A Formal Model of Asynchronous Broadcast Communication

نویسندگان

  • Giorgio Delzanno
  • Riccardo Traverso
چکیده

We present a mathematical model, called Asynchronous Broadcast Networks (ABN), of distributed computation based on topology-dependent and asyn-chronous communication. Our model combines three main features: a graph representation of a network configuration decoupled from the specification of individual process behavior, a topology-dependent semantics of synchronization, the use of local mailboxes to deliver messages to individual nodes. The resulting communication layer is similar to that of languages like AWN [9]. As in other protocol models like [16,17] and AHN [5], our main abstraction comes from considering protocols defined via a communicating finite-state automaton replicated on each node of the network. Formally, we consider a finite set ¦ of messages, and different disciplines for handling the mailbox (message buffer), e.g., unordered mailboxes that we represent as bags over ¦, and ordered mailboxes that we represent as words over ¦. The initial configuration is any graph in which all the nodes are in the initial control state and all local buffers are empty. Even if the set of control states is finite, there are infinitely many possible initial configurations. We next formalize the above intuition. A mailbox structure is a tuple Å Å Ð Ð ℄, where Å is a denumerable set of elements denoting possible mailbox contents on some fixed finite alphabet ¦, and, for ¾ ¦ and Ñ ¾ Å: ´ ѵ denotes the mailbox obtained by adding to Ñ, дѵ is true if can be removed from Ñ; дѵ denotes the mailbox obtained by removing from Ñ when possible, undefined otherwise. Finally, ℄ ¾ Å denotes the empty mailbox. We call an element of Ñ Ú×××Ð when дѵ ØÖÙÙ. The semantics and corresponding properties change with the type of mailbox considered. A protocol is defined by a process È ÉÉ ¦ Ê Õ ¼ , where É is a finite set of control states, ¦ is a finite message alphabet, Ø ¾ ¦, Ê É ¢ Ø ¢ É is the transition relation, Õ ¼ ¾ É is an initial control state. The label represents the ability of performing an internal action, while [] represents the ability of broadcasting [receiving] a message ¾ ¦. Configurations are undirected É¢Å-graphs. A É¢Å-graph ­ is a tuple Î Ä, where Î is a finite set of nodes, Î ¢Î is a finite set of edges (self-loops are forbidden to model half-duplex communication), and Ä Î É ¢ Å is a labeling function. We …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Static analysis of topology-dependent broadcast networks

Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to analysing broadcast networks have focused on fixed connectivities, but this is unsuitable in the case of wireless networks where the dynamically changing network topology is a crucial ingredient. In this paper we develop a static analysis that ...

متن کامل

Topology-Dependent Abstractions of Broadcast Networks

Broadcast semantics poses significant challenges over pointto-point communication when it comes to formal modelling and analysis. Current approaches to analysing broadcast networks have focused on fixed connectivities, but this is unsuitable in the case of wireless networks where the dynamically changing network topology is a crucial ingredient. In this paper we develop a static analysis that a...

متن کامل

Secure and Efficient Asynchronous Broadcast Protocols

Reliable broadcast protocols are a fundamental building block for implementing replication in fault-tolerant distributed systems. This paper addresses secure service replication in an asynchronous environment with a static set of servers, where a malicious adversary may corrupt up to a threshold of servers and controls the network. We develop a formal model using concepts from modern cryptograp...

متن کامل

Specification of Dependable Trusted Third Parties

This document describes an architecture for secure service replication in an asynchronous network like the Internet, where a malicious adversary may corrupt some servers and control the network. The underlying protocols for Byzantine agreement and for atomic broadcast rely on recent developments in threshold cryptography. These assumptions are discussed in detail and compared to related work fr...

متن کامل

Network Membership: How to solve R-Broadcast efficiently ?

We give a formal specification of a new model called Network Membership for reliable mobile communication in asynchronous distributed systems. Our approach is new in the sense that the Network membership service does not have any join or leave procedures. We let the system flow, views are not forced and are installed with stability. The model is less restricitve than others since no consensus i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012