Describe the concept of a signal, and indicate configuration

Assignment Help Operating System
Reference no: EM13942824

When a child process is fork()ed, a parent may wait for the successful completion of the child via the wait() service (or one of its variants) so that the return result of that application can be read from the process descriptor block.

If the parent does not perform a wait() operation on the child process after it terminates, Unix will keep the process descriptor block active for this application in hopes that eventually the parent will wait() or that the parent will itself terminate.
If you perform the ps command in this scenario, you may find a number of "zombie" processes - these are processes marked with a Z in the output of ps that are children of a currently running parent that hasn't yet waited upon their completion. Normally, this isn't much of a problem, as eventually, the parent will terminate and cause the zombie tasks to be deallocated.

However, in a server application such as the email database server above, this becomes a problem, as the server generally never terminates, and as a result, the system list of process descriptor blocks becomes cluttered by zombies (processes that have properly terminated by haven't been waited upon by the parent).
To avoid this problem, Unix ensures that a terminating child application can send a signal to the parent indicating that it has terminated (SIG_CHILD). The parent should catch this signal, and issue a wait() or one of its variants to clean up the zombied process descriptor block.

For this question, describe the concept of a signal, and indicate how the parent application can be configured to act upon the SIG_CHILD signal from each child as they terminate to avoid the zombie issue.
In your answer, discuss the OS services that Unix provides to support signal processing.

Reference no: EM13942824

Questions Cloud

Publishes hard copy dictionaries : You work for Don's Dictionaries, a traditional business that publishes hard copy dictionaries in several common languages, including English, Spanish, French, Japanese, and Italian. In the innovative economy, Don's Dictionaries is struggling to stay ..
Produce a cumulative probabilities report and graph : Produce a cumulative probabilities report and graph for the question. Based on results and the decision criteria, will the CEO accept or reject the proposed production of the product?
Breadth of heath care information on the internet : The wide-reaching span of today's global society is increasingly being seen in the breadth of heath care information on the Internet. Today's patients are more informed than ever and can easily find information on anything from diseases to treatme..
How could iger and his top management : What challenges do you think Disney might face in doing business in Russia? How could Iger and his top management team use planning to best prepare for those challenges?
Describe the concept of a signal, and indicate configuration : When a child process is fork()ed, a parent may wait for the successful completion of the child via the wait() service (or one of its variants) so that the return result of that application can be read from the process descriptor block.
Privacy-confidentiality and security issues : Loss of data, theft, and penetration of system safeguards are the main ways in which large scale electronic data can be compromised. With the increasing use of digital and electronic information technologies in health care, it is more important th..
White privilege : What does the author mean by the concept of "white privilege"?Re-read the author's list of 46 examples of white privilege. Select the five examples that seem the most significant in helping you to understand that white people are privileged. Explain ..
Visual dss to run a monte carlo simulation : You are required to use Visual DSS to run a Monte Carlo simulation (a Risk Analysis).
Why is there no market supply curve under conditions : Why is there no market supply curve under conditions of monopoly?

Reviews

Write a Review

Operating System Questions & Answers

  Compare and contrast guided versus wireless media

Imagine that you have been asked to prepare a paper that compares and contrasts guided vs. wireless media for inclusion in your corporation’s knowledge database.

  Use wireshark tool to capture packets when you download

use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you

  Operating system suitability assessment plan

Develop a tool that helps companies in assessing the suitability of different operating systems for their businesses. This tool is a table with multiple rows and columns - Operating System Suitability Assessment Plan.

  Determine the number of hits and misses

Assuming the following memory accesses on a Direct Mapped cache unit which is defined by a 2-bit offset, index, and tag. Determine the number of hits and misses for the following sequence of memory addresses: 27, 15, 60, 43, 11, 48, 54, 15, 43, 22

  Categorize the efficiency in terms

Consider the followimg nested loop contruct. Categorize the efficiency in terms of the variable n using "big-O" notation. Suppose the statements represented by the elipsis

  Securing standard telecommunications line vs voip connection

Determine the difficulty(s) of securing a standard telecommunications line vs. securing a VOIP connection?

  How unix administrator distribute the message

I was recently working on our mainframe UNIX system, and suddenly I received a message that the server required to be rebooted on my screen.

  Create a server process that acts as a memory manager

Create a server process that acts as a Memory Manager that allocates valid memory requests to frames for multiple clients as in Program

  Write a report outlining methods of acquiring image in linux

Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.

  What is the subnet mask

Give the network number, local broadcast and the usable IP address ranges for the 5000th, 50000th & 150000th networks

  In this assignment you will implement a deadlock avoidance

in this assignment you will implement a deadlock avoidance algorithm as part of the process manager to avoid deadlocks

  Value in managing security and risk

Explain ISO 27001's value in managing security and risk. What are the drawbacks and benefits for obtaining ISO 27001 certification?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd