SlideShare a Scribd company logo
1 of 21
KERNEL
FORMAL DEFINITION
• In computing, the kernel is a computer program that manages
input/output requests from software and translates them into
data processing instructions for the central processing unit
and other electronic components of a computer.
• The kernel is a fundamental part of a modern computer's
operating system.
A kernel connectsthe application software to
the hardware ofacomputer.
Atypical vision of acomputer architecture asaseries of
abstractionlayers:
hardware, firmware, assembler, kernel, operating system
and applications
FEATURES THAT KERNEL
PROVIDES:
•low-level scheduling of processes
(dispatching)
•inter-process communication
•process synchronization
•context switching
•manipulation of process control
blocks
•interrupt handling
•process creation and destruction
•process suspension and
resumption
KERNELBASICFACILITIES
Thekernel's primary purpose isto managethe
computer's resourcesand allow other programsto run
and usetheseresources.
Typically,the resourcesconsistof:
 TheCPU,the processor.Thisisthe most central part of a
computer system,responsible for running or executing
programs onit.
 Thekernel takesresponsibility for deciding at any time
which of the manyrunning programs shouldbe allocated
to the processor or processors(eachof which canusually
run only one program at atime)
KERNELBASIC FACILITIES
 Thekernel is responsible for deciding whichmemory
eachprocesscanuse,and determining what to do when
not enough isavailable.
 AnyInput/Output devicespresent in the computer, such
askeyboard, mouse,disk drives, printers, displays,etc. The
kernel allocates requests from applications to perform
I/O to anappropriate deviceand provides convenient
methods for usingthe device.
TYPES OF KERNELS
• Monolithic kernels
• Microkernels(μK )
• Hybrid(Modular) kernels
• Nano kernels
• Exokernels
•Micro Kernel:
Only the very important parts like INTER process
communication(IPC) , basic schedular, basic memory handling ,
basic I/O primitives are placed in kernel. Others are maintained
as server processes in user space .
Communication is done by message passing .
The kernel is broken down into separate processes, known as
servers.. The communication in microkernels is done via
message passing. The servers communicate through InterProcess
Communication IPC. Servers invoke “services” from each other
by sending messages.
ADVANTAGES OF
MICROKERNEL
• Microkernels are easier to maintain than monolithic kernels.
• Crash resistant ( if one server fails, other servers can still work
efficiently.)
• Portable
• Smaller in Size
DISADVANTAGES OF MICROKERNEL:
Slower processing because of
additional message passing.
MONOLITHIC
KERNEL
•It runs every basic system service like process
and memory management, interrupt handling
and I/O communication, file system etc. in
kernel space. Examples are Linux, Unix.
•Advantages: performance
•Disadvantages: difficult to debug and maintain
HYBRID KERNEL:
•One other type of kernel is called a hybrid kernel which lies on
the boundary between monolithic kernels and microkernels.
This means it has qualities of both, but hybrid kernels cannot
be classified as a monolithic kernel or microkernel exclusively.
Combine the best of both worlds
•Speed and simple design of a monolithic kernel
•Modularity and stability of a microkernel
HYBRID KERNELS:
Advantages:
•Benefits of monolithic and
microkernels
Disadvantages:
•Same as monolithic kernels
KERNEL'S RESPONSIBILITIES:
•The central processing unit
•Random access memory
•INPUT/OUTPUT devices
•Memory management
•Device management
•System calls
THE CENTRAL PROCESSING
UNIT
•This central component of a computer system is responsible
for running or executing programs. The kernel takes
responsibility for deciding at any time which of the many
running programs should be allocated to the processor or
processors (each of which can usually run only one program
at a time).
RANDOM ACCESS
MEMORY
•Random-access memory is used to store both program
instructions and data. Typically, both need to be present in
memory in order for a program to execute. Often multiple
programs will want access to memory, frequently
demanding more memory than the computer has available.
The kernel is responsible for deciding which memory each
process can use, and determining what to do when not
enough memory is available.
INPUT/OUTPUT DEVICES
•I/O devices include such peripherals as keyboards, mice,
disk drives, printers, network adapters, and display devices.
The kernel allocates requests from applications to perform
I/O to an appropriate device and provides convenient
methods for using the device.
MEMORY MANAGEMENT
• Virtualaddressing:
Paging
Segmentation
• Data Stores:
Hard Drive
RAM
• Memory Partitions:
Kernel space
User space
• THE KERNEL HAS UNIQUE QUALITIES. IT ENFORCES ITS
OWN RULES AND THE STAKES, MANAGING THE ENTIRE
SYSTEM AS THE KERNEL DOES, ARE CERTAINLY HIGHER.
Conclusion
The kernel is a fundamental part of a  modern computer's operating system.

