Some Natural E2E Functions
Reliability
- end-to-end check still required even if subnet provides per-hop acks
Security
- end-to-end encryption protects the entire path
- per-hop encryption can thwart traffic analysis
Mobility
- more flexible and efficient at application layer