SlideShare uma empresa Scribd logo
1 de 22
KERNEL
WHAT IS KERNEL?
• In computing, the kernel is the central component of most computer
operating systems; it is a bridge between applications and the actual
data processing done at the hardware level.
• It acts as an interface between the user applications and the
hardware.
• The sole aim of kernel is to manage the communication between the
software (user level applications) and the hardware (CPU, disk
memory etc)
• When a process makes requests of the kernel, the request is called a
system call. Various kernel designs differ in how they manage system
calls and resources.
TYPES OF KERNELS:
• Micro Kernel:
Only the very important parts like INTER process communication(IPC) ,
basic schedular, basic memory handling , basic I/O primitives are placed in
kernel. Others are maintained as server processes in user space .
Communication is done by message passing .
• The kernel is broken down into separate processes, known as servers.
Some of the servers run in kernel space and some run in user-space. All
servers are kept separate and run in different address spaces. The
communication in microkernels is done via message passing. The servers
communicate through InterProcess Communication IPC. Servers invoke
“services” from each other by sending messages.
ADVANTAGES OF MICROKERNEL
• Microkernels are easier to maintain than monolithic kernels, but the
large number of system calls and context switches might slow down
the system because they typically generate more overhead than plain
function calls. A microkernel allows the implementation of the
remaining part of the operating system as a normal application
program written in a high-level language
• Crash resistant ( if one server fails, other servers can still work
efficiently.)
• Portable
• Smaller in Size
Slower processing because of additional message
passing.
DISADVANTAGES OF MICROKERNEL:
MONOLITHIC KERNEL
• MONOLITHIC KERNEL: It runs every basic system service like
process and memory management, interrupt handling and I/O
communication, file system etc. in kernel space. Examples are Linux,
Unix.
• Advantages: performance
• Disadvantages: difficult to debug and maintain
HYBRID KERNEL:
• One other type of kernel is called a hybrid kernel which lies on the
boundary between monolithic kernels and microkernels. This means it
has qualities of both, but hybrid kernels cannot be classified as a
monolithic kernel or microkernel exclusively.
Combine the best of both worlds
• Speed and simple design of a monolithic kernel
• Modularity and stability of a microkernel
HYBRID KERNELS:
Advantages:
• Benefits of monolithic and microkernels
Disadvantages:
• Same as monolithic kernels
KERNEL’S RESPONSIBILITIES:
• The central processing unit
• Random access memory
• INPUT/OUTPUT devices
• Memory management
• Device management
• System calls
THE CENTRAL PROCESSING UNIT
• This central component of a computer system is responsible
for running or executing programs. The kernel takes responsibility for
deciding at any time which of the many running programs should be
allocated to the processor or processors (each of which can usually
run only one program at a time).
RANDOM ACCESS MEMORY
• Random-access memory is used to store both program instructions
and data. Typically, both need to be present in memory in order for a
program to execute. Often multiple programs will want access to
memory, frequently demanding more memory than the computer has
available. The kernel is responsible for deciding which memory each
process can use, and determining what to do when not enough
memory is available.
INPUT/OUTPUT DEVICES
• I/O devices include such peripherals as keyboards, mice, disk drives,
printers, network adapters, and display devices. The kernel allocates
requests from applications to perform I/O to an appropriate device and
provides convenient methods for using the device.
MEMORY MANAGEMENT
• The kernel has full access to the system's memory and must allow
processes to safely access this memory as they require it. Often the first
step in doing this is virtual addressing, usually achieved
by paging and/or segmentation. Virtual addressing allows the kernel to make
a given physical address appear to be another address, the virtual address.
Virtual address spaces may be different for different processes; the memory
that one process accesses at a particular (virtual) address may be different
memory from what another process accesses at the same address. This
allows every program to behave as if it is the only one (apart from the
kernel) running and thus prevents applications from crashing each other.
DEVICE MANAGEMENT
• A kernel must maintain a list of available devices. This list may be
known in advance configured by the user or detected by the operating
system at run time (normally called plug and play). In a plug and play
system, a device manager first performs a scan on different hardware
buses, such as Peripheral Component Interconnect (PCI) or Universal
Serial Bus (USB), to detect installed devices, then searches for the
appropriate drivers.
SYSTEM CALLS
• In computing, a system call is how a program requests a service from
an operating system's kernel that it does not normally have
permission to run. System calls provide the interface between a
process and the operating system. Most operations interacting with
the system require permissions not available to a user level process,
e.g. I/O performed with a device present on the system, or any form of
communication with other processes requires the use of system calls.
FEATURES THAT KERNEL PROVIDES:
• low-level scheduling of processes (dispatching)
• inter-process communication
• process synchronization
• context switching
• manipulation of process control blocks
• interrupt handling
• process creation and destruction
• process suspension and resumption
Kernel (OS)

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
 
operating system structure
operating system structureoperating system structure
operating system structure
 
SCHEDULING ALGORITHMS
SCHEDULING ALGORITHMSSCHEDULING ALGORITHMS
SCHEDULING ALGORITHMS
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
Scheduling algorithms
Scheduling algorithmsScheduling algorithms
Scheduling algorithms
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)
 
INTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxINTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptx
 
Multiprocessor system
Multiprocessor system Multiprocessor system
Multiprocessor system
 
Critical section problem in operating system.
Critical section problem in operating system.Critical section problem in operating system.
Critical section problem in operating system.
 
Lecture 2 process
Lecture 2   processLecture 2   process
Lecture 2 process
 
System call
System callSystem call
System call
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Memory management
Memory managementMemory management
Memory management
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 

Semelhante a Kernel (OS)

lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categoriesWajeehaBaig
 
Kernel. Operating System
Kernel. Operating SystemKernel. Operating System
Kernel. Operating Systempratikkadam78
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts PresentationNitish Jadia
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxAryanGour1
 
Embedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptxEmbedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptxssuseradc877
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsNational Cheng Kung University
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based osVaibhav Khanna
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxakhilagajjala
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology BasicMayank Garg
 
Aayu Tiwari operating system presentation_240406_095037.pdf
Aayu Tiwari operating system presentation_240406_095037.pdfAayu Tiwari operating system presentation_240406_095037.pdf
Aayu Tiwari operating system presentation_240406_095037.pdfaayutiwari2003
 

Semelhante a Kernel (OS) (20)

lecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categorieslecture 1 (Part 2) kernal and its categories
lecture 1 (Part 2) kernal and its categories
 
Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Kernel. Operating System
Kernel. Operating SystemKernel. Operating System
Kernel. Operating System
 
Kernel
KernelKernel
Kernel
 
Operating System Concepts Presentation
Operating System Concepts PresentationOperating System Concepts Presentation
Operating System Concepts Presentation
 
In a monolithic kerne1
In a monolithic kerne1In a monolithic kerne1
In a monolithic kerne1
 
In a monolithic kerne1
In a monolithic kerne1In a monolithic kerne1
In a monolithic kerne1
 
Microkernel
MicrokernelMicrokernel
Microkernel
 
Monolithic kernel
Monolithic kernelMonolithic kernel
Monolithic kernel
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptx
 
System structure
System structureSystem structure
System structure
 
Walking around linux kernel
Walking around linux kernelWalking around linux kernel
Walking around linux kernel
 
Embedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptxEmbedded Operating System-Kernel Features.pptx
Embedded Operating System-Kernel Features.pptx
 
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded SystemsF9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
F9: A Secure and Efficient Microkernel Built for Deeply Embedded Systems
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based os
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptx
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology Basic
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 
Aayu Tiwari operating system presentation_240406_095037.pdf
Aayu Tiwari operating system presentation_240406_095037.pdfAayu Tiwari operating system presentation_240406_095037.pdf
Aayu Tiwari operating system presentation_240406_095037.pdf
 

Mais de عطاءالمنعم اثیل شیخ

Mais de عطاءالمنعم اثیل شیخ (19)

Installing lemp with ssl and varnish on Debian 9
Installing lemp with ssl and varnish on Debian 9Installing lemp with ssl and varnish on Debian 9
Installing lemp with ssl and varnish on Debian 9
 
CBBF exam prepguidev1.1
CBBF exam prepguidev1.1CBBF exam prepguidev1.1
CBBF exam prepguidev1.1
 
Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum) Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum)
 
Comparison of different Proxmox KVM OpenVZ
Comparison of different Proxmox KVM OpenVZComparison of different Proxmox KVM OpenVZ
Comparison of different Proxmox KVM OpenVZ
 
Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
 
Islam, in the eyes of non-muslims
Islam, in the eyes of non-muslimsIslam, in the eyes of non-muslims
Islam, in the eyes of non-muslims
 
Kashmir
KashmirKashmir
Kashmir
 
History of Sindh
History of SindhHistory of Sindh
History of Sindh
 
Logical Gates
Logical GatesLogical Gates
Logical Gates
 
Difference in English Writing
Difference in English WritingDifference in English Writing
Difference in English Writing
 
Refractories in Cupola furnace
Refractories in Cupola furnaceRefractories in Cupola furnace
Refractories in Cupola furnace
 
Computing Fundamentals
Computing FundamentalsComputing Fundamentals
Computing Fundamentals
 
Sindhi language assignment
Sindhi language assignmentSindhi language assignment
Sindhi language assignment
 
Sindhi language
Sindhi languageSindhi language
Sindhi language
 
Languages of Sindh
Languages of SindhLanguages of Sindh
Languages of Sindh
 
Concreteness (Seven C's of English)
Concreteness (Seven C's of English)Concreteness (Seven C's of English)
Concreteness (Seven C's of English)
 
