wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRTUAL MACHINE

profile
vanshika patel
Jul 11, 2023
0 Likes
0 Discussions
42 Reads

Virtual Machine abstracts the hardware of our personal computer such as CPU, disk drives, memory, NIC (Network Interface Card) etc, into many different execution environments as per our requirements, hence giving us a feel that each execution environment is a single computer. For example, VirtualBox.

When we run different processes on an operating system, it creates an illusion that each process is running on a different processor having its own virtual memory, with the help of CPU scheduling and virtual-memory techniques. There are additional features of a process that cannot be provided by the hardware alone like system calls and a file system. The virtual machine approach does not provide these additional functionalities but it only provides an interface that is same as basic hardware. Each process is provided with a virtual copy of the underlying computer system.

We can create a virtual machine for several reasons, all of which are fundamentally related to the ability to share the same basic hardware yet can also support different execution environments, i.e., different operating systems simultaneously.

The main drawback with the virtual-machine approach involves disk systems. Let us suppose that the physical machine has only three disk drives but wants to support seven virtual machines. Obviously, it cannot allocate a disk drive to each virtual machine, because virtual-machine software itself will need substantial disk space to provide virtual memory and spooling. The solution is to provide virtual disks. Users are thus given their own virtual machines. After which they can run any of the operating systems or software packages that are available on the underlying machine. The virtual-machine software is concerned with multi-programming multiple virtual machines onto a physical machine, but it does not need to consider any user-support software. This arrangement can provide a useful way to divide the problem of designing a multi-user interactive system, into two smaller pieces.

Advantages:

  1. There are no protection problems because each virtual machine is completely isolated from all other virtual machines.
  2. Virtual machine can provide an instruction set architecture that differs from real computers.
  3. Easy maintenance, availability and convenient recovery.

Disadvantages:

  1. When multiple virtual machines are simultaneously running on a host computer, one virtual machine can be affected by other running virtual machines, depending on the workload.
  2. Virtual machines are not as efficient as a real one when accessing the hardware.

 

 

Vanshika Patel-53003220133


Comments ()


Sign in

Read Next

What is semaphore in operating system?

Blog banner

RAID

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

DIGITAL ECONOMY

Blog banner

Data carving - using hex editor

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

10 Interesting facts you should know!!!

Blog banner

Evolution of Operating system

Blog banner

Virtual machine

Blog banner

The Laws of Karma

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

MORDERN UNIX SYSTEM

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Memory Management

Blog banner

Memory Management

Blog banner

Memory Management of Operating System(OS)

Blog banner

Virtual memory

Blog banner

Cache Memory

Blog banner

Deadlock and Starvation

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

DATA VAULT

Blog banner

Process State

Blog banner

RAID

Blog banner

Lifestyle of a photographer

Blog banner

A little bit of salt is all the hash needs!

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Best password managers: Reviews of the top products

Blog banner

Scheduling

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

BENIFITS OF YOGA

Blog banner

Virtual memory

Blog banner

Pooja Silver

Blog banner

Creating Digitally Signed Document

Blog banner

Security Issues and Countermeasures

Blog banner

How to use GIT & GITHUB

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

RAID and It's Levels

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Docker Framework

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner