wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

virtual machines and virtualization

profile
SAKHI JHAVERI
Jul 11, 2023
0 Likes
0 Discussions
55 Reads

Virtualization is a powerful strategy for managing applications on a single PC or server, enabling multiple operating systems or sessions to run simultaneously. The host operating system can support multiple virtual machines (VMs), each with its own characteristics and hardware platform. The virtual machine monitor (VMM) or hypervisor runs on top of or is incorporated into the host OS. The VMM supports VMs, which are emulated hardware devices, and handles communication with the processor, storage medium, and network. Most VMs use virtualized network connections to communicate with one another. The key to the success of this approach is that the VMM provides a programmable, transparent layer between software environments and the underlying hardware and host OS, ensuring efficient use of the hardware below it.

From the perspective of an application, the machine characteristics are specified by high-level language capabilities and OS and system library calls. The API defines the machine for an application, while the operating system defines the system that supports the operation of the OS and the numerous processes that execute concurrently. From the OS perspective, the interface between the system and the machine is provided by the ISA.

There are two architectural approaches to implementing virtual machines: process VMs and system VMs. Process VMs are virtual platforms for executing a single process, converting OS and user-level instructions from one platform to another. The ABI specification is designed to support a given HLL or set of HLLs and be easily portable to various ISAs. The HLL VM includes a front-end compiler that generates a virtual binary code for execution or interpretation, which can be executed on any machine with the process VM implemented.

System VMs are virtualizing software that translates the ISA used by one hardware platform to that of another. In the process VM approach, the virtualizing software uses the services of the host OS, while in the system VM approach, there is no separate host OS, as the host system OS incorporates the VM capability. This approach offers benefits such as application portability, support for legacy systems without the need to maintain legacy hardware, and security by isolating each guest OS environment from other guest environments.


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Semaphores

Blog banner

Disk scheduling

Blog banner

INTERNET SECURITY

Blog banner

INTERNET

Blog banner

Information Technology In E- Commerce

Blog banner

Session Vulnerabilities

Blog banner

Evolution of operating system

Blog banner

Operating system

Blog banner

Virtual memory in windows

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Importance of Website

Blog banner

Process in OS

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Modern operating system

Blog banner

I/O Management and Disk Scheduling

Blog banner

Technical SEO : Total Guide

Blog banner

Install Ubuntu Easily

Blog banner

Cycling

Blog banner

Multicore CPUs

Blog banner

Natural Language Processing(NLP)

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Virtual memory

Blog banner

Windows Operating System

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Security Issues

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

memory management

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Microsoft Word

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Social Engineering Attacks

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Water Resources are about to exhaust...

Blog banner

Interrupts in operating system.

Blog banner

Study of Backdoor and Trojan tools

Blog banner

File Management In OS

Blog banner