[e2e] End-to-end is a design guideline, not a rigid rule
Black_David@emc.com
Black_David at emc.com
Sat Dec 3 10:43:31 PST 2005
Dave,
> On the question of the "end to end" construct I believe we suffer from
> viewing it simplistically. What I think our community has missed is that
it
> is a design guideline, not a rigid rule. In fact with a layered
> architecture, the construct varies according to the layer. At the IP
level,
> this is demonstrated two ways. One is the next IP hop, which might go
> through many nodes in a layer-2 network, and the other is the
> source/destination IP addresses, which might go through multiple IP nodes.
>
> The TCP/IP split is the primary example of end-to-end, but it is
deceptive.
> TCP is end-to-end but only at the TCP layer. The applications that use
TCP
> represent points beyond the supposed end-to-end framework.
>
> My own education on this point came from doing EDI over Email. Of course
I
> always viewed the email author-to-recipient as "end to end" but along
comes
> EDI that did additional routing at the recipient site. To the EDI world,
> the entire email service was merely one hop.
>
> This proved enlightening because the point has come up repeatedly:
I strongly agree with this point, and want to remove it from its original
organizational boundary context. IMHO, Organizational boundaries are
(or at least start out as) layer 9 (Political) constructs, and Engineering
techniques don't seem to be particularly effective much beyond layer 7 ;-).
Anytime the end-to-end topic comes up in a design discussion, I always
ask two questions:
- Where are the ends?
- What is the service being provided between them?
The latter question (IMHO) tends to be both more important and harder
to answer than the former.
Another area where this "end-to-end is just a hop" perspective comes
up is security. In the IPsec arena, both site-to-site and remote
access VPNs compress an arbitrary unprotected network path into what
looks like a single hop in a somewhat more protected LAN. The
underlying end-to-end IPsec service has very strong security
properties, but in the bigger picture, it's just a hop in a managed
LAN (in some sense) service with different properties.
Thanks,
--David
----------------------------------------------------
David L. Black, Senior Technologist
EMC Corporation, 176 South St., Hopkinton, MA 01748
+1 (508) 293-7953 FAX: +1 (508) 293-7786
black_david at emc.com Mobile: +1 (978) 394-7754
----------------------------------------------------
More information about the end2end-interest
mailing list