wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRTUAL MACHINE

profile
vanshika patel
Jul 11, 2023
0 Likes
0 Discussions
42 Reads

Virtual Machine abstracts the hardware of our personal computer such as CPU, disk drives, memory, NIC (Network Interface Card) etc, into many different execution environments as per our requirements, hence giving us a feel that each execution environment is a single computer. For example, VirtualBox.

When we run different processes on an operating system, it creates an illusion that each process is running on a different processor having its own virtual memory, with the help of CPU scheduling and virtual-memory techniques. There are additional features of a process that cannot be provided by the hardware alone like system calls and a file system. The virtual machine approach does not provide these additional functionalities but it only provides an interface that is same as basic hardware. Each process is provided with a virtual copy of the underlying computer system.

We can create a virtual machine for several reasons, all of which are fundamentally related to the ability to share the same basic hardware yet can also support different execution environments, i.e., different operating systems simultaneously.

The main drawback with the virtual-machine approach involves disk systems. Let us suppose that the physical machine has only three disk drives but wants to support seven virtual machines. Obviously, it cannot allocate a disk drive to each virtual machine, because virtual-machine software itself will need substantial disk space to provide virtual memory and spooling. The solution is to provide virtual disks. Users are thus given their own virtual machines. After which they can run any of the operating systems or software packages that are available on the underlying machine. The virtual-machine software is concerned with multi-programming multiple virtual machines onto a physical machine, but it does not need to consider any user-support software. This arrangement can provide a useful way to divide the problem of designing a multi-user interactive system, into two smaller pieces.

Advantages:

  1. There are no protection problems because each virtual machine is completely isolated from all other virtual machines.
  2. Virtual machine can provide an instruction set architecture that differs from real computers.
  3. Easy maintenance, availability and convenient recovery.

Disadvantages:

  1. When multiple virtual machines are simultaneously running on a host computer, one virtual machine can be affected by other running virtual machines, depending on the workload.
  2. Virtual machines are not as efficient as a real one when accessing the hardware.

 

 

Vanshika Patel-53003220133


Comments ()


Sign in

Read Next

Virtual Memory

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Monday. com App

Blog banner

Components of GIS

Blog banner

Hacking Mobile Platforms

Blog banner

Dudhasagar waterfall ?

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Travel: Everything Everywhere!

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Regression Analysis

Blog banner

Direct Memory Access

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Online Education

Blog banner

IoT Architecture Based Security

Blog banner

Deadlock

Blog banner

Direct Memory Access

Blog banner

MY FIRST BLOG?

Blog banner

What is a Dumpster Diving Attack?

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Os(Computer security threats)

Blog banner

OPERATING SYSTEM

Blog banner

Web Site

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Culture Of Ladakh

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Amazon

Blog banner

Socket Programming in Java

Blog banner

SQL Injection Techniques

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Characteristics of Etherum

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Power of words

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Operation system

Blog banner

Benefits and drawback of web security.

Blog banner

All you need to know about Website Traffic

Blog banner