Epik Protocol Technical Architecture

About Epik Protocol
E
pik Protocol is a decentralized knowledge graph sharing network and storage protocol for AI data mainly in blockchain technology, Its envisions building a decentralized KG using blockchain technology with trust-able
storage, incentives, governance and financial capabilities; this creates a trusted, multi-party collaboration platform where all trusted contributors are rewarded fairly while preserving human knowledge at an affordable rate permanently, expanding the horizons of today’s AI, and will usher in the era of cognitive intelligence.

This article provides a view of Epik protocols technical architecture that enables it to achieve trusted capabilities of storage, incentives and finance. The sections of the technical architecture (Underlying storage, core components, smart contract, knowledge graph and gateway and open-source licensure) will be discussed below.

Epik Protocols Technical Architecture

With advancement in technology on a yearly basis makes it difficult for businesses to adapt this has created a growing need for technical architects. IT architect aligns business with technology. Architecture is a structure formed by systematically arranging simple components following rules. In the technological world, focus lies on technical rules which encompasses making sure that an application is compatible with an existent technology. Architecture diagrams are made by technical architects who are in charge of components of computer in an organization. These diagrams are compound schematics outlined by technical architecture to detect how hardware components are connected. Technical Architecture is a type of information technology architecture mainly to design computer systems and develop a technical framework to achieve important system requirements.

For Technical Architecture the purpose of a diagram is to provide a vast view of the institution IT infrastructure showing all system components, bridge the gaps in communication between co-workers and demonstrate effect of change. Commonly used diagrams include

1. Application Architecture diagram

2. Integration Architecture

3. Deployment Architecture

4. Data Architecture

5. DevOps Architecture

The blockchain architecture was created to prevent backdating of digital documents. This technique improves operational efficiency and saves cost. The architecture consists of a group of systems linked together instead of using a central server making it easy to run the same application simultaneously. It allows every member of the blockchain network to control the system. The transactions are arranged into a P2P network. Two data structures are involved which are Pointers (shows information about position of other variables) and Linked list (Blocks containing specific data that connects to another block using a pointer). Blockchains architecture can be

1. Public: Data and system access is available to any willing participant. Anyone can join and leave the public blockchain ecosystem at any time, enjoying the full access to read and write.

2. Private: Different from public, this is managed by authorized user

3. Consortium: Consists of a few organization set up and run by preliminary authorized users.

Underlying storage

Epik protocol uses a Filecoin decentralized storage technology. The underlying technology of filecoin is IPFS protocol a P2P network for data sharing and storage. The disturb devices are organized into a single file system by the protocol. The protocol also processes all files into a Merkle Trie structure forming a unique Root Rash to prevent duplication of stored data blocks and nodes. It also uses sector as the unit and utilizes proof of replication and proof of spacetime to ensure storage of complete data in a decentralized environment. Small bin-log files are produced during the collaboration process and stored on a customized filecoin layer 2 network. This bin-logs are accumulated into knowledge graph. This graph is transferred to Filecoin Layer 1 and stored.

Smart Contract

Smart contracts also known as chain codes run within a container environment. They are semi autonomous programs. During collaboration in Epik protocol, participants behaviors are recorded in an event status. The concensus is implemented in form of smart contracts (programmable rules that allow transaction to result from execution of user defined programs) It is essential for validation of new blocks and moving the blockchain in a decentralized digital currency .A triggered rule automatically rewards or reprimands the user. Smart contract ensures all new transactions comply with agreed concensus and allows embedment of collaboration model executed through private or consortium blockchain.
Epik protocol encodes on-chain incentive rules for each participant based on Filecoin Actor contract model

Core Component

Epik protocols core components are built over the underlying storage and are made up of concensus mechanism, virtual machine and ledger on chains. It uses an 8M sector size which is smaller compared to 32G Filecoin sector size to handle numerous number of small files. They are compatible with Filecoin Actor machine and Ethereum Virtual machine providing a link for existing application resources migration and integration of ETH community application resources e.g DAO (decentralize autonomous organization) dApps.

Knowledge Graph and Knowledge Gateway

Knowledge graph data flow has a domain experts.Bin-log files smaller than 8M are units of knowledge graph. Each bin-log contains series of ordered operations such as knowledge graph schema and n-tripple data in every domain. Domain expert uses generation tool and bin-log conversion to convert graph data to bin-log files. Domain experts upload bin log files that carries information to every operation in the file after which it is carried to each n-tripple data of knowledge graph. From above write up we see that the bin-log files are stored as knowledge blocks and nodes each of which are connected. Domain experts are mainly responsible for knowledge graph creation and increases available and accessible Bounty Hunters.

Open Source License

Epik protocol is a supporter of open source knowledge movement through the believe that it will promote effectiveness between AI and humans allowing domain experts that follow rules to contribute to knowledge graph data. Users of Epik can stake EPK in different domains without the permission of a centralized authority.Every domain expert has a right to a license that is attached to application information and stored in Epik Protocol.

Blockchain enthusiast//Blockchain Ambassador//Content writing.