Academia.eduAcademia.edu

Outline

Recent Advances in Declarative Networking

2012, Lecture Notes in Computer Science

https://doi.org/10.1007/978-3-642-27694-1_1

Abstract

Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services, and directly compile these specifications into a dataflow framework for execution. This paper describes recent advances in declarative networking, tracing its evolution from a rapid prototyping framework towards a platform that serves as an important bridge connecting formal theories for reasoning about protocol correctness and actual implementations. In particular, the paper focuses on the use of declarative networking for addressing four main challenges in the distributed systems development cycle: the generation of safe routing implementations, debugging, security and privacy, and optimizing distributed systems.

References (62)

  1. VID5=SHA1("pathCost"+a+c+5) sp2@b RID3=SHA1("sp2"+b+VID2+VID6) bestPathCost(@b,c,2)
  2. @b RID1=SHA1("sp1"+b+VID1) sp1@a RID2=SHA1("sp1"+a+VID3)
  3. @b RID4=SHA1("sp3"+b+VID4) References
  4. Gecode constraint development environment. http://www.gecode.org/.
  5. PVS Specification and Verification System. http://pvs.csl.sri.com/.
  6. RapidNet. http://netdb.cis.upenn.edu/rapidnet/.
  7. P. Alvaro, T. Condie, N. Conway, K. Elmeleegy, J. M. Hellerstein, and R. Sears. Boom Analytics: Exploring Data-Centric, Declarative Programming for the Cloud. In Proceedings of Eurosys, 2010.
  8. P. Alvaro, W. Marczak, N. Conway, J. M. Hellerstein, D. Maier, and R. C. Sears. Dedalus: Datalog in time and space. Technical Report UCB/EECS-2009-173, EECS Department, University of California, Berkeley, Dec 2009.
  9. T. J. Ameloot, F. Neven, and J. Van den Bussche. Relational Transducers for Declarative Networking. In PODS, 2011.
  10. Application Aware Anonymity. http://a3.cis.upenn.edu/.
  11. H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Looking Up Data in P2P Systems. Communications of the ACM, Vol. 46, No. 2, 2003.
  12. I. Balbin and K. Ramamohanarao. A Generalization of the Differential Approach to Recursive Query Evaluation. Journal of Logic Prog, 4(3):259-262, 1987.
  13. X. Chen, Y. Mao, Z. M. Mao, and J. van der Merwe. Declarative Configuration Management for Complex and Dynamic Networks. In CoNEXT, 2010.
  14. D. C. Chu, L. Popa, A. Tavakoli, J. M. Hellerstein, P. Levis, S. Shenker, and I. Stoica. The Design and Implementation of a Declarative Sensor Network System. In 5th ACM Conference on Embedded networked Sensor Systems (SenSys), 2007.
  15. J. DeTreville. Binder: A logic-based security language. In IEEE Symposium on Security and Privacy, 2002.
  16. M. Gelfond and V. Lifschitz. The Stable Model Semantics For Logic Programming. In ICLP/SLP, pages 1070-1080, 1988.
  17. H. Gill, T. Saeed, Q. Fei, Z. Zhang, and B. T. Loo. An Open-source and Declarative Approach Towards Teaching Large-scale Networked Systems Programming. In SIGCOMM Education Workshop, 2011.
  18. D. Goldschlag, M. Reed, and P. Syverson. Onion Routing. Communications of the ACM, 42(2):39-41, 1999.
  19. T. G. Griffin and J. L. Sobrinho. Metarouting. In ACM SIGCOMM, 2005.
  20. A. Gupta, I. S. Mumick, and V. S. Subrahmanian. Maintaining Views Incremen- tally. In Proceedings of ACM SIGMOD International Conference on Management of Data, 1993.
  21. Hadoop. http://hadoop.apache.org/.
  22. J. M. Hellerstein. Declarative imperative: Experiences and conjectures in dis- tributed logic. 2010. SIGMOD Record 39(1).
  23. T. Jim. SD3: A Trust Management System With Certified Evaluation. In IEEE Symposium on Security and Privacy, 2001.
  24. E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM Transactions on Computer Systems, 18(3):263-297, 2000.
  25. N. Li, B. N. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM TISSEC, 2003.
  26. C. Liu, R. Correa, H. Gill, T. Gill, X. Li, S. Muthukumar, T. Saeed, B. T. Loo, and P. Basu. PUMA: Policy-based Unified Multi-radio Architecture for Agile Mesh Networking. In 4th International Conference on Communication Systems and Networks (COMSNETS), 2012.
  27. C. Liu, R. Correa, X. Li, P. Basu, B. T. Loo, and Y. Mao. Declarative policy- based adaptive mobile ad hoc networking. IEEE/ACM Transactions on Networking (ToN), 2011.
  28. C. Liu, B. T. Loo, and Y. Mao. Declarative Automated Cloud Resource Orches- tration. In ACM Symposium on Cloud Computing (SOCC), 2011.
  29. B. T. Loo, T. Condie, M. Garofalakis, D. E. Gay, J. M. Hellerstein, P. Maniatis, R. Ramakrishnan, T. Roscoe, and I. Stoica. Declarative Networking: Language, Execution and Optimization. In Proceedings of ACM SIGMOD International Con- ference on Management of Data, 2006.
  30. B. T. Loo, T. Condie, M. Garofalakis, D. E. Gay, J. M. Hellerstein, P. Maniatis, R. Ramakrishnan, T. Roscoe, and I. Stoica. Declarative Networking. In Commu- nications of the ACM (CACM), 2009.
