首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 234 毫秒
1.
基于Petri网的数据库系统并发控制活性分析   总被引:1,自引:0,他引:1  
从数据库系统在时刻t的状态N出发,构造出相应的Petri网模型,进而构造出其可达标识图。通过分析可达标识图,可判断系统是否为死锁状态。若不是死锁状态,系统是否可能出现死锁,什么情况下系统肯定不会出现死锁。最后,给出了数据库系统中事务并发操作的死锁检测方法与避免措施。  相似文献   

2.
并发事务无死锁的可串行化调度的形式化方法   总被引:1,自引:0,他引:1  
并发控制是多用户数据库管理系统(DBMS)的重要内容之一。该文对其形式化方法进行了研究,建立了符合两段锁协议的扩展有色Petri网模型。利用该模型的可达标识图,给出了判断满足两段锁协议的调度是否死锁的充分必要条件,并由此构造出并发事务的无死锁的可串行化调度。  相似文献   

3.
分布式锁管理DLM细化了锁模式的粒度,使得分布式系统具有更高的并发性,但死锁检测等锁的管理过程却更加复杂了,Petri网的应用能很好地解决该问题。为分布式锁建立Petri网模型,通过化简和合成建立系统的Petri网模型,借助Petri网的可达标识图实时检测出分布式系统的死锁状态,并查找死锁进程。  相似文献   

4.
不同于目前许多文献中基于添加控制库所的死锁预防策略,本文提出了控制变迁方程(CTE)的概念和相应的基于添加控制变迁(CT)的死锁控制策略(DCP).通过分析存在死锁的原网(N0, M0)的可达图(RG),该DCP求解出所有死锁标识(DM).基于CTE,构造出所需的控制变迁.然后,对每个DM添加相应的CT,进而消除了原网(N_0, M_0)中的死锁标识,得到了活性受控网系统(N~?, M~?).通过理论分析和相关算例的应用,该DCP的正确性和有效性得到了验证.此外,该DCP获取的活性受控网系统(N~?, M~?)可达数目与原网(N_0, M_0)是相同的,即最大可达数(MRN).  相似文献   

5.
利用模块化设计的思想,首先为分布式数据库系统中各事务的每一种操作(读锁、写锁、解锁)构造一个基本的加权Petri网模型,并给出了加权Petri网共享合成的概念、然后利用共享合成技术,动态地构造各站点的加权Petri网模型,以适应系统的动态变化.此外,本文利用Petri网的化简技术,极大地简化了各站点的Petri网模型,之后利用同步合成技术构造出整个系统的Petri网模型,较好地解决了Petri网的可达性分析中可能出现的状态“爆炸”问题.最后给出了判断整个系统是否出现死锁的充分必要条件.  相似文献   

6.
通过对自动制造系统的Pctri网模型的分析.可以揭示出被模拟系统的死锁跟其初始标识和其结构有关。要想消除自动制造系统的死锁异常,可以通过修改Petri网的初始标识或Pctri网的结构来解决。该文结合具体示例,给出了具体的可操作算法并设计出了控制自动制造系统死锁的Petri网模型,从而为自动制造系统的异常处理提供了一条有效途径。  相似文献   

7.
数据库系统中并发事务死锁的解除与避免   总被引:8,自引:0,他引:8  
本文利用Petri网作为工具,从提高事务进程并行性出发,建立数据库系统的并发事务进程竞争数据资源的模型。并由此推导出死锁和临界死锁的充分必要条件及提邮相应的避免死锁的控制机制。该控制机制是通过如何对关键的空闲数据资源进行控制分配来实现避免死锁。  相似文献   

8.
基于系统 Petri 网模型, 研究自动制造系统的避免死锁问题. 对不含中心资源的制造系统, 证明了它只包含安全和死锁两类可达状态. 通过一步向前看的方法, 给出了系统多项式时间复杂性的最佳避免死锁策略. 对一般系统定义了一种辅助 Petri 网. 利用辅助网的最佳避免死锁策略, 提出了综合一般制造系统多项式复杂性的避免死锁策略的方法.  相似文献   

9.
Petri网是一种系统描述和分析的工具。在构造系统PSA模型的基础上,利用其可达标识图同样能分析软件架构演化中的构件删除、增加、修改以及合并与分解各种变化引起的波及效应,且算法直观、复杂度小;并为运用Petri网技术研究SA提供了一个新思路。  相似文献   

10.
Petri网的符号ZBDD可达树分析技术   总被引:2,自引:0,他引:2  
Petri网是一种适合于并发系统建模、分析和控制的图形工具.可达树是Petri网分析的典型技术之一,它通过标识向量集合表征系统的状态空间,组合复杂性严重制约了该分析技术可处理系统问题的规模.零压缩决策图(Zero-Suppressed Binary Decision Diagrams,ZBDD)是一种新型的数据结构,是表示和处理稀疏向量集合的一种有效技术.文章基于Petri网町达标识向量的稀疏特征,给出了Petri网分析的符号ZBDD技术,该技术通过对标识向量(状态)的布尔向量表示、可达标识向最(状态)的符号ZBDD生成,实现Petri网可达状态空间的高效符号操作和紧凑符号表示.实验表明,基于ZBDD的符号可达性分析算法能够有效处理较大规模Petri网问题.  相似文献   

