wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process, process creation and process termination

profile
Dev Sheta
Jul 12, 2024
0 Likes
0 Discussions
202 Reads

A process is just an instance of an executing program, including the current values of the program counter, registers, and variables

 

In any multiprogramming system, the CPU switches from process to process quickly, running each for tens or hundreds of milliseconds

Process creation:

 

• Four principal events cause processes to be created:

 

1. System initialization.

 

2. Execution of a process-creation system call by a running process.

 

3. A user request to create a new process.

 

4. Initiation of a batch job.

 

• When an operating system is booted, typically numerous processes are created. Some of these are foreground processes, that is, processes that interact with (human) users and perform work for them.

 

• For example, one background process may be designed to accept incoming email, sleeping most of the day but suddenly springing to life when email arrives. Another background process may be designed to accept incoming requests for Web pages hosted on that machine, waking up when a request arrives to service the request.

 

• In addition to the processes created at boot time, new processes can be created afterward as well. Creating new processes is particularly useful when the work to be done can easily be formulated in terms of several related, but otherwise independent interacting processes.

 

• For example, if a large amount of data is being fetched over a network for subsequent processing, it may be convenient to create one process to fetch the data and put them in a shared buffer while a second process removes the data items and processes them. On a multiprocessor, allowing each process to run on a different CPU may also make the job go faster.

Process Termination:

 

• After a process has been created, it starts running and does whatever its job is.

 

• However, nothing lasts forever, not even processes.

 

• Sooner or later the new process will terminate, usually due to one of the following conditions:

 

1. Normal exit (voluntary).

 

2. Error exit (voluntary).

 

3. Fatal error (involuntary).

 

4. Killed by another process (involuntary).

 

• Most processes terminate because they hav e done their work. When a compiler has compiled the program given to it, the compiler executes a system call to tell the operating system that it is finished. This call is exit in UNIX and ExitProcess in Windows.

 

• The second reason for termination is that the process discovers a fatal error.

 

• The third reason for termination is an error caused by the process, often due to a program bug. Examples include executing an illegal instruction, referencing nonexistent memory, or dividing by zero. In some systems (e.g., UNIX), a process can tell the operating system that it wishes to handle certain errors itself, in which case the process is signaled (interrupted) instead of terminated when one of the errors occurs.

• The fourth reason a process might terminate is that the process executes a system call telling the operating system to kill some other process. In UNIX this call is kill. The corresponding Win32 function is TerminateProcess.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Comments ()


Sign in

Read Next

10 Reasons to date your best friend

Blog banner

Intrusion Detection System

Blog banner

Blog name

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Google classroom

Blog banner

From Model Mistakes to Metrics

Blog banner

Memory Management

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Ghee vs. Coconut Oil vs. Mustard Oil: Which Cooking Fat Wins for Indian Food?

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

TRAIN TRAVELING

Blog banner

Worms, viruses and Bots

Blog banner

TRIGGERS IN DATABASE

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

GIS Topography

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

The Five Steps of Data Science

Blog banner

Virtual memory

Blog banner

Deadlock in Operating System

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Starvation and Deadlock.

Blog banner

MYNTRA

Blog banner

SQL Injection

Blog banner

What is thread and alse multithreading

Blog banner

Uniprocessor Scheduling

Blog banner

Loneliness

Blog banner

EdTech (Education Technology)

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

SAVE TREES

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Travel: Everything Everywhere!

Blog banner

MY FIRST BLOG?

Blog banner

(Input/Output) in os

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

A little bit of salt is all the hash needs!

Blog banner

operating system

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner