DPSN: Decentralised Pub/Sub Network
  • Introduction
  • Why Decentralized?
  • Understanding Topics
  • Architecture
    • Topics Registry
    • Configurator
    • Clusters
    • Publishers and Subscribers
    • Facilitator Brokers
    • SDK
  • Functionality
    • Message Publishing and Delivery
    • Subscription Management
    • Security Considerations
    • Topic Ownership and Access Control
    • Private Key Authentication
    • Fully Homomorphic Encryption Support
  • Advantages and Use Cases
    • Advantages of DPSN
    • Use Cases
  • Integration
    • SDK Introduction
    • Publisher
    • Subscriber
    • Delegated Addresses
    • Private Messaging
  • Integration Guides
    • Messaging Application
  • Token Use
    • Utility
    • Token Utility Model
  • DIPs
    • DIP1: Stateless Message Routing in DPSN
  • DIP2: Integration of DPSN with Model Context Protocol (MCP)
  • DIP-3: Standardizing DPSN AVS for Enhanced Security and Reliability
Powered by GitBook
On this page
  1. Architecture

Facilitator Brokers

Brokers are optional components within the DPSN ecosystem that provide additional services to publishers and subscribers. They act as intermediaries, simplifying interactions with the network and offering value-added features.

Core Functionalities

  • Message Brokering: Facilitators act as message brokers, aggregating messages from multiple publishers and distributing them to subscribers.

  • Data Transformation: Facilitators can transform message content to meet specific subscriber requirements, such as data format conversion or filtering.

  • Message Filtering: Facilitators can filter messages based on predefined criteria, reducing the volume of data delivered to subscribers.

  • Security and Compliance: Facilitators can provide enhanced security features, such as message encryption and access control. They can also assist with compliance requirements.

Technical Implementation

Facilitators are typically deployed as standalone services that connect to multiple DPSN clusters. They utilize APIs to interact with the core network components.

To optimize performance, facilitators can leverage caching and asynchronous processing techniques. Additionally, they can employ load balancing to distribute incoming and outgoing traffic.

Security and Privacy

Facilitators must implement robust security measures to protect sensitive data and prevent unauthorized access. Encryption, authentication, and authorization are essential components of facilitator security.

PreviousPublishers and SubscribersNextSDK

Last updated 7 months ago