wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

Fitness regime by Deepesh

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Music

Blog banner

RAID

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Process State

Blog banner

geographic information system (GIS)

Blog banner

Types of Threads

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Supervised and Unsupervised Learning

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

How Cyber Forensics use in AI

Blog banner

Hacking of web server and application

Blog banner

Amazon

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Save Girl Child

Blog banner

From Model Mistakes to Metrics

Blog banner

What is Data, Information and Knowledge?

Blog banner

What is service level Agreement?

Blog banner

Types of OS

Blog banner

Theads

Blog banner

Business Engineering

Blog banner

What is thread and alse multithreading

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Virtual memory

Blog banner

Smartsheet

Blog banner

Layers Of Blockchain

Blog banner

Data carving - using hex editor

Blog banner

What is Network Security?

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

GOOGLE

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Session Hijacking

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

How to kiss

Blog banner

Supervised and unsupervised learning

Blog banner

BIRYANI ! The history you never knew about

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner