wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Theads

profile
Palak Santoki
Aug 15, 2024
0 Likes
0 Discussions
44 Reads

thread is a single sequential flow of execution of tasks of a process so it is also known as thread of execution or thread of control. There is a way of thread execution inside the process of any operating system. Apart from this, there can be more than one thread inside a process. Each thread of the same process makes use of a separate program counter and a stack of activation records and control blocks. Thread is often referred to as a lightweight process.The process can be split down into so many threads. For example, in a browser, many tabs can be viewed as threads. MS Word uses many threads - formatting text from one thread, processing input from another thread, etc.

Need of Thread:

  • It takes far less time to create a new thread in an existing process than to create a new process.
  • Threads can share the common data, they do not need to use Inter- Process communication.
  • Context switching is faster when working with threads.
  • It takes less time to terminate a thread than a process.

Advantages of User-level threads

  1. The user threads can be easily implemented than the kernel thread.
  2. User-level threads can be applied to such types of operating systems that do not support threads at the kernel-level.
  3. It is faster and efficient.

Disadvantages of User-level threads

  1. User-level threads lack coordination between the thread and the kernel.
  2. If a thread causes a page fault, the entire process is blocked.



Comments ()


Sign in

Read Next

Hacking

Blog banner

First love

Blog banner

Linux Memory Management

Blog banner

Message Passing in OS

Blog banner

Deadlock and Starvation

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Cyber Security in Quantum and Space Communication

Blog banner

Supervised and unsupervised learning

Blog banner

Hey Aryan here

Blog banner

Phishing

Blog banner

Why Friendship at Work is Important

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

Mariana Trench: The deepest depths

Blog banner

Full Disk Encryption

Blog banner

TRAIN TRAVELING

Blog banner

Memory managment

Blog banner

Artificial Intelligence (AI)

Blog banner

DIGITAL ECONOMY

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

What are Virtual Machines

Blog banner

My Favorite Sportsperson

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Clarizen

Blog banner

File Management system

Blog banner

What is a Malware ?

Blog banner

LTE Technology

Blog banner

The IT Service Lifecycle

Blog banner

INTERNET SECURITY

Blog banner

To-Do List In LISP

Blog banner

5 People who claimed to have Time Traveled

Blog banner

DURGA POOJA

Blog banner

Data Visualization

Blog banner

Hubspot

Blog banner

Memory management

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

Google classroom

Blog banner

Importance of internet

Blog banner

Evolution of operating system

Blog banner

Introduction my self

Blog banner