| Internet-Draft | QNA | March 2026 |
| Van Meter, et al. | Expires 17 September 2026 | [Page] |
This quantum network architecture defines a set of planes providing different views of the network, supporting different responsibilities and modes of operation; a set of device, node and link types; some network topologies, deployment scenarios and their relationship to applications; and key design decisions as a result of corresponding requirements.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://moonshot-nagayama-pj.github.io/draft-van-meter-qirg-quantum-network-architecture/draft-van-meter-qirg-quantum-network-architecture.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-van-meter-qirg-quantum-network-architecture/.¶
Source for this draft and an issue tracker can be found at https://github.com/moonshot-nagayama-pj/draft-van-meter-qirg-quantum-network-architecture.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 17 September 2026.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
This document introduces the key architectural decisions, classical and quantum communication systems, and main node types for several classes of quantum networks.¶
We define the verb to architect as: within a set of environmental constraints, using a set of building blocks, design a system that satisfies a need, elegantly and economically. We use the noun architecture as: the set of blocks or subsystems, their roles and their interfaces and their overall arrangement, that defines the system. This architecture defines the overall structure, and is connected to a specific implementation as an example.¶
For a description of the key concepts in quantum networks and additional references, see [RFC9340] and the book Quantum Communications [hajdusek-qcomm].¶
For more background and discussion of the design choices in this architecture, see the Ph.D. dissertation of Naphan Benchasattabuse [res-mgmt-het].¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This section describes goals and non-goals for this document itself, rather than the technical goals and requirements for a network.¶
To define the principal concepts in a quantum network, principally for quantum multicomputer interconnects but also data center and wide-area networks where possible.¶
To enumerate some of the key architectural decisions for this architecture.¶
To describe how device, link and node types are defined.¶
To provide a guide to other documents.¶
Other organizations, including national laboratories and standards development organizations, are developing documents describing quantum networks and quantum computing technology. These are mostly pre-standardization documents, not yet on any formal standardization track. To the extent possible, this document conforms to their terminology. However, as this document describes a specific quantum network architecture, it does not attempt to conform to specific design decisions made in other contexts. See an August 2025 Science Policy Forum [aboy-governance] for additional discussion of some standardization efforts and their value.¶
Some of these are listed here for reference:¶
ETSI¶
IEEE Standards Association¶
ISO¶
ITU-T¶
ITU-T Focus Group on Quantum Information Technology for Networks (FG-QIT4N)¶
Y.3800 series on quantum key distribution networks¶
National Institute of Standards and Technology (NIST)¶
Single-Photon Sources and Detectors Dictionary [nist-singles]¶
Quantum Internet Research Group (QIRG) (part of IRTF)¶
This document assumes basic knowledge of the underlying technology and goals of quantum communications. The following list of topics may help readers who are not yet familiar with the concepts.¶
Linear algebra¶
Quantum information basics¶
Classical Internet-family networking¶
Quantum networking¶
Because terms such as fidelity have varying definitions, they will be defined in this set of documents (where? Timing Regimes?).¶
Readers needing additional background are referred to:¶
Van Meter, Quantum Networking [van-meter-q-net-book]¶
Hajdusek and Van Meter, Quantum Communications [hajdusek-qcomm]¶
In this document, we use the abbreviations and other related technical terms listed in the following table:¶
| Term | Description |
|---|---|
| BSA | Bell state analyzer, generally optical and incorporating one or more beamsplitters and either two or four single-photon detectors |
| device | manipulates photons in some fashion; a component of a node |
| FASQ | fault-tolerant application-scale quantum |
| fidelity | measures how close a quantum state is to the state we have tried to create. Varies between 0 and 1, with unit fidelity indicating the actual state is the same as the desired state. It expresses the probability that the state will behave exactly the same as our desired state. (adapted from RFC 9340) |
| group switch | In the Q-Fly architecture, the set of devices that connect the end nodes to the pool of BSAs, and the group to other groups |
| NISQ | near-term intermediate-scale quantum |
| node | a self-contained subsystem with a clear boundary that is visible to other such nodes as a single entity on one or more planes |
| optical mode | roughly, a place and time that a photon might be, which may be occupied by some, all or none of the amplitude of a single photon. More accurately, it is a field distribution obtained from solving Maxwell's equations given some boundary conditions. An optical mode is an eigensolution of the wave equation given the physical properties of the waveguide (dimensions, refractive index). It is a particular field distribution that can propagate through the waveguide. The state of a single photon can be expressed as a coherent superposition of such optical modes. For optics engineers, a 'mode' (or optical mode to be more precise) refers to a specific spatiotemporal distribution of electromagnetic field fluctuation. For quantum network engineers, especially those that would most likely be reading RFCs, two optical detectors are detecting different optical modes if one detector can be activated by light without activating the other. In that case, it is not wrong to say that the two detectors are detecting two independent optical modes. |
| path | the set of nodes and links that a connection passes through, including the end points |
| plane (architectural) | a view of the entire network for a particular purpose, such as management or data transmission |
| plane (optical) | a defined plane in physical space through which a photon passes; also referred to as a surface |
| QBER | quantum bit error rate |
| QNIC | quantum network interface card; in practice, the physical interface to a link plus the set of quantum memories under the control of the network stack. |
| QPU | quantum processing unit |
| RuleSet | a set of SDN-inspired, event-driven, short, real-time or near-real time, near-determininistic programs executed at nodes along a path to build application-requested entangled states |
| SNSPD | Superconducting Nanowire Single Photon Detector |
| multiqubit Pauli operators | tensor product of Pauli operators acting on two or more qubits |
| switch point | a 2x2 junction that can be either X (cross) or = (straight) |
| switch device | a single integrated, fiber- or free space-connected (physical) component, comprising one or more switch points |
| teledata | application execution via teleporting data from node to node, then executing gates locally. May be done remotely, mediated by Bell pairs. |
| telegate | application execution via remote gates (as defined by Eisert et al.). May be done remotely, mediated by Bell pairs. |
| time bin | compare to window and time slot |
| time slot | compare to window and time bin |
| window | compare to time bin and time slot |
The requirements for a network are determined by the application workload. This section orients architectural decisions by briefly introducing applications and the communication patterns they exhibit, which is a key factor determining the suitability of particular architectures.¶
Applications fall into two large categories: inherently distributed applications, or subdivision of monolithic applications for distributed execution, as in supercomputing applications running on multicomputer architectures.¶
For a discussion of some inherently distributed applications of quantum networks, see [RFC9583]. This network architecture supports the applications listed in that RFC, though not all networks will support all applications.¶
(Adapted and extended from unpublished text in [van-meter-opt-timing].)¶
Distinct from the classification of quantum repeater generations by Muralidharan et al. [muralidharan-generations], one can categorize distributed quantum systems by how applications interface with the network; specifically, the timing at which network interface qubits are freed after attempting entangled state generation.¶
In the early days of quantum information research, Bennett et al. recognized [bennett-mixed] that the component qubits of an entangled state may be held at different times in different locations, termed time-separated Bell pairs. Based on this principle, we can describe the timeline of information availability between two nodes. This model assumes entangled states are requested dynamically during execution, rather than pre-caching entangled states [schoute-shortcuts] for immediate consumption.¶
The lifecycle of an entanglement request, from initiation to full state knowledge, follows three distinct stages:¶
Attempt: The entangled states are requested. For memory-based links, this corresponds to the quantum memory emitting a photon and transmitting it through the link.¶
Heralded: The entangled states are physically established, but the specific states are unknown. The node has received confirmations that photons arrived at the BSA and the BSM succeeded, but the Pauli frame information is not yet available.¶
Correct: The classical message regarding the Pauli frame arrives. The node now knows the exact entangled state created and can apply corrections (or software frame updates) to align with the expected state.¶
Based on the timeline above, we classify Bell pair consumption into three classes [van-meter-opt-timing]. These classes are defined by whether the application must block execution while waiting for information at the Heralded or Correct stages. Note that the term "blocking" here refers to the blocking versus non-blocking execution models, similar to kernel-level I/O blocking or the event-driven programming paradigm, and is distinct from the concept of blocking in network switches.¶
| Class | Wait for Heralding? | Wait for Pauli Frame? | Application Behavior |
|---|---|---|---|
| Unentangled State Tolerant (B) | No | No | Non-Blocking: The application consumes the qubit immediately, handling failures or corrections in post-processing. |
| Reactive Correction (C) | Yes* | No | Partially Blocking: The application waits only for confirmation of existence (heralding), then proceeds by tracking errors in software. |
| Deterministic (T) | Yes | Yes | Strictly Blocking: The application blocks until the state is fully verified and corrected. |
*Note for Class C: If the link is fully deterministic (guaranteeing success), the application does not need to pause for heralding and become non-blocking.¶
It is important to note that these classes are determined by the nodes, not the network. The application nodes assess their own capabilities (number of buffer memories, gate and qubit error rate) and the network's performance (fidelity, rate, success probability) to select the appropriate operating class.¶
The selection of a class significantly impacts network resource utilization. For example, if a node possesses sufficient buffer memory, it may elect to operate in Class B from the perspective of the network interface. By moving the entangled state from the communication qubit to storage immediately (or measuring it immediately), the node frees up the network interface to service other requests. This reduces the workload on the network and increases the repetition rate, even if the application logic itself eventually requires the data for a Class T operation.¶
The defining characteristic of B Class applications is the ability to consume the (potential) entangled states immediately without waiting (fully non-blocking). The application effectively takes over the burden of validation from the network.¶
Execution Flow: The application does not stop. It measures or stores the qubit immediately. If the entanglement attempt failed (information received later), the data is discarded or treated as an erasure error.¶
Examples:¶
Classical Correlation: Applications like Quantum Key Distribution (QKD) protocols (e.g., E91) or link fidelity estimation. The application filters out failed attempts during classical post-processing.¶
Fault-Tolerant Operations: Certain remote quantum error correction schemes, such as remote lattice surgery [horsman-lattice-surgery], [ramette-remote], [leone-remote], [sinclair-ft-interconnect] of the surface code. If the probability of creating a link is high enough, unsuccessful attempts can be treated as depolarizing errors, which the logical code can tolerate without stalling the pipeline.¶
In C Class applications, the system requires confirmation that a link exists, but does not wait for the state details. The application proceeds by assuming a specific Bell state and managing deviations via software tracking.¶
Execution Flow: The application pauses briefly to ensure the Bell pair is Heralded. Once confirmed, it executes immediately. It does not wait for the Correct stage (Pauli frame); instead, it uses a "Pauli Frame Tracker" to propagate the necessary corrections through the circuit virtually. If the network link is deterministic, the specific wait for heralding is removed, as the node assumes success by default.¶
Examples: Clifford circuit execution, distributed Pauli-based computation with time-optimal scheme [litinski-gosc], and state teleportation.¶
T Class applications impose the strictest timing constraints, requiring the entangled state to idle the longest before being consumed.¶
Execution Flow: The application completely stalls. It must wait until the network provides both the confirmation of creation (Heralded) and the specific state information (Correct). Execution only resumes once the exact state is known or corrected.¶
Examples: Execution of circuits involving non-Clifford gates. While non-Clifford operations can theoretically be corrected post hoc (similar to Class C), doing so often requires consuming additional entangled states to fix the error. Since consuming extra resources is more costly than waiting, these operations default to Class T to ensure the state is correct before proceeding.¶
This section introduces concepts in classical and quantum computer and network architecture that may be unfamiliar, or that have a specific role in this network architecture.¶
A quantum device stores, carries, measures or computes on quantum variables.¶
A quantum device (often shortened to just "device" in this specification) is under software control; i.e. optical fibers or beam splitters are not classified as quantum devices.¶
Control of devices is usually done with respect to some physical characteristic of the device itself, rather than dealing with the abstract notion of qubits. A controllable wave plate, for example, may be adjusted in units of degrees of rotation of the plate. An example of a software package that provides such functionality is PnPQ.¶
A node comprises one or more quantum devices, and serves as a single locus of control for network protocols. The classes of nodes are described later in this document.¶
Links are described in Section 17.¶
