Download System

How Continuata's download system works from the user's perspective and technical implementation details.

User Experience

Continuata downloads work seamlessly in modern browsers without requiring software installation:

1

Click Download Link

Customer receives download URL via email or customer portal

2

Choose Location

Browser prompts for download folder using native file picker

3

Download with Progress

Real-time progress, speed indicators, and pause/resume controls

4

Verification & Completion

Automatic integrity verification and completion summary

Technical Architecture

Chunked Downloads

Files are split into 4MB chunks for optimal performance:

Benefits

  • • Parallel downloading (4-8 connections)
  • • Automatic resume on interruption
  • • Per-chunk integrity verification
  • • Optimal memory usage

Performance

  • • CDN edge caching per chunk
  • • HTTP/2 multiplexing support
  • • Automatic retry with backoff
  • • Bandwidth throttling controls

File System Integration

Different approaches based on browser capabilities:

File System Access API (Chrome, Edge, Firefox)

Direct file system access allows writing files to user-selected folders in real-time during download.

Origin Private File System (OPFS)

For browsers without direct access, files are staged in OPFS then exported as a ZIP when complete.

Continuata Bridge

Lightweight desktop app provides native file system access for Safari and legacy browsers.

Progress Tracking

Real-time download progress with detailed metrics:

Overall Progress

Percentage complete, bytes downloaded, total size

Current File

Active file name, file progress, circular indicator

Performance

Download speed, ETA, active connections

Browser Compatibility

Chrome

Full native support

Edge

Full native support

Firefox

Full native support

Safari

Bridge required

Mobile Support

Mobile browsers use OPFS staging with ZIP export. While not as seamless as desktop, downloads still work reliably.

Security Features

Data Integrity

  • • SHA-256 verification per chunk
  • • Complete file verification after assembly
  • • Automatic corruption detection and recovery
  • • Cryptographically signed manifests

Access Control

  • • Time-limited download tokens
  • • IP-based restrictions (optional)
  • • Download count limits
  • • Token revocation capabilities

Next Steps

Learn how to create download tokens or explore download analytics to track usage.