首页 > 最新文献

[1989] Proceedings. The 9th International Conference on Distributed Computing Systems最新文献

英文 中文
Verifying finite state real-time discrete event processes 验证有限状态实时离散事件过程
J. Ostroff
Decision procedures are presented for checking a small but useful class of properties for any finite-state system consisting of real-time discrete-event processes. A timed transition model (TTM) is used for representing real-time discrete-event processes, and real-time temporal logic (RTTL) is the assertion language in which the property to be verified is stated. The relationship of TTMs to other formalisms is summarized along with a complete definition of TTMs and an overview of RTTL. The construction of reachability graphs is discussed, two different procedures are presented for constructing reachability graphs, and the corresponding decision procedures are given.<>
对于由实时离散事件过程组成的有限状态系统,给出了一个小而有用的性质检验决策过程。时序转换模型(TTM)用于表示实时离散事件过程,实时时序逻辑(RTTL)是声明要验证的属性的断言语言。总结了ttm与其他形式化的关系,以及ttm的完整定义和RTTL的概述。讨论了可达图的构造,给出了两种不同的可达图构造过程,并给出了相应的决策过程。
{"title":"Verifying finite state real-time discrete event processes","authors":"J. Ostroff","doi":"10.1109/ICDCS.1989.37949","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37949","url":null,"abstract":"Decision procedures are presented for checking a small but useful class of properties for any finite-state system consisting of real-time discrete-event processes. A timed transition model (TTM) is used for representing real-time discrete-event processes, and real-time temporal logic (RTTL) is the assertion language in which the property to be verified is stated. The relationship of TTMs to other formalisms is summarized along with a complete definition of TTMs and an overview of RTTL. The construction of reachability graphs is discussed, two different procedures are presented for constructing reachability graphs, and the corresponding decision procedures are given.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120976561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A toolkit for automated support of Ada tasking analysis 用于自动支持Ada任务分析的工具包
S. Shatz, Khanh Mai, D. Moorthi, J. Woodward
A discussion is presented of research on the development of a toolkit that supports general static analysis using a Petri net framework for Ada tasking. The toolkit integrates some custom and general-purpose tools. The custom tools were defined and implemented specifically for research in Ada tasking analysis; the general-purpose tools are Petri net tools developed to support arbitrary Petri-net-based research. The analysis toolkit is divided into two major subsystems. The first is the front-end translator subsystem, which translates Ada source (or design-level source specified in a design language called Ada Tasking Language) into a Petri net format. The translation allows one to base current and future analysis techniques on a model that is both theoretically mature and actively investigated. The second is the back-end information display subsystem, which receives user queries and presents tasking analysis results. Example Ada tasking programs are used to demonstrate the utility of the tools individually as well as collectively.<>
讨论了一个支持使用Petri网框架进行Ada任务的一般静态分析的工具包的开发研究。该工具包集成了一些定制的和通用的工具。这些定制工具是专门为研究人工智能任务分析而定义和实现的;通用工具是Petri网工具,用于支持任意基于Petri网的研究。分析工具包分为两个主要子系统。第一个是前端翻译子系统,它将Ada源(或用称为Ada任务处理语言的设计语言指定的设计级源)翻译成Petri网格式。翻译允许人们将当前和未来的分析技术建立在理论上成熟且正在积极研究的模型上。二是后台信息显示子系统,接收用户查询并呈现任务分析结果。示例Ada任务处理程序用于单独以及集体地演示这些工具的实用性。
{"title":"A toolkit for automated support of Ada tasking analysis","authors":"S. Shatz, Khanh Mai, D. Moorthi, J. Woodward","doi":"10.1109/ICDCS.1989.37993","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37993","url":null,"abstract":"A discussion is presented of research on the development of a toolkit that supports general static analysis using a Petri net framework for Ada tasking. The toolkit integrates some custom and general-purpose tools. The custom tools were defined and implemented specifically for research in Ada tasking analysis; the general-purpose tools are Petri net tools developed to support arbitrary Petri-net-based research. The analysis toolkit is divided into two major subsystems. The first is the front-end translator subsystem, which translates Ada source (or design-level source specified in a design language called Ada Tasking Language) into a Petri net format. The translation allows one to base current and future analysis techniques on a model that is both theoretically mature and actively investigated. The second is the back-end information display subsystem, which receives user queries and presents tasking analysis results. Example Ada tasking programs are used to demonstrate the utility of the tools individually as well as collectively.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123274584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Fault-tolerant distributed systems based on broadcast communication 基于广播通信的容错分布式系统
P. Melliar-Smith, L. Moser
Distributed systems present problems of maintaining consistency of distributed data in the presence of faults. These problems are currently solved by agreement protocols that require many messages to be exchanged between processors with adverse effects on system performance. An approach is presented to the design of fault-tolerant distributed systems that avoids this message exchange, resulting in systems that are substantially more efficient. This approach is based on broadcast communication over a local area network such as the Ethernet, and on two novel protocols: the Trans protocol which provides efficient reliable broadcast communication, and the Total protocol which, with high probability, promptly takes a total order on messages and achieves distributed agreement even in the presence of a fault. Reliable distributed operations, such as locking, update, and commitment, require only a single broadcast message rather than the several tens of messages required by current algorithms.<>
分布式系统在存在故障的情况下,存在保持分布式数据一致性的问题。这些问题目前由协议协议解决,协议协议要求在处理器之间交换许多消息,这对系统性能有不利影响。本文提出了一种设计容错分布式系统的方法,该方法避免了这种消息交换,从而大大提高了系统的效率。该方法基于局域网(如以太网)上的广播通信,并基于两种新颖的协议:提供高效可靠的广播通信的Trans协议和即使在存在故障的情况下也能快速对消息进行总排序并实现分布式协议的Total协议。可靠的分布式操作,如锁定、更新和提交,只需要一个广播消息,而不是当前算法需要的几十个消息。
{"title":"Fault-tolerant distributed systems based on broadcast communication","authors":"P. Melliar-Smith, L. Moser","doi":"10.1109/ICDCS.1989.37940","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37940","url":null,"abstract":"Distributed systems present problems of maintaining consistency of distributed data in the presence of faults. These problems are currently solved by agreement protocols that require many messages to be exchanged between processors with adverse effects on system performance. An approach is presented to the design of fault-tolerant distributed systems that avoids this message exchange, resulting in systems that are substantially more efficient. This approach is based on broadcast communication over a local area network such as the Ethernet, and on two novel protocols: the Trans protocol which provides efficient reliable broadcast communication, and the Total protocol which, with high probability, promptly takes a total order on messages and achieves distributed agreement even in the presence of a fault. Reliable distributed operations, such as locking, update, and commitment, require only a single broadcast message rather than the several tens of messages required by current algorithms.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
HPC/VORX: a local area multicomputer system HPC/VORX:一个本地多计算机系统
R. Gaglianello, B. Robinson, T. Lindstrom, E. E. Sampieri
A system is described that combines the major strengths of local area networks and multicomputers, namely resource sharing over geographically significant distances and small communication latencies. The result is a new architecture called a local area multicomputer (LAM). The system that is described attempts to solve the seemingly incompatible needs of the two application domains by utilizing a high-capacity, low-latency interconnection network called the HPC supported by the VORX multiprocessor computing environment. For systems with hundreds of nodes, the network capacity is in the Gb/s range, and the latency for small messages is about 10 mu s. The HPC can connect resources located several kilometers apart. The VORX environment provides the necessary program development tools and resource management functions needed to experiment with distributed applications. Two applications are outlined to show the diverse uses for a LAM system and the status of an 80-node system that includes 70 adjunct processors and ten SUN 3 workstations/fileservers.<>
本文描述了一种结合了局域网和多计算机的主要优势的系统,即在地理上显著距离上的资源共享和较小的通信延迟。其结果是一种称为本地多计算机(LAM)的新体系结构。所描述的系统试图通过利用VORX多处理器计算环境支持的称为HPC的高容量、低延迟互连网络来解决这两个应用领域看似不兼容的需求。对于数百个节点的系统,网络容量在Gb/s范围内,小消息的延迟在10 μ s左右。HPC可以连接相隔几公里的资源。VORX环境提供了实验分布式应用程序所需的必要程序开发工具和资源管理功能。本文概述了两个应用程序,以显示LAM系统和80节点系统(包括70个辅助处理器和10个SUN 3工作站/文件服务器)的不同用途。
{"title":"HPC/VORX: a local area multicomputer system","authors":"R. Gaglianello, B. Robinson, T. Lindstrom, E. E. Sampieri","doi":"10.1109/ICDCS.1989.37987","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37987","url":null,"abstract":"A system is described that combines the major strengths of local area networks and multicomputers, namely resource sharing over geographically significant distances and small communication latencies. The result is a new architecture called a local area multicomputer (LAM). The system that is described attempts to solve the seemingly incompatible needs of the two application domains by utilizing a high-capacity, low-latency interconnection network called the HPC supported by the VORX multiprocessor computing environment. For systems with hundreds of nodes, the network capacity is in the Gb/s range, and the latency for small messages is about 10 mu s. The HPC can connect resources located several kilometers apart. The VORX environment provides the necessary program development tools and resource management functions needed to experiment with distributed applications. Two applications are outlined to show the diverse uses for a LAM system and the status of an 80-node system that includes 70 adjunct processors and ten SUN 3 workstations/fileservers.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129869130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Securely replicating authentication services 安全复制身份验证服务
