SlideShare a Scribd company logo
1 of 22
Download to read offline
KERNEL
WHAT IS KERNEL?
• In computing, the kernel is the central component of most computer
operating systems; it is a bridge between applications and the actual
data processing done at the hardware level.
• It acts as an interface between the user applications and the
hardware.
• The sole aim of kernel is to manage the communication between the
software (user level applications) and the hardware (CPU, disk
memory etc)
• When a process makes requests of the kernel, the request is called a
system call. Various kernel designs differ in how they manage system
calls and resources.
TYPES OF KERNELS:
• Micro Kernel:
Only the very important parts like INTER process communication(IPC) ,
basic schedular, basic memory handling , basic I/O primitives are placed in
kernel. Others are maintained as server processes in user space .
Communication is done by message passing .
• The kernel is broken down into separate processes, known as servers.
Some of the servers run in kernel space and some run in user-space. All
servers are kept separate and run in different address spaces. The
communication in microkernels is done via message passing. The servers
communicate through InterProcess Communication IPC. Servers invoke
“services” from each other by sending messages.
ADVANTAGES OF MICROKERNEL
• Microkernels are easier to maintain than monolithic kernels, but the
large number of system calls and context switches might slow down
the system because they typically generate more overhead than plain
function calls. A microkernel allows the implementation of the
remaining part of the operating system as a normal application
program written in a high-level language
• Crash resistant ( if one server fails, other servers can still work
efficiently.)
• Portable
• Smaller in Size
Slower processing because of additional message
passing.
DISADVANTAGES OF MICROKERNEL:
MONOLITHIC KERNEL
• MONOLITHIC KERNEL: It runs every basic system service like
process and memory management, interrupt handling and I/O
communication, file system etc. in kernel space. Examples are Linux,
Unix.
• Advantages: performance
• Disadvantages: difficult to debug and maintain
HYBRID KERNEL:
• One other type of kernel is called a hybrid kernel which lies on the
boundary between monolithic kernels and microkernels. This means it
has qualities of both, but hybrid kernels cannot be classified as a
monolithic kernel or microkernel exclusively.
Combine the best of both worlds
• Speed and simple design of a monolithic kernel
• Modularity and stability of a microkernel
HYBRID KERNELS:
Advantages:
• Benefits of monolithic and microkernels
Disadvantages:
• Same as monolithic kernels
KERNEL’S RESPONSIBILITIES:
• The central processing unit
• Random access memory
• INPUT/OUTPUT devices
• Memory management
• Device management
• System calls
THE CENTRAL PROCESSING UNIT
• This central component of a computer system is responsible
for running or executing programs. The kernel takes responsibility for
deciding at any time which of the many running programs should be
allocated to the processor or processors (each of which can usually
run only one program at a time).
RANDOM ACCESS MEMORY
• Random-access memory is used to store both program instructions
and data. Typically, both need to be present in memory in order for a
program to execute. Often multiple programs will want access to
memory, frequently demanding more memory than the computer has
available. The kernel is responsible for deciding which memory each
process can use, and determining what to do when not enough
memory is available.
INPUT/OUTPUT DEVICES
• I/O devices include such peripherals as keyboards, mice, disk drives,
printers, network adapters, and display devices. The kernel allocates
requests from applications to perform I/O to an appropriate device and
provides convenient methods for using the device.
MEMORY MANAGEMENT
• The kernel has full access to the system's memory and must allow
processes to safely access this memory as they require it. Often the first
step in doing this is virtual addressing, usually achieved
by paging and/or segmentation. Virtual addressing allows the kernel to make
a given physical address appear to be another address, the virtual address.
Virtual address spaces may be different for different processes; the memory
that one process accesses at a particular (virtual) address may be different
memory from what another process accesses at the same address. This
allows every program to behave as if it is the only one (apart from the
kernel) running and thus prevents applications from crashing each other.
DEVICE MANAGEMENT
• A kernel must maintain a list of available devices. This list may be
known in advance configured by the user or detected by the operating
system at run time (normally called plug and play). In a plug and play
system, a device manager first performs a scan on different hardware
buses, such as Peripheral Component Interconnect (PCI) or Universal
Serial Bus (USB), to detect installed devices, then searches for the
appropriate drivers.
SYSTEM CALLS
• In computing, a system call is how a program requests a service from
an operating system's kernel that it does not normally have
permission to run. System calls provide the interface between a
process and the operating system. Most operations interacting with
the system require permissions not available to a user level process,
e.g. I/O performed with a device present on the system, or any form of
communication with other processes requires the use of system calls.
FEATURES THAT KERNEL PROVIDES:
• low-level scheduling of processes (dispatching)
• inter-process communication
• process synchronization
• context switching
• manipulation of process control blocks
• interrupt handling
• process creation and destruction
• process suspension and resumption
Kernel (OS)

