what is Kernel-Level Thread in operating system?, Basic Computer Science

In this technique, the kernel knows about and handles the threads. No runtime system is required in this case. In place of thread table in each process, the kernel has a thread table that keeps track of all threads in the system. As well, the kernel also maintains the traditional process table to keep track of processes. Operating Systems kernel gives system call to create and manage threads.

The implementation of common structure of kernel-level thread is

Advantages:
Since kernel has full knowledge of all threads, Scheduler may make a decision to give more time to a process having large amount of threads than process having small number of threads.
Kernel-level threads are mainly good for applications that frequently block.
Disadvantages:
The kernel-level threads are slow and inefficient. Illustration sis, threads operations are hundreds of times slower than that of user-level threads.
Kernel must handle and schedule threads as well as processes. It involves a full thread control block (TCB) for each thread to keep information about threads. As a result significant overhead and increased in kernel complexity.
Posted Date: 5/2/2012 7:07:32 AM | Location : United States







Related Discussions:- what is Kernel-Level Thread in operating system?, Assignment Help, Ask Question on what is Kernel-Level Thread in operating system?, Get Answer, Expert's Help, what is Kernel-Level Thread in operating system? Discussions

Write discussion on what is Kernel-Level Thread in operating system?
Your posts are moderated
Related Questions
Question 1 Write short note on                             1) NFS 2) CIFS Question 2 What is Virtual Application? Write down the benefits and drawbacks of it Questi

Q: HOW DO YOU CODE -- WITHOUT USING ARRAYS OR SPLIT FUNCTIONS -- TO SEPARATE COMMA SEPARATE NUMBER VALUES AND THEN SUM TO TOTAL? I.E., USING SUBSTRING AND INDEXOF. I''ve been try

#que1) Create telephone directory. • The heading should be 16-point Arial font in bold • The rest of the document should use 10-point font size • Other headings should use 10-point

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

create a flowchart showing average score for the 3 quizzes assume that there are 3 sections each having 5 students the only valid number to be entered is 1-100 for the quizzes shou

Electronic mail is another PC to PC and PC to mainframe data exchange. If you subscribe to an electronic mail service, it will enable your PC to gain access to a 'mailbox' on a ma

Do you have expert can deal with netlogo

Briefly explain who a hacker is and what the activities of a hacker are?k question #Minimum 100 words accepted#

Hi are you doing an interactive powerpoint porject

#formular for calculating speed up factor fo super scalar architecture, super pipeline architecture and VLIW with m different functional units.