Found 1383 Articles for Open Source

Working with the AWS CLI for EC2

Bamdeb Ghosh
Updated on 08-May-2023 11:11:36

108 Views

Among the well-known cloud computing platforms is AWS (Amazon Web Services). Elastic Compute Cloud, or AWS EC2, is a well-known Amazon service. The Amazon CLI (Command Line Interface) is a potent tool that enables users to interact with the EC2 service via the command line in order to effectively administer EC2 instances. In-depth coverage of the Amazon CLI is provided in this article, along with examples of how to carry out various EC2 operations like establishing, listing, initiating, and terminating EC2 instances. The Amazon CLI can be used by users to automate challenging tasks and simplify cloud infrastructure management. Customers ... Read More

Memory Management: Background

Diksha Patro
Updated on 04-May-2023 13:37:40

1K+ Views

Introduction Memory management is a crucial part of computer systems that deals with managing memory resources. Memory is where computers store data, instructions, and programs while they are being used. Managing memory is important for the computer system to run smoothly. In this article, we will discuss what memory management is, and its benefits and drawbacks. Memory Management Memory management is a crucial task for the operating system, as it is responsible for managing the allocation and release of memory for different applications and processes. The operating system divides memory into different areas and assigns these regions to the applications ... Read More

Memory ballooning in OS

Diksha Patro
Updated on 04-May-2023 13:36:54

338 Views

Introduction Some operating systems use memory ballooning to optimize memory usage in virtualized environments. It entails dynamically reallocating memory resources among virtual machines (VMs) based on their current requirements. In this article, we will explore what is Memory Ballooning, and its advantages and disadvantages in detail. Memory Ballooning Memory ballooning is a technique used in virtualized environments to optimize the use of memory resources. It allows the operating system to reclaim unused memory from one virtual machine and allocate it to another that requires it. This helps to prevent resource waste and improves overall performance. Memory ballooning is achieved through ... Read More

Memory Allocation Techniques | Mapping Virtual Addresses to Physical Addresses

Diksha Patro
Updated on 04-May-2023 13:34:58

1K+ Views

Introduction In computer science and operating systems, memory allocation techniques are used to allocate memory to programs and processes. The mapping of virtual addresses to physical addresses is an important aspect of memory allocation because it allows programs to access the memory they require to run. Mapping Virtual Addresses to Physical Addresses Virtual addresses are used by programs to access memory, while physical addresses are the actual locations in RAM where data is stored.Memory allocation techniques manage the mapping of virtual addresses to physical addresses using different methods. Methods of Mapping Virtual Addresses to Physical Addresses There are three common ... Read More

Mechanism for building Distributed file system

Diksha Patro
Updated on 04-May-2023 12:43:21

742 Views

Multiple clients can access and share files stored on various servers through a distributed file system (DFS), which is a type of file system. File servers, file access protocols, metadata servers, directory services, replication and caching, and security measures are just a few of the crucial parts that go into creating a DFS. Using many protocols, including NFS, SMB, and FTP, file servers store the data and make them accessible to clients. Directory services offer a directory structure for the files in the DFS, while metadata servers manage the metadata for the files. Performance and dependability are frequently enhanced by ... Read More

Measure the time spent in context switch

Diksha Patro
Updated on 04-May-2023 12:42:15

523 Views

Context switching is a basic procedure in contemporary computer systems that enables different jobs or processes to effectively share the CPU (Central Processing Unit). The operating system employs context switching to swiftly transition between jobs or processes that are vying for the CPU's attention on a computer system. This allows each task or process to run for a specific amount of time, known as a time slice or time quantum. Methods for measuring the time spent in a context switch The length of a context switch can be calculated in a number of ways. Here are a few typical approaches ... Read More

Master Boot Record

Diksha Patro
Updated on 04-May-2023 12:41:10

251 Views

The Master Boot Record (MBR), which is normally located on a conventional hard disc drive, is a tiny but crucial component of a computer's storage device. It includes crucial data required to initiate the computer's starting procedure and boot the operating system. The boot code, the partition table, and the disc signature are the three essential parts of the MBR. MBR Structure and Organization A crucial element of managing storage devices and the startup process of a computer is the Master startup Record (MBR). It has four primary components and is situated at the start of a storage device like ... Read More

Maekawa's Algorithm for Mutual Exclusion in Distributed System

Diksha Patro
Updated on 04-May-2023 12:37:51

1K+ Views

Multiple processes may require concurrent access to common resources in a distributed system. Concurrent access to a shared resource, however, may result in mistakes and inconsistencies. A distributed mutual exclusion algorithm must be employed to manage access to shared resources in order to guarantee mutual exclusion. A distributed mutual exclusion technique, such as Maekawa's algorithm, ensures mutual exclusion between running processes in a distributed system. Only one process at a time can access a shared resource thanks to the algorithm, which is based on a voting system. Maekawa's algorithm A distributed mutual exclusion algorithm, such as Maekawa's algorithm, makes sure ... Read More

LRU Cache implementation using Double Linked Lists

Diksha Patro
Updated on 04-May-2023 12:28:09

592 Views

Caching is a technique to improve a computer's performance by storing frequently accessed data in a cache. The cache is a high-speed storage area in a computer. In this, data can be quickly retrieved from the cache rather than from slower main memory or disc storage whenever needed. Caching can be accomplished in a number of ways. This includes the use of a hash table, an array, or a linked list. In this article, we will explore the LRU Cache implementation using Double Linked Lists in detail. What is LRU Cache implementation? The Least Recently Used (LRU) algorithm is a ... Read More

LRU Approximation (Second Chance Algorithm)

Diksha Patro
Updated on 04-May-2023 12:27:10

2K+ Views

Introduction In computer operating systems, the LRU (Least Recently Used) approximation algorithm, commonly called the Second Chance algorithm, is a page replacement algorithm. It is based on the principle that pages that haven't been used in a while are more likely to be replaced than pages that have. In this article, we will discuss the details, advantages, and disadvantages of this article. LRU Approximation Algorithm To keep track of which pages are currently in memory, the LRU approximation algorithm employs a circular buffer. Each page receives a reference bit, which is initially set to 0. When a page is accessed, ... Read More

Advertisements