wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

Electronic data interchange

Blog banner

Instagram

Blog banner

Hacking

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Virtualization

Blog banner

CRISP-DM Methodology

Blog banner

Decoding Confusion Matrix

Blog banner

Asana

Blog banner

Cyber Laws In India and Around the World

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Short note on Microsoft office

Blog banner

GraphX:- A graph processing tool

Blog banner

Deadlock

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Cyber Forensics on IOT Devices

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Penetration Testing

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Multicore CPUs

Blog banner

Broken Authentication Attacks

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

child Labour

Blog banner

The Laws of Karma

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Threads

Blog banner

APACHE KAFKA

Blog banner

Memory Management

Blog banner

Importance of modern technology era

Blog banner

What is Influencer Marketing and its Trends

Blog banner

File management In Operating System

Blog banner

Yoga in INDIA and ABROAD

Blog banner

File management

Blog banner

A little bit of salt is all the hash needs!

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

What is a Malware ?

Blog banner

LinkedIn

Blog banner