wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

1.1 basic elements

Blog banner

Deadlock and Starvation

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Evolution of Operating system.

Blog banner

Hash password! Is it really secured?

Blog banner

EFT

Blog banner

Different Types of Data

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Article on Zoho Corporation

Blog banner

Os(Computer security threats)

Blog banner

Why we should do reading

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

How to tie a Tie

Blog banner

Synchronization

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

GraphX:- A graph processing tool

Blog banner

Memory Management Techniques

Blog banner

Review on Recovering Deleted Files

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

BENIFITS OF YOGA

Blog banner

Game Theory in Blockchain

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Crypto tax evasion

Blog banner

Direct memory access (DMA)

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Service Design Principles

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Odoo

Blog banner

Impact of social media on the human life

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Virtual Memory

Blog banner

Security Breaches in Stock market trading

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Memory Management in an Operating System

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Virtual Machine's

Blog banner

OS ASSIGNMENT

Blog banner