wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRTUAL MACHINES

profile
Krisha Bhankharia
Jul 11, 2023
0 Likes
0 Discussions
56 Reads

Virtualization is a technology that allows a single computer or server to run multiple operating systems or sessions of a single OS simultaneously. It provides a way to optimize hardware usage and enables businesses and individuals to deal with legacy applications effectively.

In virtualization, a virtual machine monitor (VMM) or hypervisor is used to manage and support virtual machines (VMs). The VMM runs on top of or is incorporated into the host operating system. Each VM emulates hardware devices and can run a separate operating system. The VMM handles the communication between each OS and the underlying hardware, such as the processor, storage medium, and network.

Virtual machines can communicate with each other through virtualized network connections when necessary. This allows different applications running on different operating systems to coexist on a single platform.

There are two main approaches to virtual machine architecture: process virtual machines and system virtual machines.

  1. Process Virtual Machine: A process virtual machine presents an Application Binary Interface (ABI) to an application process. It translates instructions from one platform to another, providing cross-platform portability. Process virtual machines are typically part of a high-level language (HLL) application environment and are created and terminated with the process itself. Examples of process virtual machines include the Java VM architecture and the Microsoft Common Language Infrastructure (.NET framework).
  2. System Virtual Machine: In a system virtual machine, virtualizing software translates the Instruction Set Architecture (ISA) used by one hardware platform to that of another. The virtualizing software is host to multiple guest operating systems, each running in its own VM. The virtual machine monitor (VMM) emulates the hardware ISA to enable execution of different ISAs on the host system. This approach allows a single hardware platform to support multiple isolated guest OS environments simultaneously. System virtual machines provide benefits such as application portability, support for legacy systems, and enhanced security through isolation of guest environments.

A variant of system virtual machines is the hosted VM, where the VMM is built on top of an existing host operating system. The hosted VM relies on the host OS for device drivers and lower-level services. An example of a hosted VM is the VMware GSX server.

Virtualization technologies offered by companies like VMware and Microsoft are widely used in server and desktop environments to run multiple operating systems efficiently and maximize hardware utilization.

 

 

 


Comments ()


Sign in

Read Next

Synchronization

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Paralysis/Paralysis Stroke

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Memory Management

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Virtual machine

Blog banner

I/O Buffering

Blog banner

GOOGLE

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Risk factors in service transistion

Blog banner

Process Creation

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Scheduling in Operating Systems

Blog banner

american greatines

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

R Programming

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Modern operating system

Blog banner

Busted : Common Web Security Myths

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Beatbox

Blog banner

UniProcessor Scheduling

Blog banner

Booting Process In Operating System

Blog banner

Operating system

Blog banner

IP Address

Blog banner

MACHINE LEARNING

Blog banner

Os(Computer security threats)

Blog banner

File management

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

What is semaphore in operating system?

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

What is Network Security?

Blog banner

What is HTML?

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Blog on health and fitness

Blog banner

M commerce

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

OS Assignment-3

Blog banner