Detailed explanation of Java RMI based on distributed architecture
Distributed architecture infrastructure: detailed explanation of Java RMI
Introduction to RMI
Java RMI, remote method call( Remote Method Invocation ), a method for implementing remote procedure calls (RPCs) (Remote procedure call) Java API, which can directly transfer serialized Java objects and Distributed garbage collection . Its implemen ...
Posted by ljCharlie on Sun, 12 Dec 2021 10:05:43 +0100
Implementing Redis distributed lock from zero to one coding
Some students are so pissing. You can understand it. If you don't do it yourself, how can you understand it thoroughly? Let's do it together!
Usage scenario and model selection
The distributed multi node deployment mode makes it possible for shared variables to be operated at the same time. In case of data consistency requirements, global loc ...
Posted by phifgo on Thu, 09 Dec 2021 07:03:02 +0100
zookeeper command line operation
1. Command line syntax
Basic command syntaxFunction descriptionhelpDisplay all operation commandsls pathUse the ls command to view the child nodes of the current znode - w: listen for child node changes - s additional secondary informationcreateNormal creation - s contains sequence - e: temporary (restart or timeout disappears)get pathGet the ...
Posted by douga on Mon, 06 Dec 2021 05:50:28 +0100
Blog recommendation | zero experience play isolation strategy: multiple Pulsar clusters
Warm tip: This is the "Pulsar fool's Manual", with zero experience, small white pit lightning protection. As long as you follow the instructions, the success rate is 100%!This article is the second in the Pulsar isolation strategy series. The first blog in this series - "How to realize isolation in Pulsar by deep resolutio ...
Posted by YourNameHere on Mon, 29 Nov 2021 13:40:58 +0100
Spring Cloud Alibaba technology stack
Spring Cloud Alibaba Dubbo
1, Project introduction
Dubbo Spring Cloud is developed based on Dubbo Spring Boot 2.7.1 and Spring Cloud 2.x. whether the developer is a Dubbo user or a Spring Cloud user, it can be easily controlled and the application can be migrated upward at a cost close to "zero". Dubbo Spring Cloud is committed to s ...
Posted by jaygattis on Mon, 29 Nov 2021 06:29:06 +0100
Java policy pattern of Java proxy pattern
Java policy pattern
In strategy pattern, the behavior of a class or its algorithm can be changed at run time. This type of design pattern belongs to behavioral pattern.
In the policy pattern, we create objects representing various policies and a context object whose behavior changes with the change of policy objects. The policy object changes ...
Posted by BRUUUCE on Sun, 28 Nov 2021 06:15:41 +0100
MySQL index -- how to improve query speed
What is the index?
If you have been to the library, you should know the library's retrieval system. The library has prepared a search catalogue for books, including book name, book number and corresponding location information, including which area, shelf and floor. We can quickly know the location of books and get the books we need through th ...
Posted by xXx_Hobbes_xXx on Fri, 26 Nov 2021 16:21:40 +0100
Design and implementation of proxy gateway (based on NETTY)
Introduction: This paper focuses on the design and implementation of proxy gateway itself, rather than the management and maintenance of proxy resources.Author Xin RanSource: Ali technical official accountI. problem backgroundThe platform side purchases a number of naked agents to advertise, show and audit in different places. Agents purchased ...
Posted by disenopop on Fri, 26 Nov 2021 05:20:25 +0100
Application of cache and distributed lock
Application of cache and distributed lock
1. Cache application
Cache usage scenario:
In order to improve the system performance, we usually put some data into the cache to speed up access, while the database only undertakes the data dropping work
So what data is suitable for caching?
The requirements for immediacy and data consistency are n ...
Posted by billynastie2007 on Mon, 22 Nov 2021 15:33:09 +0100
Second shallow encapsulation practice in microservice architecture
1, Background introductionThere are many split services in the distributed system. In the process of continuous iterative upgrading, the following common thorny situations will occur:For the version upgrade of a technical component, depending on the package upgrade leads to the expiration of some syntax or API, or the component fixes urgent vul ...
Posted by pohopo on Mon, 22 Nov 2021 01:25:14 +0100