CN
CloudNetworking.io AWS Networking, Security, Architecture & Connectivity Guides
AWS Hybrid Networking + Private Connectivity + Enterprise Architecture

AWS Direct Connect Explained

AWS Direct Connect is the service enterprises use when they want a more private, consistent, and controllable network path between their on-premises environment or colocation footprint and AWS. Instead of sending all traffic over the public internet, Direct Connect gives you a dedicated network connection into AWS through a Direct Connect location.

This matters because hybrid networking is rarely just a connectivity checkbox. It affects routing, latency consistency, throughput planning, resilience, security posture, data transfer economics, hybrid application design, multi-account network architecture, and how teams connect their data center or office network to AWS VPCs and AWS public services.

This guide focuses on practical architecture. It covers Direct Connect components, private/public/transit virtual interfaces, Direct Connect gateways, resiliency patterns, routing design, common mistakes, troubleshooting steps, and how Direct Connect compares with VPN and other hybrid connectivity options.

Private path into AWS Direct Connect provides a dedicated connection to AWS through a Direct Connect location instead of relying only on internet-based connectivity.
Three VIF models Private, public, and transit virtual interfaces support different connectivity patterns depending on whether you need VPC access, public AWS services, or Transit Gateway-based scale.
Hybrid architecture foundation Direct Connect is often a core building block for enterprise hybrid cloud, data center extension, backup connectivity, and high-throughput workloads.
Resilience matters Direct Connect is powerful, but production-grade design usually requires redundancy, routing discipline, and clear failover planning.

At a glance

A practical summary before you go deeper into the architecture, routing, resiliency, and operations sections below.

Hybrid ready Useful when your applications or data still span on-premises and AWS rather than living entirely in one place.
Routing-centric Direct Connect is not just a physical circuit. It is a routing design topic involving BGP, VLANs, VIFs, gateways, and failover logic.
Enterprise scale Common in financial services, telecom, healthcare, and other environments that need more controlled connectivity to AWS.
Cost and performance aware Often chosen when predictable connectivity, higher throughput, or long-term hybrid traffic patterns justify it.
A strong starting video near the top helps visitors understand the service before going into deeper routing and enterprise architecture topics.
01

Direct Connect is about private connectivity

It creates a dedicated network path between your environment and AWS, reducing dependence on internet routing for key hybrid traffic.

02

Virtual interfaces are the real working model

Most practical Direct Connect architecture decisions happen around the VIF type you choose and what destinations it needs to reach.

03

Routing and resiliency are critical

Direct Connect without good failover and routing design can still become a single point of pain in production.

04

Best for serious hybrid networking

It is especially valuable when on-premises systems, branch connectivity, or private enterprise workloads must integrate tightly with AWS.

What is AWS Direct Connect

What is AWS Direct Connect?

AWS Direct Connect is a dedicated network connection from your internal network or colocation environment into an AWS Direct Connect location. From there, you create virtual interfaces that let you reach either your VPC resources over private IP space, AWS public services, or Transit Gateway-connected environments depending on the interface type you choose.

In simple terms, Direct Connect is what organizations use when they want a more controlled path into AWS than “just use the internet.” That does not automatically mean it replaces every VPN or every internet path, but it often becomes the preferred hybrid backbone for important workloads.

Direct Connect is most often discussed in scenarios like:

  • Data center to AWS private application connectivity
  • Large-scale data transfer between enterprise networks and AWS
  • Hybrid database and backup traffic
  • Multi-account VPC connectivity through centralized network patterns
  • Enterprise applications that still rely on on-prem and cloud simultaneously
  • Financial or regulated environments that want more predictable private connectivity

A lot of confusion comes from assuming Direct Connect is only “a cable to AWS.” In reality, the architectural value comes from how you build routing, segmentation, resilience, and interface design on top of that physical connection.

Private Connectivity Hybrid Networking Direct Connect Gateway Private VIF Transit VIF BGP Routing

Simple definition

AWS Direct Connect is the service you use when you want a dedicated network connection from your environment into AWS and then use virtual interfaces to reach AWS destinations.

What it is good at

  • Hybrid connectivity to AWS
  • Private access to VPC resources
  • More controlled enterprise network design
  • High-throughput hybrid traffic scenarios
  • Multi-account network architecture through gateways

What it does not replace by itself

  • Resiliency design
  • Routing architecture
  • Hybrid security policy
  • Landing zone network planning
  • Application dependency analysis
Production takeaway: Direct Connect is most valuable when your hybrid AWS strategy needs a private, scalable, and well-governed network path rather than only internet-based access.
Why it matters

Why AWS Direct Connect matters in production

Direct Connect matters because networking becomes a bottleneck when enterprises move beyond cloud experiments into real hybrid operations. As soon as applications, users, databases, or batch systems need consistent connectivity across on-prem and AWS, the network path becomes a strategic part of the architecture.

1. Hybrid is still common

Many organizations still run a mix of on-prem systems, branches, private data centers, colocation footprints, and AWS workloads. Direct Connect supports that hybrid reality rather than pretending everything is already cloud-native.

2. Large traffic flows need planning

Database replication, backups, analytics feeds, file movement, and application-to-database calls often become more efficient when routed over a dedicated connection instead of only over internet-based paths.

3. Enterprise control matters

Security, compliance, latency consistency, routing predictability, and network governance are often easier to manage when there is a dedicated path into AWS.

Private VPC reachability Direct Connect lets enterprises build private access patterns into AWS VPCs without exposing application traffic to public internet paths.
Public AWS service access Public virtual interfaces can also be used to reach AWS public services over the Direct Connect path when that model fits the design.
Transit-scale networking Transit VIF and Direct Connect gateway patterns support broader, multi-account, Transit Gateway-centric architectures.

When teams usually adopt Direct Connect

  • When hybrid traffic volume is large and predictable
  • When critical enterprise applications span on-prem and AWS
  • When VPC access must be private and tightly controlled
  • When multi-account AWS networking grows more mature
  • When internet-based VPN paths alone are no longer enough

Where it is especially valuable

  • Banking and financial services
  • Healthcare and regulated industries
  • Enterprise ERP and database connectivity
  • Large data transfer and backup scenarios
  • Global organizations with strong network governance needs
5 W’s + How

AWS Direct Connect explained through the 5 W’s + How

What

A dedicated network connection into AWS that supports private, public, and transit-oriented connectivity models using virtual interfaces.

Why

To improve hybrid connectivity, routing control, private access, and long-term enterprise network design between on-premises and AWS.

When

When internet-only connectivity is not enough for the application, data transfer, governance, or performance model you need.

Where

Across hybrid architectures involving data centers, colocation providers, partner networks, VPCs, Transit Gateways, and AWS public services.

Who should care

  • Network architects
  • Cloud architects
  • Platform engineers
  • DevOps teams
  • Infrastructure operations teams
  • Security architects
  • Enterprise connectivity and WAN teams

Direct Connect becomes especially important where AWS is part of a broader enterprise networking strategy rather than an isolated cloud environment.

How it works conceptually

Your router connects to a Direct Connect location, you establish a connection, and then you create one or more virtual interfaces for the destinations you need to reach. Routing is handled using BGP, and the architectural design depends heavily on whether you are targeting VPCs, AWS public services, or Transit Gateway-based environments.

  • Establish physical or hosted connectivity
  • Create the right VIF model
  • Use BGP for route exchange
  • Attach to VPC or gateway constructs as needed
  • Design failover and resiliency deliberately
Core concepts / components

Core AWS Direct Connect components

To understand Direct Connect well, you need to understand the physical connection model and the logical network constructs layered on top of it.

Connection

The connection is the physical or hosted link established at a Direct Connect location. It forms the base network path between your side and AWS.

Virtual interface (VIF)

The VIF is the logical construct that determines what you actually reach through Direct Connect. This is where most real design decisions happen.

Direct Connect location

This is the AWS-linked location where the connection terminates. Your router or provider connects into AWS there.

Private virtual interface

Used for private IP connectivity to a VPC, or through a Direct Connect gateway to multiple virtual private gateways across accounts and Regions.

Public virtual interface

Used for AWS public services over the Direct Connect path. This is useful when public AWS destinations still need to be reached through the Direct Connect architecture.

Transit virtual interface

Used when connecting into Transit Gateway through a Direct Connect gateway, which is often the preferred pattern in larger multi-VPC, multi-account architectures.

Direct Connect gateway

This helps extend connectivity across accounts and Regions and is especially important when network architecture scales beyond one VPC or one account.

