mirror of https://github.com/acid-info/vac.dev.git
updated
This commit is contained in:
parent
29a8743e54
commit
a8ae883974
|
@ -43,7 +43,7 @@
|
||||||
<meta name="twitter:image" content="{{ site.url }}{{ site.baseurl }}{{ page.image }}">
|
<meta name="twitter:image" content="{{ site.url }}{{ site.baseurl }}{{ page.image }}">
|
||||||
{% else %}
|
{% else %}
|
||||||
<meta name="twitter:card" content="summary">
|
<meta name="twitter:card" content="summary">
|
||||||
<meta name="twitter:image" content="{{ site.title_image }}">
|
<meta name="twitter:image" content="{{ site.url }}/assets/img/vac.png">
|
||||||
{% endif %}
|
{% endif %}
|
||||||
<!-- end of Twitter cards -->
|
<!-- end of Twitter cards -->
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,6 @@ published: true
|
||||||
permalink: /vac-overview
|
permalink: /vac-overview
|
||||||
categories: research
|
categories: research
|
||||||
summary: Vac is a modular peer-to-peer messaging stack, with a focus on secure messaging. Overview of terms, stack and open problems.
|
summary: Vac is a modular peer-to-peer messaging stack, with a focus on secure messaging. Overview of terms, stack and open problems.
|
||||||
image: /assets/img/vac.png
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Vac is a **modular peer-to-peer messaging stack, with a focus on secure messaging**. What does that mean? Let's unpack it a bit.
|
Vac is a **modular peer-to-peer messaging stack, with a focus on secure messaging**. What does that mean? Let's unpack it a bit.
|
||||||
|
|
|
@ -8,7 +8,6 @@ published: true
|
||||||
permalink: /dns-based-discovery
|
permalink: /dns-based-discovery
|
||||||
categories: research
|
categories: research
|
||||||
summary: A look at EIP-1459 and the benefits of DNS based discovery.
|
summary: A look at EIP-1459 and the benefits of DNS based discovery.
|
||||||
image: /assets/img/vac.png
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Discovery in p2p networks is the process of how nodes find each other and specific resources they are looking for. Popular discovery protocols, such as [Kademlia](https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf) which utilizes a [distributed hash table](https://en.wikipedia.org/wiki/Distributed_hash_table) or DHT, are highly inefficient for resource restricted devices. These methods use short connection windows, and it is quite battery intensive to keep establishing connections. Additionally, we cannot expect a mobile phone for example to synchronize an entire DHT using cellular data.
|
Discovery in p2p networks is the process of how nodes find each other and specific resources they are looking for. Popular discovery protocols, such as [Kademlia](https://pdos.csail.mit.edu/~petar/papers/maymounkov-kademlia-lncs.pdf) which utilizes a [distributed hash table](https://en.wikipedia.org/wiki/Distributed_hash_table) or DHT, are highly inefficient for resource restricted devices. These methods use short connection windows, and it is quite battery intensive to keep establishing connections. Additionally, we cannot expect a mobile phone for example to synchronize an entire DHT using cellular data.
|
||||||
|
|
Loading…
Reference in New Issue