• Aucun résultat trouvé

Local Terminations and Distributed Computability in Anonymous Networks

N/A
N/A
Protected

Academic year: 2022

Partager "Local Terminations and Distributed Computability in Anonymous Networks"

Copied!
101
0
0

Texte intégral

(1)

Local Terminations and Distributed Computability in Anonymous Networks

Jérémie Chalopin Emmanuel Godard Yves Métivier

LIF, CNRS & Aix-Marseille Université LaBRI, Université de Bordeaux

Session SHAMAN

(2)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

(3)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

For distributed networks, computability is known to be restricted by

Is it a ring, a tree? ...

(4)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

For distributed networks, computability is known to be restricted by

Is it a ring, a tree? ...

Are there loss of messages, or no? ...

(5)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

For distributed networks, computability is known to be restricted by

Is it a ring, a tree? ...

Are there loss of messages, or no? ...

Do nodes have unique identitier? ...

(6)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

For distributed networks, computability is known to be restricted by

Is it a ring, a tree? ...

Are there loss of messages, or no? ...

Do nodes have unique identitier? ...

Is the size of the network known? ...

(7)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

For distributed networks, computability is known to be restricted by

Is it a ring, a tree? ...

Are there loss of messages, or no? ...

Do nodes have unique identitier? ...

Is the size of the network known? ...

(8)

Distributed Computability

Question

What can becomputedby an arbitrary network, withpartial knowledgeabout its topology?

For distributed networks, computability is known to be restricted by

Is it a ring, a tree? ...

Are there loss of messages, or no? ...

Do nodes have unique identitier? ...

Is the size of the network known? ...

So the question is

Given a specification S, a family of networksF, is there a distributed algorithmAsuch that, any execution ofAon any network inF ends with final state (labels) satisfying S.

(9)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyof graphs; it represents

(10)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyof graphs; it represents

topology: trees, rings, meshes, ... . . .

(11)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyof labeled graphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

(12)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

(13)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

structural knowledge: the size, bound on the diameter, the topology ...

(14)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

structural knowledge: the size, bound on the diameter, the topology ...

thespecificationS is a graph relabelling relation

(15)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

structural knowledge: the size, bound on the diameter, the topology ...

thespecificationS is a graph relabelling relation

(G,input)S(G,output): spanning tree, leader election, ...

(16)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

structural knowledge: the size, bound on the diameter, the topology ...

thespecificationS is a graph relabelling relation

(G,input)S(G,output): spanning tree, leader election, ...

Is that enough to define the problem?

(17)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

structural knowledge: the size, bound on the diameter, the topology ...

thespecificationS is a graph relabelling relation

(G,input)S(G,output): spanning tree, leader election, ...

Is that enough to define the problem?

Different kinds of computability, depending on the kind of terminationwe are interested in.

(18)

Definitions

Is thetask(F,S)computable by a distributed algorithm onF ?

F is afamilyoflabeledgraphs; it represents

topology: trees, rings, meshes, ... . . .

any information is encoded in the initial labeling:

structural information: identities, sense of direction, ...

structural knowledge: the size, bound on the diameter, the topology ...

thespecificationS is a graph relabelling relation

(G,input)S(G,output): spanning tree, leader election, ...

Is that enough to define the problem?

Different kinds of computability, depending on the kind of terminationwe are interested in.

Reliability?

(19)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

(20)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

Distributed computability in a general setting,

(21)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

Distributed computability in a general setting,

Transient Faults: components failure, attacks, ...

(22)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

Distributed computability in a general setting,

Transient Faults: components failure, attacks, ...

Potentially Anonymous:arbitraryinitial labeling : unique identities, or “partially unique” (pseudonymous) ...

(23)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

Distributed computability in a general setting,

Transient Faults: components failure, attacks, ...

Potentially Anonymous:arbitraryinitial labeling : unique identities, or “partially unique” (pseudonymous) ...

Communication is reliable

(24)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

Distributed computability in a general setting,

Transient Faults: components failure, attacks, ...

Potentially Anonymous:arbitraryinitial labeling : unique identities, or “partially unique” (pseudonymous) ...

Communication is reliable

(25)

Anonymous Networks and Reliability

A network is anonymous when the initial (node) labeling is uniform.

Motivations:

Distributed computability in a general setting,

Transient Faults: components failure, attacks, ...

Potentially Anonymous:arbitraryinitial labeling : unique identities, or “partially unique” (pseudonymous) ...

Communication is reliable

Computability in resource-constrained autonomous large scale systems

Evolution of the network,

Impossibility results: properties of the network that have to be“centrally” maintained.

Possibility results: with efficient algorithms?

(26)

Motivations for Local Termination

Different kinds of termination exist for distributed algorithms.

Implicit termination: processes do not know that the computation is over.

[Boldi and Vigna ’02] Characterization of tasks computable with implicit termination,

based on fibrations and coverings,

equivalence withself-stabilizing(terminating) tasks.

(27)

Motivations for Local Termination

Different kinds of termination exist for distributed algorithms.

Implicit termination: processes do not know that the computation is over.

[Boldi and Vigna ’02] Characterization of tasks computable with implicit termination,

based on fibrations and coverings,

equivalence withself-stabilizing(terminating) tasks.

Local termination: at some point, each process knows that it has computed its final value.

(28)

Motivations for Local Termination

Different kinds of termination exist for distributed algorithms.

Implicit termination: processes do not know that the computation is over.

[Boldi and Vigna ’02] Characterization of tasks computable with implicit termination,

based on fibrations and coverings,

equivalence withself-stabilizing(terminating) tasks.

Local termination: at some point, each process knows that it has computed its final value.

Global termination detection: processes know that all processes have computed their final value.

[C., Godard, Métivier, Tel ’07] Characterization of tasks computable with global termination detection

based on coverings and quasi-coverings

(29)

Local Terminations

Local Termination:

a process knows when it canstopexecuting the algorithm.

[Boldi and Vigna ’99] Characterization of tasks computable with local termination

based onview construction

(30)

Local Terminations

Local Termination:

a process knows when it canstopexecuting the algorithm.

[Boldi and Vigna ’99] Characterization of tasks computable with local termination

based onview construction

WeakLocal Termination:

a process knows when it has computed itsfinalvalue, but can still run the algorithm (processing and forwarding other nodes messages).

(31)

Applications

Two distributed algorithms arecomposedwhenever the second uses as inputs the outputs of the first algorithm.

weak local termination: composition of distributed algorithms,

local termination: garbage collection.

(32)

Applications

Two distributed algorithms arecomposedwhenever the second uses as inputs the outputs of the first algorithm.

weak local termination: composition of distributed algorithms,

local termination: garbage collection.

A General Framework

Termination appears a key parameter to unify distributed computability results in communication networks.

(33)

Older Related Works

Angluin (’80)

Yamashita & Kameda (’95)

Boldi & Vigna (’99,’01)

Mazurkiewicz (’97)

Metivier et al (90’s)

...

(34)

Model: Reliable Message Passing Systems with Transient Faults

A network is represented as a graph G with a port-numberingδ where each process can

modify its state,

send a message via port p,

receive a message via port q.

1 1 2 1

2

1 1

2 3

3

(35)

Model: Reliable Message Passing Systems with Transient Faults

A network is represented as a graph G with a port-numberingδ where each process can

modify its state,

send a message via port p,

receive a message via port q.

We consider

reliablecommunications,

anonymoussystems.

asynchronoussystems.

1 1 2 1

2

1 2 1 1

2

2 2

3

3

(36)

Model: Reliable Message Passing Systems with Transient Faults

A network is represented as a graph G with a port-numberingδ where each process can

modify its state,

send a message via port p,

receive a message via port q.

We consider

reliablecommunications,

(potentially)anonymoussystems.

asynchronoussystems.

1 1 2 1

2

1 1

2 3

3

(37)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N∪ {∞},

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

(38)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N∪ {∞},

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) =∞:implicit terminationis OK butweak local terminationis impossible

(2,∞) (2,∞) (2,∞)

(39)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N∪ {∞},

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) =∞:implicit terminationis OK butweak local terminationis impossible

2 2

2

afterrrounds

(40)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N∪ {∞},

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) =∞:implicit terminationis OK butweak local terminationis impossible

2 2

2 (2,∞) (2,∞) (2,∞) (2,∞) (5,∞)

2r afterrrounds

(41)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N∪ {∞},

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) =∞:implicit terminationis OK butweak local terminationis impossible

2 2

2 (2,∞) (2,∞) 2 (2,∞) (5,∞)

2r afterrrounds

(42)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) ∈N:weak local terminationis OK butlocal terminationis impossible

(2,1) (2,1) (2,1)

(43)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) ∈N:weak local terminationis OK butlocal terminationis impossible

2 2

2

afterrrounds

(44)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) ∈N:weak local terminationis OK butlocal terminationis impossible

2 2

2 (2,2r+2) (2,1) (2,1) (2,1) (5,1)

2r afterrrounds

(45)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) ∈N:weak local terminationis OK butlocal terminationis impossible

2 2

2 (2,2r+2) (2,1) 2 (2,1) (5,1)

2r afterrrounds

(46)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If dist(v) ∈N:weak local terminationis OK butlocal terminationis impossible

2 2

2 (2,2r+2) (2,1) 2 (2,1) (5,1)

2r afterrrounds

(47)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If for neighbors u,v ,|dist(u)−dist(v)| ≤1:local terminationis OK butglobal terminationis impossible

(2,1) (2,1) (2,1)

(48)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If for neighbors u,v ,|dist(u)−dist(v)| ≤1:local terminationis OK butglobal terminationis impossible

(2,end) (2,end) (2,end)

afterrrounds

(49)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If for neighbors u,v ,|dist(u)−dist(v)| ≤1:local terminationis OK butglobal terminationis impossible

(2,end) (2,end)

(2,end) (2,r +2) (2,2) (5,1) (2,1) (2,1) (2,1)

2r r +1

afterrrounds

(50)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If for neighbors u,v ,|dist(u)−dist(v)| ≤1:local terminationis OK butglobal terminationis impossible

(2,end) (2,end)

(2,end) (2,r +2) (2,2) (5,1) (2,1) (2,end) (2,1)

2r r +1

afterrrounds

(51)

Examples of Tasks with Different Terminations

Problem

vV is labeled by(val(v),dist(v))∈N×N,

vV should compute

max{val(u)|u is at distance at most dist(v)of v}.

If for neighbors u,v ,|dist(u)−dist(v)| ≤1:local terminationis OK butglobal terminationis impossible

(2,end) (2,end)

(2,end) (2,r +2) (2,2) (5,1) (2,1) (2,end) (2,1)

2r r +1

afterrrounds

(52)

Our Contribution

A characterization of tasks computable withweak local termination

based on coverings and quasi-coverings

(53)

Our Contribution

A characterization of tasks computable withweak local termination

based on coverings and quasi-coverings

A characterization of tasks computable with weak local termination bypolynomialalgorithms

algorithms exchanging a polynomial number of bits

(54)

Our Contribution

A characterization of tasks computable withweak local termination

based on coverings and quasi-coverings

A characterization of tasks computable with weak local termination bypolynomialalgorithms

algorithms exchanging a polynomial number of bits

A new characterization of tasks computable withlocal termination.

based on coverings and quasi-coverings

(55)

Our Contribution

A characterization of tasks computable withweak local termination

based on coverings and quasi-coverings

A characterization of tasks computable with weak local termination bypolynomialalgorithms

algorithms exchanging a polynomial number of bits

A characterization of tasks computable withlocal terminationby polynomial algorithms.

based on coverings and quasi-coverings

(56)

From graphs to digraphs

We represent the network by alabeleddigraph(G, δ, λ) where the state of each process is encoded by its label.

1 1 2 1

(1,1)

(1,1)

(2,1)

(1,2)

(57)

Coverings

Definition

D is a covering of D viaϕifϕis a locally bijective homomorphism.

D D

(58)

Coverings

Definition

D is a covering of D viaϕifϕis a locally bijective homomorphism.

D D

Lifting Lemma

If D is a covering of Dviaϕ, in the synchronous execution of any algorithmA, v andϕ(v) behave in thesame way.

(59)

Quasi-coverings

R v

G

v K

D covering isomorphism

w

Definition: G is aquasi-coveringof D of radius R of center v .

(60)

Quasi-coverings

R v

G

v K

D covering isomorphism

w

Definition: G is aquasi-coveringof D of radius R of center v . Quasi-Lifting Lemma

In the synchronous execution of any algorithmA, v and w behave in thesame wayduringthe first R rounds.

(61)

Necessary Condition

Suppose there exists an algorithmAthat computes(F,S).

Given any digraph G, consider the synchronous execution ofA over G.

For any vV(G), let i be the first round (if it exists) where termi(v) =TERM, then we define:

result(G,v) =outputi(v),

time(G,v) =i.

Otherwise, we let result(G,v) =⊥and time(G,v) =∞.

(62)

Necessary Condition

R v

G

v K

covering isomorphism

D w

During the first R rounds of the execution, v and w remain in thesamestate.

(63)

Necessary Condition

R v

G

v K

covering isomorphism

D TERM w result(D,w) time(D,w)

During the first R rounds of the execution, v and w remain in thesamestate.

If R ≥time(D,w)or R≥time(G,w)),

result(D,w) =result(G,v)and time(D,w) =time(G,v).

(64)

Necessary Condition

R v

G

v K

covering isomorphism

D TERM w result(D,w) time(D,w)

Key Property

Two functions time and result have property(P)if for any G,D,

if G is a quasi-covering of D of radius R

if R≥min{time(G,v),time(D,w)}

thentime(G,v) =time(D,v)andresult(G,v) =result(D,v)

(65)

Weak Local Termination

Theorem

A task (F,S)can be computed onF with weak local termination

⇐⇒

there exists some functionstimeandresultcomputable onF such that

G S result(G)

timeandresulthave Property(P)

(66)

Weak Local Termination

Theorem

A task (F,S)can be computed onF with weak local termination by apolynomialalgorithm

⇐⇒

there exists some functionstimeandresultcomputable onF such that

G S result(G)

timeandresulthave Property(P)

there exists a polynomial p such that

∀G∈ F, max{time(G,v)|v V(G)} ≤p(|G|)

(67)

An Algorithm for the Sufficient Condition

A Mazurkiewicz-like AlgorithmM When executed on a graph G,

+ it reconstructs D such that G is acovering of D + it is apolynomialalgorithm

(68)

An Algorithm for the Sufficient Condition

A Mazurkiewicz-like AlgorithmM When executed on a graph G,

+ it reconstructs D such that G is acovering of D + it is apolynomialalgorithm

– it terminates onlyimplicitly

(69)

An Algorithm for the Sufficient Condition

A Mazurkiewicz-like AlgorithmM When executed on a graph G,

+ it reconstructs D such that G is acovering of D + it is apolynomialalgorithm

– it terminates onlyimplicitly

+ at any step i, it enables each process v to reconstruct Di(v) such that G is aquasi-coveringof Di(v)of center v

(70)

An Algorithm for the Sufficient Condition

A Mazurkiewicz-like AlgorithmM When executed on a graph G,

+ it reconstructs D such that G is acovering of D + it is apolynomialalgorithm

– it terminates onlyimplicitly

+ at any step i, it enables each process v to reconstruct Di(v) such that G is aquasi-coveringof Di(v)of center vv does notnotknow theradiusof the quasi-covering

(71)

An Algorithm for the Sufficient Condition

Szymanski, Shy and Prywes Algorithm Combined with our algorithm,

+ enables each v to compute alower boundlb(v) on the radius of the quasi-covering

+ onceMhas implicitly terminated, this lower bound tends to∞

(72)

