Skip to main content

Restricting Hornets to Support Self-adaptive Systems

  • Conference paper
  • First Online:
Application and Theory of Petri Nets and Concurrency (PETRI NETS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10258))

Abstract

Adaptivity plays a major role in the context of cyber physical systems (among them sensor networks, mobile adhoc networks, etc.), also known as the internet of things. Since the interaction of sensors and actors as well as their evolution plays a major role in this context, we concentrate on protocols and their adaption in this paper. Whenever we adapt protocols we typically have to modify more than one part of the interaction, i.e. adaptation becomes a distributed activity. As Petri nets are an established means to formalise distributed activities, we have chosen them for adaption-protocols as well.

Since our adaption-protocol nets operate on protocol nets, we obtain a recursive structure as manifested in the nets-within-netsparadigm proposed by Rüdiger Valk. In this paper we study self-adaptive systems in the formalism of Hornets. Hornets are algebraic Petri nets that have nets as tokens.

In previous work we have shown that the reachability problem for safe elementary Hornets requires at least exponential space. To obtain a complexity that is feasible for run-time verification we study structural restrictions of elementary Hornets. It turns out that reachability is in PSpace again for the class of so called fan-bounded Hornets, where the number of places in the pre- and postset is used as a parameter. This class includes – among others – the well known class of State Machines.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Of course, this has consequences for the possible modifications on net-tokens. E.g. an operator \(\sigma ^\mathcal {I}\) which appends a fresh place contradicts finiteness of \(P_k\). Therefore, the boundary case where the net-token already contains all possible places has to be defined as an exception. From a practical perspective the possibility to generate net-tokens of unbounded size might also indicate a modelling problem.

  2. 2.

    The superscript H indicates that the function is used for Hornets.

  3. 3.

    In the following we use \( const \) to denote some constant. Nevertheless, different occurrences may denote different constants.

  4. 4.

    Note, that while the bound we have given for the general case in Lemma 2.1 in [10] is strict (i.e. there are Hornets that exactly have this number of object-nets) the calculation given here gives us only an upper bound.

References

  1. Floerkemeier, C., Langheinrich, M., Fleisch, E., Mattern, F., Sarma, S.E. (eds.): The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26–28, 2008. Proceedings. LNCS, vol. 4952. Springer, Heidelberg (2008)

    Google Scholar 

  2. Valk, R.: Modelling concurrency by task/flow EN systems. In: 3rd Workshop on Concurrency and Compositionality. Number 191 in GMD-Studien, St. Augustin, Bonn, Gesellschaft für Mathematik und Datenverarbeitung (1991)

    Google Scholar 

  3. Valk, R.: Object petri nets: using the nets-within-nets paradigm. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol. 3098, pp. 819–848. Springer, Heidelberg (2004). doi:10.1007/978-3-540-27755-2_23

    Chapter  Google Scholar 

  4. Köhler-Bußmeier, M.: Hornets: nets within nets combined with net algebra. In: Franceschinis, G., Wolf, K. (eds.) PETRI NETS 2009. LNCS, vol. 5606, pp. 243–262. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02424-5_15

    Chapter  Google Scholar 

  5. Köhler-Bußmeier, M., Heitmann, F.: On the expressiveness of communication channels for object nets. Fundamenta Informaticae 93, 205–219 (2009)

    MathSciNet  MATH  Google Scholar 

  6. Köhler, M., Rölke, H.: Properties of object petri nets. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol. 3099, pp. 278–297. Springer, Heidelberg (2004). doi:10.1007/978-3-540-27793-4_16

    Chapter  Google Scholar 

  7. Köhler-Bußmeier, M., Heitmann, F.: Safeness for object nets. Fundamenta Informaticae 101, 29–43 (2010)

    MathSciNet  MATH  Google Scholar 

  8. Köhler-Bußmeier, M., Heitmann, F.: Liveness of safe object nets. Fundamenta Informaticae 112, 73–87 (2011)

    MathSciNet  MATH  Google Scholar 

  9. Köhler-Bußmeier, M.: A survey on decidability results for elementary object systems. Fundamenta Informaticae 130, 99–123 (2014)

    MathSciNet  MATH  Google Scholar 

  10. Köhler-Bußmeier, M.: On the complexity of the reachability problem for safe, elementary Hornets. Fundamenta Informaticae 129, 101–116 (2014). Dedicated to the Memory of Professor Manfred Kudlek

    MathSciNet  MATH  Google Scholar 

  11. Lipton, R.J.: The reachability problem requires exponential space. Research report 62, Department of Computer science (1976)

    Google Scholar 

  12. Köhler-Bußmeier, M., Heitmann, F.: An upper bound for the reachability problem of safe, elementary hornets. Fundamenta Informaticae 143, 89–100 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  13. Lomazova, I.A.: Nested Petri nets - a formalism for specification of multi-agent distributed systems. Fundamenta Informaticae 43, 195–214 (2000)

    MathSciNet  MATH  Google Scholar 

  14. Xu, D., Deng, Y.: Modeling mobile agent systems with high level Petri nets. In: IEEE International Conference on Systems, Man, and Cybernetics 2000 (2000)

    Google Scholar 

  15. Kummer, O.: Referenznetze. Logos Verlag, Berlin (2002)

    Google Scholar 

  16. Hiraishi, K.: PN2: an elementary model for design and analysis of multi-agent systems. In: Arbab, F., Talcott, C. (eds.) COORDINATION 2002. LNCS, vol. 2315, pp. 220–235. Springer, Heidelberg (2002). doi:10.1007/3-540-46000-4_22

    Chapter  Google Scholar 

  17. Bednarczyk, M.A., Bernardinello, L., Pawłowski, W., Pomello, L.: Modelling mobility with petri hypernets. In: Fiadeiro, J.L., Mosses, P.D., Orejas, F. (eds.) WADT 2004. LNCS, vol. 3423, pp. 28–44. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31959-7_2

    Chapter  Google Scholar 

  18. Lakos, C.A.: A petri net view of mobility. In: Wang, F. (ed.) FORTE 2005. LNCS, vol. 3731, pp. 174–188. Springer, Heidelberg (2005). doi:10.1007/11562436_14

    Chapter  Google Scholar 

  19. Hee, K.M., Lomazova, I.A., Oanea, O., Serebrenik, A., Sidorova, N., Voorhoeve, M.: Nested nets for adaptive systems. In: Donatelli, S., Thiagarajan, P.S. (eds.) ICATPN 2006. LNCS, vol. 4024, pp. 241–260. Springer, Heidelberg (2006). doi:10.1007/11767589_14

    Chapter  Google Scholar 

  20. Cardelli, L., Ghelli, G., Gordon, A.D.: Mobility types for mobile ambients. In: Wiedermann, J., Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 230–239. Springer, Heidelberg (1999). doi:10.1007/3-540-48523-6_20

    Chapter  Google Scholar 

  21. Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, parts 1–2. Inf. Comput. 100, 1–77 (1992)

    Article  MATH  Google Scholar 

  22. Reisig, W.: Petri nets and algebraic specifications. Theor. Comput. Sci. 80, 1–34 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  23. Hoffmann, K., Ehrig, H., Mossakowski, T.: High-level nets with nets and rules as tokens. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 268–288. Springer, Heidelberg (2005). doi:10.1007/11494744_16

    Chapter  Google Scholar 

  24. Lomazova, I.A.: Nested petri nets for adaptive process modeling. In: Avron, A., Dershowitz, N., Rabinovich, A. (eds.) Pillars of Computer Science. LNCS, vol. 4800, pp. 460–474. Springer, Heidelberg (2008). doi:10.1007/978-3-540-78127-1_25

    Chapter  Google Scholar 

  25. Taentzer, G.: Distributed graphs and graph transformation. Appl. Categ. Struct. 7, 431–462 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  26. Ehrig, H., Mahr, B.: Fundamentals of Algebraic Specification. EATCS Monographs on TCS, vol. 6. Springer, Heidelberg (1985)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Köhler-Bußmeier .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Köhler-Bußmeier, M. (2017). Restricting Hornets to Support Self-adaptive Systems. In: van der Aalst, W., Best, E. (eds) Application and Theory of Petri Nets and Concurrency. PETRI NETS 2017. Lecture Notes in Computer Science(), vol 10258. Springer, Cham. https://doi.org/10.1007/978-3-319-57861-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57861-3_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57860-6

  • Online ISBN: 978-3-319-57861-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics