skip to main content
10.1145/1400751.1400791acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article

New combinatorial topology upper and lower bounds for renaming

Authors Info & Claims
Published:18 August 2008Publication History

ABSTRACT

In the renaming task n+1 processes start with unique input names from a large space and must choose unique output names taken from a smaller name space, namely 0,1,...,K. To rule out trivial solutions, a protocol must be anonymous: the value chosen by a process can depend on its input name and on the execution, but not on the specific process id. Attiya et al. showed in 1990 that renaming has a wait-free solution when K<=2n. Several proofs of a lower bound stating that no such protocol exists when K<2n have been published. In this paper we prove that, for certain values of n, this lower bound is incorrect, exhibiting a wait-free renaming protocol for K=2n-1. For the other values of n, we present the first completely combinatorial lower bound proof stating that no such protocol exists when K<2n. More precisely, our main theorem states that there exists a wait-free renaming protocol for K<2n if and only if the set of integers (n+1 choose i+1) | 0 <= i <= floor((n-1)/2)} are relatively prime. Thus, such protocol exists for six processes, and not for less. The proof of the theorem uses combinatorial topology techniques, both for the lower bound and to derive the renaming protocol.

References

  1. H. Attiya &amp; S. Rajsbaum. The Combinatorial Structure of Wait-Free Solvable Tasks. SIAM Journal on Computing 31(4): 1286--1313 (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Attiya, A. Bar-Noy &amp; D. Dolev. Sharing Memory Robustly in Message-Passage Systems. Journal of the ACM 42(1): 124--142 (1995). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Attiya, A. Bar-Noy, D. Dolev, D. Peleg &amp; R. Reischuck. Renaming in Asynchronous Environment. Journal of the ACM 37(3): 524--548 (1990). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Attiya &amp; J. Welch. Distributed Computing: Fundamentals, Simulations and Advanced Topics. McGraw-Hill 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Borowsky &amp; E. Gafni. A Simple Algorithmically Reasoned Characterization of Wait-Free Computations. In: Proceedings of the 16th. Annual ACM Symposium on Principles on Distributed Computing, pp. 189--198 (1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Borowsky &amp; E. Gafni. Generalized FLP Impossibility Result for t-Resilient Asynchronous Computations. In: Proceedings of the 25th. Annual ACM Symposium on Theory of Computing, pp. 91--100 (1993). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Borowsky &amp; E. Gafni. Immediate Atomic Snapshots and Fast Renaming. In: Proceedings of the 12th. Annual ACM Symposium on Principles on Distributed Computing, pp. 41--51 (1993). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Castaneda &amp; S. Rajsbaum. New Combinatorial Topology Upper and Lower Bounds for Renaming. In: Publicacion Preliminar del Instituto de Matemáticas de la Universidad Nacional Autonoma de México (June 9, 2008). http://www.matem.unam.mx/~rajsbaum/podc08.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. B. Dence &amp; T. P. Dence. Elements of the Theory of Numbers. Academic Press 1999.Google ScholarGoogle Scholar
  10. K. Fan. Simplicial Maps from an Orientable n-Pseudomanifold into S^m with the Octahedral Triangulation. Journal of Combinatorial Theory 2: 588-602 (1967).Google ScholarGoogle ScholarCross RefCross Ref
  11. E. Gafni, S. Rajsbaum &amp; M. Herlihy. Subconsensus tasks: renaming is weaker than set agreement In: 20th Int. Symp. Distributed Computing (DISC), Lecture Notes in Computer Science 4167, Springer, pp.329--338, (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Henle. A Combinatorial Introduction to Topology. Dover 1994.Google ScholarGoogle Scholar
  13. M. Herlihy &amp; S. Rajsbaum. Algebraic Spans. Mathematical Structures in Computer Science 10(4): 549--573 (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Herlihy &amp; N. Shavit. The asynchronous computability theorem for t-resilient tasks. In: Proc. of the 25th ACM Symposium on the Theory of Computing, 111--120 (1993). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Herlihy &amp; N. Shavit. The Topological Structure of Asynchronous Computability. Journal of the ACM 46(6): 858--923 (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Hopf. Abbildungklassen n-dimensionaler Mannigfaltigkeiten. Math. Ann. 96: pp. 209--224 (1927).Google ScholarGoogle ScholarCross RefCross Ref
  17. J. R. Munkres. Elements of Algebraic Topology. Addison-Wesley 1993.Google ScholarGoogle Scholar
  18. M. Saks &amp; F. Zaharoglou, Wait-Free k-Set Agreement Is Impossible: The Topology of Public Knowledge. SIAM J. on Computing 29(5), 1449--1483 (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. New combinatorial topology upper and lower bounds for renaming

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      PODC '08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
      August 2008
      474 pages
      ISBN:9781595939890
      DOI:10.1145/1400751

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 August 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate740of2,477submissions,30%

      Upcoming Conference

      PODC '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader