• Keine Ergebnisse gefunden

Problem 1: Acceleration of Control Loops

N/A
N/A
Protected

Academic year: 2021

Aktie "Problem 1: Acceleration of Control Loops"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Concurrency Theory (WS 2010/11) Out: Thu, Dec 22 Due: Mon, Jan 10

Exercise Sheet 9

Jun.-Prof. Roland Meyer, Georgel C˘alin Technische Universit¨at Kaiserslautern

Problem 1: Acceleration of Control Loops

Let

swap

and

m

the word orderings for SREs given in class for proving the lemma:

Let p be a product and ops a sequence of operations. There is a natural number n (linear in the size of p) and a product p

0

such that either L(p⊕ops

n

) = ∅ or L(p

0

) = S

j≥n

L(p⊕ ops

j

).

Find n and p

0

when p = (a + b)

(c + )b

and ops is each of:

?a !b ?c

!a !b ?c ?a

!a ?c !b ?a !c

?c !c !a ?a !b !c !a

Don’t forget to specify to which of the four cases discussed in class each sequence belongs and argue the correctness of your findings.

Problem 2: SRE Inclusion

Use the algorithm given in the lecture to check whether the following SRE inclusions hold:

(a) (a + n + s)

(t + a + n)

⊆ (s + a + n + t + a)

(b) (r + )(p + )(n + t)

⊆ p

(r + )(s + )(n + t)

+ (p + )r

(n + e + t)

(b) (r + )(p + )(n + t)

⊆ (p + r + e)

(s + )(n + t)

Problem 3: Symbolic Verification Algorithm

Using the introduced theory on SREs, checking whether a configuration (q, w) is reachable can be performed by computing the possible symbolic configurations of the system.

A symbolic configuration (q, r) of an lcs consists of the control state q and SRE r describing the possible contents of the channel(s) for control state q.

The set of symbolic configuration initially consists only of the start configuration and is enlarged by computing the effects of single transitions and control loops.

The algorithm stops in either of the cases:

- w ∈ L(r) for some already generated symbolic configuration (q, r)

- for every possible new (q, r) there is an already computed (q, r

0

) such that L(r) ⊆ L(r

0

).

Give a (pseudo)code implementation of the described algorithm.

(2)

Problem 4: Sliding Windows Protocol

Consider the simplified sliding window protocol depicted by the lcs in the figure below.

s

1

s

2

s

3

r

3

r

2

r

1

a?3

s!1 s!2

a?1 a?2 a?3

a?2

a?1 s!2, s!3 a?1

a?3

a?2

s!1, s!3

a!3

s?2 s?3

s?1

s?2 a!1

s?1, s?3 s?3

a!2

s?1, s?2

Use the previous algorithm to determine all reachable configurations of the protocol.

0We wish you aMerry Christmas!and aHappy New Year!. . .See you again in 2,11.

Referenzen

ÄHNLICHE DOKUMENTE

Let ∗ swap and ∗ m the word orderings for SREs given in class for proving the lemma:. Let p be a product and ops a sequence

Let ∗ swap and ∗ m the word orderings for SREs given in class for proving the lemma:. Let p be a product and ops a sequence

Theorem 5.1. If deg Y = 3, then, as before, Y is a surface of minimal degree and so it is covered by lines, which is impossible by Lemma 1.3. If deg Y = 4, then the argument of

Since this is obvious in the product case, let (A, L) not be a product of elliptic curves. The odd halfperiods are base points of |L|.. The Property Nef. The last assertion

The subshift X β is itself not of finite type, because there are infinitely many forbidden words 1110 k 1, k ≥ 0, but by some recoding it is easily seen to be conjugate to an SFT

Then X is isomorphic to the aÆne

Numerical Solution of Partial Differential Equations, SS 2014 Exercise Sheet

For instance, the class of connected graphs follows from the sentencce ∀x∀y(¬Exy → ∃z(Exz ∧Eyz)) with asympotic propability 1.. Of course, each such class K itself has