BGP

Direct Connect relies on BGP for routing exchanges, which makes route design, failover behavior, and route filtering important topics in production.

802.1Q VLAN tagging

VLAN encapsulation support is part of the network requirements, and it matters because many designs use multiple logical interfaces over the same connection path.

Component Primary role Why it matters
Connection Base network path Provides the dedicated or hosted connectivity into AWS.
Private VIF Private VPC access Supports private IP-based connectivity into AWS workloads.
Public VIF Public AWS service access Lets teams reach AWS public services over Direct Connect.
Transit VIF Transit Gateway-scale connectivity Supports broader multi-account and multi-VPC network designs.
Direct Connect gateway Cross-account / cross-Region scaling Central in many enterprise network patterns.
BGP Route exchange Controls reachability and failover behavior.
How it works

How AWS Direct Connect works in practice

Direct Connect is easier to operate well when you think in layers: physical path, logical interface, routing model, AWS destination, and failover design.

Step-by-step traffic flow

1
Your router or provider connects into a Direct Connect location. This establishes the base physical or hosted path toward AWS.
2
You create the appropriate virtual interface. The VIF determines whether the path is used for VPC access, public AWS services, or Transit Gateway-based designs.
3
BGP exchanges routes. Reachability is established through routing policy rather than simple point-to-point static assumptions.
4
Traffic reaches the intended AWS destination. This could be a VPC, a Transit Gateway path, or public AWS services depending on the interface model.
5
Failover and resilience logic determine behavior during disruption. In strong designs, VPN or alternate Direct Connect paths are already part of the plan.
6
Operations teams monitor link health, routing, and application impact. Hybrid connectivity is only as good as the visibility teams have into it.

Why this matters to network and DevOps teams

Direct Connect is often owned by network teams, but cloud platform and DevOps teams still need to understand it because hybrid applications, DNS, routing, deployments, and incident response all depend on how traffic actually reaches AWS.

Teams need to know:

  • Which VIF type is in use
  • Which gateways are attached
  • How failover works
  • What routes are expected
  • What happens if the link fails
  • Which applications depend on the connection

In other words, Direct Connect is part of application reliability, not just a WAN topic.

Diagram

AWS Direct Connect architecture diagram

The diagram below shows a common enterprise Direct Connect design where on-premises routing reaches AWS through a Direct Connect location, then branches into different AWS destination patterns.

Enterprise Direct Connect hybrid architecture On-Prem → Direct Connect → VIFs → AWS Targets
On-Prem Data Center / Branch WAN / Colocation / Enterprise Router
                                |
                                v
                    +----------------------------+
                    | AWS Direct Connect Location|
                    | Physical / Hosted Link     |
                    +----------------------------+
                                |
                                v
                    +----------------------------+
                    | BGP + VLAN + VIF Layer     |
                    | Routing / Logical Interface|
                    +----------------------------+
                                |
        +-----------------------+------------------------+
        |                        |                        |
        v                        v                        v
+------------------+   +------------------+   +----------------------+
| Private VIF      |   | Public VIF       |   | Transit VIF          |
| Private IP to VPC|   | AWS Public Svcs  |   | Transit Gateway path |
+------------------+   +------------------+   +----------------------+
        |                        |                        |
        v                        v                        v
+------------------+   +------------------+   +----------------------+
| VPC / VGW / DXGW |   | S3 / Public APIs |   | TGW / Multi-VPC /    |
| App / DB / Batch |   | Public AWS Reach |   | Multi-Account Access |
+------------------+   +------------------+   +----------------------+
                                |
                                v
                  +-----------------------------------+
                  | Monitoring / Failover / Operations|
                  | Routing Policy / Incident Runbooks|
                  +-----------------------------------+

Architecture interpretation

The most important design idea is that Direct Connect itself is not the destination. It is the transport path. The real design work is in deciding which destinations need to be reached and which interface model fits that requirement best.

  • Private VIF for VPC reachability
  • Public VIF for AWS public services
  • Transit VIF for Transit Gateway-centric scale
  • Gateways to expand beyond a single VPC model

Operational interpretation

Network teams usually care about link state and routing, while app and platform teams care about whether hybrid traffic still reaches the correct services during maintenance or failure.

