0% found this document useful (0 votes)
15 views5 pages

CC Exp 10

The document outlines Experiment 10 for the CSL605 Cloud Computing Lab, focusing on containerization using Docker. It includes objectives, outcomes, and instructions for differentiating between virtualization and containerization, along with a tabular comparison of Virtual Machines and Containers. The conclusion emphasizes the benefits of Docker in enhancing application deployment through lightweight and scalable environments.

Uploaded by

amishav2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

CC Exp 10

The document outlines Experiment 10 for the CSL605 Cloud Computing Lab, focusing on containerization using Docker. It includes objectives, outcomes, and instructions for differentiating between virtualization and containerization, along with a tabular comparison of Virtual Machines and Containers. The conclusion emphasizes the benefits of Docker in enhancing application deployment through lightweight and scalable environments.

Uploaded by

amishav2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 5

CSL605 Cloud Computing Lab Sem VI

Name : Amisha Verma


Roll No : 66
EXPERIMENT 10

Title To study and Implement Containerization using Docker

Pre requisite Virtualization concept

Mapping with CO CSL605.6

Objective To differentiate between virtualization and containerization with the help of


docker installation and configuration.

Outcome To install and configure docker in Linux machine for hosting a python web
app.

Instructions 1. Differences between Virtual Machine and Container should be


written in tabular format
2. Clear screenshots should be used and every screenshot should be
numbered and labelled.
Deliverables 1. Write the differences between Virtual Machine and Container
Virtual Machine
Feature Container
(VM)
Emulates a full phys- Lightweight, isolated pro-
Definition ical computer with its cess sharing the host OS
own OS. kernel.
Runs a full guest OS
Shares the host OS kernel
OS (can be different from
(must be same OS family).
host).
Perform- Higher overhead due Near-native performance
ance to full OS emulation. (lightweight).
Startup Fast (starts in seconds or
Slow (boots entire OS).
Time milliseconds).
Heavy (requires CPU,
Resource Light (shares host re-
RAM, and disk for each
Usage sources efficiently).
VM).
Strong (full hardware- Process-level isolation
Isolation
level isolation). (less secure than VM).
Running different OSes Running multiple apps on
Use Case (Windows on Linux, the same OS (mi-
etc.). croservices).
VMware, VirtualBox,
Examples Docker, Kubernetes, LXC.
Hyper-V.
Virtual Machine
Feature Container
(VM)
Image Large (GBs, includes Small (MBs, only app + de-
Size full OS). pendencies).
Highly portable (runs any-
Portabil- Less portable (OS-de-
where with the same ker-
ity pendent).
nel).
More secure (strong Less secure (shared kernel
Security
isolation). vulnerabilities).

2. Screenshots in step-wise fashion for following:


2.1 Installing Docker in Linux machine
2.2 Editing Docker file as per the python web app to be hosted
Running python app inside the container
Conclusion Containerization using Docker enhances application deployment by providing
a lightweight, portable, and scalable environment. It simplifies development,
ensures consistency across platforms, and improves resource efficiency.

References https://docs.docker.com/get-started/docker-overview/#:~:text=The%20Docker
%20platform,simultaneously%20on%20a%20given%20host.
https://www.geeksforgeeks.org/docker-tutorial/
https://en.wikipedia.org/wiki/Docker_(software)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy