Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

New combinatorial topology bounds for renaming: The upper bound

Published: 02 March 2012 Publication History

Abstract

In the renaming task, n+1 processes start with unique input names from a large space and must choose unique output names taken from a smaller name space, 0,1,…, K. To rule out trivial solutions, a protocol must be anonymous: the value chosen by a process can depend on its input name and on the execution, but not on the specific process ID.
Attiya et al. [1990] showed that renaming has a wait-free solution when K≥ 2n. Several algebraic topology proofs of a lower bound stating that no such protocol exists when K < 2n have been published. In a companion article, we present the first completely combinatorial renaming lower bound proof stating if n + 1 is a primer power, then renaming is not wait-free solvable when K < 2n. In this article, we show that if n + 1 is not a primer power, then there exists a wait-free renaming protocol for K = 2n−1. Therefore the renaming lower bound for K < 2n is incorrect. More precisely, our main theorem states that there exists a wait-free renaming protocol for K < 2n if and only if n + 1 is not a prime power. We prove this result using the known equivalence of K-renaming for K = 2n − 1 and the weak symmetry breaking task: processes have no input values and the output values are 0 or 1, and it is required that in every execution in which all processes participate, at least one process decides 1 and at least one process decides 0.

References

[1]
Attiya, H., Bar-Noy, A., and Dolev, D. 1995. Sharing memory robustly in message-passage systems. J. ACM 42, 1, 124--142.
[2]
Attiya, H., Bar-Noy, A., Dolev, D., Peleg, D., and Reischuck, R. 1990. Renaming in an asynchronous environment. J. ACM 37, 3, 524--548.
[3]
Attiya, H. and Rajsbaum, S. 2002. The combinatorial structure of wait-free solvable tasks. SIAM J. Comput. 31, 4, 1286--1313.
[4]
Attiya, H. and Welch, J. 1998. Distributed Computing: Fundamentals, Simulations and Advanced Topics. McGraw-Hill, New York.
[5]
Borowsky, E. and Gafni, E. 1993a. Generalized FLP impossibility result for t-resilient asynchronous computations. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing. ACM, New York, 91--100.
[6]
Borowsky, E. and Gafni, E. 1993b. Immediate atomic snapshots and fast renaming. In Proceedings of the 12th Annual ACM Symposium on Principles on Distributed Computing. ACM, New York, 41--51.
[7]
Borowsky, E. and Gafni, E. 1997. A simple algorithmically reasoned characterization of wait-free computations. In Proceedings of the 16th Annual ACM Symposium on Principles on Distributed Computing. ACM, New York, 189--198.
[8]
Castañeda, A., Herlihy, M., and Rajsbaum, S. 2011. An equivariance theorem with applications to renaming. Tech rep. &num;1975, IRISA, Université de Rennes 1 (France), http://hal.inria.fr/docs/00/58/61/90/PDF/PI-1975.pdf.
[9]
Castaneda, A. and Rajsbaum, S. 2008. New combinatorial topology upper and lower bounds for renaming. In Proceedings of the 27th Annual ACM Symposium on Principles on Distrib. Comput. ACM, New York, 295--304.
[10]
Casta&tildn;eda, A. and Rajsbaum, S. 2010. New combinatorial topology upper and lower bounds for renaming: The lower bound. Distrib. Comput. 25, 5, 287--301.
[11]
Chaudhuri, S. 1990. Agreement is harder than consensus: Set consensus problems in totally asynchronous systems. In Proceedings of the 9th Annual ACM Symposium on Principles of Distrib. Comput. ACM, New York, 311--234.
[12]
Dence, J. B. and Dence, T. 1999. Elements of the Theory of Numbers. Academic Press.
[13]
Dickson, L. E. 2005. History of the Theory of Numbers---I. Dover Books on Mathematics.
[14]
Dieck, T. 1987. Transformation Groups. Gruiter Studies in Mathematics.
[15]
Gafni, E. 2008. The 0-1 exclusion families of tasks. In Proceedings of the 12th International Conference on Principles of Distributed Systems. Springer, New York, 246--258.
[16]
Gafni, E., Mostéfaoui, A., Raynal, M., and Travers, C. 2009. From adaptive renaming to set agreement. Theoret. Comput. Sci. 410, 14, 1328--1335.
[17]
Gafni, E., Rajsbaum, S., and Herlihy, M. 2006. Subconsensus tasks: Renaming is weaker than set agreement. In Proceedings of the 20th International Symposium on Distributed Computing. Springer, New York, 329--338.
[18]
Hardy, G. H. 1999. Ramanujan: Twelve Lectures on Subjects Suggested by His Life and Work. AMS Chelsea Publishing.
[19]
Havlicek, J. 2004. A note on the homotopy type of wait-free atomic snapshot protocol complexes. SIAM J. Comput. 33, 5, 1215--1222.
[20]
Herlihy, M. and Rajsbaum, S. 2000. Algebraic spans. Math. Struct. Comput. Sci. 10, 4, 549--573.
[21]
Herlihy, M. and Shavit, N. 1993. The asynchronous computability theorem for t-resilient tasks. In Proceedings of the 25th ACM Symposium on the Theory of Computing. ACM, New York, 111--120.
[22]
Herlihy, M. and Shavit, N. 1999. The topological structure of asynchronous computability. J. ACM 46, 6, 858--923.
[23]
Hopf, H. 1927. Abbildungklassen n-dimensionaler mannigfaltigkeiten. Math. Ann. 96, 209--224.
[24]
Munkres, J. R. 1993. Elements of Algebraic Topology. Addison-Wesley, Reading.
[25]
Saks, M. and Zaharoglou, F. 2000. Wait-free k-set agreement is impossible: The topology of public knowledge. SIAM J. Comput. 29, 5, 1449--1483.

