Pranavnath

Pranavnath

389 Articles Published

Articles by Pranavnath

Page 9 of 39

Raymond’s tree based algorithm

Pranavnath
Pranavnath
Updated on 17-Mar-2026 4K+ Views

Raymond's tree-based algorithm is a distributed mutual exclusion algorithm that uses a token-based approach to control access to critical sections in distributed systems. It organizes all nodes in a directed spanning tree structure, where edges point toward the node currently holding the token. This algorithm ensures that only one process can enter the critical section at any given time across the entire distributed network. How Raymond's Tree Algorithm Works The algorithm operates on the principle that only the node with the token can enter the critical section. All nodes are arranged in a tree structure where each node ...

Read More

Round Robin Scheduling with different arrival times

Pranavnath
Pranavnath
Updated on 17-Mar-2026 11K+ Views

Round Robin (RR) is a preemptive CPU scheduling algorithm where each process is allocated a fixed time slice called a quantum. Unlike standard Round Robin with zero arrival times, this variant handles processes that arrive at different times, making scheduling more complex as the ready queue changes dynamically. In preemptive scheduling, a running process can be interrupted and moved back to the ready queue. Round Robin ensures fairness by giving each process an equal share of CPU time, preventing starvation while maintaining good response times for interactive systems. How Round Robin Works with Different Arrival Times When ...

Read More

Progress of a Process

Pranavnath
Pranavnath
Updated on 17-Mar-2026 960 Views

In an operating system, a process transitions through various states during its lifecycle, from creation to termination. The progress of a process refers to how a process moves through these states based on system conditions like CPU availability, I/O operations, and user interactions. Understanding process progress is crucial for effective process management and synchronization in multi-process environments. Process States A process can exist in several distinct states during its execution. The state transitions form the foundation of process progress tracking. Process State Diagram ...

Read More

Protection in File System

Pranavnath
Pranavnath
Updated on 17-Mar-2026 2K+ Views

Protection in File System refers to the security mechanisms and access control measures implemented to safeguard files and data stored in a computer system's file system. In multi-user environments, file protection becomes critical to prevent unauthorized access, data breaches, and maintain data integrity across different users and processes. File systems organize data in a hierarchical structure where files contain metadata such as creation date, permissions, owner information, and access rights. The protection mechanisms ensure that only authorized users can perform specific operations like read, write, execute, or delete on files based on their access privileges. Types of File ...

Read More

Puppy Linux Operating System

Pranavnath
Pranavnath
Updated on 17-Mar-2026 678 Views

Puppy Linux is a lightweight version of the Linux operating system designed for small, portable, and versatile usage on home user systems. Developed by Barry Kauler in June 2003, it prioritizes minimal resource usage while providing a complete desktop experience. The entire system operates within 300MB for 32-bit and 600MB for 64-bit versions, making it ideal for older hardware and resource-constrained environments. Features Puppy Linux offers exceptional functionality in a compact package − Ultra-compact size − Around 300MB or less, installable from USB, CD, SD card, or other media Ready-to-use applications − Includes essential tools like ...

Read More

Rate-monotonic scheduling

Pranavnath
Pranavnath
Updated on 17-Mar-2026 5K+ Views

Rate Monotonic Scheduling (RMS) is a fixed-priority preemptive scheduling algorithm used in real-time operating systems. It assigns higher priorities to tasks with shorter periods, making it optimal for meeting deadlines when tasks have periods equal to their deadlines. How Rate Monotonic Scheduling Works The algorithm follows a simple rule: tasks with shorter periods receive higher priorities. These priorities remain fixed throughout execution, making RMS a static priority scheduling algorithm. When a higher-priority task becomes ready, it preempts any currently running lower-priority task. Rate Monotonic Priority Assignment Task A ...

Read More

Protection in OS: Domain of Protection, Association, Authentication

Pranavnath
Pranavnath
Updated on 17-Mar-2026 2K+ Views

The Operating System manages various application programs loaded into memory after system boot. The OS provides security methods to protect processes from unauthorized access and manages resources across both logical and physical address spaces, including CPU, internal memory, and disk storage. Protection mechanisms ensure confidentiality and integrity of these critical resources. Protection in OS In multi-user environments, securing data from unauthorized processes and external access is essential. The OS implements access control mechanisms that define which users or processes can perform read, write, or execute operations on specific resources. Protection addresses common threats including viruses, worms, Trojan horses, ...

Read More

Protection ring

Pranavnath
Pranavnath
Updated on 17-Mar-2026 2K+ Views

Protection rings are a security mechanism used by operating systems to control access to system resources and hardware. These rings create a hierarchical privilege structure, with each ring having different levels of access permissions. The central ring (Ring 0) at the kernel level has the highest privilege and can access all resources, while outer rings have progressively fewer permissions. This mechanism is hardware-enforced by the CPU architecture at different access modes. The x86 processor architecture implements four protection rings (Ring 0 to Ring 3), where Ring 0 has the highest privilege level and Ring 3 has the lowest. ...

Read More

Requirements of Linux System Administrator

Pranavnath
Pranavnath
Updated on 17-Mar-2026 3K+ Views

Linux is a type of operating system that is used in many computers, acting as a common platform between hardware and software applications. It is implemented not only in servers and workstations but also in mobile devices, embedded systems, and cloud infrastructure. Linux OS can be installed and used for free as it comes under open source licensing. The Linux System Administrator is a critical position in Information Technology (IT) organizations, responsible for maintaining, configuring, and securing Linux-based systems that form the backbone of modern enterprise infrastructure. Linux System Administrator Role A Linux System Administrator is a specialized ...

Read More

Selfish Round Robin CPU Scheduling

Pranavnath
Pranavnath
Updated on 17-Mar-2026 882 Views

Selfish Round Robin (SRR) is a CPU scheduling algorithm that modifies traditional round robin by introducing dynamic priority adjustments. Unlike standard round robin where all processes get equal treatment, SRR allows processes to "selfishly" increase their priority based on execution time, creating a more adaptive scheduling approach. The traditional round-robin scheduling algorithm is preemptive, giving each process a fixed time slice. After the quantum expires, the process moves to the end of the ready queue. SRR enhances this by maintaining two separate queues and allowing priority manipulation to favor longer-running processes. How Selfish Round Robin Works SRR ...

Read More
Showing 81–90 of 389 articles
« Prev 1 7 8 9 10 11 39 Next »
Advertisements