wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRTUAL MACHINES

profile
Krisha Bhankharia
Jul 11, 2023
0 Likes
0 Discussions
56 Reads

Virtualization is a technology that allows a single computer or server to run multiple operating systems or sessions of a single OS simultaneously. It provides a way to optimize hardware usage and enables businesses and individuals to deal with legacy applications effectively.

In virtualization, a virtual machine monitor (VMM) or hypervisor is used to manage and support virtual machines (VMs). The VMM runs on top of or is incorporated into the host operating system. Each VM emulates hardware devices and can run a separate operating system. The VMM handles the communication between each OS and the underlying hardware, such as the processor, storage medium, and network.

Virtual machines can communicate with each other through virtualized network connections when necessary. This allows different applications running on different operating systems to coexist on a single platform.

There are two main approaches to virtual machine architecture: process virtual machines and system virtual machines.

  1. Process Virtual Machine: A process virtual machine presents an Application Binary Interface (ABI) to an application process. It translates instructions from one platform to another, providing cross-platform portability. Process virtual machines are typically part of a high-level language (HLL) application environment and are created and terminated with the process itself. Examples of process virtual machines include the Java VM architecture and the Microsoft Common Language Infrastructure (.NET framework).
  2. System Virtual Machine: In a system virtual machine, virtualizing software translates the Instruction Set Architecture (ISA) used by one hardware platform to that of another. The virtualizing software is host to multiple guest operating systems, each running in its own VM. The virtual machine monitor (VMM) emulates the hardware ISA to enable execution of different ISAs on the host system. This approach allows a single hardware platform to support multiple isolated guest OS environments simultaneously. System virtual machines provide benefits such as application portability, support for legacy systems, and enhanced security through isolation of guest environments.

A variant of system virtual machines is the hosted VM, where the VMM is built on top of an existing host operating system. The hosted VM relies on the host OS for device drivers and lower-level services. An example of a hosted VM is the VMware GSX server.

Virtualization technologies offered by companies like VMware and Microsoft are widely used in server and desktop environments to run multiple operating systems efficiently and maximize hardware utilization.

 

 

 


Comments ()


Sign in

Read Next

Elements and Principles of Photography

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

Deadlock and Starvation

Blog banner

What are NFT s?

Blog banner

Virtual memory

Blog banner

RAID

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

Emerging threats in cyber Forensics

Blog banner

Supervised and Unsupervised Learning

Blog banner

EFT

Blog banner

Natural Language Processing(NLP)

Blog banner

Multicore CPUs

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

social media issue

Blog banner

38_Exploring The Honeynet Project

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Consumer to consumer Business model

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Cache memory

Blog banner

Linker

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Mumbai local ......

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Self defence

Blog banner

Deadlock

Blog banner

Buffer Overflow

Blog banner

Modern Operating Systems

Blog banner

Cache memory

Blog banner

Hacking of web server and application

Blog banner

Tools to support CSI activities

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Understanding Regression Analysis

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Assignment-3

Blog banner

IT Service Continuity Management

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Service Design Model

Blog banner

Buffering

Blog banner

Cache Memory

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner