Computer network: The impact of end-to-end principles on the Internet and the problems they face

Source: Internet
Author: User
Tags abstract
Chinese abstract

Abstract: The end-to-end principle in the Internet is that if a mechanism can be implemented in the end system, it should not be implemented in the core of the network, thus guaranteeing the stability, maintainability and expansibility of the Internet core. The end-to-end principle has had a huge impact on the internet since it was introduced. This article will be based on the end to end Arguments in system design with rethinking the design of the internet:the end to end Arguments vs. the Brav e New World Two articles summarizing the impact of end-to-end principles on today's internet and the problems they face.
Keywords: end-to-end principle; Internet Abstraction

Abstraction:in Networks designed according to End-to-end principle, features which can is realized by end systems is Expected to reside in the end nodes of the network, rather than in intermediary nodes so that the network would keep Relia BLE, extendible and maintainable. The end-to-end principle have influenced the network greatly since it firstly articulated back in 1981 by Saltzer, Reed, an D Clark. This passage was going to make a brief summary on the influence that the End-to-end principle brought and the problem th At aroused nowadays according to end to end Arguments in system design and rethinking the design of the internet:the End To end arguments vs. the Brave New World.
Keywords:end-to-end principle;internet 1. Overview

Since the end-to-end principle of the 80 's, the internet has changed dramatically. The network grew from the communication networks of the first few universities to the global and widely used internet. The end-to-end principle [1] has made a huge contribution to the prosperity and development of the Internet, providing a solid foundation for a number of new Internet applications. The end-to-end principle ensures that the core of the Internet is streamlined and effective while giving end users great freedom. But with the development of the Internet, this freedom could be exploited by malicious software. The end-to-end principle faces great challenges, along with the growing demand for new people. The future network needs to make appropriate adjustments to meet these new needs. 2. Background and main ideas of end-to-end principles

End-to-end Arguments in system design was published by MIT's CS Lab in 1981. It is in a critical period of data communication network that is becoming an important part of the computing system. [1] For a computer system developer, how to choose the functionality that each section should provide becomes a central issue. This paper discusses the demarcation of functional boundary between the data exchange network and other parts of the computer system. This paper points out that there are many low-level implementation functions, such as error checking, retransmission and encryption and decryption function in the network bottom-up is actually redundant. It may be caused by the following reasons:
1. Functions such as encryption and decryption must be done by the end device to avoid potential security issues that may exist from the network's underlying to-end device transmission. The same end device is not fully trust the underlying encryption and decryption mechanism, even if the underlying encryption and decryption function, the end device will be due to mistrust and re-implement these functions, resulting in the redundancy of this feature.
2. Functions such as error checking may not be fully implemented by the underlying. such as in the end of the device or the end of the device to the network at the bottom of the transmission of the error is not able to be detected by the network at the bottom of the fault detection mechanism, and thus need to be re-implemented on the end device.
3. Functions such as network underlying acknowledgment feedback are redundant for end devices. The problem with the end device is not whether the message has reached the other side of the device, but the feedback action that the other side device makes to that information.
Therefore, in the network, these functions should not rely on the bottom of the network, but should be implemented by the end device.
But some of the features of the network's bottom-level implementations are not a benefit to the network. Some of the functionality of the network's underlying implementation may result in performance improvements. [1] If a certain calibration function is added at the bottom, the time spent on the retransmission of the error can be shortened.
In general, in the design of network communication system, we need to follow the end-to-end principle and properly choose the functions that need to be realized in the network bottom. 3. The impact of end-to-end principles on today's Internet

Since end-to-end Arguments in system design has put forward the principle of the ends-to-end of network systems, this principle has deeply influenced the layering of the Internet and the development of the Internet. Today's internet boom is tied to end-to-end principles.
1. End-to-end principles provide the right direction for the layered design of the internet
The advent of the Internet has solved the problem of functional division in the Internet, and the end-to-end principle indicates that if a mechanism can be implemented in the end system, it should not be implemented in the network core. [2] The network core should provide the most common services possible, while the specific application-related features should be avoided in the network core. The end-to-end design principle guarantees the simplest functionality of the Internet, keeping the core of the Internet in a relatively streamlined and efficient state.
2. A streamlined and effective internet core ensures the development of the Internet
A streamlined and effective core provides the following benefits
-The streamlined Internet core reduces the difficulty of Internet maintenance due to the absence of complex systems. In order to support the stable operation of the Internet, the development of the Internet has laid a solid foundation.
-Streamlined Internet core due to the provision of generic services, network-based applications at the edge of the Internet do not have to follow complex rules to access the Internet. This gives these applications the freedom to implement functionality, rapid updates, and deployment based on specific requirements, reducing the difficulty of developing Internet applications.
Thus, the end-to-end principle of the Internet provides considerable scalability, versatility and openness to the Internet [2], guaranteeing the development of the Internet.
3. The Internet philosophy brought by end-to-end principles (Internet philosophy)
The end-to-end principle in addition to the technical impact, but also guided the Internet philosophy. The end-to-end supply of the streamlined kernel represents a lack of control over the end device, and thus the end device has a great degree of freedom [3]. This freedom offers endless possibilities for the flourishing of the Internet.
4. Internet-based applications are not controlled by ISPs and can be developed, deployed, and produced efficiently, and good ideas are often amplified by this free atmosphere, bringing new vitality to the Internet. Like today's social networking, e-commerce platform, instant Messaging that has changed our lifestyle. This atmosphere has attracted a lot of venture capital, but also developed a special spirit of adventure [2], and become the cultural background of internet companies.
5. Freedom also means a high degree of autonomy, and the end device should be self-disciplined in its own actions in the network. Because of the lack of control over the device in the Internet, it is difficult to unify the device, so the end device must be responsible for the information sent to the Internet, or the information received from the Internet. That is why it has led to the new Internet crisis.4. End-to-end principles in today's internet problems

In the end-to-end principle of 20 years, the Internet has been a great development. [4] The initial ARPANET no longer exists and the Internet backbone traffic becomes the responsibility of the ISP. and development is often accompanied by new problems, so the author David D. Clark published the Rethinking the design of the internet:the end to end arguments vs. the Brave New World "article. This paper summarizes the main problems encountered in the development of Internet, and gives some countermeasures and solutions.
The problems involved in the Internet are mainly divided into the following parts:
1. The collapse of trust
The Internet, as mentioned above, is designed to be self-disciplined with the need for end devices and software. [3] The users who use end-to-end software now do not trust each other, but need the necessary communication. And because some end software silently collects the user's information in the backstage, the end-to-end software also loses the user's trust. Users want to have security when using the end device/software.
2. Third-party intervention
[3] The government wants to be able to control Internet content to ensure national security, and ISPs want to obtain Internet traffic data for updating servers. While the original end-to-end principle of the Internet does not provide these third-party intervention features. As the end user, also do not want to be monitored by a third party.
3. Malicious information
It is because of the lack of control over the Internet that some malicious information is in. Malicious information such as spam can not be effectively blocked.
But this does not mean that the end-to-end principle should be discarded, mainly for two reasons.
1. The premise of the end-to-end principle is to move some repetitive functions toward the edge of the Internet. and third-party intervention, the control of Internet communication content can not be implemented by the end device, or the end device is very complex to implement. Therefore, these functions do not belong to the end-to-end principle applicable scope.
2. The Internet has a current development that relies on a reliable, end-to-end infrastructure and innovation environment. Abandoning the end-to-end principle is not conducive to the further development of the Internet. 5. The future of end-to-end principles

Although the end-to-end principle should not be discarded, existing problems still need to be addressed. Because these functions do not conform to the end-to-end principle, it is difficult to implement these problems in the current network kernel. There are several ways to try to solve these problems:
1. Implement these requirements through improved end devices. such as spam filtering can be processed on the server side or at both ends of the client, malicious programs can be controlled through the user's firewall. [3] Although it is difficult to achieve full functionality through end devices, it is possible to reduce the risk to a level acceptable to the user.
2. Build a new network-centric service and combine it with the current end-to-end network. Transfer software with security requirements such as mail, communications, payments, etc. to new network-centric services, while other software without similar requirements remains in an end-to-end network.
3. Non-technical means, such as law, can also improve these issues [3]. To improve the Internet-related laws, through non-technical means to restrain the end of equipment to fulfill their responsibilities, can reduce the emergence of malicious information. References

[1]. J.H. Saltzer, D.P Reed, and D.d. Clark, "end-to-end arguments in System design," ACM transactions in computer Sys TEMs, Volume 2 Issue 4, Nov 1984, pp.277-288.
[2]. Zhang Haiji, "Thinking of the Internet end-to-end principle," [Eb/ol] http://blog.sciencenet.cn/home.php?mod=space&uid=237587&do=blog& id=224869, APR.
[3]. Marjory S. Blumenthal, and David D. Clark, "Rethinking the design of the internet:the end-to-end arguments vs. the Brave New World, "ACM transactions in Computer Systems, Volume 1 Issue 1, 2001. pp.70-109.
[4]. James F. Kurose, and Keith W. Ross, computer networks-top-up approach with Internet features (sixth edition), mechanical industry Press, OCT, pp.44

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.