Knights are the core operational units within the W3.io network, serving as the decentralized execution layer for recipes. Each Knight contributes computing power to facilitate customer-defined business processes while maintaining cryptographic verification of all operations.
Knight Participation
Knight Operators uphold the security of W3.io, earning token rewards for decentralized verification and execution of recipe components. Starting from the testnet launch, anyone can rent or own a Knight, making it easier than ever to help scale programmable intelligence on Web3.
This democratic approach to node operation distinguishes W3.io from other systems that require costly specialized hardware or significant capital investment. By lowering barriers to entry, we ensure a more diverse, resilient network while creating economic opportunities for participants worldwide.
Core Functions
Knights perform several critical functions within the network:
- Recipe Execution: Running the ingredients that make up recipes in response to triggers.
- Consensus Participation: Working with other Knights to verify the correctness of operations.
- State Management: Maintaining the state of variables within recipes during execution.
- Verifiability: Generating cryptographic proofs that operations were performed correctly.
- Distributed Task Queue: Participating in the decentralized task queue that distributes workloads.
Technical Architecture
Each Knight operates based on a uniform core code implemented in Rust, structured as an event-driven finite state machine. This architecture is optimized for efficiency, security, and reliability, with components including:
- LibP2P Networking Stack: Facilitates node-to-node communication across the network.
- Core State Machine: Manages operations based on incoming events.
- Configuration System: Adapts to the hardware specifications of the node.
- Metrics System: Monitors performance and participation in the network.
- Plugins: Extends functionality based on available hardware resources.
Knight Network
The Knights Network forms a mesh of interconnected nodes that collectively execute recipes. As shown in the diagram, when a recipe is deployed to the network:
- The recipe file (depicted as a red document) is distributed to the network.
- Relevant Knights form consensus groups to execute different parts of the recipe.
- As execution progresses, verification occurs at each step (shown as checkmark icons).
- Token rewards (depicted as dollar signs) are distributed to Knights based on their contributions.
This process ensures that complex workflows can be executed in a decentralized, verifiable manner while maintaining the performance characteristics needed for business applications.
High Availability (HA) Nodes represent the premium tier of Knights within the W3.io network, designed to offer enterprise-grade reliability with a target of 99.999% uptime ("five nines"). These nodes form the backbone of mission-critical operations where consistency and dependability are paramount.
Enhanced Capabilities
HA Nodes are equipped with advanced compute resources that may include:
- Trusted Execution Environments (TEEs): Isolated execution spaces that protect sensitive computations.
- Graphics Processing Units (GPUs): For AI inference and other specialized computational tasks.
- Substantial Storage: For handling large datasets and maintaining historical records.
- High-Performance CPUs: For rapid processing of complex computational tasks.
- Redundant Systems: To ensure continuity of service even during hardware failures.
Role in the Network
HA Nodes play several specialized roles within the W3.io ecosystem:
- Critical Task Execution: Handling the most sensitive or time-critical operations.
- Secure Key Management: Storing and managing cryptographic keys for transaction signing.
- Automated Transaction Signing: Performing fully automated, secure transaction signing.
- Network Stability: Providing a stable foundation for the entire Knight network.
Security Considerations
Security is paramount for HA Nodes, which incorporate multiple layers of protection:
- Physical Security: Deployment in secure data centers with controlled access.
- Network Security: Advanced firewalls and intrusion detection systems.
- Cryptographic Security: Robust key management and encryption protocols.
- Audit Logging: Comprehensive logging of all activities for accountability.
By providing this premium tier of service, HA Nodes ensure that even the most demanding enterprise applications can rely on the W3.io network for mission-critical operations, bridging the gap between traditional IT reliability expectations and the benefits of decentralized architecture.