Diksha Patro

Diksha Patro

99 Articles Published

Articles by Diksha Patro

Page 2 of 10

Look aside Buffer

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 885 Views

A Look-aside Buffer (LAB) is a type of cache memory used in computer systems to store frequently accessed data. The LAB is positioned between the CPU and main memory, acting as a high-speed buffer to improve overall system performance by reducing memory access latency. The LAB operates by caching frequently accessed data from main memory. When the CPU requests data, the LAB first checks if the data exists in its buffer. If found (a hit), the data is immediately retrieved and sent to the CPU, significantly reducing access time compared to fetching from main memory. Where Look Aside ...

Read More

Memory Protection in Operating Systems

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 5K+ Views

Memory protection is a fundamental security mechanism in operating systems that prevents one process from accessing or modifying the memory space allocated to another process. This isolation ensures system stability and security by maintaining strict boundaries between different programs running concurrently. The primary goal of memory protection is to prevent unauthorized memory access. When a process attempts to access memory outside its allocated space, the operating system immediately terminates the offending process, preventing potential system crashes or security breaches. How Memory Protection Works Memory protection is typically implemented using hardware components called Memory Management Units (MMUs). The ...

Read More

Lock Variable Synchronization Mechanism

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 951 Views

Lock variable synchronization is a fundamental mechanism in concurrent programming that ensures multiple threads or processes can safely access shared resources without encountering race conditions or data corruption. It provides a way to control execution order, allowing threads to have exclusive access to critical sections when needed. In this article, we will explore lock variable synchronization, its use cases, and demonstrate its implementation with a practical C example. How Lock Variable Synchronization Works The core concept involves using a shared variable (called a lock or mutex - mutual exclusion) to control access to critical code sections. A ...

Read More

NTFS Junction Points

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 747 Views

NTFS Junction Points are a type of symbolic link in the Windows NTFS file system that allow you to create directory-level links within the same volume. They act as transparent redirections, making one directory appear at a different location while the actual data remains in its original place. Junction points provide a powerful mechanism for file system organization, application compatibility, and efficient storage management without physically moving files or disrupting existing pathways. How Junction Points Work Junction points use reparse points, a special NTFS feature that intercepts file system operations and redirects them to another location. When ...

Read More

Nucleus Operating System

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 2K+ Views

The Nucleus is an RTOS that was developed by Mentor Graphics Embedded Software Division, a Siemens Business that supports 32-bit and 64-bit embedded system platforms. The Nucleus operating system (OS) is mainly intended for use in real-time embedded systems in medical, aerospace, industrial, consumer, and Internet of Things (IoT) applications. In this article, we will explore Nucleus Operating System, its components, and features as well. Nucleus Operating System The Nucleus OS was initially introduced in 1993. The latest version, 3.x, offers various features, including 64-bit support, safety certification, power management, and a process model. It also supports ...

Read More

Message-based Communication in IPC(inter-process communication)

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 1K+ Views

Message-based communication is a method of Inter-Process Communication (IPC) where processes exchange data by sending and receiving messages. In this communication model, the sending process creates a message containing the data to be shared and transmits it to the receiving process. The receiving process then retrieves the message and extracts the required information. This approach provides a clean abstraction for process communication, allowing processes to exchange data without sharing memory space directly. Message-based communication supports both synchronous (blocking) and asynchronous (non-blocking) communication patterns, making it suitable for various system architectures. How Message-based Communication Works ...

Read More

Numerical on Disk

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 2K+ Views

Numerics are essential for understanding the complex facets of disk storage since they offer a hands-on, practical method to grasp fundamental concepts. By exploring numerical examples, we can investigate how disk capacity, performance, and utilization are calculated, helping us understand the fundamentals of efficient storage management. Example − Consider a cloud service provider that offers file storage access to its customers. The service provider stores customer files, including documents, photos, and multimedia content, on disk storage. The disk storage system is built to support high data throughput and offers reliable file access. Disk Structure ...

Read More

Methods in Interprocess Communication

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 4K+ Views

Interprocess Communication (IPC) refers to the mechanisms that allow processes running on the same or different systems to exchange data and coordinate their activities. Since processes typically run in isolated memory spaces for security and stability, IPC provides the necessary channels for them to communicate when they need to share information or synchronize their operations. IPC is fundamental to modern operating systems and enables everything from simple parent-child process coordination to complex distributed computing systems. The primary goals of IPC are to facilitate secure, efficient, and reliable data exchange between processes while maintaining system integrity. Types of IPC ...

Read More

Methods to clean temporary files from Ubuntu

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 2K+ Views

Temporary files are data created by programs for storing information while other operations are being performed. These temporary files can accumulate over time and consume valuable disk space. Ubuntu provides several built-in methods and third-party tools to clean these files and optimize system performance. Regular cleanup of temporary files is essential for maintaining system efficiency, freeing up disk space, and protecting user privacy. Ubuntu offers both command-line utilities and graphical applications to accomplish this task effectively. Methods to Clean Temporary Files Using APT Package Manager Commands The APT clean command removes downloaded package files from the ...

Read More

Microsoft Windows (10) Vs macOS (Mojave)

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 347 Views

Microsoft Windows 10 is the flagship operating system from Microsoft Corporation, released in 2015. It has become one of the most widely-used desktop operating systems globally, offering a customizable user experience, robust security features, and extensive compatibility with diverse hardware and software platforms. macOS Mojave is Apple Inc.'s desktop operating system, released in 2018 exclusively for Apple devices. It provides a streamlined user interface, strong security measures, and seamless integration with other Apple products like iPhones and iPads. This article compares these two popular operating systems, examining their key differences, advantages, and limitations to help users understand which ...

Read More
Showing 11–20 of 99 articles
« Prev 1 2 3 4 5 10 Next »
Advertisements