Automating rendezvous and proxy selection in sensornets

As the diversity of sensornet use cases increases, the combinations of environments and applications that will coexist will make custom engineering increasingly impractical. We investigate an approach that focuses on replacing custom engineering with automated optimization of declarative protocol specifications. Specifically, we automate network rendezvous and proxy selection from program source. These optimizations perform program transformations that are grounded in recursive query optimization, an area of database theory. Our prototype system implementation can automatically choose program executions that are as much as three, and usually one order of magnitude better than original source programs.

[1]  Patricia G. Selinger,et al.  Access path selection in a relational database management system , 1979, SIGMOD '79.

[2]  Catriel Beeri,et al.  On the power of magic , 1987, J. Log. Program..

[3]  Jeffrey D. Ullman,et al.  Principles of Database and Knowledge-Base Systems, Volume II , 1988, Principles of computer science series.

[4]  Jeffrey D. Uuman Principles of database and knowledge- base systems , 1989 .

[5]  Jeffrey D. Uuman Principles of database and knowledge- base systems , 1989 .

[6]  Donald D. Chamberlin,et al.  Access Path Selection in a Relational Database Management System , 1989 .

[7]  Serge Abiteboul,et al.  Foundations of Databases , 1994 .

[8]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[9]  Jeffrey D. Ullman,et al.  A survey of deductive database systems , 1995, J. Log. Program..

[10]  Jeffrey D. Ullman,et al.  A Survey of Research in Deductive Database Systems , 1995 .

[11]  Walid Dabbous,et al.  Generating efficient protocol code from an abstract specification , 1996, SIGCOMM '96.

[12]  Walid Dabbous,et al.  Generating efficient protocol code from an abstract specification , 1997, TNET.

[13]  Thorsten von Eicken,et al.  Promela++: a language for constructing correct and efficient protocols , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[14]  Stanley B. Zdonik,et al.  Data In Your Face , 1998, SIGMOD 1998.

[15]  David P. Williamson,et al.  Improved approximation algorithms for capacitated facility location problems , 1999, IPCO.

[16]  David Wetherall,et al.  Active network vision and reality: lessions from a capsule-based system , 1999, SOSP.

[17]  David Wetherall,et al.  Active network vision and reality , 1999, Symposium on Operating Systems Principles.

[18]  Lili Qiu,et al.  On the placement of Web server replicas , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[19]  David Wetherall,et al.  Active network vision and reality: lessons from a capsule-based system , 2002, Proceedings DARPA Active Networks Conference and Exposition.

[20]  Scott Shenker,et al.  Internet indirection infrastructure , 2002, SIGCOMM 2002.

[21]  George Varghese,et al.  Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.

[22]  I. Stoica,et al.  Internet indirection infrastructure , 2002, SIGCOMM '02.

[23]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[24]  Emin Gün Sirer,et al.  Trickles: a stateless network stack for improved scalability, resilience, and flexibility , 2005, NSDI.

[25]  David E. Culler,et al.  Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[26]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[27]  Ion Stoica,et al.  Declarative routing: extensible routing with declarative queries , 2005, SIGCOMM '05.

[28]  Ion Stoica,et al.  Implementing declarative overlays , 2005, SOSP '05.

[29]  Joel Wein,et al.  ACMS: the Akamai configuration management system , 2005, NSDI.

[30]  Scott Shenker,et al.  Practical Data-Centric Storage , 2006, NSDI.

[31]  Charu C. Aggarwal,et al.  Data Streams: Models and Algorithms (Advances in Database Systems) , 2006 .

[32]  Philip Levis,et al.  The design and implementation of a declarative sensor network system , 2007, SenSys '07.

[33]  Kamin Whitehouse,et al.  Clairvoyant: a comprehensive source-level debugger for wireless sensor networks , 2007, SenSys '07.

[34]  Tarek F. Abdelzaher,et al.  An interactive UNIX shell for low-end sensor nodes with LiteOS , 2007, SenSys '07.

[35]  Philip S. Yu,et al.  A Survey of Synopsis Construction in Data Streams , 2007, Data Streams - Models and Algorithms.

[36]  Eric Eide,et al.  An Experimentation Workbench for Replayable Networking Research , 2007, NSDI.

[37]  David Chu,et al.  Evita raced: metacompilation for declarative networks , 2008, Proc. VLDB Endow..

[38]  David Chu,et al.  Automating Rendezvous and Proxy Selection , 2008 .

[39]  Feng Zhao,et al.  Que: A Sensor Network Rapid Prototyping Tool with Application Experiences from a Data Center Deployment , 2008, EWSN.