Leadership Election: An Industrial SoS Application of Compositional Deadlock Verification

In distributed computing, the leadership election has been used to distributively designate a node as the central controlleri¾?leader of a network of nodes. The complexity of the algorithm arises due to the unawareness of every node of who the current leader is. After running the algorithm, however, a unique node in the network must be elected as the leader and recognized as so by the remaining nodes. In this paper, using CSP, we formalise the leadership election algorithm used by our industrial partner. Its verification is feasible only due to the use of a pattern based strategy that allows the verification to be carried out in a fully local manner. The pattern used here is novel and a further contribution of the paper. A refinement relation together with predicate abstraction is used to describe pattern conformance. The mechanisation of the behavioural conformance is carried out using FDR.

[1]  Alberto L. Sangiovanni-Vincentelli,et al.  Runtime deadlock analysis for system level design , 2009, Des. Autom. Embed. Syst..

[2]  A. W. Roscoe,et al.  The Pursuit of Deadlock freedom , 1987, Inf. Comput..

[3]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[4]  Augusto Sampaio,et al.  Conformance notions for the coordination of interaction components , 2010, Sci. Comput. Program..

[5]  A. W. Roscoe,et al.  Deadlock analysis in networks of communicating processes , 1989, Distributed Computing.

[6]  David Garlan,et al.  Specifying and Analyzing Dynamic Software Architectures , 1998, FASE.

[7]  Perdita Stevens,et al.  Modelling Recursive Calls with UML State Diagrams , 2003, FASE.

[8]  Frantisek Plasil,et al.  Behavior Protocols for Software Components , 2002, IEEE Trans. Software Eng..

[9]  Jifeng He,et al.  A Theory of Reactive Components , 2006, FACS.

[10]  Paolo Ciancarini,et al.  Architecting families of software systems with process algebras , 2002, TSEM.

[11]  Shing-Chi Cheung,et al.  Context constraints for compositional reachability analysis , 1996, TSEM.

[12]  Augusto Sampaio,et al.  Systematic Development of Trustworthy Component Systems , 2009, FM.

[13]  A. W. Roscoe Understanding Concurrent Systems , 2010, Texts in Computer Science.

[14]  Ana Cavalcanti,et al.  FM 2009: Formal Methods, Second World Congress, Eindhoven, The Netherlands, November 2-6, 2009. Proceedings , 2009, FM.

[15]  Hector Garcia-Molina,et al.  Elections in a Distributed Computing System , 1982, IEEE Transactions on Computers.