  • Link up does not always mean routes are correct.
  • Correct routes do not always mean applications are healthy.
  • Failover logic should be tested, not assumed.
Design patterns

Common AWS Direct Connect design patterns

Most Direct Connect architectures fall into a few practical patterns. The right one depends on whether your goal is simple private VPC access, multi-account scaling, or hybrid access to both private and public AWS destinations.

Single VPC private connectivity

This is the most basic pattern. An on-premises environment uses a private VIF to reach a VPC privately for application, database, or internal service access.

Direct Connect gateway expansion

A Direct Connect gateway allows the connection model to scale across accounts and Regions, making it a strong fit when the enterprise footprint in AWS grows.

Transit Gateway hub pattern

Transit VIF plus Direct Connect gateway plus Transit Gateway is often the right pattern for larger organizations that want centralized network architecture.

Public service access pattern

Public VIF can be used for access to AWS public services over the Direct Connect path, which can be useful when public AWS service reachability should still align to enterprise network design.

DX + VPN backup pattern

Many real-world designs use Site-to-Site VPN as backup or failover because production resilience should not assume the Direct Connect link never degrades.

Dual-location resilience pattern

Stronger resilience often means diverse Direct Connect locations, diverse routers, and clearly tested failover behavior across the full hybrid stack.

Pattern Best for Why it works Risk to watch
Private VIF to single VPC Simple hybrid app access Easy starting model for private AWS reachability Can become limiting as architecture scales
Direct Connect gateway Cross-account / multi-Region needs Scales connectivity model better Requires cleaner governance and routing design
Transit VIF + TGW Enterprise network hubs Supports larger hub-and-spoke AWS networking More complex route design and operational ownership
DX + VPN backup Production resilience Gives alternate path during outage or maintenance Failover not always tested enough
Resiliency strategy

Resiliency strategy for AWS Direct Connect

One of the biggest Direct Connect mistakes is assuming a private link automatically means a resilient architecture. It does not. Resilience comes from topology, diversity, failover paths, routing policy, and operational testing.

Redundant connections

A single Direct Connect path may be enough for a lab or a low-risk environment, but production usually needs redundancy at the circuit and routing level.

Diverse locations and devices

Better resilience often means not just two links, but different devices, different facilities, or different Direct Connect locations where possible.

VPN backup

Many enterprises pair Direct Connect with Site-to-Site VPN so that an alternate path is available if the dedicated path goes down or needs maintenance.

What good resilience planning includes

  • Dual routers or diverse routing devices
  • Multiple physical paths where possible
  • Clear BGP path preference and failover policy
  • Monitoring for both link and route health
  • Documented maintenance procedures
  • Tested fallback behavior for critical applications

What weak resilience planning looks like

  • One connection and no alternate path
  • Failover never tested
  • Route policy not documented
  • App teams unaware of dependency on Direct Connect
  • Operations only monitor physical link state
Direct Connect resiliency review checklist
- Do we have at least one alternate hybrid path?
- Are Direct Connect circuits diverse enough for our risk profile?
- Is BGP failover behavior documented?
- Have we tested application behavior during failover?
- Are on-prem and AWS route tables aligned?
- Does monitoring include route reachability and app impact?
- Do operations teams know the maintenance and outage procedure?
- Are critical workloads aware of DX dependency?
Operations and DevOps

Operations and DevOps implications of Direct Connect

Direct Connect is often seen as a networking service, but in real environments it has strong operational consequences for application teams, platform teams, release engineering, and incident management.

Why platform teams should care

  • Hybrid application latency and reachability depend on it
  • On-prem to cloud deployments may route across it
  • Database and batch traffic may rely on it
  • Failover events can change application behavior
  • DNS and endpoint choices may behave differently across private and public paths

Signals worth monitoring

  • Connection status
  • BGP session health
  • Route advertisement state
  • Traffic utilization
  • Application latency across the hybrid path
  • Packet loss or degraded path indicators

Typical operations workflow

  1. Provision and validate the hybrid path.
  2. Attach the right VIF and gateway model.
  3. Confirm route exchange and reachability.
  4. Test the application path end to end.
  5. Monitor normal-state performance and routing.
  6. Run failover exercises and maintenance reviews.

Why this matters

Direct Connect incidents rarely stay in the network team’s lane. Once hybrid applications depend on the path, platform and app teams need operational awareness too.

DevOps best mindset: Treat Direct Connect as part of your application delivery path and resilience model, not as a hidden network detail that only the WAN team understands.
Embedded videos

AWS Direct Connect videos for on-page learning

These videos are embedded in large, comfortable sections so visitors can learn without leaving your page and without dealing with tiny thumbnails.

This is a strong first video for the page because it helps users understand the basic service before going into advanced routing and design sections.
This deeper technical session fits well later in the page when readers are ready for architecture, routing, and enterprise design detail.
Real-world examples

Real-world AWS Direct Connect use cases

Direct Connect is easiest to understand when linked to the hybrid scenarios enterprises actually run.

Hybrid database access

Enterprises often use Direct Connect when applications in AWS still depend on databases or data systems hosted on-premises, or vice versa.

Data center extension into AWS

Direct Connect is common when AWS becomes an extension of the enterprise network rather than a totally separate connectivity domain.

Backup and replication traffic

Large backup, archive, synchronization, and replication flows can benefit from a dedicated path rather than sharing only internet-based connectivity.

Multi-account cloud networking

In larger AWS organizations, Direct Connect gateway and Transit Gateway patterns help centralize hybrid connectivity for many accounts and VPCs.

Enterprise branch to cloud access

Some organizations extend enterprise WAN design so branch or office traffic can reliably reach AWS-hosted internal applications.

Regulated hybrid workloads

Industries with stronger network governance requirements often prefer a dedicated private path into AWS as part of the overall compliance and control model.

Scenario Main need Why Direct Connect fits Supporting services
Hybrid app to DB path Private app/database reachability Supports controlled, private connectivity to VPC and on-prem paths VPC, VGW, DXGW, VPN backup
Enterprise WAN to AWS Centralized hybrid network design Direct Connect aligns well with WAN and colocation models Transit Gateway, Route 53, Network Firewall
Large replication traffic Stable, high-throughput hybrid movement Dedicated path is often more suitable for sustained transfer patterns S3, storage, database services
Multi-account enterprise AWS Centralized private connectivity Direct Connect gateway and Transit VIF patterns scale better DXGW, TGW, Organizations
Comparison section

AWS Direct Connect comparison section

Direct Connect vs Site-to-Site VPN

Area Direct Connect Site-to-Site VPN
Main model Dedicated private connection Encrypted tunnel over internet-based paths
Best for Long-term enterprise hybrid connectivity Fast setup, backup path, or smaller hybrid needs
Typical role Primary hybrid backbone Primary for simpler cases or backup for DX
Use together? Yes Yes

Private VIF vs Transit VIF

VIF type Best fit Why
Private VIF Simpler private VPC access Good when you do not need a large Transit Gateway-centric architecture
Transit VIF Larger multi-VPC / multi-account networks Works well with Direct Connect gateway plus Transit Gateway models

Direct Connect vs “just use the internet”

Approach Why it may not be enough
Internet-only path Can work for many cases, but may not fit stronger private connectivity, sustained throughput, or enterprise governance needs.
Direct Connect only Strong for private connectivity, but still needs resilience, failover, and hybrid operations design.
Direct Connect + VPN backup Often the stronger production model because it combines private primary connectivity with alternate-path resilience.
Best practices

AWS Direct Connect best practices

Choose the VIF model carefully

The wrong virtual interface choice can make the architecture harder to scale or operate later.

Design for redundancy early

Resilience should be part of the first architecture discussion, not something added after the first outage.

Document routing behavior

Hybrid incidents become much easier when BGP policy, route propagation, and failover expectations are clearly documented.

Monitor more than link state

Operations should monitor route health and application impact, not just whether the physical connection is technically up.

Test failover behavior

Many environments assume VPN backup or alternate DX links will work, but never validate application behavior during actual failover.

Align app teams with network design

Applications that depend on Direct Connect should be known and tracked so cutovers, maintenance, and incidents do not surprise the wrong teams.

More advanced guidance

  • Use Direct Connect gateway when architecture scale justifies it.
  • Keep VPC, TGW, and on-prem route design consistent.
  • Validate MTU and routing behavior during onboarding.
  • Use change windows and path testing for production updates.
  • Coordinate cloud and WAN teams on ownership boundaries.
  • Include Direct Connect in disaster recovery planning.

