1 / 31

Teacher: Chun-Yuan Lin

Introduction to Distributed Algorithm Part Two: Fundamental Algorithm Chapter 8- Termination Detection. Teacher: Chun-Yuan Lin. Termination Detection (1). A computation of a distributed algorithm terminates when the algorithm has reached a terminal configuration .

poteet
Download Presentation

Teacher: Chun-Yuan Lin

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Distributed AlgorithmPart Two: Fundamental AlgorithmChapter 8- Termination Detection Teacher: Chun-Yuan Lin Termination Detection

  2. Termination Detection (1) • A computation of a distributed algorithm terminates when the algorithm has reached a terminal configuration. • The termination of the computation is said to be implicit. Termination is said to be explicitin a process if the state of that process in the terminal configuration is a terminal state of the process. • Implicit termination of the computation is also called message termination. Explicit termination is also called process termination. Termination Detection

  3. Termination Detection (2) • In this chapter general methods will be investigated for transforming message-terminating algorithms into process-terminating ones. • The most difficult part of the transformation turns out to be the algorithm that detects the termination. • Termination detection is possible for all classes of networks for which a wave algorithm can be given. Termination Detection

  4. Definitions (1) Termination Detection

  5. Definitions (2) • Some assumptions are made in order to simplify the description of the algorithms in this chapter. • An active process becomes passive only in an internal event. • A process always becomes active when a message is received. • The internal events in which p becomes passive are the only internal events of p. Termination Detection

  6. Definitions (3) Termination Detection

  7. Definitions (4) Termination Detection

  8. Two Lower Bounds Termination Detection

  9. Terminating the Processes (1) Termination Detection

  10. Terminating the Processes (2) Termination Detection

  11. Computation Trees and Forests (1) • Termination is detected when the computation graph becomes empty. (network is undirected) • The Dijkstra-Scholten Algorithm (Tree) Termination Detection

  12. Computation Trees and Forests (2) Termination Detection

  13. Computation Trees and Forests (3) • The Shavit-Francez Algorithm (Forests) Termination Detection

  14. Computation Trees and Forests (4) Termination Detection

  15. Computation Trees and Forests (5) Termination Detection

  16. Wave-based Solutions (1) • We shall first consider concrete instances of the algorithms, where in all cases the wave algorithm is the ring algorithm. • The Dijkstra-Feijen- Van Gasteren Algorithm Termination Detection

  17. Wave-based Solutions (2) Termination Detection

  18. Wave-based Solutions (3) Termination Detection

  19. Wave-based Solutions (4) Termination Detection

  20. Wave-based Solutions (5) • Counting Basic Messages: Safra's Algorithm Termination Detection

  21. Wave-based Solutions (6) Termination Detection

  22. Wave-based Solutions (7) Termination Detection

  23. Wave-based Solutions (8) • Using Acknowledgements Termination Detection

  24. Wave-based Solutions (9) Termination Detection

  25. Wave-based Solutions (10) Termination Detection

  26. Wave-based Solutions (11) • Termination Detection with Waves Termination Detection

  27. Other Solutions (1) • The Credit-recovery Algorithm Termination Detection

  28. Other Solutions (2) Termination Detection

  29. Other Solutions (3) Termination Detection

  30. Other Solutions (4) • Solutions Using Timestamps Termination Detection

  31. Other Solutions (5) Termination Detection

More Related