wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Explain Kernel in OS

profile
Prithika Burmon
Jul 03, 2024
0 Likes
0 Discussions
83 Reads

Kernel is the main component of the Operating systems. Its main task is to basically manage the operations of the memory and CPU time. It loads to begin with into memory when an working framework is stacked and remains into memory until working framework is closed down once more. It is accountable for managing tasks such as Disk Management , task Management and Memory Management. It focuses to manage commuication between software and disk memory.  It acts as a bridge between applications and data processing done at the hardware level. It is the central component of an OS.

 

Types of Kernel :

1. Monolithic Kernel :-

  • It operates on the kernel space as communication is more efficient  .
  • It is faster than other types of kernel as it don’t switch between users and kernel modes.
  • It has lower inactivity than other sorts of bits since framework calls and hinders can be taken care of specifically by the kernel.
  • It is simpler and easy to design.
  • Example :- Unix , Linux

 

2. Micro Kernel :-

  • It is more flexible as it allows different OS services to be added or removed without affecting the entire system.
  • It is more portable as it is easier to port  the operating system to different hardware architectures.
  • Example  :- Mach , L4 , etc.

 

3. Nano Kernel :-

  • It is amazingly little, giving as it were the most fundamental capacities required to run the framework.
  • It is more quick and productive than other bit sorts. 
  • It is exceedingly convenient, permitting them to run on a wide run of equipment models.
  • Example : - EROS , etc.

 

4. Hybrid Kernel :-  

  • It is the combination of both solid part and microkernel.      
  • It gives better performance as  they reduce the number of context switches required between user space and kernel space.
  • It more congruous than microkernels since they can bolster a more extensive run of gadget drivers.
  • Example :-  Windows , NT , MacOS , etc.

Comments ()


Sign in

Read Next

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Scheduling

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Direct Memory Access

Blog banner

Disk scheduling

Blog banner

IT RISK

Blog banner

Online Education

Blog banner

Types of Hackers.

Blog banner

Love is in air.....

Blog banner

Risk mitigation and management

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Deadlocks in Operating System

Blog banner

Cache memory

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

What is Packet Filtering?

Blog banner

Visualization in Data Science

Blog banner

Microsoft powerpoint presentation

Blog banner

10 Interesting facts you should know!!!

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Big Data Architecture

Blog banner

Fault Tolerance

Blog banner

GIS info about Bermuda Triangle

Blog banner

File sharing

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Introduction my self

Blog banner

Kernel in Operating System

Blog banner

Segmentation and paging concept

Blog banner

Phishing

Blog banner

"Games and the future"

Blog banner

A Deep Dive

Blog banner

Dos (Denial of service) Attack

Blog banner

Random Forests

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

All you need to know about Website Traffic

Blog banner

VIRTUAL MACHINES

Blog banner

Importance of self defence for girls

Blog banner

Security Issues and Countermeasures

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner