wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Docker Framework

profile
Hitanshi Patel
Sep 14, 2022
0 Likes
0 Discussions
142 Reads

What is a Container?

A container is a application used to bundle up all the neccesary files, libraries and services into one runtime environment. As one unit, the container can easily be moved and run on any operating system in any context. They don’t contain a guest OS for each container and rely on the underlying OS kernel, which makes the containers lightweight.Containers share resources with other containers in the same host OS and provide OS-level process isolation.

Important Terminologies in Docker:

As the image shows, the important terminologies in a docker for it to run are;

Client, Host, Daemon, Registry, Containers and Images

A container is a runnable instance of an image. An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry.

The Docker client  is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockered, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon.The Docker daemon listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services.

 


Comments ()


Sign in

Read Next

note taker app

Blog banner

Mesh Topology

Blog banner

Why is ITSM important in IT organization?

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Telegram and it's features

Blog banner

Deadlock

Blog banner

Assignment 2

Blog banner

Virtual memory

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

10 Rare Historic Pictures that are Ever Captured

Blog banner

Threads

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Zero-Day Attack

Blog banner

File System

Blog banner

Proton mail

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Modern operating system

Blog banner

Secure Hypertext transfer protocol

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

MEMORY MANAGEMENT

Blog banner

Fault tolerance

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Processes: Process Description and Control.

Blog banner

Functions Of Operating Systems

Blog banner

Social media

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

All you need to know about Cassandra

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Kernel in Operating System

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Multiprocessor

Blog banner

Making Money through Instagram

Blog banner

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Hacking

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

What is Data, Information and Knowledge?

Blog banner

I/O Buffering

Blog banner

Deadlock

Blog banner

Environmental Management using GIS

Blog banner