ONR MURI: NexGeNetSci Universal Laws and Architectures John Doyle John G Braun Professor Control and Dynamical Systems, BioEng, ElecEng Caltech Third Year.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Modeling Maze Navigation Consider the case of a stationary robot and a mobile robot moving towards a goal in a maze. We can model the utility of sharing.
Kick-off Meeting, July 28, 2008 ONR MURI: NexGeNetSci Distributed Coordination, Consensus, and Coverage in Networked Dynamic Systems Ali Jadbabaie Electrical.
Embedded Networking and One to Many to One John Heidemann USC/ISI ICNP Panel—November 2, 1999.
Javad Lavaei Department of Electrical Engineering Columbia University Various Techniques for Nonlinear Energy-Related Optimizations.
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
John Doyle 道陽 Jean-Lou Chameau Professor Control and Dynamical Systems, EE, & BioE tech 1 # Ca Universal laws and architectures: Theory and lessons from.
Lab Practical 2 Study about different types of Networking Device
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Technical Architectures
Digital Systems Emphasis for Electrical Engineering Students Digital Systems skills are very valuable for electrical engineers Digital systems are the.
CS533 Concepts of Operating Systems Class 20 Summary.
Compressed Sensing for Networked Information Processing Reza Malek-Madani, 311/ Computational Analysis Don Wagner, 311/ Resource Optimization Tristan Nguyen,
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
ToNC workshop Next generation architecture H. Balakrishnan, A. Goel, D. Johnson, S. Muthukrishnan, S.Tekinay, T. Wolf DAY 2, Feb
Internet Research Needs a Critical Perspective Towards Models –Sally Floyd –IMA Workshop, January 2004.
Cross Layer Design in Wireless Networks Andrea Goldsmith Stanford University Crosslayer Design Panel ICC May 14, 2003.
Computer Network Architecture and Programming
Theory Data Analysis Numerical Experiments Lab Experiments Field Exercises Real-World Operations First principles Rigorous math Algorithms Proofs Correct.
Subnetting.
Kick-off Meeting, July 28, 2008 ONR MURI: NexGeNetSci Next Generation Network Science: An Overview Michael Kearns and Ali Jadbabaie University of Pennsylvania.
1 Security and Software Engineering Steven M. Bellovin AT&T Labs – Research
WAN Technologies.
Javad Lavaei Department of Electrical Engineering Columbia University Optimization over Graph with Application to Power Systems.
Low-Rank Solution of Convex Relaxation for Optimal Power Flow Problem
Javad Lavaei Department of Electrical Engineering Columbia University Joint work with Somayeh Sojoudi Convexification of Optimal Power Flow Problem by.
Presented by: Alvaro Llanos E.  Motivation and Overview  Frangipani Architecture overview  Similar DFS  PETAL: Distributed virtual disks ◦ Overview.
Christopher Bednarz Justin Jones Prof. Xiang ECE 4986 Fall Department of Electrical and Computer Engineering University.
Reducing Risk by Managing Software Related Failures in Networked Control Systems Girish Baliga, Google, Inc Scott Graham, Air Force Inst. of Technology.
Complexity and Fragility? John Doyle Control and Dynamical Systems BioEngineering Electrical Engineering Caltech with Prajna, Papachristodoulou, and Parrilo.
Chapter 3 Hardware, Software, and Networks Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Introduction – Part II.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Sogang University Advanced Computing System Chap 1. Computer Architecture Hyuk-Jun Lee, PhD Dept. of Computer Science and Engineering Sogang University.
Rensselaer Polytechnic Institute Rajagopal Iyengar Combinatorial Approaches to QoS Scheduling in Multichannel Wireless Systems Rajagopal Iyengar Rensselaer.
High-Performance Computing An Applications Perspective REACH-IIT Kanpur 10 th Oct
1 Evolving a Manageable Internet Tom Anderson University of Washington.
1. Process Gather Input – Today Form Coherent Consensus – Next two months.
QoS research in a complicated world Christian Huitema Architect Windows Networking & Communications Microsoft Corporation.
IEEE TRANS ON AUTOMATIC CONTROL, FEBRUARY, 2011 Sandberg, Delvenne, and Doyle today.
The Cosmic Cube Charles L. Seitz Presented By: Jason D. Robey 2 APR 03.
Chapter 1 Computer Abstractions and Technology. Chapter 1 — Computer Abstractions and Technology — 2 The Computer Revolution Progress in computer technology.
When concepts fail, words arise Faust, Goethe Mephistopheles. …Enter the templed hall of Certainty. Student. Yet in each word some concept there must be.
Design, Optimization, and Control for Multiscale Systems
High-integrity Sensor Networks Mani Srivastava UCLA.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing And Switching 1.0.
MIT Lincoln Laboratory Dynamic Declarative Networking Exploiting Declarative Knowledge To Enable Energy Efficient Collaborative Sensing Daniel J. Van Hook.
Robot Intelligence Technology Lab. Evolutionary Robotics Chapter 3. How to Evolve Robots Chi-Ho Lee.
Why is Design so Difficult? Analysis: Focuses on the application domain Design: Focuses on the solution domain –The solution domain is changing very rapidly.
1 Building big router from lots of little routers Nick McKeown Assistant Professor of Electrical Engineering and Computer Science, Stanford University.
Computer System Structures
Sub-fields of computer science. Sub-fields of computer science.
Presented by Muhammad Abu Saqer
CHAPTER 3 Architectures for Distributed Systems
Software Defined Networking (SDN)
Practical Issues for Commercial Networks
Introduction to Virtual Machines
Introduction to Virtual Machines
Presentation transcript:

ONR MURI: NexGeNetSci Universal Laws and Architectures John Doyle John G Braun Professor Control and Dynamical Systems, BioEng, ElecEng Caltech Third Year Review: October27, 2010 Plus a cast of thousands

Theory Data Analysis Numerical Experiments Lab Experiments Field Exercises Real-World Operations First principles Rigorous math Algorithms Proofs Correct statistics Only as good as underlying data Simulation Synthetic, clean data Stylized Controlled Clean, real-world data Semi- Controlled Messy, real-world data Unpredictable After action reports in lieu of data Doyle Universal Laws and Architectures layered multiscale

Laws, laws, and architecture Conservation laws, constraints, hard limits – Important tradeoffs are between – Control, computation, communication, energy, materials, measurement – Existing theory is fragmented and incompatible – Continuing progress on unifications Power laws, data, models, high variability Architecture= “constraints that deconstrain” – Expand “layering as optimization” – Include human in loop and physical action/control – Achieving hard limits

Triaged today Power laws, data, models, high variability – Estimating tails, MLE and WLS – High variability in markets Architecture – Dynamics in layered architectures – Case studies: TCP/IP, cell, brain, wildfire ecology, … – Naming and addressing details – Beam forming details

IEEE TRANS ON SYSTEMS, MAN, AND CYBERNETICS, JULY 2010 Alderson and Doyle

Each focuses on one dimension Important tradeoffs are across these dimensions Need “clean slate” theories Progress is encouraging (Old mysteries are also being resolved) wasteful fragile? slow ? Thermodynamics (Carnot) Communications (Shannon) Control (Bode) Computation (Turing) Standard system theories are severely limited

Robust Secure Scalable Evolvable Verifiable Maintainable Designable … Fragile Not … Unverifiable Frozen … Most dimensions are robustness Collapse for visualization fragile

wasteful fragile Conservation laws waste time waste resources Important tradeoffs are across these dimensions Speed vs efficiency vs robustness vs … Robustness is most important for complexity Collapse efficiency dimensions

Conservation laws wasteful fragile ? ? ? ?

Bad theory?  ???  ? ? Bad architectures? wasteful fragile gap?

Sharpen hard bounds Hard limit Case studies wasteful fragile Conservation laws

Architecture “Conservation laws” Good architectures allow for effective tradeoffs wasteful fragile Alternative systems with shared architecture

Sharpen hard bounds  bad  Find and fix bugs Complementary approaches wasteful fragile Case studies

 bad  Find and fix bugs wasteful fragile

TCP IP Physical MAC Switch MAC Pt to Pt Diverse applications Layered architectures

App Applications Layered architecture Router Client Server

App Applications Layered architecture Router Client Server 3.5 viewpoints on layered architecture: Operating systems Programming languages Control and dynamical systems Operations research, optimization Information theory

Naming and addressing Names to locate objects 2.5 ways to resolve a name 1.Exhaustive search, table lookup 2.Name gives hints Extra ½ is for indirection Address = name that involves locations

Operating systems OS allocates and shares diverse resources among diverse applications “Strict layering” is crucial e.g. clearly separate –Application name space –Logical (virtual) name/address space –Physical (name/) address space Name resolution within applications Name/address translation across layers

Benefits of stricter layering “Black box” effects of stricter layering Portability of applications Security of physical address space Robustness to application crashes Scalability of virtual/real addressing Local variables and addresses Optimization/control by duality?

