The Bio-Networking Architecture: a biologically inspired approach to the design of scalable, adaptive, and survivable/available network applications

We believe that the challenges faced by future network applications, such as scalability, adaptability, and survivability/availability, have already been overcome by large scale biological systems and that future network applications will benefit by adopting key biological principles and mechanisms. Our initial effort at applying biological principles and mechanisms to the design and implementation of network applications has produced the Bio-Networking Architecture. In the Bio-Networking Architecture, a collection of autonomous mobile agents, called cyber-entities, are used to implement an application. The desirable characteristics of an application, i.e. scalability, adaptability, and survivability/availability, emerge from the collective actions and interactions of its constituent cyber-entities. We describe a Web content distribution application called Aphid, and show through simulations that Aphid adapts to changing user demand and location. Aphid's scalability and survivability/availability are also demonstrated.

[1]  R. Lewontin ‘The Selfish Gene’ , 1977, Nature.

[2]  K. Dumpert The social biology of ants , 1981 .

[3]  N. Franks Army Ants: A Collective Intelligence , 1989 .

[4]  Mark M. Millonas,et al.  Swarms, Phase Transitions, and Collective Intelligence , 1993, adap-org/9306002.

[5]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[6]  Una-May O'Reilly,et al.  Genetic Programming II: Automatic Discovery of Reusable Programs. , 1994, Artificial Life.

[7]  T. Seeley The Wisdom of the Hive , 1995 .

[8]  John H. Holland,et al.  Hidden Order: How Adaptation Builds Complexity , 1995 .

[9]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[10]  Patrik D'haeseleer,et al.  An immunological approach to change detection: theoretical results , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[11]  G.J. Minden,et al.  A survey of active network research , 1997, IEEE Communications Magazine.

[12]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[13]  Thomas S. Ray,et al.  Evolution of differentiated multi-threaded digital organisms , 1998, Proceedings 1999 IEEE/RSJ International Conference on Intelligent Robots and Systems. Human and Environment Friendly Robots with High Intelligence and Emotional Quotients (Cat. No.99CH36289).

[14]  Deborah Estrin,et al.  Scalable Coordination in Sensor Networks , 1999, MobiCom 1999.