SlideShare a Scribd company logo
Verifying Deadlock and Lifelock Freedom in an SOA scenario Karsten Wolf   Universität Rostock Christian Stahl  Eindhoven University of Technology Janine Ott  Humboldt-Universität zu Berlin Robert Danitz  Humboldt-Universität zu Berlin
Intro: Services Business Process Workflow net asynchronous Interorganisational Org 1 Org 2 Org 3 Service Petri net Initial marking Final markings Interface
Intro:   SOA Petri net Service Provider Service Broker Service Requester Petri net publish find bind Once per Service Many times
Correctness (of Requester  ⊕  Provider) Deadlock  = non-final state without enabled transition Livelock  = terminal SCC in state space without final state Message overflow  = more than k messages of one type in a channel Correctness I  (next talk):  no deadlocks, no message overflow Correctness II  (this talk): no deadlocks,  no livelocks , no message overflow
Naive Approach Publish  Store published service Find Compose Provider and Requester Model-Check  AG (no message overflow)  ⋀ AG EF final  Most costs at  Find
Our Approach Publish  Compute fragments of state space (Provider  ⊕ Requester) where no message overflow occurs Reduce these fragments Find Glue suitable reduced fragments Model-Check  AG EF final  Some costs shifted to  Publish
Partners Given service P, the set of (correct II)-partners has top elements in the simulation preorder One deterministic  most permissive partner  can be computed  [Wolf, LNCS ToPNoC II]  most permissive partner !€ !C ?B !€ !T ?B !€ !C ?B !T ?B ?€ ?C ?T !B !B !T !€ ?B !C !€ ?B .... !€ !€ !€ !T !T !C !C ?B ?B
Main Observation ?€ ?C ?T !B !B !€ !€ !€ !T !T !C !C ?B ?B ⊕ =  Every composed system can be built by plugging fragments and  connectors, controlled by the simulation to the most permissive partner  ?€ ?C ?T !B !B !€ !C ?B ⊕ = Fragment Connector
Additional Idea Apply state space reduction collapse fragment-internal strongly connected components apply local reduction rules [Murata] Both preserve deadlock-freedom and livelock freedom
Effect ?€ ?T !B !B !€ !C ?B ⊕ = ( )
Applied rules ... Remove redundant transition Collapse sequence Merge equivalent nodes Challenge: Local rules must be valid in  every  combination of fragements/connectors
Approach (Summary) Publish phase: Input: P Compute most permissive partner Compose them and extract fragments/connectors Reduce fragments and store them ?€ ?C !B !€ !€ !T !T !C !C ?B ?B ?T !B
Approach (Summary) Find phase: Input: R Find simulation to most permissive partner Compose corresponding fragments Modelcheck deadlock and livelock freedom !€ !€ !T !T !C !C ?B ?B !€ !C ?B !€ !C ?B 
Experimental Results 04:41:09 2.1 3.6 14,073 24,688 494 19 160 Process IV 01:13:27 2.2 4.5 513 1,071 3,744 13 992 Process III 00:00:31 3.6 4.6 4,130 7,344 758 13 244 Process II 00:00:26 1.8 2.4 1,575 2156 468,072 20 97,511 Process I 00:00:09 6.0 320.0 112 2,239 2,927 6 1,057 Registration 03:43:13 3.4 10.8 4,082 13,148 34,947 12 8,345 SMTP Protocol 00:04:18 7.1 30.6 10,097 43,848 1,476 10 574 5 Dining Phil 00:00:01 2.6 7.5 172 499 70 6 46 3 Dining Phil 00:00:01 1.6 3.4 18 37 8 7 57 Beverage Mach. 00:00:05 2.3 11.0 16 77 744 8 308 Online Shop II 00:00:03 2.4 11.4 29 137 463 7 205 Online Shop I 00:00:23 2.0 2.3 570 672 11 12 10 Travel Service II 00:00:01 1.8 2.1 100 120 7 8 7 Travel Service I 00:00:01 1.6 2.1 25 33 6 6 6 Olive Oil Order 00:00:04 1.9 2.8 317 464 15 10 12 Purchase Order 00:00:01 2.1 6.1 15 43 33 6 26 Loan Approval hh:mm:ss St./Frag. red St./Frag. full St. red. St. full Trans. Mess. Types States Time P  ⊕ most perm. partner(P)   P Name
Discussion Size of fragments reduced to avg. < 10    Costs for  find  proportional to  number  of fragments = size of simulation Finding simulation is easy since most permissive partner is deterministic    Model checking efficient Runtime peaks caused by checking application condition of a particular rule    Time/Quality trade-offs possible A-posteriori state space reduction different from typical on-the-fly reduction Conclusion:  Approach feasible

More Related Content

PPTX
Chapter 4 record storage and primary file organization
PPT
File organization techniques
PPT
File organization and indexing
PPTX
Acid properties
PPTX
Dbms acid
PPTX
4 Main Challenges in Data Backup & Recovery
PPT
Databases: Locking Methods
PPT
File organization
Chapter 4 record storage and primary file organization
File organization techniques
File organization and indexing
Acid properties
Dbms acid
4 Main Challenges in Data Backup & Recovery
Databases: Locking Methods
File organization

Viewers also liked (20)

PPT
Transaction concurrency control
PPT
17. Recovery System in DBMS
PDF
03 Data Recovery - Notes
PPTX
File Organization
PPT
Lecture 10 distributed database management system
PDF
Lovelock ppt chapter_01.ppt
PPTX
Object oriented database model
PPT
12. Indexing and Hashing in DBMS
PPT
11. Storage and File Structure in DBMS
PPT
Transaction management
PPT
Chapter 7 - Deadlocks
PPTX
database recovery techniques
PPT
15. Transactions in DBMS
PPT
Distributed Database System
PPTX
Distributed database
PPTX
Deadlock ppt
PPT
Distributed Database Management System
PDF
Data warehouse architecture
PPT
Transaction processing system
Transaction concurrency control
17. Recovery System in DBMS
03 Data Recovery - Notes
File Organization
Lecture 10 distributed database management system
Lovelock ppt chapter_01.ppt
Object oriented database model
12. Indexing and Hashing in DBMS
11. Storage and File Structure in DBMS
Transaction management
Chapter 7 - Deadlocks
database recovery techniques
15. Transactions in DBMS
Distributed Database System
Distributed database
Deadlock ppt
Distributed Database Management System
Data warehouse architecture
Transaction processing system
Ad

Similar to Verifying Deadlock and Livelock Freedom in an SOA Scenario (9)

PPT
Operating Guidelines for Finite-State Services
PDF
1663 1669
PDF
1663 1669
PDF
7 Deadlocks
PPTX
Deadlock Detection Algorithm
PPT
Operating Guidelines for Petri Net Based Services Models
PPT
Partner Generation for Petri Net Based Service Models
PPTX
Insights on On-demand Media Streaming Progress
PPTX
os Module-5 ppt (1).pptx.........................
Operating Guidelines for Finite-State Services
1663 1669
1663 1669
7 Deadlocks
Deadlock Detection Algorithm
Operating Guidelines for Petri Net Based Services Models
Partner Generation for Petri Net Based Service Models
Insights on On-demand Media Streaming Progress
os Module-5 ppt (1).pptx.........................
Ad

More from Universität Rostock (20)

PDF
Pragmatic model checking: from theory to implementations
PDF
Where did I go wrong? Explaining errors in process models
PDF
Decidability Results for Choreography Realization
PDF
Artifact-centric modeling using BPMN
PDF
Compliance by Design for Artifact-Centric Business Processes
KEY
Verification with LoLA
KEY
Verification with LoLA: 7 Implementation
KEY
Verification with LoLA: 6 Integrating LoLA
KEY
Verification with LoLA: 5 Case Studies
KEY
Verification with LoLA: 4 Using LoLA
KEY
Verification with LoLA: 3 State Space Reduction
KEY
Verification with LoLA: 1 Basics
KEY
Verification with LoLA: 2 The LoLA Input Language
PDF
Saarbruecken
PDF
Ws4 dsec talk @ Kickoff RS3
PDF
Internal Behavior Reduction for Services
PDF
Karsten Wolf @ Carl Adam Petri Memorial Symposium
PDF
Implementation of an Interleaving Semantics for TLDA
PDF
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
PDF
Demonstration of BPEL2oWFN and Fiona
Pragmatic model checking: from theory to implementations
Where did I go wrong? Explaining errors in process models
Decidability Results for Choreography Realization
Artifact-centric modeling using BPMN
Compliance by Design for Artifact-Centric Business Processes
Verification with LoLA
Verification with LoLA: 7 Implementation
Verification with LoLA: 6 Integrating LoLA
Verification with LoLA: 5 Case Studies
Verification with LoLA: 4 Using LoLA
Verification with LoLA: 3 State Space Reduction
Verification with LoLA: 1 Basics
Verification with LoLA: 2 The LoLA Input Language
Saarbruecken
Ws4 dsec talk @ Kickoff RS3
Internal Behavior Reduction for Services
Karsten Wolf @ Carl Adam Petri Memorial Symposium
Implementation of an Interleaving Semantics for TLDA
Formale Fundierung und effizientere Implementierung der schrittbasierten TLDA...
Demonstration of BPEL2oWFN and Fiona

Recently uploaded (20)

PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
RMMM.pdf make it easy to upload and study
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Complications of Minimal Access Surgery at WLH
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
What if we spent less time fighting change, and more time building what’s rig...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Weekly quiz Compilation Jan -July 25.pdf
Final Presentation General Medicine 03-08-2024.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Yogi Goddess Pres Conference Studio Updates
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
RMMM.pdf make it easy to upload and study
Paper A Mock Exam 9_ Attempt review.pdf.
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Microbial diseases, their pathogenesis and prophylaxis
Supply Chain Operations Speaking Notes -ICLT Program
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Updated Idioms and Phrasal Verbs in English subject
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Complications of Minimal Access Surgery at WLH
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Verifying Deadlock and Livelock Freedom in an SOA Scenario

