wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Machine

profile
Maitri Mavani
Jul 05, 2024
0 Likes
0 Discussions
110 Reads

What is a virtual machine?

Virtual machine (VM) is essentially a computer that runs inside another computer. It's a software program that acts like a physical computer with its own CPU, memory, storage, and operating system

Types:

>System Virtual Machines: Most common type of VM designed to run a complete operating system, just like a physical computer. They provide a full virtual environment with virtual CPU, memory, storage, and network interfaces.

>Process Virtual Machines: Less common and focuses on running specific programs or applications rather than entire operating systems.

Architecture:

•Physical Hardware (Host Machine): This is the actual computer with physical resources like CPU, memory, storage, and network interfaces. It acts as the foundation for running virtual machines.

• Hypervisor: This is software that sits directly on the physical hardware. It is the core of VM technology, acting as a virtualisation layer.

Guest Machine (Virtual Machine): This is the software program that acts like a separate computer system running on top of the hypervisor.

Guest OS and Applications: The VM runs its own OS (like Windows, Linux, etc.) and applications just like a physical computer. The OS and applications are unaware that they are running inside a virtual environment.

Advantages:

>Cost savings: It allows to consolidate multiple physical servers onto a single machine which reduces hardware costs.

>Efficiency: It optimizes maximizes hardware utilization and reduces the need for dedicated physical servers for specific tasks.

>Flexibility: It enables running different OS on single system which provides flexibility to test softwares.

>Scalability: They are easily scalable. we can add or remove VM when needed. It adjusts its resource as per demands. 

 >Testing and development: Developers can test applications on different configurations without affecting their main development machine.

>Training: It is used to create safe training environments for students or employees and allows us to practice skills in a controlled setting without risking damage to your personal computers.


Comments ()


Sign in

Read Next

10 Amazing facts about Tokyo Ghoul

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Developments in Modern Operating Systems

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Importance of Network Security Risk

Blog banner

Phishing

Blog banner

Memory management

Blog banner

security controls

Blog banner

Memory Management

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

File management In Operating System

Blog banner

VIRTUAL MACHINE

Blog banner

Ola

Blog banner

Service stratergy principles

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Answer

Blog banner

BENIFITS OF YOGA

Blog banner

Memory Management Techniques

Blog banner

Introduction to GIS

Blog banner

E-Cash (Electronic Cash)

Blog banner

Starvation

Blog banner

Interesting fact about kangaroo.

Blog banner

Modern operating system

Blog banner

LinkedIn

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Outlook.com

Blog banner

Virtual machine

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Os Virtual Memory

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Mumbai famous street food

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

virtual machines and virtualization

Blog banner

Culture Of Ladakh

Blog banner

Hacking Mobile Platforms

Blog banner

Google

Blog banner

How To Secure Operating Systems ?

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner