Network architecture and protocols

From John C. Doyle
Jump to navigation Jump to search

The key to understanding complex networks is understanding their architecture. Architecture is the most universal, high-level, and persistent elemments of structure and organization (or principles of structuring and organizing a complex system). Protocols define how diverse modules interact, and architecture defines how sets of protocols are organized. Architecture usually involves specification of protocols (rules of interaction) more than modules (which obey protocols). In engineering, system architecture must facilitate system level functionality as well as robustness and evolvability to uncertainty and change in components, function, and environment.

Internet

The Internet is an obvious example of how a protocol-based architecture facilitates evolution and robustness. The architecture of TCP/IP (Transmission Control and Internet Protocols), or the hourglass protocol stack as it’s known, has a thin, hidden “waist” of universally shared feedback control (TCP/IP) between the visible upper (application software) and lower (hardware) layers. The term “hourglass” has been used because there is a vast diversity of applications and hardware that sit above and below the thin waist of universally shared control mechanisms (TCP/IP). Roughly, IP controls the routes for packet flows and thus, available bandwidth. Applications split files into packets, and the TCP controls their rates and guarantees delivery. This allows “plug-and-play” between modules that obey shared protocols; any set of applications that “talks” TCP can run transparently and robustly on any set of hardware that “talks” IP.

Microbiology

Similarly, in the microbiology, genes that “talk” central transcription and translation protocols can move by horizontal gene transfer (HGT), also accelerating evolution in a kind of “bacterial internet.” But also like the technological Internet, the functionality of the resulting new proteins that result is enhanced by when they have additional shared protocols, such as group transfers and carriers in metabolism, and conserved residue pairs in signal transduction. Thus selection acting at the protocol level could evolve and preserve shared architecture, essentially “evolving evolvability.”

Bowties

In most networked systems, protocols within a layer can be visualized as “bowties” , which have large fan-ins and -outs of energy, materials, and information via a thin ‘knot’ of universal protocols specifying carriers, building blocks, or interfaces. Other engineered examples of bowties include networks which connect energy sources to diverse consumers via carriers and standard socket-plug interfaces, and raw materials to assemblies via standardized building blocks in advance manufacturing. In these and the biologic examples, the currencies, carriers, intermediates, precursors, plugs, packets, conserved residues, and interfaces in the bowtie “knot” are highly constrained by protocols. Yet their shared universality allows diverse and robust edges toadapt and evolve, as long as they have appropriate (and typically hidden) layers of feedback control such as TCP/IP.

Layers of networks in internet and biology

There are now major developments and progress in both technology and biology towards a unified and coherent theory of architecture. Especially, a rich optimization theory has recently been developed to reverse and forward engineer the architecture of the Internet and related technologies. This framework views the network as solving an appropriately defined optimization problem, ranging from the classical network flow problems often formulated as linear programs, to the recent and more general Network Utility Maximization (NUM) problem. Then, network layering can be understood as a decomposition of this large optimization problem into ‘decentralized’ subproblems, and various protocol layers are regarded as carrying out asynchronous, distributed computation to implicitly solve this global optimization problem. Different layers iterate on different subsets of the decision variables using local information to achieve individual optimality. Taken together, these local algorithms attempt to achieve a global objective. Such a theory facilitates both understanding and design of network architectures, and as such could potentially be relevant to problems in both systems and synthetic biology.

Reverse engineering

In reverse engineering a given network, identifying an underlying optimization problem being solved will expose the interconnection between protocol layers and can be used to study rigorously performance trade-offs in protocol layering as different ways to distribute a centralized computation. In the context of design or ‘forward engineering’, this framework formalizes the common practice of breaking down the desired system into simpler modules, and allows us to systematically carry out the layering process and explicitly trade off design objectives.

Coherent theory

We aim to combine and extend these ideas to provide a coherent theory of the layering, protocols, bowties, and hourglasses that make up the architecture of technological and biological networks.

(adopted from John's writing & to be continued, Lijun)

Internet Papers

Overview papers

Robustness and the Internet: Theoretical foundations
John C. Doyle, Jean Carlson, Steven H. Low, Fernando Paganini, Glenn Vinnicombe, Walter Willinger, Jason Hickey, Pablo Parrilo and Lieven Vandenberghe
in Robust design: a repertoire from biology, ecology, and engineering E. Jen (eds.), Oxford University Press, 2003.

Layering as optimization decomposition: A Mathematical Theory of Network Architectures
Mung Chiang, Steven H. Low, A. Robert Calderbank and John C. Doyle
in Proceedings of the IEEE, vol.95 pp.255-312. Jan 2007.

Research papers

Cross-layer optimization in TCP/IP networks
J. Wang, L. Li, S. H. Low and J. C. Doyle
IEEE/ACM Transactions on Networking, 13(3):582-568, Jun 2005.

Joint congestion control and media access control design for wireless ad hoc networks
Lijun Chen, Steven H. Low and John C. Doyle
in Proceedings of IEEE Infocom, vol.3 pp.2212-2222. Miami, FL, 13-17 Mar 2005.

Cross-layer congestion control, routing and scheduling design in ad hoc wireless networks
L. Chen, S. H. Low, M. Chiang and J. C. Doyle
in IEEE Infocom, pp.1-13. Barcelona, Spain, Apr 2006.

Related reading

Networking

General complexity

Complex networks

External links

A Duality Model of TCP and Queue Management Algorithms
S. H. Low
IEEE/ACM Transactions on Networking, 11(4):525-536, Aug 2003.

Note

  • This page was drafted by Lijun Chen and Hana 2007-2008. Needs editing and updating papers.