wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRTUAL MACHINES

profile
Krisha Bhankharia
Jul 11, 2023
0 Likes
0 Discussions
56 Reads

Virtualization is a technology that allows a single computer or server to run multiple operating systems or sessions of a single OS simultaneously. It provides a way to optimize hardware usage and enables businesses and individuals to deal with legacy applications effectively.

In virtualization, a virtual machine monitor (VMM) or hypervisor is used to manage and support virtual machines (VMs). The VMM runs on top of or is incorporated into the host operating system. Each VM emulates hardware devices and can run a separate operating system. The VMM handles the communication between each OS and the underlying hardware, such as the processor, storage medium, and network.

Virtual machines can communicate with each other through virtualized network connections when necessary. This allows different applications running on different operating systems to coexist on a single platform.

There are two main approaches to virtual machine architecture: process virtual machines and system virtual machines.

  1. Process Virtual Machine: A process virtual machine presents an Application Binary Interface (ABI) to an application process. It translates instructions from one platform to another, providing cross-platform portability. Process virtual machines are typically part of a high-level language (HLL) application environment and are created and terminated with the process itself. Examples of process virtual machines include the Java VM architecture and the Microsoft Common Language Infrastructure (.NET framework).
  2. System Virtual Machine: In a system virtual machine, virtualizing software translates the Instruction Set Architecture (ISA) used by one hardware platform to that of another. The virtualizing software is host to multiple guest operating systems, each running in its own VM. The virtual machine monitor (VMM) emulates the hardware ISA to enable execution of different ISAs on the host system. This approach allows a single hardware platform to support multiple isolated guest OS environments simultaneously. System virtual machines provide benefits such as application portability, support for legacy systems, and enhanced security through isolation of guest environments.

A variant of system virtual machines is the hosted VM, where the VMM is built on top of an existing host operating system. The hosted VM relies on the host OS for device drivers and lower-level services. An example of a hosted VM is the VMware GSX server.

Virtualization technologies offered by companies like VMware and Microsoft are widely used in server and desktop environments to run multiple operating systems efficiently and maximize hardware utilization.

 

 

 


Comments ()


Sign in

Read Next

Importance of self defence for girls

Blog banner

Vulnerability Assessment

Blog banner

What is thread and alse multithreading

Blog banner

EFT

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Webmail

Blog banner

Cross site scripting Attack

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Blockchain Transactions

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Proof-of-Stake (PoS)

Blog banner

Article on Fresh Book

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Virtual Machine's

Blog banner

evolution of operating system - Disha Parekh

Blog banner

Linux Threads:

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Deadlock and Starvation

Blog banner

Worms, viruses and Bots

Blog banner

INSTAGRAM

Blog banner

CSI and Organizational Change

Blog banner

Blog on Smartsheet.

Blog banner

How to Run your First android App

Blog banner

Fitness

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Developments in Modern Operating Systems

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

A Deep Dive

Blog banner

Threat management

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Capacity management in ITSM

Blog banner

Models of Information Security.

Blog banner

Women Empowerment

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Spotify

Blog banner