wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Machine

profile
Maitri Mavani
Jul 05, 2024
0 Likes
0 Discussions
110 Reads

What is a virtual machine?

Virtual machine (VM) is essentially a computer that runs inside another computer. It's a software program that acts like a physical computer with its own CPU, memory, storage, and operating system

Types:

>System Virtual Machines: Most common type of VM designed to run a complete operating system, just like a physical computer. They provide a full virtual environment with virtual CPU, memory, storage, and network interfaces.

>Process Virtual Machines: Less common and focuses on running specific programs or applications rather than entire operating systems.

Architecture:

•Physical Hardware (Host Machine): This is the actual computer with physical resources like CPU, memory, storage, and network interfaces. It acts as the foundation for running virtual machines.

• Hypervisor: This is software that sits directly on the physical hardware. It is the core of VM technology, acting as a virtualisation layer.

Guest Machine (Virtual Machine): This is the software program that acts like a separate computer system running on top of the hypervisor.

Guest OS and Applications: The VM runs its own OS (like Windows, Linux, etc.) and applications just like a physical computer. The OS and applications are unaware that they are running inside a virtual environment.

Advantages:

>Cost savings: It allows to consolidate multiple physical servers onto a single machine which reduces hardware costs.

>Efficiency: It optimizes maximizes hardware utilization and reduces the need for dedicated physical servers for specific tasks.

>Flexibility: It enables running different OS on single system which provides flexibility to test softwares.

>Scalability: They are easily scalable. we can add or remove VM when needed. It adjusts its resource as per demands. 

 >Testing and development: Developers can test applications on different configurations without affecting their main development machine.

>Training: It is used to create safe training environments for students or employees and allows us to practice skills in a controlled setting without risking damage to your personal computers.


Comments ()


Sign in

Read Next

E-security systems | CCTV

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Ambiguous

Blog banner

Why we fail after giving 100% ?

Blog banner

What is metaverse?

Blog banner

Mobile Survey

Blog banner

Linux

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

What is process

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Big Data Architecture

Blog banner

File sharing

Blog banner

Bit Coins

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Security and E-mail

Blog banner

Blog on health and fitness

Blog banner

File Sharing

Blog banner

City of Mumbai (Bombay):

Blog banner

Sessions In OS.

Blog banner

UniProcessor Scheduling

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Security issues

Blog banner

Street foods

Blog banner

Microsoft Windows Overview

Blog banner

Mumbai Metro 3

Blog banner

What is Spyware?

Blog banner

Internet of Things and cyber security

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Drawing tips for a beginner

Blog banner

"THINGS TO REMEMBER WHEN YOU'RE AT YOUR LOWEST"

Blog banner

Buffering

Blog banner

Raid

Blog banner

The launch of UniMap by HERE

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Women empowerment

Blog banner

Virtual Memory

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

The Role of cryptography in cyber security

Blog banner

PHISHING

Blog banner

Importance Of Blockchain

Blog banner

Modern operating system

Blog banner

Cyber Laws In India and Around the World

Blog banner