Illustrate different ways that threads could be implemented, Operating System

Assignment Help:

Q. Multithreading is a commonly utilized programming technique. Illustrate three different ways that threads could be implemented. Describe how these ways compare to the Linux clone mechanism. When might every alternative mechanism be better or worse than using clones?

Answer: Thread implementations can be largely classified into two groups- kernel-based threads as well as user-mode threads. User-mode thread packages rely on some kernel support-they may require timer interrupt facilities for instance-but the scheduling between threads is not performed by the kernel however by some library of user-mode code. Multiple threads in such an execution appear to the operating system as a single execution context. When the multithreaded process is running it settle on for itself which of its threads to execute using non-local jumps to switch stuck between threads according to its own pre-emptive or non-pre-emptive scheduling rules.

On the other hand the operating system kernel may make available support for threads itself. In this case the threads may be realize as separate processes that happen to share a complete or partial common address space or they may be realize as separate execution contexts within a single process. Any way the threads are organized they appear as completely independent execution contexts to the application.

Hybrid implementations are also possible, where a large number of threads are made available to the application using a smaller number of kernel threads. Runnable user threads are run by the first available kernel thread.

In Linux threads are executing within the kernel by a clone mechanism that creates a new process within the same virtual address space as the parent process. Unlike several kernel-based thread packages the Linux kernel doesn't make any distinction between threads and processes a thread is merely a process that didn't create a new virtual address space when it was initialized.

The major advantage of implementing threads in the kernel rather than in a user-mode library is that

  • Kernel-threaded systems can take improvement of multiple processors if they are available.
  • If one thread obstructs in a kernel service routine (for instance a system call or page fault) other threads are still capable to run.

A lesser benefit is the ability to assign different security attributes to each thread. User-mode implementations don't have these advantages. For the reason that such implementations run completely within a single kernel execution context merely one thread can ever be running at once even if multiple CPUs are obtainable. For the same cause if one thread enters a system call no other threads can run until that system call completes. Consequently one thread doing a blocking disk read will hold up each thread in the application. Nevertheless user-mode implementations do have their own merits. The most clear is performance- invoking the kernel's own scheduler to switch among threads involves entering a new protection domain as the CPU switches to kernel mode while switching between threads in user mode can be achieved simply by saving and restoring the main CPU registers. User-mode threads may as well consume less system memory- most UNIX systems will reserve at least a full page for a kernel stack for each kernel thread and this stack mayn't be page-able.

The hybrid approach executing multiple user threads over a smaller number of kernel threads allows a balance between these tradeoffs to be achieved. The kernel threads will permit multiple threads to be in blocking kernel calls at once as well as will permit running on multiple CPUs as well as user-mode thread switching can occur within each kernel thread to perform lightweight threading without the overheads of having too many kernel threads. The drawback of this approach is complexity giving control over the trade off complicates the thread library's user interface.


Related Discussions:- Illustrate different ways that threads could be implemented

Assignment, Ask question #Minimum 100 words accDefine Hashing System. Descr...

Ask question #Minimum 100 words accDefine Hashing System. Describe the Hashed page table with example and mapping figure.

Explain linked allocation, Linked allocation With linked allocation, ev...

Linked allocation With linked allocation, every file is a linked list of disk blocks; the disk blocks might be scattered anywhere on the disk. The directory has a pointer to th

Explain single-user systems, We have stressed the need for an operating sys...

We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to

Queing theory, how to solve queing theory step by step

how to solve queing theory step by step

Explain a boot control block, Explain a boot control block A boot contr...

Explain a boot control block A boot control block can have the information required by the system to boot an operating from that partition. If the disk does not have an operati

Windows Resources on a Network, VoIP (Voice over Internet Protocol), also c...

VoIP (Voice over Internet Protocol), also called Internet telephone, was once a novelty on the Internet, but not very useful because of all the problems with poor voice quality and

Computer number systems, Binary number based systems   Binary is a  ' base...

Binary number based systems   Binary is a  ' base 2' number system, only two numbers exist namely '0' and '1'. Conversion from binary to base 10 is easy if the number column techn

Illustrate the handshaking protocol, Q. The instance of handshaking used 2...

Q. The instance of handshaking used 2 bits: a busy bit as well as a command-ready bit. Is it probable to implement this handshaking with only 1 bit? If it is illustrate the protoc

Explain the purpose of command-line application, Question: a) The follo...

Question: a) The following questions refers to Windows XP networking: i) Briefly, explain how a host joins a network using DHCP? ii) Which IP address could be assigned to a

What are placement and replacement algorithms, Placement algorithms :calcu...

Placement algorithms :calculate where in available real-memory to execute a program. Common functions are next-fit, first-fit, and best-fit. Replacement algorithms :are

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd