wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

Deadlock

Blog banner

Virtual memory in windows

Blog banner

File and File System Structure

Blog banner

Critical success factors

Blog banner

Cyber Security Control

Blog banner

VIRTUAL MACHINE

Blog banner

SQL Injection Techniques

Blog banner

Evolution of Operating Sytems

Blog banner

Man is free by the birth .

Blog banner

Understanding Mobile Device Forensics

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

BENIFITS OF YOGA

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Hacking

Blog banner

Top 10 Logos and their meanings

Blog banner

Cycling

Blog banner

E-security systems | CCTV

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Buffer Overflow

Blog banner

"Life as a Part-time Student"

Blog banner

Dudhasagar waterfall ?

Blog banner

History of ITIL

Blog banner

Memory management

Blog banner

Embedded Operating System

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Product Discount Calculator

Blog banner

Objectives and Functions of Operating System

Blog banner

Student Grade Calculator in LISP

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

What is Minting & Mining

Blog banner

Boxing

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

LinkedIn

Blog banner

Importance Of Time

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Memory management

Blog banner

Street foods

Blog banner