Acronym for
Java Virtual Machine. An abstract computing machine, or virtual machine,
JVM is a platform-independent execution environment that converts Java
bytecode into machine language and executes it. Most programming
languages compile source code directly into machine code that is
designed to run on a specific microprocessor architecture or operating
system, such as Windows or UNIX. A JVM -- a machine within a machine --
mimics a real Java processor, enabling Java bytecode to be executed as
actions or operating system calls on any processor regardless of the
operating system.
For example,
establishing a socket connection from a workstation to a remote machine
involves an operating system call. Since different operating systems
handle sockets in different ways, the JVM translates the programming
code so that the two machines that may be on different platforms are
able to connect.
JVM consist of following components:-
1)Byte-code verifier :- It verify the byte-code ,it check's for unusual code.
2)Class Loader :- After verifying Class Loader will load the byte-code into the memory for execution.
3)Execution engine :-
It further consist of 2 parts :-
a)Interpreter :- It interpret the code & run.
b)JIT(Just-in-Time Interpreter)
JVM Hotspot defines when to use Interpreter or JIT.
4)Garbage Collector:- It periodically check for the object on heap , whose link is broken
So it can collect the garbage from Heap.
5) Security Manager :- It constantly monitors the code.It is 2nd level of security.[1st level is Byte-code verifier ].
JVM consist of following components:-
1)Byte-code verifier :- It verify the byte-code ,it check's for unusual code.
2)Class Loader :- After verifying Class Loader will load the byte-code into the memory for execution.
3)Execution engine :-
It further consist of 2 parts :-
a)Interpreter :- It interpret the code & run.
b)JIT(Just-in-Time Interpreter)
JVM Hotspot defines when to use Interpreter or JIT.
4)Garbage Collector:- It periodically check for the object on heap , whose link is broken
So it can collect the garbage from Heap.
5) Security Manager :- It constantly monitors the code.It is 2nd level of security.[1st level is Byte-code verifier ].
No comments:
Post a Comment