Major advantages of microkernel approach to system design, Operating System

Q. What are the major advantages of the microkernel approach to system design?

Answer: Benefits usually include the following

(a) Adding a new service doesn't require modifying the kernel

(b) It is additionally secure as more operations are done in user mode than in kernel mode

(c) A simpler kernel design as well as functionality typically results in a more reliable operating system.

Posted Date: 7/27/2013 2:28:10 AM | Location : United States







Related Discussions:- Major advantages of microkernel approach to system design, Assignment Help, Ask Question on Major advantages of microkernel approach to system design, Get Answer, Expert's Help, Major advantages of microkernel approach to system design Discussions

Write discussion on Major advantages of microkernel approach to system design
Your posts are moderated
Related Questions
Explain the Thread Local Storage (TLS)    Windows NT provides unique functions for per-thread data management. Thread local storage (TLS) is a concept defined in NT so develope

Explain the Advantages and Drawback of Multiple Processes Application architected to take advantage of multiple processes will certainly see performance gains. Functions and Fe

Q. What are three benefits of dynamic (shared) linkage of libraries compared to static linkage? What are two situations where static linkage is preferable? Answer: The

write a linux command to display lines from 25 - 45 of directory "/edc/password" write a linux command to display directory in /edc

Before proceeding with its execution, every process must obtain all the resources it needs is called Hold and wait

A practical task specified in the Study Guide, Computer architecture, was to record your computer's specifications. Submit the data you recorded, which will contain the following d

Define a linker program  A linker program links the program along with other programs required for its execution.

Q. Consider the following page-replacement algorithms. Rank the algorithms on a five-point scale from "bad" to "perfect" according to their page-fault rate. Detach those algorithm

Q. How does the distinction among kernel mode and user mode function as a rudimentary form of protection (security) system? Answer: The distinction among kernel mode and user m

There is a very small amount of networking background required for Project 2. In Project 2, we want our computer (or our "host") to request information over the Internet from a rem