wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process Creation

profile
Archie Rathod
Jul 12, 2023
0 Likes
0 Discussions
84 Reads

A process can create several new processes through creating process system calls during the process execution. Creating a process we call it the parent process and the new process is a child process.

Every new process creates another process forming a tree-like structure. It can be identified with a unique process identifier that usually represents it as pid which is typically an integer number. Every process needs some resources like CPU time, memory, file, I/O devices to accomplish.

Whenever a process creates a sub process, and may be each sub process is able to obtain its resources directly from the operating system or from the resources of the parent process. The parent process needs to partition its resources among all its children or it may be able to share some resources to several children.

Restricting a child process to a subset of the parent’s resources prevents any process from overloading the system by creating too many sub-processes. A process is going to obtain its resources whenever it is created.

Whenever a process creates a new process, there are two possibilities in terms of execution, which are as follows −

The parent continues to execute concurrently with its children.

The parent waits till some or all its children have terminated.

There are two more possibilities in terms of address space of the new process, which are as follows −

The child process is a duplicate of the parent process.

The child process has a new program loaded into it.


Comments ()


Sign in

Read Next

Beauty of indian railway

Blog banner

How to make Pancakes

Blog banner

Importance of business process documentation

Blog banner

Evolution of Operating system

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Music helps reduce stress

Blog banner

Deadlock

Blog banner

Starvation

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Operating Systems

Blog banner

INTERNET SECURITY

Blog banner

Culture Of Ladakh

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

PHISHING

Blog banner

Types of Threads

Blog banner

Steganography and Steganalysis

Blog banner

Data Visualization

Blog banner

Computer Security

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

ADIDAS

Blog banner

Multiprocessor scheduling

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Direct memory access (DMA)

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Child labour

Blog banner

I/O Management and Disk Scheduling

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Webmail

Blog banner

Penetration Testing

Blog banner

FRIENDSHIP

Blog banner

Save Environment

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Natural Language Processing(NLP)

Blog banner

Data Lake

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Decision Tree: A Diagram Model

Blog banner

Starvation and Deadlock.

Blog banner

gis substation

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Virtual memory

Blog banner

Elegant fashion style

Blog banner

Real-time Scheduling - 53003230061

Blog banner