wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Explain Kernel in OS

profile
Prithika Burmon
Jul 03, 2024
0 Likes
0 Discussions
83 Reads

Kernel is the main component of the Operating systems. Its main task is to basically manage the operations of the memory and CPU time. It loads to begin with into memory when an working framework is stacked and remains into memory until working framework is closed down once more. It is accountable for managing tasks such as Disk Management , task Management and Memory Management. It focuses to manage commuication between software and disk memory.  It acts as a bridge between applications and data processing done at the hardware level. It is the central component of an OS.

 

Types of Kernel :

1. Monolithic Kernel :-

  • It operates on the kernel space as communication is more efficient  .
  • It is faster than other types of kernel as it don’t switch between users and kernel modes.
  • It has lower inactivity than other sorts of bits since framework calls and hinders can be taken care of specifically by the kernel.
  • It is simpler and easy to design.
  • Example :- Unix , Linux

 

2. Micro Kernel :-

  • It is more flexible as it allows different OS services to be added or removed without affecting the entire system.
  • It is more portable as it is easier to port  the operating system to different hardware architectures.
  • Example  :- Mach , L4 , etc.

 

3. Nano Kernel :-

  • It is amazingly little, giving as it were the most fundamental capacities required to run the framework.
  • It is more quick and productive than other bit sorts. 
  • It is exceedingly convenient, permitting them to run on a wide run of equipment models.
  • Example : - EROS , etc.

 

4. Hybrid Kernel :-  

  • It is the combination of both solid part and microkernel.      
  • It gives better performance as  they reduce the number of context switches required between user space and kernel space.
  • It more congruous than microkernels since they can bolster a more extensive run of gadget drivers.
  • Example :-  Windows , NT , MacOS , etc.

Comments ()


Sign in

Read Next

How to Avoid being a Victim of Cybercrime

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Hacking of web server and application

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Buffering

Blog banner

Dangers of Using Public WiFis

Blog banner

Virtualization

Blog banner

THREADS (assignment 1)

Blog banner

What is Network Security?

Blog banner

Is It Too Late to Straighten My Teeth as an Adult?

Blog banner

Mail merge

Blog banner

Understanding - Proof of Work!

Blog banner

IO Buffers

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Memory Management

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Blockchain

Blog banner

c

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Tableau

Blog banner

PHONE TECHNOLOGY

Blog banner

Yahoo! mail

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Interrupts

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

The art of being alone

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Security Issues and Countermeasures

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Explain Multiprocessors

Blog banner

computer security

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Memory Management

Blog banner

undefined

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner