The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture Saamer Akhshabi Constantine Dovrolis Georgia Institute of Technology.

Slides:



Advertisements
Similar presentations
6.033: Intro to Computer Networks Layering & Routing Dina Katabi & Sam Madden Some slides are contributed by N. McKewon, J. Rexford, I. Stoica.
Advertisements

Watching the Waist of the Protocol Hourglass
Watching the Waist of the Protocol Hourglass Steve Deering cisco.com TERENA Network Conf., Antalya Turkey May 2001.
Four myths about GENI (and one recommendation) Constantine Dovrolis College of Computing Georgia Tech.
Saamer Akhshabi, Constantine Dovrolis Georgia Institute of Technology An Experimental Evaluation of Rate Adaptation Algorithms in Adaptive Video Streaming.
Objectives Look at Central Limit Theorem Sampling distribution of the mean.
INTEGRATING NETWORK CRYPTOGRAPHY INTO THE OPERATING SYSTEM BY ANTHONY GABRIELSON HAIM LEVKOWITZ Mohammed Alali | CS – Dr. RothsteinSummer 2013.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
Statistics & Modeling By Yan Gao. Terms of measured data Terms used in describing data –For example: “mean of a dataset” –An objectively measurable quantity.
CS 268: Lecture 2 (Layering & End-to-End Arguments)
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Computer Network Architecture and Programming
Networking Basics: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Data Communications I & II Project Sequence Tom Costello.
Networks 1 CS502 Spring 2006 Network Input & Output CS-502 Operating Systems Spring 2006.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
CS-3013 & CS-502, Summer 2006 Network Input & Output1 CS-3013 & CS-502, Summer 2006.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
1 Networking Basics: A Review Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
OIS Model TCP/IP Model.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Reference Model 1. Layered network Why network are layered ?! -Easy to change -Easy to troubleshoot -Give general idea of each layer 2.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
Networks and Telecommunications
CS 268: Lecture 3 (Layering & End-to-End Arguments)
OSI Model Honolulu Community College Cisco Academy Training Center
1 Watching the Waist of the Protocol Hourglass Steve Deering cisco.com NORDUnet Conference, Copenhagen April
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Introduction network Protocol
Human-Computer Interface Course 4. Content History of Internet What is Internet ? Internet Protocols The OSI 7 layers model TCP/IP The World Wide Web.
1 Next Few Classes Networking basics Protection & Security.
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Department of Energy Office of Science ESCC & Internet2 Joint Techs Workshop Madison, Wisconsin.July 16-20, 2006 Network Virtualization & Hybridization.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Lets play Jeopardy No, sorry. You got it! Network Addresses Protocols Subnet Masks Media Network Devices
Types of Service. Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service.
1 Chapter 6 Estimates and Sample Sizes 6-1 Estimating a Population Mean: Large Samples / σ Known 6-2 Estimating a Population Mean: Small Samples / σ Unknown.
OSI Model Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
A Sociability-Based Routing Scheme for Delay-Tolerant Networks May Chan-Myung Kim
Communication Networks - Overview CSE 3213 – Fall November 2015.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
On the Economic Viability of Network Architectures Roch Guerin, Kartik Hosanagar (University of Pennsylvania) Andrew Odlyzko, Zhi-Li Zhang (University.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Information-Centric Networks02c-1 Week 2 / Paper 3 Future Internet architecture: clean-slate versus evolutionary research –Jennifer Rexford, Constantine.
 Chapter 1.5. ~ KNSS  Students ’ feedback  Had difficulties due to: Lack of knowledge in networking English No microphone for.
Fall 2004FSU CIS 5930 Internet Protocols1 TCP/IP Protocol Suite Reading: Chapter 13.
Slide 1, hlu & faynberg Trends in Network Evolution Igor Faynberg, Ph.D. Hui-Lan Lu, Ph.D. Bell Labs, Lucent Technologies Multimedia Convergence Workshop.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
Dynamics of Competition Between Incumbent and Emerging Network Technologies Youngmi Jin (Penn) Soumya Sen (Penn) Prof. Roch Guerin (Penn) Prof. Kartik.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Communication Networks NETW 501 Tutorial 2
Cisco I Introduction to Networks Semester 1 Chapter 3 JEOPADY.
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Welcome Network Virtualization & Hybridization Thomas Ndousse
HTTP and Abstraction on the Internet
Four myths about GENI (and one recommendation)
Topic 5: Communication and the Internet
NETWORKING TECHNOLOGIES (II)
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite: Review
Network Architecture for Cyberspace
COMS 161 Introduction to Computing
Networking Basics: A Review
Presentation transcript:

The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture Saamer Akhshabi Constantine Dovrolis Georgia Institute of Technology 1

My co-author, Saamer Akhshabi (Very smart 2 nd year PhD student, he could not travel to Toronto) 2

Outline Motivation Model description Results Concluding remarks 3

Why did we write this paper? Ethernet Twisted Pair SMTPHTTP Thunder bird Silver light Firefox PPP Coaxial Cable IPv4 UDPTCP RTP Optical Fiber MPlayer … … … … 4

Why is the Internet protocol stack an hourglass? Ethernet Twisted Pair SMTPHTTP Thunder bird Silver light Firefox PPP Coaxial Cable IPv4 UDPTCP RTP Optical Fiber MPlayer … … … … 5

What happens at the “waist” compared to other layers? Ethernet Twisted Pair SMTPHTTP Thunder bird Silver light Firefox PPP Coaxial Cable IPv4 UDPTCP RTP Optical Fiber MPlayer … … … … 6

How can a new protocol survive at the waist? X.25 SNA Ethernet Twisted Pair SMTPHTTP Thunder bird Silver light Firefox PPP Coaxial Cable IPv4 UDPTCP RTP Optical Fiber MPlayer … … … … ATMIPv6 7

What about “Future Internet” those architectures? Will these architectures also evolve to an hourglass in few years? How to make them more “evolvable”? – So that they can better accommodate innovation? – So that no single protocol at the waist “kills” all competitors NDN XIA Mpb ility First Neb ula 8

Outline Motivation Model: EvoArch Results Conclusions 9

Two Disclaimers EvoArch is only an abstraction of protocol stacks – EvoArch does not capture many practical aspects and protocol-specific or layer-specific semantics EvoArch is certainly not the only model, or “the correct model”, for the emergence of hourglass-shaped network architectures – Models should be judged based on their assumptions, parsimony and predictions 10

Model description Protocols as nodes Protocol dependencies as edges Products: P(u) Substrates:S(u) Layer of u: l(u) Layered acyclic network u Every layer provides a service L 1 …

The value of a protocol The value of a protocol depends on the value of its products Protocols with valuable products are more valuable

The generality of a layer Ethernet Twisted Pair SMTP HTTP Thunder bird Silverlight Firefox PPP Coaxial Cable IPv4 UDPTCP RTP Optical Fiber MPlayer As we go higher in the stack: Protocols become less general – they offer more specialized services The probability that a protocol is used by next-layer’s protocols decreases 13

Generality as a probability We introduce a parameter called generality vector s s(l) : probability that new node at layer l+1 chooses each node at layer l as substrate s(l) decreases as we go higher in protocol stack s(1) = 0.9 s(3) = 0.5 s(L-1) =

Competition between protocols Two protocols at the same layer compete if they offer similar services – i.e., if they have large overlap in their products HTTP competes with FTP due to several overlapping products TCP does not compete with UDP because they have minimal service overlap TCPUDP HTTPFTP 15

Modeling competition If c = 3/5 u competes with q and w q does not compete with w quw Let C(u) be set of competitors of u Node w competes with u if c: competition threshold 16

When does a protocol “die”? Protocols can become extinct due to competition with other protocols For example, HTTP services cover the set of services provided by FTP Competition from HTTP has led to FTP’s demise HTTPFTP 17

Modeling protocol deaths A node u dies if its value is significantly less than the value of its strongest (i.e., maximum value) competitor. z: mortality parameter 18

