications:** Can be integrated into various front-end storage applications, such as blockchains, archives, or S3.
|
- **Empowering front-end applications:** can be integrated into various front-end storage applications, such as blockchains, archives, or S3.
|
||||||
- **CDN Support:** Functions effectively as a backend for CDN applications, facilitating content delivery.
|
- **CDN support:** functions effectively as a backend for CDN applications, facilitating content delivery.
|
||||||
- **Sustainability:** Uses 10 times less energy compared to traditional storage systems, contributing to sustainability efforts.
|
- **Sustainability:** uses 10 times less energy compared to traditional storage systems, contributing to sustainability efforts.
|
||||||
- **Locality Aware:** Data can be delivered to where the users are ideal for sovereign usecases.
|
- **Locality aware:** data can be delivered to where the users are which is ideal for sovereign use cases.
|
||||||
|
|
||||||
|
|
||||||
### Status?
|
### Status
|
||||||
|
|
||||||
- Zero-OS has been in beta for over four years, with continuous development and improvement.
|
- Zero-OS has been in beta for over four years, with continuous development and improvement.
|
||||||
- A notable deployment in Switzerland, with over 50 petabytes of storage capacity, served as a substantial test environment, although it's no longer active.
|
- A notable deployment in Switzerland, with over 50 petabytes of storage capacity, served as a substantial test environment, although it's no longer active.
|
||||||
- Within the current TFGrid network, there's an impressive capacity of over 20 petabytes available for use.
|
- Within the current TFGrid network, there is an impressive capacity of over 20 petabytes available for use.
|
||||||
- Lacking some monitoring, documentation ... will be added in TFGrid 3.15
|
- Lacking some monitoring but documentation will be added in TFGrid 3.15
|
||||||
- Previous releases have been successfully utilized by major government organizations on a massive scale (hundreds of petabytes), providing strong evidence of the concept's viability and effectiveness.
|
- Previous releases have been successfully utilized by major government organizations on a massive scale (hundreds of petabytes), providing strong evidence of the concept's viability and effectiveness.
|
||||||
|
|
||||||
|
@ -1,35 +1,30 @@
|
|||||||
# The Internet Is Broken
|
# The Internet Is Broken
|
||||||
|
|
||||||
**THE THREE LAYERS OF THE INTERNET**
|
**The Three Layers Of The Internet**
|
||||||
|
|
||||||
![](internet_3layers.png)
|
![](internet_3layers.png)
|
||||||
|
|
||||||
The Internet is made up out of 3 layers
|
The Internet is made up of 3 layers:
|
||||||
|
|
||||||
- compute, storage: this is where the applications are being served from
|
1. Compute & Storage: this is where applications are being served from. Currently this system is highly centralized and runs from large data centers (see below).
|
||||||
- today: highly centralized and running from large datacenters (see below)
|
|
||||||
- network: ability for information to travel
|
|
||||||
- can be as wireless, cables (fiber) and satelite links, ...
|
|
||||||
- right now the information needs to travel very far, for most countries there is few local information
|
|
||||||
- very few companies own +80% of the network capacity
|
|
||||||
- applications:
|
|
||||||
- today hosted in huge datacenters using the compute and storage capacity as provided
|
|
||||||
- too centralized and because of that also vulnerable
|
|
||||||
|
|
||||||
The information travels mainly over large fiber backbone links.
|
2. Network: this is the ability for information to travel and it can be wireless, via cables (fiber) or satellite links etc. Currently information needs to travel very far and for most countries very little information is stored locally. A handful of companies own more than 80% of the current Internet's network capacity.
|
||||||
|
|
||||||
|
3. Applications: currently applications are hosted in huge data centers using the compute and storage as provided. This system is too centralized and therefore very vulnerable.
|
||||||
|
|
||||||
|
Digital information mainly travels over large fiber backbone links as pictured here.
|
||||||
|
|
||||||
![](global_net.png)
|
![](global_net.png)
|
||||||
|
|
||||||
The Internet as we know it is far away from the original intent, if 2 people in e.g. Zanzibar (an Island in Africa) use Zoom with each other then the information will travel to Europe in a large datacenter where the Zoom servers are being hosted.
|
The Internet as we know it has significantly diverged from its original intent. If 2 people in e.g. Zanzibar (an Island in Africa) use Zoom with each other then the information will travel from Zanzibar to a large European datacenter where the Zoom servers are being hosted and back again.
|
||||||
|
|
||||||
This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be.
|
This leads to very inneficient behavior, slower performance, less reliability and a cost which is higher than what it should be.
|
||||||
|
|
||||||
![](network_path.png)
|
![](network_path.png)
|
||||||
|
|
||||||
We became products.
|
Another important aspect is the lack of autonomy and sovereignty within this Internet. We have become the products. All of our data is hosted in large data centers owned by a few large corporations.
|
||||||
|
|
||||||
![alt text](we_are_products.png)
|
![alt text](we_are_products.png)
|
||||||
|
|
||||||
- All our data is hosted in large datacenters owned by few large corporations.
|
|
||||||
- We exist many times, and each time a full infrastructure has been built to deliver the applications from.
|
|
||||||
|
|
||||||
|
We also exist many times on the Internet across many applications and each time a full infrastructure has been built to deliver the applications from. This system is unsustainable and inefficient.
|
||||||
|
@ -7,18 +7,18 @@ We are more than just Container or VM technology.
|
|||||||
|
|
||||||
Default features:
|
Default features:
|
||||||
|
|
||||||
- compatible with Docker
|
- Compatible with Docker
|
||||||
- compatible with any VM (Virtual Machine)
|
- Compatible with any VM (Virtual Machine)
|
||||||
- compatible with any Linux workload
|
- Compatible with any Linux workload
|
||||||
- integrated unique storage & network primitives
|
- Integrated unique storage & network primitives
|
||||||
|
|
||||||
We have following unique advantages:
|
We have the following unique advantages:
|
||||||
|
|
||||||
- no need to work with images, we work with our unique ZOS FS
|
- No need to work with images, we work with our unique ZOS FS
|
||||||
- every container runs in a dedicated virtual machine providing more security
|
- Every container runs in a dedicated virtual machine providing more security
|
||||||
- the containers talk to each other over a private network (mycelium)
|
- The containers talk to each other over a private network (Mycelium)
|
||||||
- the containers can use a web gatewat to allow users on the internet connect to the applications as running in their secure containers
|
- The containers can use a web gateway to allow internet users to connect to the applications which are running in their secure containers
|
||||||
- can use core-x to manage the workload
|
- Can use core-x to manage the workload
|
||||||
|
|
||||||
|
|
||||||
For more information see [ZeroOS](zos.md)
|
For more information see [ZeroOS](zos.md)
|
@ -5,9 +5,9 @@
|
|||||||
|
|
||||||
This tool allows you to manage your ZMachine over web remotely.
|
This tool allows you to manage your ZMachine over web remotely.
|
||||||
|
|
||||||
ZMachine process manager
|
ZMachine process manager:
|
||||||
|
|
||||||
- Provide a web interface and a REST API to control your processes
|
- Provides a web interface and a REST API to control your processes
|
||||||
- Allow to watch the logs of your processes
|
- Allows you to watch the logs of your processes
|
||||||
- Or use it as a web terminal (access over https to your terminal)!
|
- You can use it as a web terminal (access over https to your terminal)
|
||||||
|
|
||||||
|
@ -1,25 +1,25 @@
|
|||||||
|
|
||||||
# Mycelium our Planetary Network
|
# Mycelium: Our Planetary Network
|
||||||
|
|
||||||
![](img/planet_net_.jpg)
|
![](img/planet_net_.jpg)
|
||||||
|
|
||||||
> TODO: need to upgrade image, also digital twin needs to be named '3bot'
|
> TODO: Need to update this image, also digital twin needs to be named '3bot'
|
||||||
|
|
||||||
The planetary network is an overlay network which lives on top of the existing internet or other peer2peer networks created. In this network, everyone is connected to everyone. End-to-end encryption between users of an app and the app running behind the network wall.
|
The planetary network is an overlay network which lives on top of the existing Internet or other peer-to-peer networks created. In this network, everyone is connected to everyone. End-to-end encryption between users of an app and the app runs behind the network wall.
|
||||||
|
|
||||||
Each user end network point is strongly authenticated and uniquely identified, independent of the network carrier used. There is no need for a centralized firewall or VPN solutions, as there is a circle based networking security in place.
|
Each user end network point is strongly authenticated and uniquely identified, independent of the network carrier used. There is no need for a centralized firewall or VPN solutions, as there is a circle-based networking security in place.
|
||||||
|
|
||||||
|
### Key Benefits
|
||||||
|
|
||||||
Benefits :
|
|
||||||
- It finds shortest possible paths between peers
|
- It finds shortest possible paths between peers
|
||||||
- There's full security through end-to-end encrypted messaging
|
- There is full security through end-to-end encrypted messaging
|
||||||
- It allows for peer2peer links like meshed wireless
|
- It allows for peer-to-peer links, like meshed wireless
|
||||||
- It can survive broken internet links and re-route when needed
|
- It can survive broken Internet links and re-route when needed
|
||||||
- It resolves the shortage of IPV4 addresses
|
- It resolves the shortage of IPV4 addresses
|
||||||
|
|
||||||
|
Whereas current computer networks depend heavily on very centralized design and configuration, this networking concept breaks this mold by making use of a global-spanning tree to form a scalable IPv6 encrypted mesh network. This is a peer-to-peer implementation of a networking protocol.
|
||||||
|
|
||||||
Whereas current computer networks depend heavily on very centralized design and configuration, this networking concept breaks this mould by making use of a global spanning tree to form a scalable IPv6 encrypted mesh network. This is a peer2peer implementation of a networking protocol.
|
The following table illustrates the high-level differences between traditional networks like today's Internet, and the Planetary Network created by ThreeFold:
|
||||||
|
|
||||||
The following table illustrates high-level differences between traditional networks like the internet, and the planetary threefold network:
|
|
||||||
|
|
||||||
| Characteristic | Traditional | Mycelium |
|
| Characteristic | Traditional | Mycelium |
|
||||||
| --------------------------------------------------------------- | ----------- | ----------------- |
|
| --------------------------------------------------------------- | ----------- | ----------------- |
|
||||||
@ -32,18 +32,17 @@ The following table illustrates high-level differences between traditional netwo
|
|||||||
|
|
||||||
## What are the problems solved here?
|
## What are the problems solved here?
|
||||||
|
|
||||||
The internet as we know it today doesn’t conform to a well-defined topology. This has largely happened over time - as the internet has grown, more and more networks have been “bolted together”. The lack of defined topology gives us some unavoidable problems:
|
The Internet as we know it today doesn’t conform to a well-defined topology. This has largely happened over time - as the Internet has grown, more and more networks have been “bolted together." The lack of defined topology gives us some unavoidable problems:
|
||||||
|
|
||||||
- The routing tables that hold a “map” of the internet are huge and inefficient
|
- The routing tables that hold a “map” of the Internet are huge and inefficient
|
||||||
- There isn’t really any way for a computer to know where it is located on the internet relative to anything else
|
- There isn’t really any way for a computer to know where it is located on the Internet relative to anything else
|
||||||
- It’s difficult to examine where a packet will go on its journey from source to destination without actually sending it
|
- It is difficult to examine where a packet will go on its journey, from source to destination, without actually sending it
|
||||||
- It’s very difficult to install reliable networks into locations that change often or are non-static, i.e. wireless mesh networks
|
- It is very difficult to install reliable networks into locations that change often or are non-static, i.e. wireless mesh networks
|
||||||
|
|
||||||
These problems have been partially mitigated (but not really solved) through centralization - rather than your computers at home holding a copy of the global routing table, your ISP does it for you. Your computers and network devices are configured just to “send it upstream” and to let your ISP decide where it goes from there, but this does leave you entirely at the mercy of your ISP who can redirect your traffic anywhere they like and to inspect, manipulate or intercept it.
|
These problems have been partially mitigated (but not really solved) through centralization - rather than your computers at home holding a copy of the global routing table, your ISP does it for you. Your computers and network devices are configured just to “send it upstream” and to let your ISP decide where it goes from there, but this does leave you entirely at the mercy of your ISP, who can redirect your traffic anywhere they like and to inspect, manipulate, or intercept it.
|
||||||
|
|
||||||
In addition, wireless meshing requires you to know a lot about the network around you, which would not typically be the case when you have outsourced this knowledge to your ISP. Many existing wireless mesh routing schemes are not scalable or efficient, and do not bridge well with existing networks.
|
In addition, wireless meshing requires you to know a lot about the network around you, which would not typically be the case when you have outsourced this knowledge to your ISP. Many existing wireless mesh routing schemes are not scalable or efficient, and do not bridge well with existing networks.
|
||||||
|
|
||||||
![](img/planetary_net.jpg)
|
![](img/planetary_net.jpg)
|
||||||
|
|
||||||
The planetary network is a continuation and implementation of the [Planetary Network](https://Planetary Network-network.github.io/about.html) network initiative. This technology is in beta but has been proven to work already quite well.
|
The Planetary Network is a continuation and implementation of the [Planetary Network](https://Planetary Network-network.github.io/about.html) network initiative. This technology is in beta but has been proven to work already quite well.
|
||||||
|
|
@ -1,23 +1,23 @@
|
|||||||
|
|
||||||
# ThreeFold Network Technology Overview
|
# ThreeFold Network Technology Overview
|
||||||
|
|
||||||
Decentralized networking platform allowing any compute and storage workload to be connected together on a private (overlay) network and exposed to the existing internet network. The Peer2Peer network platform allows any workload to be connected over secure encrypted networks which will look for the shortest path between the nodes.
|
ThreeFold's decentralized networking platform allows any compute and storage workload to be connected together on a private (overlay) network and exposed to the existing Internet network. The peer-to-peer network platform allows any workload to be connected over secure encrypted networks, which will look for the shortest path between nodes.
|
||||||
|
|
||||||
### Secure mesh overlay network (peer2peer)
|
### Secure Mesh Overlay Network (Peer-to-Peer)
|
||||||
|
|
||||||
Z_NET is the foundation of any architecture running on the TF Grid. It can be seen as a virtual private datacenter and the network allows all of the *N* containers to connect to all of the *(N-1)* other containers. Any network connection is a secure network connection between your containers, it creates peer 2 peer network between containers.
|
ZNet is the foundation of any architecture running on the TF Grid. It can be seen as a virtual private data center and the network allows all of the *N* containers to connect to all of the *(N-1)* other containers. Any network connection is a secure network connection between your containers, it creates a peer-to-peer network between containers.
|
||||||
|
|
||||||
![alt text](net1.png)
|
![alt text](net1.png)
|
||||||
|
|
||||||
No connection is made with the internet. The ZNet is a single tenant network and by default not connected to the public internet. Everything stays private. For connecting to the public internet, a Web Gateway is included in the product to allows for public access if and when required.
|
No connection is made with the Internet. The ZNet is a single tenant network and by default not connected to the public Internet. Everything stays private. For connecting to the public Internet, a Web Gateway is included in the product to allow for public access, if and when required.
|
||||||
|
|
||||||
### Redundancy
|
### Redundancy
|
||||||
|
|
||||||
As integrated with [WebGW](webgw):
|
As integrated with [Web Gateway (WebGW)](webgw):
|
||||||
|
|
||||||
![alt text](net2.png)
|
![alt text](net2.png)
|
||||||
|
|
||||||
- Any app can get (securely) connected to the internet by any chosen IP address made available by ThreeFold network farmers through [WebGW](webgw)
|
- Any app can get (securely) connected to the Internet by any chosen IP address made available by ThreeFold network farmers through [WebGW](webgw)
|
||||||
- An app can be connected to multiple web gateways at once, the DNS round robin principle will provide load balancing and redundancy
|
- An app can be connected to multiple web gateways at once, the DNS round robin principle will provide load balancing and redundancy
|
||||||
- An easy clustering mechanism where web gateways and nodes can be lost and the public service will still be up and running
|
- An easy clustering mechanism where web gateways and nodes can be lost and the public service will still be up and running
|
||||||
- Easy maintenance. When containers are moved or re-created, the same end user connection can be reused as that connection is terminated on the Web Gateway. The moved or newly created Web Gateway will recreate the socket to the Web Gateway and receive inbound traffic.
|
- Easy maintenance. When containers are moved or re-created, the same end user connection can be reused as that connection is terminated on the Web Gateway. The moved or newly created Web Gateway will recreate the socket to the Web Gateway and receive inbound traffic.
|
||||||
|
@ -1,42 +1,38 @@
|
|||||||
|
# TF Grid Web Gateway
|
||||||
|
|
||||||
|
The Web Gateway is a mechanism to connect private networks to the open Internet in such a way that there is no direct connection between the Internet and the secure workloads running in the ZMachines.
|
||||||
# TFGrid WebGW
|
|
||||||
|
|
||||||
The Web Gateway is a mechanism to connect the private networks to the open Internet, in such a way that there is no direct connection between internet and the secure workloads running in the ZMachines.
|
|
||||||
|
|
||||||
![](img/webgateway.jpg)
|
![](img/webgateway.jpg)
|
||||||
|
|
||||||
|
### Key Benefits
|
||||||
|
|
||||||
|
|
||||||
- Separation between where compute workloads are and where services are exposed
|
- Separation between where compute workloads are and where services are exposed
|
||||||
- Redundant
|
- Redundancy: Each app can be exposed on multiple web gateways at once
|
||||||
- Each app can be exposed on multiple webgateways at once
|
- Support for many interfaces
|
||||||
- Support for many interfaces...
|
|
||||||
- Helps resolve shortage of IPv4 addresses
|
- Helps resolve shortage of IPv4 addresses
|
||||||
|
|
||||||
### Implementation
|
### Implementation
|
||||||
|
|
||||||
Some 3nodes supports gateway functionality (configured by the farmers). A 3node with gateway configuration can then accept gateway workloads and then forward traffic to ZMachines that only have Planetary Network (planetary network) or Ipv6 addresses.
|
Some 3Nodes support gateway functionality (this is configured by the farmers). A 3Node with gateway configuration can then accept gateway workloads and forward traffic to ZMachines that only have Planetary Network or IPv6 addresses.
|
||||||
|
|
||||||
The gateway workloads consists of a name (prefix) that need to be reserved on the block chain first. Then the list of backend IPs. There are other flags that can be set to control automatic TLS (please check terraform documentations for the exact details of a reservation).
|
The gateway workloads consist of a name (prefix) that first needs to be reserved on the blockchain. Then, the list of backend IPs. There are other flags that can be set to control automatic TLS (please check Terraform documentation for the exact details of a reservation).
|
||||||
|
|
||||||
Once the 3node receives this workloads, the network configure proxy for this name and the Planetary Network IPs.
|
Once the 3Node receives this workload, the network configures proxy for this name and the Planetary Network IPs.
|
||||||
|
|
||||||
### Security
|
### Security
|
||||||
|
|
||||||
ZMachines have to have a Planetary Network IP or any other IPv6 (also IPv4 are accepted), it means that any person who is connected to the Planetary Network, can also reach the ZMachine without the need for a proxy.
|
ZMachines have to have a Planetary Network IP or any other IPv6 (IPv4 is also accepted). This means that any person connected to the Planetary Network can also reach the ZMachine without the need for a proxy.
|
||||||
|
|
||||||
So it's up to the ZMachine owner/maintainer to make sure it is secured and only have the required ports open.
|
So it's up to the ZMachine owner/maintainer to make sure it is secured and that only the required ports are open.
|
||||||
|
|
||||||
### Redundant Network Connection
|
### Redundant Network Connection
|
||||||
|
|
||||||
![](img/redundant_net.jpg)
|
![](img/redundant_net.jpg)
|
||||||
|
|
||||||
|
|
||||||
### Unlimited Scale
|
### Unlimited Scale
|
||||||
|
|
||||||
![](img/webgw_scaling.jpg)
|
![](img/webgw_scaling.jpg)
|
||||||
|
|
||||||
|
The network architecture is a pure scale-out network system. It can scale to unlimited size, there is simply no bottleneck. Network "supply" is created by network farmers, and network "demand" is done by TF Grid users.
|
||||||
|
|
||||||
The network architecture is a pure scale-out network system, it can scale to unlimited size, there is simply no bottleneck. Network "supply" is created by network farmers, and network "demand" is done by TF Grid users. Supply and demand scale independently, for supply there can be unlimited network, farmers providing the web gateways on their own 3nodes, and unlimited compute farmers providing 3nodes for compute and storage. The demand side is driven by developers creating software that runs on the grid, system integrators creating solutions for enterprises. This demand side is exponentially growing for data processing and storage use cases.
|
Supply and demand scale independently. For supply, there can be unlimited network farmers providing web gateways on their own 3Nodes, and unlimited compute farmers providing 3Nodes for compute and storage. The demand side is driven by developers creating software that runs on the grid, system integrators creating solutions for enterprises, and so on. Globally, there is exponentially-growing demand for data processing and storage use cases.
|
BIN
collections/tech/qsss/img/planet_fs.jpg
Normal file
BIN
collections/tech/qsss/img/planet_fs.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 170 KiB |
BIN
collections/tech/qsss/img/quantum_safe_storage.jpg
Normal file
BIN
collections/tech/qsss/img/quantum_safe_storage.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 137 KiB |
BIN
collections/tech/qsss/img/quantum_safe_storage_scale.jpg
Normal file
BIN
collections/tech/qsss/img/quantum_safe_storage_scale.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 293 KiB |
BIN
collections/tech/qsss/img/storage_architecture_1.jpg
Normal file
BIN
collections/tech/qsss/img/storage_architecture_1.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 138 KiB |
@ -4,53 +4,53 @@
|
|||||||
|
|
||||||
> TODO: need to upgrade image, also digital twin needs to be named '3bot'
|
> TODO: need to upgrade image, also digital twin needs to be named '3bot'
|
||||||
|
|
||||||
The owner of the NFT can upload the data using one of our supported interfaces
|
The owner of the NFT can upload the data using one of our supported interfaces:
|
||||||
|
|
||||||
- http upload (everything possible on https://nft.storage/ is also possible on our system)
|
- Http upload (everything possible on https://nft.storage/ is also possible on our system)
|
||||||
- filesystem
|
- Filesystem
|
||||||
|
|
||||||
Every person in the world can retrieve the NFT (if allowed) and the data will be verified when doing so. The data is available everywhere in the world using multiple interfaces again (IPFS, HTTP(S), ...). Caching happens on global level. No special software or account on threefold is needed to do this.
|
Anyone in the world can retrieve the NFT (if allowed) and the data will be verified when doing so. The data is available anywhere in the world using multiple interfaces again (IPFS, HTTP(S) etc.). Caching happens on a global level. No special software or account on ThreeFold is needed to do this.
|
||||||
|
|
||||||
The NFT system uses a super reliable storage system underneath which is sustainable for the planet (green) and ultra secure and private. The NFT owner also owns the data.
|
The NFT system operates on top of a very reliable storage system which is sustainable for the planet and ultra secure and private. The NFT owner also owns the data.
|
||||||
|
|
||||||
|
|
||||||
## Benefits
|
## The Benefits
|
||||||
|
|
||||||
#### Persistence = owned by the data user (as represented by digital twin)
|
#### Persistence = owned by the data user (as represented by digital twin)
|
||||||
|
|
||||||
![](img/nft_storage.jpg)
|
![](img/nft_storage.jpg)
|
||||||
|
|
||||||
Is not based on a shared-all architecture.
|
The system is not based on a shared-all architecture.
|
||||||
|
|
||||||
Whoever stores the data has full control over
|
Whoever stores the data has full control over:
|
||||||
|
|
||||||
- where data is stored (specific locations)
|
- Where data is stored (specific locations)
|
||||||
- redundancy policy used
|
- The redundancy policy which is used
|
||||||
- how long should the data be kept
|
- How long the data is kept
|
||||||
- CDN policy (where should data be available and how long)
|
- CDN policy (where the data is available and for how long)
|
||||||
|
|
||||||
|
|
||||||
#### Reliability
|
#### Reliability
|
||||||
|
|
||||||
- data cannot be corrupted
|
- Data cannot be corrupted
|
||||||
- data cannot be lost
|
- Data cannot be lost
|
||||||
- each time data is fetched back hash (fingerprint) is checked, if issues autorecovery happens
|
- Each time data is fetched back the hash (fingerprint) is checked. If there are any issues then autorecovery occurs
|
||||||
- all data is encrypted and compressed (unique per storage owner)
|
- All data is encrypted and compressed (unique per storage owner)
|
||||||
- data owner chooses the level of redundancy
|
- Data owner chooses the level of redundancy
|
||||||
|
|
||||||
#### Lookup
|
#### Lookup
|
||||||
|
|
||||||
- multi URL & storage network support (see further the interfaces section)
|
- Multi URL & storage network support (see more in the interfaces section)
|
||||||
- IPFS, HyperDrive URL schema
|
- IPFS, HyperDrive URL schema
|
||||||
- unique DNS schema (with long key which is globally unique)
|
- Unique DNS schema (with long key which is globally unique)
|
||||||
|
|
||||||
#### CDN support (with caching)
|
#### CDN Support
|
||||||
|
|
||||||
Each file (movie, image) stored is available on many places worldwide.
|
Each file (movie, image etc.) stored is available in many locations worldwide.
|
||||||
|
|
||||||
Each file gets a unique url pointing to the data which can be retrieved on all locations.
|
Each file gets a unique url pointing to the data which can be retrieved from all these locations.
|
||||||
|
|
||||||
Caching happens on each endpoint.
|
Caching happens at each endpoint.
|
||||||
|
|
||||||
#### Self Healing & Auto Correcting Storage Interface
|
#### Self Healing & Auto Correcting Storage Interface
|
||||||
|
|
||||||
@ -58,9 +58,9 @@ Any corruption e.g. bitrot gets automatically detected and corrected.
|
|||||||
|
|
||||||
In case of a HD crash or storage node crash the data will automatically be expanded again to fit the chosen redundancy policy.
|
In case of a HD crash or storage node crash the data will automatically be expanded again to fit the chosen redundancy policy.
|
||||||
|
|
||||||
#### Storage Algoritm = Uses Quantum Safe Storage System as base
|
#### The Storage Algoritm Uses Quantum Safe Storage System As Its Base
|
||||||
|
|
||||||
Not even a quantum computer can hack data as stored on our QSSS.
|
Not even a quantum computer can hack data stored on our QSSS.
|
||||||
|
|
||||||
The QSSS is a super innovative storage system which works on planetary scale and has many benefits compared to shared and/or replicated storage systems.
|
The QSSS is a super innovative storage system which works on planetary scale and has many benefits compared to shared and/or replicated storage systems.
|
||||||
|
|
||||||
@ -74,15 +74,15 @@ Storage uses upto 10x less energy compared to classic replicated system.
|
|||||||
|
|
||||||
The stored data is available over multiple interfaces at once.
|
The stored data is available over multiple interfaces at once.
|
||||||
|
|
||||||
| interface | |
|
| Interface | |
|
||||||
| -------------------------- | ----------------------- |
|
| -------------------------- | ----------------------- |
|
||||||
| IPFS | ![](img/ipfs.jpg) |
|
| IPFS | ![](img/ipfs.jpg) |
|
||||||
| http(s) on top of Digital Twin | ![](img/http.jpg) |
|
| Http(s) on top of Digital Twin | ![](img/http.jpg) |
|
||||||
| syncthing | ![](img/syncthing.jpg) |
|
| Syncthing | ![](img/syncthing.jpg) |
|
||||||
| filesystem | ![](img/filesystem.jpg) |
|
| Filesystem | ![](img/filesystem.jpg) |
|
||||||
|
|
||||||
This allows ultimate flexibility from enduser perspective.
|
This allows ultimate flexibility from the end user perspective.
|
||||||
|
|
||||||
The object (video,image) can easily be embedded in any website or other representation which supports http.
|
The object (video, image etc.) can easily be embedded in any website or other representation which supports http.
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,42 +1,42 @@
|
|||||||
# Quantum Safe Storage Algoritm
|
# Quantum Safe Storage Algoritm
|
||||||
|
|
||||||
The Quantum Safe Storage Algorithm is the heart of the Storage engine. The storage engine takes the original data objects and creates data part descriptions that it stores over many virtual storage devices (ZDB/s)
|
The Quantum Safe Storage Algorithm is the heart of the Storage engine. The storage engine takes the original data objects and creates data part descriptions that it stores over many virtual storage devices (ZDB/s).
|
||||||
|
|
||||||
Data gets stored over multiple ZDB's in such a way that data can never be lost.
|
Data gets stored over multiple ZDB's in such a way that data can never be lost.
|
||||||
|
|
||||||
Unique features
|
Unique features
|
||||||
|
|
||||||
- data always append, can never be lost
|
- Data always append, can never be lost
|
||||||
- even a quantum computer cannot decrypt the data
|
- Even a quantum computer cannot decrypt the data
|
||||||
- is spread over multiple sites, sites can be lost, data will still be available
|
- Data is spread over multiple sites. If these sites are lost the data will still be available
|
||||||
- protects for datarot.
|
- Protects from datarot
|
||||||
|
|
||||||
## Why
|
## The Problem
|
||||||
|
|
||||||
Today we produce more data than ever before. We could not continue to make full copies of data to make sure it is stored reliably. This will simply not scale. We need to move from securing the whole dataset to securing all the objects that make up a dataset.
|
Today we produce more data than ever before. We cannot continue to make full copies of data to make sure it is stored reliably. This will simply not scale. We need to move from securing the whole dataset to securing all the objects that make up a dataset.
|
||||||
|
|
||||||
ThreeFold is using space technology to store data (fragments) over multiple devices (physical storage devices in TFNodes). The solution does not distribute and store parts of an object (file, photo, movie...) but describes the part of an object. This could be visualized by thinking of it as equations.
|
ThreeFold is using space technology to store data fragments over multiple devices (physical storage devices in TFNodes). The solution does not distribute and store parts of an object (file, photo, movie etc.) but describes the part of an object. This can be visualized by thinking of it as equations.
|
||||||
|
|
||||||
|
|
||||||
## How is it done today
|
## How Data Is Stored Today
|
||||||
|
|
||||||
![alt text](storage_today.png)
|
![alt text](storage_today.png)
|
||||||
|
|
||||||
In most distributed systems as used on the Internet or in blockchain land today the data will get replicated (sometimes after sharding, which means distributed based on the content of the file and spread out over the world).
|
In most distributed systems, as used on the Internet or in blockchain today, the data will get replicated (sometimes after sharding, which means distributed based on the content of the file and spread out over the world).
|
||||||
|
|
||||||
This leads to a lot of overhead and minimal control where the data is.
|
This leads to a lot of overhead and minimal control where the data is.
|
||||||
|
|
||||||
In well optimized systems overhead will be 400% but in some it can be orders of magnitude higher to get to a reasonable redundancy level.
|
In well optimized systems overhead will be 400% but in some it can be orders of magnitude higher to get to a reasonable redundancy level.
|
||||||
|
|
||||||
## The Quantum Safe storage System Works Differently
|
## The Quantum Safe Storage System Works Differently
|
||||||
|
|
||||||
![alt text](qsss_overview.png)
|
![alt text](qsss_overview.png)
|
||||||
|
|
||||||
ThreeFold has developed a new storage algoritm which is more efficient, ultra reliable and allows you full control over where you want your data to be stored.
|
ThreeFold has developed a new storage algorithm which is more efficient, ultra reliable and gives you full control over where your data is stored.
|
||||||
|
|
||||||
ThreeFold's approach is different, lets try to visualize by means of simple analogy with equations.
|
ThreeFold's approach is different. Let's try to visualize this new approach with a simple analogy using equations.
|
||||||
|
|
||||||
Let a,b,c,d.... be the parts of that original object. You could create endless unique equations using these parts. A simple example: let's assume we have 3 parts of original objects that have the following values:
|
Let a,b,c,d.... be the parts of the original object. You could create endless unique equations using these parts. A simple example: let's assume we have 3 parts of original objects that have the following values:
|
||||||
|
|
||||||
```
|
```
|
||||||
a=1
|
a=1
|
||||||
@ -44,7 +44,7 @@ b=2
|
|||||||
c=3
|
c=3
|
||||||
```
|
```
|
||||||
|
|
||||||
(and for reference the part of real-world objects is not a simple number like `1` but a unique digital number describing the part, like the binary code for it `110101011101011101010111101110111100001010101111011.....`).
|
(and for reference the part of the real-world objects is not a simple number like `1` but a unique digital number describing the part, like the binary code for it `110101011101011101010111101110111100001010101111011.....`).
|
||||||
|
|
||||||
|
|
||||||
With these numbers we could create endless amounts of equations:
|
With these numbers we could create endless amounts of equations:
|
||||||
@ -56,11 +56,11 @@ With these numbers we could create endless amounts of equations:
|
|||||||
4: 2b+a-c=2
|
4: 2b+a-c=2
|
||||||
5: 5c-b-a=12
|
5: 5c-b-a=12
|
||||||
|
|
||||||
......
|
etc.
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Mathematically we only need 3 to describe the content (=value) of the fragments. But creating more adds reliability. Now store those equations distributed (one equation per physical storage device) and forget the original object. So we no longer have access to the values of a, b, c and see, and we just remember the locations of all the equations created with the original data fragments.
|
Mathematically we only need 3 to describe the content (value) of the fragments. But creating more adds reliability. Now store those equations distributed (one equation per physical storage device) and forget the original object. So we no longer have access to the values of a, b, c and we just remember the locations of all the equations created with the original data fragments.
|
||||||
|
|
||||||
Mathematically we need three equations (any 3 of the total) to recover the original values for a, b or c. So do a request to retrieve 3 of the many equations and the first 3 to arrive are good enough to recalculate the original values. Three randomly retrieved equations are:
|
Mathematically we need three equations (any 3 of the total) to recover the original values for a, b or c. So do a request to retrieve 3 of the many equations and the first 3 to arrive are good enough to recalculate the original values. Three randomly retrieved equations are:
|
||||||
|
|
||||||
@ -77,36 +77,36 @@ And this is a mathematical system we could solve:
|
|||||||
|
|
||||||
Now that we know `a=1` we could solve the rest `c=a+2=3` and `b=c-a=2`. And we have from 3 random equations regenerated the original fragments and could now recreate the original object.
|
Now that we know `a=1` we could solve the rest `c=a+2=3` and `b=c-a=2`. And we have from 3 random equations regenerated the original fragments and could now recreate the original object.
|
||||||
|
|
||||||
The redundancy and reliability in such system comes in the form of creating (more than needed) equations and storing them. As shown these equations in any random order could recreate the original fragments and therefore redundancy comes in at a much lower overhead.
|
The redundancy and reliability in this system results from creating equations (more than needed) and storing them. As shown these equations in any random order can recreate the original fragments and therefore redundancy comes in at a much lower overhead.
|
||||||
|
|
||||||
In our system we don't don this with 3 parts but with thousands.
|
In our system we don't do this with 3 parts but with thousands.
|
||||||
|
|
||||||
### Example of 16/4
|
### Example of 16/4
|
||||||
|
|
||||||
![](img/quantumsafe_storage_algo.jpg)
|
![](img/quantumsafe_storage_algo.jpg)
|
||||||
|
|
||||||
|
|
||||||
Each object is fragmented into 16 parts. So we have 16 original fragments for which we need 16 equations to mathematically describe them. Now let's make 20 equations and store them dispersedly on 20 devices. To recreate the original object we only need 16 equations, the first 16 that we find and collect which allows us to recover the fragment and in the end the original object. We could lose any 4 of those original 20 equations.
|
Each object is fragmented into 16 parts. So we have 16 original fragments for which we need 16 equations to mathematically describe them. Now let's make 20 equations and store them dispersedly on 20 devices. To recreate the original object we only need 16 equations. The first 16 that we find and collect allows us to recover the fragment and in the end the original object. We could lose any 4 of those original 20 equations.
|
||||||
|
|
||||||
The likelihood of losing 4 independent, dispersed storage devices at the same time is very low. Since we have continuous monitoring of all of the stored equations, we could create additional equations immediately when one of them is missing, making it an auto-regeneration of lost data and a self-repairing storage system.
|
The likelihood of losing 4 independent, dispersed storage devices at the same time is very low. Since we have continuous monitoring of all of the stored equations, we could create additional equations immediately when one of them is missing, making it an auto-regeneration of lost data and a self-repairing storage system.
|
||||||
|
|
||||||
> The overhead in this example is 4 out of 20 which is a mere **20%** instead of **400%** .
|
> The overhead in this example is 4 out of 20 which is a mere **20%** instead of **400%** .
|
||||||
|
|
||||||
## Can be used for content delivery.
|
## Content Delivery
|
||||||
|
|
||||||
This system can be used as backend for content delivery networks.
|
This system can be used as backend for content delivery networks.
|
||||||
|
|
||||||
e.g. Content distribution Policy could be a 10/50 distribution which means, the content of a movie would be distributed over 60 locations from which we can loose 50 at the same time.
|
E.g. content distribution policy could be a 10/50 distribution which means, the content of a movie would be distributed over 60 locations from which we can lose 50 at the same time.
|
||||||
|
|
||||||
If someone now wants to download the data, the first 10 locations who answer fastest will provide enough of the data parts to allow the data to be rebuild.
|
If someone now wants to download the data, the first 10 locations to answer will provide enough of the data parts to rebuild the data.
|
||||||
|
|
||||||
The overhead here is more, compared to previous example, but stil order of magnitude lower compared to other cdn systems.
|
The overhead here is more, compared to previous example, but stil orders of magnitude lower compared to other CDN systems.
|
||||||
|
|
||||||
## The Quantum Safe Storage System is capable to avoid Datarot
|
## The Quantum Safe Storage System Can Avoid Datarot
|
||||||
|
|
||||||
Datarot is the fact that data storage degrades over time and becomes unreadable, on e.g. a harddisk.
|
Datarot is the fact that data storage degrades over time and becomes unreadable e.g. on a harddisk.
|
||||||
|
|
||||||
The storage system provided by ThreeFold intercepts this silent data corruption, making that it can pass by unnotified.
|
The storage system provided by ThreeFold intercepts this silent data corruption ensurinf that data does not rot.
|
||||||
|
|
||||||
> see also https://en.wikipedia.org/wiki/Data_degradation
|
> See also https://en.wikipedia.org/wiki/Data_degradation
|
||||||
|
|
||||||
|
@ -1,44 +1,42 @@
|
|||||||
|
|
||||||
|
|
||||||
i![](img/qsss_intro.png)
|
|
||||||
|
|
||||||
# Quantum Safe Filesystem
|
# Quantum Safe Filesystem
|
||||||
|
|
||||||
|
![](img/qsss_intro.png)
|
||||||
|
|
||||||
A redundant filesystem, can store PB's (millions of gigabytes) of information.
|
A redundant filesystem, can store PB's (millions of gigabytes) of information.
|
||||||
|
|
||||||
Unique features:
|
Unique features:
|
||||||
|
|
||||||
- Unlimited scalable (many petabytes) filesystem
|
- Unlimited scalability (many petabytes)
|
||||||
- Quantum Safe:
|
- Quantum Safe:
|
||||||
- On the TFGrid, no farmer knows what the data is about
|
- On the TFGrid no farmer knows what the data is
|
||||||
- Even a quantum computer cannot decrypt
|
- Even a quantum computer cannot decrypt the data
|
||||||
- Data can't be lost
|
- Data can't be lost
|
||||||
- Protection for datarot, data will autorepair
|
- Protection for datarot, data will autorepair
|
||||||
- Data is kept for ever (data does not get deleted)
|
- Data is kept forever (data does not get deleted)
|
||||||
- Data is dispersed over multiple sites
|
- Data is dispersed over multiple sites
|
||||||
- Sites can go down, data not lost
|
- Even if the sites go down the data will not be lost
|
||||||
- Up to 10x more efficient than storing on classic storage cloud systems
|
- Up to 10x more efficient than storing on classic storage cloud systems
|
||||||
- Can be mounted as filesystem on any OS or any deployment system (OSX, Linux, Windows, Docker, Kubernetes, TFGrid, ...)
