The End-to-end reference article from the English Wikipedia on 24-Jul-2004
(provided by Fixed Reference: snapshots of Wikipedia from


Support a children's charity online
In any computer communication, there are n >= 2 end points, called "end systems" or "hosts".

End-to-end in e-commerce, connects people who want to sell and buy. Eliminates the layers of middlemen who extract value from the trade and increase the final price.

End-to-end security means that sensitive data is encrypted all the way from your device side application back to the enterprise. Rather than relying on transport-level security such as SSL, end-to-end security puts the power of strong encryption in your hands, all through a simple interface. This ends the so-called Óair gapÔ where sensitive data was previously decrypted at the gateway during translation for wireless protocols into Internet protocols.

End-to-end monitoring is the process of attempting to access a web server or other Internet device from across the Internet, just as a real end user would, to verify that the server is accessible and functioning properly at all times. This approach can be used instead of, or as a complement to, local monitoring software run by the Web Administrator.

See also: end-to-end principle.