More Related Content

What's hot (20)

Direct memory access (dma)
Direct memory access (dma)Direct memory access (dma)
Direct memory access (dma)
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Interrupts
InterruptsInterrupts
Interrupts
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Demand paging
Demand pagingDemand paging
Demand paging
 
Computer architecture memory system
Computer architecture memory systemComputer architecture memory system
Computer architecture memory system
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Cache memory
Cache memoryCache memory
Cache memory
 
Kernel mode vs user mode in linux
Kernel mode vs user mode in linuxKernel mode vs user mode in linux
Kernel mode vs user mode in linux
 
Computer registers
Computer registersComputer registers
Computer registers
 
Memory Hierarchy
Memory HierarchyMemory Hierarchy
Memory Hierarchy
 
Virtual memory ppt
Virtual memory pptVirtual memory ppt
Virtual memory ppt
 
Processors and its Types
Processors and its TypesProcessors and its Types
Processors and its Types
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Memory management
Memory managementMemory management
Memory management
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System Calls
 

Similar to Kernel (OS)

lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categoriesWajeehaBaig
 
Kernel. Operating System
Kernel. Operating SystemKernel. Operating System
Kernel. Operating Systempratikkadam78
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts PresentationNitish Jadia
 
Operating system components
Operating system componentsOperating system components
Operating system componentsSyed Zaid Irshad
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxAryanGour1
 
Embedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptxEmbedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptxssuseradc877
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsNational Cheng Kung University
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based osVaibhav Khanna
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxakhilagajjala
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology BasicMayank Garg
 

Similar to Kernel (OS) (20)

lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
 
Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Kernel. Operating System
Kernel. Operating SystemKernel. Operating System
Kernel. Operating System
 
Kernel
KernelKernel
Kernel
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts Presentation
 
In a monolithic kerne1
In a monolithic kerne1In a monolithic kerne1
In a monolithic kerne1
 
In a monolithic kerne1
In a monolithic kerne1In a monolithic kerne1
In a monolithic kerne1
 
Microkernel
MicrokernelMicrokernel
Microkernel
 
Monolithic kernel
Monolithic kernelMonolithic kernel
Monolithic kernel
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptx
 
System structure
System structureSystem structure
System structure
 
Walking around linux kernel
Walking around linux kernelWalking around linux kernel
Walking around linux kernel
 
Embedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptxEmbedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptx
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based os
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptx
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology Basic
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 

More from عطاءالمنعم اثیل شیخ

More from عطاءالمنعم اثیل شیخ (19)

Installing lemp with ssl and varnish on Debian 9
Installing lemp with ssl and varnish on Debian 9Installing lemp with ssl and varnish on Debian 9
Installing lemp with ssl and varnish on Debian 9
 
CBBF exam prepguidev1.1
CBBF exam prepguidev1.1CBBF exam prepguidev1.1
CBBF exam prepguidev1.1
 
Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum) Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum)
 
Comparison of different Proxmox KVM OpenVZ
Comparison of different Proxmox KVM OpenVZComparison of different Proxmox KVM OpenVZ
Comparison of different Proxmox KVM OpenVZ
 
Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
 
Islam, in the eyes of non-muslims
Islam, in the eyes of non-muslimsIslam, in the eyes of non-muslims
Islam, in the eyes of non-muslims
 
Kashmir
KashmirKashmir
Kashmir
 
History of Sindh
History of SindhHistory of Sindh
History of Sindh
 
Logical Gates
Logical GatesLogical Gates
Logical Gates
 
Difference in English Writing
Difference in English WritingDifference in English Writing
Difference in English Writing
 
Refractories in Cupola furnace
Refractories in Cupola furnaceRefractories in Cupola furnace
Refractories in Cupola furnace
 
Computing Fundamentals
Computing FundamentalsComputing Fundamentals
Computing Fundamentals
 
Sindhi language assignment
Sindhi language assignmentSindhi language assignment
Sindhi language assignment
 
Sindhi language
Sindhi languageSindhi language
Sindhi language
 
Languages of Sindh
Languages of SindhLanguages of Sindh
Languages of Sindh
 
Concreteness (Seven C's of English)
Concreteness (Seven C's of English)Concreteness (Seven C's of English)
Concreteness (Seven C's of English)
 
Foods Of Sindh
Foods Of SindhFoods Of Sindh
Foods Of Sindh
 
Festivals of sindh
Festivals of sindhFestivals of sindh
Festivals of sindh
 
Clarity
ClarityClarity
Clarity
 

Recently uploaded

22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfalokitpathak01
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...IJAEMSJORNAL
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliNimot Muili
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 

Recently uploaded (20)

22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Indian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdfIndian Tradition, Culture & Societies.pdf
Indian Tradition, Culture & Societies.pdf
 
