<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Design, Modelling and Analysis of a Workflow Reconfiguration</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Manuel Mazzara</string-name>
          <email>Manuel.Mazzara@ncl.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Faisal Abouzaid</string-name>
          <email>m.abouzaid@polymtl.ca</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nicola Dragoni</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anirban Bhattacharyya</string-name>
          <email>Anirban.Bhattacharyya@ncl.ac.uk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>École Polytechnique de Montréal</institution>
          ,
          <country country="CA">Canada</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Newcastle University</institution>
          ,
          <addr-line>Newcastle upon Tyne</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Technical University of Denmark (DTU)</institution>
          ,
          <addr-line>Copenhagen</addr-line>
        </aff>
      </contrib-group>
      <fpage>10</fpage>
      <lpage>24</lpage>
      <abstract>
        <p>This paper describes a case study involving the reconfiguration of an office workflow. We state the requirements on a system implementing the workflow and its reconfiguration, and describe the system's design in BPMN. We then use an asynchronous π-calculus and W ebπ∞ to model the design and to verify whether or not it will meet the requirements. In the process, we evaluate the formalisms for their suitability for the modelling and analysis of dynamic reconfiguration of dependable systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>Competition drives technological development, and the development of
dependable systems is no exception. Thus, modern dependable systems are required to
be more flexible, available and dependable than their predecessors, and dynamic
reconfiguration is one way of achieving these requirements.</p>
      <p>
        A significant amount of research has been performed on hardware
reconfiguration (see [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]), but little has been done for reconfiguration of services,
especially regarding computational models, formalisms and methods
appropriate to the service domain. Furthermore, much of the current research assumes
that reconfiguration can be instantaneous, or that the environment can wait
during reconfiguration for a service to become available (see [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]). These
assumptions are unrealistic in the service domain. For example, instantaneous
mode change in a distributed system is generally not possible, because the system
usually has no well-defined global state at a specific instant (due to significant
communication delays). Also, waiting for the reconfiguration to complete is not
acceptable if (as a result) the environment becomes dangerously unstable or the
service provider loses revenue by the environment aborting the service request.
      </p>
      <p>
        These observations lead to the conclusion that further research is required
on dynamic reconfiguration of dependable services, and especially on its formal
foundations, modelling and verification. In a preliminary paper [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], we
examined a number of well-known formalisms for their suitability for reconfigurable
dependable systems. In this paper, we focus on one of the formalisms (W ebπ∞)
and compare it to a π-calculus in order to perform a deeper analysis than was
possible in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. We use a more complex case study involving the reconfiguration
of an office workflow for order processing, define the requirements on a system
implementing the workflow and its reconfiguration, and describe the design of a
system in BPMN (see section 2). We then use an asynchronous π-calculus with
summation (in section 3) and W ebπ∞ [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] (in section 4) to model the design and
to verify whether or not the design will meet the reconfiguration requirements.
We chose process algebras because they are designed to model interaction
between concurrent activities. An asynchronous π-calculus was selected because
π-calculi are designed to model link reconfiguration, and asynchrony is suitable
for modelling communication in distributed systems. W ebπ∞ was selected
because it is designed to model composition of web services.
      </p>
      <p>Thus, the contribution of this paper is to identify strengths and weaknesses
of an asynchronous π-calculus with summation and W ebπ∞ for modelling
dynamic reconfiguration and verifying requirements (discussed in section 5). This
evaluation may be useful to system designers intending to use formalisms to
design dynamically reconfigurable systems, and also to researchers intending to
design better formalisms for the design of dynamically reconfigurable systems.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Office Workflow: Requirements and Design</title>
      <p>
        This case study describes dynamic reconfiguration of an office workflow for order
processing that is commonly found in large and medium-sized organizations
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. These workflows typically handle large numbers of orders. Furthermore, the
organizational environment of a workflow can change in structure, procedures,
policies and legal obligations in a manner unforseen by the original designers
of the workflow. Therefore, it is necessary to support the unplanned change of
these workflows. Furthermore, the state of an order in the old configuration may
not correspond to any state of the order in the new configuration. These factors,
taken in combination, imply that instantaneous reconfiguration of a workflow is
not always possible; neither is it practical to delay or abort large numbers of
orders because the workflow is being reconfigured. The only other possibility is
to allow overlapping modes for the workflow during its reconfiguration.
2.1
      </p>
      <sec id="sec-2-1">
        <title>Requirements</title>
        <p>A given organization handles its orders from existing customers using a number
of activities arranged according to the following procedure:
1. Order Receipt: an order for a product is received from a customer. The order
includes customer identity and product identity information.
2. Evaluation: the product identity is used to perform an inventory check on the
availability of the product. The customer identity is used to perform a credit check
on the customer using an external service. If both the checks are positive, the order
is accepted for processing; otherwise the order is rejected.
3. Rejection: if the order is rejected, a notification of rejection is sent to the customer
and the workflow terminates.
4. If the order is to be processed, the following two activities are performed
concurrently:
(a) Billing: the customer is billed for the total cost of the goods ordered plus
shipping costs.</p>
        <p>(b) Shipping: the goods are shipped to the customer.
5. Archiving: the order is archived for future reference.
6. Confirmation: a notification of successful completion of the order is sent to the
customer.</p>
        <p>In addition, for any given order, Order Receipt must precede Evaluation,
which must precede Rejection or Billing and Shipping.</p>
        <p>After some time, managers notice that lack of synchronisation between the
Billing and Shipping activities is causing delays between the receipt of bills and
the receipt of goods that are unacceptable to customers. Therefore, the managers
decide to change the order processing procedure, so that Billing is performed
before Shipping (instead of performing the two activities concurrently). During
the transition interval from one procedure to the other, the following
requirements must be met:
1. The result of the Evaluation activity for any given order should not be
affected by the change in procedure.
2. All accepted orders must be billed and shipped exactly once, then archived,
then confirmed.
3. All orders accepted after the change in procedure must be processed
according to the new procedure.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Design</title>
        <p>
          We designed the system implementing the office workflow using the Business
Process Modeling Notation (BPMN) [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. We chose BPMN because it is a widely
used graphical tool for designing business processes. In fact, BPMN is a standard
for business process modelling, and is maintained by the Object Management
Group (see http://www.omg.org/).
        </p>
        <p>The system is designed as a collection of eight pools: Office Workflow,
Order Generator, Credit Check, Inventory Check, Reconf. Region, Bill&amp;Ship1,
Bill&amp;Ship2 and Archive. The different pools represent different functional
entities, and each pool can be implemented as a separate concurrent task (see
Figure 1). Office Workflow coordinates the entire workflow: it receives a request
from a customer, and makes a synchronous call to Order Generator to create an
order. It then calls Credit Check (with the order) to check the creditworthiness
of the customer, and tests the returned value using an Exclusive Data-Based
Gateway. If the test is positive, Office Workflow calls Inventory Check (with the
order) to check the availability of the ordered item, and tests the returned value.
If either of the two tests is negative, the customer is notified of the rejected order
and the workflow terminates. If both tests are positive, Office Workflow calls
Reconf. Region, which acts as a switch between configuration 1 and configuration
2 of the workflow, and thereby handles the reconfiguration of the workflow.</p>
        <p>Reconf. Region calls Bill&amp;Ship1 by default: it makes an asynchronous call
to the Main pool within Bill&amp;Ship1, which uses a Parallel Gateway to call Bill
and Ship concurrently and merge their respective results, and then returns these
results to Office Workflow. The Office Workflow then calls Archive to store the
order, then notifies the customer of the successful completion of the order, and
then terminates the workflow. However, if Reconf. Region receives a change
configuration message, it calls the Main pool within Bill&amp;Ship2 instead, which
makes sequential a call to Bill and then to Ship, and then returns the results to
Office Workflow.</p>
        <p>Notice that for the sake of simplicity, we assume neither Bill nor Ship
produces a negative result. Furthermore, the Bill and Ship pools are identical in both
configurations, which suggests their code is replicated (rather than shared) in
the two configurations. Finally, we assume the reconfiguration is planned rather
than unplanned.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Asynchronous π-Calculus</title>
      <p>
        The asynchronous π-calculus ([
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) is a subset of Milner’s π-calculus [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], and
it is known to be more suitable for distributed implementation. It is considered a
rich paradigm for asynchronous communication, although it is not as expressive
as Milner’s π-calculus in representing mixed-choice constructs, such as a.P +b.P 0
(see [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]).
      </p>
      <p>We recall the (monadic) asynchronous π-calculus. Let N be a set of names
(e.g. a, b, c, ...) and V be a set of variables (e.g. x, y, z, ...). The set of the
asynchronous π-calculus processes is generated by the following grammar:
P ::= x¯z G</p>
      <p>P |P [a = b]P (νx)P</p>
      <p>A(x1, ..., xn)
where guards G are defined as follows:</p>
      <p>G ::= 0 x(y).P
τ.P</p>
      <p>G + G</p>
      <p>Intuitively, an output x¯z represents a message z tagged with a name x
indicating that it can be received (or consumed) by an input process x(y).P which
behaves as P {z/y} upon receiving z. Furthermore, x(y).P binds the name y in
P and the restriction (νx)P declares a name x private to P and thus binds x.
Outputs are non-blocking.</p>
      <p>The parallel composition P |Q means P and Q running in parallel. G + G is
the non-deterministic choice that is restricted to τ and input prefixes.
[a = b]P behaves like P if a and b are identical.</p>
      <p>A(y1, ..., yn) is an identifier (also call, or invocation) of arity n. It represents
the instantiation of a defined agent. We assume that every such identifier has
a unique, possibly recursive, definition A(x1, ..., xn) d=ef P where the xis are
pairwise distinct, and the intuition is that A(y1, ..., yn) behaves like P with each
yi replacing xi.</p>
      <p>Furthermore, for each A(x1, ..., xn) d=ef P we require: f n(P ) ⊆ {x1, ..., xn},
where f n(P ) stands for the set of free names in P , and bn(P ) for the set of
bound names in P . The input prefix and the ν operator bind the names. For
example, in a process x(y).P , the name y is bound. In (νx)P , x is considered to
be bound. Every other occurrences of a name like x in x(y).P and x, y in x¯hyi.P
are free.</p>
      <p>
        Due to lack of space we omit to give details on structural congruence and
operational semantics for the asynchronous π-calculus. They can be found in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
for the version of the calculus we use in this paper.
      </p>
      <p>The Model in Asynchronous π-Calculus The model in asynchronous
πcalculus needs to keep the synchronization between actions in sequence coherent
with the workflow definition. So sequence is implemented by using parallel
composition with prefix and postfix on the same channel. Channel names are not
restricted since the full system is not described here and has to be put in
parallel with the detailed implementation of the environment process described (that
will be omitted here).</p>
      <p>The entire model is expressed in asynchronous π-calculus as follows:</p>
      <sec id="sec-3-1">
        <title>Entire Model</title>
        <p>We can define the W orkf low process as follows:
W orkf low(params) ,
(ν order) (OrderReceipt(customer, item).OrderGenerator customer, item
| OrderGeneratorReply(order).CreditCheck customer
| (creditOk().InventoryCheck item + CreditReject().Reject order)
| (InventoryOk().BillShip + InventoryReject().Reject order)
| reco().BillShip().(Bill customer, item, order | Ship customer, item, order)
| BillReply(order).ShipReply(order).Archive order
+recn().BillShip().(Bill customer, item, order
| BillReply(order).Ship customer, item, order) | ShipReply(order).Archive order
| ArchiveReply(order).Conf irm order) | W orkf low(params)</p>
        <sec id="sec-3-1-1">
          <title>In the model, the old region is identified as follows:</title>
          <p>reco().BillShip().(Bill customer, item, order | Ship customer, item, order)
| BillReply(order).ShipReply(order).Archive order</p>
        </sec>
        <sec id="sec-3-1-2">
          <title>And the new region is:</title>
          <p>recn().BillShip().(Bill customer, item, order
| BillReply(order).Ship customer, item, order) | ShipReply(order).Archive order</p>
          <p>
            In the asynchronous π-calculus, two outputs cannot be in sequence. In order
to impose ordering between Bill and Ship, in the new region, it is necessary to
put a guard on Ship, which requires enlarging the boundary of the old region to
include the processes in the environment of the workflow that synchronize with
Bill and Ship. We did not model these processes because they are outside the
system being designed, but the limitations of the asynchronous π-calculus imply
that we must be able to access the logic of external services for which we know
only the interfaces. For a more detailed description of this problem, please see
[
            <xref ref-type="bibr" rid="ref12">12</xref>
            ].
          </p>
          <p>The entire model represents a specific instance of the workflow that spawn
concurrently another instance with fresh customer and item which here are
assumed to be fresh names but in reality will be user entered (but it is not relevant
to our purposes). We have to assume the existence of a “higher level” process
(at the level of the BPEL engine) that activates the entire workflow and bounds
the names that are free in the above π-calculus process. In this model channels
creditOK, creditReject, InventoryOK and InventoryReject are used to receive
the result of the credit check and inventory check, respectively. The old/new
region is externally triggered using specific channels reco and recn chosen according
to the value x received on channel region:
(ν x)W orkf low(param) | region(x).([x = new]recn | [x = old]reco )</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>In section 4 we show a more efficient solution using Webπ .</title>
          <p>∞
Analysis in π-logic Logics have long been used to reason about complex
systems, because they provide abstract specifications that can be used to describe
system properties of concurrent and distributed systems. Verification frameworks
can support checking of functional properties of such systems by abstracting
away from the computational contexts in which they are operating.</p>
          <p>
            In the context of π-calculi, one can use the π-logic with the HAL Toolkit
model-checker [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]. The π-logic has been introduced in [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ] to specify the
behavior of systems in a formal and unambiguous manner by expressing temporal
properties of π-processes.
          </p>
          <p>
            Syntax of the π-logic The logic integrates modalities defined by Milner ([
            <xref ref-type="bibr" rid="ref21">21</xref>
            ])
with EF φ and EF {χ}φ modalities on possible future. The π-logic syntax is:
φ ::= true | ∼ φ | φ ∧ φ0 | EX{μ}φ | EF φ | EF {χ}φ
where μ is a π-calculus action and χ could be μ, ∼ μ, or Wi∈I μi and where I is
a finite set.
          </p>
          <p>Semantics of π-formulae is given below:
• P |= true for any process P ;
• P |=∼ φ iff P 6|= φ;
• P |= φ ∧ φ0 iff P |= φ and P |= φ0 ;
• P |= EX{μ}φ iff there exists P 0 such as P
next);
μ
−→</p>
          <p>P 0 and P 0 |= φ (strong
• P |= EF φ iff there exists P0, ..., Pn and μ1, ..., μn, with n ≥ 0, such as
P = P0 −μ→1 P1... −μ→n Pn and Pn |= φ. The meaning of EF φ is that φ
must be true sometimes in a possible future.
• P |= EF {χ}φ if and only if there exists P0, ..., Pn and ν1, ..., νn , with n ≥ 0,
such that P = P0 −ν→1 P1... −ν→n Pn and Pn |= φ with:
• χ = μ for all 1 ≤ j ≤ n, νj = μ or νj = τ ;
• χ =∼ μ for all 1 ≤ j ≤ n, νj 6= μ or νj = τ ;
• χ = Wi∈I μi : for all 1 ≤ j ≤ n, νj = μi for some i ∈ I or νj = τ .
The meaning of EF {χ}φ is that the truth of φ must be preceded by the
occurrence of a sequence of actions χ.</p>
        </sec>
        <sec id="sec-3-1-4">
          <title>Some useful dual operators are defined as usual:</title>
          <p>f alse, φ ∨ φ, AX{μ}φ (∼ EX{μ} ∼ φ), &lt; μ &gt; φ (weak next), [μ]φ (Dual of
weak next), AGφ (AG{χ}) (always).</p>
          <p>Properties of the dynamic reconfiguration model</p>
          <p>We need to verify that during the reconfiguration interval the requirements
given in section 2.1 hold. For this purpose, we need to express the requirements
formally, if possible, using the π-logic.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>The result of the Evaluation activity for any given order should not be</title>
        <p>affected by the change in procedure. The following formula means
whatever the chosen path (old or new region), an order will be billed, shipped and
archived or refused:
AG{EF {OrderReceipt()}true}
AG{ EF {Bill customer, item, order}true ∧ EF {Ship customer, item, order}true∧
EF {Archive order}true ∨ EF {Reject }true}</p>
      </sec>
      <sec id="sec-3-3">
        <title>All accepted orders must be billed and shipped exactly once, then</title>
        <p>archived, then confirmed. The following formula means that after an order
is billed and shipped, it is archived and confirmed, and cannot be billed nor
shipped again:
AG{EF {BillShip()}true}
AG{EF {Bill customer, item, order}true ∧ EF {Ship customer, item, order}true∧
EF {Archive order}true} ∧ EF {Conf irm order}true}
AG{{Bill customer, item, order}f alse ∧ {Ship customer, item, order}f alse}</p>
      </sec>
      <sec id="sec-3-4">
        <title>All orders accepted after the change in procedure must be processed</title>
        <p>according to the new procedure We can express in the π-logic the following
requirement: “after a reception on the channel recn, no other reception on
channel rec0 will be accepted”. This meets the desired requirement since it is obvious
from the model that, if a signal is received on channel recn, the order will be
processed according to the new procedure.</p>
        <p>AG{{recn()}true AG{rec0()}f alse}
However, since the choice between the old procedure and the new one is
nondeterministic, this formula will not be true, although it is an essential
requirement for the model. This result illustrates the difficulty of the asynchronous
π-calculus to model the dynamic reconfiguration properly. A first attempt to
answer this problem is presented in the next section.
4</p>
        <p>
          Webπ∞
Webπ∞ is a conservative extension of the π-calculus developed for modelling and
analysis of Web services and Service Oriented Architectures. The basic theory
has been developed in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], whilst its applicability has been shown in
other work: [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] gives a BPEL semantics in term of Webπ∞, [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] clarifies some
aspects of the Recovery Framework of BPEL, and [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] exploits a web transaction
case study (a toy example has also been discussed in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]).
        </p>
        <p>Syntax and Semantics The syntax of webπ∞ processes relies on a countable
set of names, ranged over by x, y, z, u, · · · . Tuples of names are written ue. We
intend i ∈ I with I a finite non-empty set of indexes.</p>
        <p>P ::= 0 | x ue | X xi(uei).Pi | (x)P | P |P | !x(ue).P | h|P ; P |ix</p>
        <p>i∈I</p>
        <p>It is worth noting that the syntax of webπ∞ simply augments the
asynchronous π-calculus with a workunit process. A workunit h|P ; Q|ix behaves as
the body P until an abort x is received, and then it behaves as the event handler
Q.</p>
        <p>
          We give the semantics of webπ∞ in two steps, following the approach of
Milner [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], separating the laws that govern the static relations between processes
from the laws that rule their interactions. The static relations between processes
are governed by the structural congruence ≡, the least congruence satisfying the
Abelian monoid laws for parallel and summation (associativity, commutativity
and 0 as identity) and closed with respect to α-renaming and the axioms shown
in table 1.
        </p>
        <p>The scope laws are standard while novelties regard workunit and floating
laws. The law h|0 ; Q|ix ≡ 0 defines committed workunit, namely workunit with
0 as body. These ones, being committed, are equivalent to 0 and, therefore,
cannot fail anymore. The law h|h|P ; Q|iy | R ; R0|ix ≡ h|P ; Q|iy | h|R ; R0|ix moves
workunit outside parents, thus flattening the nesting. Notwithstanding this
flattening, parent workunits may still affect the children by means of names. The
law h|z ue | P ; Q|ix ≡ z ue | h|P ; Q|ix floats messages outside workunit
boundaries. By this law, messages are particles that independently move towards their
Scope laws
Workunit laws
h|0 ; Q|ix ≡ 0
(u)0 ≡ 0,</p>
        <p>(u)(v)P ≡ (v)(u)P
P | (u)Q ≡ (u)(P | Q) , if u 6∈ fn(P )
h|(z)P ; Q|ix ≡ (z)h|P ; Q|ix , if z 6∈ {x} ∪ fn(Q)
h|h|P ; Q|iy | R ; R0|ix ≡ h|P ; Q|iy | h|R ; R0|ix
h|(z)P ; Q|ix ≡ (z)h|P ; Q|ix , if z 6∈ {x} ∪ fn(Q)
Floating law</p>
        <p>h|z ue | P ; Q|ix ≡ z ue | h|P ; Q|ix
inputs. The intended semantics is the following: if a process emits a message,
this message traverses the surrounding workunit boundaries until it reaches the
corresponding input. In case an outer workunit fails, recoveries for this message
may be detailed inside the handler processes.</p>
        <p>The dynamic behavior of processes is instead defined by the reduction relation
→ which is the least relation satisfying the axioms and rules shown in table 2
and closed with respect to ≡, (x)_ , _ | _, and h| _ ; Q|iz. In the table we use
the shortcut: h|P ; Q|i d=ef (z)h|P ; Q|iz where z 6∈ fn(P ) ∪ fn(Q)
xi ve | Pi∈I xi(uei).Pi → Pi ve/uei
x ve | !x(ue).P → P ve/ue | !x(ue).P
x | h| Qi∈I Ps∈S xis(ufis).Pis | Qj∈J !xj(uej).Pj ; Q|ix → h|Q ; 0|i
where J 6= ∅ ∨ (I 6= ∅ ∧ S 6= ∅)</p>
        <p>Rules (com) and (rep) are standard in process calculi and model input-output
interaction and lazy replication. Rule (fail) models workunit failures: when a
unit abort (a message on a unit name) is emitted, the corresponding body is
terminated and the handler activated. On the contrary, aborts are not possible
if the transaction is already terminated (namely every thread in the body has
completed its own work), for this reason we close the workunit restricting its
name.</p>
        <p>The model in Webπ∞ For the modelling purposes of this work, the idea
of workunit and event handler turn out to be particularly useful. Webπ∞ uses
the mechanism of workunit to bound the identified regions, and event raising
is exploited to operate the non immediate change (reconfiguration). The model
can be expressed as follows (as a shortcut we will use here process invocation):
W orkf low(customer, item) ,
(ν order) OrderReceipt(customer, item).OrderGenerator customer, item
| OrderGeneratorReply(order).CreditCheck customer
| (CreditCheckReplyt(order).InventoryCheck item
+CreditCheckReplyf (order).Reject order)
| (InventoryCheckReplyt(order).BillShip
+InventoryCheckReplyf (order).Reject order)
| h|BillShip().(Bill customer, item, order | Ship customer, item, order
| (ν customer)(ν item) W orkf low(customer, item))
; (ν customer)(ν item) W orkf lown(customer, item)|irec
| BillReply(order).ShipReply(order).Archive order
| ArchiveReply(order).Conf irm order</p>
        <p>Webπ∞ shows here a subtle feature which is important for modelling
reconfigurable systems. Since the floating laws of structural congruence allow the
asynchronous outputs in a workunit to freely escape, once the region to reconfigure
has been entered and the BillShip has been triggered, Bill customer, item, order
and Ship customer, item, order will not be killed by any incoming rec signal.
This means that, once the region has been entered by an order, that order will
go through without being interrupted by reconfiguration events and the old
order will be processed according to the old procedure, not the new one. Future
orders will find instead only the new procedure W orkf lown waiting for orders:
W orkf lown(customer, item) ,
(ν order) OrderReceipt(customer, item).OrderGenerator customer, item
| OrderGeneratorReply(order).CreditCheck customer
| (CreditCheckReplyt(order).InventoryCheck item +
CreditCheckReplyf (order).Reject order)
| (InventoryCheckReplyt(order).BillShip +
InventoryCheckReplyf (order).Reject order)
| BillShip().(Bill customer, item, order | BillReply(order).Ship customer, item, order)
| ShipReply(order).Archive order | ArchiveReply(order).Conf irm order
| (ν customer)(ν item) W orkf lown(customer, item)</p>
        <p>
          As in the π-calculus model, we have to assume the existence of a top level
process activating the entire workflow and bounding all the names appearing
free in the above π-calculus process. The change in procedure will be activated
when the channel t is triggered.
(ν customer)(ν item)(ν rec) W orkf low(customer, item) | t().rec
This process is also responsible for triggering the reconfiguration.
Analysis in Webπ∞ Analysis in Webπ∞ is intended as equational reasoning.
At the moment, one severe weakness of Webπ∞ is its lack of tool support, i.e.
automatic system verification. However, it is clearly possible to encode Web π∞ into
the π-calculus, being the only technical complication the encoding of the
workunit and its asynchronous interrupt. Once the compilation into the π-calculus has
been done, we can proceed using HAL. From one side, Webπ∞ simplifies the
modelling of dependable systems expressing with its workunit the recovery
behavior. On the other side, it makes the verification more difficult. Luckily, there
is an optimal solution using Webπ∞ as modelling language and the π-calculus as
intermediate language, i.e. a verification bytecode . We can then offer a practical
modelling suite to the designer and still use the tool support for the π-calculus.
At the moment our research has not gone so far, so we will just discuss the three
requirements here. We will analyse the requirements in terms of equational
reasoning (see [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] and [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]). The case study of this paper is interesting at showing
both the modelling power of Webπ∞ and the weaknesses of its reasoning system.
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>The result of the Evaluation activity for any given order should not</title>
        <p>be affected by the change in procedure. The acceptability of an order
(Evaluation activity) is computed outside the region to be reconfigured, and
there is no interaction between Evaluation and the region. That means that the
Evaluation in the old procedure workf low is exactly the same as in the new
procedure workf lown, i.e. the checks are performed in the same exact order. We can
formally express it, in term of equational reasoning, stating that the Evaluation
activity in the old procedure workf low is bisimilar to the Evaluation activity
in the new procedure workf lown which is trivially true.</p>
        <p>All accepted orders must be billed and shipped exactly once, then
archived, then confirmed. The presence of a workunit does not affect how the
order itself is processed. The workflow of actions described by the requirement
can be formally expressed as follows:
(ν x)(ν y) (Bill customer, item, order | Ship customer, item, order
| BillReply(order).x | ShipReply(order).y | x().y().Archive order
| ArchiveReply(order).Conf irm order)</p>
        <p>In plain words this process describes billing and shipping happening in any
order but both before archiving and confirming. The channels x and y are there
precisely to work as a joint for billing and shipping. If we want to express the
requirements in term of equational reasoning, we can require that both the old
and the new regions have to be bisimilar with the above process. However, this
is too strict since the above process allows a set of traces which is a superset
of both the set of traces of the old configuration and the new one. In this case
similarity could be considered instead of bisimilarity.</p>
        <p>All orders accepted after the change in procedure must be processed
according to the new procedure To show this requirements has been
implemented in the model semantic reasoning is not necessary, structural congruence
is sufficient. The change in procedure is here modelled by triggering the rec
channel and spawning the workunit handler. The handler then activates a new
instance of the workflow based on the new procedure scheme which has been called
workf lown. The floating laws of structural congruence of Web π∞ (definition 1)
allow the asynchronous outputs in a workunit to freely escape the workunit itself.
Thus, once the region to reconfigure has been already entered and the BillShip
has been triggered, Bill customer, item, order and Ship customer, item, order
will not be killed by any incoming rec signal. Thus, once the region has been
entered by an order, that order will be not interrupted by reconfiguration events
so that old order will be processed according to the old procedure and not the
new one.
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Discussion</title>
      <p>In this section, we discuss three issues which arose during design and modelling:
how the modelling influenced our design, how the π-calculus and Webπ∞
compare with respect to modelling, and correctness criteria for verification of the
workflow reconfiguration.</p>
      <p>Modelling and Design Different formalisms have different biases on design
because of their different perspectives. In one of the alternative designs we
considered, the Bill and Ship pools were outside the reconfiguration region, so that
their code was shared between the two configurations. Thus, the boundary of the
reconfiguration region was different. We chose the design in section 2.2 because
it is easier to model. It is the job of a formalist to model what the system
designers produce, and ask them to change the design if it cannot be modelled or is
unverifiable. Our experience with asynchronous π-calculi and Webπ∞ suggested
that extending the boundary of the reconfiguration region to include billing and
shipping was a practical choice. This is because in the asynchronous π-calculus
(and consequently in Webπ∞), two outputs cannot be in sequence. So, in order
to impose ordering between Bill and Ship, we had to enlarge the boundary
of the reconfiguration region to include the processes in the environment of the
workflow that synchronize with them. The negative side of this solution is that
we have been forced to include in the region parts of the system that were not
intended to be changed. Here the asynchronous π-calculus shows its weakness in
terms of reconfiguring processes dynamically.</p>
      <p>
        Comparison of π-calculus and Webπ∞ This paper has shown the Webπ∞
workunit as being able to offer a more efficient solution to the problem of
modelling the case study. In particular, by means of the Webπ∞ floating laws,
reconfiguration activities can be better handled. However, at the moment, one
weakness of Webπ∞ is its lack of tool support, whereas the π-calculus is
supported by verification tools (e.g. TyPiCal [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and HAL [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]). Therefore, Web π∞
has to be intended as a a front end for modelling with the the π-calculus as the
verification bytecode . As mentioned above, neither the asynchronous π-calculus
nor Webπ∞ can have two outputs in sequence, and this leads to the specific
design choice.
Correctness Criteria The standard notion of correctness used in process
algebras is congruence based on bisimulation. However, our requirements are not all
expressible as congruences between processes. The first and third requirements
can be expressed as congruences, and so bisimulation can be used in the
reasoning. The second requirement cannot be expressed as a congruence because the
old and new configurations are not behaviourally congruent. So, we have used
reasoning based on simulation instead. Thus, we found that congruence as it has
been used in section 4 is not always applicable for verifying the correctness of
our models. Therefore, in section 3 we have investigated model checking.
      </p>
      <p>The discussion leads us to the following:
1. It is easier to model workflow reconfiguration in Web π∞ than in the
asynchronous π-calculus. However, modelling would be even easier in a
synchronous version of Webπ∞.
2. Model checking is more widely applicable than equational reasoning based
on congruences for verifying workflow reconfiguration.</p>
      <p>These two conclusions seem to have wider applicability than just
reconfiguration of workflows; but this needs to be verified.</p>
      <p>
        Future Work We intend to proceed with a deeper analysis of alternative designs
for this case study, and evaluate other formalisms, such as VDM [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Petri
nets [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. We are also working on a BPEL implementation of the system. We also
need larger industrial case studies to help us to design and evaluate formalisms
for the modelling and analysis of dynamic reconfiguration.
      </p>
      <sec id="sec-4-1">
        <title>Acknowledgments</title>
        <p>This work is partly funded by the EPSRC under the terms of a graduate studentship.
The paper has been improved by conversations with John Fitzgerald, Cliff Jones,
Alexander Romanovsky, Jeremy Bryans, Gudmund Grov, Mario Bravetti, Massimo
Strano, Michele Mazzucco, Paolo Missier and Mu Zhou. We also want to thank
members of the Reconfiguration Interest Group (in particular, Kamarul Abdul Basit, Carl
Gamble and Richard Payne), the Dependability Group (at Newcastle University) and
the EU FP7 DEPLOY Project (Industrial deployment of system engineering methods
providing high dependability and productivity).</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>R. M. Amadio</surname>
            ,
            <given-names>I. Castellani</given-names>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Sangiorgi</surname>
          </string-name>
          .
          <article-title>On bisimulations for the asynchronous π-calculus</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <volume>195</volume>
          (
          <issue>2</issue>
          ):
          <fpage>291</fpage>
          -
          <lpage>324</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>D.</given-names>
            <surname>Bjorner</surname>
          </string-name>
          and C. B. Jones, editors.
          <source>The Vienna Development Method: The MetaLanguage</source>
          , volume
          <volume>61</volume>
          of Lecture Notes in Computer Science. Springer,
          <year>1978</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>G.</given-names>
            <surname>Boudol</surname>
          </string-name>
          .
          <article-title>Asynchrony and the π-calculus</article-title>
          .
          <source>rapport de recherche 1702. Technical report</source>
          , INRIA,
          <string-name>
            <surname>Sophia-Antipolis</surname>
          </string-name>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. BPMN.
          <article-title>Bpmn - business process modeling notation</article-title>
          . 'http://www.bpmn.org/.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>A.</given-names>
            <surname>Carter</surname>
          </string-name>
          .
          <article-title>Using dynamically reconfigurable hardware in real-time communications systems: Literature survey</article-title>
          .
          <source>Technical report</source>
          , Computer Laboratory, University of Cambridge,
          <year>November 2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>N.</given-names>
            <surname>Dragoni</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          .
          <article-title>A formal semantics for the ws-bpel recovery framework - the pi-calculus way</article-title>
          .
          <source>In WS-FM'09</source>
          , Springer Verlag,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>C.</given-names>
            <surname>Ellis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Keddara</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G.</given-names>
            <surname>Rozenberg</surname>
          </string-name>
          .