11.
Petri nets have been proposed as a promising tool for modeling and analyzing concurrent-software systems such as Ada programs and communication protocol software. Among analysis techniques available for Petri nets, the most general approach is to generate all possible states (markings) of the system in a form of a so-called reachability graph. However, this conventional reachability graph approach is inefficient or intractable, even for a bounded Petri net, due to state explosion in many practical applications. To cope with this problem, this paper proposes a method for constructing a hierarchically organized state space called the hierarchical reachability graph (HRG). Using the HRG, we obtain necessary and sufficient conditions for reachability and deadlock, as well as algorithms to test whether a given state or marking is reachable from the initial state and whether there is a deadlock state (a state with no successor states)  相似文献   

12.
Due to the state explosion problem, it has been unimaginable to enumerate reachable states for Petri nets. Chao broke the barrier earlier by developing the very first closed-form solution of the number of reachable and other states for marked graphs and the kth order system. Instead of using first-met bad marking, we propose ‘the moment to launch resource allocation’ (MLR) as a partial deadlock avoidance policy for a large, real-time dynamic resource allocation system. Presently, we can use the future deadlock ratio of the current state as the indicator of MLR due to which the ratio can be obtained real-time by a closed-form formula. This paper progresses the application of an MLR concept one step further on Gen-Left kth order systems (one non-sharing resource place in any position of the left-side process), which is also the most fundamental asymmetric net structure, by the construction of the system's closed-form solution of the control-related states (reachable, forbidden, live and deadlock states) with a formula depending on the parameters of k and the location of the non-sharing resource. Here, we kick off a new era of real-time, dynamic resource allocation decisions by constructing a generalisation formula of kth order systems (Gen-Left) with r* on the left side but at arbitrary locations.  相似文献   

13.
Even for a simple automated manufacturing system (AMS), such as a general single-unit resource allocation system, the computation of an optimal or maximally permissive deadlock-avoidance policy (DAP) is NP-hard. Based on its Petri-net model, this paper addresses the deadlock-avoidance problem in AMSs, which can be modeled by systems of simple sequential processes with resources. First, deadlock is characterized as a perfect resource-transition circuit that is saturated at a reachable state. Second, for AMSs that do not have one-unit resources shared by two or more perfect resource-transition circuits that do not contain each other, it is proved that there are only two kinds of reachable states: safe states and deadlock. An algorithm for determining the safety of a new state resulting from a safe one is then presented, which has polynomial complexity. Hence, the optimal DAP with polynomial complexity can be obtained by a one-step look-ahead method, and the deadlock-avoidance problem is polynomially solved with Petri nets for the first time. Finally, by reducing a Petri-net model and applying the design of optimal DAP to the reduced one, a suboptimal DAP for a general AMS is synthesized, and its computation is of polynomial complexity.   相似文献   

14.
数据库是网络环境下多用户使用的共享资源,数据库在处理多线程大量数据存取过程中很可能出现死锁现象。文中介绍了Oracle数据库锁机制和死锁发生的原因,Oracle数据库检测死锁采用的相关视图。详细叙述了SQL语句检测死锁、死锁的定位方法和解决数据库死锁的方法。编写了在Linux环境中死锁检测脚本,模拟Oracle数据库死锁测试了脚本的正确性。实际应用表明该方法可以有效监测程序中的主要模块是否发生死锁,而且简单有效。  相似文献   

15.
The communicating finite state machines can exchange messages over bounded FIFO channels. In this paper, a new technique, called reverse reachability analysis, is proposed to detect deadlocks on the communication between the communicating finite state machines. The technique is based on finding reverse reachable paths starting from possible deadlock states. If a reverse reachable path can reach the initial global state, then deadlock occurs. Otherwise the communication is deadlock-free. The effectiveness of the technique has been verified by some real protocols such as a specification of X.25 call establishment/clear protocol and Bartlet's alternating bit protocol.  相似文献   

16.
赵咪  侯一凡 《计算机科学》2009,36(6):251-253
针对一类含有并发执行装配过程的柔性制造系统G-systems,提出一种新的死锁预防策略保证该系统的非阻塞性,即在控制下,受控系统从任意可达状态都可以到达理想状态.首先对Petri网模型中基本信标实施控制,保证了基本信标的最大可控,然后通过线性规划算法求取所有从属信标满足可控性的条件,即获得基本信标的控制深度变量.与现有方法相比,该策略优点在于只需加入少量的控制库所,就可避免不必要的迭代过程;其次是提出控制器输出弧位置优化策略,得到了结构更为简单、许可行为更多的非阻塞Petri网控制器.  相似文献   

17.
This paper aims to compute the number of reachable (forbidden, live and deadlock) states for flexible manufacturing systems (FMS) without the construction of reachability graph. The problem is nontrivial and takes, in general, an exponential amount of time to solve. Hence, this paper focusses on a simple version of Systems of Simple Sequential Processes with Resources (S3PR), called kth-order system, where each resource place holds one token to be shared between two processes. The exact number of reachable (forbidden, live and deadlock) states can be computed recursively.  相似文献   

18.
李晨  彭敦陆 《计算机应用》2009,29(1):209-212
数据库系统中事务死锁的检测和预防,对提高系统并发性和整体性能具有重要意义。在研究了现有的分布式数据库系统死锁预防策略的基础上,利用创建动态探针(DP)技术,提出了一种改进的死锁预防策略。该DP方法在创建探针后将其发往可能产生死锁的节点,接收到探针后,根据节点信息与探针所包含信息的比较结果,可以判断是否有死锁发生,从而达到预防死锁的目的。分析表明,该方法提高了死锁预防的有效性和系统资源的利用率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号