<s>
In	O
computer	B-Architecture
networks	I-Architecture
,	O
location	B-Protocol
transparency	I-Protocol
is	O
the	O
use	O
of	O
names	O
to	O
identify	O
network	B-Architecture
resources	O
,	O
rather	O
than	O
their	O
actual	O
location	O
.	O
</s>
<s>
For	O
example	O
,	O
files	O
are	O
accessed	O
by	O
a	O
unique	O
file	O
name	O
,	O
but	O
the	O
actual	O
data	O
is	O
stored	O
in	O
physical	O
sectors	O
scattered	O
around	O
a	O
disk	O
in	O
either	O
the	O
local	O
computer	O
or	O
in	O
a	O
network	B-Architecture
.	O
</s>
<s>
In	O
a	O
location	B-Protocol
transparency	I-Protocol
system	O
,	O
the	O
actual	O
location	O
where	O
the	O
file	O
is	O
stored	O
does	O
n't	O
matter	O
to	O
the	O
user	O
.	O
</s>
<s>
A	O
distributed	B-Architecture
system	I-Architecture
will	O
need	O
to	O
employ	O
a	O
networked	O
scheme	O
for	O
naming	O
resources	O
.	O
</s>
<s>
The	O
main	O
benefit	O
of	O
location	B-Protocol
transparency	I-Protocol
is	O
that	O
it	O
no	O
longer	O
matters	O
where	O
the	O
resource	O
is	O
located	O
.	O
</s>
<s>
Depending	O
on	O
how	O
the	O
network	B-Architecture
is	O
set	O
,	O
the	O
user	O
may	O
be	O
able	O
to	O
obtain	O
files	O
that	O
reside	O
on	O
another	O
computer	O
connected	O
to	O
the	O
particular	O
network	B-Architecture
.	O
</s>
<s>
Location	B-Protocol
transparency	I-Protocol
effectively	O
makes	O
the	O
location	O
easy	O
to	O
use	O
for	O
users	O
,	O
since	O
the	O
data	O
can	O
be	O
accessed	O
by	O
almost	O
everyone	O
who	O
can	O
connect	O
to	O
the	O
Internet	O
,	O
who	O
knows	O
the	O
right	O
file	O
names	O
for	O
usage	O
,	O
and	O
who	O
has	O
proper	O
security	O
credentials	O
to	O
access	O
it	O
.	O
</s>
