2.11. Rehearsal

At this point, you should be able to outline common approaches used to achieve addressing by content, such as constrained flooding or distributed hashing. You should understand the limits of those approaches in terms of scalability and its impact on parameters such as network load, routing information size, routing path length, resiliency to failures.

You should be able to explain how common applications of addressing by content work.

Questions. 

  1. Explain how distributed hashing can be employed to implement a simple distributed file sharing service. Discuss the limitations of such an implementation in terms of the search query complexity.