Cited By

View all
  • (2024)Algebraic topology and distributed computingFoundations of Data Science10.3934/fods.2024008(0-0)Online publication date: 2024
  • (2024)The topology of local computing in networksJournal of Applied and Computational Topology10.1007/s41468-024-00185-68:4(1069-1098)Online publication date: 1-Jul-2024
  • (2023)Locally solvable tasks and the limitations of valency argumentsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2023.02.002176(28-40)Online publication date: Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of the ACM
Journal of the ACM  Volume 59, Issue 1
February 2012
166 pages
ISSN:0004-5411
EISSN:1557-735X
DOI:10.1145/2108242
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 March 2012
Accepted: 01 December 2011
Revised: 01 March 2011
Received: 01 December 2009
Published in JACM Volume 59, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Distributed computing
  2. combinatorial topology
  3. shared-memory
  4. upper bound

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)2
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Algebraic topology and distributed computingFoundations of Data Science10.3934/fods.2024008(0-0)Online publication date: 2024
  • (2024)The topology of local computing in networksJournal of Applied and Computational Topology10.1007/s41468-024-00185-68:4(1069-1098)Online publication date: 1-Jul-2024
  • (2023)Locally solvable tasks and the limitations of valency argumentsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2023.02.002176(28-40)Online publication date: Jun-2023
  • (2023)Synchronous t-resilient consensus in arbitrary graphsInformation and Computation10.1016/j.ic.2023.105035292:COnline publication date: 1-Jun-2023
  • (2023)The Solvability of Consensus in Iterated Models Extended with Safe-ConsensusTheory of Computing Systems10.1007/s00224-023-10125-z67:5(901-955)Online publication date: 17-Jul-2023
  • (2022)A Topological Characterization to Arbitrary Resilient Asynchronous ComplexityMathematics10.3390/math1015272010:15(2720)Online publication date: 1-Aug-2022
  • (2022)Concurrent Crash-Prone Shared Memory Systems: A Few Theoretical NotionsSynthesis Lectures on Distributed Computing Theory10.2200/S01165ED1V01Y202202DCT01820:1(1-139)Online publication date: 21-Mar-2022
  • (2022)Brief Announcement: Fault Tolerant Coloring of the Asynchronous CycleProceedings of the 2022 ACM Symposium on Principles of Distributed Computing10.1145/3519270.3538456(493-495)Online publication date: 20-Jul-2022
  • (2022)A visit to mutual exclusion in seven datesTheoretical Computer Science10.1016/j.tcs.2022.03.030919(47-65)Online publication date: Jun-2022
  • (2021)A topological perspective on distributed network algorithmsTheoretical Computer Science10.1016/j.tcs.2020.10.012849(121-137)Online publication date: Jan-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media