wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Theads

profile
Palak Santoki
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

thread is a single sequential flow of execution of tasks of a process so it is also known as thread of execution or thread of control. There is a way of thread execution inside the process of any operating system. Apart from this, there can be more than one thread inside a process. Each thread of the same process makes use of a separate program counter and a stack of activation records and control blocks. Thread is often referred to as a lightweight process.The process can be split down into so many threads. For example, in a browser, many tabs can be viewed as threads. MS Word uses many threads - formatting text from one thread, processing input from another thread, etc.

Need of Thread:

  • It takes far less time to create a new thread in an existing process than to create a new process.
  • Threads can share the common data, they do not need to use Inter- Process communication.
  • Context switching is faster when working with threads.
  • It takes less time to terminate a thread than a process.

Advantages of User-level threads

  1. The user threads can be easily implemented than the kernel thread.
  2. User-level threads can be applied to such types of operating systems that do not support threads at the kernel-level.
  3. It is faster and efficient.

Disadvantages of User-level threads

  1. User-level threads lack coordination between the thread and the kernel.
  2. If a thread causes a page fault, the entire process is blocked.



Comments ()


Sign in

Read Next

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

STARVATION

Blog banner

Article on IT development trends

Blog banner

Multithreading in Operating System

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Linux Threads:

Blog banner

Deadlock and Starvation

Blog banner

File and File System Structure

Blog banner

Instagram

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Paginng In OS

Blog banner

Deadlock Prevention

Blog banner

Financial Fraud Detection

Blog banner

Modern operating system

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Introduction to GIS

Blog banner

GIS in Disaster Management

Blog banner

Memory Management

Blog banner

Elegant fashion style

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

E-commerce

Blog banner

Quality check in IT services

Blog banner

Deadlock

Blog banner

Virtualization

Blog banner

What are Virtual Machines

Blog banner

What is M-commerce and how it's work

Blog banner

Functions of operating system

Blog banner

The Five Steps of Data Science

Blog banner

Measuring IT Risk

Blog banner

Life

Blog banner

Apache Kafka

Blog banner

Deming’s Process

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Semaphores

Blog banner

Email Privacy

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

SQL Injection

Blog banner

Direct Memory Access

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Secure Hypertext transfer protocol

Blog banner

Note on Process, Process creation and Process termination

Blog banner

An Overview of Virtual Machines

Blog banner