|
- Can be mounted as filesystem on any OS or any deployment system (OSX, Linux, Windows, Docker, Kubernetes, TFGrid etc.)
|
||||||
- Compatible with ± all data workloads (not high performance data driven workloads like a database)
|
- Compatible with ± all data workloads (not high performance data driven workloads like a database)
|
||||||
- Self-healing: when a node or disk is lost, the storage system can get back to the original redundancy level
|
- Self-healing: when a node or disk is lost, the storage system can get back to the original redundancy level
|
||||||
- Helps with compliance to regulations like GDPR (as the hosting facility has no view on what is stored, information is encrypted and incomplete)
|
- Helps with compliance for regulations like GDPR (as the hosting facility has no view on what is stored: information is encrypted and incomplete)
|
||||||
- Hybrid: can be installed onsite, public, private, ...
|
- Hybrid: can be installed onsite, public and private
|
||||||
- Read-write caching on encoding node (the front end)
|
- Read-write caching on encoding node (the front end)
|
||||||
|
|
||||||
![](img/planet_fs.jpg)
|
![](img/planet_fs.jpg)
|
||||||
|
|
||||||
## Mount Any Files in your Storage Infrastructure
|
## Mount Any Files In Your Storage Infrastructure
|
||||||
|
|
||||||
The QSFS is a mechanism to mount any file system (in any format) on the grid, in a quantum-secure way.
|
The QSFS is a mechanism to mount any file system (in any format) on the grid, in a quantum secure way.
|
||||||
|
|
||||||
This storage layer relies on 3 primitives of the ThreeFold technology :
|
This storage layer relies on 3 primitives of the ThreeFold technology :
|
||||||
|
|
||||||
- [0-db](https://github.com/threefoldtech/0-db) is the storage engine.
|
- [0-db](https://github.com/threefoldtech/0-db) is the storage engine.
|
||||||
It is an always append database, which stores objects in an immutable format. It allows keeping the history out-of-the-box, good performance on disk, low overhead, easy data structure and easy backup (linear copy and immutable files).
|
It is an always append database, which stores objects in an immutable format. It allows history to be kept out-of-the-box, good performance on disk, low overhead, easy data structure and easy backup (linear copy and immutable files).
|
||||||
|
|
||||||
- [0-stor-v2](https://github.com/threefoldtech/0-stor_v2) is used to disperse the data into chunks by performing 'forward-looking error-correcting code' (FLECC) on it and send the fragments to safe locations.
|
- [0-stor-v2](https://github.com/threefoldtech/0-stor_v2) is used to disperse the data into chunks by performing 'forward-looking error-correcting code' (FLECC) on it and send the fragments to safe locations.
|
||||||
It takes files in any format as input, encrypts the file with AES based on a user-defined key, then FLECC-encodes the file and spreads out the result
|
It takes files in any format as input, encrypts the file with AES based on a user-defined key, then FLECC-encodes the file and spreads out the result
|
||||||
to multiple 0-DBs. The number of generated chunks is configurable to make it more or less robust against data loss through unavailable fragments. Even if some 0-DBs are unreachable, you can still retrieve the original data, and missing 0-DBs can even be rebuilt to have full consistency. It's an essential element of the operational backup.
|
to multiple 0-DBs. The number of generated chunks is configurable to make it more or less robust against data loss through unavailable fragments. Even if some 0-DBs are unreachable, you can still retrieve the original data, and missing 0-DBs can even be rebuilt to have full consistency. It is an essential element of the operational backup.
|
||||||
|
|
||||||
- [0-db-fs](https://github.com/threefoldtech/0-db-fs) is the filesystem driver which uses 0-DB as a primary storage engine. It manages the storage of directories and metadata in a dedicated namespace and file payloads in another dedicated namespace.
|
- [0-db-fs](https://github.com/threefoldtech/0-db-fs) is the filesystem driver which uses 0-DB as a primary storage engine. It manages the storage of directories and metadata in a dedicated namespace and file payloads in another dedicated namespace.
|
||||||
|
|
||||||
@ -51,7 +49,6 @@ This concept scales forever, and you can bring any file system on top of it:
|
|||||||
- any backup system
|
- any backup system
|
||||||
- an ftp-server
|
- an ftp-server
|
||||||
- IPFS and Hypercore distributed file sharing protocols
|
- IPFS and Hypercore distributed file sharing protocols
|
||||||
- ...
|
|
||||||
|
|
||||||
![](img/quantum_safe_storage_scale.jpg)
|
![](img/quantum_safe_storage_scale.jpg)
|
||||||
|
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
|
|
||||||
# Zero Knowledge Proof Storage system.
|
# Zero Knowledge Proof Storage System
|
||||||
|
|
||||||
The quantum save storage system is zero knowledge proof compliant. The storage system is made up / split into 2 components: The actual storage devices use to store the data (ZDB's) and the Quantum Safe Storage engine.
|
The Quantum Safe Storage System is zero knowledge proof compliant. The storage system is made up of / split into 2 components: the actual storage devices use to store the data (ZDB's) and the Quantum Safe Storage engine.
|
||||||
|
|
||||||
|
|
||||||
![](img/qss_system.jpg)
|
![](img/qss_system.jpg)
|
||||||
|
|
||||||
The zero proof knowledge compliancy comes from the fact the all the physical storage nodes (tf_nodes) can proof that they store a valid part of what data the quantum safe storage engine (QSSE) has stored on multiple independent devices. The QSSE can validate that all the QSSE storage devices have a valid part of the original information. The storage devices however have no idea what the original stored data is as they only have a part (description) of the origina data and have no access to the original data part or the complete origal data objects.
|
The zero proof knowledge compliancy comes from the fact that all of the physical storage nodes (TFnodes) can prove that they store a valid part of the data that the quantum safe storage engine (QSSE) has stored on multiple independent devices. The QSSE can validate that all of the QSSE storage devices have a valid part of the original information. The storage devices however have no idea what the original stored data is as they only have a part (description) of the original data and have no access to the original data part or the complete original data objects.
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,10 +1,10 @@
|
|||||||
<!-- ![](img/qsss_intro_.jpg) -->
|
<!-- ![](img/qsss_intro_.jpg) -->
|
||||||
|
|
||||||
i![](img/qsss_intro.png)
|
|
||||||
|
|
||||||
# Quantum Safe Storage System
|
# Quantum Safe Storage System
|
||||||
|
|
||||||
Our storage architecture follows the true peer2peer design of the TF grid. Any participating node only stores small incomplete parts of objects (files, photos, movies, databases...) by offering a slice of the present (local) storage devices. Managing the storage and retrieval of all of these distributed fragments is done by a software that creates development or end-user interfaces for this storage algorithm. We call this '**dispersed storage**'.
|
i![](img/qsss_intro.png)
|
||||||
|
|
||||||
|
Our storage architecture follows the true peer2peer design of the TF grid. Any participating node only stores small incomplete parts of objects (files, photos, movies, databases etc.) by offering a slice of the present (local) storage devices. Managing the storage and retrieval of all of these distributed fragments is done by a software that creates development or end-user interfaces for this storage algorithm. We call this '**dispersed storage**'.
|
||||||
|
|
||||||
![](img/qsss_intro_0_.jpg)
|
![](img/qsss_intro_0_.jpg)
|
||||||
|
|
||||||
|
@ -1,14 +1,15 @@
|
|||||||
# S3 Service
|
# S3 Service
|
||||||
|
|
||||||
If you like an S3 interface you can deploy this on top of our eVDC, it works very well together with our [quantumsafe_filesystem](qss_filesystem.md).
|
If you like an S3 interface you can deploy this on top of our eVDC, it works very well together with our [Quantum Safe File System](qss_filesystem.md).
|
||||||
|
|
||||||
A good opensource solution delivering an S3 solution is [min.io](https://min.io/).
|
A good opensource solution delivering an S3 solution is [min.io](https://min.io/).
|
||||||
|
|
||||||
Thanks to our quantum safe storage layer, you could build fast, robust and reliable storage and archiving solutions.
|
Thanks to our Quantum Safe Storage Layer, you can build fast, robust and reliable storage and archiving solutions.
|
||||||
|
|
||||||
A typical setup would look like:
|
A typical setup would look like this:
|
||||||
|
|
||||||
![](img/storage_architecture_1.jpg)
|
![](img/storage_architecture_1.jpg)
|
||||||
|
|
||||||
To deploy MinIO using Helm 3, you can consult [this guide](https://forum.threefold.io/t/minio-operator-with-helm-3/4294).
|
|
||||||
|
<!-- TODO: link to manual on cloud how to deploy minio, using helm (3.0 release) -->
|
||||||
|
|
||||||
|
@ -2,7 +2,9 @@
|
|||||||
|
|
||||||
![](img/iac_overview.jpg)
|
![](img/iac_overview.jpg)
|
||||||
|
|
||||||
IAC = DevOps is a process framework that ensures collaboration between Development and Operations Team to deploy code to production environment faster in a repeatable and automated way. ... In simple terms, DevOps can be defined as an alignment between development and IT operations with better communication and collaboration.
|
IAC = DevOps is a process framework that ensures collaboration between Development and Operations Team to deploy code to production environment faster in a repeatable and automated way.
|
||||||
|
|
||||||
|
In simple terms, DevOps can be defined as an alignment between development and IT operations with better communication and collaboration.
|
||||||
|
|
||||||
![](img/smartcontract_iac.png)
|
![](img/smartcontract_iac.png)
|
||||||
|
|
||||||
|
@ -4,20 +4,20 @@
|
|||||||
|
|
||||||
ThreeFold has developed a highly efficient infrastructure layer for a new internet.
|
ThreeFold has developed a highly efficient infrastructure layer for a new internet.
|
||||||
|
|
||||||
Providing Internet & Cloud Capacity is as easy as buying or building a node and connecting it to the internet.
|
Providing Internet & Cloud capacity is as easy as buying or building a node and connecting it to the internet.
|
||||||
|
|
||||||
![](3node_simple.png)
|
![](3node_simple.png)
|
||||||
|
|
||||||
A lot of capacity has been deployed in the world, ThreeFold farmers buy a computer and they connect it to the internet, as such they use our Operating system to provide Internet capacity to the world.
|
A lot of capacity has been deployed in the world, ThreeFold farmers buy a computer and they connect it to the internet, as such they use our operating system to provide Internet capacity to the world.
|
||||||
|
|
||||||
|
|
||||||
There are multiple ways how people can interactive without our platform (as developer or IT expert = sysadmin):
|
There are multiple ways in which people can interact with our platform (as a developer or IT an expert: sysadmin):
|
||||||
|
|
||||||
![](img/architecture_usage.png)
|
![](img/architecture_usage.png)
|
||||||
|
|
||||||
All technology is developed by ThreeFold and is opensource, this technology is being used for the ThreeFold grid see https://www.threefold.io which is a deployment of a new internet which is green, safe and owned by all of us.
|
All technology is developed by ThreeFold and is opensource, this technology is being used for the ThreeFold grid (see https://www.threefold.io) which is the deployment of a new internet which is green, safe and owned by all of us.
|
||||||
|
|
||||||
This document explains how we are a missing layer for the full web2, web3 and blockchain world.
|
This document explains how ThreeFold is the missing layer for the full web2, web3 and blockchain world.
|
||||||
|
|
||||||
This leads to a system which is highly scalable.
|
This leads to a system which is highly scalable.
|
||||||
|
|
||||||
|
@ -1,38 +1,38 @@
|
|||||||
![](img/zos22.png)
|
|
||||||
|
|
||||||
# Zero-OS
|
# Zero-OS
|
||||||
|
|
||||||
|
![](img/zos22.png)
|
||||||
|
|
||||||
![](img/zero_os_overview.jpg)
|
![](img/zero_os_overview.jpg)
|
||||||
|
|
||||||
## ZOS compute storage overview
|
## ZOS Compute & Storage Overview
|
||||||
|
|
||||||
![](img/zos_overview_compute_storage.jpg)
|
![](img/zos_overview_compute_storage.jpg)
|
||||||
|
|
||||||
## ZOS network overview
|
## ZOS Network Overview
|
||||||
|
|
||||||
![](img/zos_network_overview.jpg)
|
![](img/zos_network_overview.jpg)
|
||||||
|
|
||||||
|
|
||||||
### Imagine an operating system with the following benefits
|
### Imagine An Operating System With The Following Benefits
|
||||||
|
|
||||||
- upto 10x more efficient for certain workloads (e.g. storage)
|
- Up to 10x more efficient for certain workloads (e.g. storage)
|
||||||
- no install required
|
- No install required
|
||||||
- all files are deduped for the VM's, containers and the ZOS itself, no more data duplicated filesystems
|
- All files are deduped for the VM's, containers and the ZOS itself, no more data duplicated filesystems
|
||||||
- the hacking footprint is super small, which leads to much safer systems
|
- The hacking footprint is very small which leads to much safer systems
|
||||||
- every file is fingerprinted and gets checked at launch time of an application
|
- Every file is fingerprinted and gets checked at launch time of an application
|
||||||
- there is no shell or server interface on the operating system
|
- There is no shell or server interface on the operating system
|
||||||
- the networks are end2end encrypted between all Nodes
|
- The networks are end2end encrypted between all Nodes
|
||||||
- there is the possibility to completely disconnect the compute/storage from the network service part which means hackers have a lot less chance to get to the data
|
- It is possible to completely disconnect the compute/storage from the network service part which means hackers have a lot less chance to access the data
|
||||||
- a smart contract for IT layer allows groups of people to deploy IT workloads with concensus and full control
|
- A smart contract for the IT layer allows groups of people to deploy IT workloads with consensus and full control
|
||||||
- all workloads which can run on linux can run on Zero-OS but in a much more controlled, private and safe way
|
- All workloads which can run on linux can run on Zero-OS but in a much more controlled, private and safe way
|
||||||
|
|
||||||
> ThreeFold has created an operating system from scratch, we used the Linux kernel and its components and then build further on it, we have been able to achieve all the above benefits.
