• Order
  • GBR
  • Offers
  • Support
    • Our offices and phone lines will close at 5PM GMT on the 6th and 7th of December. Rest assured, this does not impact any previously confirmed delivery dates. You can still place orders as usual on our websites. We greatly appreciate your understanding and cooperation!

      December 6, 2023

  • Sign In

Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

Interrupts In Operating Systems Computer Science Essay

Paper Type: Free Essay Subject: Computer Science
Wordcount: 2017 words Published: 1st Jan 2015

Reference this

To successfully control several processes the core of operating system makes utilize of what is known as interrupt. Interrupt is a machine used for implementing the multitasking concept. It is a signal from hardware or software to point out the incidence of the event. When one or more process running and at similar time if user give an additional process then interrupt is take place. If the CPU does not poll the control bit, but instead receives an interrupt when the device is ready for the next byte, the data transfer is said to be interrupt driven.

A hardware interrupt occurs, when an I/O operation is done such as analysis some data into the computer from a tape drive.

In additional term hardware interrupts are used by devices to communicate that they need awareness from the operating system. Some familiar examples are a hard disk signaling that is has read a sequence of data blocks, or that a network device has processed a buffer containing network packets. Interrupts are also worn for asynchronous events, such as the appearance of new data from an exterior network. Hardware interrupts are delivered straight to the CPU via a little network of interrupt administration and routing devices.

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Essay Writing Service

Hardware interrupts are referenced by an interrupt numeral. These statistics are mapped back to the section of hardware that produced the interrupt. This enables the system to monitor which device formed the interrupt and when it occurred. In most computer systems, interrupts are handled as speedily as possible. When an interrupt is acknowledged, any recent action is blocked and an interrupt handler is executed. The handler will anticipate any supplementary running programs and system actions, which can time-consuming the entire system down, and generate latencies. MRG Real-time modifies the way interrupts are handled in array to progress performance, and reduce latency.

Software interrupts

A software interrupt occurs when an application program terminates or needs definite services from the operating system.

Software interrupt generated contained by a processor by executing an instruction. Software interrupt are frequently used to implemented system calls because they implemented a subroutine call with a CPU ring stage modify.

Timed interrupts

The timed interrupt is worn when a convinced event MUST happen at a specified frequency.

Interrupt vector 

An interrupt vector is the memory address of an interrupt handler, or directory into a group called an interrupt vector table or dispatch table. Interrupt vector tables include the memory addresses of interrupt handlers. When an interrupt is generated, the processor saves its completing state through a context switch, and begins effecting of the interrupt handler at the interrupt vector.

Answer 2


A Microkernel tries to run the majority services – like networking, file system, etc. All that’s left to do for the kernel are essential services, like memory allocation, scheduling, and messaging (Inter Process Communication).






In theory, this model makes the kernel additional receptive (since a large amount of functionality resides in traceable user-space threads and processes, removing the require for context-switching into the kernel proper), and improves the constancy of the kernel by reducing the quantity of code running in kernel space. There are also supplementary benefits for OS’ that carry multi-CPU computers (much simpler reentrancy security and better correctness for asynchronous functionality) and distributed OS’ (code can use services without knowing if the service contributor is running on the similar computer or not). A disadvantage is the sum of messaging and Context Switching concerned, which makes microkernel’s conceptually slower than monolithic kernel.

Modular Kernel

A modular kernel is an effort to combine the excellent points of kernel-level drivers and moderator drivers. In a modular kernel, a few part of the system core will be situated in autonomous files called modules that can be additional to the system at run time. Depending on the substance of those modules, the aim can differ such as: just loading drivers if a device is in fact establish only load a file system if it gets really requested, just load the code for a precise scheduling, security or any policy when it should be evaluated.

Modular and layered kernel compare and contrast

The modular kernel approach requires subsystems to interrelate with each other through

suspiciously constructed interfaces that are naturally narrow (in conditions of the functionality that is showing to external modules). The layered kernel moves toward is similar in that admiration. However, the layered kernel imposes a firm ordering of subsystems such that subsystems at the subordinate layers are not allowed to appeal to operations parallel to the upper-layer subsystems. There are no such limitations in the modular-kernel approach, wherein modules are open to invoke each other not including any constraints.

Answer 3

What is a context switch?

Context switching occurs when single process provisionally discontinues execution and an additional process resumes execution in its position. Context switching is performed by the scheduler.

