SlideShare a Scribd company logo
1 of 12
Communicating
Finite Automata
Rehan Hattab
Computation Theory
Master Course -2013- JU
Communication Protocol
Communicating Automata
The Component automata has the following general form:
( L, TL, T, l0) where
• L is a finite set of locations; the automaton can only be in one location at
a time ;
• TL is a finite set of transition labels;
• T ⊆ L×TL×L is the transition relation, where (l, a, l) ∈ T states that
a transition from location l to location l exists, which is labeled
with a Transitions are typically denoted
Example 1
Example 2
Communicating Finite Automata
• In previous examples , we are using binary synchronization ,
also , we distinguish between instances of half actions, indicated
by the symbols ! and ?, and completed actions, denoted without
input/output annotations.
• a further reason for introducing communicating automata and
binary synchronization is that they play a particularly important
role in the timed concurrency theory setting, where timed
automata, and their associated model-checking algorithms, are
one of the most commonly used methods for specifying and
verifying time critical systems.
Parallel Composition Basic Notation
• A parallel communicating Finite automata system is an
accepting device based on the communication between more
Finite automata working in parallel.
• It generates a single automaton from a vector of interacting
component automata.
• This single automaton characterizes the global behavior that
results from running the component automata in parallel.
• The automaton that arises from this parallel composition is
called the product automaton.
Product Automaton Example
• Consider Product Automaton Example is Fragments
of each of the two components of the
communication protocol shown in Example 1.
• These fragments have been extracted from the
components by removing all half actions that
synchronize with components other than the sender
and medium.
Product Automaton Example
Product Automaton Example
• The resulting product automaton (denoted | [Sender ',
Medium ']) characterizes the global behavior of the network,
the product only contains completed actions.
• Thus, the rather degenerate behavior of the product is for a
message to be sent, followed by an interleaving of the
message being lost at the medium and the sender timing out.
This sequence is repeated ad infinitum.
Question
• Draw the product Automaton that generates from Sender and
Medium automaton in network of CA (communicating
Automata ) .
• Answer : In Slide 9
Reference
H.Bowman R.Gomez , Concurrency Theory: Calculi an Automata for
Modelling Untimed and Timed Concurrent Systems
Springer-Verlag New York, Inc. Secaucus, NJ, USA ©2005

More Related Content

What's hot

Introduction to the Finite Element Method
Introduction to the Finite Element MethodIntroduction to the Finite Element Method
Introduction to the Finite Element Method
Mohammad Tawfik
 
UnCoRe-YvesSerena
UnCoRe-YvesSerenaUnCoRe-YvesSerena
UnCoRe-YvesSerena
Serena King
 

What's hot (20)

CS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of AlgorithmsCS8451 - Design and Analysis of Algorithms
CS8451 - Design and Analysis of Algorithms
 
Quick Sort , Merge Sort , Heap Sort
Quick Sort , Merge Sort ,  Heap SortQuick Sort , Merge Sort ,  Heap Sort
Quick Sort , Merge Sort , Heap Sort
 
solver (1)
solver (1)solver (1)
solver (1)
 
Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling Fault detection based on novel fuzzy modelling
Fault detection based on novel fuzzy modelling
 
Algorithm analysis (All in one)
Algorithm analysis (All in one)Algorithm analysis (All in one)
Algorithm analysis (All in one)
 
Application of normalized cross correlation to image registration
Application of normalized cross correlation to image registrationApplication of normalized cross correlation to image registration
Application of normalized cross correlation to image registration
 
01 Analysis of Algorithms: Introduction
01 Analysis of Algorithms: Introduction01 Analysis of Algorithms: Introduction
01 Analysis of Algorithms: Introduction
 
Daa unit 1
Daa unit 1Daa unit 1
Daa unit 1
 
Optimization problems and algorithms
Optimization problems and  algorithmsOptimization problems and  algorithms
Optimization problems and algorithms
 
Analysis of algorithms
Analysis of algorithmsAnalysis of algorithms
Analysis of algorithms
 
Unit 1 polynomial manipulation
Unit 1   polynomial manipulationUnit 1   polynomial manipulation
Unit 1 polynomial manipulation
 
Lecture 1 test
Lecture 1 testLecture 1 test
Lecture 1 test
 
Introduction to the Finite Element Method
Introduction to the Finite Element MethodIntroduction to the Finite Element Method
Introduction to the Finite Element Method
 
Fundamental of Algorithms
Fundamental of Algorithms Fundamental of Algorithms
Fundamental of Algorithms
 
Daa notes 2
Daa notes 2Daa notes 2
Daa notes 2
 
Coordinate Descent method
Coordinate Descent methodCoordinate Descent method
Coordinate Descent method
 
Randomized algorithm min cut problem and its solution using karger's algorithm
Randomized algorithm min cut problem and its solution using karger's algorithmRandomized algorithm min cut problem and its solution using karger's algorithm
Randomized algorithm min cut problem and its solution using karger's algorithm
 
Av 738 - Adaptive Filtering Lecture 1 - Introduction
Av 738 - Adaptive Filtering Lecture 1 - IntroductionAv 738 - Adaptive Filtering Lecture 1 - Introduction
Av 738 - Adaptive Filtering Lecture 1 - Introduction
 
Ijetcas14 507
Ijetcas14 507Ijetcas14 507
Ijetcas14 507
 
UnCoRe-YvesSerena
UnCoRe-YvesSerenaUnCoRe-YvesSerena
UnCoRe-YvesSerena
 

Similar to Computation Theory Topic

Uml Omg Fundamental Certification 5
Uml Omg Fundamental Certification 5Uml Omg Fundamental Certification 5
Uml Omg Fundamental Certification 5
Ricardo Quintero
 

Similar to Computation Theory Topic (20)

Algorithm.pptx
Algorithm.pptxAlgorithm.pptx
Algorithm.pptx
 
Algorithm.pptx
Algorithm.pptxAlgorithm.pptx
Algorithm.pptx
 
Uml Omg Fundamental Certification 5
Uml Omg Fundamental Certification 5Uml Omg Fundamental Certification 5
Uml Omg Fundamental Certification 5
 
Introduction to algorithms
Introduction to algorithmsIntroduction to algorithms
Introduction to algorithms
 
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault ToleranceParallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
Parallel Algorithms: Sort & Merge, Image Processing, Fault Tolerance
 
Gmit cse presentation
Gmit cse presentationGmit cse presentation
Gmit cse presentation
 
3.pdf
3.pdf3.pdf
3.pdf
 
Hartmann im00
Hartmann im00Hartmann im00
Hartmann im00
 
Ch2 mathematical modeling of control system
Ch2 mathematical modeling of control system Ch2 mathematical modeling of control system
Ch2 mathematical modeling of control system
 
Discrete structure ch 3 short question's
Discrete structure ch 3 short question'sDiscrete structure ch 3 short question's
Discrete structure ch 3 short question's
 
Jar chapter 4, part 1
Jar chapter 4, part 1Jar chapter 4, part 1
Jar chapter 4, part 1
 
Pattern Matching using Computational and Automata Theory
Pattern Matching using Computational and Automata TheoryPattern Matching using Computational and Automata Theory
Pattern Matching using Computational and Automata Theory
 
Transfer function, determination of transfer function in mechanical and elect...
Transfer function, determination of transfer function in mechanical and elect...Transfer function, determination of transfer function in mechanical and elect...
Transfer function, determination of transfer function in mechanical and elect...
 
D017311724
D017311724D017311724
D017311724
 
Model Based Software Timing Analysis Using Sequence Diagram for Commercial Ap...
Model Based Software Timing Analysis Using Sequence Diagram for Commercial Ap...Model Based Software Timing Analysis Using Sequence Diagram for Commercial Ap...
Model Based Software Timing Analysis Using Sequence Diagram for Commercial Ap...
 
Pattern-based Definition and Generation of Components for a Synchronous React...
Pattern-based Definition and Generation of Components for a Synchronous React...Pattern-based Definition and Generation of Components for a Synchronous React...
Pattern-based Definition and Generation of Components for a Synchronous React...
 
A partial linearization method for the traffic assignment problem.pdf
A partial linearization method for the traffic assignment problem.pdfA partial linearization method for the traffic assignment problem.pdf
A partial linearization method for the traffic assignment problem.pdf
 
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHIBCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
BCA DATA STRUCTURES ALGORITHMS AND PRELIMINARIES MRS SOWMYA JYOTHI
 
Introduction to Data Structure and algorithm.pptx
Introduction to Data Structure and algorithm.pptxIntroduction to Data Structure and algorithm.pptx
Introduction to Data Structure and algorithm.pptx
 
Modern Control - Lec 02 - Mathematical Modeling of Systems
Modern Control - Lec 02 - Mathematical Modeling of SystemsModern Control - Lec 02 - Mathematical Modeling of Systems
Modern Control - Lec 02 - Mathematical Modeling of Systems
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Computation Theory Topic

  • 3. Communicating Automata The Component automata has the following general form: ( L, TL, T, l0) where • L is a finite set of locations; the automaton can only be in one location at a time ; • TL is a finite set of transition labels; • T ⊆ L×TL×L is the transition relation, where (l, a, l) ∈ T states that a transition from location l to location l exists, which is labeled with a Transitions are typically denoted
  • 6. Communicating Finite Automata • In previous examples , we are using binary synchronization , also , we distinguish between instances of half actions, indicated by the symbols ! and ?, and completed actions, denoted without input/output annotations. • a further reason for introducing communicating automata and binary synchronization is that they play a particularly important role in the timed concurrency theory setting, where timed automata, and their associated model-checking algorithms, are one of the most commonly used methods for specifying and verifying time critical systems.
  • 7. Parallel Composition Basic Notation • A parallel communicating Finite automata system is an accepting device based on the communication between more Finite automata working in parallel. • It generates a single automaton from a vector of interacting component automata. • This single automaton characterizes the global behavior that results from running the component automata in parallel. • The automaton that arises from this parallel composition is called the product automaton.
  • 8. Product Automaton Example • Consider Product Automaton Example is Fragments of each of the two components of the communication protocol shown in Example 1. • These fragments have been extracted from the components by removing all half actions that synchronize with components other than the sender and medium.
  • 10. Product Automaton Example • The resulting product automaton (denoted | [Sender ', Medium ']) characterizes the global behavior of the network, the product only contains completed actions. • Thus, the rather degenerate behavior of the product is for a message to be sent, followed by an interleaving of the message being lost at the medium and the sender timing out. This sequence is repeated ad infinitum.
  • 11. Question • Draw the product Automaton that generates from Sender and Medium automaton in network of CA (communicating Automata ) . • Answer : In Slide 9
  • 12. Reference H.Bowman R.Gomez , Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems Springer-Verlag New York, Inc. Secaucus, NJ, USA ©2005