wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Multithreading in Operating System

profile
Kanak Patel
Jul 12, 2023
0 Likes
0 Discussions
16 Reads

To understand multithreading first you need to understand thread. Thread is basically a single sequential flow of activities being executed in a process. When multiple threads are executed in a process at the same time, we get the term 'Multithreading'.

For example in a web browser, we can have one thread which handles the user interface, and in parallel we can have another thread which fetches the data to be displayed. So multithreading improves the responsiveness of a system. Multithreading can also handle multiple requests from the same user

Multithreading refers to an operating systems capacity to support much execution among threads within a single process. All threads inside a process will have to share of resources such as code, data, files, and memory space with its peer thread, but stacks and registers will not be shared, and each new thread will have its own stacks and registers.

Requests from one thread do not block requests from other threads, which improves application responsiveness. Multithreading also reduces the number of computing resources used and makes them more efficient. Multithreading is the event of a system executing many threads, with the execution of these threads being of two types: concurrent and parallel multithread executions.

Concurrent execution of threads is defined as the ability of a processor to move execution resources between threads in a multithreaded process on a single processor. When each thread in a multithreaded process may execute on a distinct processor at the same time, it is referred to as parallel execution.


Comments ()


Sign in

Read Next

Risk management in IT

Blog banner

MODERN OPERATING SYSTEM

Blog banner

IoT Evolution

Blog banner

Life of an army person

Blog banner

Vulnerability Assessment

Blog banner

Evolution of Operating system

Blog banner

Virtual machine.

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Steganography and Steganalysis

Blog banner

Uniprocessor scheduling

Blog banner

Open Source Project By Google

Blog banner

Security Breaches in Stock market trading

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

File Allocation Methods

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Service Design Model

Blog banner

Blog name

Blog banner

child Labour

Blog banner

Virtual Memory

Blog banner

Understanding Business Layer in Data Science

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Developments in Modern Operating Systems

Blog banner

Policies for Service Transition

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Scheduling

Blog banner

Device driver

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

OS Assignment 3 Deadlock

Blog banner

Deadlock and starvation

Blog banner

Random Forests

Blog banner

Deadlock

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

A BLOG ON MYSQL

Blog banner

File management in os

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Deadlock

Blog banner

Getting started with Android Studio

Blog banner

Direct Memory Access

Blog banner

Education: Key to your Prosperity

Blog banner