skip to main content
10.1145/1142473.1142485acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

Declarative networking: language, execution and optimization

Published: 27 June 2006 Publication History

Abstract

The networking and distributed systems communities have recently explored a variety of new network architectures, both for application-level overlay networks, and as prototypes for a next-generation Internet architecture. In this context, we have investigated declarative networking: the use of a distributed recursive query engine as a powerful vehicle for accelerating innovation in network architectures [23, 24, 33]. Declarative networking represents a significant new application area for database research on recursive query processing. In this paper, we address fundamental database issues in this domain. First, we motivate and formally define the Network Datalog (NDlog) language for declarative network specifications. Second, we introduce and prove correct relaxed versions of the traditional semi-naïve query evaluation technique, to overcome fundamental problems of the traditional technique in an asynchronous distributed setting. Third, we consider the dynamics of network state, and formalize the iheventual consistencyl. of our programs even when bursts of updates can arrive in the midst of query execution. Fourth, we present a number of query optimization opportunities that arise in the declarative networking context, including applications of traditional techniques as well as new optimizations. Last, we present evaluation results of the above ideas implemented in our P2 declarative networking system, running on 100 machines over the Emulab network testbed.

References

[1]
GT-ITM. http://www.cc.gatech.edu/projects/gtitm/.]]
[2]
S. Abiteboul, Z. Abrams, S. Haar, and T. Milo. Diagnosis of Asynchronous Discrete Event Systems - Datalog to the Rescue! In ACM PODS, 2005.]]
[3]
I. Balbin and K. Ramamohanarao. A Generalization of the Differential Approach to Recursive Query Evaluation. Journal of Logic Prog, 4(3):259--262, 1987.]]
[4]
F. Bancilhon. Naive Evaluation of Recursively Defined Relations. On Knowledge Base Management Systems: Integrating AI and DB Technologies, 1986.]]
[5]
F. Bancilhon, D. Maier, Y. Sagiv, and J. Ullman. Magic Sets and Other Strange Ways to Implement Logic Programs. In SIGMOD, 1986.]]
[6]
M. Y. Becker and P. Sewell. Cassandra: Distributed Access Control Policies with Tunable Expressiveness. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks, 2004.]]
[7]
P. A. Bernstein, U. Dayal, D. J. DeWitt, D. Gawlick, J. Gray, M. Jarke, B. G. Lindsay, P. C. Lockemann, D. Maier, E. J. Neuhold, A. Reuter, L. A. Rowe, H.-J. Schek, J. W. Schmidt, M. Schrefl, and M. Stonebraker. Future Directions in DBMS Research. SIGMOD Record, 18(1):17--26, 1989.]]
[8]
F. Cacace, S. Ceri, and M. A. W. Houtsma. A survey of parallel execution strategies for transitive closure and logic programs. Distributed and Parallel Databases, 1(4):337--382, 1993.]]
[9]
D. Calvanese, G. D. Giacomo, and M. Y. Vardi. Decidable Containment of Recursive Queries. In ICDT, 2003.]]
[10]
Emulab. http://www.emulab.net.]]
[11]
N. Feamster and H. Balakrishnan. Correctness properties for Internet routing. In Allerton Conference on Communication, Control, and Computing, Sept. 2005.]]
[12]
F. Furfaro, S. Greco, S. Ganguly, and C. Zaniolo. Pushing Extrema Aggregates to Optimize Logic Queries. Inf.Sys., 27(5):321--343, 2002.]]
[13]
Overcoming barriers to disruptive innovation in networking. Report of NSF Workshop, Jan. 2005.]]
[14]
G. Graefe. Encapsulation of Parallelism in the Volcano Query Processing System. In SIGMOD, 1990.]]
[15]
A. Gupta, I. S. Mumick, and V. S. Subrahmanian. Maintaining Views Incrementally. In SIGMOD, 1993.]]
[16]
Z. J. Haas. A New Routing Protocol for the Reconfigurable Wireless Networks. In IEEE Int. Conf. on Universal Personal Communications, 1997.]]
[17]
R. Huebsch, B. Chun, J. Hellerstein, B. T. Loo, P. Maniatis, T. Roscoe, S. Shenker, I. Stoica, and A. R. Yumerefendi. The Architecture of PIER: an Internet-Scale Query Processor. In CIDR, 2005.]]
[18]
Jeffery Ullman. Assigning an Appropriate Meaning to Database Logic with Negation. Computers as Our Better Partners, pages 216--225, 1994.]]
[19]
T. Jim and D. Suciu. Dynamically Distributed Query Evaluation. In PODS, 2001.]]
[20]
D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, volume 353. 1996.]]
[21]
R. Krishnamurthy, R. Ramakrishnan, and O. Shmueli. A Framework for Testing Safety and Effective Computability. J. Comp. Sys. Sci. 52(1):100--124, 1996.]]
[22]
Laurent Vieille. Recursive Axioms in Deductive Database: The Query-Subquery Approach. In 1st International Conference on Expert Database Systems, 1986.]]
[23]
B. T. Loo, T. Condie, J. M. Hellerstein, P. Maniatis, T. Roscoe, and I. Stoica. Implementing Declarative Overlays. In 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.]]
[24]
B. T. Loo, J. M. Hellerstein, I. Stoica, and R. Ramakrishnan. Declarative Routing: Extensible Routing with Declarative Queries. In SIGCOMM, 2005.]]
[25]
L. Peterson and B. Davie. Computer Networks: A Systems Approach. Morgan-KaufMann, 2003.]]
[26]
L. Peterson, S. Shenker, and J. Turner. Overcoming the Internet Impasse Through Virtualization. In HotNets-III, 2004.]]
[27]
R. Ramakrishnan, K. A. Ross, D. Srivastava, and S. Sudarshan. Efficient Incremental Evaluation of Queries with Aggregation. In SIGMOD, 1992.]]
[28]
R. Ramakrishnan and J. D. Ullman. A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125--149, 1993.]]
[29]
V. Ramasubramanian, Z. J. Haas, and E. G. Sirer. SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks. In ACM MobiHoc, 2003.]]
[30]
J. Rohmer, R. Lescoeur, and J. M. Kerisit. Alexander Method - A Technique for the Processing of Recursive Axioms in Deductive Databases. New Generation Computing 4:522--528, 1986.]]
[31]
C. R.Palmer, P. B. Gibbons, and C. Faloutsos. ANF: A Fast and Scalable Tool for Data Mining in Massive Graphs. In ACM SIGKDD, pages 102--111, 2002.]]
[32]
J. Shao, D. A. Bell, and M. E. C. Hull. An Experimental Performance Study of a pipelined recursive query processing strategy. In International Symposium on Databases for Parallel and Distributed Systems, 1990.]]
[33]
A. Singh, P. Maniatis, T. Roscoe, and P. Druschel. Distributed Monitoring and Forensics in Overlay Networks. In Eurosys, 2006.]]
[34]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM, 2001.]]
[35]
M. Stonebraker and J. M. Hellerstein, editors. Readings in Database Systems, Third Edition. Morgan Kaufmann, San Francisco, 1998.]]
[36]
S. Sudarshan and R. Ramakrishnan. Aggregation and Relevance in Deductive Databases. In VLDB, 1991.]]
[37]
J. Whaley and M. S. Lam. Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams. In PLDI, 2004.]]

Cited By

View all
  • (2024)Making Formulog Fast: An Argument for Unconventional Datalog EvaluationProceedings of the ACM on Programming Languages10.1145/36897548:OOPSLA2(1219-1248)Online publication date: 8-Oct-2024
  • (2024)Oz: Towards an Extensible Intent Handler Architecture with Semantic ReasoningNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575364(1-5)Online publication date: 6-May-2024
  • (2024)Coordination-Free Replicated Datalog Streams with Application-Specific AvailabilityAdvances in Databases and Information Systems10.1007/978-3-031-70626-4_11(155-169)Online publication date: 1-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '06: Proceedings of the 2006 ACM SIGMOD international conference on Management of data
June 2006
830 pages
ISBN:1595934340
DOI:10.1145/1142473
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 June 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. declarative networks
  2. recursive queries

Qualifiers

  • Article

Conference

SIGMOD/PODS06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)50
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Making Formulog Fast: An Argument for Unconventional Datalog EvaluationProceedings of the ACM on Programming Languages10.1145/36897548:OOPSLA2(1219-1248)Online publication date: 8-Oct-2024
  • (2024)Oz: Towards an Extensible Intent Handler Architecture with Semantic ReasoningNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575364(1-5)Online publication date: 6-May-2024
  • (2024)Coordination-Free Replicated Datalog Streams with Application-Specific AvailabilityAdvances in Databases and Information Systems10.1007/978-3-031-70626-4_11(155-169)Online publication date: 1-Sep-2024
  • (2023)Program Repair Guided by Datalog-Defined Static AnalysisProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616363(1216-1228)Online publication date: 30-Nov-2023
  • (2023)From SMT to ASP: Solver-Based Approaches to Solving Datalog Synthesis-as-Rule-Selection ProblemsProceedings of the ACM on Programming Languages10.1145/35712007:POPL(185-217)Online publication date: 11-Jan-2023
  • (2022)Full-stack SDNProceedings of the 21st ACM Workshop on Hot Topics in Networks10.1145/3563766.3564101(130-137)Online publication date: 14-Nov-2022
  • (2022)Software Evolution Management with Differential FactsProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3559513(1-3)Online publication date: 10-Oct-2022
  • (2022)Make Web3.0 ConnectedIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.307931519:5(2965-2981)Online publication date: 1-Sep-2022
  • (2022)Design and Implementation of a Strong Representation System for Network Policies2022 International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN54977.2022.9868871(1-10)Online publication date: Jul-2022
  • (2021)FauréProceedings of the 20th ACM Workshop on Hot Topics in Networks10.1145/3484266.3487391(123-131)Online publication date: 10-Nov-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media