An Algorithm for the Sufficient Condition

Szymanski, Shy and Prywes Algorithm Combined with our algorithm,

+ enables each v to compute alower boundlb(v) on the radius of the quasi-covering

+ onceMhas implicitly terminated, this lower bound tends to∞

– we have to be careful to avoid infinite computations

(73)

Computing the output

At each time step i, each v knows

a graph D(v)such that G is a quasi-covering of D(v)of center v

a vertex w(v): the image of v in D(v)

a lower bound lb(v)on the radius of the quasi-covering

(74)

Computing the output

At each time step i, each v knows

a graph D(v)such that G is a quasi-covering of D(v)of center v

a vertex w(v): the image of v in D(v)

a lower bound lb(v)on the radius of the quasi-covering If lb(v)≥time(G,v), then by Property(P)

time(G,v) =time(D(v),w(v))

result(G,v) =result(D(v),w(v))

(75)

Computing the output

At each time step i, each v knows

a graph D(v)such that G is a quasi-covering of D(v)of center v

a vertex w(v): the image of v in D(v)

a lower bound lb(v)on the radius of the quasi-covering If lb(v)≥time(G,v), then by Property(P)

time(G,v) =time(D(v),w(v))

result(G,v) =result(D(v),w(v)) Problem

If lb(v)<time(G,v), result(D(v),w(v))may beundefinedif D(v) isnotinF

(76)

Computing the output

At each time step i, each v knows

a graph D(v)such that G is a quasi-covering of D(v)of center v

a vertex w(v): the image of v in D(v)

a lower bound lb(v)on the radius of the quasi-covering Solution

v enumerates the graphs ofF until it finds a graph H that is a quasi-covering of D(v)of radius lb(v) of center u viaγ such thatγ(u) =w(v)

(77)

Computing the output

At each time step i, each v knows

a graph D(v)such that G is a quasi-covering of D(v)of center v

a vertex w(v): the image of v in D(v)

a lower bound lb(v)on the radius of the quasi-covering Solution

v enumerates the graphs ofF until it finds a graph H that is a quasi-covering of D(v)of radius lb(v) of center u viaγ such thatγ(u) =w(v)

If time(H,u)≤lb(v),

output(v) :=result(H,u)

(78)

Computing the output

lb(v) v

G

lb(v) u

H

D quasi-covering

quasi-covering

w

(79)

Computing the output

lb(v) v

G

lb(v) u

H

time(u) result(u)

D quasi-covering

quasi-covering

w

(80)

Computing the output

lb(v) v

G

lb(v) u

H

time(u) result(u)

D

time(w) =time(u) result(w) =result(u)

quasi-covering quasi-covering

w Sincetime(u)≤lb(v), by Property(P)

time(w) =time(u)and result(w) =result(v)

(81)

Computing the output

lb(v) v

G

lb(v) u

H

time(u) result(u)

D

time(w) =time(u) result(w) =result(u)

quasi-covering quasi-covering

w time(v)

result(v)

time(w) =time(v) result(w) =result(v)

Sincetime(u)≤lb(v), by Property(P)

time(w) =time(u)and result(w) =result(v)

time(v) =time(u)and result(v) =result(u)

(82)

Complexity

Let T(G) =max{time(G,v)|vV(G)}.

Proposition

Complexity of our Algorithm:

O(Dn+T(G))rounds

O(m2n+mT(G))messages

O(∆log n+log T(G))bits per message

(83)

Complexity

Let T(G) =max{time(G,v)|vV(G)}.

Proposition

Complexity of our Algorithm:

O(Dn+T(G))rounds

O(m2n+mT(G))messages

O(∆log n+log T(G))bits per message Corollary

If there exists an algorithmAthat computes a task(S,F) in a polynomial number of rounds(even withbigmessages), there exists apolynomialalgorithmA that computes(S,F)

(84)

Necessary Condition for Local Termination

G

u v

We define an operatorsplitsuch that

(85)

Necessary Condition for Local Termination

G

u

v v

H=split(G,u,k)

We define an operatorsplitsuch that

thebluevertices in split(G,u,k)behave like uin G during k steps

(86)

Necessary Condition for Local Termination

G

u

v v

H=split(G,u,k)

Property

Two functions time and result have property(P)if for any G

if k =time(G,u)

then, for any v 6=u, result(G,v) =result(H,v)and time(G,v) =time(H,v)

(87)

Local Termination

Theorem

A task (F,S)can be computed onF with local termination

⇐⇒

there exists some functionstimeandresultcomputable onF such that

G S result(G)

timeandresulthave Property(P)and(P)

(88)

Local Termination

Theorem

A task (F,S)can be computed onF with local termination by a polynomialalgorithm

⇐⇒

there exists some functionstimeandresultcomputable onF such that

G S result(G)

timeandresulthave Property(P)and(P)

there exists a polynomial p such that

∀G∈ F, max{time(G,v)|v V(G)} ≤p(|G|)

(89)

Conclusion

Modeling arbitrary networks with reliable communications and “transient” faults.

(90)

Conclusion

Modeling arbitrary networks with reliable communications and “transient” faults.

Unifying questions: via termination detection,

(91)

Conclusion

Modeling arbitrary networks with reliable communications and “transient” faults.

Unifying questions: via termination detection,

Unifying results of characterizations:

(92)

Conclusion

Modeling arbitrary networks with reliable communications and “transient” faults.

Unifying questions: via termination detection,

Unifying results of characterizations:

coverings, quasi-coverings,

(93)

Conclusion

Modeling arbitrary networks with reliable communications and “transient” faults.

Unifying questions: via termination detection,

Unifying results of characterizations:

coverings, quasi-coverings,

polynomial algorithms.

(94)

Perspectives

Exploiting characterization results,

(95)

Perspectives

Exploiting characterization results,

Extensions to self-stabilizing systems (and other self-∗),

(96)

Perspectives

Exploiting characterization results,

Extensions to self-stabilizing systems (and other self-∗),

Others constraints:

(97)

Perspectives

Exploiting characterization results,

Extensions to self-stabilizing systems (and other self-∗),

Others constraints:

Communications,

(98)

Perspectives

Exploiting characterization results,

Extensions to self-stabilizing systems (and other self-∗),

Others constraints:

Communications,

Interactions/scheduling,

(99)

Perspectives

Exploiting characterization results,

Extensions to self-stabilizing systems (and other self-∗),

Others constraints:

Communications,

Interactions/scheduling,

Faults, dynamic networks,

(100)

Perspectives

Exploiting characterization results,

Extensions to self-stabilizing systems (and other self-∗),

Others constraints:

Communications,

Interactions/scheduling,

Faults, dynamic networks,

...

(101)

Thank you

Références

Documents relatifs

Les méthodes de pompage optique et de détection optique ont été employées précé- demment pour orienter des atomes alcalins à l’état fondamental et pour étudier

Regarding the avalanche hazard zones in Galt¨ur, it can be assumed that none of the two calculated passenger cars owned by residents were located in the endangered area and all

In this paper, we address the leader election problem in sensor networks under very weak assumptions e.g., uniformity (or, homogeneity — all the sensors follow the same program

La subjectivité qui coexiste avec le passé simple est inscrite dans le contenu, ou provient d’effets de sens divers, ou bien de la qualification énonciative d’autres contenus:

We first precisely the describe this protocol (Section 5.1), then show that the correctness of the final result can publicly be verified (Section 5.2), and that anonymity/privacy of

To model all possible attacks, we allow the adver- sary to send protocol queries. This is only a theoretical formalization to reflect what information the adversary gets and

430. BOUHAFS Mohamed El Amine Chirurgie - Pédiatrique 431. BOULAHYA Abdellatif* Chirurgie Cardio – Vasculaire 432. CHEIKHAOUI Younes Chirurgie Cardio – Vasculaire

Proof: In Section IV, Algorithm 1, S uses EC- commitment scheme and generates NI-Schnorr PoK for PoC of committed data. Hence, A ˘ can not generate the parameters for PoC of