151 research outputs found
Strong Equivalence Relations for Iterated Models
The Iterated Immediate Snapshot model (IIS), due to its elegant geometrical
representation, has become standard for applying topological reasoning to
distributed computing. Its modular structure makes it easier to analyze than
the more realistic (non-iterated) read-write Atomic-Snapshot memory model (AS).
It is known that AS and IIS are equivalent with respect to \emph{wait-free
task} computability: a distributed task is solvable in AS if and only if it
solvable in IIS. We observe, however, that this equivalence is not sufficient
in order to explore solvability of tasks in \emph{sub-models} of AS (i.e.
proper subsets of its runs) or computability of \emph{long-lived} objects, and
a stronger equivalence relation is needed. In this paper, we consider
\emph{adversarial} sub-models of AS and IIS specified by the sets of processes
that can be \emph{correct} in a model run. We show that AS and IIS are
equivalent in a strong way: a (possibly long-lived) object is implementable in
AS under a given adversary if and only if it is implementable in IIS under the
same adversary. %This holds whether the object is one-shot or long-lived.
Therefore, the computability of any object in shared memory under an
adversarial AS scheduler can be equivalently investigated in IIS
Power and limits of distributed computing shared memory models
Due to the advent of multicore machines, shared memory distributed computing models taking into account asynchrony and process crashes are becoming more and more important. This paper visits some of the models for these systems, and analyses their properties from a computability point of view. Among them, the snapshot model and the iterated model are particularly investigated. The paper visits also several approaches that have been proposed to model crash failures. Among them, the wait-free case where any number of processes can crash is fundamental. The paper also considers models where up to t processes can crash, and where the crashes are not independent. The aim of this survey is to help the reader to better understand recent advances on what is known about the power and limits of distributed computing shared memory models and their underlying mathematics.Ce rapport est une introduction au modèles de calcul asynchrone pour les systèmes à mémoire partagée
A generalized asynchronous computability theorem
We consider the models of distributed computation defined as subsets of the
runs of the iterated immediate snapshot model. Given a task and a model
, we provide topological conditions for to be solvable in . When
applied to the wait-free model, our conditions result in the celebrated
Asynchronous Computability Theorem (ACT) of Herlihy and Shavit. To demonstrate
the utility of our characterization, we consider a task that has been shown
earlier to admit only a very complex -resilient solution. In contrast, our
generalized computability theorem confirms its -resilient solvability in a
straightforward manner.Comment: 16 pages, 5 figure
An Introduction to the Topological Theory of Distributed Computing with Safe-consensus
AbstractThe theory of distributed computing shares a deep and fascinating connection with combinatorial and algebraic topology. One of the key ideas that facilitates the development of the topological theory of distributed computing is the use of iterated shared memory models. In such a model processes communicate through a sequence of shared objects. Processes access the sequence of objects, one-by-one, in the same order and asynchronously. Each process accesses each shared object only once. In the most basic form of an iterated model, any number of processes can crash, and the shared objects are snapshot objects. A process can write a value to such an object, and gets back a snapshot of its contents.The purpose of this paper is to give an introduction to this research area, using an iterated model based on the safe-consensus task (Afek, Gafni and Lieber, DISCʼ09). In a safe-consensus task, the validity condition of consensus is weakened as follows. If the first process to invoke an object solving a safe-consensus task returns before any other process invokes it, then the process gets back its own input; otherwise the value returned by the task can be arbitrary. As with consensus, the agreement requirement is that always the same value is returned to all processes.A safe-consensus-based iterated model is described in detail. It is explained how its runs can be described with simplicial complexes. The usefulness of the iterated memory model for the topological theory of distributed computing is exhibited by presenting some new results (with very clean and well structured proofs) about the solvability of the (n,k)-set agreement task. Throughout the paper, the main ideas are explained with figures and intuitive examples
k-Set Agreement in Communication Networks with Omission Faults
We consider an arbitrary communication network G where at most f messages can be lost at each round, and consider the classical k-set agreement problem in this setting. We characterize exactly for which f the k-set agreement problem can be solved on G.
