wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

An Overview of Virtual Machines

profile
Monil Parikh
Jul 05, 2024
0 Likes
0 Discussions
144 Reads

 A Virtual Machine (VM) is a compute resource that uses software instead of a physical computer to run programs and deploy apps. One or more virtual “guest” machines run on a physical “host” machine.  Each virtual machine runs its own operating system and functions separately from the other VMs, even when they are all running on the same host. This means that, for example, a virtual MacOS virtual machine can run on a physical PC. 

Virtual machine technology is used for many use cases across on-premises and cloud environments. More recently, public cloud services are using virtual machines to provide virtual application resources to multiple users at once, for even more cost efficient and flexible compute. 
Virtual machines (VMs) allow a business to run an operating system that behaves like a completely separate computer in an app window on a desktop. VMs may be deployed to accommodate different levels of processing power needs, to run software that requires a different operating system, or to test applications in a safe, sandboxed environment.
-----------------------------------------------------------------------------------------------------------------------------
Use Case:
Virtual machines have historically been used for server virtualization, which enables IT teams to consolidate their computing resources and improve efficiency. Additionally, virtual machines can perform specific tasks considered too risky to carry out in a host environment, such as accessing virus-infected data or testing operating systems. Since the virtual machine is separated from the rest of the system, the software inside the virtual machine cannot tamper with the host computer.
------------------------------------------------------------------------------------------------------------------------------------------
Advantages of Virtual Machines
Virtual machines are easy to manage and maintain, and they offer several advantages over physical machines:   

VMs can run multiple operating system environments on a single physical computer, saving physical space, time and management costs. 
Virtual machines support legacy applications, reducing the cost of migrating to a new operating system. For example, a Linux virtual machine running a distribution of Linux as the guest operating system can exist on a host server that is running a non-Linux operating system, such as Windows. 
VMs can also provide integrated disaster recovery and application provisioning options.    

---------------------------------------------------------------------------------------------------
TYPES OF VIRTUALIZATION

1.Hardware virtualization: When virtualizing hardware, virtual versions of computers and operating systems (VMs) are created and consolidated into a single, primary, physical server. A hypervisor communicates directly with a physical server’s disk space and CPU to manage the VMs. Hardware virtualization, which is also known as server virtualization, allows hardware resources to be utilized more efficiently and for one machine to simultaneously run different operating systems.

 
2. Software virtualization: Software virtualization creates a computer system complete with hardware that allows one or more guest operating systems to run on a physical host machine. For example, Android OS can run on a host machine that is natively using a Microsoft Windows OS, utilizing the same hardware as the host machine does. Additionally, applications can be virtualized and delivered from a server to an end user’s device, such as a laptop or smartphone. This allows employees to access centrally hosted applications when working remotely. 


3. Storage virtualization: Storage can be virtualized by consolidating multiple physical storage devices to appear as a single storage device. Benefits include increased performance and speed, load balancing and reduced costs. Storage virtualization also helps with disaster recovery planning, as virtual storage data can be duplicated and quickly transferred to another location, reducing downtime.  


4. Network virtualization: Multiple sub-networks can be created on the same physical network by combining equipment into a single, software-based virtual network resource. Network virtualization also divides available bandwidth into multiple, independent channels, each of which can be assigned to servers and devices in real time. Advantages include increased reliability, network speed, security and better monitoring of data usage. Network virtualization can be a good choice for companies with a high volume of users who need access at all times. 


5. Desktop virtualization: This common type of virtualization separates the desktop environment from the physical device and stores a desktop on a remote server, allowing users to access their desktops from anywhere on any device. In addition to easy accessibility, benefits of virtual desktops include better data security, cost savings on software licenses and updates, and ease of management. 

 


Comments ()


Sign in

Read Next

Importance of Morning Routines for Students During the Festive Season

Blog banner

What is hydration pack/ hydration bladder?

Blog banner

Understanding - Proof of Work!

Blog banner

Mental Health

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Semaphores

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Importance Of Blockchain

Blog banner

Concurrency management in operating systems

Blog banner

IOT- Internet Of Things

Blog banner

Fault Tolerance

Blog banner

Culture Of Ladakh

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

How to Run your First android App

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Elegant fashion style

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

DNS Cache

Blog banner

A Journey By Train

Blog banner

Modern Operating System

Blog banner

Steganography and Steganalysis

Blog banner

Importance Of Education.

Blog banner

Concurrency and memory

Blog banner

Virtual memory in windows

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Be kind person

Blog banner

Service Catalogue Management

Blog banner

gis substation

Blog banner

Service Strategy In ITSM

Blog banner

MY FIRST BLOG?

Blog banner

Cache memory

Blog banner

Memory Management in an Operating System

Blog banner

SNAPCHAT

Blog banner

Europe Through My Lens

Blog banner

Article on team management software

Blog banner

Constrains in service design

Blog banner

Virtual Machine's

Blog banner

KAHAWA TEA

Blog banner

What is a geographic information system (GIS)?

Blog banner

AOL Mail

Blog banner