Skip to content

Commit fe2f845

Browse files
author
admin
committed
orals board's edits, formatting changes
1 parent 90bb0da commit fe2f845

15 files changed

+183
-176
lines changed

Chapters/abstract.tex

+10-2
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,10 @@
1-
\chapter*{Abstract}
2-
The development of process algebras is of considerable interest in the study of distributed and mobile computation. After considering the nature of distributed and mobile systems, we will look at two variants of the \picalc, a modern process algebra given by Milner, that can be used to model such systems. We will then compare the expressive power of these calculi and explore the extent to which they can simulate one another. Particular attention will be paid to the specific constructs wherein the calculi differ and whether and how these constructs represent behaviors found in real distributed and mobile systems.
1+
\cleardoublepage
2+
{
3+
\thispagestyle{empty}
4+
\begin{center}
5+
\null\vfil
6+
\centering {\LARGE\textbf{Abstract}}\\[24pt]
7+
The development of process algebras is of considerable interest in the study of distributed and mobile computation. After considering the nature of distributed and mobile systems, we will look at two variants of the \picalc, a modern process algebra given by Milner, that can be used to model such systems. We will then compare the expressive power of these calculi and explore the extent to which they can simulate one another. Particular attention will be paid to the specific constructs wherein the calculi differ and whether and how these constructs represent behaviors found in real distributed and mobile systems. \end{center}
8+
\vspace{10cm}
9+
\cleardoublepage
10+
}

Chapters/chap1_introduction.tex

+31-34
Large diffs are not rendered by default.

Chapters/chap2.tex

+52-53
Large diffs are not rendered by default.

Chapters/chap3.tex

+25-27
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,11 @@ \chapter{The Synchronous \Picalc}\label{sync_and_express}
44
Rather than allowing an operation to happen after a sent value has been received by some other process, a sending process simply ends.
55
In \refex{exsynchronous} we gave a straightforward method of simulating synchronous sending in the asynchronous \picalc\ using acknowledgement channels.
66
Also absent in our calculus was the non-deterministic choice operator, also known as the summation operator.
7-
We gave a method of simulating this in \refex{exsummation}.
87

9-
We have already had a taste of the expressive power of the synchronous \picalc\ in Chapter \ref{Introduction}'s mobile phone network example. In fact, the original calculus given by Milner, Parrow and Walker was synchronous and included the two operators -- summation and synchronous sending -- that we omitted in our asynchronous \picalc.
8+
We have already had a taste of the expressive power of the synchronous \picalc\ in Chapter \ref{Introduction}'s mobile phone network example. In fact, the original calculus given by Milner, Parrow and Walker was synchronous and included the two operators --- summation and synchronous sending --- that we omitted in our asynchronous \picalc.
109

11-
Our original calculus featured synchronous receiving, but we now make sending synchronous as well, allowing a process to execute after the output has been consumed by some other receiver.
12-
Hence, in the synchronous \picalc, processes can be \refmargin{guarded}guarded by both receiving \emph{and} sending.
10+
Our original calculus featured synchronous receiving, but we now allow synchronous sending as well, enabling a process to continue after its output has been consumed by some receiver.
11+
Hence, in the synchronous \picalc, processes can be\refmargin{guarded}guarded by both receiving \emph{and} sending.
1312

1413

1514
If we have a group of guarded processes joined by the summation operator, only one of those processes will be `chosen' (non-deterministically)\index{non-determinism} to be executed.
@@ -99,7 +98,7 @@ \section{Syntax and Equivalence}\label{Synchronous picalc}
9998
P \comp \pstop\ &\ \sequiv\ P && \text{\tiny{(S-COMP-ID)}}\\
10099
\new{c} \pstop\ &\ \sequiv\ \pstop && \text{\tiny{(S-REST-ID)}}\\
101100
\new{c}\new{d} P \ &\ \sequiv\ \new{d}\new{c} P && \text{\tiny{(S-REST-COMM)}}\\
102-
\new{c}(P \comp Q)\ &\ \sequiv\ P \comp \new{c}Q\text{, if } c\not\in fi(P) && \text{\tiny{(S-REST-COMP)}}
101+
\new{c}(P \comp Q)\ &\ \sequiv\ P \comp \new{c}Q\text{, if } c\not\in \mbox{\emph{fi}}(P) && \text{\tiny{(S-REST-COMP)}}
103102
\end{align*}
104103
\caption{\emph{Structural equivalence axioms in the synchronous \picalc}}\label{spicalcaxioms}
105104
\end{center}\end{insettable_wide}\index{structural equivalence}
@@ -109,7 +108,7 @@ \section{Semantics}
109108
As we might expect, it does not differ hugely from computation in the asynchronous calculus.
110109
In the reduction rules, the only changes are to make room for the summation operator.
111110
Because only one process gets chosen from a group of summed processes, we need two `matching' sender and receiver terms each running in parallel. This behavior is described by (R-SYNC).
112-
It expresses the commutation step where the processes have transmitted their value. Hence, we perform the appropriate substitution to the receiving process, run the guarded processes and terminate all the other terms in the sum.
111+
It expresses the communication step where the processes have transmitted their value. Hence, we perform the appropriate substitution to the receiving process, run the guarded processes and terminate all the other terms in the sum.
113112
\begin{insettable}
114113
\begin{center}\begin{tabular}{rll}
115114
$\ssend{c}{\tuple{V}} P + Q \comp \receive{c}{\tuple{X}}R + B$\ &\ $\pred\ P \comp R\subst{\tuple{V}}{\tuple{X}}$ & \tiny{(R-SYNC)}\\
@@ -147,25 +146,9 @@ \section{Semantics}
147146
\[
148147
\send{c}{\tuple{V}} \comp \receive{c}{\tuple{X}}R \pred\ R \subst{\tuple{V}}{\tuple{X}}
149148
\]
150-
It should be evident from our presentation of synchronous action rules below that they needn't be shown to be a general version of the asynchronous rules -- they are compatible simply by ignoring the extra rule and by using our encoding of asynchronous sending as $\ssend{n}{\tuple{V}}\pstop$.
149+
It should be evident from our presentation of synchronous action rules below that they needn't be shown to be a general version of the asynchronous rules --- they are compatible simply by ignoring the extra rule and by using our encoding of asynchronous sending as $\ssend{n}{\tuple{V}}\pstop$.
151150
\end{example}
152151

153-
Neither do the action rules for the synchronous \picalc\ differ significantly from \hyperref[apiactionrules]{those} in the asynchronous version.
154-
As we would expect, (A-OUT) has been modified to express synchronous sending.
155-
It now evolves over output to a process $R$ and not simply to the termination process $\pstop$:
156-
\[
157-
\ssend{c}{\tuple{V}}R \evolves{\sends{c}{\tuple{V}}} R
158-
\]
159-
160-
We have also added a new rule, (A-SUM). It describes the action of the summation operator much as (A-COMP) describes the action of the composition operator.
161-
\begin{center}
162-
$\underline{P_i \evolves{\pi_i} P_i'}$\\
163-
$\displaystyle\sum_{i}\pi_i.P_i \evolves{\pi_i} P_i'$\\
164-
\end{center}
165-
(A-SUM) expresses the fact that, when a single guarded process can evolve in one step to a process $P_i'$ due to an action $\pi_i$, then it can also do so as part of a summation.
166-
Notice that unlike (A-COMP), (A-SUM) does not need to be careful about capturing names.
167-
Since no other processes are run by the summation, we needn't worry about causing a naming issue when we possibly export terms by running the action $\alpha$.
168-
169152
\begin{insettable_wide}
170153
\begin{center}\begin{tabular}{rllll}
171154
$\receive{c}{\tuple{X}}R$ & \evolves{\receives{c}{\tuple{V}}} & $R$\subst{\tuple{V}}{\tuple{X}} & & \tiny{(A-IN)}\\
@@ -177,7 +160,7 @@ \section{Semantics}
177160
\multicolumn{3}{c}{$\underline{P_i \evolves{\pi_i} P_i'}$} & & \multirow{2}{*}{\tiny{(A-SUM)}}\\
178161
\multicolumn{3}{c}{$\displaystyle\sum_{i}\pi_i.P_i \evolves{\pi_i} P_i'$}\\[18pt]
179162

180-
\multicolumn{3}{c}{$\underline{P \evolves{\pi} P'}$} & \multirow{2}{*}{\footnotesize{$\textstyle bn(\alpha) \cap fn(Q) = \emptyset$ }} & \multirow{2}{*}{\tiny{(A-COMP)}}\\
163+
\multicolumn{3}{c}{$\underline{P \evolves{\pi} P'}$} & \multirow{2}{*}{\footnotesize{$\textstyle \mbox{\emph{bn}}(\alpha) \cap \mbox{\emph{fn}}(Q) = \emptyset$ }} & \multirow{2}{*}{\tiny{(A-COMP)}}\\
181164
\multicolumn{3}{c}{$P\comp Q \evolves{\alpha} P'\comp Q$}\\[10pt]
182165

183166
\multicolumn{3}{c}{$\underline{P \evolves{\alpha} P'}$} & \multirow{2}{*}{\footnotesize{$\textstyle b \not \in n(\alpha)$ }} & \multirow{2}{*}{\tiny{(A-REST)}}\\
@@ -186,12 +169,27 @@ \section{Semantics}
186169
\multicolumn{3}{c}{$\underline{P\evolves{\exports{\tuple{B}}\sends{c}{\tuple{V}}} P'}$} & \multirow{2}{*}{\footnotesize{$n \neq c, n\text{ is in }\tuple{V}$ }}& \multirow{2}{*}{\tiny{(A-OPEN)}}\\
187170
\multicolumn{3}{c}{$\new{n}P \evolves{\exports{n,\tuple{B}}\sends{c}{\tuple{V}}} P'$}\\[10pt]
188171

189-
\multicolumn{3}{c}{$\underline{P\evolves{\receives{c}{\tuple{V}}} P',\ Q \evolves{\exports{\tuple{B}}\sends{c}{\tuple{V}}} Q'}$} & \multirow{2}{*}{\footnotesize{$\textstyle \exports{\tuple{B}}\cap fn(P) = \emptyset$ }} & \multirow{2}{*}{\tiny{(A-COMM)}}\\
172+
\multicolumn{3}{c}{$\underline{P\evolves{\receives{c}{\tuple{V}}} P',\ Q \evolves{\exports{\tuple{B}}\sends{c}{\tuple{V}}} Q'}$} & \multirow{2}{*}{\footnotesize{$\textstyle \exports{\tuple{B}}\cap \mbox{\emph{fn}}(P) = \emptyset$ }} & \multirow{2}{*}{\tiny{(A-COMM)}}\\
190173
\multicolumn{3}{c}{$P\comp Q \evolves{\tau} \new{\tuple{B}}(P'\comp Q')$}\\[10pt]
191174
\end{tabular}
192175
\caption{\emph{Action rules for the synchronous \picalc}}\label{spiacts}
193176
\end{center}
194177
\end{insettable_wide}\index{action}
178+
Neither do the action rules for the synchronous \picalc\ differ significantly from \hyperref[apiactionrules]{those} in the asynchronous version.
179+
As we would expect, (A-OUT) has been modified to express synchronous sending.
180+
It now evolves over output to a process $R$ and not simply to the termination process $\pstop$:
181+
\[
182+
\ssend{c}{\tuple{V}}R \evolves{\sends{c}{\tuple{V}}} R
183+
\]
184+
185+
We have also added a new rule, (A-SUM). It describes the action of the summation operator much as (A-COMP) describes the action of the composition operator.
186+
\begin{center}
187+
$\underline{P_i \evolves{\pi_i} P_i'}$\\
188+
$\displaystyle\sum_{i}\pi_i.P_i \evolves{\pi_i} P_i'$\\
189+
\end{center}
190+
(A-SUM) expresses the fact that, when a single guarded process can evolve in one step to a process $P_i'$ due to an action $\pi_i$, then it can also do so as part of a summation.
191+
Notice that unlike (A-COMP), (A-SUM) does not need to be careful about capturing names.
192+
Since no other processes are run by the summation, we needn't worry about causing a naming issue when we possibly export terms by running the action $\alpha$.
195193

196194
\section{Extended Example: Leader Elections}\label{secleaderelecs}
197195
Leader elections, a classic problem in distributed systems, are a good example of the power of the synchronous \picalc.\index{leader elections}
@@ -220,11 +218,11 @@ \section{Extended Example: Leader Elections}\label{secleaderelecs}
220218
\[
221219
\send{o}{c_0} \comp \send{o}{c_0}
222220
\]
223-
Here we see that both processes will agree in this ``election'' --- that is, they output the same value. Note that no substitutions were necessary since $\send{c}{}$ is simply a\refmargin{handshake} handshake signal. Note also that these resulting processes are \emph{not} symmetric: applying the automorphism $\sigma$ to $P_0$ would yield $\send{o}{c_1}$.
221+
Here we see that both processes will agree in this ``election'' --- that is, they output the same value. Note that no substitutions were necessary since $\send{c}{}$ is simply a\refmargin{handshake} handshake signal. Note also that these resulting processes are \emph{not} symmetric: applying the automorphism $\sigma$ to the residual $\send{o}{c_0}$ of $P_0$ would yield $\send{o}{c_1}$.
224222

225223
If, on the other hand, $P_1$ notifies first, then again we apply (R-SYNC) to get
226224
\[
227225
\send{o}{c_1} \comp \send{o}{c_1}
228226
\]
229227
Again, a leader has been elected.
230-
Hence, we have given a term that successfully solves the leader election problem for symmetric systems in the special case of a two processes. We will discuss more general leader elections in the next chapter.
228+
Hence, we have given a term that successfully solves the leader election problem for symmetric systems in the special case of two processes. We will discuss more general leader elections in the next chapter.

Chapters/chap4.tex

+2-2
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ \section{Encoding Choice}\label{failedencoding}
121121

122122
If the local lock is acquired but the remote lock isn't, we make sure that the local lock is still available by sending \send{l}{\ptrue} and that the remote lock is \emph{not} made available by sending \send{l}{\pfalse}.
123123
We also need a recursive call to $q$ to ensure we continue to poll the lock ourselves.
124-
The fact that the remote lock is not available means another sender has already run (i.e. it was sent \ptrue\ on its acknowledgement channel by some receiver) so we need to make sure \emph{this} sender is sent \pfalse\ on its acknowledgement channel.
124+
The fact that the remote lock is not available means another sender has already run (i.e., it was sent \ptrue\ on its acknowledgement channel by some receiver) so we need to make sure \emph{this} sender is sent \pfalse\ on its acknowledgement channel.
125125

126126
Finally, if we fail to acquire a local lock, we send \pfalse\ to the lock to ensure no one else gets it either, and then we send the acknowledgement channel the special message \pretry\ so that sender still has a chance to run, since the remote lock might still be available.
127127

@@ -184,4 +184,4 @@ \section{A `Bakery' Algorithm}
184184
\end{split}\end{equation*}%note: it was really late when i did this. sorry....
185185
Because the order of the conditions is also reversed, we've had to interchange the else statements. The case of successfully getting both the remote and local locks is the same as in (l,r). If the process only gets the remote lock it tells the remote sender to keep trying and continues to make the remote lock available. If on the other hand it fails to get the remote lock, it restarts the receiver and makes sure to tell the remote sender its failed.
186186

187-
Note that Nestmann's `implementation' of the synchronous \picalc\ does not pay attention to the efficiency questions that would be crucial in a real system. Perhaps its worst property is that in the $n=m$ case there is a possible divergence. If two terms (a sender and a receiver) in the same summation are communicating with one another, our $n=m$ case has them both retry. Thus, they might continue trying forever. Though this represents potentially divergent behavior, it is important to note that this is not the same as a live-lock: the processes will run forever without progressing, but only because they are both in a summation that is unable to progress anyway. However, it still represents a violation of reasonability since it is possible (though unlikely) that the two might continue communicating forever, never allowing for the computation step of sending the leader choice to the output channel $o$\footnote{Though we will not discuss it here, Nestmann \cite{nestm00} does goes to give the same encoding --- using a slightly enhanced target language --- that does not have this divergence problem.}. Hence, while Nestmann's encoding violates both of Palamidessi's criteria to some extent, it nevertheless provides the full behavior of the synchronous in a way that could easily be implemented on a distributed system using only asynchronous primitives.
187+
Note that Nestmann's `implementation' of the synchronous \picalc\ does not pay attention to the efficiency questions that would be crucial in a real system. Perhaps its worst property is that in the $n=m$ case there is a possible divergence. If two terms (a sender and a receiver) in the same summation are communicating with one another, our $n=m$ case has them both retry. Thus, they might continue trying forever. Though this represents potentially divergent behavior, it is important to note that this is not the same as a live-lock: the processes will run forever without progressing, but only because they are both in a summation that is unable to progress anyway. However, it still represents a violation of reasonability since it is possible (though unlikely) that the two might continue communicating forever, never allowing for the computation step of sending the leader choice to the output channel $o$\footnote{Though we will not discuss it here, Nestmann \cite{nestm00} does give an encoding --- using a slightly enhanced target language --- that does not have this divergence problem.}. Hence, while Nestmann's encoding violates both of Palamidessi's criteria to some extent, it nevertheless provides the full behavior of the synchronous in a way that could easily be implemented on a distributed system using only asynchronous primitives.

Chapters/dedication.tex

+1-2
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@
33
\thispagestyle{empty}
44
\begin{center}
55
\null\vfil
6-
\centering To my parents, Ann and Daniel.
6+
\centering To my mother Ann and my father Daniel.
77
\vspace{10cm}
88
\end{center}
9-
109
\cleardoublepage
1110
}

Chapters/front_matter.tex

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,4 +12,4 @@ \chapter*{Preface}
1212
\begin{center}\textbf{Acknowledgments}\end{center}
1313
Thanks first and foremost go to my advisor, Jim Fix, for his insights, guidance and willingness to explore the many systems and ideas that led the creation of this thesis. None of this could have happened without his help. I also thank my professors and colleagues for their willingness to read versions of this thesis and provide feedback for my ideas. Finally, a huge portion of this thesis relies directly on the work of Robin Milner and many others who have expanded on what he set in motion. To the extent that anything novel is presented in this thesis, it relies heavily on the great minds that have inspired and challenged my thinking of distributed computing.
1414

15-
I would also like to thank my friends and family for their continuing support, compassion and understanding. In particular I thank my parents, with whom neither my thesis nor the education proceeding it would have been possible.
15+
I would also like to thank my friends and family for their continuing support, compassion and understanding. In particular I thank my parents, with whom neither my thesis nor the education preceeding it would have been possible.

figures/cell_network.pdf

-16.2 KB
Binary file not shown.

figures/cell_network_pi.pdf

-3.57 KB
Binary file not shown.

0 commit comments

Comments
 (0)