Foods Of Sindh
Foods Of SindhFoods Of Sindh
Foods Of Sindh
 
Festivals of sindh
Festivals of sindhFestivals of sindh
Festivals of sindh
 
Clarity
ClarityClarity
Clarity
 

Último

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Último (20)

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

Kernel (OS)

  • 2. WHAT IS KERNEL? • In computing, the kernel is the central component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. • It acts as an interface between the user applications and the hardware. • The sole aim of kernel is to manage the communication between the software (user level applications) and the hardware (CPU, disk memory etc) • When a process makes requests of the kernel, the request is called a system call. Various kernel designs differ in how they manage system calls and resources.
  • 3.
  • 4. TYPES OF KERNELS: • Micro Kernel: Only the very important parts like INTER process communication(IPC) , basic schedular, basic memory handling , basic I/O primitives are placed in kernel. Others are maintained as server processes in user space . Communication is done by message passing . • The kernel is broken down into separate processes, known as servers. Some of the servers run in kernel space and some run in user-space. All servers are kept separate and run in different address spaces. The communication in microkernels is done via message passing. The servers communicate through InterProcess Communication IPC. Servers invoke “services” from each other by sending messages.
  • 5. ADVANTAGES OF MICROKERNEL • Microkernels are easier to maintain than monolithic kernels, but the large number of system calls and context switches might slow down the system because they typically generate more overhead than plain function calls. A microkernel allows the implementation of the remaining part of the operating system as a normal application program written in a high-level language • Crash resistant ( if one server fails, other servers can still work efficiently.) • Portable • Smaller in Size
  • 6. Slower processing because of additional message passing. DISADVANTAGES OF MICROKERNEL:
  • 7. MONOLITHIC KERNEL • MONOLITHIC KERNEL: It runs every basic system service like process and memory management, interrupt handling and I/O communication, file system etc. in kernel space. Examples are Linux, Unix. • Advantages: performance • Disadvantages: difficult to debug and maintain
  • 8.
  • 9. HYBRID KERNEL: • One other type of kernel is called a hybrid kernel which lies on the boundary between monolithic kernels and microkernels. This means it has qualities of both, but hybrid kernels cannot be classified as a monolithic kernel or microkernel exclusively. Combine the best of both worlds • Speed and simple design of a monolithic kernel • Modularity and stability of a microkernel
  • 10. HYBRID KERNELS: Advantages: • Benefits of monolithic and microkernels Disadvantages: • Same as monolithic kernels
  • 11.
  • 12.
  • 13. KERNEL’S RESPONSIBILITIES: • The central processing unit • Random access memory • INPUT/OUTPUT devices • Memory management • Device management • System calls
  • 14. THE CENTRAL PROCESSING UNIT • This central component of a computer system is responsible for running or executing programs. The kernel takes responsibility for deciding at any time which of the many running programs should be allocated to the processor or processors (each of which can usually run only one program at a time).
  • 15. RANDOM ACCESS MEMORY • Random-access memory is used to store both program instructions and data. Typically, both need to be present in memory in order for a program to execute. Often multiple programs will want access to memory, frequently demanding more memory than the computer has available. The kernel is responsible for deciding which memory each process can use, and determining what to do when not enough memory is available.
  • 16. INPUT/OUTPUT DEVICES • I/O devices include such peripherals as keyboards, mice, disk drives, printers, network adapters, and display devices. The kernel allocates requests from applications to perform I/O to an appropriate device and provides convenient methods for using the device.
  • 17. MEMORY MANAGEMENT • The kernel has full access to the system's memory and must allow processes to safely access this memory as they require it. Often the first step in doing this is virtual addressing, usually achieved by paging and/or segmentation. Virtual addressing allows the kernel to make a given physical address appear to be another address, the virtual address. Virtual address spaces may be different for different processes; the memory that one process accesses at a particular (virtual) address may be different memory from what another process accesses at the same address. This allows every program to behave as if it is the only one (apart from the kernel) running and thus prevents applications from crashing each other.
  • 18. DEVICE MANAGEMENT • A kernel must maintain a list of available devices. This list may be known in advance configured by the user or detected by the operating system at run time (normally called plug and play). In a plug and play system, a device manager first performs a scan on different hardware buses, such as Peripheral Component Interconnect (PCI) or Universal Serial Bus (USB), to detect installed devices, then searches for the appropriate drivers.
  • 19. SYSTEM CALLS • In computing, a system call is how a program requests a service from an operating system's kernel that it does not normally have permission to run. System calls provide the interface between a process and the operating system. Most operations interacting with the system require permissions not available to a user level process, e.g. I/O performed with a device present on the system, or any form of communication with other processes requires the use of system calls.
  • 20.
  • 21. FEATURES THAT KERNEL PROVIDES: • low-level scheduling of processes (dispatching) • inter-process communication • process synchronization • context switching • manipulation of process control blocks • interrupt handling • process creation and destruction • process suspension and resumption