8 (0,1,3,0,1) (3,0,1,3,0) 5 9 (1,3,0,1,3) (3,0,1,3,0) 6 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) leader

Size: px
Start display at page:

Download "8 (0,1,3,0,1) (3,0,1,3,0) 5 9 (1,3,0,1,3) (3,0,1,3,0) 6 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) leader"

Transcription

1 Deterministic, silence and self-stabilizing leader election algorithm on id-based ring Colette Johnen L.R.I./C.N.R.S., Universite de Paris-Sud Bat. 490, Campus d'orsay F Orsay Cedex, France. phone : (+33) fax : (+33) colette@lri.fr Abstract We present in this paper a deterministic, silence and self-stabilizing leader election algorithm on unidirectional, id-based rings which have a bound on their id-values. The id-values of processors in a ring whose size is N, have to be inferior to N + k. The size of communication registers required by the algorithm is constant. The algorithm stabilizes in (k +)N + 1 time. keywords: self-stabilization, leader election, silent algorithm, memory space. 1 Introduction The notion of self-stabilization was introduced by Dijkstra [Dij74]. He dened a system as selfstabilizing when "regardless of its initial state, it is guaranteed to arrive at a legitimate state in a nite number of steps". Such a property is very desirable for any distributed system, because after any unexpected perturbation modifying the memory state, the system eventually recovers and returns to a legitimate state, without any outside intervention. Furthermore, self-stabilizing systems do not require particular initial state when a processor recovers assuming that processor codes are not corrupted. In this paper, we present a deterministic, silence and self-stabilizing algorithm that elects the processor having the minimal id-value on id-based unidirectional N-rings such that the id-values of its processors is inferior to N + k. In an id-based system, as processor ids are not part of the local variables, whatever is the current state each processor as distinct identity. Thereisseveral deterministic self-stabilizing leader election protocols on id-based systems whose the memory space requirement isn states per processor. Some of these algorithms build a spanning tree - the leader will be the tree root - [AG93] (in that protocol, processors need to know abound on the network size, the same protocol is presented in the read/write model [AG94]) in [AKY90] the knowledge of ring size is not required. the algorithm presented in [Dol93] assume only the read/write atomicity and processors does not need to know the network size. Ghosh and Gupta have designed a self-stabilizing algorithm on unidirectional ring that contained faults: after a fault, the ring will recovers in O(1) time [GG96]. Mayer, Ostrovsky and Yung, in [MOY96] have proposed a compiler that transforms any selfstabilizing protocol on bidirectional uniform ring to a self-stabilizing protocol which run on unidirectional uniform ring (their compiler to break the symmetric ip coins). Afek and Bremler 1

2 in [AB97] have proposed a general paradigm for the development of self-stabilizing algorithm on unidirectional general id-based processors that communicate by messages-passing. The size of the exchanged messages is log(n) (processors exchange their id-value). There are two principal measures of eciency for self-stabilizing algorithms: stabilization time, and memory requirements per processor. On huge, distributed networks (containing several millions of processors) managed by several organizations, the properly functioning of network management protocols should not depend on global properties (as network size) which can be modied at any time, by anybody. Therefore, we propose an algorithm whose space complexity is constant (thus it is independent of ring size). When, the ring grows, the local algorithm implementations do not need to be changed. There is several self-stabilizing protocols where the required memory space is constant [GH96], [JABD97], [Joh97], [Pet97], [PV97], and [Vil97]. On general uniform rings, there is no deterministic and self-stabilizing leader election protocol ([BJ98]). Only on bidirectional and prime size rings, one can designed a protocol requiring only constant memory space (such a protocol is presented in[ils95]). To my knowledge, we present here the rst self-stabilizing leader election algorithm on id-based ring where the required memory space is constant. A self-stabilizing algorithm is silent if once the system is stabilized, processors do not change their state (processors only check that their neighbor states have not be corrupted). The silence property of self-stabilizing algorithms is a desirable property in terms of simplicity and communication overhead. Our algorithm completes, in some sense, the result by Dolev, Gouda and Schneider [DGS96]. They state that the memory requirement to a silent self-stabilizing leader election protocol is O(log N) in the general case (i.e. when there is no bound on the id-values). Section describes our model. In section 3, we present the algorithm. Section 4 is devoted to the proof of convergence and section 5 to the proof of correctness. Model Distributed Unidirectional Ring. A distributed unidirectional ring is a connected ring of processors. A processor may only obtain \information" from its left neighbor, and give \information" to its right neighbor. Communication among processors is carried out by communication registers. A processor can write and read in its register, and read the register of its left neighbor. Thus, processors have two types of variables: local variables and eld variables. The eld variables of a processors are in its register (which is readed by its right neighbor). The local variables are used strictly locally, meaning that they can be only accessed (writing/reading) by their owner. The path from p 0 to p is the processors sequence (p 1 p ::: p m ) such that (i) p 0 = p 1, (ii) p = p m, (iii) 8j ]1,m[, the left neighbor of p j is p j;1 and its right neighbor is p j+1. On bidirectional rings, a processor may give and obtain \information" from its both neighbors: it can read the communication register of its both neighbors. An algorithm on unidirectional ring may be performed on bidirectional ring the converse is not true. States and Congurations. The register state of processor is dened by the values of its eld variables. The state of processor is dened by the values of its local variables and eld variables. A conguration of an unidirectional ring is a product of the states of all processors of ring. The set of congurations of the ring is denoted as C. Id-based ring. In an id-based ring, processors have distinct identities: processor are distinct. An id-based ring whose size is N is k-bounded if and only if id-values of its processors is inferior or equal to N + k.

3 Actions. Each processor executes an algorithm. The algorithm consists of a set of variables and a nite set of actions. Each action is uniquely identied by a label and is of the following form: < label >:: <guard>;! < statement > The guard of an action in the algorithm of p is a boolean expression involving the local, eld variables of p, and the eld variables of its left neighbor. The statement of an action of p updates some local variables and/or eld variables of p. An action can be executed only if its guard evaluates to true. We assume that the actions are atomically executed: the evaluation of a guard and the execution of the corresponding statement of an action, if executed, are done in one atomic step. Computations. During a computation step, one or more processors execute an atomic step, and a processor may take at most one atomic step this is known as the distributed daemon [BGM89]. Since the system is asynchronous, we dene a time unit, round, to compute the time complexity. A round is a maximal computation step where all processors that hold the guard of an action, execute the corresponding action during the step. A round is called by some authors a synchronous computation step. A computation e of an algorithm A is a fair, maximal sequence of congurations c 1 c ::: such that for i =1 :::, the conguration c n+1 is reached from c n by a computation step. c 1 is called the initial conguration of e. Along a fair sequence, if a processor may continuously perform an action then it will eventually perform an action. A maximal sequence is either innite, or it is nite in that case no action is enabled in the nal conguration. The set of computations of an algorithm A starting with a particular initial conguration c C is denoted by E c. The set of computations of A whose initial congurations are elements of B C is denoted as E B. E is the set of all possible fair and maximal computations (E = E C ). Register space complexity. The register space complexity of a self-stabilizing algorithm is the number of register states of a processor performing the self-stabilizing algorithm. An algorithm requires only constant register space if the number of register states on each processor required by the algorithm is a constant. Predicates. Let X be a set. x ` P means that an element x Xsatises the predicate P dened on the set X. We distinguish a special predicate: true (satised by each element of X ) formally dened as follows: x ` true. Self-Stabilization. We use the following term, attractor in the denition of self-stabilization. Denition.1 (Attractor) Let X and Y be two predicates dened on C. In C, Y is an attractor for X if and only if the following conditions are true: convergence 8e E X : (e = c 1 c :::):: 9n 1 c n ` Y closure 8c ` Y : 8c 0 where (c,c 0 ) is a computation step:: c 0 ` Y Let LS be a predicate dened on C. The system self-stabilizes to LS if only if LS is attractor for true. Denition. (trap) Let Pr be a predicate dened on processor state. Pr is a trap if only if Pr veries the closure property: Let c be aconguration where p ` Pr, 8c 0 where (c,c 0 )isacomputation step:: p ` Pr in c 0. To prove the correctness of our algorithm, we use the convergent stair [GM91] theorem. Theorem.1 Let Y and X be two congurations sets of a ring that performs an algorithm A. if X is an attractor for true and if Y is and for X then Y is an attractor for true. 3

4 3 Algorithm In this section, we present a deterministic, silence and self-stabilizing algorithm that elects the processor having the minimal id-value on id-based unidirectional ring with a k-bound on its idvalues. On a k-bounded ring, the value of the smallest id-value is inferior to k + (id-values are greater or equal to 0). Only processors whose id-value is inferior to k + can be a leader other processors will never be elected. Thus, we dene two processors sets. One set (SI) contains the processors that may have the smallest id-value only these processors compete to the leadership. The other set (BI) contains processor that cannot be the leader these processors do not compete to the leadership and are as \quiet" as possible. Formally SI: the set of processors whose id-value is inferior or equal to to k +1 BI: the set of processors whose id-value is greater than k +1. The algorithm is designed such way that once the ring is stabilized processors know id-value of each processor of SI (these values are stored in an array called F ). Thus, each processor knows the smallest id-value in the ring (the id-value of the leader). Nevertheless, a processor knows at most k + id-values (all of them inferior to k +). That why, the register size required by the algorithm is constant whatever is the ring size. Algorithm 3.1 Leader election algorithm on k-bounded ring Field Variables: F p is an array ofk + elements taking value in [0 k+ [. Ld p is a boolean. Notation: lp is the left neighbor of p. F lp is the value of F on lp. id p is the value of the p identier. Predicate: Next(p, p 0 ) (8i [0 k+ 1[: F p [i] =F p 0[i + 1]) ^ (F p [k +1]=id p ). F ollowing(p) Next(p lp). Macro: U pdate(p) :8i [0 k+1[:f p [i] :=F lp [i +1] F p [k +1]:=id p. Action: fthe two following actions are executed by the processors of BIg A 1 : (id p >k+1)^ (F p 6= F lp ) ;! F p := F lp. A : (id p >k+1)^ (Ld p =1);! Ld p := 0. fthe three following actions are executed by the processors of SIg B 1 : (id p k +1) ^ :F ollowing(p) ;! Update(p) B : (id p k +1) ^ F ollowing(p) ^ id p is not the smallest value in F p ^ Ld p =1;! Ld := 0 B 3 : (id p k +1) ^ F ollowing(p) ^ id p is the smallest value in F p ^ Ld p =0;! Ld p := 1 Denition 3.1 Aleader is a processor p such that Ld p =1. The processors of BI \transmit" the array (A 1 ) and they also set up their Ld variable to 0 (A ). The processors of SI left-shift the F array elements (the rst value is withdrawn) and then 4

5 they add their own id-value at the end of the array 1 (B 1 ). This simple action will ensure that (once the ring is stabilized) the array of each processor contains all the id-values of SI processors that are in the ring and only these id-values though processors of SI have dierent arrays (the id-values are not in the same order), Thus once the ring is stabilized, a processor of SI may decide if it is the leader or not: it compares its id-value with the smallest id-value of its F variable (B or B 3 ). Denition 3. A conguration is a deadlock if only if no processor may perform an action. (3,0,1,3,0) (3,0,1,3,0) 5 (3,0,1,3,0) (0,1,3,0,1) 8 (0,1,3,0,1) 3 (1,3,0,1,3) (3,0,1,3,0) 13 (3,0,1,3,0) 0 9 (1,3,0,1,3) 10 (1,3,0,1,3) leader Figure 1: the deadlock conguration in a 10-Ring that is 3-bounded Denition 3.3 We call LS, the set of deadlock congurations where one and only one processor is elected. The conguration presented in the gure 1 is a deadlock where one processor is elected. In the section 4 we prove that from any conguration, whatever the computation performs, a deadlock conguration is reached. In the section 5, we will prove that the reached deadlock conguration belongs to LS: one and only one processor is elected. We will also proof that the elected processor has the smallest id-value of the ring. 4 Convergence Denition 4.1 REG 0 = f8p SI F p [k +1]=id p g. Let p be aprocessor of SI. Thus, in REG 0, F p [k +1] is the id-value of p. Lemma 4.1 Let p be aprocessor of SI. Whatever the computation performs, F p [k +1] will eventually get the value id p. Then, F p [k +1] will keep this value forever. Whatever the current conguration, after a round, each processor p of SI verify the equality: F p [k +1]=id p. Proof: Closure After an action, p veries the F ollowing predicate according to the denition of guard actions that p may perform (B 1, B,orB 3 ). thus no action may change the value of F p [k +1], once F p [k +1]=id p. Convergence if F p [k +1] 6= id p, then p holds the B 1 guard till F p [k +1] 6= id p. Thus, p will 1 this action is similar to an action on a FIFO list where the processors gets the rst value of the list and adds it id-value at the end of the list. 5

6 eventually perform this action. Stabilization time all processors of SI such that F p [k +1]6= id p hold the B 1 guard. During the rst round, they perform this action thus after the round all processors of SI verify the equality F p [k +1]=id p. The following lemma is a direct consequence of lemma 4.1 and its proof. Lemma 4. REG 0 is attractor for true. Whatever the initial conguration, REG 0 is reached in one round. Denition 4. i [0 k +1], REG 0 i = REG i \f8p BI F p [k +1; i] is the id-value of the i+1-th previous processor of p in the ring that belongs to SIg. i [1 k +1], REG i = REG 0 i;1 \f8p SI F p [k +1; i] is the id-value of the i-th previous processor of p in the ring that belongs to SIg. In the ring of the gure 1, SI contains 3 processors (processors whose id-value are 0 1 or 3). Call p the processor whose id-value is 0. 3 is the id-value of the rst previous processor of p that belongs to SI 1 is the id-value of the second one 0 is the id-value of the third one 3 is the id-value of the forth one. Notice that third previous processor of p in SI is p itself. Observation 4.1 Let c be aconguration of REG 0 i. In c, aprocessor p of SI veries the following predicate: 8j [1 i] F p [k +1; j] is the id-value of the j-th previous processor of p in the ring that belongs to SI and F p [k +1] = id p. In c, a processor p of BI veries the following predicate: 8j [0 i] F p [k +1; j] is the id-value of the j+1-th previous processor of p in the ring that belongs to SI. The gure illustrates how a ring stabilizes. From any conguration, whatever the computation performs REG 0 is reached in at most one round. After that, REG 0 0 is reached in at most N ; 1 rounds then REG 1 in one round, REG 0 1 in at most N ; 1 rounds.... We have proven that REG 0 is an attractor. We will nish the convergence verication by proving that (i) REG 0 i is an attractor if REG i is an attractor (ii) REG i+1 is an attractor if REG 0 i is an attractor (iii) from any conguration of REG i, REG 0 i is reached in at most N ;1 rounds (iv) from any conguration of REG 0 i, REG i+1 is reached in 1 round. Thus, we will prove thatreg 0 k+1 is an attractor that is reachedinatmost(k +1)N. Denition 4.3 Let p be aprocessor of BI. Let us call p 0 the rst previous processor of p belonging to SI. p veries the predicate stable i if only if (i) F p [k +1; i] = F p 0[k +1; i] and if (ii) lp veries stable i predicate or lp belonging to SI. Observation 4. Let c be aconguration of REG i. c is a conguration of REG 0 i if and only if all processors of BI verify the stable i predicate Lemma 4.3 If REG i is closed then stable i predicate is a trap in REG i. Proof: Let p be a processor of BI that veries the stable i predicate in REG i. Call p 0 the rst previous processor of p belonging to SI. Let p0 p be the path from p' to p. If p veries the stable i predicate then each processor in the path p0 p veries the stable i predicate. Assume that p stops to verify the stable i predicate. Let us call ps the rst processor in the path p0 p that has stopped to verify the stable i predicate (such a processor exists by assumption). In order to stop to verify the stable i predicate in REG i, ps hastochange its F ps [k +1; i] value although F ps [k +1; i] was equal to F lps [k +1; i] value and lps 3 has not modied the F lps [k +1; i] value. Such a change cannot be done. lp is the left neighbor of p. 3 lps is the left neighbor of ps. 6

7 round rounds REG REG rounds 6 3 (0,,) unstable 1 quasi-stable 1 (0,,) REG 1 (0,,) rounds stable 1 (1,,) (0,,) (0,,) (,,) 6 (,,) (,,) (1,,) 5 4 REG (0,,) 5 rounds 0 1 (,,) 5 4 REG (,,) Figure : stabilization in a 5-Ring that is 1-bounded Denition 4.4 Let p be a processor of BI. p veries the predicate quasi stable i if only if (i) p does not verify the stable i predicate, and (ii) lp veries the stable i predicate or lp SI. The denitions of stable and quasi stable predicate are illustrated in the gure. Lemma 4.4 If it exists a processor p of BI that does not verify the stable i,thenthereisaprocessor ps that veries the quasi stable i predicate Proof: Call p 0 the rst previous processor of p belonging to SI. Let p0 p be the path from p' to p. Call p j the rst processus on the path p0 p that p j does not veried the stable i predicate. If j =1 then p 1 does not satisfy the stable i predicate and its left neighbor belong to SI thus p 1 veries the quasi stable i predicate. If j>1, p j does not satisfy the stable i predicate but its left neighbor satises this predicate. In both cases, p j veries the quasi stable i predicate. Lemma 4.5 8i [0 k +1], if REG i is closed then REG 0 i is an attractor for REG i From any conguration of REG i, REG 0 i is reached in at most N ; 1 rounds. 7

8 Proof: Let us call nbr the number of processors of BI that does not verify the stable i predicate. Closure nbr cannot increase in REG i (lemma 4.3) Convergence if REG 0 i is not reached, then there is a processor p of BI that does not verify the stable i predicate (observation 4.). Thus, there is a processor ps that does verify the quasi stable i predicate (lemma 4.4). Let us call ps 0 the rst previous processor of ps that belongs to SI. F ps [k +1; i] 6= F ps 0[k +1; i] (ps does not verify the stable i predicate) and F lps [k +1; i] = F ps 0[k +1; i] (lps veries the stable i predicate or belongs to SI). Thus, ps holds the A 1 guard (F ps [k +1; i] 6= F lps [k +1; i]). As stable i predicate is a trap in REG i (lemma 4.3) ps veries the quasi stable i predicate till it has not executed A 1 action. And, ps holds the A 1 guard till it veries the quasi stable i predicate. By fairness scheduling, ps will eventually execute A 1 action. After this action, ps veries the stable i predicate (F ps [k +1; i] =F lps [k +1; i] =F ps 0[k +1; i]). nbr has decreased. When nbr =0,REG 0 i is reached (observation 4.). Stabilization time according to the round denition, at each round nbr decreases. As nbr is bounded by N ; 1 (BI has at most N ; 1 processors) after at most N ; 1 rounds, REG 0 i is reached. Lemma 4.6 8i [1 k +1], if REG 0 i;1 is closed then REG i is attractor for REG 0 i;1. Whatever the current conguration of REG 0 i;1, REG i is reached in one round. Proof: Let p be a processor belonging to SI. Call p 0 the rst previous processor of p belonging to SI. Let (1) be the equation dened as follows: F lp [k +; i] =F p 0[k +; i] If lp belongs to SI, (1) is always veried. If lp belongs to BI, F lp [k +; i] is the id-value of the (i)-th previous processor of lp (see observation 4.1) and also the id-value of i ; 1-th processor previous of p 0. Therefore, the equation (1) is veried in REG 0 i;1. In REG 0 i;1, F p 0[k +; i] is the id-value of the (i)-th previous processor of p. Thus REG i is not reached if only if there is a processor p of SI verifying the following condition: () F p [k +1; i] 6= F lp [k +; i]. Let us call nbr the number of processors verifying (). Closure nbr cannot increase in REG 0 i;1, because lp cannot change the value of F lp [k +; i] (REG 0 i;1 is closed, see the hypothesis) and once the following equality is veried F p [k +1; i] = F lp [k +; i], it stays verify forever (denition of guard and statement actions). Convergence a processor p verifying () holds the B 1 guard. By fairness, p will perform the action B 1. After that action: F p [k +1; i] =F p 0[k +; i] nbr has decreased. Stabilization time all processors verifying () hold the B 1 guard during the rst round in REG 0 i;1, all of them perform this action. After one round, no processor veries (): REG i is reached. Theorem 4.1 8i [0 k+1], REG i is an attractor for true and REG 0 i is an attractor for true. Proof: REG 0 is attractor for true (lemma 4.). 8i [0 k + 1], if REG i is closed then REG 0 i is attractor for REG i (lemma 4.5). 8i ]0 k + 1], if REG 0 i;1 is closed then REG i is attractor for REG 0 i;1 (lemma 4.6). According to the theorem.1, REG 0 0, REG 1, REG 0 1, REG, REG 0, ::: REG k+1, REG 0 k+1 are the attractors for true. Lemma 4.7 From REG 0 k+1, any computation will eventually reach adeadlock conguration. The deadlock conguration is reached in one round. Proof: In REG 0 k+1, the array F of a processor never change its value (observation 4.1): the action A 1 and B 1 cannot be performed. A processor can only update its Ld variable according to its F variable: The action that updates its variable (A, B,orB 3 ) will be performed at most one time. In a no-deadlock conguration of REG 0 k+1, processors that need to update their Ld variable verify an action guard. After a round, no processor need to update their Ld variable: a deadlock conguration is reached. 8

9 5 Correctness In the previous section, we have proven that whatever the computation performs, a deadlock conguration is reached that belong to REG 0 k+1. In this section, we will prove that in a deadlock conguration of REG 0 k+1, one only one processor is elected: the processor having the smallest id-value. Observation 5.1 Let c be adeadlock conguration of REG 0 k+1. In c, the array F of any processor of SI contains only id-values of processors in the ring (processors that belongs to SI). The processor having the smallest id-value in the ring (processor that belongs to SI)is a leader in c. Lemma 5.1 Let c be a deadlock conguration of REG 0 k+1. In c, the array F of any processor of SI contains all id-values of processors in the ring that belongs to SI. Proof: Let R be a k-bounded ring. Let p be a processor of SI. Call S the size of SI. S k + (SI contains at most k + processors). (F p [k +1] :::F p [k +; S]) is the list of id-values of S previous processors of SI in the ring (see observation 4.1). Thus, F p contains all id-values of processors in the ring that belongs to SI. Theorem 5.1 Let c be adeadlock conguration of REG 0 k+1. In c, there is one and only one leader. Proof: In c, there is at least one leader (see observation 5.1). In c, the array F of any processor of SI contains all id-values of processors in the ring that belongs to SI (lemma 5.1). Only the processor of SI having the smallest id-value is a leader. Notice that there is only one legitimate conguration on a ring. 6 Conclusion Theorem 6.1 The algorithm 3.1 requires only constant register space. Proof: In the algorithm 3.1, the eld variables of a processor p are Ld p and F p. Thus, the register space required by the algorithm 3.1 is :(k +) k+ states. We have proven that the algorithm 3.1 is a a self-stabilizing leader election algorithm on unidirectional k-bounded rings. The algorithm 3.1 is a silent one: the legitimate conguration is deadlock one. Moreover, the register space required by the algorithm 3.1 is constant whatever is the ring size. Theorem 6. Whatever is the initial conguration, the system stabilizes in at most (k +)N +1 rounds. Proof: Whatever the initial conguration, REG 0 is reached in one round (lemma 4.). From any conguration of REG i, REG 0 i is reached in at most N ; 1 rounds (lemma 4.5). Whatever the current conguration of REG 0 i;1, REG i is reached in one round (lemma 4.6). According to lemma 4. and 4.5, REG 0 0 is reached in at most N rounds. Whatever the current conguration of REG 0 i;1, REG 0 i is reached in N rounds (lemma 4.6 and 4.5). Thus REG 0 k+1 is reached in at most (k +)N rounds. Whatever the current conguration of REG 0 k+1, the deadlock conguration is reached in at most one round. According to the theorem 5.1, this conguration is legitimate. 9

10 References [AB97] Y Afek and A Bremler. Self-stabilizing unidirectional network algorithms by powersupply. In Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA97), pages 111{10, [AG93] A Arora and MG Gouda. Distributed reset. In FSTTCS90 Proceedings of the 10th Conference on Foundations of Software Technology and Theoretical Computer Science, Springer-Verlag LNCS:47, pages 316{39, [AG94] A Arora and MG Gouda. Distributed reset. IEEE Transactions on Computers, 43(9):106{1038, [AKY90] [BGM89] [BJ98] [DGS96] [Dij74] [Dol93] [GG96] [GH96] [GM91] [ILS95] Y Afek, S Kutten, and M Yung. Memory-ecient self-stabilization on general networks. In WDAG90 Distributed Algorithms 4th International Workshop Proceedings, Springer- Verlag LNCS:486, pages 15{8, JE Burns, MG Gouda, and RE Miller. On relaxing interleaving assumptions. In Proceedings of the MCC Workshop on Self-Stabilizing Systems, MCC Technical Report No. STP , J. Beauquier and C. Johnen. Deterministic and self-stabilizing leader election protocol. Technical report, Laboratoire de Recherche en Informatique, Universite Paris-Sud, S Dolev, MG Gouda, and M Schneider. Memory requirements for silent stabilization. In PODC96 Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, pages 7{34, EW Dijkstra. Self stabilizing systems in spite of distributed control. Communications of the Association of the Computing Machinery, 17:643{644, S Dolev. Optimal time self-stabilization in dynamic systems. In WDAG93 Distributed Algorithms 7th International Workshop Proceedings, Springer-Verlag LNCS:75, pages 160{173, S Ghosh and A Gupta. An exercise in fault-containment: self-stabilizing leader election. Information Processing Letters, 59:81{88, MG Gouda and FF Haddix. The stabilizing token ring in three bits. Journal of Parallel and Distributed Computing, 35:43{48, MG Gouda and N Multari. Stabilizing communication protocols. IEEE Transactions on Computers, 40:448{458, G Itkis, C Lin, and J Simon. Deterministic, constant space, self-stabilizing leader election on uniform rings. In WDAG95 Distributed Algorithms 9th International Workshop Proceedings, Springer-Verlag LNCS:97, pages 88{30, [JABD97] C Johnen, G Alari, J Beauquier, and AK Datta. Self-stabilizing depth-rst token passing on rooted networks. In WDAG97 Distributed Algorithms 11th International Workshop Proceedings, Springer-Verlag LNCS:130, pages 60{74, [Joh97] C Johnen. Memory-ecient self-stabilizing algorithm to construct BFS spanning trees. In Proceedings of the Third Workshop on Self-Stabilizing Systems, pages 15{140. Carleton University Press,

11 [MOY96] [Pet97] [PV97] [Vil97] A Mayer, R Ostrovsky, and M Yung. Self-stabilizing algorithms for synchronous unidirectional rings. In Proceedings of the Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA96), pages 564{573, F. Petit. Highly space ecient self-stabilizing depth-rst token circulation for trees. In V. Villain A. Bui, M. Bui, editor, On Principles Of DIstributed Systems, OPODIS'97, pages 1{36. Hermes, F Petit and V Villain. Color optimal self-stabilizing depth-rst token circulation. In I-SPAN'97, Third International Symposium on Parallel Architectures, Algorithms and Networks Proceedings, IEEE Computer Society Press. IEEE Computer Society Press, To appear. V. Villain. A new lower bound for self-stabilizing mutual exclusion algorithms. Technical Report RR97-17, LaRIA, University of Picardie Jules Verne, France,

Self-Stabilizing Depth-First Token Circulation In Arbitrary. Rooted Networks. Vincent Villain 3

Self-Stabilizing Depth-First Token Circulation In Arbitrary. Rooted Networks. Vincent Villain 3 Self-Stabilizing Depth-First Token Circulation In Arbitrary Rooted Networks Ajoy K. Datta, 1 Colette Johnen, 2 Franck Petit, 3 Vincent Villain 3 1 Department of Computer Science, University of Nevada,

More information

1. Introduction Robustness is one of the most important requirements of modern distributed systems. Various types of faults are likely to occur at var

1. Introduction Robustness is one of the most important requirements of modern distributed systems. Various types of faults are likely to occur at var Self-Stabilizing Depth-First Token Circulation In Arbitrary Rooted Networks Ajoy K. Datta, 1 Colette Johnen, 2 Franck Petit, 3 Vincent Villain 3 1 Department of Computer Science, University of Nevada,

More information

Snap-Stabilizing PIF and Useless Computations

Snap-Stabilizing PIF and Useless Computations Snap-Stabilizing PIF and Useless Computations Alain Cournier Stéphane Devismes Vincent Villain LaRIA, CNRS FRE 2733 Université de Picardie Jules Verne, Amiens (France) Abstract A snap-stabilizing protocol,

More information

A Snap-Stabilizing DFS with a Lower Space Requirement

A Snap-Stabilizing DFS with a Lower Space Requirement A Snap-Stabilizing DFS with a Lower Space Requirement Alain Cournier, Stéphane Devismes, and Vincent Villain LaRIA, CNRS FRE 2733, Université de Picardie Jules Verne, Amiens (France) {cournier, devismes,

More information

Snap-Stabilizing Depth-First Search on Arbitrary Networks

Snap-Stabilizing Depth-First Search on Arbitrary Networks The Author 006. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org Advance Access

More information

Fast self-stabilizing k-independent dominating set construction Labri Technical Report RR

Fast self-stabilizing k-independent dominating set construction Labri Technical Report RR Fast self-stabilizing k-independent dominating set construction Labri Technical Report RR-1472-13 Colette Johnen Univ. Bordeaux, LaBRI, UMR 5800, F-33400 Talence, France Abstract. We propose a fast silent

More information

A Self-Stabilizing Minimal Dominating Set Algorithm with Safe Convergence

A Self-Stabilizing Minimal Dominating Set Algorithm with Safe Convergence A Self-Stabilizing Minimal Dominating Set Algorithm with Safe Convergence Hirotsugu Kakugawa and Toshimitsu Masuzawa Department of Computer Science Graduate School of Information Science and Technology

More information

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007 Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can

More information

Self-Stabilizing Silent Disjunction in an Anonymous Network

Self-Stabilizing Silent Disjunction in an Anonymous Network Self-Stabilizing Silent Disjunction in an Anonymous Network Ajoy K. Datta 1, Stéphane Devismes 2, and Lawrence L. Larmore 1 1 Department of Computer Science, University of Nevada Las Vegas, USA 2 VERIMAG

More information

Fault Masking in Tri-redundant Systems

Fault Masking in Tri-redundant Systems Fault Masking in Tri-redundant Systems Mohamed G. Gouda 1, Jorge A. Cobb 2, and Chin-Tser Huang 3 1 Department of Computer Sciences The University of Texas at Austin gouda@cs.utexas.edu 2 Department of

More information

On Equilibria of Distributed Message-Passing Games

On Equilibria of Distributed Message-Passing Games On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu

More information

Introduction to Self-Stabilization. Maria Potop-Butucaru, Franck Petit and Sébastien Tixeuil LiP6/UPMC

Introduction to Self-Stabilization. Maria Potop-Butucaru, Franck Petit and Sébastien Tixeuil LiP6/UPMC Introduction to Self-Stabilization Maria Potop-Butucaru, Franck Petit and Sébastien Tixeuil LiP6/UPMC Self-stabilization 101 Example U 0 = a U n+1 = U n 2 if U n is even U n+1 = 3U n+1 2 if U n is odd

More information

A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set

A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set A Self-Stabilizing Distributed Approximation Algorithm for the Minimum Connected Dominating Set Sayaka Kamei and Hirotsugu Kakugawa Tottori University of Environmental Studies Osaka University Dept. of

More information

Combining Shared Coin Algorithms

Combining Shared Coin Algorithms Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence

More information

6.852: Distributed Algorithms Fall, Class 24

6.852: Distributed Algorithms Fall, Class 24 6.852: Distributed Algorithms Fall, 2009 Class 24 Today s plan Self-stabilization Self-stabilizing algorithms: Breadth-first spanning tree Mutual exclusion Composing self-stabilizing algorithms Making

More information

Preserving the Fault-Containment of Ring Protocols Executed on Trees

Preserving the Fault-Containment of Ring Protocols Executed on Trees The Computer Journal Advance Access published November 21, 2008 # The Author 2008. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions,

More information

Time Optimal Asynchronous Self-stabilizing Spanning Tree

Time Optimal Asynchronous Self-stabilizing Spanning Tree Time Optimal Asynchronous Self-stabilizing Spanning Tree Janna Burman and Shay Kutten Dept. of Industrial Engineering & Management Technion, Haifa 32000, Israel. bjanna@tx.technion.ac.il, kutten@ie.technion.ac.il

More information

Maximum Metric Spanning Tree made Byzantine Tolerant

Maximum Metric Spanning Tree made Byzantine Tolerant Algorithmica manuscript No. (will be inserted by the editor) Maximum Metric Spanning Tree made Byzantine Tolerant Swan Dubois Toshimitsu Masuzawa Sébastien Tixeuil Received: date / Accepted: date Abstract

More information

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 1709-1718 (2008) A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JI-CHERNG LIN, TETZ C. HUANG, CHENG-PIN

More information

Self-Stabilizing Byzantine Asynchronous Unison

Self-Stabilizing Byzantine Asynchronous Unison Self-Stabilizing Byzantine Asynchronous Unison Swan Dubois 1,3 Maria Gradinariu Potop-Butucaru 1,4 Mikhail Nesterenko 2,5 Sébastien Tixeuil 1,6 Abstract We explore asynchronous unison in the presence of

More information

From self- to self-stabilizing with service guarantee 1-hop weight-based clustering

From self- to self-stabilizing with service guarantee 1-hop weight-based clustering From self- to self-stabilizing with service guarantee 1-hop weight-based clustering Colette Johnen and Fouzi Mekhaldi LaBRI, University of Bordeaux, CNRS. F-33405 Talence Cedex, France Abstract. We propose

More information

Dynamic FTSS in Asynchronous Systems: the Case of Unison

Dynamic FTSS in Asynchronous Systems: the Case of Unison Dynamic FTSS in Asynchronous Systems: the Case of Unison Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil To cite this version: Swan Dubois, Maria Potop-Butucaru, Sébastien Tixeuil. Dynamic FTSS in

More information

Chengdian Lin. University of Chicago. Abstract

Chengdian Lin. University of Chicago. Abstract Deterministic, Constant Space, Self-Stabilizing Leader Election on Uniform Rings Gene Itkis Technion and Boston Univ. itkis@cs.technion.ac.il Chengdian Lin University of Chicago lin@cs.uchicago.edu Janos

More information

{},{a},{a,c} {},{c} {c,d}

{},{a},{a,c} {},{c} {c,d} Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au

More information

Ensuring Average Recovery with Adversarial Scheduler

Ensuring Average Recovery with Adversarial Scheduler Ensuring Average Recovery with Adversarial Scheduler Jingshu Chen, Mohammad Roohitavaf, and Sandeep S. Kulkarni Michigan State University, US {chenji15, roohitav, sandeep}@cse.msu.edu Abstract In this

More information

Leader Election in Asymmetric Labeled Unidirectional Rings

Leader Election in Asymmetric Labeled Unidirectional Rings Leader Election in Asymmetric Labeled Unidirectional Rings Karine Altisen Ajoy K. Datta Stéphane Devismes Anaïs Durand Lawrence L. Larmore Univ. Grenoble Alpes, CNRS, Grenoble INP, VERIMAG, 38000 Grenoble,

More information

Figure 1. Solution to dining-philosophers with malicious crashes

Figure 1. Solution to dining-philosophers with malicious crashes Dining Philosophers that Tolerate Malicious Crashes Mikhail Nesterenko Λ Department of Computer Science, Kent State University, Kent, OH 44242, mikhail@cs.kent.edu Anish Arora y Dept. of Computer and Information

More information

arxiv: v1 [cs.dc] 3 Oct 2011

arxiv: v1 [cs.dc] 3 Oct 2011 A Taxonomy of aemons in Self-Stabilization Swan ubois Sébastien Tixeuil arxiv:1110.0334v1 cs.c] 3 Oct 2011 Abstract We survey existing scheduling hypotheses made in the literature in self-stabilization,

More information

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,

More information

Self-Stabilizing Small k-dominating Sets

Self-Stabilizing Small k-dominating Sets Self-Stabilizing Small k-dominating Sets Ajoy K. Datta, Stéphane Devismes, Karel Heurtefeux, Lawrence L. Larmore, Yvan Rivierre Verimag Research Report n o TR-2011-6 January 11, 2012 Reports are downloadable

More information

Computer Science Technical Report

Computer Science Technical Report Computer Science Technical Report Synthesizing Self-Stabilization Through Superposition and Backtracking Alex Klinkhamer and Ali Ebnenasir Michigan Technological University Computer Science Technical Report

More information

Nader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca. Canada. (

Nader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca. Canada. ( Meeting Times of Random Walks on Graphs Nader H. Bshouty Lisa Higham Jolanta Warpechowska-Gruca Computer Science University of Calgary Calgary, AB, T2N 1N4 Canada (e-mail: fbshouty,higham,jolantag@cpsc.ucalgary.ca)

More information

Stabilizing Dining with Failure Locality 1

Stabilizing Dining with Failure Locality 1 Stabilizing Dining with Failure Locality 1 Hyun Chul Chung 1,, Srikanth Sastry 2,, and Jennifer L. Welch 1, 1 Texas A&M University, Department of Computer Science & Engineering {h0c8412,welch}@cse.tamu.edu

More information

Stabilizing Time-Adaptive Protocols. February 8, Abstract

Stabilizing Time-Adaptive Protocols. February 8, Abstract Stabilizing Time-Adaptive Protocols Shay Kutten Dept. of Industrial Engineering & Management The Technion and IBM T.J. Watson Research Center Boaz Patt-Shamir y College of Computer Science Northeastern

More information

Section 6 Fault-Tolerant Consensus

Section 6 Fault-Tolerant Consensus Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.

More information

On the generalized dining philosophers problem

On the generalized dining philosophers problem On the generalized dining philosophers problem Oltea Mihaela Herescu Catuscia Palamidessi Department of Computer Science and Engineering, The Pennsylvania State University Pond Lab, University Park, PA

More information

Electronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim

Electronic Notes in Theoretical Computer Science 18 (1998) URL:   8 pages Towards characterizing bisim Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free

More information

Time Free Self-Stabilizing Local Failure Detection

Time Free Self-Stabilizing Local Failure Detection Research Report 33/2004, TU Wien, Institut für Technische Informatik July 6, 2004 Time Free Self-Stabilizing Local Failure Detection Martin Hutle and Josef Widder Embedded Computing Systems Group 182/2

More information

in (n log 2 (n + 1)) time by performing about 3n log 2 n key comparisons and 4 3 n log 4 2 n element moves (cf. [24]) in the worst case. Soon after th

in (n log 2 (n + 1)) time by performing about 3n log 2 n key comparisons and 4 3 n log 4 2 n element moves (cf. [24]) in the worst case. Soon after th The Ultimate Heapsort Jyrki Katajainen Department of Computer Science, University of Copenhagen Universitetsparken 1, DK-2100 Copenhagen East, Denmark Abstract. A variant of Heapsort named Ultimate Heapsort

More information

Verifying Randomized Distributed Algorithms with PRISM

Verifying Randomized Distributed Algorithms with PRISM Verifying Randomized Distributed Algorithms with PRISM Marta Kwiatkowska, Gethin Norman, and David Parker University of Birmingham, Birmingham B15 2TT, United Kingdom {M.Z.Kwiatkowska,G.Norman,D.A.Parker}@cs.bham.ac.uk

More information

Maximizable Routing Metrics

Maximizable Routing Metrics Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources

More information

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland. A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,

More information

Symmetric Rendezvous in Graphs: Deterministic Approaches

Symmetric Rendezvous in Graphs: Deterministic Approaches Symmetric Rendezvous in Graphs: Deterministic Approaches Shantanu Das Technion, Haifa, Israel http://www.bitvalve.org/~sdas/pres/rendezvous_lorentz.pdf Coauthors: Jérémie Chalopin, Adrian Kosowski, Peter

More information

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol. Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist

More information

1 Lamport s Bakery Algorithm

1 Lamport s Bakery Algorithm Com S 6 Spring Semester 2009 Algorithms for Multiprocessor Synchronization Lecture 3: Tuesday, 27th January 2009 Instructor: Soma Chaudhuri Scribe: Neeraj Khanolkar Lamport s Bakery Algorithm Algorithm

More information

Consistent Fixed Points and Negative Gain

Consistent Fixed Points and Negative Gain 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies Consistent Fixed Points and Negative Gain H. B. Acharya The University of Texas at Austin acharya @ cs.utexas.edu

More information

L R I SELF-STABILIZING SPANNING TREE ALGORITHM FOR LARGE SCALE SYSTEMS HERAULT T / LEMARINIER P / PERES O / PILARD L / BEAUQUIER J

L R I SELF-STABILIZING SPANNING TREE ALGORITHM FOR LARGE SCALE SYSTEMS HERAULT T / LEMARINIER P / PERES O / PILARD L / BEAUQUIER J L R I SELF-STABILIZING SPANNING TREE ALGORITHM FOR LARGE SCALE SYSTEMS HERAULT T / LEMARINIER P / PERES O / PILARD L / BEAUQUIER J Unité Mixte de Recherche 8623 CNRS-Université Paris Sud LRI 08/2006 Rapport

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

THE WEAKEST FAILURE DETECTOR FOR SOLVING WAIT-FREE, EVENTUALLY BOUNDED-FAIR DINING PHILOSOPHERS. A Dissertation YANTAO SONG

THE WEAKEST FAILURE DETECTOR FOR SOLVING WAIT-FREE, EVENTUALLY BOUNDED-FAIR DINING PHILOSOPHERS. A Dissertation YANTAO SONG THE WEAKEST FAILURE DETECTOR FOR SOLVING WAIT-FREE, EVENTUALLY BOUNDED-FAIR DINING PHILOSOPHERS A Dissertation by YANTAO SONG Submitted to the Office of Graduate Studies of Texas A&M University in partial

More information

Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model?

Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Can an Operation Both Update the State and Return a Meaningful Value in the Asynchronous PRAM Model? Jaap-Henk Hoepman Department of Computer Science, University of Twente, the Netherlands hoepman@cs.utwente.nl

More information

A Superstabilizing log(n)-approximation Algorithm for Dynamic Steiner Trees

A Superstabilizing log(n)-approximation Algorithm for Dynamic Steiner Trees A Superstabilizing log(n)-approximation Algorithm for Dynamic Steiner Trees Lélia Blin c,b, Maria Potop-Butucaru a,b,, Stephane Rovedakis d, a Univ. Pierre & Marie Curie - Paris 6, b LIP6-CNRS UMR 7606,

More information

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

cachan.fr/publis/ Accepted for publication in Theoretical Computer Science

cachan.fr/publis/ Accepted for publication in Theoretical Computer Science http://www.lsv.ens cachan.fr/publis/ Accepted for publication in Theoretical Computer Science A Polynomial -Bisimilar Normalization for Reset Petri Nets Catherine Dufourd y Alain Finkel y Abstract Reset

More information

Genuine atomic multicast in asynchronous distributed systems

Genuine atomic multicast in asynchronous distributed systems Theoretical Computer Science 254 (2001) 297 316 www.elsevier.com/locate/tcs Genuine atomic multicast in asynchronous distributed systems Rachid Guerraoui, Andre Schiper Departement d Informatique, Ecole

More information

const =Λ for simplicity, we assume N =2 L Λ= L = log N; =Λ (depth of arbitration tree) + 1 = O(log N) Λ= Tsize =2 L 1=N 1 =Λ size of arbitration tree

const =Λ for simplicity, we assume N =2 L Λ= L = log N; =Λ (depth of arbitration tree) + 1 = O(log N) Λ= Tsize =2 L 1=N 1 =Λ size of arbitration tree A Space- and Time-efcient Local-spin Spin Lock Yong-Jik Kim and James H. Anderson Department of Computer Science University of North Carolina at Chapel Hill March 2001 Abstract A simple ce transformation

More information

Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus

Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus Simultaneous Consensus Tasks: A Tighter Characterization of Set-Consensus Yehuda Afek 1, Eli Gafni 2, Sergio Rajsbaum 3, Michel Raynal 4, and Corentin Travers 4 1 Computer Science Department, Tel-Aviv

More information

Rendezvous and Election of Mobile Agents: Impact of Sense of Direction

Rendezvous and Election of Mobile Agents: Impact of Sense of Direction Rendezvous and Election of Mobile Agents: Impact of Sense of Direction Lali Barrière Paola Flocchini Pierre Fraigniaud Nicola Santoro Abstract Consider a collection of r identical asynchronous mobile agents

More information

Distributed Algorithms

Distributed Algorithms Distributed Algorithms December 17, 2008 Gerard Tel Introduction to Distributed Algorithms (2 nd edition) Cambridge University Press, 2000 Set-Up of the Course 13 lectures: Wan Fokkink room U342 email:

More information

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general Interleaving Schemes for Multidimensional Cluster Errors Mario Blaum IBM Research Division 650 Harry Road San Jose, CA 9510, USA blaum@almaden.ibm.com Jehoshua Bruck California Institute of Technology

More information

Locality Lower Bounds

Locality Lower Bounds Chapter 8 Locality Lower Bounds In Chapter 1, we looked at distributed algorithms for coloring. In particular, we saw that rings and rooted trees can be colored with 3 colors in log n + O(1) rounds. 8.1

More information

Chapter 2 Source Models and Entropy. Any information-generating process can be viewed as. computer program in executed form: binary 0

Chapter 2 Source Models and Entropy. Any information-generating process can be viewed as. computer program in executed form: binary 0 Part II Information Theory Concepts Chapter 2 Source Models and Entropy Any information-generating process can be viewed as a source: { emitting a sequence of symbols { symbols from a nite alphabet text:

More information

Atomic m-register operations

Atomic m-register operations Atomic m-register operations Michael Merritt Gadi Taubenfeld December 15, 1993 Abstract We investigate systems where it is possible to access several shared registers in one atomic step. We characterize

More information

Syntax: form ::= A: lin j E: lin ::= 3 lin j lin ^ lin j :lin j bool lin lin is a temporal formula dened over a global sequence. bool is true in g if

Syntax: form ::= A: lin j E: lin ::= 3 lin j lin ^ lin j :lin j bool lin lin is a temporal formula dened over a global sequence. bool is true in g if Introduction 1 Goals of the lecture: Weak Conjunctive Predicates Logic for global predicates Weak conjunctive algorithm References: Garg and Waldecker 94 Syntax: form ::= A: lin j E: lin ::= 3 lin j lin

More information

Some remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Sha

Some remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Sha Some remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Shannon capacity of cycles of odd length. We present some

More information

Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM

Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM Variations on Itai-Rodeh Leader Election for Anonymous Rings and their Analysis in PRISM Wan Fokkink (Vrije Universiteit, Section Theoretical Computer Science CWI, Embedded Systems Group Amsterdam, The

More information

Optimal Resilience Asynchronous Approximate Agreement

Optimal Resilience Asynchronous Approximate Agreement Optimal Resilience Asynchronous Approximate Agreement Ittai Abraham, Yonatan Amit, and Danny Dolev School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel {ittaia, mitmit,

More information

Allocate-On-Use Space Complexity of Shared-Memory Algorithms

Allocate-On-Use Space Complexity of Shared-Memory Algorithms Allocate-On-Use Space Complexity of Shared-Memory Algorithms James Aspnes Bernhard Haeupler Alexander Tong Philipp Woelfel DISC 2018 Asynchronous shared memory model Processes: p 1 p 2 p 3 p n Objects:

More information

Sub-Logarithmic Test-and-Set Against a Weak Adversary

Sub-Logarithmic Test-and-Set Against a Weak Adversary Sub-Logarithmic Test-and-Set Against a Weak Adversary Dan Alistarh 1 and James Aspnes 2 1 EPFL 2 Yale University Abstract. A randomized implementation is given of a test-and-set register with O(log log

More information

Distributed Consensus

Distributed Consensus Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort in distributed transactions Reaching agreement

More information

A Brief Introduction to Model Checking

A Brief Introduction to Model Checking A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:

More information

Counterexamples to witness conjectures. Notations Let E be the set of admissible constant expressions built up from Z; + ;?;;/; exp and log. Here a co

Counterexamples to witness conjectures. Notations Let E be the set of admissible constant expressions built up from Z; + ;?;;/; exp and log. Here a co Counterexamples to witness conjectures Joris van der Hoeven D pt. de Math matiques (b t. 45) Universit Paris-Sud 91405 Orsay CEDEX France August 15, 003 Consider the class of exp-log constants, which is

More information

Claude Marche. Bat 490, Universite Paris-Sud. Abstract

Claude Marche. Bat 490, Universite Paris-Sud.   Abstract The Word Problem of ACD-Ground theories is Undecidable Claude Marche Laboratoire de Recherche en Informatique (UA 410 CNRS) Bat 490, Universite Paris-Sud 91405 ORSAY CEDEX, FRANCE E-mail: marche@lri.lri.fr

More information

Non-preemptive multiprocessor scheduling of strict periodic systems with precedence constraints

Non-preemptive multiprocessor scheduling of strict periodic systems with precedence constraints Non-preemptive multiprocessor scheduling of strict periodic systems with precedence constraints Liliana Cucu, Yves Sorel INRIA Rocquencourt, BP 105-78153 Le Chesnay Cedex, France liliana.cucu@inria.fr,

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly

More information

Maximum Metric Spanning Tree made Byzantine Tolerant

Maximum Metric Spanning Tree made Byzantine Tolerant Maximum Metric Spanning Tree made Byzantine Tolerant Swan Dubois Toshimitsu Masuzawa Sébastien Tixeuil Abstract Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed

More information

Wait-Free Consensus. James Aspnes. July 24, School of Computer Science. Carnegie Mellon University. Pittsburgh, PA 15213

Wait-Free Consensus. James Aspnes. July 24, School of Computer Science. Carnegie Mellon University. Pittsburgh, PA 15213 Wait-Free Consensus James Aspnes July 24, 1992 CMU-CS-92-164 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulllment of the requirements for the degree

More information

Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony

Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony Antonio FERNÁNDEZ Ernesto JIMÉNEZ Michel RAYNAL LADyR, GSyC, Universidad Rey Juan Carlos, 28933

More information

The Expressiveness of Silence: Tight Bounds for Synchronous Communication of. Information Using Bits and Silence. Una-May O'Reilly and Nicola Santoro

The Expressiveness of Silence: Tight Bounds for Synchronous Communication of. Information Using Bits and Silence. Una-May O'Reilly and Nicola Santoro The Expressiveness of Silence: Tight Bounds for Synchronous Communication of Information Using Bits and Silence Una-May O'Reilly and Nicola Santoro School of Comper Science, Carleton University Ottawa,

More information

L R I SELF-STABILIZING COUNTING IN MOBILE SENSOR NETWORKS BEAUQUIER J / CLEMENT J / MESSIKA S / ROSAZ L / ROZOY B

L R I SELF-STABILIZING COUNTING IN MOBILE SENSOR NETWORKS BEAUQUIER J / CLEMENT J / MESSIKA S / ROSAZ L / ROZOY B L R I SELF-STABILIZING COUNTING IN MOBILE SENSOR NETWORKS BEAUQUIER J / CLEMENT J / MESSIKA S / ROSAZ L / ROZOY B Unité Mixte de Recherche 8623 CNRS-Université Paris Sud LRI 03/2007 Rapport de Recherche

More information

6. Conclusion 23. T. R. Allen and D. A. Padua. Debugging fortran on a shared memory machine.

6. Conclusion 23. T. R. Allen and D. A. Padua. Debugging fortran on a shared memory machine. 6. Conclusion 23 References [AP87] T. R. Allen and D. A. Padua. Debugging fortran on a shared memory machine. In Proc. International Conf. on Parallel Processing, pages 721{727, 1987. [Dij65] E. W. Dijkstra.

More information

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department of omputer and Information Science The Ohio State University olumbus, OH 43210 (email: fmanivann,singhalg@cis.ohio-state.edu)

More information

TUM{INFO{10-I /1.{FI Alle Rechte vorbehalten Nachdruck auch auszugsweise verboten c1998 SFB 342 Methoden und Werkzeuge fur die Nutzung parallele

TUM{INFO{10-I /1.{FI Alle Rechte vorbehalten Nachdruck auch auszugsweise verboten c1998 SFB 342 Methoden und Werkzeuge fur die Nutzung parallele TECHNISCHE UNIVERSIT AT M U N C H E N INSTITUT F UR INFORMATIK Sonderforschungsbereich 342: Methoden und Werkzeuge fur die Nutzung paralleler Rechnerarchitekturen Lossy Counter Machines Richard Mayr TUM-I9827

More information

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal

1 Introduction During the execution of a distributed computation, processes exchange information via messages. The message exchange establishes causal TR No. OSU-ISR-5/96-TR33, Dept. of omputer and Information Science, The Ohio State University. Quasi-Synchronous heckpointing: Models, haracterization, and lassication D. Manivannan Mukesh Singhal Department

More information

Computer Science Technical Report

Computer Science Technical Report Computer Science Technical Report Swarm Synthesis of Convergence for Symmetric Protocols Ali Ebnenasir and Aly Farahat Michigan Technological University Computer Science Technical Report CS-TR-11-02 May

More information

Convergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel

Convergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel Convergence Complexity of Optimistic Rate Based Flow Control Algorithms Yehuda Afek y Yishay Mansour z Zvi Ostfeld x Computer Science Department, Tel-Aviv University, Israel 69978. December 12, 1997 Abstract

More information

Abstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced

Abstract. The paper considers the problem of implementing \Virtually. system. Virtually Synchronous Communication was rst introduced Primary Partition \Virtually-Synchronous Communication" harder than Consensus? Andre Schiper and Alain Sandoz Departement d'informatique Ecole Polytechnique Federale de Lausanne CH-1015 Lausanne (Switzerland)

More information

Dartmouth Computer Science Technical Report TR Constant-RMR Abortable Reader-Priority Reader-Writer. Algorithm

Dartmouth Computer Science Technical Report TR Constant-RMR Abortable Reader-Priority Reader-Writer. Algorithm Dartmouth Computer Science Technical Report TR2011-685 Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm Nan Zheng Thesis Advisor: Prasad Jayanti June 2, 2011 Abstract The concurrent reader-writer

More information

Integrating External and Internal Clock Synchronization. Christof Fetzer and Flaviu Cristian. Department of Computer Science & Engineering

Integrating External and Internal Clock Synchronization. Christof Fetzer and Flaviu Cristian. Department of Computer Science & Engineering Integrating External and Internal Clock Synchronization Christof Fetzer and Flaviu Cristian Department of Computer Science & Engineering University of California, San Diego La Jolla, CA 9093?0114 e-mail:

More information

Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures

Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Lower Bounds for Achieving Synchronous Early Stopping Consensus with Orderly Crash Failures Xianbing Wang 1, Yong-Meng Teo 1,2, and Jiannong Cao 3 1 Singapore-MIT Alliance, 2 Department of Computer Science,

More information

Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors

Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors Synchrony Weakened by Message Adversaries vs Asynchrony Restricted by Failure Detectors Michel RAYNAL, Julien STAINER Institut Universitaire de France IRISA, Université de Rennes, France Message adversaries

More information

Constructing Resiliant Communication Infrastructure for Runtime Environments

Constructing Resiliant Communication Infrastructure for Runtime Environments Constructing Resiliant Communication Infrastructure for Runtime Environments George BOSILCA a, Camille COTI b, Thomas HERAULT b, Pierre LEMARINIER a and Jack DONGARRA a a University of Tennessee Knoxville

More information

Diagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E.

Diagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E. In CADE-1 Workshop on Visual Reasoning, New Brunswick, NJ, July 1996. Diagram-based Formalisms for the Verication of Reactive Systems Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas

More information

Asynchronous cellular automata for pomsets. 2, place Jussieu. F Paris Cedex 05. Abstract

Asynchronous cellular automata for pomsets. 2, place Jussieu. F Paris Cedex 05. Abstract Asynchronous cellular automata for pomsets without auto-concurrency Manfred Droste Institut fur Algebra Technische Universitat Dresden D-01062 Dresden droste@math.tu-dresden.de Paul Gastin LITP, IBP Universite

More information

Introducing Speculation in Self-Stabilization

Introducing Speculation in Self-Stabilization Introducing Speculation in Self-Stabilization An Application to Mutual Exclusion ABSTRACT Swan Dubois École Polytechnique Fédérale de Lausanne LPD, Station 14 1015 Lausanne, Switzerland swan.dubois@epfl.ch

More information

arxiv: v3 [cs.dc] 25 Apr 2018

arxiv: v3 [cs.dc] 25 Apr 2018 Practically-Self-Stabilizing Virtual Synchrony Shlomi Dolev Chryssis Georgiou Ioannis Marcoullis Elad M. Schiller arxiv:1502.05183v3 [cs.dc] 25 Apr 2018 Abstract The virtual synchrony abstraction was proven

More information

Quantum Algorithms for Leader Election Problem in Distributed Systems

Quantum Algorithms for Leader Election Problem in Distributed Systems Quantum Algorithms for Leader Election Problem in Distributed Systems Pradeep Sarvepalli pradeep@cs.tamu.edu Department of Computer Science, Texas A&M University Quantum Algorithms for Leader Election

More information

Logical Time. 1. Introduction 2. Clock and Events 3. Logical (Lamport) Clocks 4. Vector Clocks 5. Efficient Implementation

Logical Time. 1. Introduction 2. Clock and Events 3. Logical (Lamport) Clocks 4. Vector Clocks 5. Efficient Implementation Logical Time Nicola Dragoni Embedded Systems Engineering DTU Compute 1. Introduction 2. Clock and Events 3. Logical (Lamport) Clocks 4. Vector Clocks 5. Efficient Implementation 2013 ACM Turing Award:

More information

Another Glance at the Alpern-Schneider. Characterization of Safety andliveness in. Concurrent Executions. Abstract

Another Glance at the Alpern-Schneider. Characterization of Safety andliveness in. Concurrent Executions. Abstract Another Glance at the Alpern-Schneider Characterization of Safety andliveness in Concurrent Executions H.Peter Gumm Abstract In order to derive a result such as the Alpern-Schneider theorem characterizing

More information

29 Linear Programming

29 Linear Programming 29 Linear Programming Many problems take the form of optimizing an objective, given limited resources and competing constraints If we can specify the objective as a linear function of certain variables,

More information

The Leader Election Protocol (IEEE 1394)

The Leader Election Protocol (IEEE 1394) The Leader Election Protocol (IEEE 1394) J.R. Abrial, D. Cansell, D. Méry July 2002 This Session - Background :-) - An informal presentation of the protocol :-) - Step by step formal design :- - Short

More information