Problems with incomplete layering “Black box” benefits are lost Global variables? Poor portability of applications Insecurity of physical address space Fragile to application crashes No scalability of virtual/real addressing Limits optimization/control by duality?

App kernel user In operating systems: Don’t cross layers Direct access to physical memory? In programming: No global variables

App Applications Router

App IPC Global and direct access to physical address! Robust? Secure Scalable Verifiable Evolvable Maintainable Designable … DNS IP addresses interfaces not nodes

Naming and addressing need to be resolved within layer translated between layers not exposed outside of layer Related issues DNS NATS Firewalls Multihoming Mobility Routing table size Overlays …

Embedded virtual actuator/ sensor Network cable Controller Lib App DIF Networked/embedded/layered Lib Physical plant

Embedded virtual actuator/ sensor Network cable Controller DIF Physical plant Meta-layering of cyber-phys control

Architecture “Conservation laws” Good architectures allow for effective tradeoffs wasteful fragile Alternative systems with shared architecture

Embedded virtual actuator/ sensor DIF Collapsing the stack at the edges Lib Physical plant Exploiting the physical Collapsing the stack at the edges

Architecture Good architectures allow for effective tradeoffs wasteful fragile Exploiting the physical Collapsing the stack at the edges

Programmable Antenna Design Using Convex Optimization Lavaei, Babakhani, Hajimiri, and Doyle Caltech Theory: Lavaei, Doyle Experiment: Babakhani, Ali Hajimiri I Q

Papers by Lavaei, Babakhani, Hajimiri, and Doyle, "Design of Passively Controllable Smart Antennas for Wireless Sensor Networks," Submitted to IEEE Transactions on Automatic Control. "Solving Large-Scale Hybrid Circuit-Antenna Problems," To appear in IEEE Transactions on Circuits and Systems I, "'Passively Controllable Smart Antennas," to appear in IEEE Global Communications Conference (GLOBECOM), Miami, Florida, "Finding Globally Optimum Solutions in Antenna Optimization Problems," in IEEE International Symposium on Antennas and Propagation, Toronto, Canada, "Programmable Antenna Design Using Convex Optimization," in Math. Theory of Networks and Systems, Budapest,2010 (invited paper). "A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization," in American Control Conference, Baltimore, "Solving Large-Scale Linear Circuit Problems via Convex Optimization," in Proc. 48th IEEE Conf on Dec. and Control, Shanghai, China,

Summary of results 34  A passively controllable smart (PCS) antenna that can be implemented as an integrated circuit and be programmed in real time.  Can be used for smart data transmission.  For the first time, excellent beam-forming patterns obtained with a small-sized antenna.  The programming of the PCS antenna overcomes apparent intractability.  Potentially completely changes what is possible at wireless physical layer

Sharpen hard bounds  bad  Find and fix bugs Complementary approaches wasteful fragile Case studies

Sharpen hard bounds wasteful fragile Case studies that achieve bounds

Theory plus biology case study Hard tradeoffs between Fragility (disturbance rejection) Metabolic overhead – Amount (of enzymes) – Complexity (of enzymes) Glycolytic oscillations Most ubiquitous and studied “circuit” in science or engineering New insights and experiments Resolves longstanding mysteries Biology component funded by NIH and Army ICB

Fragility (disturbance rejection) Metabolic overhead – Amount (of enzymes) – Complexity (of enzymes) Fragility hard limit simple enzyme Enzyme amount complex enzyme

simple enzyme Fragility Enzyme amount complex enzyme Theorem

Fragility (standard control theory) rigorous, first-principles.

simple enzyme Enzyme amount complex enzyme Theorem z and p are functions of enzyme complexity and amount standard biochemistry models phenomenological first principles?

