wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Explain Kernel in OS

profile
Prithika Burmon
Jul 03, 2024
0 Likes
0 Discussions
83 Reads

Kernel is the main component of the Operating systems. Its main task is to basically manage the operations of the memory and CPU time. It loads to begin with into memory when an working framework is stacked and remains into memory until working framework is closed down once more. It is accountable for managing tasks such as Disk Management , task Management and Memory Management. It focuses to manage commuication between software and disk memory.  It acts as a bridge between applications and data processing done at the hardware level. It is the central component of an OS.

 

Types of Kernel :

1. Monolithic Kernel :-

  • It operates on the kernel space as communication is more efficient  .
  • It is faster than other types of kernel as it don’t switch between users and kernel modes.
  • It has lower inactivity than other sorts of bits since framework calls and hinders can be taken care of specifically by the kernel.
  • It is simpler and easy to design.
  • Example :- Unix , Linux

 

2. Micro Kernel :-

  • It is more flexible as it allows different OS services to be added or removed without affecting the entire system.
  • It is more portable as it is easier to port  the operating system to different hardware architectures.
  • Example  :- Mach , L4 , etc.

 

3. Nano Kernel :-

  • It is amazingly little, giving as it were the most fundamental capacities required to run the framework.
  • It is more quick and productive than other bit sorts. 
  • It is exceedingly convenient, permitting them to run on a wide run of equipment models.
  • Example : - EROS , etc.

 

4. Hybrid Kernel :-  

  • It is the combination of both solid part and microkernel.      
  • It gives better performance as  they reduce the number of context switches required between user space and kernel space.
  • It more congruous than microkernels since they can bolster a more extensive run of gadget drivers.
  • Example :-  Windows , NT , MacOS , etc.

Comments ()


Sign in

Read Next

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Hubspot

Blog banner

Ethical Hacking

Blog banner

Policies for Service Transition

Blog banner

THE DESIRE OF MANY

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Different memory allocation strategies

Blog banner

Process State

Blog banner

Raid and levels of raid.

Blog banner

Threats To Computer System

Blog banner

Scheduling

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Way to make your meal healthier.

Blog banner

Operating system and overviews

Blog banner

Cycling

Blog banner

IT service level agreement

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Socket Programming in Java

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Threat management

Blog banner

Odoo

Blog banner

Gamer life

Blog banner

Education?

Blog banner

Buffering

Blog banner

I/O Buffering

Blog banner

Ubiquitous Computing

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Compromising Mobile Platforms

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Importance of education

Blog banner

Buffering

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

About myself

Blog banner

What is a Malware ?

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner