The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture∗

The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture∗

The Evolution of Layered Protocol Stacks Leads to an Hourglass-Shaped Architecture∗ Saamer Akhshabi Constantine Dovrolis College of Computing College of Computing Georgia Institute of Technology Georgia Institute of Technology [email protected] [email protected] ABSTRACT Thunderbird Silverlight FireFox Skype Kazaa MPlayer The Internet protocol stack has a layered architecture that resem- bles an hourglass. The lower and higher layers tend to see frequent Skype/Kazaa SMTP POP HTTP RTP innovations, while the protocols at the waist of the hourglass appear P2P Protocol to be “ossified”. We propose EvoArch, an abstract model for study- ing protocol stacks and their evolution. EvoArch is based on a few TCP UDP principles about layered network architectures and their evolution in a competitive environment where protocols acquire value based on their higher layer applications and compete with other protocols IPv4 at the same layer. EvoArch produces an hourglass structure that is similar to the Internet architecture from general initial conditions PPP Ethernet 802.11 DOCSIS and in a robust manner. It also suggests a plausible explanation why some protocols, such as TCP or IP, managed to survive much Optical longer than most other protocols at the same layers. Furthermore, it Coaxial Cable Twisted Pair CDMA TDMA Fiber suggests ways to design more competitive new protocols and more evolvable future Internet architectures. Figure 1: An (incomplete) illustration of the hourglass Internet Categories and Subject Descriptors: C.2.5 [Computer Commu- architecture. nication Networks]: Internet General Terms: Theory Another important question is: why do we tend to see more fre- Keywords: Internet Architecture, Future Internet, Layering, Net- quent innovations at the lower or higher layers of the protocol work Science, Evolutionary Kernels, Evolution. hourglass, while the protocols at the waist of the hourglass appear to be “ossified” and difficult to replace? During the last 30–40 years we have seen many new physical and data link layer protocols 1. INTRODUCTION created and surviving. And of course the same can be said about Why does the Internet protocol stack resemble an hourglass? Is applications and application-layer protocols. On the other hand, it a coincidence, intentional design, or the result of an evolutionary the protocols at the waist of the hourglass (mostly IPv4, TCP and process in which new protocols compete with existing protocols UDP) have been extremely stable and they have managed to out- that offer similar functionality and services? The protocol stack compete any protocols that offer the same or similar functionality. was not always shaped in this way. For instance, until the early How can a new protocol manage to survive the intense competition nineties there were several other network-layer protocols compet- with those core protocols at the waist of the Internet hourglass? In ing with IPv4, including Novell’s IPX, the X.25 network protocol fact, the ossification of the hourglass waist has been a major moti- used in Frame Relay, the ATM network layer signaling protocol, vation for “clean-slate” efforts to design a novel future Internet ar- and several others. It was through a long process that IPv4 eventu- chitecture [16]. There are two important questions in that context. ally prevailed as practically the only surviving protocol at layer-3, First, how can we make it more likely that a new (and potentially creating a very narrow waist at the Internet architecture hourglass better) protocol replaces an existing and widely used incumbent (see Figure 1). protocol? And second, how can we make sure that a new archi- tecture we design today will not be ossified 10–20 years later? In ∗This research was supported by the NSF award 0831848 (“To- wards a Theory of Network Evolution”). other words, what makes a protocol stack or network architecture evolvable? The previous questions have generated an interesting debate [9, 10, 19]. In this paper, we attempt a first effort to study protocol stacks Permission to make digital or hard copies of all or part of this work for (and layered architectures, more generally) as well as their evolu- personal or classroom use is granted without fee provided that copies are tion in a rigorous and quantitative manner. Instead of only con- not made or distributed for profit or commercial advantage and that copies sidering a specific protocol stack, we propose an abstract model bear this notice and the full citation on the first page. To copy otherwise, to in which protocols are represented by nodes, services are repre- republish, to post on servers or to redistribute to lists, requires prior specific sented by directed links, and so a protocol stack becomes a layered permission and/or a fee. SIGCOMM’11, August 15–19, 2011, Toronto, Ontario, Canada. directed acyclic graph (or network). Further, the topology of this Copyright 2011 ACM 978-1-4503-0797-0/11/08 ...