The case with k = 1, that is the Consensus problem, has first been introduced by Santoro and Widmayer in 1989, the characterization is already known from [Coulouma/Godard/Peters, TCS, 2015]. As a first contribution, we present a detailed and complete characterization for the 2-set problem. The proof of the impossibility result uses topological methods. We introduce a new subdivision approach for these topological methods that is of independent interest.
In the second part, we show how to extend to the general case with k in N. This characterization is the first complete characterization for this kind of synchronous message passing model, a model that is a subclass of the family of oblivious message adversaries
Extension-Based Proofs for Synchronous Message Passing
There is no wait-free algorithm that solves k-set agreement among n ? k+1 processes in asynchronous systems where processes communicate using only registers. However, proofs of this result for k ? 2 are complicated and involve topological reasoning. To explain why such sophisticated arguments are necessary, Alistarh, Aspnes, Ellen, Gelashvili, and Zhu recently introduced extension-based proofs, which generalize valency arguments, and proved that there are no extension-based proofs of this result.
In the synchronous message passing model, k-set agreement is solvable, but there is a lower bound of t rounds for any k-set agreement algorithm among n > kt processes when at most k processes can crash each round. The proof of this result for k ? 2 is also a complicated topological argument. We define a notion of extension-based proofs for this model and we show there are no extension-based proofs that t rounds are necessary for any k-set agreement algorithm among n = kt+1 processes, for k ? 2 and t > 2, when at most k processes can crash each round. In particular, our result shows that no valency argument can prove this lower bound
Termination Detection of Local Computations
Contrary to the sequential world, the processes involved in a distributed
system do not necessarily know when a computation is globally finished. This
paper investigates the problem of the detection of the termination of local
computations. We define four types of termination detection: no detection,
detection of the local termination, detection by a distributed observer,
detection of the global termination. We give a complete characterisation
(except in the local termination detection case where a partial one is given)
for each of this termination detection and show that they define a strict
hierarchy. These results emphasise the difference between computability of a
distributed task and termination detection. Furthermore, these
characterisations encompass all standard criteria that are usually formulated :
topological restriction (tree, rings, or triangu- lated networks ...),
topological knowledge (size, diameter ...), and local knowledge to distinguish
nodes (identities, sense of direction). These results are now presented as
corollaries of generalising theorems. As a very special and important case, the
techniques are also applied to the election problem. Though given in the model
of local computations, these results can give qualitative insight for similar
results in other standard models. The necessary conditions involve graphs
covering and quasi-covering; the sufficient conditions (constructive local
computations) are based upon an enumeration algorithm of Mazurkiewicz and a
stable properties detection algorithm of Szymanski, Shi and Prywes
Notes on Theory of Distributed Systems
Notes for the Yale course CPSC 465/565 Theory of Distributed Systems
Consensus in the Unknown-Participation Message-Adversary Model
We propose a new distributed-computing model, inspired by permissionless
distributed systems such as Bitcoin and Ethereum, that allows studying
permissionless consensus in a mathematically regular setting. Like in the
sleepy model of Pass and Shi, we consider a synchronous, round-by-round
message-passing system in which the set of online processors changes each
round. Unlike the sleepy model, the set of processors may be infinite.
Moreover, processors never fail; instead, an adversary can temporarily or
permanently impersonate some processors. Finally, processors have access to a
strong form of message-authentication that authenticates not only the sender of
a message but also the round in which the message was sent.
Assuming that, each round, the adversary impersonates less than 1/2 of the
online processors, we present two consensus algorithms. The first ensures
deterministic safety and constant latency in expectation, assuming a
probabilistic leader-election oracle. The second ensures deterministic safety
and deterministic liveness assuming irrevocable impersonation and
eventually-stabilizing participation.
The model is unrealistic in full generality. However, if we assume finitely
many processes and that the set of faulty processes remains constant, the model
coincides with a practically-motivated model: the static version of the sleepy
model
- …