Comment on Phones have unique phone numbers, why dont computers have unique computer-numbers?
jeffhykin@lemm.ee 7 months agoFinally :D thank you so much!
So basically VOIP is “cheating” because its not actually handled by the network directly, the phone company pays for always-online servers, and phone(s) reach out to those server every time they change networks, in order to be able to route calls to them.
Which also means! it is possible to do the same thing for computers, but it requires having
- A static IP
- An always online server
- The device needs a daemon that tries to connect to a always online server, and proves itself
- that server needs to manually reroute traffic (through a VPN or some other means) to the device, wherever it might be
Which also explains why general network providers wouldn’t want to create the infrastructure to always keep track of discovering devices as they changed networks: not keeping track is less expensive. (And that’s on top of the legacy approach of local networks and desktops.
Thats a sizable edit!
Yeah 😅 I didnt want it to be this complicated, but I didnt see how else to explain that current addressing systems don’t meet the same need as a phone number.
lemmyng@lemmy.ca 7 months ago
There’s other reasons why universal addressing is not done - privacy, network segmentation, resiliency, security, etc. And while IPv6 proponents do like to claim that local networks wouldn’t be strictly necessary (which is technically true), local networks will still be wanted by many. Tying this back to phone numbers - phone numbers work because there’s an implicit trust in the telcos, and conversely there’s built in central control. It also helps that it’s only a very domain specific implementation - phone communication specifications don’t change very often. On computer networks, a lot of work has been done to reduce the reliance on a central trust authority. Nowadays, DNS and SSL registries are pretty much the last bastion of such an authority, with a lot of research and work having gone into being able to safely communicate through untrusted layers: GPG, TOR, IPFS, TLS, etc.