Download System
How Continuata's download system works from the user's perspective and technical implementation details.
User Experience
Continuata downloads work seamlessly in modern browsers without requiring software installation:
Click Download Link
Customer receives download URL via email or customer portal
Choose Location
Browser prompts for download folder using native file picker
Download with Progress
Real-time progress, speed indicators, and pause/resume controls
Verification & Completion
Automatic integrity verification and completion summary
Technical Architecture
Chunked Downloads
Files are split into 4MB chunks for optimal performance:
Benefits
- • Parallel downloading (4-8 connections)
- • Automatic resume on interruption
- • Per-chunk integrity verification
- • Optimal memory usage
Performance
- • CDN edge caching per chunk
- • HTTP/2 multiplexing support
- • Automatic retry with backoff
- • Bandwidth throttling controls
File System Integration
Different approaches based on browser capabilities:
File System Access API (Chrome, Edge, Firefox)
Direct file system access allows writing files to user-selected folders in real-time during download.
Origin Private File System (OPFS)
For browsers without direct access, files are staged in OPFS then exported as a ZIP when complete.
Continuata Bridge
Lightweight desktop app provides native file system access for Safari and legacy browsers.
Progress Tracking
Real-time download progress with detailed metrics:
Overall Progress
Percentage complete, bytes downloaded, total size
Current File
Active file name, file progress, circular indicator
Performance
Download speed, ETA, active connections
Browser Compatibility
Chrome
Full native support
Edge
Full native support
Firefox
Full native support
Safari
Bridge required
Mobile Support
Mobile browsers use OPFS staging with ZIP export. While not as seamless as desktop, downloads still work reliably.
Security Features
Data Integrity
- • SHA-256 verification per chunk
- • Complete file verification after assembly
- • Automatic corruption detection and recovery
- • Cryptographically signed manifests
Access Control
- • Time-limited download tokens
- • IP-based restrictions (optional)
- • Download count limits
- • Token revocation capabilities
Next Steps
Learn how to create download tokens or explore download analytics to track usage.