On Proving Communication Closedness of Distributed Layers

نویسندگان

  • Rob Gerth
  • Liuba Shrira
چکیده

The notion of communication closed layer has been introduced as a way to define structured composition of distributed sy~tems. An interesting question is how to verify the closedness of a layer. We formulate a proof rule proving closed ness of a distributed layer. The rule is developed as an extension of the Apt. Francez and de Roever proof system for CSP. The extension is proved to be sound and relatively complete. 1. In trod ucti on A recent paper of Elrad and Francez [EF82] introduces a novel methodology of analysing distributed programs: decomposition into communication closed layers. According to this methodology, parts of processes are grouped together into layers so that there is interaction only between commands which are in the same layer. Intuitively, an execution of such decomposed programs is equivalent to synchronizing all the processes in the distributed program at layer boundaries. This approach *This research was carried out during the first author's stays at the Department of Computer Science of the Technion in May 1985 and May 1986. lDepartment of Mathematics and Computing Science, Eindhoven University of Technology, P.O.Box 513, 5600 MB Eindhoven, the Netherlands. Electronic mail: mcvax!eutrc3!wsinrobg.UUCP. 2Supported in part by the Foundation for Computer Science Research in the Netherlands (SION) with financial aid from the Netherlands Organization for Pure Scientific Research (ZWO). 3The author is working in and supported by ESPRIT project 937: "Debugging and Specification of Ada Real-Time Embedded Systems (DESCARTES)". 4Laboratory for Computer Science, MIT, Cambridge MA 02139, USA and Department of Computer Science, Technion, Haifa 32000, Israel. Electronic mail: [email protected]. sSupported in part by an HTI Postdoctoral Fellowship.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LVT: A Layered Verification Technique for Distributed Computing Systems

This paper presents a layered veriication technique, called LVT, for the veriication of distributed computing systems with multiple component layers. Each lower layer in such a system provides services in support of functionality of the higher layer. By taking a very general view of programming languages as interfaces of systems, LVT treats each layer in a distributed computing system as a dist...

متن کامل

Cartesian-closedness of the category of $L$-fuzzy Q-convergence spaces

The definition of $L$-fuzzy Q-convergence spaces is presented by Pang and Fang in 2011. However, Cartesian-closedness of the category of $L$-fuzzy Q-convergence spaces is not investigated. This paper focuses on Cartesian-closedness of the category of $L$-fuzzy Q-convergence spaces, and it is shown that  the category $L$-$mathbf{QFCS}$ of $L$-fuzzy Q-convergence spaces is Cartesian-closed.

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Countable composition closedness and integer-valued continuous functions in pointfree topology

‎For any archimedean$f$-ring $A$ with unit in whichbreak$awedge‎ ‎(1-a)leq 0$ for all $ain A$‎, ‎the following are shown to be‎ ‎equivalent‎: ‎ ‎1‎. ‎$A$ is isomorphic to the $l$-ring ${mathfrak Z}L$ of all‎ ‎integer-valued continuous functions on some frame $L$‎. 2‎. ‎$A$ is a homomorphic image of the $l$-ring $C_{Bbb Z}(X)$‎ ‎of all integer-valued continuous functions‎, ‎in the usual se...

متن کامل

Impacts of the Negative-exponential and the K-distribution modeled FSO turbulent links on the theoretical and simulated performance of the distributed diffusion networks

Merging the adaptive networks with the free space optical (FSO) communication technology is a very interesting field of research because by adding the benefits of this technology, the adaptive networks become more efficient, cheap and secure. This is due to the fact that FSO communication uses unregistered visible light bandwidth instead of the overused radio spectrum. However, in spite of all ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1986