A photonic synchronization domain (PSD) is the range of devices and fibers over which photons must be controlled with high precision in order to effect e.g. photonic entanglement swapping [mori-psds]. The primary concern of a PSD is getting photons to arrive at beamsplitters "simultaneously", with sufficient overlap, as specified in [I-D.draft-hajdusek-qirg-timing-physics].¶
In multicomputer architectures, a direct architecture features links that go directly from computational node to computational node. Hypercubes, meshes and toruses are typically direct architectures. An indirect architecture interposes one or more switches between computational nodes. Fat trees, Clos and Benes networks, and the various -fly topologies are generally indirect [dally-towles].¶
The distinction is somewhat artificial in that direct architectures sometimes incorporate a small switch inside the node, in which case the matching term depends on where you draw the boundary of the node, and because computational nodes can be configured to act only as routers within the network, modeling an indirect architecture using direct hardware.¶
Several detectors may be packaged as a single subsystem for purposes such as cooling, power, control and time stamping. An architecture built around a shared pool of detectors is a detector-centric architecture. This structure facilities entanglement distribution in a quantum system interconnect, data center network or some forms of local area network.¶
A detector-centric architecture is an indirect architecture if the pool of detectors is behind a switch or network of switches.¶
Many of the detector-centric network topologies can be inverted, such that the pool of detectors is replaced by a pool of entangled photon pair sources. The network then is used to distribute entanglement, with the photons measured, absorbed into memories, interfered with locally generated photons, or otherwise utilized at or near the end nodes. Such a network was proposed by Drost et al. [drost].¶
As noted in the 2022 roadmap for quantum interconnects [awschalom-roadmap], entangled quantum network technology can be deployed in a variety of scenarios with different requirements and assumptions. A full description of each of these is delegated to other documents, but a brief description here will help to orient discussions of design points in order to justify certain decisions.¶
The first deployment of production-level, distant quantum entanglement is likely to be in a quantum multicomputer, based on the same principles as classical distributed-memory supercomputers from the Caltech Cosmic Cube to Fugaku [rdv-thesis]. Multicomputer deployments will likely involve computational nodes, optical switches, Bell state analyzers, and possibly entangled photon pair sources (all defined below). Quantum repeaters with memory are less likely to be deployed in multicomputers, though one such architecture [choi-fat-tree] has been proposed. Because the current technology roadmaps favor this type of deployment, where design choices are in conflict or unclear, multicomputer designs are given priority over wide-area networks in this set of specifications.¶
The execution model is expected to be much like the classical supercomputing Message Passing Interface (MPI).¶
General hardware environment:¶
A multicomputer consists of a set of quantum nodes that are connected via quantum optical channels. The system may be either a direct (point-to-point, end node-to-end node) or an indirect (switched) design.¶
Every quantum node has a set of quantum devices and a classical controller.¶
End nodes are generally computational nodes, but measurement-only, sensor, and specialized memory storage nodes may be included.¶
End nodes are capable of running application programs as well as executing the minimum operations to build end-to-end entangled states.¶
End nodes may be built using multi-level hardware interconnects; when gates between physically distant qubits are mediated by first creating shared entangled states, the creation of those entangled states is the responsibility of the network subsystem.¶
Multicomputer interconnects are closed systems, with no need for cryptographic security mechanisms.¶
Many aspects of compilation and job execution are beyond the scope of this set of specifications, but some points will affect the network node definitions and interfaces, so it is important to present them here to establish a basis for design decisions:¶
The general purpose of a multicomputer system is to execute application programs that exceed the capabilities of a single quantum node. The subdivision of the application into smaller quantum programs and the assignment of those sub-programs to nodes in the network is beyond the scope of this specification, and may be either automatically done by the compiler or manually done by the programmer.¶
Programs are centrally compiled and distributed to nodes. (Note that, technically, this is different from classical MPI, where a command is sent to worker nodes, but the mapping of that command to an executable program and versioning and distribution of programs are outside the scope of MPI. It is, however, a convenient assumption and common practice to ensure the same program is executed at all worker nodes.)¶
Execution is coordinated by a job controller: every node executes the same program, but with different parameters (e.g., which portion of the problem to work on).¶
Applications consist of both classical computation and quantum computation; within a node, the classical portion of the program delegates certain computational tasks to the quantum processor (sometimes called a QPU), similar to a classical coprocessor such as a GPU.¶
Classical data related to quantum operations (principally measurement results and event notifications that trigger further actions) is sent peer-to-peer, not back to the centralized controller, during execution.¶
Within the runtime system, the interface between the (portion of the) application running at each node's classical controller is analogous to the interface between an application and the MPI messaging system or a socket in an ordinary Internet application. This quantum socket is an active area of research and is not defined here.¶
The creation of sequences of end-to-end entangled states, roughly equivalent to TCP, is the responsibility of RuleSets, inspired by software-defined networking (SDN). A RuleSet can also be viewed as something like a Berkeley Packet Filter (BPF): it's a small program that handled actions that the application could do, but the application can't achieve the low, reliable latency to do it.¶
In principle, all nodes are running the same program, distributed to all nodes. Since the compiled application circuits are often parameter- or input-dependent as well, separate nodes may have separate instances of the application. This may result in a small additional burden on the execution management system.¶
In principle, the application and the communication system are separately compiled and managed. However, in practice the RuleSet may be compiled as part of the application by using a library of network functions. (As with classical parallel program runtime systems, the boundary between the application program, supplied libraries, and the kernel itself (if any) is implementation-dependent.)¶
Compiling the network communication into the application program eliminates the need for separate program and RuleSet distribution protocols. However, the event messages that are part of the architecturally defined RuleSet operation are sent and received as usual, such that the behavior of the node is the same regardless of such implementation choices.¶
