wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

OS- Assignnment 1

profile
Sheetal Mehta
Jul 03, 2024
0 Likes
0 Discussions
66 Reads

There are two main threading models in process management:

• User-level threads:-

In this model, the operating system does not directly support threads.  Instead, threads are managed by a user-level thread library, which is part of the application. The library manages the threads and schedules them on available processors. The advantages of user-level threads include greater flexibility and portability, as the application has more control over thread management. However, the disadvantage is that user-level threads are not as efficient as kernel-level threads, as they rely on the application to manage thread scheduling.

• Kernel-level threads:-

In this model, the operating system directly supports threads as part of   the kernel. Each thread is a separate entity that can be scheduled and executed independently by the operating system. The advantages of kernel-level threads include better performance and scalability, as the operating system can schedule threads more efficiently. However, the disadvantage is that kernel-level threads are less flexible and portable than user-level threads, as they are managed by the operating system.

 

1. Many to Many Model:

In this model, we have multiple user threads multiplex to same or lesser number of kernel level threads. Number of kernel level threads are specific to the machine, advantage of this model is if a user thread is blocked we can schedule others user thread to other kernel thread. Thus, System doesn’t block if a particular thread is blocked. It is the best multi threading model.

2. Many to One Model:

In this model, we have multiple user threads mapped to one kernel thread. In this model when a user thread makes a blocking system call entire process blocks. As we have only one kernel thread and only one user thread can access kernel at a time, so multiple threads are not able access multiprocessor at the same time. The thread management is done on the user level so it is more efficient.

3. One to One Model:

In this model, one to one relationship between kernel and user thread. In this model multiple thread can run on multiple processor. Problem with this model is that creating a user thread requires the corresponding kernel thread. As each user thread is connected to different kernel , if any user thread makes a blocking system call, the other user threads won’t be blocked.


Comments ()


Sign in

Read Next

Incorporating Automation into Digital Forensics.

Blog banner

SESSION HIJACKING

Blog banner

Game Theory in Blockchain

Blog banner

Friendship

Blog banner

Answer

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Traditional UNIX Scheduling

Blog banner

File management -disha parekh

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

All you need to know about “On-page SEO”

Blog banner

Music helps reduce stress

Blog banner

Top 10 Logos and their meanings

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

What is Vishing?

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

objectives and functions of operating system

Blog banner

Precision-Recall in Data Science

Blog banner

Student Grade Calculator in LISP

Blog banner

Indian Food

Blog banner

CyberSecurity Color Wheel

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

GIS

Blog banner

BharatPe

Blog banner

Modern Operating system

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

Service transistion under difficult conditions

Blog banner

How to feel Happy everyday day

Blog banner

Service transition principles

Blog banner

Paginng In OS

Blog banner

Gamer life

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Computer Security

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

URL vs Domain

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Virtual Memory

Blog banner

R Programming

Blog banner

Short note on expert system

Blog banner

S-Tool : Steganography

Blog banner

Importance Of Blockchain

Blog banner