$10.00. graph changes with time as new nodes are created at different lay- ers, and existing nodes are removed as a result of competition with at the same layer, and it shows how such ossified protocols can be other nodes at the same layer. eventually replaced (§6). The proposed evolutionary model, referred to as EvoArch, is 8- When we extend EvoArch to capture the effect of different pro- based on few principles about layered network architectures in which tocol qualities, we find that the lower part of the hourglass is sig- an “item” (or service) at layer-X is constructed (or composed) us- nificantly smaller than the upper part (§7.1). ing items at layer-(X-1). These principles capture the following: 9- The most stable protocols at the waist of the architecture are of- (a) the source of evolutionary value for an item, ten not those with the highest quality (§7.2). (b) the generality of items as we move to higher layers, 10- Finally, EvoArch offers a new way to think about the compe- (c) the condition under which two items compete, tition between IPv4 and IPv6 and to understand why the latter has (d) the condition under which one item causes the death or removal not managed to replace the former (§7.3). of a competing item. The rest of the paper is structured as follows. In Section 2, we Perhaps surprisingly, these few principles are sufficient to produce describe EvoArch and explain how the model relates to protocol hourglass-shaped layered networks in relatively short evolutionary stacks and evolving network architectures. In Section 3, we present periods. basic results to illustrate the behavior of the model and introduce As with any other model, EvoArch is only an abstraction of re- some key metrics. Section 4 is a robustness study showing that the ality focusing on specific observed phenomena, in this case the model produces hourglass structures for a wide range of parameter hourglass structure of the Internet protocol stack, and attempting values. The effect of those parameters is studied in Section 5 fo- to identify a parsimonious set of principles or mechanisms that are cusing on the location and width of the waist. Section 6 examines sufficient to reproduce the observed phenomena. As such, EvoArch the evolutionary kernels of the architecture, i.e., those few nodes is an explanatory model (as opposed to black-box models that aim at the waist that survive much longer than other nodes. Section 7 to only describe statistically some observations). EvoArch deliber- generalizes EvoArch in an important and realistic manner: what if ately ignores many aspects of protocol architectures, such as the different protocols at the same layer have different qualities (such functionality of each layer, technological constraints, debates in as performance or extent of deployment)? We review related work standardization committees, and others.1 The fact that these practi- in Section 8, present some criticism in Section 9, and conclude in cal aspects are not considered by EvoArch does not mean that they Section 10. are insignificant; it means, however, that if the evolution of network architectures follows the principles that EvoArch is based on, then those aspects are neither necessary nor sufficient for the emergence 2. MODEL DESCRIPTION of the hourglass structure. In EvoArch, a protocol stack is modeled as a directed and acyclic EvoArch is certainly not going to be the only model, or “the cor- network with L layers (see Figure 2). Protocols are represented rect model”, for the emergence of hourglass-shaped network archi- by nodes, and protocol dependencies are represented by directed tectures. It is likely that there are other models that can produce the edges. If a protocol u at layer l uses the service provided by a pro- same hourglass structure, based on different principles and param- tocol w at layer l−1, the network includes an “upwards” edge from 2 eters. Additionally, EvoArch does not aim to capture every aspect w to u. The layer of a node u is denoted by l(u). The incoming of the Internet architecture; it only focuses on the emergence of edges to a node u originate at the substrates of u, represented by the hourglass structure, and so it may be the wrong model to use the set of nodes S(u). Every node has at least one substrate, ex- for other purposes (e.g., to study the economics of new protocol cept the nodes at the bottom layer. The outgoing edges of a node deployment). G.Box wrote that “all models are wrong but some u terminate at the products of u, represented by the set of nodes models are useful” [3]. We believe that EvoArch is a useful model P (u). Every node has at least one product, except the nodes at the for (at least) the following ten reasons: top layer.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us