Compilation and execution may achieve application goals via teledata, telegate or measurement of multiqubit Pauli operators transparently; the network is unaware of this distinction. Management of application-level variables and their movement from node to node, if any, is the responsibility of the compiler and is beyond the scope of this specification.¶
The resources in a multicomputer may be partitioned to run multiple jobs [sane-jobs], but this is beyond the scope of the current specifications.¶
The realities of quantum hardware result in a few important differences from classical multicomputers:¶
Multicomputer interconnects may be either optically switched or composed entirely of point-to-point links. In switched networks, depending on optical hardware as well as photonic qubit representation, reconfiguring the switch or switches may be an extremely high-latency operation.¶
Application execution at end nodes proceeds in phases tied to specific communication patterns. Even with a fixed sequence of application-level operations, the execution time of a phase can be variable because entanglement generation is probabilistic. Local gates can also be probabilistic under some circumstances, but for many node hardware types, fast local gate execution means the impact of variable gate execution time will be small.¶
In switched systems, reconfiguration of switches is centrally coordinated between phases. Thus, while classical data moves directly node-to-node during autonomous phase execution, advancing from phase to phase must be done at the direction of the job controller.¶
Because execution is centrally coordinated, the network system is not required to provide multiplexing. (This is a substantial difference from data center networks, QLANs and QWANs.)¶
The compiler may include multihop communication within a phase using hop-by-hop teleportation without reconfiguring any switches; this is beyond the scope of this architecture.¶
Execution of the quantum portion of the node program generally involves hard real-time actions, both unconditional and conditioned on prior quantum measurement results. This generally requires compilation of the quantum program to very low-level actions to be executed by FPGAs or ASICs.¶
Systems may be partially or completely emulated, decoupling development of different subsystems. e.g., an EPPS plus a MEAS together can emulate a COMP node that emits single photons.¶
Systems may be noisy, intermediate-scale quantum (NISQ); near-term, small-scale fault tolerant; or fault-tolerant, application-scale quantum (FASQ).¶
Quantum error correction is above the level of these specifications, but may involve distributed lattice surgery [ramette-remote], [leone-remote], or [sinclair-ft-interconnect].¶
The hardware for quantum data center networks will be almost identical to multicomputers; the primary differences are in the workload, scheduling, programming model and assumptions of trust. Distributed control and protocols for multiplexing and connection setup may be necessary.¶
A QLAN will be deployed within a building or across a campus. It may connect quantum computers (including but not necessarily multicomputers) and sensors. A sensor, for example, may be connected to a computer with substantial memory for e.g. shadow tomography, learning from few measurements and related protocols.¶
A QLAN will have a less regular topology than a multicomputer or QDCN. Distance, latency, fidelity, and success probability will all vary on a per-link basis.¶
Distributed control and protocols for multiplexing and connection setup are necessary.¶
Wide-area networks may involve client-server or peer-to-peer communication. One particular scenario of interest is a measurement-only (MEAS) client end node connecting to a centralized, supercomputer-scale quantum computer (perhaps, but not necessarily, a multicomputer) for the purposes of executing blind quantum computation [fitzsimons-blind], [morimae-blind].¶
QWAN client-server communication very likely will suffer from the "incast" problem of excessive traffic concentrating near certain nodes. Management of this problem is beyond the scope of this document.¶
This section informally describes the physical building blocks and concepts used in the physical layer of a quantum network.¶
In this network architecture, we use only qubits, which may have two states identified as 0 and 1. Quantum information systems using qutrits, qudits, qunats or continuous variable (c.v.) quantum states are beyond the scope of the current set of specifications.¶
Qubits (also defined in RFC 9340) must conform to a sufficient subset of the DiVincenzo criteria [divincenzo-criteria].¶
Optical mode (link-layer view).¶
An optical mode is a well-defined slot of a physical link, specified by path, time window, frequency, polarization, or similar parameters, such that the receiver can be configured to monitor that slot and determine whether it is occupied by at least one photon or is empty.¶
The mode exists regardless of whether a photon is present; a photon is an excitation of the mode, not the mode itself.¶
In quantum networking, link capacity and state must be described in terms of modes (slots), not photons; photons merely occupy modes, while empty modes correspond to vacuum states that are still physically and operationally meaningful.¶
Technical note: In idealized models, distinct modes correspond to orthogonal field solutions, ensuring perfect distinguishability.¶
Short example: A quantum optical link may define one mode per time window. During each window, the receiver monitors the mode. A detection event indicates that the mode was occupied by at least one photon; the absence of a detection indicates that the same mode was empty. Both outcomes correspond to distinct physical states of the link.¶
Photons are used in networks to carry qubits. There are several possible on-the-wire photonic qubit representations, e.g.¶
These representations and more about the concept of an optical mode are discussed in the Standard Photons document, and are provided here only for informational purposes.¶
For our purposes, we do not need to worry about the physical implementation of memories, only that they may hold quantum data (qubits) that may be under the management of the network software and protocols. They may be entangled with photons or with other memory qubits.¶
Generally, the creation or entanglement of a state in memory is imperfect, and the memory has a finite lifetime.¶
The entanglement of a memory qubit with a photon is a technology-dependent process. To create fiber-compatible and optical equipment-compatible photons, wavelength conversion via transduction may be necessary. In 2025, transduction is a low-probability process, and hurts fidelity as well.¶
Photons may be emitted by sources of many types [nist-singles] . Single photons may come from attenuated lasers, or be emitted by a variety of quantum devices, such as quantum dots, or by individual atoms.¶
Photons may be unentangled, entangled with other photons, or entangled with quantum memories.¶
Unentangled photons exhibit quantum properties. They can carry information in any of the characteristics listed above, and may be put into a superposition of multiple basis states for e.g. quantum key distribution purposes. In this document, unentangled individual photons are not used.¶
Pairs of photons entangled with each other can be made via a variety of physical processes. Devices that make such pairs can be components of nodes such as the Entangled Photon Pair Source (EPPS), described in a separate document.¶
Photons emitted by quantum memories, such as single atoms, may remain entangled to the memory, if the memory was in a superposition of basis states.¶
Detectors may be either single-photon detectors, which click when one or more photons hit the detector, or number resolving detectors, which can distinguish between one, two, or more photons hitting the detector within the same time window [nist-singles]. In this document, detectors may be assumed to be single-photon detectors.¶
