Operating System Articles

Page 28 of 171

Creating a Hex Dump of a File

Vishesh Kumar
Vishesh Kumar
Updated on 17-Mar-2026 2K+ Views

A hex dump displays the binary contents of a file in hexadecimal format, making it readable for humans. This is essential for programming, reverse engineering, data recovery, and debugging executable files. Linux provides several built-in tools to generate hex dumps of files. To demonstrate these tools, let's first create a sample text file − $ cat > example.txt This is our sample text in the file. We will convert it into hex using various tools. ^D Using hexdump Command The hexdump command is a built-in Linux utility that displays file contents in hexadecimal, decimal, ...

Read More

Docker Container Network Namespace Is Invisible

Vishesh Kumar
Vishesh Kumar
Updated on 17-Mar-2026 766 Views

This article examines why Docker container network namespaces are invisible to the ip netns ls command and provides a solution to make them accessible for network debugging and management. Containerization Containerization is a lightweight virtualization technology where applications and their dependencies are packaged into portable containers. Unlike traditional virtual machines, containers share the host OS kernel and system resources, making them faster to start and more resource-efficient. Containers include only the necessary libraries, binaries, and runtime components needed for the application to run consistently across different environments. Docker Docker is a containerization platform that enables developers ...

Read More

Evolution of Docker from Linux Containers

Pradeep Jhuriya
Pradeep Jhuriya
Updated on 17-Mar-2026 585 Views

Docker is a powerful containerization platform that allows developers to package, distribute, and run applications with their dependencies in lightweight, portable containers. The evolution of Docker began with Linux Containers (LXC) and has since revolutionized software development and deployment practices. This article explores how Docker evolved from Linux containers, the key improvements it introduced, and why it became the industry standard. What are Containers? Containers are a form of operating system-level virtualization that packages applications with their dependencies into isolated, portable units. Unlike virtual machines that require separate operating system instances, containers share the host OS kernel while ...

Read More

File System Management

Alex Onsman
Alex Onsman
Updated on 17-Mar-2026 11K+ Views

File System Management provides a uniform view of data storage by the operating system. Files are mapped onto physical devices that are usually non-volatile, ensuring data persistence in case of system failure. The file system acts as an interface between applications and storage hardware, abstracting the complexities of physical storage. File Attributes File attributes provide metadata about files that the operating system uses for management and access control. While attributes may vary across different operating systems, the common file attributes include: Name The symbolic name of the file that is human-readable. This is the identifier users typically ...

Read More

Mass Storage Management

Amit Diwan
Amit Diwan
Updated on 17-Mar-2026 9K+ Views

Mass Storage Management deals with the organization and optimization of secondary storage devices, primarily disks, in modern operating systems. Disks provide the bulk of secondary storage and require efficient management algorithms to handle data access requests. Disk Structure Modern disks contain concentric tracks divided into multiple sectors. The disk structure can be visualized as follows − Disk Structure Sector ...

Read More

Hash Functions and Hash Tables

Alex Onsman
Alex Onsman
Updated on 17-Mar-2026 14K+ Views

Hashing is the process of generating a value from a text or a list of numbers using a mathematical function known as a hash function. Hash functions convert input data of arbitrary size into fixed-size hash values, which are used as indices in hash tables for efficient data storage and retrieval. Hash Functions Hash functions are algorithms that map data to fixed-size hash values. Here are the most commonly used hash functions − Division Method This is the simplest method to create a hash function. The hash function can be described as − h(k) ...

Read More

I/O Systems and Subsystems

Ricky Barnes
Ricky Barnes
Updated on 17-Mar-2026 17K+ Views

I/O systems are critical components of computer systems that provide users the means of interacting with the system. They handle all input and output operations between the computer and external devices. The operating system includes a dedicated I/O subsystem to manage these devices efficiently. The I/O system consists of three main components that work together to provide seamless device interaction − I/O Hardware The I/O hardware layer includes physical devices such as mouse, keyboard, disk drives, printers, and network interfaces. Each device connects to the system through a device controller, which acts as an interface between the ...

Read More

Computer Storage Structure

Alex Onsman
Alex Onsman
Updated on 17-Mar-2026 7K+ Views

Computer Storage Structure refers to the hierarchical organization of storage devices in a computer system. It is traditionally divided into primary storage, secondary storage, and tertiary storage, each serving different purposes based on speed, capacity, and cost considerations. Computer Storage Hierarchy CPU Cache RAM ROM Primary Storage Fast Access • ...

Read More

Asymmetric and Symmetric Clustering System

Kristi Castro
Kristi Castro
Updated on 17-Mar-2026 7K+ Views

Clustering systems are similar to parallel systems as they both have multiple CPUs. However, a major difference is that clustered systems are created by two or more individual computer systems merged together. The primary goal is to provide high availability and fault tolerance by distributing workload across multiple nodes. There are two main types of clustering systems: asymmetric and symmetric clustering systems. Asymmetric Clustering System In an asymmetric clustering system, one node acts as the primary server that runs all applications, while one or more nodes remain in hot standby mode. The standby nodes continuously monitor the primary ...

Read More

Layered Operating System

David Meador
David Meador
Updated on 17-Mar-2026 20K+ Views

A Layered Operating System is an architectural approach where the operating system is divided into multiple hierarchical layers, each with specific functionalities. This design was developed as an improvement over early monolithic systems, providing better organization, maintainability, and modularity. Why Layering in Operating System? Layering provides distinct advantages in operating system design. Each layer can be defined separately and interact with adjacent layers as required. This approach makes it easier to create, maintain, and update the system since changes in one layer specification do not affect other layers. The layered structure also enhances debugging and testing capabilities, as ...

Read More
Showing 271–280 of 1,707 articles
« Prev 1 26 27 28 29 30 171 Next »
Advertisements