L. Gong
A framework for designing a type of distributed authentication protocol is given, whose security and availability are higher compared to those of centralized ones. It uses the technique of secret sharing and introduces a cross checksum scheme to achieve secure replication. Fewer than a certain number of malicious servers cannot damage security except by causing denial of service, and this only happens when too many honest servers accidentally fail at the same time. The protocol is suited to an environment where no trustworthiness of any server is permanently guaranteed. The approach is general enough not to rely on any particular authentication protocol. Existing implementations need minor modification. Only a short piece of code is needed to run the implementations as many times as required. Hence, different centralized protocols can be incorporated into one distributed protocol.<>
给出了一种分布式认证协议的设计框架,与集中式认证协议相比,分布式认证协议的安全性和可用性更高。它采用秘密共享技术,并引入交叉校验和方案来实现安全复制。少于一定数量的恶意服务器不会破坏安全性,除非导致拒绝服务,并且只有当太多诚实服务器同时意外故障时才会发生这种情况。该协议适用于无法永久保证任何服务器的可信性的环境。这种方法非常通用,不依赖于任何特定的身份验证协议。现有的实现需要稍作修改。只需要一小段代码就可以根据需要多次运行实现。因此,可以将不同的集中式协议合并为一个分布式协议
{"title":"Securely replicating authentication services","authors":"L. Gong","doi":"10.1109/ICDCS.1989.37934","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37934","url":null,"abstract":"A framework for designing a type of distributed authentication protocol is given, whose security and availability are higher compared to those of centralized ones. It uses the technique of secret sharing and introduces a cross checksum scheme to achieve secure replication. Fewer than a certain number of malicious servers cannot damage security except by causing denial of service, and this only happens when too many honest servers accidentally fail at the same time. The protocol is suited to an environment where no trustworthiness of any server is permanently guaranteed. The approach is general enough not to rely on any particular authentication protocol. Existing implementations need minor modification. Only a short piece of code is needed to run the implementations as many times as required. Hence, different centralized protocols can be incorporated into one distributed protocol.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Distributed diagnosis of Byzantine processors and links 拜占庭处理器和链路的分布式诊断
Joel C. Adams, K. Ramarao
The problem of correctly identifying the faulty processors and links in a distributed system where faulty behavior is unrestricted (Byzantine) is examined. A very general class of algorithms called evidence-based diagnosis algorithms is proposed that encompasses all past approaches to the diagnosis problem. An algorithm is presented which is proven optimal in this class. It is further shown that, in the worst case, no evidence-based diagnosis algorithm can guarantee that its diagnosis is both correct and complete, when evidence can be false. It is argued both analytically and from experimental data that in systems of N processors of which t can be faulty, the complexity of this algorithm is O(max(2 to the power of t/sup 2/, N/sup 2/)).<>
在错误行为不受限制(拜占庭)的分布式系统中,正确识别错误处理器和链接的问题被检查。提出了一种非常通用的算法,称为基于证据的诊断算法,它包含了所有过去的诊断问题的方法。提出了一种被证明是最优的算法。进一步表明,在最坏的情况下,当证据可能是错误的情况下,任何循证诊断算法都不能保证其诊断是正确和完整的。通过分析和实验数据表明,在N个处理器的系统中,其中t可以出错,该算法的复杂度为O(max(2 ^ t/sup 2/, N/sup 2/))。
{"title":"Distributed diagnosis of Byzantine processors and links","authors":"Joel C. Adams, K. Ramarao","doi":"10.1109/ICDCS.1989.37989","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37989","url":null,"abstract":"The problem of correctly identifying the faulty processors and links in a distributed system where faulty behavior is unrestricted (Byzantine) is examined. A very general class of algorithms called evidence-based diagnosis algorithms is proposed that encompasses all past approaches to the diagnosis problem. An algorithm is presented which is proven optimal in this class. It is further shown that, in the worst case, no evidence-based diagnosis algorithm can guarantee that its diagnosis is both correct and complete, when evidence can be false. It is argued both analytically and from experimental data that in systems of N processors of which t can be faulty, the complexity of this algorithm is O(max(2 to the power of t/sup 2/, N/sup 2/)).<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134415370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A time-out based resilient token transfer algorithm for mutual exclusion in computer networks 计算机网络中基于超时的互斥弹性令牌传输算法
S. Nishio, K. F. Li, E. Manning
Two algorithms, control token transfer algorithm (CTTA) and regenerate, are proposed to realize mutual exclusion in a computer network environment using a resilient circulating token. The algorithm CTTA uses a message called token to transfer the privilege of entering a critical region among the participating sites. The algorithm regenerate checks whether the token is lost during system failures, and regenerates it if necessary. Failures in a computer network are classified into three types. The execution of these two algorithms is described for each type of system failure. To detect system failures, a time-out mechanism based on message delay is used.<>
为了在计算机网络环境中利用弹性循环令牌实现互斥,提出了控制令牌传输算法(CTTA)和再生算法。CTTA算法使用令牌消息在参与站点之间传递进入关键区域的权限。算法regenerate检查令牌是否在系统故障期间丢失,并在必要时重新生成它。计算机网络中的故障分为三种类型。针对每种类型的系统故障,描述了这两种算法的执行。为了检测系统故障,使用了基于消息延迟的超时机制。
{"title":"A time-out based resilient token transfer algorithm for mutual exclusion in computer networks","authors":"S. Nishio, K. F. Li, E. Manning","doi":"10.1109/ICDCS.1989.37969","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37969","url":null,"abstract":"Two algorithms, control token transfer algorithm (CTTA) and regenerate, are proposed to realize mutual exclusion in a computer network environment using a resilient circulating token. The algorithm CTTA uses a message called token to transfer the privilege of entering a critical region among the participating sites. The algorithm regenerate checks whether the token is lost during system failures, and regenerates it if necessary. Failures in a computer network are classified into three types. The execution of these two algorithms is described for each type of system failure. To detect system failures, a time-out mechanism based on message delay is used.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132891449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An environment for prototyping distributed applications 用于构建分布式应用程序原型的环境
James M. Purtilo, P. Jalote
An environment for prototyping distributed applications is described that supports different communication primitives with specified delays, and provides primitives to aid debugging and evaluation. The environment also supports heterogeneous computation in which processes can execute on different hardware. Different source languages can be used for coding different modules of the processes. The system has a centralized control and monitoring facility which is based on the Suntools window system. This approach allows users to develop distributed applications using existing languages and packages, as opposed to restricting users to using only specialized specification languages, and extends the type of work done by R. Hayes et al. (1988) by providing primitives to assist in profiling and instrumenting the applications.<>
描述了一个用于对分布式应用程序进行原型设计的环境,该环境支持具有指定延迟的不同通信原语,并提供了帮助调试和评估的原语。该环境还支持异构计算,其中进程可以在不同的硬件上执行。可以使用不同的源语言对进程的不同模块进行编码。该系统具有基于Suntools窗口系统的集中控制和监控设施。这种方法允许用户使用现有的语言和包来开发分布式应用程序,而不是限制用户只使用专门的规范语言,并且通过提供原语来帮助分析和检测应用程序,扩展了R. Hayes等人(1988)所做的工作类型。
{"title":"An environment for prototyping distributed applications","authors":"James M. Purtilo, P. Jalote","doi":"10.1109/ICDCS.1989.37992","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37992","url":null,"abstract":"An environment for prototyping distributed applications is described that supports different communication primitives with specified delays, and provides primitives to aid debugging and evaluation. The environment also supports heterogeneous computation in which processes can execute on different hardware. Different source languages can be used for coding different modules of the processes. The system has a centralized control and monitoring facility which is based on the Suntools window system. This approach allows users to develop distributed applications using existing languages and packages, as opposed to restricting users to using only specialized specification languages, and extends the type of work done by R. Hayes et al. (1988) by providing primitives to assist in profiling and instrumenting the applications.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Fast Ring: a distributed architecture and protocol for local area distributed processing 快速环:用于本地分布式处理的分布式体系结构和协议
S. Koppolu, S. Thanawastien, R. Henry
A ring-based media access control protocol and architecture, Fast Ring, which combines the best features of the token ring and contention ring, is proposed. For this protocol, a free token circulates on the ring when the ring is idle. A ready station can transmit either by capturing the token or sensing the ring idle. The protocol works in such a way that the ready node which captures the free token, before or while transmitting, is able to continue transmission. All the other contending nodes have to stop their transmissions and then send the abort signal when they receive the upstream transmission. After its transmission, the successful station puts a free token on the ring and the protocol enters the token mode. It behaves like the token ring protocol until the ring becomes idle again when all the ready nodes complete their transmissions. Comparison of the performance of Fast Ring with those of contention ring, token ring, and carrier-sense multiaccess with collision detection protocols shows that the Fast Ring outperforms all these local area network protocols over the whole throughput range at all transmission rates.<>
结合令牌环和争用环的优点,提出了一种基于环的媒体访问控制协议和体系结构——快速环。对于该协议,当环空闲时,一个自由令牌在环上循环。就绪站可以通过捕获令牌或感知环空闲来传输。该协议以这样一种方式工作,即在传输之前或同时捕获免费令牌的就绪节点能够继续传输。所有其他竞争节点必须停止它们的传输,然后在接收到上游传输时发送中止信号。传输成功后,在环上放置一个免费令牌,协议进入令牌模式。它的行为类似于令牌环协议,直到所有就绪节点完成其传输后,环再次空闲。将Fast Ring与竞争环、令牌环和带冲突检测协议的载波感知多址的性能进行比较,结果表明Fast Ring在所有传输速率下的整个吞吐量范围内都优于所有这些局域网协议。
{"title":"Fast Ring: a distributed architecture and protocol for local area distributed processing","authors":"S. Koppolu, S. Thanawastien, R. Henry","doi":"10.1109/ICDCS.1989.37986","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37986","url":null,"abstract":"A ring-based media access control protocol and architecture, Fast Ring, which combines the best features of the token ring and contention ring, is proposed. For this protocol, a free token circulates on the ring when the ring is idle. A ready station can transmit either by capturing the token or sensing the ring idle. The protocol works in such a way that the ready node which captures the free token, before or while transmitting, is able to continue transmission. All the other contending nodes have to stop their transmissions and then send the abort signal when they receive the upstream transmission. After its transmission, the successful station puts a free token on the ring and the protocol enters the token mode. It behaves like the token ring protocol until the ring becomes idle again when all the ready nodes complete their transmissions. Comparison of the performance of Fast Ring with those of contention ring, token ring, and carrier-sense multiaccess with collision detection protocols shows that the Fast Ring outperforms all these local area network protocols over the whole throughput range at all transmission rates.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An approach to verification of communication in distributed computing system software 分布式计算系统软件通信验证方法
S. Yau, Kris W. I. Chen
An approach is presented for verifying the communication among modules in distributed computing system software. This approach is based on the inductive assertion method. The inference rules used in this approach are derived for verifying the partial correctness of communicating sequential modules. In this approach, the virtual circuits are used for synchronous message-passing. The advantage of this approach is that proofs of the satisfaction and noninterference are not needed, since no assumptions about the effects of receiving messages are made in the sequential proofs and the uses of shared auxiliary variables and universal assertions are carefully controlled during the process verification. Without these proofs, the user only needs to deal with the individual modules instead of the entire distributed computing system. The technique for detecting the deadlock of a program is given.<>
提出了一种验证分布式计算系统软件中模块间通信的方法。该方法基于归纳断言方法。推导了用于验证通信顺序模块部分正确性的推理规则。在这种方法中,虚拟电路用于同步消息传递。这种方法的优点是不需要证明满足性和不干扰性,因为在顺序证明中不需要对接收消息的效果进行假设,并且在过程验证期间仔细控制共享辅助变量和通用断言的使用。如果没有这些证明,用户只需要处理单个模块,而不是整个分布式计算系统。给出了一种检测程序死锁的技术
{"title":"An approach to verification of communication in distributed computing system software","authors":"S. Yau, Kris W. I. Chen","doi":"10.1109/ICDCS.1989.37994","DOIUrl":"https://doi.org/10.1109/ICDCS.1989.37994","url":null,"abstract":"An approach is presented for verifying the communication among modules in distributed computing system software. This approach is based on the inductive assertion method. The inference rules used in this approach are derived for verifying the partial correctness of communicating sequential modules. In this approach, the virtual circuits are used for synchronous message-passing. The advantage of this approach is that proofs of the satisfaction and noninterference are not needed, since no assumptions about the effects of receiving messages are made in the sequential proofs and the uses of shared auxiliary variables and universal assertions are carefully controlled during the process verification. Without these proofs, the user only needs to deal with the individual modules instead of the entire distributed computing system. The technique for detecting the deadlock of a program is given.<<ETX>>","PeriodicalId":266544,"journal":{"name":"[1989] Proceedings. The 9th International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1989-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
[1989] Proceedings. The 9th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1