This section documents the requirements for all networks adhering to this architecture.¶
Operates on qubits. (Qutrits, qudits, qunats and continuous-variable systems are out of scope of this architecture, except where physical or link layers present such physical variables as qubits.)¶
Is independent of physical implementation of memories, photonic data representations, etc. (Multipartite states created by the network are not a requirement of the network.)¶
Supports pairwise Bell pair creation between nodes with one or more of the B, C or T timing classes above.¶
The architecture must support deployments ranging from multicomputer to wide area networks.¶
The architecture must support multiple photonic synchronization domains, as either point-to-point or optically switched paths. The architecture must support some form of buffering between PSDs.¶
The architecture must support entanglement swapping. (Note that single PSD deployments may not need entanglement swapping.)¶
The architecture must support evolution of single-photon, unentangled, single-purpose quantum key distribution networks to fully entangled, multipurpose networks.¶
Physical requirements such as distance, wavelength, vibration, power, etc. will be case-dependent.¶
Physical requirements such as distance, wavelength, vibration, power, etc. will be case-dependent.¶
The architecture must support the use of both manual and automated network configuration tools.¶
This network architecture is entirely classically controlled. Its task is to generate shared quantum states for applications residing at separate nodes. While many quantum events are inherently probabilistic, and loss of photons is also inherently probabilistic, this architecture does not use multipartite quantum states for e.g. routing of two-party requests. (An extension of this network architecture may support generation of multi-partite state for applications at a later date.)¶
(Substantial portions of this section are adapted from Naphan Benchasattabuse's Ph.D. thesis, which in turn is adapted from earlier papers by Van Meter et al. [van-meter-qi-arch] and others.)¶
The design of a quantum network must begin with a clear definition of its fundamental services --- what quantum states or capabilities the network is expected to provide to end users. These decisions determine the complexity of the protocols at the network layer and the applications that run above it. A minimalist design treats Bell pairs as the primary network-level service. Bell pairs serve as the smallest unit of entanglement and the foundation for nearly all quantum communication protocols. Restricting the service to Bell pair distribution simplifies the network's responsibilities. However, this approach shifts complexity to the applications, which must construct multipartite or fault-tolerant states themselves and manage the coordination overhead that entails.¶
At the other end of the spectrum, networks may offer richer services such as multipartite entangled states [ghz], [dur-w-state], [hein-multiparty], [hein-graph-entanglement] or fault-tolerant state teleportation. While applications can, in theory, synthesize these states from Bell pairs, direct network-level support may offer efficiency gains and reduce sensitivity to noise by internalizing complex procedures like direct graph state generations or supporting the delivery of error-correcting code encoded logical qubits.¶
In our architecture, we adopt Bell pair distribution as the core network service, as it allows for a well-scoped, foundational architectural framework.¶
Importantly, the semantics of Bell pair distribution are not merely those of passive delivery. Even in this basic model, distributed quantum computation occurs along the path via entanglement swapping, possibly combined with purification at intermediate repeater nodes. A proper service definition must account for this processing, as it directly affects fidelity, latency, and trust assumptions in the network.¶
In addition to quantum state delivery, timing information is often a critical part of the service. Applications in distributed quantum sensing and clock synchronization [degen-sensing], [proctor-quantum-sensing], [proctor-multiparm], [giovannetti-metro], [gottesman-telescope], [ilo-okeke-clock] require precise knowledge of when entanglement was established or when measurement events occurred. Hence, high-precision timestamps may need to be bundled into the service interface offered by the network.¶
All nodes in the network will have one or more of the following classes of interfaces, also referred to as planes.¶
Quantum: The quantum signals and in-channel, hardware-dependent, real-time classical signals for timing and synchronization of photon wave packets. A node with a quantum plane incorporates one or more quantum devices. The quantum devices may be local or remote.¶
Data: Classical data plane for exchange of messages about in-progress quantum communication sessions. Generally, the data plane consists of event notifications and measurement results related to RuleSet-driven connections or testing sessions. A data plane must be accompanied by a control plane.¶
Control: Classical control plane for establishing and managing connections and testing sessions. Routing and multiplexing messages are included in the control plane.¶
Management: Network management for configuring the devices and monitoring operation. Managing services provided by nodes, security, addressing, etc., and monitoring health of links, collecting statistics on traffic through the node, any alerts such as security, etc.¶
The quantum signals and in-channel, hardware-dependent, real-time classical signals for timing and synchronization of photon wave packets. A node with a quantum plane incorporates one or more quantum devices. The quantum devices may be local or remote.¶
The quantum plane functionality executes the functions described as "Interferometric Stabilization" and "Wave Packet Overlap" and subject to the constraints in "Detector Timing Windows" in the Timing Regimes document.¶
When operating in qubit mode, the Data Plane consists of classical messages that convey events for RuleSet operation and the communication ports and software that generate and consume such messages.¶
When operating in device mode, the Data Plane consists of RPCs for controlling individual devices.¶
Data plane functions may share data with management plane functions as part of the link management process, e.g. using disti-mation. If this is done, security and privacy concerns must be addressed.¶
The control plane functionality executes the functions described as "Pre-configured Event-driven Tasks" in the Timing Regimes document.¶
The classical control plane is responsible for establishing and managing connections and testing sessions. Routing and multiplexing messages are included in the control plane.¶
Control plane functions may share data with management plane functions, e.g. sharing parameter adjustment values and timings. If this is done, security and privacy concerns must be addressed.¶
The control plane functionality executes the functions described as "Measurement basis selection", "Optical switch control" and some tasks in "Host-side Application-level Tasks" in the Timing Regimes document.¶
While connection-specific changes to configuration, such as switching and necessary, immediate changes to e.g. polarization and optical delay may appear as control plane functions, slow-rate monitoring and adjustment of parameters such as timing or polarization due to drift in temperature, voltage or other parameters is the responsibility of the management plane. The management plane may receive useful data on the health and fidelity of links as a result of data plane and control plane operations.¶
