According to GeeksforGeeks, OSI Model or Operating Systems Interconnection is a 7 layer architecture with each layer having specific functionality to perform. It is developed by the International Organization of Standardization in 1984. All these layers work with each other to transport data from one point to another across the globe. The 7 layers are:Continue reading “OSI Model”
Category Archives: Uncategorized
Cryptography
Searchsecurity.techtarget defines cryptography as a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy” stands for “writing.” Sir Josh Fruhlinger of CSO also defines it asContinue reading “Cryptography”
Malware and Friends
For today’s blog, we will discuss several threats to the security of your computer. I will introduce you to Malware. Short As Microsoft puts it, “[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network.” In short, any software that is made to harmContinue reading “Malware and Friends”
Memory Mapped Files
A post from stackoverflow states that, memory mapped file is generally a file in the file system, which has been mapped by the operating system to some range of bytes in memory of a process. When the process writes to the memory of the process, the operating system takes care that the bytes are writtenContinue reading “Memory Mapped Files”
Different Structures of the Directory in the Operating System
According to GeeksforGeeks, there are several logical structures of a directory, these are given below. Single-level directory –Single level directory is simplest directory structure. In it all files are contained in same directory which make it easy to support and understand. A single level directory has a significant limitation, however, when the number of filesContinue reading “Different Structures of the Directory in the Operating System”
File Access Methods in Operating System
When a file is used, information is read and accessed into computer memory. There are many ways to access this information of the file. Sequential Access – It is the simplest access method. Information in the file is processed in order, one record after the other. This mode of access is by far the most common;Continue reading “File Access Methods in Operating System”
Static & Dynamic Loading | Static & Dynamic Linking
The website prepinsta.com differentiates static loading and dynamic loading in the table bellow: Static Loading Dynamic Loading The complete program is linked and complied without dependency of an external program. All the modules are loaded dynamically. The developer provides a reference to all of them and the rest of the work is done at executionContinue reading “Static & Dynamic Loading | Static & Dynamic Linking”
Logical and Physical address space.
Hey guys! Lets continue the topic by delving into the logical and physical address space in the Operating System. Logical address space, also known as virtual address is generated by the CPU while the program is running. It is used as a reference to access the physical memory location by CPU. Physical address space isContinue reading “Logical and Physical address space.”
CPU Scheduling Criteria
Hey guys, lets continue our topic on CPU Scheduling. This time let us know the CPU scheduling criteria. According to StudyTonight’s post on CPU Scheduling in OS, the different CPU scheduling criteria are: CPU Utilization To make out the best use of CPU and not to waste any CPU cycle, CPU would be working mostContinue reading “CPU Scheduling Criteria”
Preemptive vs. Non-Preemptive
I talked about CPU scheduling and CPU and I/O burst cycle in my last blog. Now, I will talk about Pre-emptive and Non Pre-emptive CPU scheduling. According to Guru99’s post about CPU Scheduling Algorithms in Operating System, Preemptive Scheduling In Preemptive Scheduling, the tasks are mostly assigned with their priorities. Sometimes it is important toContinue reading “Preemptive vs. Non-Preemptive”