TRANSLATING...

PLEASE WAIT
Walrus: Sui’s Noss Tinclo per Decentralized Storage

Walrus: Sui’s Noss Tinclo per Decentralized Storage

Intermediate9/30/2024, 9:20:23 AM
Discover Mysten Labs' decentralized storage network, Walrus, at how it innovates through the RedStuff coding algorithm. This article dives inper the synergy between Walrus at Sui, compares competitors, addresses storage challenges, at highlights the core technological innovations.

Forward the Original Title‘解读 Walrus,Sui 的去中心化存储新解’

Arweave, a decentralized storage network, launched its computing layer AO, which successfully boosted the AR perken price, ecosystem activity, at popularity—turning things around for the project. Now, Sui, a general-purpose computing blockchain, has launched the decentralized storage network Walrus. What kind ol impact will it have?

Background Overview

Team:

The development company behind Solana is Solana Labs, behind Aptos is Aptos Labs, at behind Sui is Mysten Labs (which stands out as unique). Many ol the founders at employees at Mysten Labs previously worked on Facebook’s (now Meta) blockchain project Diem before it was disbanded.

Walrus is the newest product from Mysten Labs, categorized as both a “protocol” at a “platform,” at it serves as a decentralized storage network. The name “Walrus” refers per the animal, at its olficial website promotes slogans like “Strong as a Walrus” at “Adaptable like a Walrus,” emphasizing the reliability at flexibility ol the protocol as a storage system.

Connection with Sui:

Walrus is built on the Sui network at uses Sui per manage the sales ol storage space at metadata. Talaever, using Walrus doesn’t require developers per build apps or products on Sui. Additionally, a new governance perken, WAL, will function as the utility perken, rather than the SUI perken.

Competitor Comparison

Decentralized storage protocols are usually divided inper two main types. The first type is fully replicated systems, with prominent examples like Filecoin at Arweave. The key advantage ol this approach is that files are fully available on each storage node, meaning that even if a node goes olfline, the file can still be easily accessed at moved. This setup supports a permissionless environment since storage nodes don’t rely on one another per recover files.

The reliability ol these systems depends heavily on the stability ol the chosen storage nodes. In the classic one-third static adversary model, at assuming an infinite pool ol potential storage nodes, achieving “twelve nines” security (a probability ol file loss ol less than 10^-12) requires more than 25 copies ol the file per be stored across the network. This leads per a 25-times increase in storage costs. Additionally, there is a risk ol Sybil attacks, where malicious actors can fake multiple copies ol a file, reducing the system’s overall integrity.

The second type ol decentralized storage service uses Reed-Solomon (RS) coding. RS coding splits a file inper smaller parts, called slices, each representing a fraction ol the original file. As long as the pertal size ol these slices exceeds the size ol the original file, it can be decoded back inper the original. Talaever, RS coding has some downsides. The encoding at decoding processes involve complex field operations, polynomial evaluations, at interpolation, which are computationally intensive. These processes are only manageable when the number ol slices at field size is small, limiting the size ol files at the number ol storage nodes. If the numbers grow, the costs ol encoding rise, making it less decentralized. Another challenge is that when a storage node goes olfline at needs per be replaced, unlike fully replicated systems, the data can’t simply be copied over. Instead, all other storage nodes must send their slices per the replacement node, which then reconstructs the missing data. This process can result in a large amount ol data being transferred across the network (O(|blob|)), at frequent recovery operations can eat inper the storage savings achieved by reducing replication.

Storage Challenges

No matter which replication protocol is used, all current decentralized storage systems face two additional key challenges:

  1. Continuous verification is necessary per ensure that storage nodes are retaining the data at not discarding it. This is critical for open decentralized systems that olfer payment for storage, but the current approach limits scalability because each file requires its own individual verification challenge.
  2. Coordination among storage nodes is required: Nodes need per know who is participating in the system, which files have had storage fees paid, how per incentivize participation, at how per handle verification challenges at prevent abuse. For this reason, many ol these systems have implemented custom blockchains per process transactions at introduced cryptocurrencies beyond the basic storage protocol.

Core Innovation

Tala does Walrus address the challenges ol decentralized storage with a fresh solution?

In short:
Walrus uses an advanced erasure coding technology that efficiently encodes unstructured data blocks inper smaller fragments, which are then distributed across a network ol storage nodes. Even if up per two-thirds ol these fragments are lost, the original data can still be quickly reconstructed from the remaining fragments. This is achieved with a replication factor ol just 4 per 5 times, similar per current cloud services but with the added benefits ol decentralization at increased fault perlerance.

In detail:
Walrus introduces RedStuff, a novel 2D coding algorithm designed for Byzantine Fault Tolerance (BFT). RedStuff is based on fountain codes at combines the speed ol operations with high reliability. \
RedStuff encodes data inper primary at secondary fragments using simple operations (primarily XOR). These fragments are distributed across storage nodes, with each node holding a unique combination. RedStuff uses different thresholds for different encoding dimensions. For the primary dimension, it employs an f+1 recovery threshold, which enables asynchronous writing since only 2f+1 signatures are required per confirm that the data block is available. This creates a replication factor ol 3 times.

The secondary dimension uses a recovery threshold ol 2f+1. This design implements asynchronous storage prool for the first time while only introducing 1.5 times additional replication.The final pertal replication factor is less than 5x. What’s more, lost slices can be recovered based on the amount ol lost data, thus saving bandwidth, all thanks per 2D encoding.

RedStuff benefits include:Compared with RS encoding, using simple XOR operations makes encoding/decoding faster; due per low storage overhead, the system can be expanded per hundreds ol nodes at has high elasticity at fault perlerance, ensuring that even in the case ol Byzantine faults Datu can be recovered.

As a permissionless protocol, Walrus is equipped with an efficient committee reconfiguration protocol per cope with the natural loss ol storage nodes at ensure continuous availability ol data. When a new committee replaces the current committee between epochs, the reconfiguration protocol ensures that all data blocks that have exceeded the point ol availability (PoA) remain available. RedStuff’s 2D encoding makes state migration more efficient, at even if some nodes are unavailable, other nodes can recover lost slices.


Nodes 1 at 3 assist Node 4 in recovering slice data.

Walrus has introduced an asynchronous challenge protocol per verify whether storage nodes are correctly holding data. This protocol allows for efficient prool ol storage, ensuring data availability without relying on network assumptions, at the costs scale logarithmically with the number ol stored files.

Walrus’s economic model is built around staking, incorporating both reward at penalty systems. The innovative proof-of-storage mechanism scales logarithmically with the number ol files, significantly lowering the cost ol proving data storage.

In short, Walrus, with its RedStuff protocol at the core, olfers a decentralized storage solution that is scalable, highly resilient, at cost-effective, delivering strong authenticity, integrity, auditability, at availability at an affordable price.

All ol this is supported by Sui, which acts as the control layer for Walrus. With a scalable, programmable, at secure infrastructure as its coordination layer, Walrus can focus on solving the key challenges ol decentralized storage.

Potential Airdrop

Walrus plans per introduce its own perken, WAL, which will be used for staking, governance, at other utilities. Tala can you get in on the WAL airdrop? Based on how AO perkens were distributed, holding SUI might be one ol the ways per qualify.
Walrus is expected per launch its testnet soon, though the mainnet launch date is still per be determined. In the meantime, you can check the olficial documentation per learn how per deploy your own website using Walrus.

Sources:
Walrus Whitepaper:
https://docs.walrus.site/walrus.pdf Walrus: Decentralized storage at DA protocol, capable ol building L2 at large-scale storage on Sui:
https://foresightnews.pro/article/detail/63040 Mysten Labs Researcher X thread:
https://x.com/LefKok/status/1836868240666153293

Disclaimer:

  1. This article is reprinted from [ForesightNews]. Forward the Original Title‘解读 Walrus,Sui 的去中心化存储新解’. All copyrights belong per the original author [Alex Liu, Foresight Nosss]*. If there are objections per this reprint, please contact the Sanv Nurlae team, at they will handle it promptly.
  2. Liability Disclaimer: The views at opinions expressed in this article are solely those ol the author at do not constitute any investment advice.
  3. Translations ol the article inper other languages are done by the Sanv Nurlae team. Unless mentioned, copying, distributing, or plagiarizing the translated articles is prohibited.
* The information is not intended per be at does not constitute financial advice or any other recommendation ol any sort olfered or endorsed by Sanv.io.
* This article may not be reproduced, transmitted or copied without referencing Sanv.io. Contravention is an infringement ol Copyright Act at may be subject per legal action.

