[CSAPP]Chapter 2 Representing and Manipulating Information

Information storage

Rather than access individuel bits in a memory, many computer use blocks of eight bits, or bytes, as the smallest addressable memory.
A single byte consists of 8 bits. In binary notation, its value ranges from 000000002 to 111111112. However, this notation seems too verbose to express a number. Thus we use hexadecimal to express a byte in the computer.
To convert a binary number to a hex number: Splite the number into 4-bit groups and convert the groups one by one.
Word Size: Every computer has a word size, which indicates normal size of data and addresses.
exp: 32-bit word size =maximun 4GB virtual address
Addressing and byte ordering: For a object that span multiple bytes, we always focus these problems:

  • What will be the address of the object?
  • How will we order the bytes in the computer memory?

    The first problem: We always stored the object in a contiguous sequence. For example, for a integer, the start of its memory is 0x01, then it may be span to 0x02, 0x03, 0x04….

    The Second problem: Consider a w-bit question has a bit representation [x<sub>w1</sub>x<sub>w2</sub>...w<sub>1], in which xw-1 is the most significant bit. The former convention, where the least significant bit comes first is called little endian, while now the most significant bit comes first is called big endian.
  • Integer Representation

    Assume we have an integer data type of w bits. We write a bit vector, or as [xw1xw2..x1] to denote its individual bits. When we refer to such a unsigned number, the value of the number is

    B2Ux=i=0w1xi2i

    We should understand that in the computer science, the left side and right side are often defined to be equal. Then in this case, the max number of a w-bit number is [11111..11], while the min number is [000…00].
    However, for many applications, we wish to represent negative values as well. The most common computer representation is called two’s complement form. This defined by interpretation the most significant bit of the word to served as the sign bit.
    The function is here below:
    B2Tw(x)=xw12w1+i=0w2xi2i

    We set the sign bit to 1 when the value is negative, while set to 0 when the value is positive.
    Similarly, we have another two methods to represent an integer:
    B2Ow(x)=xw1(2w11)+i=0w2xi2i

    B2Sw(x)=(1)xw1+i=0w2xi2i

    Which is called one’s complement and sign-magnitude.
    Expanding the bit representation of a number:
    In some cases, such as convert a data type to a larger one, we should expand the bit representation of a number!
  • Unsigned: Zero Extension
  • Signed: Sign Bit Extension
    Truncating Numbers:
    When truncating a w-bit number to a k-bit one, we just drop the high-order w-k bits.
    Truncating a number can alter its value, which is another type of overflow!
  • Integer Arithmetic

    Unsigned arithmetic can be viewed as a form of modular arithmetic!

    x+y=(x+y)%2w

    Modular addition forms Abelian group, which has the identity element 0.
    Two’s-Complement Arithmetic as we shown before, the Two’s-Complement Arithmetic may cause positive overflow or negative overflow, which will alter the value of the number!
    Multiply or divide by powers of 2: We can use left or right shift to accomplish this.

    Floating Point

    Floating Point representation encodes rational numbers of the form V=x2y, which is useful for performing computations involving very largr numbers.
    1985-IEEE754 Standard, under the sponsorship with the design of 8087.

    IEEE Floating-Point Representation

  • The sign s determines whether the number is negative or positive.
  • The significant M is a fractional binary number that ranges ethier between 1 and 2-e or between 0 and 1-e.
  • The exponent E weights the value by power of 2.
    The value encoded by a given bit representation can be divided into 3 cases, depending on the value of exp.
  • Normalized values

  • Fraction field: representation F=0.fn1fn2...f2f1, with a implied 1, M=1+F.
  • exponent field: neither all 0 nor all 1
  • Denormalized values

  • The exponent field is all 0, the exponent value is M=1bias
  • Significant value is M =f
  • Special values

  • Exponent field is all 1, representing infinity
  • Rounding

    The representation has limited range and precision. So we generally need a systematic method of finding the closest matching x.
    General mode: Round to 0, Round to even, Round up…..
    We finally choose to Round-To-Even because it minimum the plug between round number and actual number!!
    If the number is half-way between 2 possible answers, round to the even one. Otherwise round to the nearest number!!

    Floating Point operations

    The operation is not overflow:
    exp:

    (3.14+10e65)10e65=0.0(overflow)

    (10e6510e65)+3.14=3.14

    The operation is not distribution:
    exp:
    (10e6510e65)10e65=0

    10e6510e6510e6510e65=NaN

    Transform data type in C

    From int to float: can be overflow, but may be rounded
    From float to double: can be preserved
    From double to float: The value can be overflowed to +to
    Form double or float to int: overflow, but truncated toward 0.

内容概要:本文详细介绍了“秒杀商城”微服务架构的设计与实战全过程,涵盖系统从需求分析、服务拆分、技术选型到核心功能开发、分布式事务处理、容器化部署及监控链路追踪的完整流程。重点解决了高并发场景下的超卖问题,采用Redis预减库存、消息队列削峰、数据库乐观锁等手段保障数据一致性,并通过Nacos实现服务注册发现与配置管理,利用Seata处理跨服务分布式事务,结合RabbitMQ实现异步下单,提升系统吞吐能力。同时,项目支持Docker Compose快速部署和Kubernetes生产级编排,集成Sleuth+Zipkin链路追踪与Prometheus+Grafana监控体系,构建可观测性强的微服务系统。; 适合人群:具备Java基础和Spring Boot开发经验,熟悉微服务基本概念的中高级研发人员,尤其是希望深入理解高并发系统设计、分布式事务、服务治理等核心技术的开发者;适合工作2-5年、有志于转型微服务或提升架构能力的工程师; 使用场景及目标:①学习如何基于Spring Cloud Alibaba构建完整的微服务项目;②掌握秒杀场景下高并发、超卖控制、异步化、削峰填谷等关键技术方案;③实践分布式事务(Seata)、服务熔断降级、链路追踪、统一配置中心等企业级中间件的应用;④完成从本地开发到容器化部署的全流程落地; 阅读建议:建议按照文档提供的七个阶段循序渐进地动手实践,重点关注秒杀流程设计、服务间通信机制、分布式事务实现和系统性能优化部分,结合代码调试与监控工具深入理解各组件协作原理,真正掌握高并发微服务系统的构建能力。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值