Detection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and trackingDetection&Tracking - Thermal imaging object detection and tracking
Detection&Tracking - Thermal imaging object detection and tracking
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot MuiliStructural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
Structural Integrity Assessment Standards in Nigeria by Engr Nimot Muili
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 

Kernel (OS)

  • 2. WHAT IS KERNEL? • In computing, the kernel is the central component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. • It acts as an interface between the user applications and the hardware. • The sole aim of kernel is to manage the communication between the software (user level applications) and the hardware (CPU, disk memory etc) • When a process makes requests of the kernel, the request is called a system call. Various kernel designs differ in how they manage system calls and resources.
  • 3.
  • 4. TYPES OF KERNELS: • Micro Kernel: Only the very important parts like INTER process communication(IPC) , basic schedular, basic memory handling , basic I/O primitives are placed in kernel. Others are maintained as server processes in user space . Communication is done by message passing . • The kernel is broken down into separate processes, known as servers. Some of the servers run in kernel space and some run in user-space. All servers are kept separate and run in different address spaces. The communication in microkernels is done via message passing. The servers communicate through InterProcess Communication IPC. Servers invoke “services” from each other by sending messages.
  • 5. ADVANTAGES OF MICROKERNEL • Microkernels are easier to maintain than monolithic kernels, but the large number of system calls and context switches might slow down the system because they typically generate more overhead than plain function calls. A microkernel allows the implementation of the remaining part of the operating system as a normal application program written in a high-level language • Crash resistant ( if one server fails, other servers can still work efficiently.) • Portable • Smaller in Size
  • 6. Slower processing because of additional message passing. DISADVANTAGES OF MICROKERNEL:
  • 7. MONOLITHIC KERNEL • MONOLITHIC KERNEL: It runs every basic system service like process and memory management, interrupt handling and I/O communication, file system etc. in kernel space. Examples are Linux, Unix. • Advantages: performance • Disadvantages: difficult to debug and maintain
  • 8.
  • 9. HYBRID KERNEL: • One other type of kernel is called a hybrid kernel which lies on the boundary between monolithic kernels and microkernels. This means it has qualities of both, but hybrid kernels cannot be classified as a monolithic kernel or microkernel exclusively. Combine the best of both worlds • Speed and simple design of a monolithic kernel • Modularity and stability of a microkernel
  • 10. HYBRID KERNELS: Advantages: • Benefits of monolithic and microkernels Disadvantages: • Same as monolithic kernels
  • 11.
  • 12.
  • 13. KERNEL’S RESPONSIBILITIES: • The central processing unit • Random access memory • INPUT/OUTPUT devices • Memory management • Device management • System calls
  • 14. THE CENTRAL PROCESSING UNIT • This central component of a computer system is responsible for running or executing programs. The kernel takes responsibility for deciding at any time which of the many running programs should be allocated to the processor or processors (each of which can usually run only one program at a time).
  • 15. RANDOM ACCESS MEMORY • Random-access memory is used to store both program instructions and data. Typically, both need to be present in memory in order for a program to execute. Often multiple programs will want access to memory, frequently demanding more memory than the computer has available. The kernel is responsible for deciding which memory each process can use, and determining what to do when not enough memory is available.
  • 16. INPUT/OUTPUT DEVICES • I/O devices include such peripherals as keyboards, mice, disk drives, printers, network adapters, and display devices. The kernel allocates requests from applications to perform I/O to an appropriate device and provides convenient methods for using the device.
  • 17. MEMORY MANAGEMENT • The kernel has full access to the system's memory and must allow processes to safely access this memory as they require it. Often the first step in doing this is virtual addressing, usually achieved by paging and/or segmentation. Virtual addressing allows the kernel to make a given physical address appear to be another address, the virtual address. Virtual address spaces may be different for different processes; the memory that one process accesses at a particular (virtual) address may be different memory from what another process accesses at the same address. This allows every program to behave as if it is the only one (apart from the kernel) running and thus prevents applications from crashing each other.
  • 18. DEVICE MANAGEMENT • A kernel must maintain a list of available devices. This list may be known in advance configured by the user or detected by the operating system at run time (normally called plug and play). In a plug and play system, a device manager first performs a scan on different hardware buses, such as Peripheral Component Interconnect (PCI) or Universal Serial Bus (USB), to detect installed devices, then searches for the appropriate drivers.
  • 19. SYSTEM CALLS • In computing, a system call is how a program requests a service from an operating system's kernel that it does not normally have permission to run. System calls provide the interface between a process and the operating system. Most operations interacting with the system require permissions not available to a user level process, e.g. I/O performed with a device present on the system, or any form of communication with other processes requires the use of system calls.
  • 20.
  • 21. FEATURES THAT KERNEL PROVIDES: • low-level scheduling of processes (dispatching) • inter-process communication • process synchronization • context switching • manipulation of process control blocks • interrupt handling • process creation and destruction • process suspension and resumption