Location-based Addressing

Location-based Addressing

Let's say that I and my friend mike have the same picture of Optimus prime in our servers which can be accessed via

Mine: https://www.akilan.com/page/about/optimus.png
Mike: https://www.mike.com/page/about/optimus.png

The URLs are just the path to the file ( Prime's pic ) on the server. If you are interested in the file, you can access it and not bothered about where it comes from.


Why Location-based addressing is not great?

  • Today my servers are down so, my users will not be able to access the file even if the file is present in the internet.
  • This is simply because the URLs are just focused on the particular file in the specified path in my server only.
  • The URL also exposes the owner of the resource. This allows authority to bring down the service on command.


What could be the alternative?

This is where Content-based addressing comes into play....


Stick around

Vidya Sagar Koteeswaran

Final Year Student at Velammal Engineering College | Web Developer | JLPT N5 Certified | Tech Enthusiast | PC Enthusiast

10 个月

Wonderful work, very insightful explanation!

要查看或添加评论,请登录

Thanga Akilan的更多文章

  • Blockchain to counter Fake Documents??

    Blockchain to counter Fake Documents??

    Fake Documents?? are documents that are completely fabricated or altered to deceive others..

  • EIP - Ethereum Improvement Proposal

    EIP - Ethereum Improvement Proposal

    Ethereum?? is Open source and is improved consistently by EIPs??. EIP is a design document?? that proposes an…

    2 条评论
  • What is DID?

    What is DID?

    A Decentralized Identity is a ID that can be assigned to any entity either physical or virtual. This ID looks like…

  • Why Decentralized ID?

    Why Decentralized ID?

    Today we have multiple government provided Identities like Aadhar???, Driving license??, Voter ID???, etc For…

  • Decentralized Identity (DID)

    Decentralized Identity (DID)

    How many Google accounts?? do you have? A statistics?? provides that a user has an average of 1.7 Gmail accounts??.

  • Hash Function

    Hash Function

    Encryption?? is a process of scrambling of the data so,anyone don't understand it. But it can be reversed to get back…

  • Content-based Addressing

    Content-based Addressing

    Content-based Addressing is used to access the resource from a network with a unique ID of the resource instead of it's…

社区洞察

其他会员也浏览了