End-to-end connectivity

related topics
{system, computer, user}
{math, number, function}

End-to-end connectivity is a principal design element of the Internet[citation needed] that allows nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. The concept was originally developed and implemented in the CYCLADES network.[citation needed]

For the Internet this design is implemented[clarification needed] in the Internet Protocol Suite, also commonly referred to as the Transmission Control Protocol/Internet Protocol (TCP/IP).

The rapid expansion of the Internet and the resulting IPv4 address exhaustion problem have forced some design changes in the originally conceived architecture of the IP address space in terms of address assignment and routing technologies. In addition, technologies were invented that have helped to alleviate the exhaustion problem temporarily,[neutrality is disputed] but have introduced network elements, such as network address translation devices, that do not abide by the end-to-end principle. Without this property, some network protocols require the specific support of network elements during traversal. This impediment hinders deployment of many new, often interactive, applications, including security (IPsec), migration to IPv6 (tunneling IPv6 in IPv4), peer-to-peer applications, and networked games.

Sometimes end-to-end connectivity is deliberately broken, erroneously, as a means of implementation of network security, as using address translation also limits the routing scope, which means that computers behind NAT cannot be addressed directly from untrusted zones. However, consensus among security experts shows that this does not provide proper security features and in fact may impede implementation of proper techniques.[citation needed]

Such implementation trends divide Internet users into those who have "real" Internet connectivity and those who are restricted to use applications that only use outbound network connections.

See also

External links

Full article ▸

related documents
IceWM
Private line
Symmetric Digital Subscriber Line
Common management information service
Badtrans (computer worm)
Backward channel
COM (hardware interface)
Intel 80188
On-hook
Freescale 683XX
Binary image
Total Access Communication System
Layout engine
Irssi
Distributed database
Truncated binary exponential backoff
KA9Q
Logical Link Control
IBM 801
BESK
KMail
VESA Display Power Management Signaling
Intel 80486SX
Isochronous burst transmission
Frame synchronization
DirectDraw
Freeware
IBM Lotus SmartSuite
Supervisory program
8-bit clean