Skip to main content

Fault-tolerant naming and mutual exclusion

  • Conference paper
  • First Online:
Semantics of Systems of Concurrent Processes (LITP 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 469))

Included in the following conference series:

  • 132 Accesses

Abstract

We present solutions to two classical problems concerning distributed systems in which some sites or processes can possibly have byzantine faulty behavior.

We first study the naming problem (how to give each site of a network an unique identifier). We are naturally led to make some supplementary assumptions about the synchrony of message passing, the connectivity of the underlying graph and the existence of a special site, provided with a digital signature, for initiating the protocol. The solution that we present uses three waves of messages between the initiator and any other site.

Then, we solve the mutual exclusion problem with particular assumptions about the behavior of byzantine processes. The solution implements each critical section as a separate segment, whose address (necessary to access it) is "hidden". A process must reconstruct this address before entering its critical section, involving the cooperation of a number of other processes.

For the two problems, protocols are given and their complexity is estimated.

This research has been supported by the PRC C3.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. "Achievable Cases in a Asynchronous Environment", Proceedings of the 28th Found. of Comput. Science IEEE, pages 337–347, November 1987.

    Google Scholar 

  2. "Locally byzantine processes", in Proc. of the Workshop IEEE on the future trends of distributed systems in the 1990s, Hong-Kong, pages 232–236, September 1988.

    Google Scholar 

  3. "A failure tolerant centralized mutual exclusion algorithm", in Proc. of the 4th Inter. Conf. on Distributed Comp. Syst., pages 347–356, 1984.

    Google Scholar 

  4. "Cryptography and data security", Addison-Wesley, 1983.

    Google Scholar 

  5. "Reaching agreement in the presence of faults", J.A.C.M., pages 228–234, 1980.

    Google Scholar 

  6. "Graph Traversal Techniques and the Maximal Flow Problem in Distributed Computation", IEEE Trans. on SE, SE 9(4), pages 504–512, 1983.

    Google Scholar 

  7. "Assigning Distinct Identities to Sites of an the Future Trends of Distributed Computing Systems in the 1990s, Hong Kong, pages 82–86, September 1988.

    Google Scholar 

  8. "Reaching Agreement in the Presence of Faults", J.A.C.M., pp. 228–234, 1980.

    Google Scholar 

  9. "Randomized byzantine generals", 24th F.O.C.S. I.E.E.E., Tucson, pages 403–409, November 1983.

    Google Scholar 

  10. "An optimal algorithm for mutual exclusion in computer networks", C.A.C.M., vol. 24, pages 9–17, 1981.

    Google Scholar 

  11. "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", CACM, vol. 21, pages 120–126, 1978.

    Google Scholar 

  12. "Distributed Network Protocols", IEEE Trans. on Inf. Theory, IT 29 (1), pages 23–25, 1983.

    Google Scholar 

  13. "How to share a secret", C.A.C.M., vol. 22, pages 612–613, 1979.

    Google Scholar 

  14. "Simulating authenticated broadcasts to derive simple fault-tolerant algorithms", Distributed Computing, vol. 2, pp. 80–94, 1987.

    Google Scholar 

  15. "Randomized asynchronous byzantine agreements", Proc. 3rd Symposium of the principles of Distributed Computing, Vancouver, Canada, Aug. 1984.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Irène Guessarian

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag

About this paper

Cite this paper

Beauquier, J. (1990). Fault-tolerant naming and mutual exclusion. In: Guessarian, I. (eds) Semantics of Systems of Concurrent Processes. LITP 1990. Lecture Notes in Computer Science, vol 469. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-53479-2_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-53479-2_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53479-2

  • Online ISBN: 978-3-540-46897-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics