Operating System Articles

Page 7 of 171

Mutual exclusion in a distributed system

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 10K+ Views

Mutual exclusion in distributed systems is a fundamental principle that prevents concurrent processes or nodes from simultaneously accessing shared resources or critical sections. When multiple processes attempt to access the same resource concurrently, it can lead to race conditions, data corruption, and system inconsistencies. Unlike centralized systems, distributed systems lack shared memory and face challenges such as network delays, communication failures, and node failures. These factors make implementing mutual exclusion significantly more complex, requiring specialized algorithms and protocols to ensure proper coordination between distributed nodes. Approaches to Mutual Exclusion There are two main approaches to achieving mutual ...

Read More

N process Peterson algorithm

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 1K+ Views

The N-process Peterson algorithm addresses the critical section problem for multiple processes, extending beyond Peterson's original two-process solution. While Peterson's classic algorithm handles mutual exclusion between two processes, scaling it to N processes requires more sophisticated approaches like Lamport's Bakery Algorithm. How the N-Process Algorithm Works The N-process extension uses a ticket-based system where processes obtain numbered tickets to determine their order of access to the critical section. Here's how it operates: Each process wanting to enter the critical section gets a unique ticket number by incrementing a shared counter The process sets a "choosing" flag ...

Read More

Not Recently Used (NRU) page replacement algorithm

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 4K+ Views

The Not Recently Used (NRU) page replacement algorithm is a fundamental memory management technique used by operating systems to efficiently manage page replacement in virtual memory systems. Its primary goal is to identify and remove pages from memory that have not been accessed recently, making room for new pages when physical memory becomes full. How NRU Algorithm Works NRU uses two hardware bits associated with each page − a reference bit (R) and a modified bit (M). The reference bit is set when the page is accessed (read or written), and the modified bit is set when the ...

Read More

NTFS Junction Points

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 758 Views

NTFS Junction Points are a type of symbolic link in the Windows NTFS file system that allow you to create directory-level links within the same volume. They act as transparent redirections, making one directory appear at a different location while the actual data remains in its original place. Junction points provide a powerful mechanism for file system organization, application compatibility, and efficient storage management without physically moving files or disrupting existing pathways. How Junction Points Work Junction points use reparse points, a special NTFS feature that intercepts file system operations and redirects them to another location. When ...

Read More

How to Write Scripts Using Awk Programming Language?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 323 Views

Awk is a powerful text-processing language named after its three original authors: Alfred Aho, Peter Weinberger, and Brian Kernighan. It's a versatile language primarily used for pattern scanning and processing, and is a staple of Unix scripting commonly used for tasks like data extraction, reporting, and data transformation. Awk scripts are quick to write and perform well for small to medium-sized tasks. This article introduces you to the basics of writing scripts using the Awk programming language. Basic Syntax An Awk program consists of a sequence of pattern-action pairs, written as − pattern { action ...

Read More

How to Zip a File in Linux?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 5K+ Views

File compression is a fundamental task in Linux system administration for managing storage space and efficiently transferring files. Linux provides several powerful command-line tools including gzip, zip, tar, and others for compressing files and directories. This guide covers the most commonly used compression methods and their practical applications. Using the gzip Command gzip (GNU zip) is a widely-used command for single file compression in Linux. It provides excellent compression ratios and is included by default in most distributions. gzip filename.txt This command compresses filename.txt and renames it to filename.txt.gz. The original file is replaced ...

Read More

Initial Server Setup and Configurations on RHEL 7

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 311 Views

Red Hat Enterprise Linux (RHEL) 7 is a Linux-based operating system from Red Hat designed for businesses. This article provides a practical guide on performing initial server setup and configurations on RHEL 7. We will walk through essential first steps to prepare a RHEL 7 server for production use. Logging in as Root After your server boots, you will log in as the root user. The root user is the administrative user in a Linux environment with full system privileges. ssh root@your_server_ip Creating a New User After logging in as root, it's recommended ...

Read More

Initial Server Setup with Ubuntu 20.04 18.04 and 16.04

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 576 Views

Initial Server Setup is a critical first step after deploying a fresh Ubuntu server instance. Proper configuration ensures security, stability, and optimal performance for hosting applications or services. This guide covers essential setup procedures for Ubuntu versions 20.04, 18.04, and 16.04, including user management, security hardening, and basic service configuration. Prerequisites Before beginning the server setup process, ensure you have the following requirements − Fresh Ubuntu 20.04, 18.04, or 16.04 server instance Root access or user account with administrative privileges SSH client for remote server connection (e.g., OpenSSH, PuTTY) Server's public IP address System ...

Read More

Install RedMail with Virtual Domains, Webmail, SpamAssassin & ClamAV in Linux

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 299 Views

Email communication remains an integral part of our personal and professional lives. Setting up a reliable and secure mail server is crucial for efficient communication within organizations or for personal use. Mail-in-a-Box (commonly called RedMail) is a fully-featured mail server solution that offers a comprehensive suite of tools to create virtual domains, access webmail, and enhance email security with SpamAssassin and ClamAV. In this article, we will guide you through the process of installing Mail-in-a-Box on a Linux system. Prerequisites Before diving into the installation process, ensure you have the following − A clean Ubuntu 18.04 ...

Read More

Install Adobe Flash Player 11.2 On CentOS/RHEL 7/6 and Fedora 25-20

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 684 Views

Adobe Flash Player 11.2 was a widely used multimedia platform that enabled users to view interactive content, play online games, and stream videos. While Adobe officially discontinued Flash Player support in 2020, some legacy systems and applications still require Flash Player 11.2 to function properly. This guide covers installing Adobe Flash Player 11.2 on CentOS/RHEL 7/6 and Fedora 25-20 systems. Prerequisites Before proceeding with the installation, ensure you have the following − A CentOS/RHEL 7/6 or Fedora 25-20 system with administrative privileges A web browser such as Mozilla Firefox or Google Chrome installed Internet connection for ...

Read More
Showing 61–70 of 1,708 articles
« Prev 1 5 6 7 8 9 171 Next »
Advertisements