Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

User-level threads apply in user-level libraries, before via systems calls, so thread switching does not require to call operating system and to cause interrupt to the kernel. Actually, the kernel knows nothing about user-level threads and handles them as if they were single-threaded processes.
Advantages of User-Level Threads:
1. The most obvious benefit of this technique is that a user-level threads package can be implemented on an Operating System that does not support threads. Some other advantages are
2. A user-level thread does not require alteration to operating systems.
3. Straightforward Representation:
Each thread is represented simply by a registers, PC, stack and a small control block, all stored in the user process address space.
4. Fast and well-organized:
Thread switching is not much more costly than a procedure call.
5. Unproblematic Management:
This basically means that making a thread, switching between threads and synchronization between threads can all be done lacking of intervention of the kernel.

Disadvantages of User-Level Threads:
1. There is a short of coordination between threads and operating system kernel. Consequently, process as whole gets one time slice irrespective of whether process has one thread or 1000 threads within. It is up to every thread to relinquish control to other threads.
2. A user-level thread needs non-blocking systems call that means a multithreaded kernel. Or else, entire process will blocked in the kernel, even if there are run able threads left in the processes. For instance, if one thread causes a page fault, the process blocks.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9502408

Have any Question?


Related Questions in Computer Engineering

How does consumers influence the market price of goods it

How does consumers influence the market price of goods it sells, and what does the term, "market power" means?

Assignment - review of article where physical security

Assignment - Review of Article Where Physical Security Failed • Search the Internet for an article where physical security failed • Propose a possible change in that organization's physical security that could have preve ...

You own a specialty company self made company smc which

You own a specialty company; self made company (SMC) which sells hats and jackets. You obtained an object IDENTIFIER 5000 under enterprises node from IANA. You have two branch locations. Each has an inventory system that ...

Video and disruption report assignmentoverviewfor this

Video and Disruption Report Assignment Overview For this assessment task, you will create a two-minute video and written proposal about the impact of a particular technology on an industry or field. The purpose of this a ...

Why are we in the golden age of technology entrepreneurship

Why are we in the 'golden age' of technology entrepreneurship? What factors are helping entrepreneurs more rapidly achieve their vision, and with a lower cost?

Question what is stuxnet and what are its real-world

Question : What is Stuxnet and what are its real-world implications? Should your national government be concerned about the potential of a Stuxnet-like attack? Why or why not.

Question suppose we have the following conditions1

Question : Suppose we have the following conditions: 1) Frequency of floating point (FP) operations is 24%; 2) Average CPI of FP operations is 5.0; 3) Average CPI of other instructions is 1.40; 4) Frequency of floating p ...

Strategies when resources are constraineda project manager

Strategies When Resources Are Constrained A project manager has fewer options for accelerating project completion when additional resources are either not available or the budget is severely constrained. This is especial ...

Requested files diceh dicecpp diceanddangercpp

Requested files: Dice.h, Dice.cpp, DiceAndDanger.cpp, DiceAndDanger_test.cpp With this program, you will begin the practice of breaking source code into distinct modules that are responsible for limited scopes of behavio ...

Answer the following question what is the relationship

Answer the following Question : What is the relationship between eminent domain and condemnation? What is the essential difference between prescription and dedication? Describe the major differences between a right-of-wa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As