wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Processes : Process description and control

profile
4475 Mit Gohil
Jul 05, 2024
0 Likes
0 Discussions
51 Reads

Processes in the context of computing refer to instances of executing programs on a computer system. Each process has its own memory space, resources, and execution context. Here's a breakdown of the key aspects related to processes:

  1. Process Description:
    • Program Execution: A process represents the execution of a program. It includes the program code, associated data, and resources like open files and network connections.
    • Memory Space: Each process typically has its own memory space, which includes the executable code, variables, stacks, heaps, etc.

    • Resource Allocation: Processes may require various system resources (CPU time, memory, files) which are allocated to them by the operating system.

      • Process ID (PID): A unique identifier assigned to each process by the operating system, which helps in managing and distinguishing between different processes.

      2.Process Control:

      • Creation: Processes are created either by the operating system when a program is started or by another process (parent process) using system calls like fork() (Unix-like systems) or CreateProcess() (Windows).
      • Scheduling: The operating system scheduler decides which process gets to use the CPU and for how long, based on scheduling algorithms (e.g., round-robin, priority-based scheduling).

        Execution State: Processes transition between different states such as running, ready, waiting (blocked), or terminated. State transitions are managed by the operating system scheduler and are influenced by events like I/O operations, timers, and signals.

      • Termination: Processes can terminate either voluntarily (by calling exit) or involuntarily (due to errors or signals). Upon termination, resources allocated to the process are released by the operating system.                       

        3. Process Communication and Synchronization:

        • Processes often need to communicate and synchronize with each other, especially in multi-process or multi-threaded environments.
        • Mechanisms for inter-process communication (IPC) include shared memory, message passing (pipes, sockets, message queues), and synchronization primitives (mutexes, semaphores) to coordinate access to shared resources.

          4.Process States:

          • Running: The process is currently executing instructions on the CPU.
          • Ready: The process is ready to execute and waiting for its turn to be assigned to a CPU core.
          • Waiting (Blocked): The process is waiting for an event (such as I/O completion) or resource allocation (like memory) before it can proceed.
          • Terminated: The process has finished execution, and its resources have been released back to the system.
          • Understanding processes and their control is fundamental to operating system design, resource management, and application development, especially in ensuring efficient and stable execution of programs on a computer system.


Comments ()


Sign in

Read Next

Dekkers Algorithm

Blog banner

File System

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

The evolution of OS

Blog banner

Threads

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

File management -disha parekh

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

In the world of Technology...

Blog banner

Cyber Security Standards

Blog banner

Article on Team Work

Blog banner

Docker Framework

Blog banner

Yoga in INDIA and ABROAD

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Dal Bafla Recipe

Blog banner

Data Science in Mental Health Prediction

Blog banner

NIKE

Blog banner

Importance of internet

Blog banner

Social Engineering Attacks

Blog banner

Memory Management

Blog banner

FILE SHARING

Blog banner

Apple

Blog banner

Network Security Risks

Blog banner

Virtual Memory

Blog banner

This is my first blog.

Blog banner

Session Hijacking Techniques

Blog banner

Landslide Hazard

Blog banner

Zomato (Income Sources)

Blog banner

Operating system evolution

Blog banner

Busted : Common Web Security Myths

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Deadlock

Blog banner

Defining youtubr

Blog banner

How social media affect

Blog banner

Embedded Operating System

Blog banner

Deadlock

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Linux Memory Management

Blog banner