Backend Development
Python Tutorial
Introduction to epoll about python network programming learning IO multiplexingIntroduction to epoll about python network programming learning IO multiplexing
What is epoll
What is epoll? In network programming in linux, select has been used for event triggering for a long time. In the new Linux kernel, there is a mechanism to replace it, which is epoll. Of course, this is not unique to the 2.6 kernel, it was introduced in the 2.5.44 kernel (epoll(4) is a new API introduced in Linux kernel 2.5.44) , it has almost all the advantages mentioned before, and is recognized as the best-performing multiplexed I/O ready notification method under Linux2.6.
Compared with select, the biggest advantage of epoll is that it will not reduce efficiency as the number of listening fds increases. Because in the select implementation in the kernel, it is processed by polling. The more fds polled, the more time it will take.
epoll working principle
epoll also only notifies those ready file descriptors, and when we call epoll_wait() to obtain a ready file descriptor, what is returned is not the actual descriptor, but A value representing the number of ready descriptors. You only need to obtain the corresponding number of file descriptors in sequence from an array specified by epoll. Memory mapping (mmap) technology is also used here, so that it is completely This eliminates the overhead of copying these file descriptors during system calls.
Another essential improvement is that epoll adopts an event-based readiness notification method. In select/poll, the kernel scans all monitored file descriptors only after the process calls a certain method, while epoll registers a file descriptor through epoll_ctl() in advance. Once a certain file descriptor is ready, , the kernel will use a callback-like mechanism to quickly activate this file descriptor, and will be notified when the process calls epoll_wait().
As can be seen from the above, epoll is an improvement on the select and poll models, which improves the performance of network programming and is widely used in large-scale concurrent requests. In C/S architecture.
epoll in python1. Triggering method:
Edge trigger/horizontal trigger, only applicable to Unix/Linux operating system
2. Schematic diagram
3. General steps
Create an epoll
object——Create 1 epollObjectTell the epoll object to monitor specific events on specific sockets——Tell the epoll object to monitor specific events on the specified socket
Ask the epoll object which sockets may have had the specified event since the last query——Ask the epoll object, which sockets have had the specified event since the last query
Perform some
actionon those sockets—— Perform some operations on these socketsTell the epoll object to modify the
listof sockets and/or events to monitor——Tell the epoll object to modify the socket list and/or events, and MonitorRepeat steps 3 through 5 until finished——Repeat steps 3-5 until finished
Destroy the epoll object——Destroy the epoll object
4, related usage
import select Import select module
epoll = select.epoll() creates an epoll object
epoll.register(file handle, event type) registers the file handle to be monitored and Event
Event type:
select.EPOLLIN Readable event
select.EPOLLOUT Writable event
select.EPOLLERR Error event
Select.EPOLLHUP Client disconnect event
epoll.unregister(file handle) Destroy file handle
epoll.poll(timeout) When the file handle changes, it will be automatically displayed in the form of a list Report to the user process, timeout
is the timeout, the default -1, that is, wait until the file handle changes. If there is no change, it will return empty
epoll.fileno() Returns the epoll control file descriptor (
Returnthe epoll control file descriptor)
The above is the detailed content of Introduction to epoll about python network programming learning IO multiplexing. For more information, please follow other related articles on the PHP Chinese website!
Python and Time: Making the Most of Your Study TimeApr 14, 2025 am 12:02 AMTo maximize the efficiency of learning Python in a limited time, you can use Python's datetime, time, and schedule modules. 1. The datetime module is used to record and plan learning time. 2. The time module helps to set study and rest time. 3. The schedule module automatically arranges weekly learning tasks.
Python: Games, GUIs, and MoreApr 13, 2025 am 12:14 AMPython excels in gaming and GUI development. 1) Game development uses Pygame, providing drawing, audio and other functions, which are suitable for creating 2D games. 2) GUI development can choose Tkinter or PyQt. Tkinter is simple and easy to use, PyQt has rich functions and is suitable for professional development.
Python vs. C : Applications and Use Cases ComparedApr 12, 2025 am 12:01 AMPython is suitable for data science, web development and automation tasks, while C is suitable for system programming, game development and embedded systems. Python is known for its simplicity and powerful ecosystem, while C is known for its high performance and underlying control capabilities.
The 2-Hour Python Plan: A Realistic ApproachApr 11, 2025 am 12:04 AMYou can learn basic programming concepts and skills of Python within 2 hours. 1. Learn variables and data types, 2. Master control flow (conditional statements and loops), 3. Understand the definition and use of functions, 4. Quickly get started with Python programming through simple examples and code snippets.
Python: Exploring Its Primary ApplicationsApr 10, 2025 am 09:41 AMPython is widely used in the fields of web development, data science, machine learning, automation and scripting. 1) In web development, Django and Flask frameworks simplify the development process. 2) In the fields of data science and machine learning, NumPy, Pandas, Scikit-learn and TensorFlow libraries provide strong support. 3) In terms of automation and scripting, Python is suitable for tasks such as automated testing and system management.
How Much Python Can You Learn in 2 Hours?Apr 09, 2025 pm 04:33 PMYou can learn the basics of Python within two hours. 1. Learn variables and data types, 2. Master control structures such as if statements and loops, 3. Understand the definition and use of functions. These will help you start writing simple Python programs.
How to teach computer novice programming basics in project and problem-driven methods within 10 hours?Apr 02, 2025 am 07:18 AMHow to teach computer novice programming basics within 10 hours? If you only have 10 hours to teach computer novice some programming knowledge, what would you choose to teach...
How to avoid being detected by the browser when using Fiddler Everywhere for man-in-the-middle reading?Apr 02, 2025 am 07:15 AMHow to avoid being detected when using FiddlerEverywhere for man-in-the-middle readings When you use FiddlerEverywhere...


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.