Fragility Biological architectures achieve hard limits and use complex enzymes and networks complex enzyme Enzyme amount control of enzyme levels

Fragility Metabolic overhead Architecture “Conservation laws” Good architectures allow for effective tradeoffs Alternative biocircuits with shared architecture

Architecture “Conservation laws” Good architectures allow for effective tradeoffs wasteful fragile Alternative systems with shared architecture

Phenomenology 1.Incorporate domain specifics 2.First principles models

Fragility hard limits simple Overhead, waste complex General Rigorous First principle Domain specific Ad hoc Phenomenological Plugging in domain details ?

Fragility Overhead, waste General Rigorous First principle Domain specific Ad hoc Phenomenological Plugging in domain details ? Fundamental multiscale physics Start classically Foundations, origins of – noise – dissipation – amplification

IEEE TRANS ON AUTOMATIC CONTROL, to appear, FEBRUARY, 2011 Sandberg, Delvenne, and Doyle

Layers in hardware So well-known as to be taken for granted Digital abstraction and modularity Analog substrate is active and lossy Microscopic world is lossless Reconcile these in a clear and coherent way Exploit designable physical layer more

+ step response V(t)V(t)

Time (sec) Amplitude dissipative, lossy But the microscope world is lossless (energy is conserved). Where does dissipation come from?

+ step response V(t)V(t) Lossless Approximate + step response dissipative, lossy

+ step response V(t)V(t) Lossless Approximate Lossless Approximate

step response Lossless Approximate T= Time (sec) Amplitude n=10

T=1 n= n=100

Time (sec) + step response V(t)V(t) Lossless Approximate T=1n=10 n=4

Time (sec) Amplitude n=10 step response Lossless Approximate

random initial conditions n= Response to Initial Conditions Time (sec) Amplitude

T=1 n=100 n= Response to Initial Conditions Time (sec) Amplitude

T= Dissipation Fluctuation Theorem: Fluctuation  Dissipation

Theorem: Linear passive iff linear lossless approximation Theorem: Linear active needs nonlinear lossless approximation

System SenseEst. + - “Physical” implementation Back action Sensor “noise” Consequences

Back action System SenseEst. + - Sensor at temp T Short interval ( 0, t ) Sensor “noise” Theorem

System Sense Est. + - back-action error

Sensor “noise” System Sense Est. + - error

Back action System Sense Est. + - back-action

System Sense Est. + - back-action error Theorem:

System Sense Est. + - error Cold sensors are better and faster (but not cheaper) back-action

System Sense Est. + - back- action error larger t more data smaller t less data

System Sense Est. + - back- action error A transient and far-from-equilibrium upgrade of statistical mechanics

back- action error A transient and far-from-equilibrium upgrade of statistical mechanics Estimation to control Efficiency of devices, enzymes Classical to quantum

mix unmix rank k Power laws

SoCalFaults.pdf

4 2lpnf-w 2 bigsur 12 3lpnf-nw Mix and unmixed fits well with a=-.5 in body, Mix tail is deviating as expected 2 bigsur 4 2lpnf-w 12 3lpnf-nw These are the closest to our assumptions: Coastal Chaparral large watersheds limited urban boundary mechanistic model

4 2lpnf-w 2 bigsur 12 3lpnf-nw mix Mix and unmixed fits well with a=-.5 in body, Mix tail is deviating as expected 2 bigsur 4 2lpnf-w 12 3lpnf-nw These are the closest to our assumptions: Coastal Chaparral large watersheds limited urban boundary

4 2lpnf-w 2 bigsur 12 3lpnf-nw mix Mix and unmixed fits well with a=-.5 in body, Mix tail is deviating as expected 2 bigsur 4 2lpnf-w 12 3lpnf-nw These are the closest to our assumptions: Coastal Chaparral large watersheds limited urban boundary model

4 2lpnf-w 2 bigsur 12 3lpnf-nw Cutoffs are crucial Size of all of CA hectares

Pareto distribution with finite-scale effect MLE  WLS  WLS with cutoff

Triaged today Power laws, data, models, high variability –Estimating tails, MLE and WLS –High variability in markets Architecture –Dynamics in layered architectures –Case studies: TCP/IP, cell, brain, wildfire ecology, … –Naming and addressing details –Beam forming details

Laws, laws, and architecture Conservation laws, constraints, hard limits – Important tradeoffs are between – Computation, control, communication, energy, materials, measurement – Existing theory is fragmented and incompatible – Continuing progress on unifications Power laws, data, models, high variability Architecture= “constraints that deconstrain” – Expand “layering as optimization” – Include human in loop and physical action/control – Achieving hard limits