|
> ThreeFold has created an operating system from scratch. We used the Linux kernel and its components and then built further on it. We have been able to achieve all of the above benefits.
|
||||||
|
|
||||||
## The requirements for our TFGrid based on Zero OS are:
|
## The Requirements For Our TFGrid Based On Zero OS Are:
|
||||||
|
|
||||||
- **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators
|
- **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators.
|
||||||
- **Simplicity**: An operating system should be simple, able to exist anywhere, for anyone, and be good for the planet
|
- **Simplicity**: An operating system should be simple, able to exist anywhere for anyone, and be good for the planet.
|
||||||
- **Stateless**: In a grid (peer2peer) set up, the sum of the components is providing a stable basis for single elements to fail and not bring the whole system down. Therefore, it is necessary for single elements to be stateless, and the state needs to be stored within the grid.
|
- **Stateless**: In a grid (peer-to-peer) set up, the sum of the components provides a stable basis for single elements to fail and not bring the whole system down. Therefore, it is necessary for single elements to be stateless, and the state needs to be stored within the grid.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -6,20 +6,20 @@ ThreeFold aims to be a decentralized organization.
|
|||||||
|
|
||||||
## TF Farmers
|
## TF Farmers
|
||||||
|
|
||||||
- connect computers to our new internet
|
- Connect computers to our new Internet
|
||||||
- means provide GPU, Storage and Compute capacity and make it available over Mycelium to all participants
|
- This means that we provide network, storage and compute (CPU, GPU) capacity and make it available over Mycelium to all participants
|
||||||
- more than 1000 farmers today host TF nodes and provide capacity.
|
- More than 1000 farmers today host TF nodes and provide capacity.
|
||||||
- rewards from 3.14+
|
- Rewards from 3.14+
|
||||||
- Farmers earn TFT by providing capacity.
|
- Farmers earn TFT by providing capacity.
|
||||||
- Farmers can earn 50% on the sold capacity if they register with the marketplace of the TF Cooperative
|
- Farmers can earn 50% on the sold capacity if they register with the marketplace of the TF Cooperative
|
||||||
- farmers will have to do KYC starting Q2 2024
|
- Farmers will have to do KYC starting Q2 2024
|
||||||
- see [farming rewards for more info](farming_reward.md)
|
- See [Farming Rewards](farming_reward.md) for more info
|
||||||
|
|
||||||
## Network Bridgers (Provider)
|
## Network Bridgers (Provider)
|
||||||
|
|
||||||
- make bridge between old and new internet
|
- Make bridge between old and new internet
|
||||||
- provide bandwidth to TFGrid
|
- Provide bandwidth to TFGrid
|
||||||
- todo: formalize manual and description how to become a Network Bridger
|
- Todo: formalize manual and description how to become a Network Bridger
|
||||||
|
|
||||||
## TF Farming Pools (NEW Q2 2024)
|
## TF Farming Pools (NEW Q2 2024)
|
||||||
|
|
||||||
@ -29,38 +29,38 @@ ThreeFold aims to be a decentralized organization.
|
|||||||
|
|
||||||
The aim is to improve the service level and uptime of farming on TFGrid:
|
The aim is to improve the service level and uptime of farming on TFGrid:
|
||||||
|
|
||||||
- activities
|
- Activities
|
||||||
- deliver a service level to the community
|
- Deliver a service level to the community
|
||||||
- support for the TF Nodes (replace nodes, make sure power is ok)
|
- Support for the TF Nodes (replace nodes, make sure power is ok)
|
||||||
- bandwidth providing for TF Nodes (connect network nodes to high speed internet networks)
|
- Bandwidth providing for TF Nodes (connect network nodes to high speed internet networks)
|
||||||
- manage the pricing in line to uptime, performance, ... of farms
|
- Manage the pricing in line to uptime, performance, etc. for all farms and nodes
|
||||||
- optional: sell of TF Nodes
|
- Optional: sell of TF Nodes
|
||||||
- business model
|
- Business model
|
||||||
- the Farming Pool collects all farming rewards for all the Nodes and redistribute the farming rewards minus a margin for the farming pool.
|
- The Farming Pool collects all farming rewards for all the Nodes and redistribute the farming rewards minus a margin for the farming pool.
|
||||||
- there needs to be a contract (terms and conditions) between the farming pool and the farmers
|
- There needs to be a contract (terms and conditions) between the farming pool and the farmers
|
||||||
- service level
|
- service level
|
||||||
- a service level needs to be defined and exposed to the rest of the world
|
- A service level needs to be defined and exposed to the rest of the world
|
||||||
- the T&C contracts can be arrange in OurWorld Digital Freezone if applicable.
|
- The T&C contracts can be arrange in OurWorld Digital Freezone if applicable.
|
||||||
- TF Dubai is **granting** the required tooling & information for this service.
|
- TF Dubai is **granting** the required tooling & information for this service.
|
||||||
|
|
||||||
|
|
||||||
## TFNode Suppliers
|
## TFNode Suppliers
|
||||||
|
|
||||||
- Build & Sell TFNode's to our participants.
|
- Build & Sell TFNodes to our participants
|
||||||
- Minimal service/support needs to be delivered
|
- Minimal service/support needs to be delivered
|
||||||
- Often part of Farming Pools or related to it
|
- Often part of Farming Pools or related to it
|
||||||
|
|
||||||
## TF Cooperative
|
## TF Cooperative
|
||||||
|
|
||||||
- our governance layer (DAO tooling can be extended)
|
- Our governance layer (DAO tooling can be extended)
|
||||||
- Cooperative we are all part off.
|
- Cooperative we are all part off.
|
||||||
- The Coop directors build an organization to streamline our expansion
|
- The Coop directors build an organization to streamline our expansion
|
||||||
- Give everyone a voice and env to operate from
|
- Give everyone a voice and env to operate from
|
||||||
|
|
||||||
Details:
|
### Details
|
||||||
|
|
||||||
- [TF Coop](tfcoop_intro.md) is a cooperative with as goal to streamline how the ecosystem works together to create their own digital future.
|
- [TF Coop](tfcoop_intro.md) is a cooperative with as goal to streamline how the ecosystem works together to create their own digital future.
|
||||||
- TF Coop needs 9 directors to get started, see the forum for more info soon.
|
- TF Coop needs 9 directors to get started. See the forum for more info soon.
|
||||||
- TF Coop gets income from utilization and possibly from its members in the future.
|
- TF Coop gets income from utilization and possibly from its members in the future.
|
||||||
- Every user of the TFGrid in the future will have to be a member.
|
- Every user of the TFGrid in the future will have to be a member.
|
||||||
|
|
||||||
@ -71,10 +71,10 @@ Details:
|
|||||||
- Provide governance
|
- Provide governance
|
||||||
- Keep all relevant services up and running to allow the TFGrid to function
|
- Keep all relevant services up and running to allow the TFGrid to function
|
||||||
|
|
||||||
- guardians run a TF Validator which has all components as are required to let the TFGrid decentralized components function
|
- Guardians run a TF Validator which has all components as are required to let the TFGrid decentralized components function
|
||||||
- we need 9 guardians, each [guardian](guardians.md) has to be technical capable to run this full tech stack
|
- We need 9 guardians, each [guardian](guardians.md) has to be technical capable to run this full tech stack
|
||||||
- [more info see here](validators.md)
|
- [Read more on validators](validators.md)
|
||||||
- TF Guardians don't vote they run super important infrastructure and need to validate the soundness of the tech used.
|
- TF Guardians don't vote: they run super important infrastructure and need to validate the soundness of the tech used
|
||||||
|
|
||||||
## TF Dubai
|
## TF Dubai
|
||||||
|
|
||||||
@ -108,15 +108,15 @@ Details:
|
|||||||
|
|
||||||
### Technology providers
|
### Technology providers
|
||||||
|
|
||||||
- create opensource technology as can be used in the TFGrid
|
- Create opensource technology as can be used in the TFGrid
|
||||||
- grants might be available to reward Technology Providers
|
- Grants might be available to reward Technology Providers
|
||||||
- TFTech (will get new name) is example of Technology Provider
|
- TFTech (will get new name) is example of Technology Provider
|
||||||
|
|
||||||
### DePIN Partners
|
### DePIN Partners
|
||||||
|
|
||||||
- project are looking for a party (company, project, community) who wants to launch us into the DePIN world
|
- Projects are looking for a party (company, project, community) who wants to launch us into the DePIN world
|
||||||
- promote our project, explain tokens, integrate with exchanges
|
- Promote our project, explain tokens, integrate with exchanges
|
||||||
- integrate with rest of DePIN ecosystem
|
- Integrate with rest of DePIN ecosystem
|
||||||
- organize community growth
|
- Organize community growth
|
||||||
- organize grants towards rest of community
|
- Organize grants towards rest of community
|
||||||
- basically grown value for full ecosystem and let it "FLOW"
|
- Basically grown value for full ecosystem and let it "FLOW"
|
||||||
|
@ -4,32 +4,31 @@
|
|||||||
|
|
||||||
GEP stands for Grid Enhancement Proposal.
|
GEP stands for Grid Enhancement Proposal.
|
||||||
|
|
||||||
A GEP is a document (can be on forum) providing information to the ThreeFold community, or describing a new feature for the TFGrid or its processes or any other change as is managed by the TF DAO.
|
A GEP is a document (can be on the forum) providing information to the ThreeFold community, describing a new feature or processes for the TFGrid and any other change that is managed by the TF DAO.
|
||||||
|
|
||||||
|
|
||||||
## Requirements before a GEP can be voted
|
## Requirements Before A GEP Can Be Voted
|
||||||
|
|
||||||
- The why and how needs to be well enough defined and specified
|
- The why and how needs to be well enough defined and specified
|
||||||
- The GEP always needs to be in line with planet/people first values
|
- The GEP always needs to be in line with the values planet first and people first
|
||||||
- There needs to be a forum post linked to it which gave people the time to discuss the GEP
|
- There needs to be a forum post linked to it which gaves the community time to discuss the GEP
|
||||||
- The GEP should provide a concise technical specification of the feature and a rationale for the feature if relevant.
|
- The GEP should provide a concise technical specification of the new feature and a rationale for the feature if relevant
|
||||||
|
|
||||||
## Process
|
## Process
|
||||||
|
|
||||||
- A GEP gets registered in TFChain.
|
- A GEP gets registered in the TFChain
|
||||||
- Community has to approve a GEP
|
- The community has to approve the GEP
|
||||||
- Guardians can block a GEP and ask for a re-vote and explain why re-vote is needed
|
- Guardians can block a GEP and ask for a re-vote and explain why the re-vote is needed. For example if:
|
||||||
- e.g. if mistake in process would have been made
|
- A mistake in the process would have been made
|
||||||
- e.g. if something would happen which puts any of the entities related to TF in danger, e.g. not in line with T&C (legally)
|
- Something would happen which puts any of the entities related to TF in danger, e.g. not in line with T&C (legally)
|
||||||
- e.g. if values are not followed (planet/people first)
|
- Values are not followed (planet/people first)
|
||||||
- e.g. if a change violates our security (e.g. introduction of non opensource in our TF Stack)
|
- A change violates our security (e.g. introduction of non opensource in our TF Stack)
|
||||||
- e.g. if a change has potential to damage someone in our community
|
- A change has the potential to damage someone in our community
|
||||||
- Guardians and or TFCoop Team will implement
|
- Guardians and/or the TFCoop team will then implement the GEP
|
||||||
|
|
||||||
## Voting Power
|
## Voting Power
|
||||||
|
|
||||||
- 1 TFT, 1 Vote (NEW for TFGrid 3.14 and still needs to be voted by a GEP at March 21 2024)
|
- 1 TFT = 1 Vote (NEW for TFGrid 3.14 and still needs to be voted by a GEP on March 21st 2024)
|
||||||
|
|
||||||
|
*Some inspiration comes from https://www.python.org/dev/peps/pep-0001*
|
||||||
*some inspiration comes from https://www.python.org/dev/peps/pep-0001*
|
|
||||||
|
|
||||||
|
101
collections/tfgrid3/governance/gep_comm_brainstorm.md
Normal file
101
collections/tfgrid3/governance/gep_comm_brainstorm.md
Normal file
@ -0,0 +1,101 @@
|
|||||||
|
<h1> Community Brainstorming for 3.14 Grid </h1>
|
||||||
|
|
||||||
|
<h2>Table of Contents</h2>
|
||||||
|
|
||||||
|
- [Introduction](#introduction)
|
||||||
|
- [Proposition Overview](#proposition-overview)
|
||||||
|
- [Proposition Details](#proposition-details)
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Introduction
|
||||||
|
|
||||||
|
|
||||||
|
This proposition takes inputs from different members of the TF Community. It's a brainstorming exercise in a way. It's not a TF official position, just a thought experiment.