The management plane functionality executes the functions described as "Background Tasks" in the Timing Regimes document.¶
This document describes a network architecture. Network designs are often described in terms of a layered protocol stack such as the 7-layer OSI model, although the Internet can be more accurately described as a three-, four-, or five-layer model, depending in part on whether a distinction is made between the physical and link layers and in part on how the application layer is subdivided.¶
In a layered network architecture, each layer processes a prepended header to complete its task. As messages move down the stack (from application toward actual transmission), they may be subdivided into smaller units, and additional layer-specific headers are prepended. On receipt, headers are removed as the message moves up the stack, and boundaries between messages may be altered.¶
A complete network architecture consists of much more than the layers processing individual packets; many of the critical supporting protocols around naming, routing, security, network management, etc. utilize messages carried using the same protocol stack designed for application data.¶
In a quantum network, this layering is less clear.¶
(More to be added here.)¶
(Substantial portions of this section are adapted from Naphan Benchasattabuse's Ph.D. thesis, which in turn is adapted from earlier papers by Van Meter et al. and others.)¶
The architecture of a quantum network is defined by its constituent nodes and their specialized functions. For clarity in describing our system, we group these nodes according to their primary contributions to network operation. In our architecture, we classify nodes into three main types: end nodes, for application interaction; repeater and router nodes, for extending entanglement and path management; and support nodes, for auxiliary operational tasks.¶
The qNode specification provides additional details on the common roles and responsibilities of all quantum network nodes, and serves as the equivalent of the Internet hosts requirements RFCs [RFC1122], [RFC1123]. Each node type is further defined in a detailed specification in a separate document.¶
End nodes represent hosts that wish to execute a quantum application such as quantum key distribution, secret sharing and blind quantum computation [broadbent-bfk-protocol], [fitzsimons-blind]. The technological maturity required of an end node heavily depends on the desired application. There are four major kinds of end nodes:¶
A measurement (MEAS) node is the most basic type of quantum end node, designed primarily for protocols that do not require quantum state storage. Its core capability is to receive individual photons and perform measurements on them in at least two different bases. Lacking quantum memory, MEAS nodes are well-suited for applications like quantum key distribution (QKD) or as simple terminals in certain forms of secure delegated computation protocols [morimae-blind],[fitzsimons-blind], typically interacting with the network in a synchronous manner where measurement results directly yield classical data.¶
A sensor (SNSR) node is a specialized end node designed to utilize entangled states, often shared with distant parties, for high-precision measurements of physical quantities, for clock synchronization tasks, or for distributed sensing tasks [ge-linear], [proctor-quantum-sensing], [degen-sensing], [giovannetti-metro], [proctor-multiparm]. These nodes typically feature limited quantum memory to hold working qubits (e.g., one half of an entangled pair) and possess specific quantum processing capabilities tailored for sensing protocols. Such capabilities include performing joint measurements, like Bell State Measurements (BSMs), between their stored qubits and photons that have interacted with the environment [huang-imaging-stars], [gottesman-telescope]. While an SNSR node's internal processing is specialized, certain sensing applications may also necessitate high-rate entanglement generation from the network to achieve desired performance. For SNSR nodes, precise timing information is almost invariably a critical component of the service they provide or require, and their operation typically culminates in outputting classical data that corresponds to the sensed phenomenon.¶
A store (STOR) node is a specialized end node whose primary function is to serve as a high-fidelity quantum data repository. Its core capabilities are the long-term storage of quantum states---often prepared and teleported from other locations---and the ability to teleport these states out on demand. While a STOR node does not require a universal gate set, it must support certain gates (e.g., Clifford gates) for active quantum error correction to preserve the stored quantum data. This includes using quantum error-correcting codes to protect against decoherence, along with mitigation strategies for correlated errors from events such as cosmic ray strikes [martinis-correlated], [sane-phonons], [xu-dist-qec], [vepsaelaeinen-ionizing], [wu-mitigating], [li-cosmic]. In a network context, STOR nodes may function as data servers, enabling asynchronous applications where valuable states are prepared and stored for later retrieval.¶
A computational (COMP) node represents a full-fledged quantum processing endpoint within the network. Equipped with quantum memory and additional algorithmic qubits, it can store, manipulate, and perform complex computations on quantum states received from the network or generated locally. COMP nodes support a wide range of advanced quantum network applications, including distributed quantum algorithms, more general forms of blind quantum computation, and potentially fault-tolerant quantum computing, often requiring asynchronous interfaces to coordinate their local quantum workloads with network operations [ambainis-multiparty-coin], [taherkhani-byz], [mayers-unconditional], [christandl-anon], [broadbent-bfk-protocol], [fitzsimons-blind], [mahadev-homomorphic], [dulek-homomorphic], [shapourian-qdc-infra], [sutcliffe-dist-qec], [yoder-tour-de-gross]. [kim-ft-million].¶
An entangled photon pair source (EPPS) is a device dedicated to generating pairs of entangled photons, commonly through processes like Spontaneous Parametric Down-Conversion (SPDC). These entangled photons are then typically distributed over quantum channels to be captured or measured at link endpoints, forming the initial resource for entanglement-based protocols. EPPS nodes can be deployed in various scenarios, including terrestrial fiber links or free-space satellite-to-ground communication [fittipaldi-sat], [haldar-sat-dist], [khatri-spooky], [yin-1200km].¶
A Bell state analyzer (BSA) is a crucial component for performing projective measurements on two incoming photons, ideally projecting their combined state into one of the four Bell states. BSAs are fundamental for realizing photonic entanglement swapping[zukowski-entanglement-swapping], a primary process that creates link-level entanglement, used particularly to convert memory-photon entanglement into memory-memory entanglement between distant quantum memories. The efficiency and complexity of a BSA depend on the optical implementation and the specific photonic qubit encoding used.¶
A Repeater Graph State Source (RGSS) is a specialized source that generates multipartite entangled photonic states, specifically tailored for all-photonic (memory-less) quantum repeater architectures [azuma-rgs], [hilaire-rgs-optimizing-gen-time],[buterakos-graph-generation], [hilaire-logical-bsm]. An RGSS typically distributes segments of the generated repeater graph state to adjacent network nodes, where subsequent measurements on these photonic qubits are performed to establish long-distance entanglement without relying on quantum memories.¶
