Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Computer Science Articles
Page 3 of 53
Protection and Security in Operating System
Protection and security requires that computer resources such as CPU, software, memory etc. are protected. This extends to the operating system as well as the data in the system. This can be done by ensuring integrity, confidentiality and availability in the operating system. The system must be protected against unauthorized access, viruses, worms etc. Threats to Protection and Security A threat is a program that is malicious in nature and leads to harmful effects for the system. The following diagram shows the classification of common security threats − Types of Security Threats ...
Read MoreHot Standby Mode
The hot standby mode is a fail-safe mechanism in which a hot standby component is part of an active system. If any component of the system fails, the hot standby component immediately takes its place. In general, a hot standby can refer to any device, system, or component that overtakes operation from a failed device and reduces the startup delay that would otherwise be significant. Hot Standby Mode Operation Active System Processing Requests ...
Read MoreBeowulf Clusters
Beowulf clusters are high-performance computing systems built from commodity hardware − normal, identical computers connected through a local area network (LAN). These clusters use specialized software to distribute processing tasks across multiple nodes, creating a cost-effective parallel processing unit from standard personal computers. The concept originated in 1994 when Thomas Sterling and Donald Becker built the first Beowulf cluster at NASA. The name "Beowulf" was borrowed from the famous Old English epic poem, and has since become synonymous with clusters built from commodity hardware running open-source software. Beowulf Cluster Architecture ...
Read MoreSupervisor Mode (Privileged Mode)
Supervisor mode (also called privileged mode or kernel mode) is a computer system execution mode in which the processor can execute all instructions, including privileged instructions. These special instructions include interrupt management, I/O operations, memory management, and system configuration commands that are restricted from normal user programs. The privilege levels of different components in a system form a hierarchical structure − System Privilege Levels Kernel Mode (Ring 0) Highest Privilege Device Drivers (Ring 1-2) Limited Privilege ...
Read MoreOpen Source Operating Systems
Open Source operating systems are released under a license where the copyright holder allows others to study, change, and distribute the software to other people for any reason. These systems provide transparency, community collaboration, and freedom from licensing fees, making them popular choices for developers, researchers, and organizations. Types of Open Source Operating Systems Desktop and General-Purpose Systems Cosmos Cosmos (C# Open Source Managed Operating System) is an open source operating system written primarily in C#. Rather than being a fully-fledged operating system, Cosmos serves as a toolkit that allows developers to easily build their own ...
Read MoreClustered Systems
Clustered systems are computing environments that combine multiple independent computer systems (nodes) to work together as a single logical unit. Unlike parallel systems that have multiple CPUs within a single machine, clustered systems consist of separate computers connected through a network and sharing common storage resources. Architecture of Clustered Systems Clustered System Architecture Node 1 CPU + Memory Cluster Software Node 2 CPU + Memory ...
Read MoreApplication Programs vs System Programs
Computer programs are broadly categorized into two main types: application programs and system programs. These programs operate at different layers of the computer system hierarchy, each serving distinct purposes and user bases. Computer System Hierarchy Users Application Programs System Programs Operating System Hardware ...
Read MoreWhat is a Debugger Program?
A debugger program is a software tool that allows developers to execute another program in a controlled environment, examining it line by line. This enables users to identify incorrect code, understand program flow, and see how their program is interpreted by the computer. Debuggers are essential for finding semantic errors that may not be caught during compilation but cause runtime issues. A debugger helps programmers visualize program execution and understand the internal state of their applications. While debuggers may require practice to master, they significantly reduce the time needed to identify and fix program defects, making them indispensable tools ...
Read MoreOperating System Design Goals
Operating Systems have become quite complex and multifaceted with the advancement of time. However, that also means it is getting more and more difficult to design operating systems that satisfy all the specifications required these days. There are no complete solutions possible for design problems, but some approaches are more successful than others. Design Requirements in Operating System The design requirements are quite hard to specify in an operating system. They are basically divided into two parts: User design requirements and System design requirements. Details about these are given as follows − User Design Requirements The ...
Read MoreArchitecture of a Typical Microkernel
A microkernel is the minimum software required to correctly implement an operating system. This includes memory management, process scheduling mechanisms, and basic inter-process communication. The microkernel follows a minimalist approach where only essential services run in kernel mode, while other OS functions operate in user space. Architecture of a Microkernel Microkernel Architecture User Space Device Drivers File Server ...
Read More