The design and implementation of declarative networks

作者: Joseph M. Hellerstein , Boon Thau Loo

DOI:

关键词: Overlay networkDatalogNetwork planning and designEventual consistencyComputer scienceDataflowCommunications protocolQuery languageDistributed computingNetwork architecture

摘要: In this dissertation, we present the design and implementation of declarative networks. Declarative networking proposes use a query language for specifying implementing network protocols, employs dataflow framework at runtime com munication maintenance state. The primary goal is to greatly simplify process specifying, implementing, deploying evolving design. addition, serves as an important step towards extensible, evolvable architecture that can support flexible, secure efficient deployment new protocols. Our main contributions are follows. First, formally define Network Datalog (NDlog) based on extensions recursive language, propose NDlog Domain Specific Language programming We demonstrate be used express large variety protocols in handful lines program code, resulting orders magnitude reduction code size. For example, Chord overlay specified 48 rules. core (Datalog) has polynomial complexity, our statically analyzed termination using standard analysis techniques. Second, validate NDlog, P2, which full-fledged system compiles executes it via engine inspired by Click modular router. experimentally evaluate P2 hundreds distributed machines. publicly available download been research projects number institutions. Third, experiences networks, explore wide database issues practical realization These include pipelined execution queries, reason ing about semantics well-known systems notion "eventual consistency", incorporating soft-state into logical optimizations improve performance

参考文章(114)
Sean Rhea, Timothy Roscoe, Petros Maniatis, Tyson Condie, Joseph M. Hellerstein, Finally, a Use for Componentized Transport Protocols ,(2006)
Petros Maniatis, Tyson Condie, Joseph M. Hellerstein, Sriram Sank, Varun Kacholia, Induced Churn as Shelter from Routing-Table Poisoning. network and distributed system security symposium. ,(2006)
Dawson R. Engler, Madanlal Musuvathi, Model checking large network protocol implementations networked systems design and implementation. pp. 12- 12 ,(2004)
Scott Shenker, Jennifer Rexford, Karthik Kalambur Lakshminarayanan, Ion Stoica, Routing as a Service ,(2006)
Michael Stonebraker, None, Readings in Database Systems ,(1988)
Frank Dabek, Jinyang Li, Emil Sit, James Robertson, M Frans Kaashoek, Robert Tappan Morris, None, Designing a DHT for low latency and high throughput networked systems design and implementation. pp. 7- 7 ,(2004)
Vassilis Prevelakis, Angelos D. Keromytis, Sotiris Ioannidis, John Ioannidis, Stefan Miltchev, Jonathan M. Smith, Secure and Flexible Global File Sharing usenix annual technical conference. pp. 165- 178 ,(2003) , 10.7916/D8PV6VRB
Patrick Valduriez, M. Tamer zsu, Principles of Distributed Database Systems ,(1990)
FAIZ ARNI, KAYLIANG ONG, SHALOM TSUR, HAIXUN WANG, CARLO ZANIOLO, The deductive database system LDL Theory and Practice of Logic Programming. ,vol. 3, pp. 61- 94 ,(2003) , 10.1017/S1471068402001515