wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

virtual memory

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Web Site

Blog banner

RAID

Blog banner

Cryptanalysis tool

Blog banner

Types of email

Blog banner

Im Photographer

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Depression

Blog banner

Mumbai Metro 3

Blog banner

Virtual memory

Blog banner

File management

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

File Management

Blog banner

Deadlock

Blog banner

SQL Injection practice on DVWA

Blog banner

Threat management

Blog banner

Art and Culture of Rajasthan

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

What is thread and alse multithreading

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

What is Packet Filtering?

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Phishing

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Email Privacy

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

The functions of operating system

Blog banner

LinkedIn

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Zomato (Income Sources)

Blog banner

security requirements for safe e-payment

Blog banner

Emerging threats in cyber Forensics

Blog banner

Direct Memory Access

Blog banner

Financial Fraud Detection

Blog banner

Recipe of Paneer Butter Masala

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Understanding Regression Analysis

Blog banner

Proton mail

Blog banner

Vulnerability Assessment

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner