Structural properties of parallel program's Petri net model

被引:2
作者
Cui, Huanqing [1 ]
Wu, Zhehui [1 ]
机构
[1] College of Information Science and Engineering, Shandong University of Science and Technology
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2007年 / 44卷 / 12期
关键词
MPINet; Parallel program; Petri net; Structural property; Verification;
D O I
10.1360/crad20071220
中图分类号
学科分类号
摘要
High-performance computing based on parallel programming is used in many fields, and correctness is the basis of parallel programs, but parallel programs are more difficult to verify than the sequential programs because of their complexity. Thus it is necessary to model them. Petri net is often used to model the parallel program, and most research work verifies the program from the point of view of Petri net. In this paper, the message-passing parallel program is transformed into Petri net model firstly, and the structural properties of it are studied on the program's ground. It is proved that for a concurrent correct parallel program's model, its Petri net model is strongly connected and satisfies controlled siphon property, each of its process-subnets is conservative, and each of its transitions belongs to a support of T-invariant. Two examples, one is a simple point-to-point non-blocking communication and the other is a producer-consumer system, are given to show the applications of these properties in verification of the parallel program. These properties can be used in beforehand verification of the parallel program, and this method avoids state explosion caused by verification with dynamical properties. Thus it can improve the efficiency of program design and verification. This method can be generalized easily.
引用
收藏
页码:2130 / 2135
页数:5
相关论文
共 19 条
  • [1] Barkaoui K., Pradat-Peyre J.-F., Verification in concurrent programming with Petri nets structural techniques, Proc of the 3rd Inter IEEE High-Assurance System Engineering Symposium, pp. 124-133, (1998)
  • [2] Jiang C., The PN Machine Theory of Discrete Event Dynamic System, (2000)
  • [3] Murata T., Shenker B., Shatz S.M., Detection of Ada static deadlocks using Petri net invariants, IEEE Trans on Software Engineering, 15, 3, pp. 314-326, (1989)
  • [4] Notomi M., Murata T., Hierarchical reachability graph of bounded Petri nets for concurrent software, IEEE Trans on Software Engineering, 20, 5, pp. 325-336, (1994)
  • [5] Shatz S.M., Tu S., Murata T., An application of Petri net reduction for Ada tasking deadlock analysis, IEEE Trans on Parallel and Distributed Systems, 7, 12, pp. 1307-1322, (1996)
  • [6] Shatz S.M., Cheng W.K., A Petri net framework for automated static analysis of Ada tasking behavior, Journal of Systems and Software, 8, 5, pp. 343-359, (1988)
  • [7] Shatz S.M., Mai K., Black C., Design and implementation of a Petri net-based toolkit for Ada tasking analysis, IEEE Trans on Parallel and Distributed System, 1, 4, pp. 424-441, (1990)
  • [8] Siegel S.F., Avrunin G.S., Modeling MPI programs for verification, (2004)
  • [9] Zhang Z., Jiang C., Qiao R., The verification system for PVM parallel program, Chinese Journal of Computers, 22, 4, pp. 409-414, (1999)
  • [10] Jiang C., Li C., Zhang Z., A method to detect the abnormal phenomenon in PVM program based on Petri net, Journal of System Science and System Engineering, 8, 2, pp. 165-178, (1999)