Executive-friendly principle

Direct Connect is not valuable merely because it is private. It is valuable when it improves the reliability, governance, and operational fit of your hybrid AWS architecture.

Common mistakes

Common AWS Direct Connect mistakes

Assuming one link is enough

A single Direct Connect path may be technically valid, but often it does not meet real production resilience requirements.

Choosing the wrong VIF type

Teams sometimes start with one model and later discover their multi-account or Transit Gateway architecture would have been better served by a different interface strategy.

Ignoring route design

Direct Connect without disciplined BGP and routing thinking can create blackholes, asymmetric paths, or brittle failover behavior.

No tested backup path

Backup VPN or alternate connections are often planned on paper but not validated under realistic conditions.

Treating it as only a network team concern

Hybrid app owners and platform teams still need to understand dependencies on the connection path.

Poor application dependency awareness

Direct Connect changes can affect applications far beyond what the network diagram suggests if traffic patterns are not well understood.

Troubleshooting

AWS Direct Connect troubleshooting guide

Troubleshooting Direct Connect usually means working through the problem in layers: physical link state, logical interface state, BGP health, route propagation, and application reachability.

Issue Likely cause What to check Fix direction
Connection is up but traffic fails Routing or VIF problem BGP state, route advertisements, destination interface model Validate route design and intended path
VIF remains down Layer 2 or interface mismatch VLAN config, optics, device negotiation, layer 2 troubleshooting Review physical and interface prerequisites carefully
Wrong AWS destination reachable Incorrect VIF or gateway design Private/public/transit interface choice, gateway attachment Match the interface model to the intended destination
Failover does not happen cleanly BGP preference or backup path issue Route policy, VPN backup readiness, path preference Rework and test failover logic
Applications degrade during maintenance Teams unaware of DX dependency App dependency map, maintenance communication, alternate paths Improve ops process and dependency visibility

Troubleshooting pattern 1: Link looks healthy, but app traffic is broken

This usually means the problem is not the physical link itself. It is often route exchange, route preference, gateway attachment, or an application expectation mismatch.

  • Check BGP session state.
  • Check whether expected prefixes are present.
  • Confirm the app is using the intended hybrid path.
  • Validate destination-side route tables.

Troubleshooting pattern 2: VPN backup exists but does not save the outage

This often happens when failover was assumed instead of validated, or when route preference does not behave the way teams expected.

  • Review BGP path preference.
  • Check tunnel health and route acceptance.
  • Test the application, not just the tunnel.
  • Document and rehearse failover steps if needed.
Helpful Direct Connect troubleshooting checklist
- Is the physical connection up?
- Is the VIF up?
- Is the BGP session established?
- Are expected routes advertised and learned?
- Is the correct VIF type being used?
- Are gateway attachments correct?
- Is the destination route table aligned?
- Does VPN backup exist and actually work?
- Which applications depend on this path?
- Are routing changes documented and tested?
Troubleshooting mindset: Always separate physical link health from routing health and then from application health. A “working” Direct Connect link does not guarantee that the hybrid application path is actually correct.
FAQ

AWS Direct Connect FAQ

What is AWS Direct Connect in simple words?
AWS Direct Connect is a dedicated network connection from your environment into AWS, used for private and more controlled hybrid connectivity.
What are the Direct Connect virtual interface types?
AWS Direct Connect supports private virtual interfaces, public virtual interfaces, and transit virtual interfaces. The right one depends on the destinations and architecture you need.
Is Direct Connect better than VPN?
It depends on the use case. Direct Connect is often stronger for long-term enterprise private connectivity, while VPN is valuable for faster setup, backup paths, and simpler hybrid needs.
Do I still need a backup path if I have Direct Connect?
In most production environments, yes. A dedicated connection is useful, but resilience still requires alternate paths and tested failover behavior.
When should I use a Direct Connect gateway?
Usually when your architecture needs to scale across accounts, Regions, or broader gateway-based network patterns beyond a very simple single-VPC model.
Why is BGP so important in Direct Connect?
Because Direct Connect relies on BGP for route exchange, which means reachability, failover, and path behavior all depend heavily on routing design.
Why is Direct Connect good for SEO content?
Because users search for practical questions like Direct Connect vs VPN, private VIF vs transit VIF, Direct Connect gateway explained, hybrid AWS networking, and Direct Connect troubleshooting. A good page answers those real design questions clearly.