wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Docker Framework

profile
Hitanshi Patel
Sep 14, 2022
0 Likes
0 Discussions
142 Reads

What is a Container?

A container is a application used to bundle up all the neccesary files, libraries and services into one runtime environment. As one unit, the container can easily be moved and run on any operating system in any context. They don’t contain a guest OS for each container and rely on the underlying OS kernel, which makes the containers lightweight.Containers share resources with other containers in the same host OS and provide OS-level process isolation.

Important Terminologies in Docker:

As the image shows, the important terminologies in a docker for it to run are;

Client, Host, Daemon, Registry, Containers and Images

A container is a runnable instance of an image. An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry.

The Docker client  is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockered, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon.The Docker daemon listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services.

 


Comments ()


Sign in

Read Next

The art of being alone

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

"Audit" In Data Science

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Pooja Silver

Blog banner

E-learning in today's world

Blog banner

Processes : Process description and control

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

File system

Blog banner

WINDOWS I/ O

Blog banner

Deadlock

Blog banner

Cache Memory

Blog banner

Memory management

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

I/O Buffering

Blog banner

Linux 94

Blog banner

What is Network Security?

Blog banner

MAILFENCE

Blog banner

Environmental Management using GIS

Blog banner

Travel: Everything Everywhere!

Blog banner

Memory Management

Blog banner

Paging

Blog banner

Python as a tool for data analysis

Blog banner

LIMITED EDITION

Blog banner

MYNTRA

Blog banner

Financial Fraud Detection

Blog banner

Article on Team Work

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Busted : Common Web Security Myths

Blog banner

Cryptanalysis tool

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Landslide Hazard

Blog banner

Data Lake

Blog banner

Odoo

Blog banner

Mesh Topology

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Incident management in ITSM

Blog banner

BrainGate Technology

Blog banner

Uniprocessor Scheduling

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Google classroom

Blog banner