  31. B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica. Im- plementing Declarative Overlays. In Proceedings of ACM Symposium on Operating Systems Principles, 2005.
  32. B. T. Loo, J. M. Hellerstein, and I. Stoica. Customizable Routing with Declarative Queries. In ACM SIGCOMM Hot Topics in Networks, 2004.
  33. B. T. Loo, J. M. Hellerstein, I. Stoica, and R. Ramakrishnan. Declarative Routing: Extensible Routing with Declarative Queries. In Proceedings of ACM SIGCOMM Conference on Data Communication, 2005.
  34. Y. Mao. On the declarativity of declarative networking. In ACM NetDB Workshop, 2009.
  35. Y. Mao, B. T. Loo, Z. Ives, and J. M. Smith. MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition. In CoNEXT, 2008.
  36. W. R. Marczak, S. S. Huang, M. Bravenboer, M. Sherr, B. T. Loo, and M. Aref. SecureBlox: Customizable Secure Distributed Data Processing. In SIGMOD, 2010.
  37. W. R. Marczak, D. Zook, W. Zhou, M. Aref, and B. T. Loo. Declarative Recon- figurable Trust Management. In Proceedings of Conference on Innovative Data Systems Research (CIDR), 2009.
  38. Mengmeng Liu and Nicholas Taylor and Wenchao Zhou and Zachary Ives and Boon Thau Loo. Recursive Computation of Regions and Connectivity in Networks. In Proceedings of IEEE Conference on Data Engineering (ICDE), 2009.
  39. S. C. Muthukumar, X. Li, C. Liu, J. B. Kopena, M. Oprea, R. Correa, B. T. Loo, and P. Basu. RapidMesh: declarative toolkit for rapid experimentation of wireless mesh networks. In WINTECH, 2009.
  40. S. C. Muthukumar, X. Li, C. Liu, J. B. Kopena, M. Oprea, and B. T. Loo. Declar- ative toolkit for rapid network protocol simulation and experimentation. In SIG- COMM (demo), 2009.
  41. NetDB@Penn. http://netdb.cis.upenn.edu/.
  42. Network Simulator 3. http://www.nsnam.org/.
  43. V. Nigam, L. Jia, B. T. Loo, and A. Scedrov. Maintaining distributed logic pro- grams incrementally. In 13th International ACM SIGPLAN Symposium on Prin- ciples and Practice of Declarative Programming (PPDP), 2011.
  44. F. Perich. Policy-based Network Management for NeXt Generation Spectrum Ac- cess Control. In DySPAN, 2007.
  45. PlanetLab. Global testbed. http://www.planet-lab.org/.
  46. Quagga Routing Suite. http://www.quagga.net/.
  47. R. Ramakrishnan and J. D. Ullman. A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125-149, 1993.
  48. RapidNet Declarative Networking Engine. http://netdb.cis.upenn.edu/ rapidnet/.
  49. Y. Ren, W. Zhou, A. Wang, L. Jia, A. J. Gurney, B. T. Loo, and J. Rexford. FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing. In ACM SIGCOMM Conference on Data Communication (demonstration), 2011.
  50. D. Saccà and C. Zaniolo. Stable Models and Non-Determinism in Logic Programs with Negation. In PODS, pages 205-217, 1990.
  51. Secure BGP. http://www.ir.bbn.com/sbgp/.
  52. M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. T. Loo, and M. Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In Network and Distributed System Security, 2010.
  53. A. Singh, T. Das, P. Maniatis, P. Druschel, and T. Roscoe. BFT Protocols Under Fire. In USENIX Symposium on Networked Systems Design and Implementation, 2008.
  54. A. Wang, P. Basu, B. T. Loo, and O. Sokolsky. Towards declarative network verification. In 11th International Symposium on Practical Aspects of Declarative Languages (PADL), 2009.
  55. A. Wang, L. Jia, W. Zhou, Y. Ren, B. T. Loo, J. Rexford, V. Nigam, A. Scedrov, and C. Talcott. FSR: Formal analysis and implementation toolkit for safe inter- domain routing. University of Pennsylvania CIS Technical Report No. MS-CIS- 11-10, 2011, http://repository.upenn.edu/cis_reports/954/.
  56. Yices. http://yices.csl.sri.com/.
  57. W. Zhou, L. Ding, A. Haeberlen, Z. Ives, and B. T. Loo. Tap: Time-aware prove- nance for distributed systems. In 3rd USENIX Workshop on the Theory and Prac- tice of Provenance (TaPP '11), 2011.
  58. W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. T. Loo, and M. Sherr. Secure network provenance. In Proceedings of ACM Symposium on Operating Systems Principles, 2011.
  59. W. Zhou, Q. Fei, S. Sun, T. Tao, A. Haeberlen, Z. Ives, B. T. Loo, and M. Sherr. Nettrails: A declarative platform for provenance maintenance and querying in dis- tributed systems. In SIGMOD (demonstration), 2011.
  60. W. Zhou, Y. Mao, B. T. Loo, and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In Proceedings of IEEE Conference on Data Engineering (ICDE), 2009.
  61. W. Zhou, M. Sherr, T. Tao, X. Li, B. T. Loo, and Y. Mao. Efficient querying and maintenance of network provenance at Internet-scale. In Proc. SIGMOD, 2010.
  62. W. Zhou, O. Sokolsky, B. T. Loo, and I. Lee. Dmac: Distributed monitoring and checking. In 9th International Workshop on Runtime Verification (RV), 2009.