wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Theads

profile
Palak Santoki
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

thread is a single sequential flow of execution of tasks of a process so it is also known as thread of execution or thread of control. There is a way of thread execution inside the process of any operating system. Apart from this, there can be more than one thread inside a process. Each thread of the same process makes use of a separate program counter and a stack of activation records and control blocks. Thread is often referred to as a lightweight process.The process can be split down into so many threads. For example, in a browser, many tabs can be viewed as threads. MS Word uses many threads - formatting text from one thread, processing input from another thread, etc.

Need of Thread:

  • It takes far less time to create a new thread in an existing process than to create a new process.
  • Threads can share the common data, they do not need to use Inter- Process communication.
  • Context switching is faster when working with threads.
  • It takes less time to terminate a thread than a process.

Advantages of User-level threads

  1. The user threads can be easily implemented than the kernel thread.
  2. User-level threads can be applied to such types of operating systems that do not support threads at the kernel-level.
  3. It is faster and efficient.

Disadvantages of User-level threads

  1. User-level threads lack coordination between the thread and the kernel.
  2. If a thread causes a page fault, the entire process is blocked.



Comments ()


Sign in

Read Next

IT RISK

Blog banner

KASHMIR TRIPS

Blog banner

"Games and the future"

Blog banner

Vikrant’s first blog

Blog banner

Music

Blog banner

RAID

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

What is Packet Filtering?

Blog banner

Introduction my self

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Blockchain Transactions

Blog banner

Ubiquitous Computing

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Evolution of Operating System

Blog banner

Data Structures

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Pandas Matrix Applications

Blog banner

Virtualization

Blog banner

Deadlock

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Data Security must be your Priority!

Blog banner

Benefits of yoga and meditation

Blog banner

Hey Aryan here

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

A Short History of GIS

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

How Does SSO Works

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Getting into Anime

Blog banner

"Audit" In Data Science

Blog banner

Constrains in service design

Blog banner

JIRA SOFTWARE

Blog banner

Evolution of Operating Systems

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Game Theory in Blockchain

Blog banner

Paralysis/Paralysis Stroke

Blog banner