wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Docker Framework

profile
Hitanshi Patel
Sep 14, 2022
0 Likes
0 Discussions
142 Reads

What is a Container?

A container is a application used to bundle up all the neccesary files, libraries and services into one runtime environment. As one unit, the container can easily be moved and run on any operating system in any context. They don’t contain a guest OS for each container and rely on the underlying OS kernel, which makes the containers lightweight.Containers share resources with other containers in the same host OS and provide OS-level process isolation.

Important Terminologies in Docker:

As the image shows, the important terminologies in a docker for it to run are;

Client, Host, Daemon, Registry, Containers and Images

A container is a runnable instance of an image. An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry.

The Docker client  is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockered, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon.The Docker daemon listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services.

 


Comments ()


Sign in

Read Next

Fitness

Blog banner

What is a Malware ?

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

All you need to know about “On-page SEO”

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Embaded operating system

Blog banner

RACI model in IT services

Blog banner

Population

Blog banner

Outlook.com

Blog banner

Blockchain in IoT Applications

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Social engineering in cyber security

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Wrike

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Asana

Blog banner

10 Interesting facts you should know!!!

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

File management In Operating System

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

10 Unknown facts about India's Independence

Blog banner

american greatines

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Virtualisation

Blog banner

Deadlock

Blog banner

Place to visit in pune

Blog banner

SPEM

Blog banner

AI and cyber Security

Blog banner

What is M-commerce and how it's work

Blog banner

Women empowerment

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

memory cache

Blog banner

Virtual memory

Blog banner

MPL and how its effects?

Blog banner

The Evolution of Operating Systems

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

(Input/Output) in os

Blog banner