          <article-title>Dynamic change within workflow systems</article-title>
          .
          <source>In Proceedings of the Conference on Organizational Computing Systems (COOCS</source>
          <year>1995</year>
          ). ACM,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Ferrari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnesi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Montanari</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Pistore</surname>
          </string-name>
          .
          <article-title>A model-checking verification environment for mobile processes</article-title>
          .
          <source>ACM Transactions on Software Engineering and Methodology</source>
          ,
          <volume>12</volume>
          (
          <issue>4</issue>
          ):
          <fpage>440</fpage>
          -
          <lpage>473</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>P.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Compton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schulte</surname>
          </string-name>
          , E. Blem, and
          <string-name>
            <given-names>W.</given-names>
            <surname>Fu</surname>
          </string-name>
          .
          <article-title>An overview of reconfigurable hardware in embedded systems</article-title>
          .
          <source>EURASIP J. Embedded Syst</source>
          .,
          <year>2006</year>
          ,
          <year>January 2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>K.</given-names>
            <surname>Honda</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Tokoro</surname>
          </string-name>
          .
          <article-title>An object calculus for asynchronous communication</article-title>
          . In P. America, editor,
          <source>European Conference on Object-Oriented Programming (ECOOP)</source>
          , pages
          <fpage>133</fpage>
          -
          <lpage>147</lpage>
          . Lecture Notes in Computer Science 512,
          <year>1991</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>N.</given-names>
            <surname>Kobayashi</surname>
          </string-name>
          . Typical:
          <article-title>Type-based static analyzer for the pi-calculus</article-title>
          . http://www.kb.ecei.tohoku.ac.jp/ koba/typical/.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>R.</given-names>
            <surname>Lucchi</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          .
          <article-title>A pi-calculus based semantics for ws-bpel</article-title>
          .
          <source>Journal of Logic and Algebraic Programming</source>
          ,
          <volume>70</volume>
          (
          <issue>1</issue>
          ):
          <fpage>96</fpage>
          -
          <lpage>118</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>J. Magee</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Dulay</surname>
            , and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kramer</surname>
          </string-name>
          .
          <article-title>Structuring parallel and distributed programs</article-title>
          .
          <source>Software Engineering Journal (Special Issue)</source>
          ,
          <volume>8</volume>
          (
          <issue>2</issue>
          ):
          <fpage>73</fpage>
          -
          <lpage>82</lpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>J. Magee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Kramer</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Sloman</surname>
          </string-name>
          .
          <article-title>Constructing distributed systems in conic</article-title>
          .
          <source>IEEE Transactions on Software Engineering</source>
          ,
          <volume>15</volume>
          (
          <issue>6</issue>
          ):
          <fpage>663</fpage>
          -
          <lpage>675</lpage>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          .
          <article-title>Towards Abstractions for Web Services Composition</article-title>
          .
          <source>PhD thesis</source>
          , Department of Computer Science, University of Bologna,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Bhattacharyya</surname>
          </string-name>
          .
          <article-title>On modelling and analysis of dynamic reconfiguration of dependable real-time systems</article-title>
          . In DEPEND, International Conference on Dependability,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Govoni</surname>
          </string-name>
          .
          <article-title>A case study of web services orchestration</article-title>
          .
          <source>In COORDINATION</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>M.</given-names>
            <surname>Mazzara</surname>
          </string-name>
          and
          <string-name>
            <given-names>I.</given-names>
            <surname>Lanese</surname>
          </string-name>
          .
          <article-title>Towards a unifying theory for web services composition</article-title>
          .
          <source>In WS-FM</source>
          , pages
          <fpage>257</fpage>
          -
          <lpage>272</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          .
          <article-title>Functions as processes</article-title>
          .
          <source>Mathematical Structures in Computer Science</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          ):
          <fpage>119</fpage>
          -
          <lpage>141</lpage>
          ,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          .
          <source>Communicating and Mobile Systems: the Pi-Calculus</source>
          . Cambridge University Press,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>R.</given-names>
            <surname>Milner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Parrow</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Walker</surname>
          </string-name>
          .
          <article-title>Modal logics for mobile processes</article-title>
          .
          <source>Theoretical Computer Science</source>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Palamidessi. Comparing the expressive power of the synchronous and the asynchronous pi-calculus</article-title>
          .
          <source>In Mathematical Structures in Computer Science</source>
          , pages
          <fpage>256</fpage>
          -
          <lpage>265</lpage>
          . ACM,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>A</article-title>
          .
          <string-name>
            <surname>Petri</surname>
          </string-name>
          . Kommunikation mit Automaten.
          <source>PhD thesis</source>
          , Fakultät Matematik und Physik,
          <source>Technische Universität Darmstadt</source>
          ,
          <year>1962</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>