Safety Interlocking as a Distributed Mutual Exclusion Problem

被引:5
作者
Fantechi, Alessandro [1 ]
Haxthausen, Anne E. [2 ]
机构
[1] Univ Florence, DINFO, Florence, Italy
[2] Tech Univ Denmark, DTU Compute, Lyngby, Denmark
来源
FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS, FMICS 2018 | 2018年 / 11119卷
关键词
VERIFICATION; MODEL; ALGORITHM;
D O I
10.1007/978-3-030-00244-2_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In several large scale systems (e.g. robotic plants or transportation systems) safety is guaranteed by granting to some process or physical object an exclusive access to a particular set of physical areas or objects before starting its own action: some mechanism should in this case interlock the action of the former with the availability of the latter. A typical example is the railway interlocking problem, in which a train is granted the authorisation to move only if the tracks in front of the train are free. Although centralised control solutions have been implemented since decades, the current quest for autonomy and the possibility of distributing computational elements without wired connection for communication or energy supply has raised the interest in distributed solutions, that have to take into account the physical topology of the controlled areas and guarantee the same level of safety. In this paper the interlocking problem is formalised as a particular class of distributed mutual exclusion problems, addressing simultaneous locking of a pool of distributed objects, focusing on the formalisation and verification of the required safety properties. A family of distributed algorithms solving this problem is envisioned, with variants related to where the data defining the pool's topology reside, and to how such data rules the communication between nodes. The different variants are exemplified with references to different distributed railway interlocking algorithms proposed in the literature. A final discussion is devoted to the steps needed to convert the proposed definitions into a generic plug-and-play safety-certified solution.
引用
收藏
页码:52 / 66
页数:15
相关论文
共 50 条
  • [41] Sustainable Distributed Scheduling Problem
    Saraeian, Shideh
    VIETNAM JOURNAL OF COMPUTER SCIENCE, 2025,
  • [42] Safety zone problem
    Nandy, SC
    Bhattacharya, BB
    Hernández-Barrera, A
    JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 2000, 37 (02): : 538 - 569
  • [43] Mutual inclusion in asynchronous message-passing distributed systems
    Kakugawa, Hirotsugu
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2015, 77 : 95 - 104
  • [44] Automatic Inference of Determinacy and Mutual Exclusion for Logic Programs Using Mode and Type Analyses
    Lopez-Garcia, Pedro
    Bueno, Francisco
    Hermenegildo, Manuel
    NEW GENERATION COMPUTING, 2010, 28 (02) : 177 - 206
  • [45] Distributed Bayesian: A Continuous Distributed Constraint Optimization Problem Solver
    Fransman, Jeroen
    Sijs, Joris
    Dol, Henry
    Theunissen, Erik
    De Schutter, Bart
    JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2023, 76 : 393 - 433
  • [46] An Effective Fruit Fly Optimization for the Distributed Assembly Flowshop Scheduling Problem
    Pan, Yi-Ran
    Chen, Qing-Da
    Pan, Quan-Ke
    2018 37TH CHINESE CONTROL CONFERENCE (CCC), 2018, : 8374 - 8378
  • [47] On an Impulsive Food Web System with Mutual Interference and Distributed Time Delay
    Wang, Zhen
    Liu, Liwei
    Su, Guangwang
    Shao, Yuanfu
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2020, 2020
  • [48] Distributed Weighted Stable Marriage Problem
    Amira, Nir
    Giladi, Ran
    Lotker, Zvi
    STRUCTURAL INFORMATION AND COMMUNICATION COMPLEXITY, PROCEEDINGS, 2010, 6058 : 29 - 40
  • [49] Optimal nodes selection in wireless sensor and actor networks based on prioritized mutual exclusion approach
    Ranga, Virender
    Dave, Mayank
    Verma, Anil K.
    KUWAIT JOURNAL OF SCIENCE, 2016, 43 (01) : 150 - 173
  • [50] Model checking and performance evaluation with CADP illustrated on shared-memory mutual exclusion protocols
    Mateescu, Radu
    Serwe, Wendelin
    SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (07) : 843 - 861