Data Mesh Layer
Last updated
Last updated
The Data Mesh Layer provides a comprehensive framework for ubiquitous data sharing and exchange across both Web2.0 and Web3 environments, enabling seamless cross-platform integration.
Within the architecture, Data Products serve as fundamental deployment units for cross-organizational data exchange. Users with appropriate permissions can access these Data Products as data consumers, creating a flexible and secure data ecosystem.
Individuals and organizations maintain the autonomy to host their Data Products in environments of their choice, while incorporating and aggregating data from THXNET. or alternative sources. These Data Products are implemented as APIs or web forms, ensuring accessibility and standardization.
We provide comprehensive tools in both CLI and GUI to facilitate Data Product creation. During development, these tools generate WebAssembly (WASM) binaries for each Data Product, which are subsequently executed within the WASM Runtime powered by Agnostic Mesh technology.
Data Product visibility can be configured as private, public, or limited-access through author-defined authorization settings. Authors may require data consumers to provide digital signatures generated through their ID-Wallet to verify identity, or alternatively, require possession of specific NFTs to satisfy Attribute-Based Access Control (ABAC) requirements.
THXNET. provides a suite of standardized GraphQL services enabling Data Products to efficiently query and retrieve data from both the Rootchain and connected Leafchains, ensuring comprehensive data access across the network.
Following the principle of Separation of Concerns, our event-sourcing architecture segregates block production from transaction execution. This design ensures that only essential messages and events are stored in blockchain data storage, while ancillary processes are handled off-chain, preventing unnecessary data accumulation and enhancing system scalability.
The primary focus of this architecture is maintaining transaction and block ordering integrity, alongside the digital signatures that authenticate these operations. The actual execution of requests and messages can be selectively conducted off-chain in parallel processing environments, while ensuring that final states and execution results remain deterministic and replayable to maintain resistance against chain reorganizations.