|
||||||
|
|
||||||
|
Without thinking about technical difficulties, I try to envision an overall resilient TF ecosystem that answers the demands and needs of the community.
|
||||||
|
|
||||||
|
## Proposition Overview
|
||||||
|
|
||||||
|
In brief, the TF overview would be as follows:
|
||||||
|
|
||||||
|
1. A maximum supply of 1 billion TFT
|
||||||
|
2. Evenly distributed farming rewards throughout the minting period
|
||||||
|
3. Users discounts for mass deployments
|
||||||
|
4. Farming staking vault and farming collateral
|
||||||
|
5. Public staking vault (user staking)
|
||||||
|
6. DAO revenues (staking vault revenues) distributed to DAO voters
|
||||||
|
7. Slashing events for nodes (with bountry programs for users)
|
||||||
|
8. Collateral info displayed on dashboard with alerts when nodes' collateral are being unstaked
|
||||||
|
9. Communication channels for TF, the users and the farmers
|
||||||
|
10. System for farmers to announce maintenance window without loss of reputation or the like
|
||||||
|
11. Increase in the farming difficulty level for new nodes
|
||||||
|
12. 50% utilization revenues to farmers
|
||||||
|
13. Node uptime score and hardware information on Dashboard
|
||||||
|
14. Adjust grid deployment costs to fit with resources
|
||||||
|
15. Part of node additional fees goes to the TF Foundation for grant, R&D, etc.
|
||||||
|
16. Ensure a proper utilization/capacity ratio (perhaps per region/country? TBD)
|
||||||
|
|
||||||
|
## Proposition Details
|
||||||
|
|
||||||
|
Here are the details of this proposition:
|
||||||
|
|
||||||
|
1. 1 billion TFT maximum supply
|
||||||
|
1. Farming rewards (POC) distribution update:
|
||||||
|
1. Earliest registered nodes paid the earliest, in batches: E.g. we have 4 minting distribution per month, and nodes are categorized in the 4 batches based on the moment they registered on chain, nodes registered the earliest (not in the minting cycle, but in absolute time), are in the first batch, etc. Can be done manually first, and automated in mid/long-term.
|
||||||
|
1. Users discounts on mass deployment
|
||||||
|
1. If you have say 1000 deployments you can have a 10% discount. Real numbers TBD. This could further attract mass utilization by resellers.
|
||||||
|
1. Farming TFT Staking Vault & Farming Collateral
|
||||||
|
1. The equivalent of X months (TBD, propositions so far: between 2 and 6 months) of farming per node is kept as collateral in a farmed TFT staking vault.
|
||||||
|
2. Any TFT more than X-month worth of farming per node is available to unstake given a 5 days cooldown period
|
||||||
|
3. TFT in farmed TFT staking vault with the min X-months of farming collateral are eligible to vote for the DAO
|
||||||
|
4. TFT farmed in TFT staking vault have 1.2 DAO voting power per TFT
|
||||||
|
5. A farmer can unstake all TFT (with the 2-month collateral) given a cooldown period of 10 days.
|
||||||
|
1. Once they removed all collateral
|
||||||
|
1. They do not farm any more POC rewards. They can still farm POU rewards.
|
||||||
|
2. They cannot vote on the DAO, i.e. TFT is removed from the farming TFT staking vault.
|
||||||
|
6. If a farmer unstake TFT in a farmed TFT staking vault, the only way to stake it is to put the TFT in a public TFT vault (see below)
|
||||||
|
1. This means that farmed TFT staking vault contains TFT that has been minted and then used for TF DAO process only!
|
||||||
|
1. Public TFT Staking Vault
|
||||||
|
1. Anyone can stake TFT in a public TFT staking vault
|
||||||
|
1. TFT staked in this vault for more than 20 days before a new GEP can vote for this GEP
|
||||||
|
2. TFT staked in a public vault have 1.0 DAO voting power per TFT.
|
||||||
|
3. Unstaking has a 10 days cooldown period.
|
||||||
|
1. DAO Revenues: Farming + Public Staking Vault Revenues
|
||||||
|
1. A % of POU revenues go to the vault wallet (e.g. 10%)
|
||||||
|
2. Vault revenues are distributed to the DAO voters after each complete quarter (e.g. 4 times per year)
|
||||||
|
1. Slashing
|
||||||
|
1. The farming collateral can be slashed if a workload is destroyed during utilization.
|
||||||
|
1. This has an added bonus of ensuring new nodes are serious about providing capacity and creating another utility for token.
|
||||||
|
2. Bounty Hunting program for Slashing Events (bad nodes):
|
||||||
|
1. There is a slash event and a bountry reward to the user when a user finds a node that
|
||||||
|
1. can’t accept a deployment
|
||||||
|
2. doesn't have a public ip when listed that they do
|
||||||
|
3. destroys the deployment during utilization
|
||||||
|
4. Etc. (Todo: build list of slashable events)
|
||||||
|
2. The Dashboard should show which nodes have their min collateral quantity. And alerts should be sent to users when the nodes they are using get the collateral unstaked (e.g. for slashing events or simply the farmers removing the collateral amount)
|
||||||
|
3. Communication Channel: Farmers and Users Contact Info
|
||||||
|
1. There must be efficient communication channels between farmers and users for maintenance and service reasons.
|
||||||
|
1. Farmers should have users info (e.g. email) to be able to send maintenance notifications, etc.
|
||||||
|
2. Users/TFGrid should be able to contact farmers (email and telephone)
|
||||||
|
4. System for farmers to announce maintenance window without loss of reputation or the like
|
||||||
|
1. A mechanism where farmers could go through an announcement procedure, that downtime is expected on a node/farm due to maintenance or upgrade, without loosing any reputation or rewards
|
||||||
|
5. Farming difficulty and Proof-of-capacity: farmers get POC rewards based on 0.08 farming registration price (farming difficulty level)
|
||||||
|
1. We increase the farming difficulty for newly registered nodes when demanded by the DAO
|
||||||
|
2. As a first step, we increase difficulty level to 0.10 USD (25% increase in farming difficulty)
|
||||||
|
3. As TFT utilization grows, its price should increase and the DAO should naturally vote to increase the farming difficulty level.
|
||||||
|
6. Proof-of-utilization: farmers get 50% of POU rewards
|
||||||
|
7. Node uptime score and hardware information on Dashboard
|
||||||
|
1. Add an uptime score on the Dashboard so users can see which nodes are the most online
|
||||||
|
1. High-availability nodes would come first in the search.
|
||||||
|
2. Add the maximum info on the node hardware for users to choose as they see fit
|
||||||
|
8. Revised grid deployment costs parameters in accordance with the market and best practice for TF and high access for users
|
||||||
|
9. Part of Farming additional fees to TF Foundation
|
||||||
|
1. Currently, 100% goes to the farmer. A certain % (e.g. 10%) could be diverted to the TF Foundation for R&D, grant programs, etc.
|
||||||
|
10. Ensure a proper utilization/capacity ratio (perhaps per region/country? TBD)
|
||||||
|
1. Regulate the creation of new nodes when there is a lot of empty capacity
|
||||||
|
2. This could be per country or region to avoid a scenario where overall capacity outgrows utilization, but in one country capacity is needed (e.g. there's a lot of demand locally)
|
||||||
|
3. This needs to be further discussed
|
||||||
|
4. Example: New nodes under 33% of utilization per country can only farm POU, but not POC.
|
||||||
|
|
||||||
|
Note: This is based on community feedback over many discussions. Ideally, we can integrate those points here with the ongoing 3.14 plan as shared by Kristof at the top of this page. [Link to 3.14 ebook](https://threefold.info/tfgrid3/tfgrid3/intro.html)
|
@ -1,8 +1,7 @@
|
|||||||
![alt text](governance.png)
|
![alt text](governance.png)
|
||||||
|
|
||||||
# Governance
|
# Governance
|
||||||
|
Community governance is important to us. TF DMCC is working to outsource the operations and promotion of the TF Grid with a community-led / cooperative approach. To achieve this, we are releasing a series of Grid Enhancement Proposals (GEPs), searching for a group of Guardians, and establishing the ThreeFold Cooperative.
|
||||||
Governance is important to us, there is a wish from TF DMCC to outsource the operations and promotion to a cooperative and the community for which we suggest a combination of GEP, Guardians and a Cooperative
|
|
||||||
|
|
||||||
## Planned for 3.14 (our next release)
|
## Planned for 3.14 (our next release)
|
||||||
|
|
||||||
@ -12,5 +11,9 @@ Governance is important to us, there is a wish from TF DMCC to outsource the ope
|
|||||||
|
|
||||||
## Treasury
|
## Treasury
|
||||||
|
|
||||||
|
<<<<<<< HEAD
|
||||||
This section needs to be filled in by the team.
|
This section needs to be filled in by the team.
|
||||||
|
|
||||||
|
=======
|
||||||
|
This section needs to be filled in by the team.
|
||||||
|
>>>>>>> main_commsteam
|
||||||
|
@ -5,25 +5,24 @@
|
|||||||
|
|
||||||
TFGrid 3.13 requires 9 guardians to start with.
|
TFGrid 3.13 requires 9 guardians to start with.
|
||||||
|
|
||||||
Requirements
|
Requirements:
|
||||||
|
|
||||||
* Good knowledge how to use Linux to allow you to deploy
|
* Good knowledge of how to use Linux to be able to deploy and upgrade your validator starting from code
|
||||||
and upgrade your validator starting from code.
|
* At least 4 hours of time available per week (this will be more at start)
|
||||||
* At least 4h time available per week (will be more at start)
|
* Willingness to participate in the TF forum and coordinate with coders or TF9 who is the main contributor of code
|
||||||
* Willingness to participate in the forum of TF and coordinate with Coders or TFTech who is main contributor of code.
|
* You are aligned with our values of planet and people first
|
||||||
* You feel aligned with our values of planet and people first
|
* Willingness to look at open issues on Gittea (our work tool) at least 5 times a week (there are chat and email notification) unless it is during the holiday period
|
||||||
* Willingness to look at open issues at least 5 times a week (there is chat and email notification) unless during the holiday period.
|
* Choose a backup who can help you when needed (e.g. when sick or on holidays)
|
||||||
* Choose a backup which can help you when needed (sick, holidays, …).
|
* Complete your application on our forum (fill in your motivation and profile)
|
||||||
* Complete your candidacy on our forum on … Fill in the motivation, your profile, …
|
* Get at least 3 people from the community to endorse your skills and motivation
|
||||||
* Get at least 3 people from the community to endorse your skills and motivation.
|
|
||||||
|
|
||||||
What do you get in return
|
What you will get in return:
|
||||||
|
|
||||||
* Eternal recognition from your Regional Internet community (-:
|
* Eternal recognition from your Regional Internet community (-:
|
||||||
* TBDk USD per month in TFT as provided by the *TFCOOP
|
* TBDk USD per month in TFT as provided by the *TFCOOP
|
||||||
* The TFT will come from the *TFCOOP Treasury
|
* The TFT will come from the *TFCOOP Treasury
|
||||||
|
|
||||||
## They will host a validator
|
## Guardians will host a validator
|
||||||
|
|
||||||
- see [validator](validator.md)
|
See documentation on [validators](validator.md) for more information.
|
||||||
|
|
||||||
|
@ -2,11 +2,11 @@
|
|||||||
|
|
||||||
# ThreeFold Cooperative
|
# ThreeFold Cooperative
|
||||||
|
|
||||||
ThreeFold Dubai would like to hand over the day2day operation of the TFGrid to a cooperative.
|
ThreeFold Dubai would like to hand over the day to day operation of the TFGrid to a cooperative.
|
||||||
|
|
||||||
- Cooperative are very trustworthy decentralized structures which allow upto millions of people to be part of a common goal.
|
- Cooperatives are trustworthy decentralized structures which allow millions of people to be part of a common goal
|
||||||
- Cooperative members vote for their directors which might be the Cooperative Founders
|
- Cooperative members vote for their directors
|
||||||
- Untill this is done we keep on operating from ThreeFold DMCC
|
- Until this is done we will continue to operate from ThreeFold DMCC
|
||||||
|
|
||||||
## Cooperative Founder
|
## Cooperative Founder
|
||||||
|
|
||||||
@ -14,36 +14,37 @@ TF Dubai is looking for 9 ThreeFold Cooperative Founders to setup the COOP Struc
|
|||||||
|
|
||||||
## Cooperative Director
|
## Cooperative Director
|
||||||
|
|
||||||
Are voted by the members, but at start are the same as the 9 Founders.
|
The cooperative directors are chosen by the members by vote. When the coop is first created the 9 founders will act as de facto directors until the first vote.
