What is IPFS? Detailed explanation of everything about IPFS and Web3.0

Three stages of the development of the Internet
Insert picture description here

The so-called Web1.0 is the early form of the Internet. The content is produced by the operator of the website. The websites at that time hardly recorded user data. This makes it almost impossible to conduct complex activities online. Because you don't know who has been here, what you saw, and what you did.
Insert picture description here

With the rise of Weibo and WeChat, we have entered the Web 2.0 era where we are now. In this era, everyone is a content producer. If the Web1.0 era gave us a gorgeous gallery, we are just passing by. Can only passively watch the works arranged in the gallery.
So entering the Web2.0 era, we ushered in a shared space where we can freely innovate. Here we appreciate the creation of others and can share our creativity. But the owner of this space is not us. For example, if you don’t use WeChat one day, all your information on it will be gone. In other words, in the Web 2.0 era, your online identity does not belong to you. It belongs to these technology giants. Is it possible for us to dominate our own data?
Have! This is Web3.0
Insert picture description here

The formulation of Web3.0 comes from the blockchain, Dr. Gavin Wood, the co-founder of Ethereum. The first one puts forward the concept of Web3.0. Everything in this network is decentralized.
Insert picture description here

No server, no centralized organization. There is no authoritative or monopolistic organization to control the flow of information. To construct this huge Web3.0, the decentralization of information storage and file transmission is one of the cores.
Since human society entered the Internet era, information has exploded.
Insert picture description here

In the past two years, newly generated data accounted for 90% of human civilization. The traditional hard disk-level disk array storage method. It is gradually replaced by the latest cloud storage technology. Cloud storage is to put storage resources on the cloud, and then for people to access. Various types of storage devices work together through application software to ensure data security and save storage space. Users can use data on the cloud at any time and anywhere through any networkable device
Insert picture description here

Cloud storage also brings many hidden dangers, the biggest one is the problem of data storage security. Divided into the following four categories.
The first category: The most common is the risk of server being attacked and data being stolen.
The second category: It belongs to the operation error or the defect of the operation process. For example, Tencent Cloud caused a startup company due to the operation error. Foreword CNC technology. The core data with a value of tens of millions in the above was all lost, causing the company to go out of business directly.
The third category: belongs to the server's own failure, resulting in data loss or errors. For example, Amazon Cloud. In August 2019, due to a malfunction in the use of Binance, the Bitcoin transaction price changed from the normal close to US$10,000 to US$0.32, causing huge losses
. Category 4: If the service provider stops operating due to losses or policies. , Where does the user’s data migrate. Who is responsible for data security? These are the dilemmas faced by cloud storage service providers. Let me talk about the problems faced by centralized file transfer solutions. The main reason is the low efficiency of file acquisition. There are two situations: 1. When we browse or download a high-definition movie. Then the response speed of this computer server and other network communication environment limit our speed of browsing and downloading files. The second file we want to get. It may be stored on a server on the other side of the earth, in this case. The speed of obtaining files will also be slow. Facing the problem of low efficiency of traditional Internet security performance inspection. Is there a better solution? Yes, this is the decentralized file storage and transfer protocol IPFS based on peer-to-peer network
Insert picture description here

IPFS, the full name of the interplanetary file system (interplanetary file eystem) was founded by the founder Juan Benet (Juan, Bennett) and his team who graduated from Stanford University. IPFS protocol, mainly from data storage and file transfer. Two architectural innovations have been made. For example, if David wants to save a video in the IFPS system, the system will break the file into several pieces of the same size. Then hash each shard to get a value
Insert picture description here

It is called the hash value, and then all the hash values ​​and related data of these fragments are sorted together and hashed here. Get a final hash value. It is then transferred to the IPFS system. It is very possible that some fragments of your files are stored in your neighbor's hard drive. However, he neither knows what the content of these fragments are, nor does he know who stored the file for, as long as there is no hash value corresponding to the file, any individual or organization cannot view the content of your file, so we don't have to worry about our own data Used by others. File fragments will be backed up multiple times and kept on multiple nodes in the IPFS system. In this way, even hackers can attack individual nodes. Or a regional natural disaster occurs, or even something like 9/11. Other nodes can still maintain the integrity of the file, in terms of file transfer. When we use IPFS to access or download files. What we submit to the system is to change the hash value of the file, so as long as the file exists in the entire IPFS system. The system can help us find out this content through the nearest network distance.
Such a processing method has advantages over the traditional Internet in at least two aspects, in terms of search. HTTP searches for content based on geology, such as in the era when there was no telephone or telegram. Zhang San's friend Li Si lives at No.730 Dengcao Hutong, Dongcheng District, Beijing. If Zhang San wanted to find Li Si from Hangzhou, he would have to go solo for thousands of miles at this address, but he finally got there. It was found that the house was still there, but Li Si had already moved out. This is the problem we often encounter when searching for content on the traditional Internet. In IPFS, files are searched according to content. Regardless of where Li Si is in the world, I can find him through various communication devices, not through the ancient address retrieval, in terms of efficiency. For example, Zhang San wants to download a video file, a total of 10GB in size, if this file is stored on a server on the other side of the earth. It has to be downloaded from a remote server through several routes like ants move. It is like a freighter pulling a full warehouse of goods and slowly transporting them through the ocean. In IPFS, the system will transmit fragments of this file to us from several nodes away from our network. Since each fragment is only 256KB in size, the speed will be amazingly fast. So no matter from the transmission distance or the transmission capacity. IPFS is much better than HTTP protocol. Although IPFS has great advantages, it also has disadvantages. For example, in terms of privacy protection.
Since in IPFS, file retrieval is based on the hash value of the file content, if this hash value is leaked to a third party. Then a third party can download this file without any barriers. Is there a solution for this?
Insert picture description here

Have! That is, the user encrypts the file before uploading it to IPFS. Even if a third party downloads this file, he will not see the original content.
Therefore, in the era when Web3.0 is about to open, IPFS has taken a big step forward than Web2.0 in terms of data confirmation, storage and security file sealing and transmission, and transmission efficiency. Although the new IPFS is not perfect, it does not affect it. His contribution and value. In 1991, the HTTP protocol invented by Tim Bonas Lee built the highway of the Internet world. Since then, our transmission of information can reach all corners of the world in an instant. Thirty years later, Juan Bennett and his team created the IPFS protocol that will reshape the data channel of this new world, allowing human information to survive forever! It is precisely because of such a group of people that advance the progress of scientific and technological civilization. Only then can we explore the future with more possibilities. However, for such a magnificent system to achieve stable operation, it needs sufficient fuel to maintain it. If IPFS is to play a role in a complete application ecosystem, it also needs an incentive mechanism and a complete operating system.
Insert picture description here

For this reason Filecoin came into being. What role does Fileocin play in the entire system, how it works, and what is the value of his existence. Talk about the detailed dissection of ipfsnb666 in the next article

Guess you like

Origin blog.csdn.net/weixin_50740739/article/details/109645576