1 / 28

Why do we need models?

Why do we need models?. There are many dimensions of variability in distributed systems. Examples: interprocess communication mechanisms, timing assumptions failure classes, security features, etc. Why do we need models?.

lclapp
Download Presentation

Why do we need models?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why do we need models? • There are many dimensions of variability in distributed systems. Examples: • interprocess communication mechanisms, • timing assumptions • failure classes, • security features, etc • .

  2. Why do we need models? • Models are simple abstractions that help understand the variability -- abstractions that preserve the essential features, but hide the implementation details from observers who view the system at a higher level.

  3. Modeling Communication:A message passing model System topology is a graph G = (V, E), where V = set of nodes (sequential processes) E = set of edges(links or channels, bi/unidirectional) Four types of actions by a process: - Internal action -input action - Communication action -output action

  4. Axiom 1. Message m sent  message m received Axiom 2. Message propagation delay is arbitrary but finite. Axiom 3. m1 sent before m2m1 received before m2. A Reliable FIFO channel P Q

  5. When a message m is rec’d Evaluate a predicate with m and the local variables; 2. if predicate = true then - update internal variables; - send zero or more messages; elseskip {do nothing} end if Life of a process

  6. Address spaces of processes overlap Shared memory model M1 M2 1 3 2 4 Concurrent operations on a shared variable are serialized

  7. Variations of shared memory models 1 State reading model Each process can read the states of its neighbors 0 2 3 Link register model Each process can read from and write to adjacent registers. The entire local state is not shared. 0 1 2 3

  8. Communication via broadcast Limited range Dynamic topology Collision of broadcasts (handled by CSMA/CA) Modeling wireless networks RTS RTS CTS

  9. Send & receive can be blocking or non-blocking Postal communication is asynchronous: Telephone communication is synchronous Synchronous communication or not? Remote Procedure Call, Email Synchrony vs. Asynchrony Any restriction defines some form of synchrony …

  10. One object (or operation) of a strong model = More than one objects (or operations) of a weaker model. Often, weaker models are synonymous with fewer restrictions. One can add layers (additional restrictions) to create a stronger model from weaker one. Examples HLL model is stronger thanassembly language model. Asynchronous is weaker thansynchronous. Bounded delay is stronger thanunbounded delay (channel) Weak vs. Strong Models

  11. Stronger models - simplify reasoning, but - needs extra work to implement Weaker models - are easier to implement. - Have a closer relationship with the real world “Can model X be implemented using model Y?” is an interesting question in computer science. Sample problems Non-FIFO to FIFO channel Message passing to shared memory Non-atomic broadcast to atomic broadcast Model transformation

  12. Non-FIFO to FIFO channel m2 m3 m4 m1 P Q buffer

  13. Non-FIFO to FIFO channel {Sender process P} {Receiver process Q} var i : integer {initially 0} var k : integer {initially 0} buffer: buffer[0..∞] of msg {initially  k: buffer [k] = empty repeatrepeat send m[i],i to Q; {STORE} receive m[i],i from P; i := i+1 store m[i] into buffer[i]; forever{DELIVER} while buffer[k] ≠ empty dobegin deliver content of buffer [k]; buffer [k] := empty k := k+1; end forever

  14. Observations (a) Needs Unbounded sequence numbers and (b) Unbounded number of buffer slots(Both are bad) Now solve the same problem on a model where (a) The propagation delay has a known upper bound of T. (b) The messages are sent out @r per unit time. (c) The messages are received at a rate faster than r. The buffer requirement drops to r.T.Synchrony pays. Question. How to solve the problem using bounded buffer space if the propagation delay is arbitrarily large?

  15. {Read X by process i}: read x[i] {Write X:= v by process i} - x[i] := v; Atomically broadcastv to every other process j (j ≠ i); After receiving broadcast, process j (j ≠ i) sets x[j] to v. Understand the significance of atomic operations. It is not trivial, but is very important in distributed systems Message-passing to Shared memory This is incomplete. There are more pitfalls here.

  16. Non-atomic to atomic broadcast Atomic broadcast = either everybody or nobody receives {process i is the sender} for j = 1 to N-1 (j ≠ i) send message m to neighbor[j] (Easy!) Now include crash failure as a part of our model. What if the sender crashes at the middle? Implement atomic broadcast in presence of crash.

  17. Mobile-agent based communication Communicates via messengers instead of (or in addition to) messages. What is the lowest Price of an iPod in Iowa? Carries both program and data

  18. Other classifications of models Reactive vs Transformational systems A reactive system never sleeps (like: a server) A transformational (or non-reactive systems) reaches a fixed point after which no further change occurs in the system (Examples?) Named vs Anonymous systems In named systems, process id is a part of the algorithm. In anonymous systems, it is not so. All are equal. (-) Symmetry breaking is often a challenge. (+) Easy to switch one process by another with no side effect. Saves logN bits.

  19. Knowledge based communication Alice and Bob enter into an agreement: whenever one falls sick, (s)he will call the other person. Since making the agreement, no one called the other person, so both concluded that they are in good health. Assume that the clocks are synchronized, communication links are perfect, and a telephone call requires zero time to reach. What kind of interprocess communication model is this?

  20. History The paper “Cheating Husbands and Other Stories: A Case Study of Knowledge, Action, and Communication” by Yoram Moses, danny Dolev, Joseph Halpern illustrates how actions are taken and decisions are made without explicit communication using common knowledge. (Adaptation of Gamow and Stern, “Forty unfaithful wives,” Puzzle Math, 1958)

  21. Relevance (Bidding in the game of cards like bridge is an example of knowledge-based communication) • Communicating through silence is energy-efficient

  22. The Queen’s Proclamation The Queen read out the following in a meeting at the town square. • There are one or more unfaithful husbands in our community. • None of you know whether your husband is faithful. But each of you which of the other husbands are unfaithful. • Do not discuss this with anyone, but should you discover that your own husband is unfaithful, you should shoot him on the midnight of the day you find out about it

  23. What happened after this Thirty nine silent nights went by, and on the fortieth night, gunshots were heard. • What was going on for 39 nights? • How many unfaithful husbands were there? • Why did it take so long

  24. A simple case • W2 does not know of any other unfaithful husband. • W2 knows that there is at least one (common knowledge) • W2 concludes that it must be H2, and kills him on the first night.

  25. Theorem If there are N unfaithful H’s, then they will all be killed on the midnight of the Nth day.

  26. A more complicated case • W2 knows H3 is unfaithful. She expects H3 to be killed on the first night. • W3 has similar thoughts. So no one was killed on the first night.

  27. The case continues • Then W2 thinks, why wasn’t H3 killed in the first night. Does it mean, W3 knows of another unfaithful husband whom I don’t know? It must be my husband H2 then! • W3 has similar thoughts. • So both H2 and H3 are killed on the SECOND night.

  28. Common Knowledge F is a common knowledge means: • Everyone knows F • Everyone knows that everyone knows F • Everyone knows that everyone knows that everyone knowsthat …F (ad infinitum) …

More Related