Operating System Articles

Page 9 of 171

Resource Reservation Protocol in Real-time Systems

Pranavnath
Pranavnath
Updated on 17-Mar-2026 893 Views

Resource Reservation Protocol (RSVP) is a network protocol used in real-time systems to reserve bandwidth and ensure quality of service (QoS) for time-critical applications. Operating at the transport layer, RSVP allows applications to request specific network resources before data transmission begins, guaranteeing predictable performance for multimedia and real-time communications. How RSVP Works RSVP uses a receiver-oriented approach where the destination device initiates resource reservation requests. The protocol establishes resource reservations through a two-phase process involving PATH and RESV messages that traverse the network path between sender and receiver. RSVP Resource Reservation Process ...

Read More

Read-Copy Update

Pranavnath
Pranavnath
Updated on 17-Mar-2026 568 Views

Read-Copy Update (RCU) is a synchronization mechanism that enables concurrent access to shared data structures without traditional locking. RCU allows multiple readers to access data simultaneously while writers make updates, making it highly efficient for read-heavy workloads. The mechanism splits updates into two distinct phases: removal and reclamation, ensuring data consistency without blocking readers. How RCU Works RCU operates on the principle of allowing readers to access data structures concurrently while writers create new versions of the data. Instead of blocking readers during updates, RCU ensures that old versions remain accessible until all readers using them have finished. ...

Read More

Raymond’s tree based algorithm

Pranavnath
Pranavnath
Updated on 17-Mar-2026 4K+ Views

Raymond's tree-based algorithm is a distributed mutual exclusion algorithm that uses a token-based approach to control access to critical sections in distributed systems. It organizes all nodes in a directed spanning tree structure, where edges point toward the node currently holding the token. This algorithm ensures that only one process can enter the critical section at any given time across the entire distributed network. How Raymond's Tree Algorithm Works The algorithm operates on the principle that only the node with the token can enter the critical section. All nodes are arranged in a tree structure where each node ...

Read More

Selfish Round Robin CPU Scheduling

Pranavnath
Pranavnath
Updated on 17-Mar-2026 880 Views

Selfish Round Robin (SRR) is a CPU scheduling algorithm that modifies traditional round robin by introducing dynamic priority adjustments. Unlike standard round robin where all processes get equal treatment, SRR allows processes to "selfishly" increase their priority based on execution time, creating a more adaptive scheduling approach. The traditional round-robin scheduling algorithm is preemptive, giving each process a fixed time slice. After the quantum expires, the process moves to the end of the ready queue. SRR enhances this by maintaining two separate queues and allowing priority manipulation to favor longer-running processes. How Selfish Round Robin Works SRR ...

Read More

SetUID, SetGID, and Sticky Bits in Linux File Permissions

Pranavnath
Pranavnath
Updated on 17-Mar-2026 2K+ Views

File permissions in Linux provide privileges to owners and administrators to control access to programs and files. Standard permissions (read, write, execute) are set using chmod and chown commands. Beyond basic permissions, Linux provides special permissions: SetUID, SetGID, and sticky bits. These special permissions modify the default behavior of file execution and access, requiring careful consideration due to potential security implications. SetUID (Set User ID) When SetUID is enabled on an executable file, the program runs with the permissions of the file's owner, not the user executing it. This allows regular users to execute programs that require elevated ...

Read More

Seek Time vs Transfer Time in Disk Scheduling

Pranavnath
Pranavnath
Updated on 17-Mar-2026 530 Views

In disk scheduling, understanding the difference between seek time and transfer time is crucial for optimizing storage performance. Seek time represents the duration required for the disk arm to move from its current position to the target track, while transfer time is the time needed to read or write data once the correct track is located. These two components significantly impact overall disk performance and are key considerations in disk scheduling algorithms. Seek Time in Disk Scheduling Seek time is directly influenced by the physical distance between the current head position and the target track, measured in terms ...

Read More

Server Operating System

Pranavnath
Pranavnath
Updated on 17-Mar-2026 1K+ Views

A Server Operating System is a specialized OS designed to run on server computers and manage network resources, services, and multiple client connections simultaneously. Unlike desktop operating systems that serve individual users, server OS platforms are optimized for high performance, stability, and concurrent user support in enterprise environments. Server Operating System Architecture Server operating systems use a client-server architecture where one powerful server machine provides resources and services to multiple client devices across the network. This centralized approach enables efficient resource sharing, centralized management, and scalable service delivery. Client-Server Architecture ...

Read More

Setting Up a Linux Multifunction Server

Pranavnath
Pranavnath
Updated on 17-Mar-2026 2K+ Views

Linux is widely used both as a Desktop Operating System and to create server platforms. Linux can be used to build standalone servers, mail servers, web servers, and network gateways for LANs. It is extensively used in telecommunications, embedded systems, satellites, medical equipment, military systems, computer graphics, and desktop computing. 75 percent of the world's top supercomputers run on Linux, making it the preferred choice for enterprise server deployments. Setting Up a Linux Multifunction Server A multifunction server combines multiple services like web hosting, email, database management, and file sharing on a single Linux machine. This approach maximizes ...

Read More

Sequence Step Algorithm in Operating System

Pranavnath
Pranavnath
Updated on 17-Mar-2026 377 Views

Sequence Step Algorithm is a discrete event simulation approach used in operating systems to maximize resource utilization by analyzing repetitive processes. Unlike traditional scheduling algorithms, it focuses on minimizing processing time and execution delays by determining probability distributions of process durations and eliminating resource idle time. How It Works The algorithm operates on discrete event simulation (DES) principles, which model systems as sequences of events occurring at specific time points rather than continuous processes. This approach resembles digital signals with distinct start and end points, making it suitable for analyzing resource allocation patterns. The simulation uses two ...

Read More

Performance metrics for mutual exclusion Algorithm

Way2Class
Way2Class
Updated on 17-Mar-2026 941 Views

Mutual exclusion is a fundamental concept in operating systems that ensures no two concurrent processes access the same critical section simultaneously. It prevents race conditions by allowing only one process to execute in the critical section at any given time, maintaining data consistency and system integrity. Performance Metrics for Mutual Exclusion To evaluate the effectiveness of mutual exclusion algorithms, four key performance metrics are used to measure their efficiency under different system conditions. Message Complexity The total number of messages required for a process to enter and exit the critical section. This metric measures the communication ...

Read More
Showing 81–90 of 1,708 articles
« Prev 1 7 8 9 10 11 171 Next »
Advertisements