wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Machine

profile
Jash Hirani
Jul 11, 2023
0 Likes
0 Discussions
106 Reads

Traditionally, applications have run directly on an OS on a PC or a server. Each PC or server would run only one OS at a time. Thus, the vendor had to rewrite parts of its applications for each OS/platform they would run on. An effective strategy for dealing with this problem is known as virtualization . Virtualization technology enables a single PC or server to simultaneously run multiple operating systems or multiple sessions of a single OS. A machine with virtualization can host numerous applications, including those that run on different operating systems, on a single platform. In essence, the host operating system can support a number of virtual machines (VM) , each of which has the characteristics of a particular OS and, in some versions of virtualization, the characteristics of a particular hardware platform. The VM approach is becoming a common way for businesses and individuals to deal with legacy applications and to optimize their hardware usage by maximizing the number of kinds of applications that a single computer can handle . Commercial VM offerings by companies such as VMware and Microsoft are widely used, with millions of copies having been sold. In addition to their use in server environments, these VM technologies also are used in desktop environments to run multiple operating systems, typically Windows and Linux.The virtual machine monitor (VMM) , or hypervisor , runs on top of the host OS. The VMM supports VMs, which are emulated hardware devices. Each VM runs a separate OS. The VMM handles each operating system’s communications with the processor, the storage medium, and the network. To execute programs, the VMM hands off the processor control to a virtual OS on a VM. Most VMs use virtualized network connections to communicate with one another, when such communication is needed. Key to the success of this approach is that the VMM provides a layer between software environments and the underlying hardware and host OS that is programmable, transparent to the software above it, and makes efficient use of the hardware below  it


Comments ()


Sign in

Read Next

Scheduling in Operating Systems

Blog banner

M commerce

Blog banner

CyberSecurity Color Wheel

Blog banner

Constrained Management in IT

Blog banner

RAID

Blog banner

Memory input output management

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

I/O Buffering

Blog banner

Uniprocessor Scheduling

Blog banner

Disk cache

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Life lesson

Blog banner

Online Education

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Deadlock

Blog banner

Odoo

Blog banner

Steganography

Blog banner

Atlantis - The Lost Island.........

Blog banner

The Role of cryptography in cyber security

Blog banner

How to feel Happy everyday day

Blog banner

File management

Blog banner

Man is free by the birth .

Blog banner

Memory Management

Blog banner

Natural Language Processing(NLP)

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

UniProcessor Scheduling

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

FILE SHARING

Blog banner

Web Site

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Go Daddy

Blog banner

Explain website hacking issues

Blog banner

Characteristics of Etherum

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

IT GOVERNANCE

Blog banner

Technical SEO : Total Guide

Blog banner

I/O Buffering

Blog banner

Virtual memory

Blog banner

Incident management in ITSM

Blog banner

Chicken Dum Biryani

Blog banner