{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:31:42Z","timestamp":1760707902511,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,1,30]],"date-time":"2008-01-30T00:00:00Z","timestamp":1201651200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2008,1,30]]},"abstract":"<jats:p>As significant resources are directed towards clean-slate networking research, it is imperative to understand how clean-slate architectural research compares to the diametrically opposite paradigm of evolutionary research. This paper approaches the \"evolution versus clean-slate\" debate through a biological metaphor. We argue that evolutionary research can lead to less costly (more competitive) and more robust designs than clean-slate architectural research. We also argue that the Internet architecture is not ossified, as recently claimed, but that its core protocols play the role of \"evolutionary kernels\", meaning that they are conserved so that complexity and diversity can emerge at the lower and higher layers. We then discuss the factors that determine the deployment of new architectures or protocols, and argue, based on the notion of \"auto-catalytic sets\", that successful innovations are those that become synergistic components in closed loops of existing modules. The paper closes emphasizing the role of evolutionary Internet research<\/jats:p>","DOI":"10.1145\/1341431.1341436","type":"journal-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T15:32:16Z","timestamp":1202484736000},"page":"29-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["What would Darwin think about clean-slate architectures?"],"prefix":"10.1145","volume":"38","author":[{"given":"Constantine","family":"Dovrolis","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2008,1,30]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"1321","volume":"304","author":"Bejerano G.","year":"2004","unstructured":"G. Bejerano , M. Pheasant , I. Makunin , S. Stephen , W. James Kent , J. Mattick , and D. Haussler . Ultraconserved Elements in the Human Genome. Science , 304 : 1321 -- 1325 , May 2004 . G. Bejerano, M. Pheasant, I. Makunin, S. Stephen, W. James Kent, J. Mattick, and D. Haussler. Ultraconserved Elements in the Human Genome. Science, 304:1321--1325, May 2004.","journal-title":"Ultraconserved Elements in the Human Genome. Science"},{"key":"e_1_2_1_2_1","first-page":"1664","volume":"295","author":"Csete M.","year":"2002","unstructured":"M. Csete and J. Doyle . Reverse Engineering of Biological Complexity. Science , 295 : 1664 -- 1669 , March 2002 . M. Csete and J. Doyle. Reverse Engineering of Biological Complexity. Science, 295:1664--1669, March 2002.","journal-title":"Reverse Engineering of Biological Complexity. Science"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tibtech.2004.07.007"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1113832"},{"key":"e_1_2_1_5_1","volume-title":"DIMACS Tutorial on Algorithms for Next Generation Networks","author":"Dovrolis C.","year":"2007","unstructured":"C. Dovrolis . Four Myths about GENI (and one recommendation) . Presented at the DIMACS Tutorial on Algorithms for Next Generation Networks , August 2007 . C. Dovrolis. Four Myths about GENI (and one recommendation). Presented at the DIMACS Tutorial on Algorithms for Next Generation Networks, August 2007."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273460"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the National Academy of Science (PNAS), 98(2):543--547","author":"Jain S.","year":"2001","unstructured":"S. Jain and S. Krishna . A Model for the Emergence of Cooperation, Interdependence, and Structure in de-Evolving Networks . Proceedings of the National Academy of Science (PNAS), 98(2):543--547 , January 2001 . S. Jain and S. Krishna. A Model for the Emergence of Cooperation, Interdependence, and Structure in de-Evolving Networks. Proceedings of the National Academy of Science (PNAS), 98(2):543--547, January 2001."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.032618499"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633035"},{"key":"e_1_2_1_10_1","volume-title":"December","author":"Hartwell L.","year":"1999","unstructured":"L. Hartwell , J. Hopfield , S. Leibler , and A. Murray . From Molecular to Modular Cell Biology. Nature, play-402:C47-C52 , December 1999 . L. Hartwell, J. Hopfield, S. Leibler, and A. Murray. From Molecular to Modular Cell Biology. Nature, play-402:C47-C52, December 1999."},{"key":"e_1_2_1_11_1","unstructured":"National Science Foundation. NSF NeTS FIND appli-Initiative. http:\/\/www.nets-find.net.  National Science Foundation. NSF NeTS FIND appli-Initiative. http:\/\/www.nets-find.net."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-III)","author":"Peterson L.","year":"2004","unstructured":"L. Peterson , S. Shenker , and J. Turner . Overcoming the Internet Impasse through Virtualization . In Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-III) , November 2004 . L. Peterson, S. Shenker, and J. Turner. Overcoming the Internet Impasse through Virtualization. In Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-III), November 2004."},{"key":"e_1_2_1_13_1","volume-title":"What Makes For a Successful Protocol? http:\/\/tools.ietf.org\/html\/draft-iab-protocol-success-01","author":"Thaler D.","year":"2007","unstructured":"D. Thaler and B. Aboba . What Makes For a Successful Protocol? http:\/\/tools.ietf.org\/html\/draft-iab-protocol-success-01 , 2007 . D. Thaler and B. Aboba. What Makes For a Successful Protocol? http:\/\/tools.ietf.org\/html\/draft-iab-protocol-success-01, 2007."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/944759.944768"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341431.1341436","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1341431.1341436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:54Z","timestamp":1750253934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341431.1341436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,30]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1,30]]}},"alternative-id":["10.1145\/1341431.1341436"],"URL":"https:\/\/doi.org\/10.1145\/1341431.1341436","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2008,1,30]]},"assertion":[{"value":"2008-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}