wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Machine

profile
Maitri Mavani
Jul 05, 2024
0 Likes
0 Discussions
110 Reads

What is a virtual machine?

Virtual machine (VM) is essentially a computer that runs inside another computer. It's a software program that acts like a physical computer with its own CPU, memory, storage, and operating system

Types:

>System Virtual Machines: Most common type of VM designed to run a complete operating system, just like a physical computer. They provide a full virtual environment with virtual CPU, memory, storage, and network interfaces.

>Process Virtual Machines: Less common and focuses on running specific programs or applications rather than entire operating systems.

Architecture:

•Physical Hardware (Host Machine): This is the actual computer with physical resources like CPU, memory, storage, and network interfaces. It acts as the foundation for running virtual machines.

• Hypervisor: This is software that sits directly on the physical hardware. It is the core of VM technology, acting as a virtualisation layer.

Guest Machine (Virtual Machine): This is the software program that acts like a separate computer system running on top of the hypervisor.

Guest OS and Applications: The VM runs its own OS (like Windows, Linux, etc.) and applications just like a physical computer. The OS and applications are unaware that they are running inside a virtual environment.

Advantages:

>Cost savings: It allows to consolidate multiple physical servers onto a single machine which reduces hardware costs.

>Efficiency: It optimizes maximizes hardware utilization and reduces the need for dedicated physical servers for specific tasks.

>Flexibility: It enables running different OS on single system which provides flexibility to test softwares.

>Scalability: They are easily scalable. we can add or remove VM when needed. It adjusts its resource as per demands. 

 >Testing and development: Developers can test applications on different configurations without affecting their main development machine.

>Training: It is used to create safe training environments for students or employees and allows us to practice skills in a controlled setting without risking damage to your personal computers.


Comments ()


Sign in

Read Next

Firewall in Computer Network

Blog banner

OS Assignment-3

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Importance Of Blockchain

Blog banner

Open Source Project By Google

Blog banner

How can parents support a child’s mental health?

Blog banner

Evolution of Operating Sytems

Blog banner

Virtual memory in Operating System

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Zoho

Blog banner

Secure Hypertext transfer protocol

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Save Girl Child

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Developments in Modern Operating Systems

Blog banner

Why You Should Not Use Free VPNs

Blog banner

10 Signs your Computer has Virus

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

15 Interesting Facts about India

Blog banner

Financial Fraud Detection

Blog banner

10 Interesting facts you should know!!!

Blog banner

OS Assignment 3 Deadlock

Blog banner

Data Warehouse Bus Matrix

Blog banner

Explain website hacking issues

Blog banner

Google

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Access management

Blog banner

Understanding the 'Ambiverts'

Blog banner

OS ASSIGNMENT

Blog banner

How to Grow Your Brand on YouTube Without a Big Budget

Blog banner

Beauty of indian railway

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

"Mahakali cave"

Blog banner

Dudhasagar waterfall ?

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Disk Management

Blog banner

M commerce

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Session Vulnerabilities

Blog banner

What is a Malware ?

Blog banner

Ethical Hacking

Blog banner