Finite-state self-stabilizing protocols in message-passing systems

被引:5
作者
Howell, RR [1 ]
Nesterenko, M
Mizuno, M
机构
[1] Kansas State Univ, Dept Comp & Informat Sci, Manhattan, KS 66506 USA
[2] Kent State Univ, Dept Math & Comp Sci, Kent, OH 44240 USA
关键词
self-stabilization; message-passing systems; computational models;
D O I
10.1006/jpdc.2001.1825
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We define a finite-state message-passing model using guarded commands. This model is particularly appropriate for defining and reasoning about self-stabilizing protocols, due to the well-known result that self-stabilizing protocols on unbounded-channel models must have infinitely many legitimate states. We argue that our model is more realistic than other models, and demonstrate its use with two simple examples. We then give a translation from this model to a lower-level model that uses a notion of time. We argue that this latter model is very close to a real network. We conclude by discussing how this translation might be used to implement self-stabilizing protocols on actual networks. (C) 2002 Elsevier Science (USA).
引用
收藏
页码:792 / 817
页数:26
相关论文
共 9 条
[1]   SELF-STABILIZATION OVER UNRELIABLE COMMUNICATION MEDIA [J].
AFEK, Y ;
BROWN, GM .
DISTRIBUTED COMPUTING, 1993, 7 (01) :27-34
[2]  
AWERBUCH B, 1991, P 32 IEEE S FDN COMP
[3]  
Bernstein P.A., 1987, Concurrency Control and Recovery in Database Systems
[4]   SELF-STABILIZING SYSTEMS IN SPITE OF DISTRIBUTED CONTROL [J].
DIJKSTRA, EW .
COMMUNICATIONS OF THE ACM, 1974, 17 (11) :643-644
[5]   Resource bounds for self-stabilizing message-driven protocols [J].
Dolev, S ;
Israeli, A ;
Moran, S .
SIAM JOURNAL ON COMPUTING, 1997, 26 (01) :273-290
[6]  
Gouda M.G, 1998, ELEMENTS NETWORK PRO
[7]   STABILIZING COMMUNICATION PROTOCOLS [J].
GOUDA, MG ;
MULTARI, NJ .
IEEE TRANSACTIONS ON COMPUTERS, 1991, 40 (04) :448-458
[8]  
GOUDA MG, 1990, ACTA INFORM, V27, P697, DOI 10.1007/BF00264283
[9]   SELF-STABILIZING EXTENSIONS FOR MESSAGE-PASSING SYSTEMS [J].
KATZ, S ;
PERRY, KJ .
DISTRIBUTED COMPUTING, 1993, 7 (01) :17-26