|
||||||
|
|
||||||
They are like the board of a Cooperative and need to structure how the Cooperative Members will vote and be part of the governance.
|
The directors are like the board of a cooperative and help to structure how the cooperative members will vote and be part of the governance.
|
||||||
The Cooperative will have a team which will do the day2day for the TFGrid.
|
|
||||||
|
|
||||||
The Cooperative is funded by utilization of the grid (40% at start).
|
The cooperative will have a team which will carry out the day to day operations for the TFGrid.
|
||||||
|
|
||||||
Cooperative Directors and the team are renumerated for their contributions.
|
The cooperative is funded by the utilization of the grid (40% at start).
|
||||||
|
|
||||||
## Cooperative Startup
|
Cooperative Directors and the team are remunerated for their contributions.
|
||||||
|
|
||||||
|
## Starting The Cooperative
|
||||||
|
|
||||||
- ThreeFold Dubai grants 2 million TFT to TF COOP (TF DMCC and others can grant more)
|
- ThreeFold Dubai grants 2 million TFT to TF COOP (TF DMCC and others can grant more)
|
||||||
- TFCoop Founders will look for initial funding (sell the TFT, look for extra)
|
- TFCoop founders will look for initial funding (sell the TFT, look for extra)
|
||||||
- TFCoop Founders will setup the cooperative in chosen jurisdiction (might be NL)
|
- TFCoop founders will setup the cooperative in chosen jurisdiction (might be NL)
|
||||||
- TFCoop Founders will work with TFTech for technical implementation of membership (as NFT), ...
|
- TFCoop founders will work with TF9 for the technical implementation of membership (as NFT etc.)
|
||||||
|
|
||||||
## Link to TFGrid DAO
|
## Link to TFGrid DAO
|
||||||
|
|
||||||
> [The DAO on the TFGrid](tfdao.md) stays intact as is working today.
|
> [The DAO on the TFGrid](tfdao.md) will stay intact as is working today.
|
||||||
|
|
||||||
## TFCoop Functions
|
## TFCoop Functions
|
||||||
|
|
||||||
- Promotion & Communication
|
- Promotion and communication
|
||||||
- Operate the TFGrid Marketplace ( which is regulated marketplace selling/buying capacity on TFGrid)
|
- Operate the TFGrid Marketplace (a regulated marketplace where selling and buying capacity on the TFGrid occurs)
|
||||||
- Operate the Tokens (exchanges, ...)
|
- Operate the Tokens (exchanges etc.)
|
||||||
- Operate the tools (forum, websites, ...)
|
- Operate the tools (forum, websites, manuals etc.)
|
||||||
- Collaborate with the Guardians for the operations of the TFChain and supporting tools
|
- Collaborate with the Guardians for the operations of the TFChain and supporting tools
|
||||||
- Define & operate the benefits for the Members
|
- Define and operate the benefits for the members
|
||||||
- Distribute the TFT Fees for Utilization.
|
- Distribute the TFT fees for utilization.
|
||||||
|
|
||||||
## Status
|
## Status
|
||||||
|
|
||||||
> At start of our commercial operation (2024) we operate our Cooperative functions though our company in dubai called ThreeFold DMCC, somewhere in 2024 the cooperative will be established and all functions in relation to TFGrid transfered.
|
> At the start of our commercial operation (2024) we operate our cooperative functions though our company in dubai called ThreeFold DMCC, somewhere in 2024 the cooperative will be established and all functions in relation to the TFGrid will be transfered.
|
@ -1,23 +1,23 @@
|
|||||||
# Validators
|
# Validators
|
||||||
|
|
||||||
Validators & staking as is happening in TFGrid 3.14.
|
Validators & staking on TFGrid 3.14.
|
||||||
|
|
||||||
- 9 [guardians](tfgrid3:guardians.md) are needed
|
- 9 [guardians](tfgrid3:guardians.md) are needed
|
||||||
- they run a full TF Validator Stack (technically)
|
- They will run a full TF Validator Stack (technically)
|
||||||
- anyone can stake TFT on that stack
|
- Anyone can stake TFT on that stack
|
||||||
|
|
||||||
reward
|
Reward:
|
||||||
|
|
||||||
- 10 percent of revenue over TFGrid in TFT or INCA
|
- 10% of revenue over TFGrid in TFT or INCA
|
||||||
- this percentage can change over time and will be voted by GEP
|
- This percentage can change over time and will be voted by GEP
|
||||||
- a validator gets a monthly income to support his/her work as well in e.g. INCA or TFT
|
- A validator recieves a monthly income to support his/her work as well in e.g. INCA or TFT
|
||||||
|
|
||||||
## what is deployed on a validator
|
## What Is Deployed On A Validator
|
||||||
|
|
||||||
- TFChain Node (our blockchain node)
|
- TFChain Node (our blockchain node)
|
||||||
- TFHub (let people go from docker to tfgrid ZOS flists)
|
- TFHub (lets people go from docker to tfgrid ZOS flists)
|
||||||
- TFBootstrap (how to install new node)
|
- TFBootstrap (how to install new node)
|
||||||
- Explorer (has all stats)
|
- Explorer (has all stats)
|
||||||
- Validator Code (keep the grid clean & healthy)
|
- Validator Code (keeps the grid clean & healthy)
|
||||||
- Monitoring Software
|
- Monitoring Software
|
||||||
- Bridges (needs to be migrated carefully, might take some time)
|
- Bridges (needs to be migrated carefully, might take some time)
|
||||||
|
@ -1,8 +1,65 @@
|
|||||||
|
<h1> ThreeFold Grid 3.14</h1>
|
||||||
|
|
||||||
![alt text](intro.png)
|
![alt text](intro.png)
|
||||||
|
|
||||||
# TFGrid 3.14
|
<h2>Improving on Strong Foundations</h2>
|
||||||
|
|
||||||
This knowledge base tries to bring together information which is relevant for our new version of the Grid.
|
This knowledge base brings together all of the information which is relevant for our new version of the ThreeFold Grid.
|
||||||
|
|
||||||
> use the forum to discuss the content or directly edit in our git system, see [https://forum.threefold.io](https://forum.threefold.io/c/dao/rfc/81)
|
We highly encourage feedback and discussions around the next grid release.
|
||||||
|
|
||||||
|
<h2>Contribute</h2>
|
||||||
|
|
||||||
|
Use the [ThreeFold forum](https://forum.threefold.io/c/dao/rfc/81) to discuss the content or edit directly in [our Git system](https://git.ourworld.tf/tfgrid/info_tfgrid).
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
<h2>Table of Contents</h2>
|
||||||
|
|
||||||
|
- [Introduction](tfgrid3/intro.md)
|
||||||
|
- [Ecosystem](tfgrid3/ecosystem.md)
|
||||||
|
- [Who We Are](tfgrid3/who_are_we.md)
|
||||||
|
- [Promotion](tfgrid3/promotion.md)
|
||||||
|
- [Messaging](tfgrid3/messaging.md)
|
||||||
|
- [Chapters](tfgrid3/chapters.md)
|
||||||
|
- [Tokenomics](tfgrid3/tokenomics.md)
|
||||||
|
- [Farming Reward](tfgrid3/farming_reward.md)
|
||||||
|
- [Tokens Overview](tfgrid3/tokens_overview.md)
|
||||||
|
- [Validators](tfgrid3/validators.md)
|
||||||
|
- [ThreeFold Cooperative](tfgrid3/tfcoop_intro.md)
|
||||||
|
- [Governance](tfgrid3/governance.md)
|
||||||
|
- [Guardians](tfgrid3/guardians.md)
|
||||||
|
- [Grid Enhancement Proposals](tfgrid3/gep.md)
|
||||||
|
- [GEP Community Brainstorm](tfgrid3/gep_comm_brainstorm.md)
|
||||||
|
- [Change Management of GEP](tfgrid3/gep2.md)
|
||||||
|
- [Farming GEP 3.14](tfgrid3/farming_update_3_14.md)
|
||||||
|
- [The Internet today](tech/internet_today.md)
|
||||||
|
- [History c64](tech/history/c64.md)
|
||||||
|
- [Too many layers](tech/history/layers.md)
|
||||||
|
- [Values](values/planet_people_first.md)
|
||||||
|
- [Tech Key Innovations](tech/key_innovations_overview.md)
|
||||||
|
- [Key Innovations](tech/key_innovations.md)
|
||||||
|
- [Mycelium Network](tech/mycelium_innovation.md)
|
||||||
|
- [Zero-OS](tech/zos_innovation.md)
|
||||||
|
- [Quantum Safe Storage](tech/zstor_innovation.md)
|
||||||
|
- [Quantum Safe Filesystem](tech/qsfs_innovation.md)
|
||||||
|
- [FList: better OS Images](tech/flist_innovation.md)
|
||||||
|
- [FungiStor](tech/fungistor_innovation.md)
|
||||||
|
- [Network Wall](tech/network_wall_innovation.md)
|
||||||
|
- [Technology](tech/technology.md)
|
||||||
|
- [Architecture](tech/architecture.md)
|
||||||
|
- [Energy Efficient](tech/energy_efficient.md)
|
||||||
|
- [TFGrid Core Capabilities](tech/features.md)
|
||||||
|
- [Compute](tech/compute.md)
|
||||||
|
- [Zero-OS](tech/zos.md)
|
||||||
|
- [Infrastructure As Code](tech/smartcontract_iac.md)
|
||||||
|
- [CoreX](tech/corex.md)
|
||||||
|
- [Storage](tech/qsss_home.md)
|
||||||
|
- [Quantum Safe Storage Algo](tech/qss_algorithm.md)
|
||||||
|
- [Zero Knowledge proof](tech/qss_zero_knowledge_proof.md)
|
||||||
|
- [NFT Storage](tech/nft_storage.md)
|
||||||
|
- [S3 Storage](tech/s3_interface)
|
||||||
|
- [File System](tech/qss_filesystem.md)
|
||||||
|
- [Network](tech/networking.md)
|
||||||
|
- [Mycelium](tech/mycelium.md)
|
||||||
|
- [Web Gateway](tech/webgw.md)
|
@ -1,19 +1,19 @@
|
|||||||
|
|
||||||
# ThreeFold Messaging
|
# ThreeFold Messaging
|
||||||
|
|
||||||
## Principles
|
## Key Principles
|
||||||
|
|
||||||
- We don't sell anything, we just show people what you can do with the project and where we are headed
|
- We don't sell anything - we just show people what they can do with the project and the overarching aim of where it is heading
|
||||||
- We are clear about the status of the project including its size and features
|
- We clearly communicate the current status of the project including its size and features
|
||||||
|
|
||||||
|
|
||||||
## Narrative
|
## The Narrative
|
||||||
|
|
||||||
> Decentralized Autonomous Cloud
|
> Decentralized Autonomous Cloud
|
||||||
|
|
||||||
- Cloud means any service
|
- Cloud means any service or workload
|
||||||
- Decentralized means everyone is a participant. Everyone can deliver and/or use cloud services
|
- Decentralized means everyone is a participant. Everyone can deliver and/or use cloud services
|
||||||
- Autonomous means cloud service providers don't need to be experts, the software is capable to run 100% autonomously
|
- Autonomous means cloud service providers don't need to be experts. The software is capable to run 100% autonomously.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
# Promotion
|
# Promotion
|
||||||
|
|
||||||
TF Coop will organize the promotion activities for the future but for now we urgently need more people stepping up.
|
The TF Coop will organize promotion activities in the future but at the moment we urgently need more people to step up and help with promoting the project.
|
||||||
|
|
||||||
## current team
|
## current team
|
||||||
|
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
<h1> TFGrid 3.14 Farming Updates </h1>
|
<h1> TFGrid 3.14 Farming Updates </h1>
|
||||||
|
|
||||||
<h2>Table of Contents</h2>
|
<h2>Table of Contents</h2>
|
||||||
@ -101,4 +100,4 @@ This GEP can be done once voting system has been changed and GEP 1, 2 and 3 are
|
|||||||
|
|
||||||
We highly encourage everyone to discuss on the forum about this exciting phase of the ThreeFold adventure.
|
We highly encourage everyone to discuss on the forum about this exciting phase of the ThreeFold adventure.
|
||||||
|
|
||||||
Please share your thoughts and feedback on the ongoing forum post [here](https://forum.threefold.io/t/feedback-on-farming-logic-as-suggested-for-tfgrid-3-14/4275).
|
Please share your thoughts and feedback on the ongoing forum post [here](https://forum.threefold.io/t/feedback-on-farming-logic-as-suggested-for-tfgrid-3-14/4275).
|
||||||
|
@ -2,9 +2,9 @@
|
|||||||
|
|
||||||
# Farming Reward TFGrid 3.14
|
# Farming Reward TFGrid 3.14
|
||||||
|
|
||||||
The amount of ThreeFold_Token earned by farmers is relative to the amount of compute, storage or network capacity they provide to the ThreeFold Grid.
|
The amount of ThreeFold tokens earned by farmers is relative to the amount of compute, storage or network capacity they provide to the ThreeFold Grid.
|
||||||
|
|
||||||
### 1. Proof-of-Capacity
|
### 1. Proof Of Capacity
|
||||||
|
|
||||||
The reward is in line with capacity provided by the farmer based on:
|
The reward is in line with capacity provided by the farmer based on:
|
||||||
|
|
||||||
@ -12,20 +12,26 @@ The reward is in line with capacity provided by the farmer based on:
|
|||||||
* Memory Capacity (RAM)
|
* Memory Capacity (RAM)
|
||||||
* Storage Capacity (SSD/HDD)
|
* Storage Capacity (SSD/HDD)
|
||||||
|
|
||||||
- There will be a maximum 1 Billion TFT farmed (new from 3.14)
|
<br>
|
||||||
- Once we reach the 1 billion TFT farming will stop and all reward will be utilization based and rewards based on achievements based on location, quality, ... (the cooperative and GEP's will define this future)
|
|
||||||
|
- A maximum of 1 Billion TFT can be farmed (new from 3.14)
|
||||||
|
- Once we reach 1 billion TFT, farming will stop and all rewards will be based on utilization and achievements (e.g. location and quality of the node). The cooperative and GEP's will define this in the future.
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
> See simulator in [https://dashboard.grid.tf/#/farms/simulator](https://dashboard.grid.tf/#/farms/simulator/)
|
> See simulator in [https://dashboard.grid.tf/#/farms/simulator](https://dashboard.grid.tf/#/farms/simulator/)
|
||||||
|
|
||||||
More information [in our manual](https://manual.grid.tf/knowledge_base/farming/farming_toc.html)
|
More information [in our manual](https://manual.grid.tf/knowledge_base/farming/farming_toc.html)
|
||||||
|
|
||||||
### 2. Proof-of-Utilization
|
### 2. Proof Of Utilization
|
||||||
|
|
||||||
- 50% of utilized capacity which comes over portal from *TFCOOP will be given to farmer
|
- 50% of utilized capacity which comes over the portal from *TFCOOP will be given to the farmer
|
||||||
- 40% of utilized capacity goes to *TFCOOP (which is a decentralized org and all income will be used to the benefits of the community)
|
- 40% of utilized capacity goes to *TFCOOP
|
||||||
- 10% of utilized capacity goes to Stakers on the Validators
|
- 10% of utilized capacity goes to Stakers on the Validators
|
||||||
|
|
||||||
|
<br>
|
||||||
> DISCLAIMER: ThreeFold Dubai organizes the farming (proof of capacity) process. This process is the result of the execution of code written by open source developers (zero-os and minting code) and a group of people - who checks this process voluntarily. No claims can be made or damages asked for to any person or group related to ThreeFold Dubai like but not limited to the different councils.
|
|
||||||
|
|
||||||
|
> DISCLAIMER: ThreeFold Dubai organizes this process. This process is the result of the execution of code written by open source developers (zero-os and minting code) and a group of people who check this process voluntarily. No claims can be made or damages asked for to any person or group related to ThreeFold Dubai like but not limited to the different councils. This process changes for TFGrid 3.X by means of the TFDAO
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,11 +1,11 @@
|
|||||||
# Tokenomics TFGrid 3
|
# Tokenomics TFGrid 3
|
||||||
|
|
||||||
## Principles
|
## Key Principles
|
||||||
|
|
||||||
- keep it all as simple as possible
|
- Keep it as simple as possible
|
||||||
- max 1 billion TFT (used to be 4 billion)
|
- Maximum 1 billion TFT (used to be 4 billion)
|
||||||
|
|
||||||
## More info
|
## More info
|
||||||
|
|
||||||
- [farming reward](farming_reward.md)
|
- [Farming rewards](farming_reward.md)
|
||||||
- [token overview](token_overview.md)
|
- [Token overview](token_overview.md)
|
@ -1,4 +1,4 @@
|
|||||||
# Overview Threefoldtoken on the stellar network
|
# Overview of Threefold Tokens on the Stellar Network
|
||||||
|
|
||||||
> Status 13 March 2024:
|
> Status 13 March 2024:
|
||||||
|
|
||||||
|
@ -1,55 +1,108 @@
|
|||||||
# Who is behind the project ?
|
# About Us
|
||||||
|
|
||||||
## who created the project
|
## People
|
||||||
|
|
||||||
A group of passionate people who want to build a new foundational layer for an better working internet, more like the Internet was originally intended. They operate from TFTech (now TF9) and ThreeFold Dubai.
|
We are a group of passionate people who want to build a new foundational layer for a better working internet, more like how the Internet was originally intended to be.
|
||||||
|
|
||||||
The project was started by some Internet & Cloud veterans who now want to handover to a much more decentralized environment.
|
The project was started by some Internet & Cloud veterans who now want to handover to a much more decentralized environment.
|
||||||
|
|
||||||
More than 1000 farmers made this project possible, we are supper grateful for all their support.
|
More than 1000 farmers made this project possible and we are supper grateful for all their support.
|
||||||
|
|
||||||
## the project mission
|
## The Project Mission
|
||||||
|
|
||||||
- we help others to create any AI, web2 or web3 solution
|
ThreeFold Grid (TFGrid) is a foundational layer which can be used by any web2/3 project. It empowers individuals requiring cloud resources such as network, GPU, CPU, and storage to leverage its capabilities for their projects. We help others to create any web2 or web3 solution on our grid.
|
||||||
- TFGrid is a foundational layer which can be used by any AI/web2/3 project
|
|
||||||
- enable everyone to build on top of TFGrid who needs cloud capacity (network, gpu, cpu, storage, ...)
|
|
||||||
|
|
||||||
## the project purpose
|
## The Project Purpose
|
||||||
|
|
||||||
- deliver a new infrastructure layer to build a new internet on top off
|
The purpose is to deliver a new infrastructure layer to build a new internet on top of. This layer is sovereign, more scalable, peer-to-peer and co-owned. The project delivers network, compute and storage to anyone who needs it for their own usecases.
|
||||||
- this infra layer is sovereign, more scalable, peer2peer, co-owned, ...
|
[See the high level tech description.](tech/key_innovations.md)
|
||||||
- project delivers network, compute, storage constructs to work with anyone who needs it for their own usecases
|
|
||||||
- [see tech high level description](tech:key_innovations.md)
|
|
||||||
|
|
||||||
## who can benefit from TFGrid capabilities most?
|
## Who Benefits The Most From The TFGrid's Capabilities?
|
||||||
|
|
||||||
- developers for CI/CD
|
- CI/CD developers
|
||||||
- countries to deploy their own internet
|
- Countries: to deploy their own internet
|
||||||
- DePIN movement
|
- The DePIN movement
|
||||||
- Social Media Apps
|
- Social Media Apps
|
||||||
- ...
|
|
||||||
|
|
||||||
## what has project achieved
|
## The Project Key Achievements To Date
|
||||||
|
|
||||||
- grid
|
- The ThreeFold Grid: connected across ±60 countries by independent people and organizations called ThreeFold farmers, live and usable in its third generation technology
|
||||||
- country
|
- Partnerships with the governments of Tanzania, to deploy physical infrastructure and introducing coding academies and innovation hubs across the country, and Zanzibar, to deploy physical infrastructure locally and introduce a digital free zone
|
||||||
- community
|
- An extensive community of 1000+ farmers and several thousand others – token holders, grid users, and supporters / advocates of the project
|
||||||
- ...
|
- Our strategic partnerships with key DePIN players: more will be announced soon
|
||||||
|
|
||||||
## how biased is the project
|
|
||||||
|
|
||||||
- not biased, we are tech platform
|
## Values
|
||||||
- keep [values simple](values:planet_people_first) but strong
|
|
||||||
- project intent is to clearly want to explain what the capabilities are of our tech and let everone decide for themselves what to do with it
|
- Our core [values](values:planet_people_first) are simple and strong
|
||||||
|
- We are fundamentally a tech platform and are therefore not biased
|
||||||
|
- The project's intent is to clearly explain our tech's capabilities and let everyone decide for themselves what to do with it
|
||||||
|
|
||||||
## Messaging
|
## Messaging
|
||||||
|
|
||||||
- project is here to make it easy for everyone to play their role (see above)
|
- The project believes in an internet where everyone can communicate freely and own their own data
|
||||||
- project believe very much in an internet where everyone can communicate freely, owns their own data, ...
|
- The project wants to help others to become truly decentralized (which is not the case with the current Internet)
|
||||||
- project wants to help others to really become decentralized (which is not the case today)
|
- The project wants to help countries to have their own sovereign Internet
|
||||||
- project wants to help governments to have their own Internet
|
- The project wants to help data center providers to build improved data centers
|
||||||
- project wants to help datacenter providers to build datacenters in other ways
|
|
||||||
|
|
||||||
## Ecosystem
|
## Ecosystem
|
||||||
|
|
||||||
> see [ecosystem doc](ecosystem.md)
|
## Participants
|
||||||
|
|
||||||
|
### Farmers
|
||||||
|
|
||||||
|
Farmers connect computers to our new internet to provide GPU, Storage and Compute capacity and make it available over Mycelium to all participants.
|
||||||
|
|
||||||
|
### Network Bridgers
|
||||||
|
|
||||||
|
- Make a bridge between the old and new internet
|
||||||
|
- Provide bandwidth to the TFGrid
|
||||||
|
|
||||||
|
### Guardians
|
||||||
|
|
||||||
|
- Protect the network
|
||||||
|
- Provide governance
|
||||||
|
- Keep all relevant services up and running to allow the TFGrid to function
|
||||||
|
|
||||||
|
### Farming Pools (new for a TBD version)
|
||||||
|
|
||||||
|
- Help farmers to be more effective
|
||||||
|
- Training & Support
|
||||||
|
- Improve uptime and provide authenticity
|
||||||
|
|
||||||
|
|
||||||
|
### TF Coop
|
||||||
|
|
||||||
|
- Our governance layer (DAO tooling can be extended)
|
||||||
|
- Everyone is part of the Cooperative
|
||||||
|
- The Coop directors will build this organization to streamline our expansion
|
||||||
|
- Gives everyone a voice and environment to operate from
|
||||||
|
|
||||||
|
### TFNode Suppliers
|
||||||
|
|
||||||
|
- Build & Sell TFNodes to our participants.
|
||||||
|
- Minimal service/support needs to be delivered
|
||||||
|
|
||||||
|
### Service / Solution Providers
|
||||||
|
|
||||||
|
- They create & provide solutions and/or services on top of TFGrid
|
||||||
|
- Customers of these solutions pay in INCA (providing value to our mutual credit currency)
|
||||||
|
- Each solution has T&C
|
||||||
|
- Each solution needs to be supported
|
||||||
|
|
||||||
|
### Technology Providers
|
||||||
|
|
||||||
|
- Create opensource technology which can be used in the TFGrid
|
||||||
|
- Grants might be available to reward Technology Providers
|
||||||
|
- TF9 (previously TFTech) is example of a Technology Provider
|
||||||
|
|
||||||
|
### DePIN Partners
|
||||||
|
|
||||||
|
- Our team is in active discussions in search of a party (company, project, community) who will support our launch into the DePIN world
|
||||||
|
- This party (or parties) will:
|
||||||
|
- Actively promote our project in the DePIN space.
|
||||||
|
- Explain our tokens and integrate with other currencies
|
||||||
|
- Integrate with the rest of the DePIN ecosystem
|
||||||
|
- Organize community growth
|
||||||
|
- Organize grants for the rest of the community
|
||||||
|
- Grow value for the whole ecosystem and let it "FLOW"
|
||||||
|
@ -1,24 +1,24 @@
|
|||||||
![](img/ppp.png)
|
![](img/ppp.png)
|
||||||
|
|
||||||
We want to be at the forefront of a growing movement, more and more organizations are being pushed by their stakeholders to prioritize sustainability and planet positive policies.
|
We want to be at the forefront of a growing movement where more and more organizations are being pushed by their stakeholders to prioritize sustainability and planet positive policies.
|
||||||
|
|
||||||
We are not swimming against the stream, we are part of a group of leaders of change and making real the zeitgeist of the 21st century.
|
We are not swimming against the stream, we are part of a group of leaders of change and making real the zeitgeist of the 21st century.
|
||||||
|
|
||||||
## Core Values
|
## Core Values
|
||||||
|
|
||||||
|
|
||||||
Anything we do needs to improve our planet's situation (climate change, regenerative, respect resources, …) and help the people around us.
|
Anything we do needs to improve our planet's situation (help limit climate change, be regenerative and respect resources) and help the people around us.
|
||||||
|
|
||||||
As a result of doing so, we as investors of time and money will have created most value and will get the benefits from our efforts.
|
By following these core values, we as investors of time and money will have created the most value possible and will benefit from our efforts.
|
||||||
|
|
||||||
|
|
||||||
## Tools
|
## Tools
|
||||||
|
|
||||||
There are some practical tools which help us to achieve above values.
|
There are some practical tools which will help us to achieve the above values: opensource, simplicity and authenticity.
|
||||||
|
|
||||||
## OpenSource
|
## OpenSource
|
||||||
|
|
||||||
OpenSource has been an incredible tool for us, it allowed us to grow and even exit more than 7 companies.
|
OpenSource has been an incredible tool for us, it has allowed us to grow and even exit more than 7 companies.
|
||||||
|
|
||||||
Open-source software offers transparency, allowing for enhanced security. It fosters innovation and rapid development by leveraging global contributions. The collaborative nature reduces costs and accelerates problem-solving
|
Open-source software offers transparency, allowing for enhanced security. It fosters innovation and rapid development by leveraging global contributions. The collaborative nature reduces costs and accelerates problem-solving
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user