wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtualisation

profile
Harsh Kanakia
Jul 11, 2023
0 Likes
0 Discussions
28 Reads

 

Operating system-based Virtualization refers to an operating system feature in which the kernel enables the existence of various isolated user-space instances. The installation of virtualization software also refers to Operating system-based virtualization. It is installed over a pre-existing operating system and that operating system is called the host operating system. 

In this virtualization, a user installs the virtualization software in the operating system of his system like any other program and utilizes this application to operate and generate various virtual machines. Here, the virtualization software allows direct access to any of the created virtual machines to the user. As the host OS can provide hardware devices with the mandatory support, operating system virtualization may affect compatibility issues of hardware even when the hardware driver is not allocated to the virtualization software. 

Virtualization software is able to convert hardware IT resources that require unique software for operation into virtualized IT resources. As the host OS is a complete operating system in itself, many OS-based services are available as organizational management and administration tools can be utilized for the virtualization host management. 

Various major operations of Operating System Based Virtualization are described below:  

1.Hardware capabilities can be employed, such as the network connection and CPU.
2.Connected peripherals with which it can interact, such as a webcam, printer, keyboard, or Scanners.
3.Data that can be read or written, such as files, folders, and network shares.

 

Features of operating system-based virtualization are:

  • Resource isolation: Operating system-based virtualization provides a high level of resource isolation, which allows each container to have its own set of resources, including CPU, memory, and I/O bandwidth.
  • Lightweight: Containers are lightweight compared to traditional virtual machines as they share the same host operating system, resulting in faster startup and lower resource usage.
  • Portability: Containers are highly portable, making it easy to move them from one environment to another without needing to modify the underlying application.
  • Scalability: Containers can be easily scaled up or down based on the application requirements, allowing applications to be highly responsive to changes in demand.
  • Security: Containers provide a high level of security by isolating the containerized application from the host operating system and other containers running on the same system.

Comments ()


Sign in

Read Next

Processing Crime and Incident Scenes

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

File management -disha parekh

Blog banner

Khau Galli – Vile Parle

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Service transition principles

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Deadlock and starvation

Blog banner

Linux -V Server Virtual Machine

Blog banner

Man In The Middle Attack

Blog banner

Multiprocessor

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

All you need to know about “On-page SEO”

Blog banner

1.1 basic elements

Blog banner

Boxing

Blog banner

Session Hijacking

Blog banner

MAILFENCE

Blog banner

Install Ubuntu Easily

Blog banner

Virtual Memory

Blog banner

Deadlock in Operating System

Blog banner

Why is online marketing is important in current scenario

Blog banner

OS Assignment 1

Blog banner

Direct memory access

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

How to Run your First android App

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Optimization of operating system design

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Footprinting

Blog banner

Supervised and unsupervised learning

Blog banner

Operating Systems

Blog banner

Cybersecurity Standards for Automotive

Blog banner

 " Healing of Yoga "

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Social Media.

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner