wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Linux VServer Architecture

profile
Charmi Dhamelia
Jul 12, 2023
0 Likes
0 Discussions
104 Reads

Linux-VServer is a virtualization solution for Linux operating systems that provides a lightweight and efficient virtual machine architecture. It allows the creation of multiple virtual servers, or virtual private servers (VPS), on a single physical server, enabling isolation and resource management for different applications and users.

At its core, Linux-VServer utilizes the concept of operating system-level virtualization, also known as containerization. Instead of running full-fledged virtual machines, Linux-VServer leverages the Linux kernel's features to partition the operating system and resources, providing separate environments for each virtual server.

 The general architecture of LinuxVServer.

VServer provides a shared, virtualized OS image, consisting of a root file system, and a shared set of system libraries and kernel services. Each VM can be booted, shut down, and rebooted independentlythree groupings of software running on the computer system. The hosting platform includes the shared OS image and a privileged host VM, whose function is to monitor and manage the other VMs. The virtual platform creates virtual machines and is the view of the system seen by the applications running on the individual VMs.

 The key components of Linux-VServer architecture include:

1: Kernel-level virtualization

2: Contexts

3: Resource management

4: Security and isolation

5: Efficient performance

 


Comments ()


Sign in

Read Next

Short note on expert system

Blog banner

Security and E-mail

Blog banner

My favourite food

Blog banner

Traditional UNIX Scheduling

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Memory management

Blog banner

KAHAWA TEA

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Security requirements for Safe E-Payments

Blog banner

RAID

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Session Vulnerabilities

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Heart Fulness Meditation

Blog banner

Virtual machine and virtualizing

Blog banner

PODIO

Blog banner

Privacy LAWs in IT

Blog banner

Product Discount Calculator

Blog banner

Veg Mix Pickle

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Vikrant’s first blog

Blog banner

Characteristics of Etherum

Blog banner

Memory Management

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Goa Trip With Friends

Blog banner

The Evolution of Operating Systems

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

THE DESIRE OF MANY

Blog banner

Virtual memory

Blog banner

E-Cash (Electronic Cash)

Blog banner

Deadlock

Blog banner

Fitness

Blog banner

HR Automation : Need of the hour

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

OS Assignment 1

Blog banner

Career v/s Job : Choose your passion

Blog banner

Memory Management

Blog banner