FAQs
Find below a series of Frequently Asked Questions. If you have further questions about ICN don't hesitate to reach out.
Last updated
Find below a series of Frequently Asked Questions. If you have further questions about ICN don't hesitate to reach out.
Last updated
The Impossible Cloud Network (ICN) Protocol is a decentralized cloud infrastructure designed to connect enterprise-grade hardware and application builders in a robust, scalable network. By leveraging an interconnected guardian network known as the HyperNodes, ICN ensures high performance and reliability, enabling cloud services with the transparency and security of decentralized technology.
The ICN Protocol (ICNP) functions as a coordination and network formation protocol between hardware resources and software deployers in the ICN network. It incentivizes node participation through reward structures based on demand needs and network performance. ICNP includes a capacity marketplace where Builders can access dedicated hardware capacity. This protocol is mechanized through a robust security and economic incentive that ensures a performance yet robust infrastructure layer.
The ICN Protocol rewards node operators and providers based on their contributions and network demand, fostering a dynamic and engaged ecosystem. Built for Web3, ICN offers a community-driven, enterprise-grade alternative to traditional cloud providers, prioritizing performance, reliability, and openness for all users.
HyperNodes and the ICN Link stakers thereof are rewarded for protecting the integrity of the ScalerNode performance, while ScalerNodes are rewarded for providing core infrastructure resources to the ICN network. Together these nodes form a decentralized ecosystem that can rival modern hyperscalers.
ICN has three core-infrastructure layers:
Hardware Network
HyperNode Network
System Layer
The hardware network is a decentralized resource pool of computing resources available globally and operated independently. They feed an ever-growing network of capabilities in the ICN infrastructure that can be accessed by anyone for any need. Applications and services can then be deployed and operated on top of the hardware network through the System Layer.
The system layer is a software abstraction layer that operates on top of the hardware network. When resources are booked and allocated to a Builder, they are composed together to create a single machine instance that provides a system layer to allow deployment of any software. This can range from Web2 applications and cloud services to Web3 protocols and Dapps.
All of this is tied together through the HyperNode network, an interconnected guardian network that protects ICN.
The HyperNodes are a network of decentralized protectors in the ICN Protocol. They monitor and guard our network of resources to ensure a secure and robust hardware layer. The HyperNodes are a core part of the system and play a crucial role in maintaining the infrastructure of the future. This protects our global resource network and upholds the performance thresholds for all ScalerNodes.
HyperNodes can be operated from any location and on any device that can support it. It is lightweight and operators & stakers can earn for contributing to the security of the ICN Protocol.
ScalerNodes are the core units of individual hardware that make up our hardware network. Each ScalerNode can be of any hardware class providing capabilities to our system in storage, compute, networking or memory resources. ScalerNodes are provided by Hardware Providers globally and are secured through collateralization and slashing mechanisms.
ScalerNodes can be allocated to Builders that rent resources from the network for deployment of applications and services. They are modular units that can be composed together to create a configurable resource block to run any desired systems inside.
ScalerNodes earn rewards for providing resources to the network and additional rewards when they are allocated for usage.
Learn how to and provide ScalerNodes.
As of today ICN is primarily comprised of storage class ScalerNodes.
We are actively onboarding hardware providers to expand into additional classes of ScalerNodes in the near future to extend the capabilities of the hardware network.
HyperNodes are the guardians of the network. They are a 24/7 constant scouting system that monitors all ScalerNodes across the hardware network. Depending on the resource class of the ScalerNode, the HyperNode will adjust its challenges to check and verify the claimed performance and capabilities of each ScalerNode.
HyperNodes sign and publish their reports to the Satellite network where a transparent timeline of records reflect the behaviour of the hardware network at all points in time, allowing any actor to verify and track the ScalerNodes.
The Satellite Network is a 24/7 availability network that stores and allows access to published records about the ICN protocol.
HyperNodes that verify ScalerNodes post results on-chain and the report data used to verify those results are stored off-chain, in the Satellite Network enabling any party to validate the result. Since data is expensive on-chain, only summarized results are submitted there for usage, and the full plain text reports are thus committed instead to the Satellite Network.
The ICN Link is an ERC-721 NFT token that is a core component of securing our system. ICN Link holders can stake their Link to nodes to ICN which links their vesting security collateral to the operation of the node that is staked to. They can be staked to either HyperNodes or ScalerNodes.
ICN Link holders that stake will earn rewards during the period of their staking as part of contributing to the operation of the nodes. Each Link has a “time-to-live” (TTL) value that captures 48 months of vested security inside. As the Link is staked, this TTL vests as rewards that are claimable as long as the staked node performs work correctly. The more security is staked to nodes in the ICN ecosystem, the greater collateral and security the system has as a whole.
The ICN offers several benefits over traditional cloud services. It provides high-performant cloud products with better data security, integrity, and resiliency. By leveraging decentralized technologies, it eliminates vendor lock-in and promotes an open, community-driven platform for cloud infrastructure management. Additionally, the ICN's transparent marketplace ensures efficient allocation of resources and competitive pricing.
Hardware Providers (HP) dedicate hardware resources to the ICN network, ensuring its robustness and scalability. They commit capacity to the network and run node software to serve requests from Builders. Builders design and deliver services, applications or cloud products, leveraging the ICN's decentralized architecture to create innovative services for their customers.
Data security in the ICN is addressed through decentralized technologies and encryption mechanisms subject to functional needs. The network's decentralized architecture ensures better data security, integrity, and resiliency compared to traditional systems and is configurable dependent on the data behaviour properties required by the overarching application.
Data replication, information flows, storage etc. are all managed based on tailored rules defined by Hardware Providers’ ScalerNodes offering a diverse optionality of data management schemes to fit the intended use-case. Additionally, hardware performance is continuously monitored, and anomalies are reported and addressed on an incentivization level, enhancing overall data security and reliability. Crucially ICN does not sit in the Builder's application datapath so we 1. Do not affect performance and 2. Do not become a single-point-of-failure.