A virtual environment has its own file system, as well as access to part of the CPU time, memory and peripheral devices, such as a network card. Virtual environments on a single computer can run multiple, and they somehow shared by all processors, memory and disks. Therefore, VE, as a rule, do not depend on the equipment and can easily move from one computer to another. In addition to virtual environments is the underlying operating system, which encompasses all of the virtual environment. It was she who hides the details of the hardware and manages the real resources of the computer.
The main objective is to provide a virtualization of resources strict separation of different virtual environments. This condition implies that the process running in a virtual environment, can not access to files, memory, and the processes belonging to other virtual environments. Necessary to ensure normal interaction processes within the virtual environment by restricting access to the elements outside.
All the virtual environment interaction with the outside world are made through the network. Local methods of interaction, such as sockets or other characteristic of Unix interprocess communication methods similar to channels that are opened between the different applications of virtual environments that are blocked. This is necessary both to comply with safety regulations and to ensure the portability of a virtual environment to another computer. In particular, the interaction over a network makes it possible to use the application to protect traditional network defenses such as firewalls, intrusion sensors, scanners, security and others. Moving the virtual environments from one computer to the other allows you to organize load balancing, moving the application where they are most needed, and simplify maintenance of the equipment.

No comments:
Post a Comment