Mutex-Based De-anonymization of an Anonymous Read/Write Memory

被引:0
作者
Godard, Emmanuel [1 ]
Imbs, Damien [1 ]
Raynal, Michel [2 ,3 ]
Taubenfeld, Gadi [4 ]
机构
[1] Univ Aix Marseille, LIS, Marseille, France
[2] Univ Rennes, IRISA, Rennes, France
[3] Polytechn Univ, Hung Hom, Dept Comp, Hong Kong, Peoples R China
[4] Interdisciplinary Ctr, IL-46150 Herzliyya, Israel
来源
NETWORKED SYSTEMS, NETYS 2019 | 2019年 / 11704卷
关键词
Anonymity; Anonymous shared memory; Asynchronous system; Atomic read/write register; Concurrent algorithm; Deadlock-freedom; Local memory; Mapping function; Mutual exclusion; Simplicity; Synchronization;
D O I
10.1007/978-3-030-31277-0_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous shared memory is a memory in which processes use different names for the same shared read/write register. As an example, a shared register named A by a process p and a shared register named B by another process q can correspond to the very same register X, and similarly for the names B at p and A at q which can correspond to the same register Y not equal X. Hence, there is a permanent disagreement on the register names among the processes. This new notion of anonymity was recently introduced by G. Taubenfeld (PODC 2017), who presented several memory-anonymous algorithms and impossibility results. This paper introduces a new problem, that consists in "deanonymizing" an anonymous shared memory. To this end, it presents an algorithm that, starting with a shared memory made up of m anonymous read/write atomic registers (i.e., there is no a priori agreement on their names), allows each process to compute a local addressing mapping, such that all the processes agree on the names of each register. The proposed construction is based on an underlying deadlock-free mutex algorithm for n >= 2 processes (recently proposed in a paper co-authored by some of the authors of this paper), and consequently inherits its necessary and sufficient condition on the size m of the anonymous memory, namely m must belong to the set M(n) = {m : such that l : (sic) 1 < l <= n : gcd(l, m) = 1} \ {1}. This algorithm, which is also symmetric in the sense process identities can only be compared by equality, requires the participation of all the processes; hence it can be part of the system initialization. Last but not least, the proposed algorithm has a noteworthy first-class property, namely, its simplicity.
引用
收藏
页码:311 / 326
页数:16
相关论文
共 24 条
[1]  
Aghazadeh Z., 2019, P 38 ACM S PRINCIPLE
[2]  
Aigner M., 2010, PROOFS BOOK
[3]  
Angluin D., 1980, P 12 S THEOR COMP ST, P82, DOI DOI 10.1145/800141.804655
[4]  
[Anonymous], 2013, DISTRIBUTED ALGORITH, DOI DOI 10.1007/978-3-642-38123-2
[5]   Computing in totally anonymous asynchronous shared memory systems [J].
Attiya, H ;
Gorbach, A ;
Moran, S .
INFORMATION AND COMPUTATION, 2002, 173 (02) :162-183
[6]   Anonymous asynchronous systems: the case of failure detectors [J].
Bonnet, Francois ;
Raynal, Michel .
DISTRIBUTED COMPUTING, 2013, 26 (03) :141-158
[7]  
Bouzid Z, 2018, DISTRIB COMPUT, V31, P99, DOI 10.1007/s00446-017-0301-7
[8]  
Delporte-Gallet C, 2013, LECT NOTES COMPUT SC, V8205, P269, DOI 10.1007/978-3-642-41527-2_19
[9]   SOLUTION OF A PROBLEM IN CONCURRENT PROGRAMMING CONTROL [J].
DIJKSTRA, EW .
COMMUNICATIONS OF THE ACM, 1965, 8 (09) :569-&
[10]   SOME BEAUTIFUL ARGUMENTS USING MATHEMATICAL INDUCTION [J].
DIJKSTRA, EW .
ACTA INFORMATICA, 1980, 13 (01) :1-8