wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Fitness

Blog banner

Starvation

Blog banner

Google classroom

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

To-Do List In LISP

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Busted : Common Web Security Myths

Blog banner

Cache Memory in Operating Systems

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Bulk E-mail software

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Blog name

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Uber

Blog banner

GIS REMOTE SENSING

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Beatbox

Blog banner

Service stratergy principles

Blog banner

Answer

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

History of ITIL

Blog banner

Virtual Machine

Blog banner

FILE SHARING

Blog banner

Service Operations in ITSM

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Virtual memory

Blog banner

Memory Management in an Operating System

Blog banner

What is OS and its overview

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Blockchain in IoT Applications

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

MODERN OPERATING SYSTEM

Blog banner

ADIDAS

Blog banner

Paid Email

Blog banner

TRAIN TRAVELING

Blog banner

15 Interesting Facts about India

Blog banner

I/O Buffering

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Sage business cloud accounting

Blog banner

Importance Of Blockchain

Blog banner

Phishing

Blog banner