On Proving Communication Closedness of Distributed Layers
نویسندگان
چکیده
The notion of communication closed layer has been introduced as a way to define structured composition of distributed sy~tems. An interesting question is how to verify the closedness of a layer. We formulate a proof rule proving closed ness of a distributed layer. The rule is developed as an extension of the Apt. Francez and de Roever proof system for CSP. The extension is proved to be sound and relatively complete. 1. In trod ucti on A recent paper of Elrad and Francez [EF82] introduces a novel methodology of analysing distributed programs: decomposition into communication closed layers. According to this methodology, parts of processes are grouped together into layers so that there is interaction only between commands which are in the same layer. Intuitively, an execution of such decomposed programs is equivalent to synchronizing all the processes in the distributed program at layer boundaries. This approach *This research was carried out during the first author's stays at the Department of Computer Science of the Technion in May 1985 and May 1986. lDepartment of Mathematics and Computing Science, Eindhoven University of Technology, P.O.Box 513, 5600 MB Eindhoven, the Netherlands. Electronic mail: mcvax!eutrc3!wsinrobg.UUCP. 2Supported in part by the Foundation for Computer Science Research in the Netherlands (SION) with financial aid from the Netherlands Organization for Pure Scientific Research (ZWO). 3The author is working in and supported by ESPRIT project 937: "Debugging and Specification of Ada Real-Time Embedded Systems (DESCARTES)". 4Laboratory for Computer Science, MIT, Cambridge MA 02139, USA and Department of Computer Science, Technion, Haifa 32000, Israel. Electronic mail: [email protected]. sSupported in part by an HTI Postdoctoral Fellowship.
منابع مشابه
LVT: A Layered Verification Technique for Distributed Computing Systems
This paper presents a layered veriication technique, called LVT, for the veriication of distributed computing systems with multiple component layers. Each lower layer in such a system provides services in support of functionality of the higher layer. By taking a very general view of programming languages as interfaces of systems, LVT treats each layer in a distributed computing system as a dist...
متن کاملCartesian-closedness of the category of $L$-fuzzy Q-convergence spaces
The definition of $L$-fuzzy Q-convergence spaces is presented by Pang and Fang in 2011. However, Cartesian-closedness of the category of $L$-fuzzy Q-convergence spaces is not investigated. This paper focuses on Cartesian-closedness of the category of $L$-fuzzy Q-convergence spaces, and it is shown that the category $L$-$mathbf{QFCS}$ of $L$-fuzzy Q-convergence spaces is Cartesian-closed.
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملCountable composition closedness and integer-valued continuous functions in pointfree topology
For any archimedean$f$-ring $A$ with unit in whichbreak$awedge (1-a)leq 0$ for all $ain A$, the following are shown to be equivalent: 1. $A$ is isomorphic to the $l$-ring ${mathfrak Z}L$ of all integer-valued continuous functions on some frame $L$. 2. $A$ is a homomorphic image of the $l$-ring $C_{Bbb Z}(X)$ of all integer-valued continuous functions, in the usual se...
متن کاملImpacts of the Negative-exponential and the K-distribution modeled FSO turbulent links on the theoretical and simulated performance of the distributed diffusion networks
Merging the adaptive networks with the free space optical (FSO) communication technology is a very interesting field of research because by adding the benefits of this technology, the adaptive networks become more efficient, cheap and secure. This is due to the fact that FSO communication uses unregistered visible light bandwidth instead of the overused radio spectrum. However, in spite of all ...
متن کامل