Abstract
Adaptivity plays a major role in the context of cyber physical systems (among them sensor networks, mobile adhoc networks, etc.), also known as the internet of things. Since the interaction of sensors and actors as well as their evolution plays a major role in this context, we concentrate on protocols and their adaption in this paper. Whenever we adapt protocols we typically have to modify more than one part of the interaction, i.e. adaptation becomes a distributed activity. As Petri nets are an established means to formalise distributed activities, we have chosen them for adaption-protocols as well.
Since our adaption-protocol nets operate on protocol nets, we obtain a recursive structure as manifested in the nets-within-netsparadigm proposed by Rüdiger Valk. In this paper we study self-adaptive systems in the formalism of Hornets. Hornets are algebraic Petri nets that have nets as tokens.
In previous work we have shown that the reachability problem for safe elementary Hornets requires at least exponential space. To obtain a complexity that is feasible for run-time verification we study structural restrictions of elementary Hornets. It turns out that reachability is in PSpace again for the class of so called fan-bounded Hornets, where the number of places in the pre- and postset is used as a parameter. This class includes – among others – the well known class of State Machines.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Of course, this has consequences for the possible modifications on net-tokens. E.g. an operator \(\sigma ^\mathcal {I}\) which appends a fresh place contradicts finiteness of \(P_k\). Therefore, the boundary case where the net-token already contains all possible places has to be defined as an exception. From a practical perspective the possibility to generate net-tokens of unbounded size might also indicate a modelling problem.
- 2.
The superscript H indicates that the function is used for Hornets.
- 3.
In the following we use \( const \) to denote some constant. Nevertheless, different occurrences may denote different constants.
- 4.
Note, that while the bound we have given for the general case in Lemma 2.1 in [10] is strict (i.e. there are Hornets that exactly have this number of object-nets) the calculation given here gives us only an upper bound.
References
Floerkemeier, C., Langheinrich, M., Fleisch, E., Mattern, F., Sarma, S.E. (eds.): The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26–28, 2008. Proceedings. LNCS, vol. 4952. Springer, Heidelberg (2008)
Valk, R.: Modelling concurrency by task/flow EN systems. In: 3rd Workshop on Concurrency and Compositionality. Number 191 in GMD-Studien, St. Augustin, Bonn, Gesellschaft für Mathematik und Datenverarbeitung (1991)
Valk, R.: Object petri nets: using the nets-within-nets paradigm. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) ACPN 2003. LNCS, vol. 3098, pp. 819–848. Springer, Heidelberg (2004). doi:10.1007/978-3-540-27755-2_23
Köhler-Bußmeier, M.: Hornets: nets within nets combined with net algebra. In: Franceschinis, G., Wolf, K. (eds.) PETRI NETS 2009. LNCS, vol. 5606, pp. 243–262. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02424-5_15
Köhler-Bußmeier, M., Heitmann, F.: On the expressiveness of communication channels for object nets. Fundamenta Informaticae 93, 205–219 (2009)
Köhler, M., Rölke, H.: Properties of object petri nets. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol. 3099, pp. 278–297. Springer, Heidelberg (2004). doi:10.1007/978-3-540-27793-4_16
Köhler-Bußmeier, M., Heitmann, F.: Safeness for object nets. Fundamenta Informaticae 101, 29–43 (2010)
Köhler-Bußmeier, M., Heitmann, F.: Liveness of safe object nets. Fundamenta Informaticae 112, 73–87 (2011)
Köhler-Bußmeier, M.: A survey on decidability results for elementary object systems. Fundamenta Informaticae 130, 99–123 (2014)
Köhler-Bußmeier, M.: On the complexity of the reachability problem for safe, elementary Hornets. Fundamenta Informaticae 129, 101–116 (2014). Dedicated to the Memory of Professor Manfred Kudlek
Lipton, R.J.: The reachability problem requires exponential space. Research report 62, Department of Computer science (1976)
Köhler-Bußmeier, M., Heitmann, F.: An upper bound for the reachability problem of safe, elementary hornets. Fundamenta Informaticae 143, 89–100 (2016)
Lomazova, I.A.: Nested Petri nets - a formalism for specification of multi-agent distributed systems. Fundamenta Informaticae 43, 195–214 (2000)
Xu, D., Deng, Y.: Modeling mobile agent systems with high level Petri nets. In: IEEE International Conference on Systems, Man, and Cybernetics 2000 (2000)
Kummer, O.: Referenznetze. Logos Verlag, Berlin (2002)
Hiraishi, K.: PN2: an elementary model for design and analysis of multi-agent systems. In: Arbab, F., Talcott, C. (eds.) COORDINATION 2002. LNCS, vol. 2315, pp. 220–235. Springer, Heidelberg (2002). doi:10.1007/3-540-46000-4_22
Bednarczyk, M.A., Bernardinello, L., Pawłowski, W., Pomello, L.: Modelling mobility with petri hypernets. In: Fiadeiro, J.L., Mosses, P.D., Orejas, F. (eds.) WADT 2004. LNCS, vol. 3423, pp. 28–44. Springer, Heidelberg (2005). doi:10.1007/978-3-540-31959-7_2
Lakos, C.A.: A petri net view of mobility. In: Wang, F. (ed.) FORTE 2005. LNCS, vol. 3731, pp. 174–188. Springer, Heidelberg (2005). doi:10.1007/11562436_14
Hee, K.M., Lomazova, I.A., Oanea, O., Serebrenik, A., Sidorova, N., Voorhoeve, M.: Nested nets for adaptive systems. In: Donatelli, S., Thiagarajan, P.S. (eds.) ICATPN 2006. LNCS, vol. 4024, pp. 241–260. Springer, Heidelberg (2006). doi:10.1007/11767589_14
Cardelli, L., Ghelli, G., Gordon, A.D.: Mobility types for mobile ambients. In: Wiedermann, J., Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 230–239. Springer, Heidelberg (1999). doi:10.1007/3-540-48523-6_20
Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, parts 1–2. Inf. Comput. 100, 1–77 (1992)
Reisig, W.: Petri nets and algebraic specifications. Theor. Comput. Sci. 80, 1–34 (1991)
Hoffmann, K., Ehrig, H., Mossakowski, T.: High-level nets with nets and rules as tokens. In: Ciardo, G., Darondeau, P. (eds.) ICATPN 2005. LNCS, vol. 3536, pp. 268–288. Springer, Heidelberg (2005). doi:10.1007/11494744_16
Lomazova, I.A.: Nested petri nets for adaptive process modeling. In: Avron, A., Dershowitz, N., Rabinovich, A. (eds.) Pillars of Computer Science. LNCS, vol. 4800, pp. 460–474. Springer, Heidelberg (2008). doi:10.1007/978-3-540-78127-1_25
Taentzer, G.: Distributed graphs and graph transformation. Appl. Categ. Struct. 7, 431–462 (1999)
Ehrig, H., Mahr, B.: Fundamentals of Algebraic Specification. EATCS Monographs on TCS, vol. 6. Springer, Heidelberg (1985)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Köhler-Bußmeier, M. (2017). Restricting Hornets to Support Self-adaptive Systems. In: van der Aalst, W., Best, E. (eds) Application and Theory of Petri Nets and Concurrency. PETRI NETS 2017. Lecture Notes in Computer Science(), vol 10258. Springer, Cham. https://doi.org/10.1007/978-3-319-57861-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-57861-3_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57860-6
Online ISBN: 978-3-319-57861-3
eBook Packages: Computer ScienceComputer Science (R0)