Sam edits
This commit is contained in:
parent
1f2c525a12
commit
fbe0e88c6e
@ -1,6 +1,10 @@
|
|||||||
# Energy Efficient
|
# Energy Efficient
|
||||||
|
|
||||||
|
Below are some of the ways in which ThreeFold achieves energy efficiency as compared to traditional models.
|
||||||
|
|
||||||
![alt text](energy_efficient.png)
|
![alt text](energy_efficient.png)
|
||||||
|
|
||||||
|
In addition, a decentralized peer-to-peer infrastructure which finds the shortest path between end points is by nature energy-efficient. Data needs to travel a much shorter distance.
|
||||||
|
|
||||||
> Depending on the use case the ThreeFold approach can lead to 10x energy savings.
|
> Depending on the use case the ThreeFold approach can lead to 10x energy savings.
|
||||||
|
|
||||||
|
@ -1,25 +1,25 @@
|
|||||||
|
|
||||||
# Mycelium our Planetary Network
|
# Mycelium: Our Planetary Network
|
||||||
|
|
||||||
![](img/planet_net_.jpg)
|
![](img/planet_net_.jpg)
|
||||||
|
|
||||||
> TODO: need to upgrade image, also digital twin needs to be named '3bot'
|
> TODO: Need to update this image, also digital twin needs to be named '3bot'
|
||||||
|
|
||||||
The planetary network is an overlay network which lives on top of the existing internet or other peer2peer networks created. In this network, everyone is connected to everyone. End-to-end encryption between users of an app and the app running behind the network wall.
|
The planetary network is an overlay network which lives on top of the existing Internet or other peer-to-peer networks created. In this network, everyone is connected to everyone. End-to-end encryption between users of an app and the app runs behind the network wall.
|
||||||
|
|
||||||
Each user end network point is strongly authenticated and uniquely identified, independent of the network carrier used. There is no need for a centralized firewall or VPN solutions, as there is a circle based networking security in place.
|
Each user end network point is strongly authenticated and uniquely identified, independent of the network carrier used. There is no need for a centralized firewall or VPN solutions, as there is a circle-based networking security in place.
|
||||||
|
|
||||||
|
### Key Benefits
|
||||||
|
|
||||||
Benefits :
|
|
||||||
- It finds shortest possible paths between peers
|
- It finds shortest possible paths between peers
|
||||||
- There's full security through end-to-end encrypted messaging
|
- There is full security through end-to-end encrypted messaging
|
||||||
- It allows for peer2peer links like meshed wireless
|
- It allows for peer-to-peer links, like meshed wireless
|
||||||
- It can survive broken internet links and re-route when needed
|
- It can survive broken Internet links and re-route when needed
|
||||||
- It resolves the shortage of IPV4 addresses
|
- It resolves the shortage of IPV4 addresses
|
||||||
|
|
||||||
|
Whereas current computer networks depend heavily on very centralized design and configuration, this networking concept breaks this mold by making use of a global-spanning tree to form a scalable IPv6 encrypted mesh network. This is a peer-to-peer implementation of a networking protocol.
|
||||||
|
|
||||||
Whereas current computer networks depend heavily on very centralized design and configuration, this networking concept breaks this mould by making use of a global spanning tree to form a scalable IPv6 encrypted mesh network. This is a peer2peer implementation of a networking protocol.
|
The following table illustrates the high-level differences between traditional networks like today's Internet, and the Planetary Network created by ThreeFold:
|
||||||
|
|
||||||
The following table illustrates high-level differences between traditional networks like the internet, and the planetary threefold network:
|
|
||||||
|
|
||||||
| Characteristic | Traditional | Mycelium |
|
| Characteristic | Traditional | Mycelium |
|
||||||
| --------------------------------------------------------------- | ----------- | ----------------- |
|
| --------------------------------------------------------------- | ----------- | ----------------- |
|
||||||
@ -32,18 +32,17 @@ The following table illustrates high-level differences between traditional netwo
