Skip to main content

The need for headers: An impossibility result for communication over unreliable channels

  • Selected Presentations
  • Conference paper
  • First Online:
Book cover CONCUR '90 Theories of Concurrency: Unification and Extension (CONCUR 1990)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 458))

Included in the following conference series:

Abstract

It is proved that any protocol that constructs a reliable data link service using an unreliable physical channel service necessarily includes in the packets some header information that enables the protocol to treat different packets differently. The physical channel considered is permitted to lose, but not reorder or duplicate packets. The formal framework used for the proof is the I/O automaton model.

The authors were supported in part by the National Science Foundation under grant CCR-86-11442, by the Office of Naval Research under contract N00014-85-K-0168 and by the Defense Advanced Research Projects Agency under contracts N00014-83-K-0125 and N00014-89-J-1988. The first author was supported in part by the Research Foundation for Information Technology of the University of Sydney.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Attiya, H., Fischer, M., Wang, D.-W., and Zuck, L., “Reliable Communication Using Unreliable Channels”, manuscript.

    Google Scholar 

  2. Bartlett, K., Scantlebury, R., and Wilkinson, P., “A Note on Reliable Full-Duplex Transmission over Half-Duplex Links” Communications of the ACM, 12(5):260–261, May 1969.

    Google Scholar 

  3. Bloom, B., “Constructing Two-Writer Atomic Registers” Proceedings of 6th ACM Symposium on Principles of Distributed Computing, pp. 249–259, August 1987.

    Google Scholar 

  4. Chou, C.-T., and Gafni, E., “Understanding and Verifying Distributed Algorithms Using Stratified Decomposition” Proceedings of 7th ACM Symposium on Principles of Distributed Computing, pp. 44–65, August 1988.

    Google Scholar 

  5. Fekete, A., Lynch, N., and Shrira, L., “A Modular Proof of Correctness for a Network Synchronizer” Proceedings of the 2nd International Workshop on Distributed Algorithms, Amsterdam, Netherlands, July 1987, (J. van Leeuwen, ed), pp. 219–256. Lecture Notes in Computer Science 312, Springer-Verlag.

    Google Scholar 

  6. Fekete, A., Lynch, N. A., Mansour, Y. and Spinelli, J., “The Data Link Layer: The Imposibility of Implementation in Face of Crashes”, Technical Memo, TM-355b, Laboratory for Computer Science, Massachusetts Institute of Technology.

    Google Scholar 

  7. Fekete, A, Lynch, N., Merritt, M., and Weihl, W., “Commutativity-Based Locking for Nested Transactions” to appear in JCSS.

    Google Scholar 

  8. Lynch, N., and Goldman, K., “Distributed Algorithms” Research Seminar Series MIT/LCS/RSS-5, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA, 1989.

    Google Scholar 

  9. Lynch, N. A., Mansour, Y. and Fekete, A., “Data Link Layer: Two Impossibility Results,” Proceedings of 7th ACM Symposium on Principles of Distributed Computing, pp. 149–170, August 1988.

    Google Scholar 

  10. Lynch N. A. and Tuttle M. R., “Hierarchical Correctness Proofs for Distributed Algorithms,” Proceedings of the 6th ACM Symposium on Principles of Distributed Computing, pp. 137–151, August 1987.

    Google Scholar 

  11. Lynch, N., and Tuttle, M., “An Introduction to Input/Output Automata” CWI Quarterly, 2(3):219–246, September 1989.

    Google Scholar 

  12. Lynch, N., “A Hundred Impossibility Proofs for Distributed Computing”, Proceedings of 8th ACM Symposium on Principles of Distributed Computing, pp. 1–28, August 1989.

    Google Scholar 

  13. Mansour, Y., and Schieber, B., “The Intractability of Bounded Protocols for non-FIFO Channels” Proceedings of 8th ACM Symposium on Principles of Distributed Computing, pp. 59–72, August 1989.

    Google Scholar 

  14. Nipkow, T., “Proof Transformations for Equational Theories” Proceedings of 5th Annual IEEE Symposium on Logic in Computer Science, pp. 278–288, June 1990.

    Google Scholar 

  15. Stenning, N., “A Data Transfer Protocol” Computer Networks, 1:99–110, 1976.

    Google Scholar 

  16. Troxel, G., “A Hierarchical Proof of an Algorithm for Deadlock Recovery in a System using Remote Procedure Calls” MS thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science Cambridge, MA. January, 1990.

    Google Scholar 

  17. Welch, J., Lamport, L., and Lynch, N., “A Lattice-Structured Proof of a Minimum Spanning tree Algorithm” Proceedings of 7th ACM Symposium on Principles of Distributed Computing, pp. 28–43, August 1988.

    Google Scholar 

  18. Wang, D.-W., and Zuck, L., “Tight Bounds for the Sequence Transmission Problem”, Proceedings of 8th ACM Symposium on Principles of Distributed Computing, pp. 73–84, August 1989.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

J. C. M. Baeten J. W. Klop

Rights and permissions

Reprints and permissions

Copyright information

© 1990 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fekete, A., Lynch, N. (1990). The need for headers: An impossibility result for communication over unreliable channels. In: Baeten, J.C.M., Klop, J.W. (eds) CONCUR '90 Theories of Concurrency: Unification and Extension. CONCUR 1990. Lecture Notes in Computer Science, vol 458. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0039061

Download citation

  • DOI: https://doi.org/10.1007/BFb0039061

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53048-0

  • Online ISBN: 978-3-540-46395-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics