wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Docker Framework

profile
Hitanshi Patel
Sep 14, 2022
0 Likes
0 Discussions
142 Reads

What is a Container?

A container is a application used to bundle up all the neccesary files, libraries and services into one runtime environment. As one unit, the container can easily be moved and run on any operating system in any context. They don’t contain a guest OS for each container and rely on the underlying OS kernel, which makes the containers lightweight.Containers share resources with other containers in the same host OS and provide OS-level process isolation.

Important Terminologies in Docker:

As the image shows, the important terminologies in a docker for it to run are;

Client, Host, Daemon, Registry, Containers and Images

A container is a runnable instance of an image. An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry.

The Docker client  is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockered, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon.The Docker daemon listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services.

 


Comments ()


Sign in

Read Next

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Earth with no trees

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

OS Evolution Achievements

Blog banner

Way to make your meal healthier.

Blog banner

Linux VServer Architecture

Blog banner

Understanding E-mail Servers

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Big Data Architecture

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Virtualisation

Blog banner

Love is in air.....

Blog banner

Landslide Hazard

Blog banner

Steganography

Blog banner

Hey Aryan here

Blog banner

Topic: Sessions in Operating system

Blog banner

Memory management

Blog banner

Importance of modern technology era

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Vulnerability Assessment

Blog banner

Virtual Machine

Blog banner

LISP - Library Management System

Blog banner

Flipkart

Blog banner

RAID

Blog banner

Cache Memory(142)

Blog banner

To travel is to live

Blog banner

Buffer Overflow

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

PERT Overview

Blog banner

Types of Malware in Cyber Security

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Process in OS

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Uniprocessor scheduling

Blog banner

Dr. Venkadavarahan

Blog banner

Latest Email Marketing Techniques

Blog banner

Windows Operating System

Blog banner

Cache memory

Blog banner

Tools to support CSI activities

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

GUIDE TO GIS

Blog banner