Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Diksha Patro
Page 2 of 10
Look aside Buffer
A Look-aside Buffer (LAB) is a type of cache memory used in computer systems to store frequently accessed data. The LAB is positioned between the CPU and main memory, acting as a high-speed buffer to improve overall system performance by reducing memory access latency. The LAB operates by caching frequently accessed data from main memory. When the CPU requests data, the LAB first checks if the data exists in its buffer. If found (a hit), the data is immediately retrieved and sent to the CPU, significantly reducing access time compared to fetching from main memory. Where Look Aside ...
Read MoreMemory Protection in Operating Systems
Memory protection is a fundamental security mechanism in operating systems that prevents one process from accessing or modifying the memory space allocated to another process. This isolation ensures system stability and security by maintaining strict boundaries between different programs running concurrently. The primary goal of memory protection is to prevent unauthorized memory access. When a process attempts to access memory outside its allocated space, the operating system immediately terminates the offending process, preventing potential system crashes or security breaches. How Memory Protection Works Memory protection is typically implemented using hardware components called Memory Management Units (MMUs). The ...
Read MoreLock Variable Synchronization Mechanism
Lock variable synchronization is a fundamental mechanism in concurrent programming that ensures multiple threads or processes can safely access shared resources without encountering race conditions or data corruption. It provides a way to control execution order, allowing threads to have exclusive access to critical sections when needed. In this article, we will explore lock variable synchronization, its use cases, and demonstrate its implementation with a practical C example. How Lock Variable Synchronization Works The core concept involves using a shared variable (called a lock or mutex - mutual exclusion) to control access to critical code sections. A ...
Read MoreNTFS Junction Points
NTFS Junction Points are a type of symbolic link in the Windows NTFS file system that allow you to create directory-level links within the same volume. They act as transparent redirections, making one directory appear at a different location while the actual data remains in its original place. Junction points provide a powerful mechanism for file system organization, application compatibility, and efficient storage management without physically moving files or disrupting existing pathways. How Junction Points Work Junction points use reparse points, a special NTFS feature that intercepts file system operations and redirects them to another location. When ...
Read MoreNucleus Operating System
The Nucleus is an RTOS that was developed by Mentor Graphics Embedded Software Division, a Siemens Business that supports 32-bit and 64-bit embedded system platforms. The Nucleus operating system (OS) is mainly intended for use in real-time embedded systems in medical, aerospace, industrial, consumer, and Internet of Things (IoT) applications. In this article, we will explore Nucleus Operating System, its components, and features as well. Nucleus Operating System The Nucleus OS was initially introduced in 1993. The latest version, 3.x, offers various features, including 64-bit support, safety certification, power management, and a process model. It also supports ...
Read MoreMessage-based Communication in IPC(inter-process communication)
Message-based communication is a method of Inter-Process Communication (IPC) where processes exchange data by sending and receiving messages. In this communication model, the sending process creates a message containing the data to be shared and transmits it to the receiving process. The receiving process then retrieves the message and extracts the required information. This approach provides a clean abstraction for process communication, allowing processes to exchange data without sharing memory space directly. Message-based communication supports both synchronous (blocking) and asynchronous (non-blocking) communication patterns, making it suitable for various system architectures. How Message-based Communication Works ...
Read MoreNumerical on Disk
Numerics are essential for understanding the complex facets of disk storage since they offer a hands-on, practical method to grasp fundamental concepts. By exploring numerical examples, we can investigate how disk capacity, performance, and utilization are calculated, helping us understand the fundamentals of efficient storage management. Example − Consider a cloud service provider that offers file storage access to its customers. The service provider stores customer files, including documents, photos, and multimedia content, on disk storage. The disk storage system is built to support high data throughput and offers reliable file access. Disk Structure ...
Read MoreMethods in Interprocess Communication
Interprocess Communication (IPC) refers to the mechanisms that allow processes running on the same or different systems to exchange data and coordinate their activities. Since processes typically run in isolated memory spaces for security and stability, IPC provides the necessary channels for them to communicate when they need to share information or synchronize their operations. IPC is fundamental to modern operating systems and enables everything from simple parent-child process coordination to complex distributed computing systems. The primary goals of IPC are to facilitate secure, efficient, and reliable data exchange between processes while maintaining system integrity. Types of IPC ...
Read MoreMethods to clean temporary files from Ubuntu
Temporary files are data created by programs for storing information while other operations are being performed. These temporary files can accumulate over time and consume valuable disk space. Ubuntu provides several built-in methods and third-party tools to clean these files and optimize system performance. Regular cleanup of temporary files is essential for maintaining system efficiency, freeing up disk space, and protecting user privacy. Ubuntu offers both command-line utilities and graphical applications to accomplish this task effectively. Methods to Clean Temporary Files Using APT Package Manager Commands The APT clean command removes downloaded package files from the ...
Read MoreMicrosoft Windows (10) Vs macOS (Mojave)
Microsoft Windows 10 is the flagship operating system from Microsoft Corporation, released in 2015. It has become one of the most widely-used desktop operating systems globally, offering a customizable user experience, robust security features, and extensive compatibility with diverse hardware and software platforms. macOS Mojave is Apple Inc.'s desktop operating system, released in 2018 exclusively for Apple devices. It provides a streamlined user interface, strong security measures, and seamless integration with other Apple products like iPhones and iPads. This article compares these two popular operating systems, examining their key differences, advantages, and limitations to help users understand which ...
Read More