wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Threads

profile
Harsh Darji
Aug 15, 2024
0 Likes
0 Discussions
36 Reads

A thread is a single sequence stream within a process. Threads are also called lightweight processes as they possess some of the properties of processes.

Each thread belongs to exactly one process. In an operating system that supports multithreading, the process can consist of many threads. But threads can be effective only if the CPU is more than 1 otherwise two threads have to context switch for that single CPU.

What is Thread in Operating Systems?

In a process, a thread refers to a single sequential activity being executed. these activities are also known as thread of execution or thread control. Now, any operating system process can execute a thread. we can say, that a process can have multiple threads.

Why Do We Need Thread?

  • Threads run in parallel improving the application performance. Each such thread has its own CPU state and stack, but they share the address space of the process and the environment. 
  • Threads can share common data so they do not need to use inter-process communication 
  • . Like the processes, threads also have states like ready, executing, blocked, etc. 
  • Priority can be assigned to the threads just like the process, and the highest priority thread is scheduled first.
  • Each thread has its own Thread control 
  • . Like the process, a context switch occurs for the thread, and register contents are saved. As threads share the same address space and resources, synchronization is also required for the various activities of the thread.

Components of Threads

These are the basic components of the Operating System.

  • Stack Space
  • Register Set



Comments ()


Sign in

Read Next

Footprinting

Blog banner

Os Virtual Memory

Blog banner

Electronic Funds Transfer

Blog banner

Dr. Venkadavarahan

Blog banner

Why we fail after giving 100% ?

Blog banner

Virtual memory

Blog banner

Article on different management system

Blog banner

8 Reasons Why You Must Try Digital Marketing

Blog banner

Product Discount Calculator

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Working with AES cryptographic algorithm using crypto++

Blog banner

Gamer life

Blog banner

Measuring IT Risk

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Cyber Security in Data Breaching

Blog banner

How to Build an Effective Digital Campaign

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Dos (Denial of service) Attack

Blog banner

Install Ubuntu in Vmware

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Fault Tolerance in an Operating System

Blog banner

Importance Of Time

Blog banner

Benefits of Yoga

Blog banner

Firewall

Blog banner

Virtual Memory

Blog banner

Sagar Parikrama

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Introduction to Virtual Memory - 080

Blog banner

semaphores in os

Blog banner

virtual machines and virtualization

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

internet email and it's applications

Blog banner

An Overview of Virtual Machines

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Excel records

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

VIRTUAL MACHINE

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner