wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
83 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

objectives and function of operating system

Blog banner

MEMORY HIERARCHY

Blog banner

THE DESIRE OF MANY

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Threading

Blog banner

Elements and Principles of Photography

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

A buffer overflow

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Embedded Operating System

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Concurrency management in operating systems

Blog banner

IoT Evolution

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

OS assignment 3

Blog banner

The Five Steps of Data Science

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Predicting Student Performance with Data Science

Blog banner

Types of Hackers.

Blog banner

MailChimp

Blog banner

DATA VAULT

Blog banner

Benefits of yoga and meditation

Blog banner

RAID - LEVELS OF RAID

Blog banner

About myself

Blog banner

Deadlock in operating system

Blog banner

Twisted world

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

What if COVID does not exist!

Blog banner

Career v/s Job : Choose your passion

Blog banner

File Organization and Access

Blog banner

Capacity management in ITSM

Blog banner

THE ACTORS LIFE

Blog banner

HubSpot

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Indian Culture and Tradition

Blog banner

BENIFITS OF YOGA

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Segmentation and paging concept

Blog banner

A Deep Dive

Blog banner

Modern Operating Systems.

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner