wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Note on Process, Process creation and Process termination

profile
Dev Sheta
Jul 01, 2024
0 Likes
0 Discussions
300 Reads

A process is just an instance of an executing program, including the current values of the program counter, registers, and variables

In any multiprogramming system, the CPU switches from process to process quickly,running each for tens or hundreds of milliseconds

Process Creation:

• Four principal events cause processes to be created:

1. System initialization.

2. Execution of a process-creation system call by a running process.

3. A user request to create a new process.

4. Initiation of a batch job.

• When an operating system is booted, typically numerous processes are created. Some of  these are foreground processes, that is, processes that interact with (human) users and perform work for them.

• For example, one background process may be designed to accept incoming email,sleeping most of the day but suddenly springing to life when email arrives. Another background process may be designed to accept incoming requests for Web pages hosted on that machine, waking up when a request arrives to service the request.

• In addition to the processes created at boot time, new processes can be created afterward as well. Creating new processes is particularly useful when the work to be done can easily be formulated in terms of several related, but otherwise independent interacting processes.

• For example, if a large amount of data is being fetched over a network for subsequent processing, it may be convenient to create one process to fetch the data and put them in a shared buffer while a second process removes the data items and processes them. On a multiprocessor, allowing each process to run on a different CPU may also make the job go faster

Process Termination:

• After a process has been created, it starts running and does whatever its job is.  

• However, nothing lasts forever, not even processes.

• Sooner or later the new process will terminate, usually due to one of the following

conditions:

1. Normal exit (voluntary).

2. Error exit (voluntary).

3. Fatal error (involuntary).

4. Killed by another process (involuntary).

• Most processes terminate because they hav e done their work. When a compiler has compiled the program given to it, the compiler executes a system call to tell the operating system that it is finished. This call is exit in UNIX and ExitProcess in Windows.

• The second reason for termination is that the process discovers a fatal error.

• The third reason for termination is an error caused by the process, often due to a program bug. Examples include executing an illegal instruction, referencing nonexistent memory, or dividing by zero. In some systems (e.g., UNIX), a process can tell the operating system that it wishes to handle certain errors itself, in which case the process is signaled (interrupted) instead of terminated when one of the errors occurs.

• The fourth reason a process might terminate is that the process executes a system call telling the operating system to kill some other process. In UNIX this call is kill. The corresponding Win32 function is TerminateProcess.


Comments ()


Sign in

Read Next

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Some facts about Technology

Blog banner

semaphores

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

NodeJs

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Security Breaches in Stock market trading

Blog banner

Virtual Machine

Blog banner

Importance of internet

Blog banner

Health and fitness

Blog banner

Article on Zoho Corporation

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

What if COVID does not exist!

Blog banner

Fault Tolerance in an Operating System

Blog banner

Not anti-social, but pro-solitude

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

This is my first blog.

Blog banner

AI and cyber Security

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Theads

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Latest Email Marketing Techniques

Blog banner

Social Engineering Attacks

Blog banner

Buffers in Operating Systems

Blog banner

Life lesson

Blog banner

Hey Aryan here

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

DIGITAL TECHNOLOGY

Blog banner

A Short History of GIS

Blog banner

Operating system

Blog banner

Photorec - media recovery tool

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

GIS REMOTE SENSING

Blog banner

HTML vs HTML5

Blog banner

Explain website hacking issues

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

CRISP-DM Methodology

Blog banner