Concurrent Timestamping Made Simple
نویسندگان
چکیده
Concurrent Time-stamp Systems (ctss) allow processes to temporally order concurrent events in an asynchronous shared memory system, a powerful tool for concurrency control, serving as the basis for solutions to coordination problems such as mutual exclusion, `-exclusion, randomized consensus, and multi-writer multi-reader atomic registers. Solutions to these problems all use an \unbounded number" based concurrent time-stamp system (uctss), a construction which is as simple to use as it is to understand. A bounded \black-box" replacement of uctss would imply equally simple bounded solutions to most of these extensively researched problems. Unfortunately, while all know applications use uctss, all existing solution algorithms are only proven to implement the Dolev-Shavit ctss axioms, which have been widely criticized as \hard-to-use." While it is easy to show that a uctss implements the ctss axioms, there is no proof that a system meeting the ctss axioms implements uctss. Thus, the problem of constructing a bounded black-box replacement for uctss remains open. This paper presents the rst such bounded black-box replacement of uctss. The key to the solution is a simpliied variant of the Dolev-Shavit ctss algorithm based on the atomic snapshot object proposed by Afek et. al. and Anderson, in a way that limits the number of interleavings that can occur, and whose behaviours can be readily mapped to those of uctss. Using the forward simulation techniques of the I/O Automata model, we are then able show that our bounded algorithm behaves like uctss. The forward simulation allows us to present, what would otherwise be a complicated proof, as an extensive, yet at each step simple case analysis. In fact, we believe that large parts of the forward simulation proof can be checked using an automatic proof checker such as Larch. For read/write memory, our easy to use bounded uctss is only a logaritmic factor from the most eecient known bounded ctss constructions. Moreover, unlike these eecient algorithms, our modular use of an atomic snapshot object implies that our constructions are not limited to read/write memory, and can be applied in any computation model whose basic operations suuce to provide a wait-free snapshot implementation. The complexity of our bounded uctss will be the same as the complexity of the underlaying snapshot implementation used.
منابع مشابه
Time-Lapse Snapshots
A snapshot scan algorithm takes an “instantaneous” picture of a region of shared memory that may be updated by concurrent processes. Many complex shared memory algorithms can be greatly simplifkd by structuring them around the snapshot scan abstraction. Unfortunately, the substantial decrease in conceptual complexity is quite often countetkknced by an increase in computational complexity. In th...
متن کاملTimestamps in Message-Passing Systems That Preserve the Partial Ordering
Timestamping is a common method of totally ordering events in concurrent programs. However, for applications requiring access to the global state, a total ordering is inappropriate. This paper presents algorithms for timestamping events in both synchronous and asynchronous n1essage-passing programs that allow for access to the partial ordering inherent in a parallel system. The algorithms do no...
متن کاملA Simple, Memory-Efficient Bounded Concurrent Timestamping Algorithm
Several constructions have been proposed for implementing a Bounded Concurrent Timestamp System (BCTS). Some constructions are based on a recursively deened Precedence Graph. Such constructions have been viewed as hard to understand and to prove correct. Other constructions that are based on the Traceable Use abstraction rst proposed by Dwork and Waarts have been regarded as simple and have the...
متن کاملHow to Distribute GPS-Time over COTS-based LANs
This paper shows how to distribute GPS-time with s-accuracy and below even in Ethernet-based distributed systems. Our SynUTC-approach 1 is based upon a simple network controller-level hardware for timestamping data packets as they leave and arrive at a node, which comes in two avours: The memory-based timestamping method exploited by our Network Time Interface (NTI) M-Module timestamps data pac...
متن کاملA Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
The aim of timestamping systems is to provide a proof-ofexistence of a digital document at a given time. Such systems are important to ensure integrity and non-repudiation of digital data over time. Most of the existing timestamping schemes use the notions of round (a period of time) and round token (a single value aggregating the timestamping requests received during one round). Such schemes h...
متن کامل