More Related Content

Similar to The kernel is a fundamental part of a modern computer's operating system.

Similar to The kernel is a fundamental part of a modern computer's operating system. (20)

Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Monolithic kernel
Monolithic kernelMonolithic kernel
Monolithic kernel
 
1_to_10.pdf
1_to_10.pdf1_to_10.pdf
1_to_10.pdf
 
CSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptxCSE3120- Module1 part 1 v1.pptx
CSE3120- Module1 part 1 v1.pptx
 
Aayu Tiwari operating system presentation_240406_095037.pdf
Aayu Tiwari operating system presentation_240406_095037.pdfAayu Tiwari operating system presentation_240406_095037.pdf
Aayu Tiwari operating system presentation_240406_095037.pdf
 
Operating system 15 micro kernel based os
Operating system 15 micro kernel based osOperating system 15 micro kernel based os
Operating system 15 micro kernel based os
 
_Kernel and Kernel Architectures.ppt
_Kernel and Kernel Architectures.ppt_Kernel and Kernel Architectures.ppt
_Kernel and Kernel Architectures.ppt
 
Microkernel
MicrokernelMicrokernel
Microkernel
 
Kernel. Operating System
Kernel. Operating SystemKernel. Operating System
Kernel. Operating System
 
Operating system components
Operating system componentsOperating system components
Operating system components
 
Microkernels
MicrokernelsMicrokernels
Microkernels
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptx
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 
chapter1.ppt
chapter1.pptchapter1.ppt
chapter1.ppt
 
System structure
System structureSystem structure
System structure
 
OS_MD_1.pdf
OS_MD_1.pdfOS_MD_1.pdf
OS_MD_1.pdf
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
Introduction to operating systems
 Introduction to operating systems Introduction to operating systems
Introduction to operating systems
 
ch1.ppt
ch1.pptch1.ppt
ch1.ppt
 

More from ASHIK MAHMUD

Monetary policy of Bangladesh and its effectiveness.
Monetary policy of Bangladesh and its effectiveness.Monetary policy of Bangladesh and its effectiveness.
Monetary policy of Bangladesh and its effectiveness.ASHIK MAHMUD
 
Computer architectural design methodology
Computer architectural design methodologyComputer architectural design methodology
Computer architectural design methodologyASHIK MAHMUD
 
Tourism in bangladesh
Tourism in bangladeshTourism in bangladesh
Tourism in bangladeshASHIK MAHMUD
 

More from ASHIK MAHMUD (7)

Monetary policy of Bangladesh and its effectiveness.
Monetary policy of Bangladesh and its effectiveness.Monetary policy of Bangladesh and its effectiveness.
Monetary policy of Bangladesh and its effectiveness.
 
Genetics 1 (1)
Genetics 1 (1)Genetics 1 (1)
Genetics 1 (1)
 
Computer science
Computer scienceComputer science
Computer science
 
Computer architectural design methodology
Computer architectural design methodologyComputer architectural design methodology
Computer architectural design methodology
 
Tourism in bangladesh
Tourism in bangladeshTourism in bangladesh
Tourism in bangladesh
 
Grid computing
Grid computingGrid computing
Grid computing
 
Computer network
Computer networkComputer network
Computer network
 

Recently uploaded

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 

Recently uploaded (20)

Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 

The kernel is a fundamental part of a modern computer's operating system.

  • 1.
  • 3. FORMAL DEFINITION • In computing, the kernel is a computer program that manages input/output requests from software and translates them into data processing instructions for the central processing unit and other electronic components of a computer. • The kernel is a fundamental part of a modern computer's operating system.
  • 4. A kernel connectsthe application software to the hardware ofacomputer.
  • 5. Atypical vision of acomputer architecture asaseries of abstractionlayers: hardware, firmware, assembler, kernel, operating system and applications
  • 6. FEATURES THAT KERNEL PROVIDES: •low-level scheduling of processes (dispatching) •inter-process communication •process synchronization •context switching •manipulation of process control blocks •interrupt handling •process creation and destruction •process suspension and resumption
  • 7. KERNELBASICFACILITIES Thekernel's primary purpose isto managethe computer's resourcesand allow other programsto run and usetheseresources. Typically,the resourcesconsistof:  TheCPU,the processor.Thisisthe most central part of a computer system,responsible for running or executing programs onit.  Thekernel takesresponsibility for deciding at any time which of the manyrunning programs shouldbe allocated to the processor or processors(eachof which canusually run only one program at atime)
  • 8. KERNELBASIC FACILITIES  Thekernel is responsible for deciding whichmemory eachprocesscanuse,and determining what to do when not enough isavailable.  AnyInput/Output devicespresent in the computer, such askeyboard, mouse,disk drives, printers, displays,etc. The kernel allocates requests from applications to perform I/O to anappropriate deviceand provides convenient methods for usingthe device.
  • 9. TYPES OF KERNELS • Monolithic kernels • Microkernels(μK ) • Hybrid(Modular) kernels • Nano kernels • Exokernels
  • 10. •Micro Kernel: Only the very important parts like INTER process communication(IPC) , basic schedular, basic memory handling , basic I/O primitives are placed in kernel. Others are maintained as server processes in user space . Communication is done by message passing . The kernel is broken down into separate processes, known as servers.. The communication in microkernels is done via message passing. The servers communicate through InterProcess Communication IPC. Servers invoke “services” from each other by sending messages.
  • 11. ADVANTAGES OF MICROKERNEL • Microkernels are easier to maintain than monolithic kernels. • Crash resistant ( if one server fails, other servers can still work efficiently.) • Portable • Smaller in Size DISADVANTAGES OF MICROKERNEL: Slower processing because of additional message passing.
  • 12. MONOLITHIC KERNEL •It runs every basic system service like process and memory management, interrupt handling and I/O communication, file system etc. in kernel space. Examples are Linux, Unix. •Advantages: performance •Disadvantages: difficult to debug and maintain
  • 13. HYBRID KERNEL: •One other type of kernel is called a hybrid kernel which lies on the boundary between monolithic kernels and microkernels. This means it has qualities of both, but hybrid kernels cannot be classified as a monolithic kernel or microkernel exclusively. Combine the best of both worlds •Speed and simple design of a monolithic kernel •Modularity and stability of a microkernel
  • 14. HYBRID KERNELS: Advantages: •Benefits of monolithic and microkernels Disadvantages: •Same as monolithic kernels
  • 15. KERNEL'S RESPONSIBILITIES: •The central processing unit •Random access memory •INPUT/OUTPUT devices •Memory management •Device management •System calls
  • 16. THE CENTRAL PROCESSING UNIT •This central component of a computer system is responsible for running or executing programs. The kernel takes responsibility for deciding at any time which of the many running programs should be allocated to the processor or processors (each of which can usually run only one program at a time).
  • 17. RANDOM ACCESS MEMORY •Random-access memory is used to store both program instructions and data. Typically, both need to be present in memory in order for a program to execute. Often multiple programs will want access to memory, frequently demanding more memory than the computer has available. The kernel is responsible for deciding which memory each process can use, and determining what to do when not enough memory is available.
  • 18. INPUT/OUTPUT DEVICES •I/O devices include such peripherals as keyboards, mice, disk drives, printers, network adapters, and display devices. The kernel allocates requests from applications to perform I/O to an appropriate device and provides convenient methods for using the device.
  • 19. MEMORY MANAGEMENT • Virtualaddressing: Paging Segmentation • Data Stores: Hard Drive RAM • Memory Partitions: Kernel space User space
  • 20. • THE KERNEL HAS UNIQUE QUALITIES. IT ENFORCES ITS OWN RULES AND THE STAKES, MANAGING THE ENTIRE SYSTEM AS THE KERNEL DOES, ARE CERTAINLY HIGHER. Conclusion