wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtualisation

profile
Harsh Kanakia
Jul 11, 2023
0 Likes
0 Discussions
28 Reads

 

Operating system-based Virtualization refers to an operating system feature in which the kernel enables the existence of various isolated user-space instances. The installation of virtualization software also refers to Operating system-based virtualization. It is installed over a pre-existing operating system and that operating system is called the host operating system. 

In this virtualization, a user installs the virtualization software in the operating system of his system like any other program and utilizes this application to operate and generate various virtual machines. Here, the virtualization software allows direct access to any of the created virtual machines to the user. As the host OS can provide hardware devices with the mandatory support, operating system virtualization may affect compatibility issues of hardware even when the hardware driver is not allocated to the virtualization software. 

Virtualization software is able to convert hardware IT resources that require unique software for operation into virtualized IT resources. As the host OS is a complete operating system in itself, many OS-based services are available as organizational management and administration tools can be utilized for the virtualization host management. 

Various major operations of Operating System Based Virtualization are described below:  

1.Hardware capabilities can be employed, such as the network connection and CPU.
2.Connected peripherals with which it can interact, such as a webcam, printer, keyboard, or Scanners.
3.Data that can be read or written, such as files, folders, and network shares.

 

Features of operating system-based virtualization are:

  • Resource isolation: Operating system-based virtualization provides a high level of resource isolation, which allows each container to have its own set of resources, including CPU, memory, and I/O bandwidth.
  • Lightweight: Containers are lightweight compared to traditional virtual machines as they share the same host operating system, resulting in faster startup and lower resource usage.
  • Portability: Containers are highly portable, making it easy to move them from one environment to another without needing to modify the underlying application.
  • Scalability: Containers can be easily scaled up or down based on the application requirements, allowing applications to be highly responsive to changes in demand.
  • Security: Containers provide a high level of security by isolating the containerized application from the host operating system and other containers running on the same system.

Comments ()


Sign in

Read Next

You'll get to know about Pankaj Negi

Blog banner

What is Influencer Marketing and its Trends

Blog banner

PPT methodology

Blog banner

Cloud Security: Trends and Innovations

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Starvation

Blog banner

Article on Team Work

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Importance Of Blockchain

Blog banner

OS Assignment 1

Blog banner

Segmentation and paging concept

Blog banner

Fashion marketing in india

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

FRIENDSHIP

Blog banner

Risk factors in service transistion

Blog banner

BrainGate Technology

Blog banner

Oracle Corporation

Blog banner

Risk management in IT

Blog banner

Wrike

Blog banner

Full Disk Encryption

Blog banner

Virus

Blog banner

Pipedrive

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Install Ubuntu in Vmware

Blog banner

EFT

Blog banner

Modern Operating Systems.

Blog banner

Linux VServer Architecture

Blog banner

Memory Management in Operating System

Blog banner

Traditional UNIX Scheduling

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Fashion design

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

THREADS (assignment 1)

Blog banner

Evolution of Operating system

Blog banner

Modern Operating System

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Number Guessing game --lisp

Blog banner

What is service level Agreement?

Blog banner

IT Service Continuity Management

Blog banner

Deadlock

Blog banner

Teamwork

Blog banner