To give each process on a multi-programmed machine a light contribute to of the CPU, hardware clock generates interrupts every so often. This allows the operating system to program every process in core memory (via scheduling algorithm) to run on the CPU at the same intervals. Every time a clock interrupt occurs, the interrupt handler checks how much time the recent running process has used. If it has used up its total time segment, then the CPU scheduling algorithm (in kernel) picks a dissimilar process to run. Each switch of the CPU from one process to a new is called a context switch.

What actions are taken by a kernel to context switch?

Actions are taken by a kernel to context switch surrounded by threads.

The threads contribute to a lot of resources with more peer threads belonging to the equal process. So a context switch along with threads for the similar process is effortless. It involves switch of register position, the program counter along with the stack. It is comparatively easy for the kernel to achieve this task.

Actions are taken by a kernel to context switch among Processes.

Context switches among processes are exclusive. Ahead of a process can be switched its PCB (process control block) should be saved by the operating system. The PCB consists of the subsequent information: The process state, the program counter, the principles of the different registers, The CPU scheduling information for the process, Memory organization information concerning the process, Possible accounting information for this process, I/O status information of the process.

When the PCB of the presently executing process is saved the operating system loads the PCB of the subsequently process that has to be performing on CPU. This is an important job and it takes a lot of time.

Answer 4

System calls

System calls are functions that a programmer can call to perform the services of the operating system.

Processes that run in user mode and how processes and libraries can cause execution in kernel mode. The interface between these two modes is provided by system calls. These are function calls that cause requests to be made to the kernel and the kernel to execute on behalf of those requests.


UNIX System Calls 


File Formats 


Device Drivers 

System Maintenance 

System calls implemented by an operating system

User cannot execute privileged instructions.

Users must ask OS to execute them – system calls.

System calls are often implemented using traps.

OS gains control through trap, switches to supervisor model,

performs service, switches back to client mode, and gives control

back to client.

Dual mode

The dual mode operation provides us with the resources for protecting the operating system from erroneous users. User mode and monitor mode are the two modes. Monitor mode is also called superintendent mode, system mode or privileged mode. Mode bit is attached to the hardware of the computer to point toward the present mode. In argument ‘0’ mode bit is for monitor mode and ‘1’ mode bit is for user mode.

Application programming interface

An application program interface is the precise technique set by a computer operating system or by an application program by which a programmer scripting an application program can create requirements of the operating system or a different application.

An application program interface can be contrasted with a graphical user interface or a command interface (both of which are direct user interface) as interfaces to an operating system or a program.

For example:

Network application programming interface (API)

The services that provide the interface between application and protocol software.


Network API

Protocol A

Protocol B

Protocol C

Different methods of passing data to the operating system

In a computer system having variety of memory address spaces, such as user space and kernel space, a technique and system is provided for communicating data. A data structure is distinct in the kernel space to stock up data. The data structure is nearly mapped to an application in user space such that the application can contact the data structure via virtual memory addresses. By directly accessing the data structure, data transfers between the address spaces using system calls and interrupts can be reduced.

Answer 5

What is Process Scheduling?

Process scheduling is a method that is used when there are limited assets and many processes are competing for them; Multiprogramming tries to make sure that there is a number of process running at all times. This is completed to utilize the CPU as much as possible.

In timesharing system, the CPU switches so regularly between jobs grey_loader

that the user does not experience that the machine is being mutual by many processes or even several users.

What are the differences between short-term, medium-term, and long-term scheduling?

Long term scheduler determines which programs are admitted to the system for processing. It controls the degree of multiprogramming. Once admitted, a job becomes a process. Medium term scheduling is division of the exchange utility. This relate to processes that are in a blocked or suspended state. They are swapped out of real-memory until they are prepared to execute. The swapping-in decision is based on memory-management criteria. Short term scheduler, also known as a dispatcher executes most regularly, and makes the finest-grained conclusion of which process should execute subsequently. This scheduler is invoked whenever an occasion occurs. It may direct to interruption of one process by pre-emption.

Process state

The state of process is distinct in fraction by the present activity of the process. Each process may be in one of the following states:






These state names are random, and they differ across operating systems. The states that they correspond to are establishing on all operating systems, however. Certain operating systems more finely describe process states. Only one process can be running on any processor at any immediate, although numerous processes may be ready and waiting.


Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: