wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Docker Framework

profile
Hitanshi Patel
Sep 14, 2022
0 Likes
0 Discussions
142 Reads

What is a Container?

A container is a application used to bundle up all the neccesary files, libraries and services into one runtime environment. As one unit, the container can easily be moved and run on any operating system in any context. They don’t contain a guest OS for each container and rely on the underlying OS kernel, which makes the containers lightweight.Containers share resources with other containers in the same host OS and provide OS-level process isolation.

Important Terminologies in Docker:

As the image shows, the important terminologies in a docker for it to run are;

Client, Host, Daemon, Registry, Containers and Images

A container is a runnable instance of an image. An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry.

The Docker client  is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockered, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon.The Docker daemon listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services.

 


Comments ()


Sign in

Read Next

File management

Blog banner

BITCOIN WALLET

Blog banner

The Evolution of Operating Systems

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

DURGA POOJA

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Memory Partitioning

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Memory management

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

?How long does wisdom tooth pain last?

Blog banner

Service Operations in ITSM

Blog banner

Service transition principles

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

The evolution of OS

Blog banner

Buffer overflow

Blog banner

R Programming

Blog banner

SAVE TREES

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Hypothesis Testing in Data Science

Blog banner

Logical and physical address

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

RAID_142

Blog banner

operating system

Blog banner

Data Security must be your Priority!

Blog banner

Clarizen

Blog banner

How To Secure Operating Systems ?

Blog banner

Trello ( management software)

Blog banner

Fitness regime by Deepesh

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Ola

Blog banner

Lucidchart

Blog banner

Self defence

Blog banner

BUFFER OVERFLOW_142

Blog banner

Memory management

Blog banner

Scheduling in Operating Systems

Blog banner

Getting into anime My anime suggestions

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Virtual memory

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Virtual memory

Blog banner