wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

VIRTUAL MACHINES

profile
Krisha Bhankharia
Jul 11, 2023
0 Likes
0 Discussions
56 Reads

Virtualization is a technology that allows a single computer or server to run multiple operating systems or sessions of a single OS simultaneously. It provides a way to optimize hardware usage and enables businesses and individuals to deal with legacy applications effectively.

In virtualization, a virtual machine monitor (VMM) or hypervisor is used to manage and support virtual machines (VMs). The VMM runs on top of or is incorporated into the host operating system. Each VM emulates hardware devices and can run a separate operating system. The VMM handles the communication between each OS and the underlying hardware, such as the processor, storage medium, and network.

Virtual machines can communicate with each other through virtualized network connections when necessary. This allows different applications running on different operating systems to coexist on a single platform.

There are two main approaches to virtual machine architecture: process virtual machines and system virtual machines.

  1. Process Virtual Machine: A process virtual machine presents an Application Binary Interface (ABI) to an application process. It translates instructions from one platform to another, providing cross-platform portability. Process virtual machines are typically part of a high-level language (HLL) application environment and are created and terminated with the process itself. Examples of process virtual machines include the Java VM architecture and the Microsoft Common Language Infrastructure (.NET framework).
  2. System Virtual Machine: In a system virtual machine, virtualizing software translates the Instruction Set Architecture (ISA) used by one hardware platform to that of another. The virtualizing software is host to multiple guest operating systems, each running in its own VM. The virtual machine monitor (VMM) emulates the hardware ISA to enable execution of different ISAs on the host system. This approach allows a single hardware platform to support multiple isolated guest OS environments simultaneously. System virtual machines provide benefits such as application portability, support for legacy systems, and enhanced security through isolation of guest environments.

A variant of system virtual machines is the hosted VM, where the VMM is built on top of an existing host operating system. The hosted VM relies on the host OS for device drivers and lower-level services. An example of a hosted VM is the VMware GSX server.

Virtualization technologies offered by companies like VMware and Microsoft are widely used in server and desktop environments to run multiple operating systems efficiently and maximize hardware utilization.

 

 

 


Comments ()


Sign in

Read Next

Hypothesis Testing in Data Science

Blog banner

Elegant fashion style

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

MOVEMBER

Blog banner

City of Mumbai (Bombay):

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Threading

Blog banner

Policies for Service Transition

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

social media issue

Blog banner

Hosting basics

Blog banner

INTRODUCTION

Blog banner

Data Mining

Blog banner

Amazon

Blog banner

Virtual Memory

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

What is M-commerce and how it's work

Blog banner

Article on IT development trends

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Solitary Play Activities for Preschoolers: Types and Benefits

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Goa Trip With Friends

Blog banner

TRIGGERS IN DATABASE

Blog banner

Starvation

Blog banner

R Programming

Blog banner

bulk email software

Blog banner

STARVATION

Blog banner

VPN

Blog banner

Session Hijacking

Blog banner

Malware Defense

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Worms, viruses and Bots

Blog banner

Memory

Blog banner

A BLOG ON MYSQL

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

CRISP-DM Methodology

Blog banner

SQL Injection Techniques

Blog banner

Virtual machine and virtualizing

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Disk Management

Blog banner