Recent Advances in Declarative Networking

  • Boon Thau Loo
  • Harjot Gill
  • Changbin Liu
  • Yun Mao
  • William R. Marczak
  • Micah Sherr
  • Anduo Wang
  • Wenchao Zhou
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7149)


Declarative networking is a programming methodology that enables developers to concisely specify network protocols and services, and directly compile these specifications into a dataflow framework for execution. This paper describes recent advances in declarative networking, tracing its evolution from a rapid prototyping framework towards a platform that serves as an important bridge connecting formal theories for reasoning about protocol correctness and actual implementations. In particular, the paper focuses on the use of declarative networking for addressing four main challenges in the distributed systems development cycle: the generation of safe routing implementations, debugging, security and privacy, and optimizing distributed systems.


Overlay Network Wireless Mesh Network Network Protocol Border Gateway Protocol Derivation Rule 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gecode constraint development environment,
  2. 2.
    PVS Specification and Verification System,
  3. 3.
  4. 4.
    Alvaro, P., Condie, T., Conway, N., Elmeleegy, K., Hellerstein, J.M., Sears, R.: Boom Analytics: Exploring Data-Centric, Declarative Programming for the Cloud. In: Proceedings of Eurosys (2010)Google Scholar
  5. 5.
    Alvaro, P., Marczak, W., Conway, N., Hellerstein, J.M., Maier, D., Sears, R.C.: Dedalus: Datalog in time and space. Technical Report UCB/EECS-2009-173, EECS Department, University of California, Berkeley (December 2009)Google Scholar
  6. 6.
    Ameloot, T.J., Neven, F., Van den Bussche, J.: Relational Transducers for Declarative Networking. In: PODS (2011)Google Scholar
  7. 7.
    Application Aware Anonymity,
  8. 8.
    Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Looking Up Data in P2P Systems. Communications of the ACM 46(2) (2003)Google Scholar
  9. 9.
    Balbin, I., Ramamohanarao, K.: A Generalization of the Differential Approach to Recursive Query Evaluation. Journal of Logic Prog. 4(3), 259–262 (1987)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Chen, X., Mao, Y., Mao, Z.M., van der Merwe, J.: Declarative Configuration Management for Complex and Dynamic Networks. In: CoNEXT (2010)Google Scholar
  11. 11.
    Chu, D.C., Popa, L., Tavakoli, A., Hellerstein, J.M., Levis, P., Shenker, S., Stoica, I.: The Design and Implementation of a Declarative Sensor Network System. In: 5th ACM Conference on Embedded networked Sensor Systems, SenSys (2007)Google Scholar
  12. 12.
    DeTreville, J.: Binder: A logic-based security language. In: IEEE Symposium on Security and Privacy (2002)Google Scholar
  13. 13.
    Gelfond, M., Lifschitz, V.: The Stable Model Semantics For Logic Programming. In: ICLP/SLP, pp. 1070–1080 (1988)Google Scholar
  14. 14.
    Gill, H., Saeed, T., Fei, Q., Zhang, Z., Loo, B.T.: An Open-source and Declarative Approach Towards Teaching Large-scale Networked Systems Programming. In: SIGCOMM Education Workshop (2011)Google Scholar
  15. 15.
    Goldschlag, D., Reed, M., Syverson, P.: Onion Routing. Communications of the ACM 42(2), 39–41 (1999)CrossRefGoogle Scholar
  16. 16.
    Griffin, T.G., Sobrinho, J.L.: Metarouting. In: ACM SIGCOMM (2005)Google Scholar
  17. 17.
    Gupta, A., Mumick, I.S., Subrahmanian, V.S.: Maintaining Views Incrementally. In: Proceedings of ACM SIGMOD International Conference on Management of Data (1993)Google Scholar
  18. 18.
  19. 19.
    Hellerstein, J.M.: Declarative imperative: Experiences and conjectures in distributed logic. SIGMOD Record 39(1) (2010)Google Scholar
  20. 20.
    Jim, T.: SD3: A Trust Management System With Certified Evaluation. In: IEEE Symposium on Security and Privacy (2001)Google Scholar
  21. 21.
    Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.F.: The Click Modular Router. ACM Transactions on Computer Systems 18(3), 263–297 (2000)CrossRefGoogle Scholar
  22. 22.