An advanced Bell state analyzer (ABSA) represents a more sophisticated version of a BSA, particularly required in advanced all-photonic repeater protocols based on repeater graph states[azuma-rgs], [hilaire-rgs-optimizing-gen-time],[buterakos-graph-generation], [hilaire-logical-bsm]. Unlike basic BSAs, an ABSA must be capable of performing measurements on single or multiple photons in dynamically selectable bases. The choice of measurement basis often depends on the outcomes of prior measurements within the network and the specific structure of the repeater graph state being utilized, implying more complex hardware and real-time classical control logic.¶
An optical switch (OSW) is a device that can passively route photons from input optical fibers or paths to different output paths without performing measurements on them [koyama-24]. OSWs, which can be based on technologies like nanomechanical systems or nanophotonic circuits, can be integrated as components within other node types (e.g., routers or complex end nodes) or can function as standalone elements in the network to dynamically reconfigure optical pathways.¶
A first-generation repeater (REP1) is a network node with two quantum interfaces, whose main task is to extend entanglement. Its primary operations include generating link-level Bell pairs with its neighbors, performing entanglement swapping to connect these segments, and managing errors through heralded entanglement purification on physical qubits along the connection path.¶
A second-generation repeater (REP2) also focuses on entanglement swapping to bridge distances but generally requires a larger quantum memory capacity and higher fidelity local quantum operations than a REP1. It utilizes quantum error correction (QEC) to manage operational errors in conjunction with heralded link-level entanglement generation. Instead of, or in addition to, purifying link-level physical Bell pairs, a REP2 node operates on logical qubits, where quantum information is encoded across multiple physical qubits to protect it from errors. This approach inherently demands more sophisticated hardware and advanced computational capabilities for encoding, decoding, and error correction routines during swapping.¶
A quantum router (RTR) is a more complex and versatile node, possessing all capabilities of a quantum repeater and typically featuring three or more quantum network interfaces, enabling it to make sophisticated path selection decisions in complex topologies. Architecturally, an RTR may consist of multiple line cards and a quantum backplane, allowing it to run a full suite of network operation protocols. Beyond basic repeating functions like entanglement swapping, an RTR can govern network borders potentially interfacing between different repeater generations or technologies, participate in generating multipartite entangled states if the network provides such a service [meignant-dgs] [bugalho-dist-multipartite] [fischer-dgs] [fan-dgs-dist], and may act as a Responder in connection setups by rewriting or generating new RuleSets for different network domains.¶
A node may also aggregate the functions of more than one node, in a form known as a composite node or composite logical node. A common form of composite node is a switching BSA. When multiple devices of the same type are controlled by a single controller, they may be presented either as a node with multiple devices or as a composite node where each device is in turn represented as a node. Presenting as a single node is preferred.¶
A link provides Bell pairs across a single PSD. Each Bell pair is named via an identifier. This service may be either real time or batched.¶
The optical path over which photons flow from source to detector in the process of creating a Bell pair can be described using terminology that names the node types in the path; the direction of flow of photons can be inferred. This path description can be applied to point-to-point or switched links within a single PSD.¶
Device type single-letter abbreviations and their corresponding node type:¶
M: memory (COMP or STOR)¶
S: source (of entangled photons) (EPPS)¶
I: interference (i.e., Bell state measurement) (BSA)¶
D: detector (i.e. a measurement node) (MEAS)¶
X: switch (OSW)¶
Examples of path descriptions that may commonly appear:¶
DSD: detector-source-detector¶
MIM: memory-interference-memory¶
MSM: memory-source-memory¶
MM: memory-memory¶
DSISD: detector-source-inteference-source-detector¶
At any point in a path except the ends, a photon may pass through one or more switches.¶
In a switched architecture, for example, photons may pass through paths such as:¶
(Question: Does this notation also need to represent frequency conversion?)¶
Point-to-point links may be either fiber-based or free space. A link encompassing the path of one or more photons may be partially fiber and partially free space.¶
A system built around a pool of detectors, particularly organized as BSAs, utilizing switched MIM links can also be characterized as a detector-centric architecture.¶
For pseudocode for switching (routing) certain types of devices, see Koyama et al. [koyama-24].¶
A multidrop link, or a bus, is a shared physical channel to which more than two stations may be attached.¶
No task involving quantum communication ever involves a single qubit or single entangled state. The connection provides the framework for managing the creation of an order set of entangled states to be consumed by applications. A connection is stateful at the end nodes. Nodes involved in the creation of end-to-end entanglement for those end nodes will be connection aware, meaning that they can identify resources and messages and carry out communication tasks necessary for a specific connection, but may not have substantial amounts of state that is dynamically updated on a per-action basis; any actions for nodes in this class must be idempotent or known to occur only once. Some or all nodes may be fully stateful, tracking the disposition of specific, named quantum states.¶
Connections may be created using either a fully-distributed protocol [I-D.draft-van-meter-qirg-quantum-connection-setup] or a centralized mechanism. In either case, qNodes involved in the connection receive RuleSets that are created by a single controller to coordinate local operations to build the end-to-end entangled states requested by an application.¶
Connections are unaware of the shared use of resources and of other connections. Multiplexing is the responsibility of a separate subsystem, though connection setup should be done with awareness of the availability of unavailability of resources at involved nodes.¶
Both link usage time slots and memory can be shared among multiple connections and therefore must be actively managed via a multiplexing system. This task is particularly challenging in switched networks.¶
A quantum network depends on classical communication; indeed, almost all of the behavior is governed by, initiated by, or managed and reported via classical messages and signals. These messages and signals have several key roles, described in the following subsections. See the Timing Regimes document [I-D.draft-hajdusek-qirg-timing-physics] for an outline of the physics driving these requirements.¶
Yes, the quantum plane includes some classical signals.¶
(Incorporates naming material from Naphan's thesis. Probably needs updating to account for testbed realities.)¶
Managing and agreeing upon the specific qubits for joint operations like entanglement purification or swapping among collaborating nodes are critical responsibilities handled by RuleSets. While it is possible to draw inspiration from the IP architecture by employing network-wide unique naming for qubits, RuleSets have local execution contexts, making global naming for individual qubits unnecessary.¶
Instead, RuleSets use local logical names for qubits.
