FAQs

Find below a series of Frequently Asked Questions. If you have further questions about ICN don't hesitate to reach out.

What is the Impossible Cloud Network and how does it work?

The Impossible Cloud Network (ICN) Protocol is a decentralized cloud infrastructure designed to connect enterprise-grade hardware and service providers in a robust, scalable network. By leveraging Service-Level Agreement (SLA) oracles, ICN ensures high performance and reliability, enabling cloud services with the transparency and security of decentralized technology.

The ICN Protocol rewards node operators and providers based on their contributions and network demand, fostering a dynamic and engaged ecosystem. Built for Web3, ICN offers a community-driven, enterprise-grade alternative to traditional cloud providers, prioritizing performance, reliability, and openness for all users.

What are the benefits of using the ICN compared to existing services?

The ICN offers several benefits over traditional cloud services. It provides high-performant cloud products with better data security, integrity, and resiliency. By leveraging decentralized technologies, it eliminates vendor lock-in and promotes an open, community-driven platform for cloud infrastructure management. Additionally, the ICN's transparent marketplace ensures efficient allocation of resources and competitive pricing.

Can you explain the role of Hardware Providers (HP) and Service Providers (SP)?

Hardware Providers (HP) dedicate hardware resources to the ICN network, ensuring its robustness and scalability. They commit capacity to the network and run node software to serve requests from Service Providers (SP). Service Providers design and deliver cloud products, leveraging the ICN's decentralized architecture to create innovative services for their customers.

What is ICN Protocol?

The ICN Protocol (ICNP) functions as a coordination and network formation protocol for hardware nodes in the ICN network. It incentivizes node participation through reward structures based on demand needs and network performance. ICNP includes a capacity marketplace where Service Providers can access dedicated hardware capacity through a tendering and reverse auction process.

How is data security addressed in the ICN?

Data security in the ICN is addressed through decentralized technologies and encryption mechanisms. The network's decentralized architecture ensures better data security, integrity, and resiliency compared to traditional systems. Additionally, hardware performance is continuously monitored, and anomalies are reported and addressed on an incentivization level, enhancing overall data security and reliability.

Last updated