Virtual storage is mainly realized by relying on the computer's hard disk; a computer task only needs to be partially loaded into the main memory to start running, and the rest remains on the disk and loaded into the main memory when needed, which can improve the main memory. The utilization rate of memory space is such that the main memory capacity of the system will be much larger than the actual main memory capacity. Such memory is called virtual memory.
The operating environment of this tutorial: Windows 10 system, DELL G3 computer.
What computer device does virtual storage mainly rely on?
Virtual storage mainly relies on hard disk;
A computer task only needs to be partially loaded into the main memory It can be started and run, and the rest will be left on the disk and loaded into the main memory when needed, which can improve the utilization of the main memory space. In this way, the main memory capacity of the system will be much larger than the actual main memory capacity. Such memory is called virtual memory.
Virtual hard disk and virtual cache are mainly implemented by relying on memory and U disk. Virtual memory is necessary for the operation of the host; the virtual hard disk can be used to store temporary files such as TEMP folders and web pages, which will be automatically cleared when shutting down to avoid garbage accumulation; the virtual cache can avoid frequent writes to the hard disk. When downloading a large number of files such as videos, it can effectively protect the mechanical hard disk; for solid disks, the life span mainly depends on the amount of data written. Using virtual cache can only write the data that needs to be written to the solid disk into the cache, which can greatly reduce the need for hard drives. Disk write volume, so that there is no need to write at all.
Expand knowledge
1. Virtual storage on the server side
Server manufacturers will implement virtual storage on the server side. Likewise, software vendors will implement virtual storage on server platforms. The implementation of these virtual storage is to map the image to the peripheral storage device through the server side. In addition to allocating data, there is no control over the peripheral storage device. The server side generally implements virtual storage technology through logical volume management. Logical volume management provides a virtualization layer for mapping physical storage to logical volumes. The server only needs to deal with logical volumes and does not have to manage the physical parameters of the storage device.
Using this method to build a virtual storage system, the server side is a performance bottleneck, so it is rarely used in the field of multimedia processing.
2. Virtual storage on the storage subsystem side
Another place to implement virtualization is in the storage device itself. This kind of virtual storage is generally implemented by the storage manufacturer, but it is likely to use the manufacturer's exclusive storage product. To avoid such incompatibilities, vendors may work with server, software or network vendors. When virtual storage is implemented on the device side, the logical (virtual) environment and the physical device are under the same control. The benefit of this is that virtual disks use disk capacity highly efficiently, and virtual tapes use tape media highly efficiently.
The virtual storage device on the storage subsystem side is mainly connected to the server through a large-scale RAID subsystem and multiple I/O channels. The intelligent controller provides LUN access control, caching and other functions such as data replication, etc. management functions. The advantage of this approach is that the storage device administrator has complete control over the device, and by being separated from the server system, the management of the storage can be isolated from multiple server operating systems, and hardware parameters can be easily adjusted.
3. Implementing virtual storage on the network device side
Network manufacturers will implement virtual storage on the network device side and map the logical image to the peripheral storage device through the network. In addition to allocating data, there is no control over the peripheral storage device. It is reasonable to implement virtual storage on the network side, because its implementation is neither on the server side nor on the storage device side, but between the two environments. It may be the most "open" virtual implementation environment and the most It is possible to support any server, operating system, application and storage device. Technically speaking, there are two structural forms of virtual storage implemented on the network side: symmetric and asymmetric virtual storage.
Judging from the actual situation of current virtual storage technologies and products, host-based and storage-based methods are most attractive to early adopters because they do not require any additional hardware, but for heterogeneous storage In terms of system and operating system, the system does not run very well. The method based on interconnected devices is between the two. It avoids some security issues, has stronger storage virtualization functions, can reduce the load of a single host, and can achieve good scalability.
No matter what kind of virtual storage technology is used, its purpose is to provide a high-performance, safe, stable, reliable and scalable storage network platform to meet the demanding requirements of program production network systems. According to the comprehensive performance-price ratio, under normal circumstances, when host-based and storage device-based virtual storage technologies can ensure the data processing capability requirements of the system, priority is given, because these two virtual storage technologies are convenient to construct, simple to manage, and It is easy to maintain, the product is relatively mature, and the performance-price ratio is high. When pure virtual storage technology based on storage devices cannot guarantee the performance requirements of the storage system, we can consider using virtual storage technology based on interconnection devices.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What computer components does virtual storage mainly rely on?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

WebStorm Mac version
Useful JavaScript development tools

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version
Recommended: Win version, supports code prompts!
