Algebraic Topology and Distributed Computing part three

Slides:



Advertisements
Similar presentations
Topology in Distributed Computing: A Primer 1 / 16 Sergey Velder SPbSU ITMO.
Advertisements

PROOF BY CONTRADICTION
N-Consensus is the Second Strongest Object for N+1 Processes Eli Gafni UCLA Petr Kuznetsov Max Planck Institute for Software Systems.
Chapter 15 Basic Asynchronous Network Algorithms
6.896: Topics in Algorithmic Game Theory Lecture 11 Constantinos Daskalakis.
Distributed Computing 8. Impossibility of consensus Shmuel Zaks ©
Discrete Mathematics Lecture 5 Alexander Bukharovich New York University.
Distributed Algorithms – 2g1513 Lecture 10 – by Ali Ghodsi Fault-Tolerance in Asynchronous Networks.
1 Nir Shavit Tel-Aviv University and Sun Microsystems Labs (Joint work with Maurice Herlihy of Brown University) © Herlihy and Shavit 2004 The Topological.
Tirgul 8 Graph algorithms: Strongly connected components.
Distributed Computing 8. Impossibility of consensus Shmuel Zaks ©
1 Constructing Convex 3-Polytopes From Two Triangulations of a Polygon Benjamin Marlin Dept. of Mathematics & Statistics McGill University Godfried Toussaint.
Byzantine Generals Problem: Solution using signed messages.
Structure of Consensus 1 The Structure of Consensus Consensus touches upon the basic “topology” of distributed computations. We will use this topological.
The main idea of the article is to prove that there exist a tester of monotonicity with query and time complexity.
Lecture 8 Recursively enumerable (r.e.) languages
Sergio Rajsbaum 2006 Lecture 3 Introduction to Principles of Distributed Computing Sergio Rajsbaum Math Institute UNAM, Mexico.
CPSC 668Set 9: Fault Tolerant Consensus1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Discrete Mathematics Lecture 4 Harper Langston New York University.
Deriving an Algorithm for the Weak Symmetry Breaking Task Armando Castañeda Sergio Rajsbaum Universidad Nacional Autónoma de México.
 Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 12: Impossibility.
On the Cost of Fault-Tolerant Consensus When There are no Faults Idit Keidar & Sergio Rajsbaum Appears in SIGACT News; MIT Tech. Report.
Two-Process Systems TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AA Companion slides for Distributed Computing.
COMP 170 L2 Page 1 L05: Inverses and GCDs l Objective: n When does have an inverse? n How to compute the inverse? n Need: Greatest common dividers (GCDs)
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
Distributed Consensus Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit.
Manifold Protocols TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AA Companion slides for Distributed Computing.
1 © P. Kouznetsov A Note on Set Agreement with Omission Failures Rachid Guerraoui, Petr Kouznetsov, Bastian Pochon Distributed Programming Laboratory Swiss.
MATH 224 – Discrete Mathematics
CSE 311 Foundations of Computing I Lecture 8 Proofs and Set Theory Spring
Consensus and Its Impossibility in Asynchronous Systems.
DISTRIBUTED ALGORITHMS AND SYSTEMS Spring 2014 Prof. Jennifer Welch Set 11: Asynchronous Consensus 1.
Self Stabilizing Smoothing and Counting Maurice Herlihy, Brown University Srikanta Tirthapura, Iowa State University.
Section 3.3: Mathematical Induction Mathematical induction is a proof technique that can be used to prove theorems of the form:  n  Z +,P(n) We have.
CSE 311 Foundations of Computing I Lecture 9 Proofs and Set Theory Autumn 2012 CSE
Distributed systems Consensus Prof R. Guerraoui Distributed Programming Laboratory.
Sliding window protocol The sender continues the send action without receiving the acknowledgements of at most w messages (w > 0), w is called the window.
Hwajung Lee. Reaching agreement is a fundamental problem in distributed computing. Some examples are Leader election / Mutual Exclusion Commit or Abort.
Alternating Bit Protocol S R ABP is a link layer protocol. Works on FIFO channels only. Guarantees reliable message delivery with a 1-bit sequence number.
Fault tolerance and related issues in distributed computing Shmuel Zaks GSSI - Feb
CSE 311: Foundations of Computing Fall 2013 Lecture 8: Proofs and Set theory.
 2004 SDU 1 Lecture5-Strongly Connected Components.
CS 344 Artificial Intelligence By Prof: Pushpak Bhattacharya Class on 12/Feb/2007.
Krishnendu ChatterjeeFormal Methods Class1 MARKOV CHAINS.
1 Interactive Computer Theorem Proving CS294-9 October 19, 2006 Adam Chlipala UC Berkeley Lecture 9: Beyond Primitive Recursion.
Random Access Codes and a Hypercontractive Inequality for
Chapter 3 The Real Numbers.
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Algebraic Topology and Distributed Computing part two
Byzantine-Resilient Colorless Computaton
Elements of Combinatorial Topology
Algebraic Topology and Distributed Computing
Elements of Combinatorial Topology
Solvability of Colorless Tasks in Different Models
Wait-Free Computability for General Tasks
Alternating Bit Protocol
Distributed Consensus
Distributed Consensus
Simulations and Reductions
Combinatorial Topology and Distributed Computing
Algebraic Topology and Decidability in Distributed Computing
Renaming and Oriented Manifolds
Finite Model Theory Lecture 2
Rodolfo Conde Joint work with Sergio Rajsbaum Instituto de Matemáticas
A Brief Summary for Exam 1
CSCE 668 DISTRIBUTED ALGORITHMS AND SYSTEMS
Combinatorial Topology and Distributed Computing
Combinatorial Topology and Distributed Computing
Distributed systems Consensus
Presentation transcript:

Algebraic Topology and Distributed Computing part three Maurice Herlihy Brown University

Read-Write Memory When can a task be solved in read/write memory wait-free? Asynchronous Computability Theorem necessary and sufficient conditions 17-Feb-19

Review d Protocol complex D Input complex Output complex 17-Feb-19

Asynchronous Computability Theorem A task has a wait-free read/write protocol iff there exists a simplicial map m from subdivided input complex to output complex that respects D 17-Feb-19

Protocol implies Map Prove protocol complex n-connected exploit connectivity to embed subdivided input complex into protocol complex map protocol complex to output complex just like k-set agreement proof 17-Feb-19

Map implies Protocol We can reduce any task to “simplex agreement” start out at corners of subdivided simplex must rendez-vous on vertexes of single simplex in subdivision 17-Feb-19

This Talk Focus on showing that protocol complex is n-connected elementary algebraic topology technique extends to other models 17-Feb-19

Review: Connectivity A complex C is n-connected if it has no holes in dimension n or less that is, any map from the n-sphere to C can be extended to the (n+1)-disk 17-Feb-19

Reasoning about Connectivity Although connectivity is defined in a continuous way we can reason about it in a purely combinatorial way ... 17-Feb-19

Reasoning about Connectivity If are n-connected is (n-1)-connected then is n-connected (Follows from Mayer-Vietoris Seifert/Van Kampen) 17-Feb-19

Reasoning about Connectivity If are n-connected are (n-1)-connected is (n-2)-connected then is n-connected And so on ... 17-Feb-19

Extended Mayer Vietoris Let , . is (n-|U|+1)-connected, If then R(s) is n-connected. 17-Feb-19

Critical States Let P be a property that is initially false eventually henceforth true then P has a critical state s where P is false in s P is true in every successor state to s 17-Feb-19

Reachable Complex Let s be a protocol state. The reachable complex R(s) is the subset of the protocol complex consisting of global states reachable from s 17-Feb-19

Eventual Connectivity Let P(s) be the property “R(s) is n-connected” Initially false assume by way of contradiction Eventually henceforth true becomes single simplex, n’est-ce pas? 17-Feb-19

Critical Theory As a result: Let s be a protocol state with reachable complex R(s) if process P takes the next step reachable complex becomes As a result: 17-Feb-19

Critical States If s is a critical state, then Strategy: is not n-connected but each is n-connected. Strategy: show each is (n-|U|+1)-connected derive contradiction 17-Feb-19

Pending Operations Each P has a pending operation in s a write to m[P] a scan of all of m compute connectivity of by case analysis of pending operations 17-Feb-19

Pending Writes If P and Q have pending writes in s is set of final states where all later scans return both values no one can tell which went first 17-Feb-19

Pending Writes Let s’ be state reached from s if P writes then Q writes (or vice-versa) no one can tell which went first 17-Feb-19

All executions in which later scans see both values Lemma All executions in which later scans see both values 17-Feb-19

n-connected because successor to critical state Lemma n-connected because successor to critical state 17-Feb-19

Lemmas If all pending operations reads, is n-connected. Same argument if all pending operations writes. What if they are mixed? 17-Feb-19

Pending Reads and Writes If P has a pending write in s and Q has a pending scan is set of final states where no one can tell which went first but Q can tell! 17-Feb-19

Pending Reads and Writes The complex is set of executions where Q fails in s rest run to completion acts like protocol with one less process (n-1)-connected by induction 17-Feb-19

Proof Summary Assume reachable complex from Show intersections of critical state s not n-connected successor states (n-1)-connected Show intersections of successor states reachable complexes sufficiently connected Derive contradiction 17-Feb-19

Remarks Proof works for other models too Alternative approach critical state exists case analysis of pending operations Alternative approach round-by-round induction requires structured subset of executions 17-Feb-19