wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Process, process creation and process termination

profile
Dev Sheta
Jul 12, 2024
0 Likes
0 Discussions
202 Reads

A process is just an instance of an executing program, including the current values of the program counter, registers, and variables

 

In any multiprogramming system, the CPU switches from process to process quickly, running each for tens or hundreds of milliseconds

Process creation:

 

• Four principal events cause processes to be created:

 

1. System initialization.

 

2. Execution of a process-creation system call by a running process.

 

3. A user request to create a new process.

 

4. Initiation of a batch job.

 

• When an operating system is booted, typically numerous processes are created. Some of these are foreground processes, that is, processes that interact with (human) users and perform work for them.

 

• For example, one background process may be designed to accept incoming email, sleeping most of the day but suddenly springing to life when email arrives. Another background process may be designed to accept incoming requests for Web pages hosted on that machine, waking up when a request arrives to service the request.

 

• In addition to the processes created at boot time, new processes can be created afterward as well. Creating new processes is particularly useful when the work to be done can easily be formulated in terms of several related, but otherwise independent interacting processes.

 

• For example, if a large amount of data is being fetched over a network for subsequent processing, it may be convenient to create one process to fetch the data and put them in a shared buffer while a second process removes the data items and processes them. On a multiprocessor, allowing each process to run on a different CPU may also make the job go faster.

Process Termination:

 

• After a process has been created, it starts running and does whatever its job is.

 

• However, nothing lasts forever, not even processes.

 

• Sooner or later the new process will terminate, usually due to one of the following conditions:

 

1. Normal exit (voluntary).

 

2. Error exit (voluntary).

 

3. Fatal error (involuntary).

 

4. Killed by another process (involuntary).

 

• Most processes terminate because they hav e done their work. When a compiler has compiled the program given to it, the compiler executes a system call to tell the operating system that it is finished. This call is exit in UNIX and ExitProcess in Windows.

 

• The second reason for termination is that the process discovers a fatal error.

 

• The third reason for termination is an error caused by the process, often due to a program bug. Examples include executing an illegal instruction, referencing nonexistent memory, or dividing by zero. In some systems (e.g., UNIX), a process can tell the operating system that it wishes to handle certain errors itself, in which case the process is signaled (interrupted) instead of terminated when one of the errors occurs.

• The fourth reason a process might terminate is that the process executes a system call telling the operating system to kill some other process. In UNIX this call is kill. The corresponding Win32 function is TerminateProcess.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Comments ()


Sign in

Read Next

Memory Management in Operating System

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Deadlock and Starvation

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

10 Interesting facts you should know!!!

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Information Technology In E- Commerce

Blog banner

Evolution of Operating System

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

My Favorite Country

Blog banner

c

Blog banner

NETWORK SECURITY RISKS

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

Place to visit in pune

Blog banner

OS Assignment 3 Deadlock

Blog banner

Uniprocessor Scheduling

Blog banner

10 Signs your Computer has Virus

Blog banner

Mail merge

Blog banner

What are Tenders its various types

Blog banner

Latest Email Marketing Techniques

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Benefits and drawback of web security.

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Threat management

Blog banner

Direct Memory Access

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

OPERATING SYSTEM

Blog banner

Indian Culture and Tradition

Blog banner

What is Vishing?

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Modern operating system

Blog banner

Risk mitigation and management

Blog banner

DURGA POOJA

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner