ABSTRACT
In the renaming task n+1 processes start with unique input names from a large space and must choose unique output names taken from a smaller name space, namely 0,1,...,K. To rule out trivial solutions, a protocol must be anonymous: the value chosen by a process can depend on its input name and on the execution, but not on the specific process id. Attiya et al. showed in 1990 that renaming has a wait-free solution when K<=2n. Several proofs of a lower bound stating that no such protocol exists when K<2n have been published. In this paper we prove that, for certain values of n, this lower bound is incorrect, exhibiting a wait-free renaming protocol for K=2n-1. For the other values of n, we present the first completely combinatorial lower bound proof stating that no such protocol exists when K<2n. More precisely, our main theorem states that there exists a wait-free renaming protocol for K<2n if and only if the set of integers (n+1 choose i+1) | 0 <= i <= floor((n-1)/2)} are relatively prime. Thus, such protocol exists for six processes, and not for less. The proof of the theorem uses combinatorial topology techniques, both for the lower bound and to derive the renaming protocol.
- H. Attiya & S. Rajsbaum. The Combinatorial Structure of Wait-Free Solvable Tasks. SIAM Journal on Computing 31(4): 1286--1313 (2002). Google ScholarDigital Library
- H. Attiya, A. Bar-Noy & D. Dolev. Sharing Memory Robustly in Message-Passage Systems. Journal of the ACM 42(1): 124--142 (1995). Google ScholarDigital Library
- H. Attiya, A. Bar-Noy, D. Dolev, D. Peleg & R. Reischuck. Renaming in Asynchronous Environment. Journal of the ACM 37(3): 524--548 (1990). Google ScholarDigital Library
- H. Attiya & J. Welch. Distributed Computing: Fundamentals, Simulations and Advanced Topics. McGraw-Hill 1998. Google ScholarDigital Library
- E. Borowsky & E. Gafni. A Simple Algorithmically Reasoned Characterization of Wait-Free Computations. In: Proceedings of the 16th. Annual ACM Symposium on Principles on Distributed Computing, pp. 189--198 (1997). Google ScholarDigital Library
- E. Borowsky & E. Gafni. Generalized FLP Impossibility Result for t-Resilient Asynchronous Computations. In: Proceedings of the 25th. Annual ACM Symposium on Theory of Computing, pp. 91--100 (1993). Google ScholarDigital Library
- E. Borowsky & E. Gafni. Immediate Atomic Snapshots and Fast Renaming. In: Proceedings of the 12th. Annual ACM Symposium on Principles on Distributed Computing, pp. 41--51 (1993). Google ScholarDigital Library
- A. Castaneda & S. Rajsbaum. New Combinatorial Topology Upper and Lower Bounds for Renaming. In: Publicacion Preliminar del Instituto de Matemáticas de la Universidad Nacional Autonoma de México (June 9, 2008). http://www.matem.unam.mx/~rajsbaum/podc08.html Google ScholarDigital Library
- J. B. Dence & T. P. Dence. Elements of the Theory of Numbers. Academic Press 1999.Google Scholar
- K. Fan. Simplicial Maps from an Orientable n-Pseudomanifold into S^m with the Octahedral Triangulation. Journal of Combinatorial Theory 2: 588-602 (1967).Google ScholarCross Ref
- E. Gafni, S. Rajsbaum & M. Herlihy. Subconsensus tasks: renaming is weaker than set agreement In: 20th Int. Symp. Distributed Computing (DISC), Lecture Notes in Computer Science 4167, Springer, pp.329--338, (2006). Google ScholarDigital Library
- M. Henle. A Combinatorial Introduction to Topology. Dover 1994.Google Scholar
- M. Herlihy & S. Rajsbaum. Algebraic Spans. Mathematical Structures in Computer Science 10(4): 549--573 (2000). Google ScholarDigital Library
- M. Herlihy & N. Shavit. The asynchronous computability theorem for t-resilient tasks. In: Proc. of the 25th ACM Symposium on the Theory of Computing, 111--120 (1993). Google ScholarDigital Library
- M. Herlihy & N. Shavit. The Topological Structure of Asynchronous Computability. Journal of the ACM 46(6): 858--923 (1999). Google ScholarDigital Library
- H. Hopf. Abbildungklassen n-dimensionaler Mannigfaltigkeiten. Math. Ann. 96: pp. 209--224 (1927).Google ScholarCross Ref
- J. R. Munkres. Elements of Algebraic Topology. Addison-Wesley 1993.Google Scholar
- M. Saks & F. Zaharoglou, Wait-Free k-Set Agreement Is Impossible: The Topology of Public Knowledge. SIAM J. on Computing 29(5), 1449--1483 (2000). Google ScholarDigital Library
Index Terms
- New combinatorial topology upper and lower bounds for renaming
Recommendations
New combinatorial topology bounds for renaming: The upper bound
In the renaming task, n+1 processes start with unique input names from a large space and must choose unique output names taken from a smaller name space, 0,1,…, K. To rule out trivial solutions, a protocol must be anonymous: the value chosen by a ...
New combinatorial topology bounds for renaming: the lower bound
In the renaming task n + 1 processes start with unique input names taken from a large space and must choose unique output names taken from a smaller name space, 0, 1, . . . , K. To rule out trivial solutions, a protocol must be anonymous: the value ...
Bounds on the Step and Namespace Complexity of Renaming
The $M(n)$-renaming task requires $n+1$ processes, each starting with a unique input name (from an arbitrary large range), to coordinate the choice of new output names from a range of size $M(n)$. It is known that $2n$-renaming can be solved if and only if $n+...
Comments