How it works?
FileSonic is built on top of the InterPlanetary File System (IPFS), a decentralized, peer-to-peer storage protocol that distributes files across a network of nodes.
Last updated
FileSonic is built on top of the InterPlanetary File System (IPFS), a decentralized, peer-to-peer storage protocol that distributes files across a network of nodes.
Last updated
Files are broken down into smaller pieces called shards and distributed across multiple nodes in the network.
Storing large files in their entirety on multiple nodes can be inefficient and costly. To address this challenge, decentralized file storage systems employ a technique called data fragmentation, where files are broken down into smaller pieces called shards. These shards are then distributed across a network of interconnected nodes. This approach offers several advantages:
Reduced storage requirements: By fragmenting files, the storage requirements for each node are significantly reduced.
Improved performance: Sharding allows for faster file retrieval and uploads, as multiple nodes can contribute to serving the same file.
Enhanced data availability: Even if a few nodes go offline, the remaining nodes can still reassemble the file from the available shards, ensuring data availability.
To ensure data availability, multiple copies of each shard are stored across different nodes, protecting against data loss in case of node failures.
To ensure data durability and prevent data loss in case of node failures, decentralized file storage systems employ data redundancy. This involves storing multiple copies of each shard across different nodes in the network. The number of copies stored can vary depending on the specific implementation, but it typically ranges from three to five copies. This redundancy mechanism ensures that even if some nodes fail, there will always be enough copies of each shard to reconstruct the original file.
The network employs cryptographic mechanisms to verify the authenticity and integrity of each shard, guaranteeing that data remains unaltered and reliable.
To prevent data corruption or tampering, decentralized file storage systems employ cryptographic mechanisms to verify the authenticity and integrity of each shard. These mechanisms involve embedding cryptographic signatures or hash values within each shard. When a node receives a shard, it can verify its authenticity by verifying the signature or comparing the hash value to a known reference value. If the verification fails, the shard is discarded to prevent the propagation of corrupted data.
Decentralized file storage systems rely on the active participation of users to maintain the network infrastructure. To incentivize users to contribute their storage space and participate in network maintenance, these systems typically employ tokenized economies. Users earn native tokens for providing storage space, sharing files, or participating in network governance. These tokens can be used to purchase additional storage capacity, trade NFTs, or exchange for fiat currency. This tokenized economy provides a financial incentive for users to contribute to the network, ensuring its long-term sustainability.