At the lowest level, physical qubits within a QNIC can be addressed by the local node using a tuple like <QNICAddress,QubitIndex>.
However, this level of detail is not, and should not be, visible to the RuleSet logic.¶
Within a RuleSet instance on a given node, the RuleSet mechanism identifies a quantum resource primarily by its tag --- a label that categorizes the resource into a specific pool corresponding to its current role or stage in the protocol.
To ensure an unambiguous and absolute ordering of multiple resources that may share the same tag (e.g., several Bell pairs awaiting purification), each resource, upon being allocated to a tag, is automatically assigned a \emph{sequence number} by the local RuleSet engine.
The combination <tag,seq no.> thus serves as a distinct and locally unique key within that RuleSet instance for referencing a resource and associating it with relevant metadata, such as its tracked fidelity.
Actions specified within Rules typically reference these resources based on their tag and their relative order within that tag, for instance, by operating on the resource with the smallest sequence number (i.e., the oldest available in that pool).
This structured internal naming is vital for deterministic local operations and for preventing local operational mismatches that could lead to problems like the leapfrogging issue if not handled carefully at a higher protocol design level.¶
The RuleSet execution mechanism itself, therefore, only requires and manages this local <tag,seq no.> system for resource identification within a single node's RuleSet instance; it does not impose any inherent restrictions or requirements on how shared entangled states are identified between nodes.
It is recommended that a strategy be used wherein the RuleSet creator (e.g., the Responder during connection setup) devises RuleSets such that the <tag,seq no.> is kept consistent across the RuleSets of all nodes involved in a particular joint operation on that resource.
The responsibility thus lies with the RuleSet author to ensure that RuleSets are designed---potentially using this consistent naming strategy---to correctly manage shared resources and achieve the desired end-to-end protocol behavior.
This minimal local naming scheme provided by the RuleSet engine, combined with judicious design of the RuleSets themselves, is sufficient for implementing a wide range of complex quantum network protocols while allowing creativity with minimal restrictions on RuleSet creator parts.¶
While a full taxonomy of networks is neither desirable nor possible here, we present a few network examples using point-to-point links or switched architectures. In this section, the topology is briefly described, followed by analysis of the path characteristics of the shortest path and network diameter.¶
A number of the early quantum multicomputer proposals assumed a single, large optical switch.¶
Shortest paths:¶
An indirect interconnect. A multi-group, BSA-centric architecture. All nodes are part of the same PSD. The Q-Fly architecture is described in Sakuma et al. [sakuma-q-fly].¶
For DPFD topologies:¶
For DPHD topologies:¶
For SPHD topologies:¶
An indirect interconnect. Several parameters are needed to describe the full topology of a fat tree, which can also be called a k-ary n-tree:¶
This simplest description assumes homogeneous hardware, where all switches have the same number of ports and all links are the same bandwidth. Leiserson's original fat tree proposed single links of increasing bandwidth at higher levels of the tree, giving the network its name; this approach provides no redundancy or path diversity, and achieving higher transfer rates is impractical in some technologies, including quantum. Consequently, most fat tree deployments use multiple links to several switches at higher levels of the tree, in a configuration that is also know as a folded Clos network.¶
The repeater fat tree is described in [choi-fat-tree].¶
A direct interconnect. A 2-D grid of nodes, where nodes with memory and certain computational capabilities (canonically COMP nodes) have up to four interfaces connecting to neighboring nodes. Each node must act as a memory buffer and repeater to enable communication between non-neighboring nodes.¶
The API used by classical software to interface with the quantum depends on which class of timing dependency pattern (B, C, or T) is to be supported.¶
Quantum multicomputer systems are assumed to be constructed as isolated, centrally controlled systems with no need for confidentiality, integrity, and availability (the "CIA triad") assurance via cryptographic methods.¶
Security considerations for other network types are an open topic of study and as such are not yet ready for specification and standardization.¶
Michal was involved in document development and technical discussions from the beginning.¶
Andrew leads the software team implementing much of the network, and provides feedback on system structure.¶
Contributed presentations and clarity; reviewed this document; authoring related specifications.¶
Contributed presentations and clarity; reviewed this document and related documents; technical and managerial leadership.¶
Technical and managerial discussions.¶