    Li, N., Grosof, B.N., Feigenbaum, J.: Delegation Logic: A logic-based approach to distributed authorization. ACM TISSEC (2003)Google Scholar
  23. 23.
    Liu, C., Correa, R., Gill, H., Gill, T., Li, X., Muthukumar, S., Saeed, T., Loo, B.T., Basu, P.: PUMA: Policy-based Unified Multi-radio Architecture for Agile Mesh Networking. In: 4th International Conference on Communication Systems and Networks, COMSNETS (2012)Google Scholar
  24. 24.
    Liu, C., Correa, R., Li, X., Basu, P., Loo, B.T., Mao, Y.: Declarative policy-based adaptive mobile ad hoc networking. IEEE/ACM Transactions on Networking, ToN (2011)Google Scholar
  25. 25.
    Liu, C., Loo, B.T., Mao, Y.: Declarative Automated Cloud Resource Orchestration. In: ACM Symposium on Cloud Computing, SOCC (2011)Google Scholar
  26. 26.
    LogicBlox Inc.,
  27. 27.
    Loo, B.T., Condie, T., Garofalakis, M., Gay, D.E., Hellerstein, J.M., Maniatis, P., Ramakrishnan, R., Roscoe, T., Stoica, I.: Declarative Networking: Language, Execution and Optimization. In: Proceedings of ACM SIGMOD International Conference on Management of Data (2006)Google Scholar
  28. 28.
    Loo, B.T., Condie, T., Garofalakis, M., Gay, D.E., Hellerstein, J.M., Maniatis, P., Ramakrishnan, R., Roscoe, T., Stoica, I.: Declarative Networking. Communications of the ACM, CACM (2009)Google Scholar
  29. 29.
    Loo, B.T., Condie, T., Hellerstein, J.M., Maniatis, P., Roscoe, T., Stoica, I.: Implementing Declarative Overlays. In: Proceedings of ACM Symposium on Operating Systems Principles (2005)Google Scholar
  30. 30.
    Loo, B.T., Hellerstein, J.M., Stoica, I.: Customizable Routing with Declarative Queries. In: ACM SIGCOMM Hot Topics in Networks (2004)Google Scholar
  31. 31.
    Loo, B.T., Hellerstein, J.M., Stoica, I., Ramakrishnan, R.: Declarative Routing: Extensible Routing with Declarative Queries. In: Proceedings of ACM SIGCOMM Conference on Data Communication (2005)Google Scholar
  32. 32.
    Mao, Y.: On the declarativity of declarative networking. In: ACM NetDB Workshop (2009)Google Scholar
  33. 33.
    Mao, Y., Loo, B.T., Ives, Z., Smith, J.M.: MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition. In: CoNEXT (2008)Google Scholar
  34. 34.
    Marczak, W.R., Huang, S.S., Bravenboer, M., Sherr, M., Loo, B.T., Aref, M.: SecureBlox: Customizable Secure Distributed Data Processing. In: SIGMOD (2010)Google Scholar
  35. 35.
    Marczak, W.R., Zook, D., Zhou, W., Aref, M., Loo, B.T.: Declarative Reconfigurable Trust Management. In: Proceedings of Conference on Innovative Data Systems Research, CIDR (2009)Google Scholar
  36. 36.
    Liu, M., Taylor, N., Zhou, W., Ives, Z., Loo, B.T.: Recursive Computation of Regions and Connectivity in Networks. In: Proceedings of IEEE Conference on Data Engineering, ICDE (2009)Google Scholar
  37. 37.
    Muthukumar, S.C., Li, X., Liu, C., Kopena, J.B., Oprea, M., Correa, R., Loo, B.T., Basu, P.: RapidMesh: declarative toolkit for rapid experimentation of wireless mesh networks. In: WINTECH (2009)Google Scholar
  38. 38.
    Muthukumar, S.C., Li, X., Liu, C., Kopena, J.B., Oprea, M., Loo, B.T.: Declarative toolkit for rapid network protocol simulation and experimentation. In: SIGCOMM, demo (2009)Google Scholar
  39. 39.
  40. 40.
    Network Simulator 3,
  41. 41.
    Nigam, V., Jia, L., Loo, B.T., Scedrov, A.: Maintaining distributed logic programs incrementally. In: 13th International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP (2011)Google Scholar
  42. 42.
    ORBIT - Wireless Network Testbed,
  43. 43.
    Perich, F.: Policy-based Network Management for NeXt Generation Spectrum Access Control. In: DySPAN (2007)Google Scholar
  44. 44.
    PlanetLab. Global testbed,
  45. 45.
    Quagga Routing Suite,
  46. 46.
    Ramakrishnan, R., Ullman, J.D.: A Survey of Research on Deductive Database Systems. Journal of Logic Programming 23(2), 125–149 (1993)CrossRefGoogle Scholar
  47. 47.
    RapidNet Declarative Networking Engine,
  48. 48.
    Ren, Y., Zhou, W., Wang, A., Jia, L., Gurney, A.J., Loo, B.T., Rexford, J.: FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing. In: ACM SIGCOMM Conference on Data Communication, demonstration (2011)Google Scholar
  49. 49.
    Saccà, D., Zaniolo, C.: Stable Models and Non-Determinism in Logic Programs with Negation. In: PODS, pp. 205–217 (1990)Google Scholar
  50. 50.
  51. 51.
    Sherr, M., Mao, A., Marczak, W.R., Zhou, W., Loo, B.T., Blaze, M.: A3: An Extensible Platform for Application-Aware Anonymity. In: Network and Distributed System Security (2010)Google Scholar
  52. 52.
    Singh, A., Das, T., Maniatis, P., Druschel, P., Roscoe, T.: BFT Protocols Under Fire. In: USENIX Symposium on Networked Systems Design and Implementation (2008)Google Scholar
  53. 53.
    Wang, A., Basu, P., Loo, B.T., Sokolsky, O.: Towards declarative network verification. In: 11th International Symposium on Practical Aspects of Declarative Languages, PADL (2009)Google Scholar
  54. 54.
    Wang, A., Jia, L., Zhou, W., Ren, Y., Loo, B.T., Rexford, J., Nigam, V., Scedrov, A., Talcott, C.: FSR: Formal analysis and implementation toolkit for safe inter-domain routing. University of Pennsylvania CIS Technical Report No. MS-CIS-11-10 (2011),
  55. 55.
  56. 56.
    Zhou, W., Ding, L., Haeberlen, A., Ives, Z., Loo, B.T.: Tap: Time-aware provenance for distributed systems. In: 3rd USENIX Workshop on the Theory and Practice of Provenance, TaPP 2011 (2011)Google Scholar
  57. 57.
    Zhou, W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure network provenance. In: Proceedings of ACM Symposium on Operating Systems Principles (2011)Google Scholar
  58. 58.
    Zhou, W., Fei, Q., Sun, S., Tao, T., Haeberlen, A., Ives, Z., Loo, B.T., Sherr, M.: Nettrails: A declarative platform for provenance maintenance and querying in distributed systems. In: SIGMOD, demonstration (2011)Google Scholar
  59. 59.
    Zhou, W., Mao, Y., Loo, B.T., Abadi, M.: Unified Declarative Platform for Secure Networked Information Systems. In: Proceedings of IEEE Conference on Data Engineering, ICDE (2009)Google Scholar
  60. 60.
    Zhou, W., Sherr, M., Tao, T., Li, X., Loo, B.T., Mao, Y.: Efficient querying and maintenance of network provenance at Internet-scale. In: Proc. SIGMOD (2010)Google Scholar
  61. 61.
    Zhou, W., Sokolsky, O., Loo, B.T., Lee, I.: Dmac: Distributed monitoring and checking. In: 9th International Workshop on Runtime Verification, RV (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Boon Thau Loo
    • 1
  • Harjot Gill
    • 1
  • Changbin Liu
    • 1
  • Yun Mao
    • 2
  • William R. Marczak
    • 3
  • Micah Sherr
    • 4
  • Anduo Wang
    • 1
  • Wenchao Zhou
    • 1
  1. 1.University of PennsylvaniaUSA
  2. 2.AT & T Labs ResearchUSA
  3. 3.University of California BerkeleyUSA
  4. 4.Georgetown UniversityUSA

Personalised recommendations