Cascade deaths u is w’s competitor Suppose that w dies due to competition with u (r=3/7) If a node w dies, its products also die if their only substrate is w. This can lead to cascade deaths. 19

Protocol births Basic birth process  Number of new nodes at given time is a small fraction of total number of nodes in network at that time.  New nodes assigned randomly to layers Death-regulated birth process  The birth rate at a layer is regulated by the death rate in that layer  Discussed later 20

Summary of EvoArch Discrete-time model – Time advances in rounds Each round includes  birth of new nodes  competition among nodes at the same layer  potentially, death of some nodes Key parameters – Generality vector s – Competition threshold c – Mortality parameter z 21

Outline Motivation Model Description Results – Emergence of hourglass structures – Controlling the location/width of the waist – Evolutionary kernels – Protocol differences Conclusions 22

Hourglass shape The network forms an hourglass structure over time The waist usually occurs at layer 5 or 6. L = 10 c = 3/5 z = 1 s(l) = 1-l/L 23

Hourglass Resemblance Metric  w(l) : width of layer l  Minimum occurs at layer b  X = {w(l), l = 1,... b}  Y = {w(l), l = b,...L}  Mann-Kendall statistic for monotonic trend on the sequences X and Y: coefficients τ X and τ Y  H = (τ Y – τ X )/2 H=1 when widths first decrease and then increase (monotonically) Width Layer number w(1) w(2) … w(b) w(b+1) … W(L) 24

Robustness High hourglass scores under a wide range of parameters 25

Why does EvoArch generate hourglass-shaped networks? Small generality Low competition (local) Low death probability Large generality Frequent competition Protocols have similar substrates & values Low death probability Generality close to 50% Few protocols with many products Most other protocols die 26

How can we get a wider waist? As γ increases – Location of the waist moves to higher layers – Width of waist increases 27 γ is the layer at which the generality is 50% Layer numberγ 0.5 s(l)

Evolutionary kernels 28

How can a kernel die? Normalized value of a node: value divided by maximum possible value at that round If several nodes appear at the next higher layer, and kernel fails to quickly acquire those new possible products, someone else may do so.. 29

Death-regulated birth process? What if the birth probability in a layer is regulated by the death probability in that layer? 30 It becomes practically impossible to replace kernels

What if protocols differ in term of a “quality factor”? The “quality factor” can be interpreted broadly  Performance,  Extent of deployment,  Reliability or security,  Incremental improvements,  etc 31

Effects of quality factor We still get an hourglass Lower part of hourglass is smaller in size – only high quality nodes survive at the lower part Kernels are often NOT the highest quality protocols 32

Outline Motivation Model Description Results Concluding remarks 33

What does this mean for the Internet architecture? New way to think about (and teach) Internet’s hourglass architecture New way to think about “ossification” of protocols at the waist Parameterized model for TCP/IP stack: – Two protocols compete when their service overlap is more than 70% – A protocol survives only if its value is more than 90% of its strongest competitor’s value – Death-regulated births 34

What does this mean for IPv4 vs IPv6? IPv6 has same products but lower extent of deployment (i.e., lower “quality factor”) IPv6 would find it easier to compete w IPv4 if: – It had some distinct products that IPv4 does not have – Unfortunately, it only offers more addresses IPv6 would face easier adoption if it was not presented as “IPv4 replacement” but as “the second network-layer protocol” 35

What does this mean for future Internet architectures? Hourglass structures should be expected if these new architectures evolve/compete Designers should strive for wider waist – More diverse waist -> more evolvable architecture EvoArch: as the waist moves higher, it also becomes wider – How to push the waist to a higher layer? – See highly relevant paper: L. Popa, A. Ghodsi, and I. Stoica. HTTP as the Narrow Waist of the Future Internet. In ACM SIGCOMM HotNets,

From Networking to Network Science Hourglass effect in development of embryos Hourglass effect in organization structures Hourglass effect in innate immune system 37

38 Thanks to Todd Streelman (School of Biology, Georgia Tech) Soojin Yi (School of Biology, Georgia Tech) National Science Foundation (NSF)