|
|||||||
|
|
||||||
## What are the problems solved here?
|
## What are the problems solved here?
|
||||||
|
|
||||||
The internet as we know it today doesn’t conform to a well-defined topology. This has largely happened over time - as the internet has grown, more and more networks have been “bolted together”. The lack of defined topology gives us some unavoidable problems:
|
The Internet as we know it today doesn’t conform to a well-defined topology. This has largely happened over time - as the Internet has grown, more and more networks have been “bolted together." The lack of defined topology gives us some unavoidable problems:
|
||||||
|
|
||||||
- The routing tables that hold a “map” of the internet are huge and inefficient
|
- The routing tables that hold a “map” of the Internet are huge and inefficient
|
||||||
- There isn’t really any way for a computer to know where it is located on the internet relative to anything else
|
- There isn’t really any way for a computer to know where it is located on the Internet relative to anything else
|
||||||
- It’s difficult to examine where a packet will go on its journey from source to destination without actually sending it
|
- It is difficult to examine where a packet will go on its journey, from source to destination, without actually sending it
|
||||||
- It’s very difficult to install reliable networks into locations that change often or are non-static, i.e. wireless mesh networks
|
- It is very difficult to install reliable networks into locations that change often or are non-static, i.e. wireless mesh networks
|
||||||
|
|
||||||
These problems have been partially mitigated (but not really solved) through centralization - rather than your computers at home holding a copy of the global routing table, your ISP does it for you. Your computers and network devices are configured just to “send it upstream” and to let your ISP decide where it goes from there, but this does leave you entirely at the mercy of your ISP who can redirect your traffic anywhere they like and to inspect, manipulate or intercept it.
|
These problems have been partially mitigated (but not really solved) through centralization - rather than your computers at home holding a copy of the global routing table, your ISP does it for you. Your computers and network devices are configured just to “send it upstream” and to let your ISP decide where it goes from there, but this does leave you entirely at the mercy of your ISP, who can redirect your traffic anywhere they like and to inspect, manipulate, or intercept it.
|
||||||
|
|
||||||
In addition, wireless meshing requires you to know a lot about the network around you, which would not typically be the case when you have outsourced this knowledge to your ISP. Many existing wireless mesh routing schemes are not scalable or efficient, and do not bridge well with existing networks.
|
In addition, wireless meshing requires you to know a lot about the network around you, which would not typically be the case when you have outsourced this knowledge to your ISP. Many existing wireless mesh routing schemes are not scalable or efficient, and do not bridge well with existing networks.
|
||||||
|
|
||||||
![](img/planetary_net.jpg)
|
![](img/planetary_net.jpg)
|
||||||
|
|
||||||
The planetary network is a continuation and implementation of the [Planetary Network](https://Planetary Network-network.github.io/about.html) network initiative. This technology is in beta but has been proven to work already quite well.
|
The Planetary Network is a continuation and implementation of the [Planetary Network](https://Planetary Network-network.github.io/about.html) network initiative. This technology is in beta but has been proven to work already quite well.
|
||||||
|
|
@ -1,23 +1,23 @@
|
|||||||
|
|
||||||
# ThreeFold Network Technology Overview
|
# ThreeFold Network Technology Overview
|
||||||
|
|
||||||
Decentralized networking platform allowing any compute and storage workload to be connected together on a private (overlay) network and exposed to the existing internet network. The Peer2Peer network platform allows any workload to be connected over secure encrypted networks which will look for the shortest path between the nodes.
|
ThreeFold's decentralized networking platform allows any compute and storage workload to be connected together on a private (overlay) network and exposed to the existing Internet network. The peer-to-peer network platform allows any workload to be connected over secure encrypted networks, which will look for the shortest path between nodes.
|
||||||
|
|
||||||
### Secure mesh overlay network (peer2peer)
|
### Secure Mesh Overlay Network (Peer-to-Peer)
|
||||||
|
|
||||||
Z_NET is the foundation of any architecture running on the TF Grid. It can be seen as a virtual private datacenter and the network allows all of the *N* containers to connect to all of the *(N-1)* other containers. Any network connection is a secure network connection between your containers, it creates peer 2 peer network between containers.
|
ZNet is the foundation of any architecture running on the TF Grid. It can be seen as a virtual private data center and the network allows all of the *N* containers to connect to all of the *(N-1)* other containers. Any network connection is a secure network connection between your containers, it creates a peer-to-peer network between containers.
|
||||||
|
|
||||||
![alt text](net1.png)
|
![alt text](net1.png)
|
||||||
|
|
||||||
No connection is made with the internet. The ZNet is a single tenant network and by default not connected to the public internet. Everything stays private. For connecting to the public internet, a Web Gateway is included in the product to allows for public access if and when required.
|
No connection is made with the Internet. The ZNet is a single tenant network and by default not connected to the public Internet. Everything stays private. For connecting to the public Internet, a Web Gateway is included in the product to allow for public access, if and when required.
|
||||||
|
|
||||||
### Redundancy
|
### Redundancy
|
||||||
|
|
||||||
As integrated with [WebGW](webgw):
|
As integrated with [Web Gateway (WebGW)](webgw):
|
||||||
|
|
||||||
![alt text](net2.png)
|
![alt text](net2.png)
|
||||||
|
|
||||||
- Any app can get (securely) connected to the internet by any chosen IP address made available by ThreeFold network farmers through [WebGW](webgw)
|
- Any app can get (securely) connected to the Internet by any chosen IP address made available by ThreeFold network farmers through [WebGW](webgw)
|
||||||
- An app can be connected to multiple web gateways at once, the DNS round robin principle will provide load balancing and redundancy
|
- An app can be connected to multiple web gateways at once, the DNS round robin principle will provide load balancing and redundancy
|
||||||
- An easy clustering mechanism where web gateways and nodes can be lost and the public service will still be up and running
|
- An easy clustering mechanism where web gateways and nodes can be lost and the public service will still be up and running
|
||||||
- Easy maintenance. When containers are moved or re-created, the same end user connection can be reused as that connection is terminated on the Web Gateway. The moved or newly created Web Gateway will recreate the socket to the Web Gateway and receive inbound traffic.
|
- Easy maintenance. When containers are moved or re-created, the same end user connection can be reused as that connection is terminated on the Web Gateway. The moved or newly created Web Gateway will recreate the socket to the Web Gateway and receive inbound traffic.
|
||||||
|
@ -1,42 +1,38 @@
|
|||||||
|
# TF Grid Web Gateway
|
||||||
|
|
||||||
|
The Web Gateway is a mechanism to connect private networks to the open Internet in such a way that there is no direct connection between the Internet and the secure workloads running in the ZMachines.
|
||||||
# TFGrid WebGW
|
|
||||||
|
|
||||||
The Web Gateway is a mechanism to connect the private networks to the open Internet, in such a way that there is no direct connection between internet and the secure workloads running in the ZMachines.
|
|
||||||
|
|
||||||
![](img/webgateway.jpg)
|
![](img/webgateway.jpg)
|
||||||
|
|
||||||
|
### Key Benefits
|
||||||
|
|
||||||
|
|
||||||
- Separation between where compute workloads are and where services are exposed
|
- Separation between where compute workloads are and where services are exposed
|
||||||
- Redundant
|
- Redundancy: Each app can be exposed on multiple web gateways at once
|
||||||
- Each app can be exposed on multiple webgateways at once
|
- Support for many interfaces
|
||||||
- Support for many interfaces...
|
|
||||||
- Helps resolve shortage of IPv4 addresses
|
- Helps resolve shortage of IPv4 addresses
|
||||||
|
|
||||||
### Implementation
|
### Implementation
|
||||||
|
|
||||||
Some 3nodes supports gateway functionality (configured by the farmers). A 3node with gateway configuration can then accept gateway workloads and then forward traffic to ZMachines that only have Planetary Network (planetary network) or Ipv6 addresses.
|
Some 3Nodes support gateway functionality (this is configured by the farmers). A 3Node with gateway configuration can then accept gateway workloads and forward traffic to ZMachines that only have Planetary Network or IPv6 addresses.
|
||||||
|
|
||||||
The gateway workloads consists of a name (prefix) that need to be reserved on the block chain first. Then the list of backend IPs. There are other flags that can be set to control automatic TLS (please check terraform documentations for the exact details of a reservation).
|
The gateway workloads consist of a name (prefix) that first needs to be reserved on the blockchain. Then, the list of backend IPs. There are other flags that can be set to control automatic TLS (please check Terraform documentation for the exact details of a reservation).
|
||||||
|
|
||||||
Once the 3node receives this workloads, the network configure proxy for this name and the Planetary Network IPs.
|
Once the 3Node receives this workload, the network configures proxy for this name and the Planetary Network IPs.
|
||||||
|
|
||||||
### Security
|
### Security
|
||||||
|
|
||||||
ZMachines have to have a Planetary Network IP or any other IPv6 (also IPv4 are accepted), it means that any person who is connected to the Planetary Network, can also reach the ZMachine without the need for a proxy.
|
ZMachines have to have a Planetary Network IP or any other IPv6 (IPv4 is also accepted). This means that any person connected to the Planetary Network can also reach the ZMachine without the need for a proxy.
|
||||||
|
|
||||||
So it's up to the ZMachine owner/maintainer to make sure it is secured and only have the required ports open.
|
So it's up to the ZMachine owner/maintainer to make sure it is secured and that only the required ports are open.
|
||||||
|
|
||||||
### Redundant Network Connection
|
### Redundant Network Connection
|
||||||
|
|
||||||
![](img/redundant_net.jpg)
|
![](img/redundant_net.jpg)
|
||||||
|
|
||||||
|
|
||||||
### Unlimited Scale
|
### Unlimited Scale
|
||||||
|
|
||||||
![](img/webgw_scaling.jpg)
|
![](img/webgw_scaling.jpg)
|
||||||
|
|
||||||
|
The network architecture is a pure scale-out network system. It can scale to unlimited size, there is simply no bottleneck. Network "supply" is created by network farmers, and network "demand" is done by TF Grid users.
|
||||||
|
|
||||||
The network architecture is a pure scale-out network system, it can scale to unlimited size, there is simply no bottleneck. Network "supply" is created by network farmers, and network "demand" is done by TF Grid users. Supply and demand scale independently, for supply there can be unlimited network, farmers providing the web gateways on their own 3nodes, and unlimited compute farmers providing 3nodes for compute and storage. The demand side is driven by developers creating software that runs on the grid, system integrators creating solutions for enterprises. This demand side is exponentially growing for data processing and storage use cases.
|
Supply and demand scale independently. For supply, there can be unlimited network farmers providing web gateways on their own 3Nodes, and unlimited compute farmers providing 3Nodes for compute and storage. The demand side is driven by developers creating software that runs on the grid, system integrators creating solutions for enterprises, and so on. Globally, there is exponentially-growing demand for data processing and storage use cases.
|
@ -31,8 +31,8 @@
|
|||||||
## The Requirements For Our TFGrid Based On Zero OS Are:
|
## The Requirements For Our TFGrid Based On Zero OS Are:
|
||||||
|
|
||||||
- **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators.
|
- **Autonomy**: TF Grid needs to create compute, storage and networking capacity everywhere. We could not rely on a remote (or a local) maintenance of the operating system by owners or operating system administrators.
|
||||||
- **Simplicity**: an operating system should be simple, able to exist anywhere for anyone, and be good for the planet.
|
- **Simplicity**: An operating system should be simple, able to exist anywhere for anyone, and be good for the planet.
|
||||||
- **Stateless**: in a grid (peer2peer) set up, the sum of the components is providing a stable basis for single elements to fail and not bring the whole system down. Therefore, it is necessary for single elements to be stateless, and the state needs to be stored within the grid.
|
- **Stateless**: In a grid (peer-to-peer) set up, the sum of the components provides a stable basis for single elements to fail and not bring the whole system down. Therefore, it is necessary for single elements to be stateless, and the state needs to be stored within the grid.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user