Getting started with IPFS | 50 questions about IPFS (4)

26. What is the IPFS storage mining machine?

The IPFS storage mining machine is determined according to the hardware requirements of the IPFS storage and the network requirements are not high, which can effectively save network resources. The storage mining machine has relatively high hardware requirements. The storage miner has collateral, and it runs continuously for 7*24*365 days. Once the power is cut off, the network is broken, the server hardware is damaged, etc., the collateral will be partially deducted or deducted.

(1) Type of architecture of IPFS storage mining machine:

a. Intel system for traditional data centers

b. Using ARM structure

(2) Several problems to be solved in the storage space of the IPFS mining machine:

a. Resolve the deletion of duplicate data

b. Solve data compression

c. Solve the self-healing of data

 

27. What is the IPFS search mining machine?

The IPFS search mining machine is a mining machine customized according to the search service. The speed and stability of the mining machine to the network, the fixed IP requirements are very high, and the hardware requirements are relatively low, which can also effectively save hardware. Resources.

 

28. Super-fusion technology in IPFS storage mining machine

The hyper-convergence concept refers to not only resources and technologies such as computing, network, storage, and server virtualization in the same unit (x86 server), but also cache acceleration, deduplication, online data compression, backup software, Elements such as snapshot technology, and multiple nodes can be aggregated through the network to achieve modular and seamless scale-out, forming a unified resource pool.

29, the difference between IPFS mining machine and Bitcoin mining machine

IPFS mining is the space capacity of the hard disk. Bitcoin mining is calculated by calculation. Therefore, the IPFS mining machine is relatively faster than the Bitcoin mining machine.

 

30, IPFS architecture – network layer introduction

The network layer is one of the cores in the IPFS architecture, and LibP2P can support any transport layer protocol. NAT technology allows devices on the internal network to share the same external network IP. This principle is used by home routers.

 

31, Filecoin consensus mechanism

It is the use of copy proof (Porep) as the core work function, and is summarized in the space-time certificate (Post), and has a secret leader (Sle) election structure.

(1) Copy proof (Porep)

a. The certifier is providing each copy of the physical resource data that is independent of each other, even if the certifier is capable of generating the data;

b. The prover P can prove to the verifier that P itself stores a specific copy of the data D, and the copy is not repeatedly stored in the same physical memory;

(2) Time and space certificate (Post)

a. Non-interactive proof, self-certification, interactive generation of a censorable proof chain;

b. Allow the prover P to concentrate the space certificate (or storage certificate) into the auditable record over time, which proves that P does consume space S (or store data D) and maintains a clear time T;

(3) Secret Leaders Election SLE – Fair Election; Verifiable; Avoid Bribery / Collusion / Corruption;

 

32. How to prevent deceptive behavior of evil miners in Filecoin

The secret leader election process is actually process identification (power fault tolerant PFT; copy proof; space time proof), value equivalence in the design of the pass, and mortgage margin mode. In other words – "no value, no parity", behavioral rewards that are conducive to network construction are deep, and two-way interactive verification or guarantee mode to prevent evil.

(1) Witch Attack: A bad miner pretends to physically store many copies (rewarding rewards) by creating multiple witch identities, but only once

(2) Outsourcing attacks: relying on the ability to quickly acquire data from other storage providers, and the miners may promise to store more data than their actual physical capacity.

(3) Generational attack: A bad miner may claim to store a large amount of data, instead they use a small program to efficiently generate a request. If the small program claims to store the data, the possibility that the miners will get the block reward in the file coin increases because it is directly proportional to the current usage of the miners.

 

33. How to motivate storage contributors in Filecoin

(1) The client initiates the storage data PUT behavior;

(2) storing the contributor to respond to the order;

(3) The order is successfully matched and recorded on the block;

(4) Contributors receive income.

 

34. Filecoin's economic model

(1) Real sharing economy, hard disk + Airbnb;

(2) Matching resources by the code of the consensus mechanism and the market agreement;

(3) Unlike the pseudo-sharing economy, it eventually became a third-party leasing company;

(4) All transactions are transparent and the pledged coins do not enter anyone's pocket;

(5) Storage prices vary with value around the market economy.

 

35. Will the same file in the IPFS network be backed up several times?

The backup is determined several times by the order. IPFS has the most basic backup mechanism. The default base redundancy is three copies of the same file. Although there is no limit, the market effect will make the extra redundancy not frequently accessed be stored. The party actively deletes.

"IPFS50Q" is the IPFSNEWS [IPFS Getting Started] section of the IPFS domain knowledge popularization section, which aims to bring you closer to technology through in-depth explanations.

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Bitcoin still hides its strength? Google and Facebook’s former executives say the actual market share of Bitcoin has reached 75%.

A former Google and Facebook executive claimed that Bitcoin actually accounts for a much larger percentage of the ent...

Blockchain

Babbitt column used by Suichang: Who is the real bitcoin

Since the birth of Bitcoin on August 1, 2017, since the birth of BCH, whoever is the real bitcoin has become a hot sp...

Market

📈 The Rise of Risky Assets: Bitcoin and Top Cryptocurrencies Analysis

The continued uptrend of Bitcoin could potentially support the rally of IMX, KAS, TIA, and STX.

Opinion

Blockchain rewards are about to halve, is it still worth investing in Bitcoin miners?

Although the halving will double the production costs of Bitcoin miners, Bitcoin mining stocks may still be a suitabl...

Bitcoin

Crypto Advocates Laud Bitcoin Mining as a Critical Tool for Clean Energy and Grid Stabilization!

Crypto experts are highlighting the importance of Bitcoin mining in promoting clean energy and balancing power grids.

Blockchain

The Secret History of Bitcoin: In which regions is Bitcoin more popular?

Source: Hash Pie Author: LucyCheng "Where is bitcoin more popular?" Is an interesting question; because the...