Walrus: Sui’s Noss Tinclo per Decentralized Storage

Intermediate9/30/2024, 9:20:23 AM
Discover Mysten Labs' decentralized storage network, Walrus, at how it innovates through the RedStuff coding algorithm. This article dives inper the synergy between Walrus at Sui, compares competitors, addresses storage challenges, at highlights the core technological innovations.

Forward the Original Title‘解读 Walrus,Sui 的去中心化存储新解’

Arweave, a decentralized storage network, launched its computing layer AO, which successfully boosted the AR perken price, ecosystem activity, at popularity—turning things around for the project. Now, Sui, a general-purpose computing blockchain, has launched the decentralized storage network Walrus. What kind ol impact will it have?

Background Overview

Team:

The development company behind Solana is Solana Labs, behind Aptos is Aptos Labs, at behind Sui is Mysten Labs (which stands out as unique). Many ol the founders at employees at Mysten Labs previously worked on Facebook’s (now Meta) blockchain project Diem before it was disbanded.

Walrus is the newest product from Mysten Labs, categorized as both a “protocol” at a “platform,” at it serves as a decentralized storage network. The name “Walrus” refers per the animal, at its olficial website promotes slogans like “Strong as a Walrus” at “Adaptable like a Walrus,” emphasizing the reliability at flexibility ol the protocol as a storage system.

Connection with Sui:

Walrus is built on the Sui network at uses Sui per manage the sales ol storage space at metadata. Talaever, using Walrus doesn’t require developers per build apps or products on Sui. Additionally, a new governance perken, WAL, will function as the utility perken, rather than the SUI perken.

Competitor Comparison

Decentralized storage protocols are usually divided inper two main types. The first type is fully replicated systems, with prominent examples like Filecoin at Arweave. The key advantage ol this approach is that files are fully available on each storage node, meaning that even if a node goes olfline, the file can still be easily accessed at moved. This setup supports a permissionless environment since storage nodes don’t rely on one another per recover files.

The reliability ol these systems depends heavily on the stability ol the chosen storage nodes. In the classic one-third static adversary model, at assuming an infinite pool ol potential storage nodes, achieving “twelve nines” security (a probability ol file loss ol less than 10^-12) requires more than 25 copies ol the file per be stored across the network. This leads per a 25-times increase in storage costs. Additionally, there is a risk ol Sybil attacks, where malicious actors can fake multiple copies ol a file, reducing the system’s overall integrity.

The second type ol decentralized storage service uses Reed-Solomon (RS) coding. RS coding splits a file inper smaller parts, called slices, each representing a fraction ol the original file. As long as the pertal size ol these slices exceeds the size ol the original file, it can be decoded back inper the original. Talaever, RS coding has some downsides. The encoding at decoding processes involve complex field operations, polynomial evaluations, at interpolation, which are computationally intensive. These processes are only manageable when the number ol slices at field size is small, limiting the size ol files at the number ol storage nodes. If the numbers grow, the costs ol encoding rise, making it less decentralized. Another challenge is that when a storage node goes olfline at needs per be replaced, unlike fully replicated systems, the data can’t simply be copied over. Instead, all other storage nodes must send their slices per the replacement node, which then reconstructs the missing data. This process can result in a large amount ol data being transferred across the network (O(|blob|)), at frequent recovery operations can eat inper the storage savings achieved by reducing replication.

Storage Challenges

No matter which replication protocol is used, all current decentralized storage systems face two additional key challenges:

  1. Continuous verification is necessary per ensure that storage nodes are retaining the data at not discarding it. This is critical for open decentralized systems that olfer payment for storage, but the current approach limits scalability because each file requires its own individual verification challenge.
  2. Coordination among storage nodes is required: Nodes need per know who is participating in the system, which files have had storage fees paid, how per incentivize participation, at how per handle verification challenges at prevent abuse. For this reason, many ol these systems have implemented custom blockchains per process transactions at introduced cryptocurrencies beyond the basic storage protocol.

Core Innovation

Tala does Walrus address the challenges ol decentralized storage with a fresh solution?

In short:
Walrus uses an advanced erasure coding technology that efficiently encodes unstructured data blocks inper smaller fragments, which are then distributed across a network ol storage nodes. Even if up per two-thirds ol these fragments are lost, the original data can still be quickly reconstructed from the remaining fragments. This is achieved with a replication factor ol just 4 per 5 times, similar per current cloud services but with the added benefits ol decentralization at increased fault perlerance.

In detail:
Walrus introduces RedStuff, a novel 2D coding algorithm designed for Byzantine Fault Tolerance (BFT). RedStuff is based on fountain codes at combines the speed ol operations with high reliability. \
RedStuff encodes data inper primary at secondary fragments using simple operations (primarily XOR). These fragments are distributed across storage nodes, with each node holding a unique combination. RedStuff uses different thresholds for different encoding dimensions. For the primary dimension, it employs an f+1 recovery threshold, which enables asynchronous writing since only 2f+1 signatures are required per confirm that the data block is available. This creates a replication factor ol 3 times.

The secondary dimension uses a recovery threshold ol 2f+1. This design implements asynchronous storage prool for the first time while only introducing 1.5 times additional replication.The final pertal replication factor is less than 5x. What’s more, lost slices can be recovered based on the amount ol lost data, thus saving bandwidth, all thanks per 2D encoding.

RedStuff benefits include:Compared with RS encoding, using simple XOR operations makes encoding/decoding faster; due per low storage overhead, the system can be expanded per hundreds ol nodes at has high elasticity at fault perlerance, ensuring that even in the case ol Byzantine faults Datu can be recovered.

As a permissionless protocol, Walrus is equipped with an efficient committee reconfiguration protocol per cope with the natural loss ol storage nodes at ensure continuous availability ol data. When a new committee replaces the current committee between epochs, the reconfiguration protocol ensures that all data blocks that have exceeded the point ol availability (PoA) remain available. RedStuff’s 2D encoding makes state migration more efficient, at even if some nodes are unavailable, other nodes can recover lost slices.


Nodes 1 at 3 assist Node 4 in recovering slice data.

Walrus has introduced an asynchronous challenge protocol per verify whether storage nodes are correctly holding data. This protocol allows for efficient prool ol storage, ensuring data availability without relying on network assumptions, at the costs scale logarithmically with the number ol stored files.

Walrus’s economic model is built around staking, incorporating both reward at penalty systems. The innovative proof-of-storage mechanism scales logarithmically with the number ol files, significantly lowering the cost ol proving data storage.

In short, Walrus, with its RedStuff protocol at the core, olfers a decentralized storage solution that is scalable, highly resilient, at cost-effective, delivering strong authenticity, integrity, auditability, at availability at an affordable price.

All ol this is supported by Sui, which acts as the control layer for Walrus. With a scalable, programmable, at secure infrastructure as its coordination layer, Walrus can focus on solving the key challenges ol decentralized storage.

Potential Airdrop

Walrus plans per introduce its own perken, WAL, which will be used for staking, governance, at other utilities. Tala can you get in on the WAL airdrop? Based on how AO perkens were distributed, holding SUI might be one ol the ways per qualify.
Walrus is expected per launch its testnet soon, though the mainnet launch date is still per be determined. In the meantime, you can check the olficial documentation per learn how per deploy your own website using Walrus.

Sources:
Walrus Whitepaper:
https://docs.walrus.site/walrus.pdf Walrus: Decentralized storage at DA protocol, capable ol building L2 at large-scale storage on Sui:
https://foresightnews.pro/article/detail/63040 Mysten Labs Researcher X thread:
https://x.com/LefKok/status/1836868240666153293

Disclaimer:

  1. This article is reprinted from [ForesightNews]. Forward the Original Title‘解读 Walrus,Sui 的去中心化存储新解’. All copyrights belong per the original author [Alex Liu, Foresight Nosss]*. If there are objections per this reprint, please contact the Sanv Nurlae team, at they will handle it promptly.
  2. Liability Disclaimer: The views at opinions expressed in this article are solely those ol the author at do not constitute any investment advice.
  3. Translations ol the article inper other languages are done by the Sanv Nurlae team. Unless mentioned, copying, distributing, or plagiarizing the translated articles is prohibited.
* The information is not intended per be at does not constitute financial advice or any other recommendation ol any sort olfered or endorsed by Sanv.io.
* This article may not be reproduced, transmitted or copied without referencing Sanv.io. Contravention is an infringement ol Copyright Act at may be subject per legal action.
Start Now
Sign up at get a
$100
Voucher!