[Database] Deadlock avoidance protocol

如何避免Deadlock,如果我们能提前知道各个Process对于资源的需求情况,我们就可以用Banker‘s algorithm (银行家算法) 来解决问题。可是这在现在中不好实现,因为很难提前知道对于资源的需求情况。此时可以用一下两种方法来解决问题。

1. Wait - die Protocol

2. Kill - wait Protocol

具体地,根据两个Process的创建时间,创建时间较早的,我们称之为Older Process (O),较晚的那个称之为Yonger Process (Y), 那么

Deadlock   Wait - die   Kill - wait

O requires a resource held by Y      O waits         O waits    O dies

Y requires a resource held by O      Y waits      Y dies          Y waits

时间: 2024-12-28 20:49:36

[Database] Deadlock avoidance protocol的相关文章

system strategies of Resources Deadlock

In computer science, Deadlock is a naughty boy aroused by compete for resources. Even now, there isn't a valid method to deal with it. This is amazing. You know, we have many excellent scientists,  not all of issues can fight with us so many years. F

Method, apparatus, and system for speculative abort control mechanisms

An apparatus and method is described herein for providing robust speculative code section abort control mechanisms. Hardware is able to track speculative code region abort events, conditions, and/or scenarios, such as an explicit abort instruction, a

Snoop resynchronization mechanism to preserve read ordering

A processor employing a post-cache (LS2) buffer. Loads are stored into the LS2buffer after probing the data cache. The load/store unit snoops the loads in the LS2?buffer against snoop requests received from an external bus. If a snoop invalidate requ

《modern operating system》 chapter 6 DEADLOCKS 笔记

DEADLOCKS Both processes are blocked and will remain so forever. This situation is called a deadlock. 6.1 RESOURCES 6.1.1 Preemptable and Nonpreemptable Resources Resources come in two types: preemptable and nonpreemptable. A preempt-able resource is

PatentTips - Optimizing Write Combining Performance

BACKGROUND OF THE INVENTION The use of a cache memory with a processor facilitates the reduction of memory access time. The fundamental idea of cache organization is that by keeping the most frequently accessed instructions and data in the fast cache

6-DEADLOCKS

Please indicate the source: http://blog.csdn.net/gaoxiangnumber1 Welcome to my github: https://github.com/gaoxiangnumber1 Computer systems are full of resources that can be used only by one process at a time. Consequently, all operating systems have

FIREDAC连接池配置

以下在delphi XE7下测试 [delphi] view plaincopy fdphysrcldrvrlnk1: TFDPhysOracleDriverLink; fdgxwtcrsr1: TFDGUIxWaitCursor; fdphysmysqldrvrlnk1: TFDPhysMySQLDriverLink; [delphi] view plaincopy var adm:TFDManager; oParams: TStrings; [delphi] view plaincopy b

C++ Core Guidelines

C++ Core Guidelines September 9, 2015 Editors: Bjarne Stroustrup Herb Sutter This document is a very early draft. It is inkorrekt, incompleat, and pµøoorly formatted. Had it been an open source (code) project, this would have been release 0.6. Copy

​OSSIM事件分类/子类总结表

OSSIM事件类/子类总结表 事件 类/子类 数据源分类 子类 备注 Access ACL Deny ACL Permit ConnectionClosed ConnectionOpened File Access File Blocked Firewall Deny Firewall Misc Event Firewall Permit Timeout Traffic Inbound Traffic Outbound Tunnel Closed Tunnel Connection Web Ap