  • 1. Verifying Deadlock and Lifelock Freedom in an SOA scenario Karsten Wolf Universität Rostock Christian Stahl Eindhoven University of Technology Janine Ott Humboldt-Universität zu Berlin Robert Danitz Humboldt-Universität zu Berlin
  • 2. Intro: Services Business Process Workflow net asynchronous Interorganisational Org 1 Org 2 Org 3 Service Petri net Initial marking Final markings Interface
  • 3. Intro: SOA Petri net Service Provider Service Broker Service Requester Petri net publish find bind Once per Service Many times
  • 4. Correctness (of Requester ⊕ Provider) Deadlock = non-final state without enabled transition Livelock = terminal SCC in state space without final state Message overflow = more than k messages of one type in a channel Correctness I (next talk): no deadlocks, no message overflow Correctness II (this talk): no deadlocks, no livelocks , no message overflow
  • 5. Naive Approach Publish Store published service Find Compose Provider and Requester Model-Check AG (no message overflow) ⋀ AG EF final Most costs at Find
  • 6. Our Approach Publish Compute fragments of state space (Provider ⊕ Requester) where no message overflow occurs Reduce these fragments Find Glue suitable reduced fragments Model-Check AG EF final Some costs shifted to Publish
  • 7. Partners Given service P, the set of (correct II)-partners has top elements in the simulation preorder One deterministic most permissive partner can be computed [Wolf, LNCS ToPNoC II] most permissive partner !€ !C ?B !€ !T ?B !€ !C ?B !T ?B ?€ ?C ?T !B !B !T !€ ?B !C !€ ?B .... !€ !€ !€ !T !T !C !C ?B ?B
  • 8. Main Observation ?€ ?C ?T !B !B !€ !€ !€ !T !T !C !C ?B ?B ⊕ =  Every composed system can be built by plugging fragments and connectors, controlled by the simulation to the most permissive partner ?€ ?C ?T !B !B !€ !C ?B ⊕ = Fragment Connector
  • 9. Additional Idea Apply state space reduction collapse fragment-internal strongly connected components apply local reduction rules [Murata] Both preserve deadlock-freedom and livelock freedom
  • 10. Effect ?€ ?T !B !B !€ !C ?B ⊕ = ( )
  • 11. Applied rules ... Remove redundant transition Collapse sequence Merge equivalent nodes Challenge: Local rules must be valid in every combination of fragements/connectors
  • 12. Approach (Summary) Publish phase: Input: P Compute most permissive partner Compose them and extract fragments/connectors Reduce fragments and store them ?€ ?C !B !€ !€ !T !T !C !C ?B ?B ?T !B
  • 13. Approach (Summary) Find phase: Input: R Find simulation to most permissive partner Compose corresponding fragments Modelcheck deadlock and livelock freedom !€ !€ !T !T !C !C ?B ?B !€ !C ?B !€ !C ?B 
  • 14. Experimental Results 04:41:09 2.1 3.6 14,073 24,688 494 19 160 Process IV 01:13:27 2.2 4.5 513 1,071 3,744 13 992 Process III 00:00:31 3.6 4.6 4,130 7,344 758 13 244 Process II 00:00:26 1.8 2.4 1,575 2156 468,072 20 97,511 Process I 00:00:09 6.0 320.0 112 2,239 2,927 6 1,057 Registration 03:43:13 3.4 10.8 4,082 13,148 34,947 12 8,345 SMTP Protocol 00:04:18 7.1 30.6 10,097 43,848 1,476 10 574 5 Dining Phil 00:00:01 2.6 7.5 172 499 70 6 46 3 Dining Phil 00:00:01 1.6 3.4 18 37 8 7 57 Beverage Mach. 00:00:05 2.3 11.0 16 77 744 8 308 Online Shop II 00:00:03 2.4 11.4 29 137 463 7 205 Online Shop I 00:00:23 2.0 2.3 570 672 11 12 10 Travel Service II 00:00:01 1.8 2.1 100 120 7 8 7 Travel Service I 00:00:01 1.6 2.1 25 33 6 6 6 Olive Oil Order 00:00:04 1.9 2.8 317 464 15 10 12 Purchase Order 00:00:01 2.1 6.1 15 43 33 6 26 Loan Approval hh:mm:ss St./Frag. red St./Frag. full St. red. St. full Trans. Mess. Types States Time P ⊕ most perm. partner(P) P Name
  • 15. Discussion Size of fragments reduced to avg. < 10  Costs for find proportional to number of fragments = size of simulation Finding simulation is easy since most permissive partner is deterministic  Model checking efficient Runtime peaks caused by checking application condition of a particular rule  Time/Quality trade-offs possible A-posteriori state space reduction different from typical on-the-fly reduction Conclusion: Approach feasible