In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article is about the concept of deadlock on the Internet. Xiaobian thinks it is quite practical, so share it with everyone for reference. Let's follow Xiaobian and have a look.
Deadlock refers to two or more processes in the execution process, due to competition for resources or due to communication with each other caused by a blocking phenomenon, if there is no external force, they will not be able to advance; at this time, the system is in a deadlock state or the system has a deadlock, these always waiting for each other in the process called deadlock process.
Operating environment: Windows 7 system, DELL G3 computer
What is the concept of deadlock?
Deadlock refers to a blocking phenomenon caused by two or more processes competing for resources or communicating with each other during execution. If there is no external force, they will not be able to advance. At this point, the system is said to be in a deadlock state or the system has a deadlock. These processes that are always waiting for each other are called deadlock processes.
Solution:
After deadlock has occurred in the system, it should be detected in time and appropriate measures should be taken to remove the deadlock.
Deadlock prevention.
This is a relatively simple and intuitive way of preventing in advance. The method is to prevent deadlocks by setting some constraints to break one or more of the four necessary conditions for deadlocks. Deadlock prevention is an easy method to realize and has been widely used. However, because the constraints imposed are often too strict, it may lead to system resource utilization and system throughput degradation.
Deadlock avoidance.
The system dynamically checks each resource request that the system can satisfy, and decides whether to allocate resources according to the check result; if deadlock may occur in the system after allocation, it will not allocate resources, otherwise it will be allocated. This is a dynamic strategy to ensure that the system does not enter a deadlock state.
Deadlock detection and resolution.
First detection: This method does not require any restrictive measures in advance, nor does it need to check whether the system has entered an unsafe zone. This method allows deadlocks to occur during the operation of the system. However, deadlock can be detected timely and the processes and resources related to deadlock can be accurately determined by the detection mechanism set up by the system. Detection methods include timing detection, low efficiency detection, process waiting detection, etc.
Deadlocks are then removed: appropriate measures are taken to remove deadlocks that have occurred from the system.
This is a measure that goes hand in hand with deadlock detection. When a deadlock is detected in the system, the process must be freed from the deadlock state. A common way to do this is to undo or suspend processes in order to reclaim resources, and then allocate those resources to processes that are already blocking and ready to continue running. Deadlock detection and resolution measures may make the system obtain better resource utilization and throughput, but it is also the most difficult to implement.
Thank you for reading! About "what is the concept of deadlock in the Internet" this article is shared here, I hope the above content can be of some help to everyone, so that everyone can learn more knowledge, if you think the article is good, you can share it to let more people see it!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.