SlideShare uma empresa Scribd logo
1 de 7
Java Virtual Machine
• JVM is not a real hardware machine but a software layer which resembles
an hardware platform.
• JVM converts Java byte code into machine language and executes it.
• The byte code can be executed on any platform where there exist JVM.
• JVM‘s are available for many hardware and software platforms.
• The use of the same byte code for all JVM’s on all platforms allows Java to
be described as a "write once, run anywhere" programming language.
• Thus, the JVM is a crucial component of the Java platform.
Diagram Of JVM
Java
Source
Code(.java)
Java
Object
Code(.class)
Java Compiler
(javac)
Computer
Operating System
Java Interpreter
Java Virtual Machine
Object Code is loaded into
Java Virtual Machine
Components Of JVM
Class Loader Execution Engine
Run-time data areas
Java Virtual Machine
.class file
Components Of JVM
1. Byte code verifier
2. Class loader
3. Execution engine
4. Garbage collector
5. Security Manager
1. Byte code Verifier:
• Byte code verifier is used to verify the byte code.
• Also checks for unusual code.
• So it is a crucial component for security.
2. Class loader:
• Class loader loads java classes into java virtual machine and creates
the instance of java.lang.class.
• The main feature is that JVM doesn’t need to have any knowledge
about the classes that will be loaded at runtime.
• It performs three main functions of JVM, namely: loading, linking
and initialization
3. Execution Engine:
• The execution engine helps JVM to convert bytecode into machine code.
• It has two parts:
a) Interpreter
b) Just-in-time-interpreter
• Execution engine is responsible for executing the instructions contained in
the methods of loaded classes.
4. Garbage Collector:
• Garbage collection is the process of automatically freeing objects that are
no longer referenced by the program.
• It periodically check for the object on heap , whose link is broken so it can
collect garbage from heap.
• Garbage collection relieves java programmer from memory management.
5. Security Manager:
• Security manager constantly monitors the code.
• It is a special java object that is responsible for guarding security policies
for java applications.
• It is always consulted before any potentially dangerous operation is
requested by a java application.

Mais conteúdo relacionado

Semelhante a JVM.pptx

Javanotes ww8
Javanotes ww8Javanotes ww8
Javanotes ww8
kumar467
 
JAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptxJAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptx
Murugesh33
 

Semelhante a JVM.pptx (20)

Java byte code presentation
Java byte code presentationJava byte code presentation
Java byte code presentation
 
intoduction to java
intoduction to javaintoduction to java
intoduction to java
 
A Brief study on JVM A Brief study on JVM
A Brief study on JVM A Brief study on JVMA Brief study on JVM A Brief study on JVM
A Brief study on JVM A Brief study on JVM
 
Javanotes ww8
Javanotes ww8Javanotes ww8
Javanotes ww8
 
Java notes
Java notesJava notes
Java notes
 
1 Module 1 Introduction.pptx
1 Module 1 Introduction.pptx1 Module 1 Introduction.pptx
1 Module 1 Introduction.pptx
 
Introduction to java
Introduction to java Introduction to java
Introduction to java
 
Java virtual machine
Java virtual machineJava virtual machine
Java virtual machine
 
basic core java up to operator
basic core java up to operatorbasic core java up to operator
basic core java up to operator
 
JVM Architecture – How It Works.pdf
JVM Architecture – How It Works.pdfJVM Architecture – How It Works.pdf
JVM Architecture – How It Works.pdf
 
Introduction to java by priti sajja
Introduction to java by priti sajjaIntroduction to java by priti sajja
Introduction to java by priti sajja
 
JVM
JVMJVM
JVM
 
Advanced java training in bangalore
Advanced java training in bangaloreAdvanced java training in bangalore
Advanced java training in bangalore
 
Advanced java-training-in-bangalore
Advanced java-training-in-bangaloreAdvanced java-training-in-bangalore
Advanced java-training-in-bangalore
 
Java byte code & virtual machine
Java byte code & virtual machineJava byte code & virtual machine
Java byte code & virtual machine
 
JAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptxJAVA_Day1_BasicIntroduction.pptx
JAVA_Day1_BasicIntroduction.pptx
 
JAVAPart1_BasicIntroduction.pptx
JAVAPart1_BasicIntroduction.pptxJAVAPart1_BasicIntroduction.pptx
JAVAPart1_BasicIntroduction.pptx
 
Java buzzwords
Java buzzwordsJava buzzwords
Java buzzwords
 
JAVA for Every one
JAVA for Every oneJAVA for Every one
JAVA for Every one
 
1 java introduction
1 java introduction1 java introduction
1 java introduction
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

JVM.pptx

  • 1. Java Virtual Machine • JVM is not a real hardware machine but a software layer which resembles an hardware platform. • JVM converts Java byte code into machine language and executes it. • The byte code can be executed on any platform where there exist JVM. • JVM‘s are available for many hardware and software platforms. • The use of the same byte code for all JVM’s on all platforms allows Java to be described as a "write once, run anywhere" programming language. • Thus, the JVM is a crucial component of the Java platform.
  • 2. Diagram Of JVM Java Source Code(.java) Java Object Code(.class) Java Compiler (javac) Computer Operating System Java Interpreter Java Virtual Machine Object Code is loaded into Java Virtual Machine
  • 3. Components Of JVM Class Loader Execution Engine Run-time data areas Java Virtual Machine .class file
  • 4. Components Of JVM 1. Byte code verifier 2. Class loader 3. Execution engine 4. Garbage collector 5. Security Manager
  • 5. 1. Byte code Verifier: • Byte code verifier is used to verify the byte code. • Also checks for unusual code. • So it is a crucial component for security. 2. Class loader: • Class loader loads java classes into java virtual machine and creates the instance of java.lang.class. • The main feature is that JVM doesn’t need to have any knowledge about the classes that will be loaded at runtime. • It performs three main functions of JVM, namely: loading, linking and initialization
  • 6. 3. Execution Engine: • The execution engine helps JVM to convert bytecode into machine code. • It has two parts: a) Interpreter b) Just-in-time-interpreter • Execution engine is responsible for executing the instructions contained in the methods of loaded classes. 4. Garbage Collector: • Garbage collection is the process of automatically freeing objects that are no longer referenced by the program. • It periodically check for the object on heap , whose link is broken so it can collect garbage from heap. • Garbage collection relieves java programmer from memory management.
  • 7. 5. Security Manager: • Security manager constantly monitors the code. • It is a special java object that is responsible for guarding security policies for java applications. • It is always consulted before any potentially dangerous operation is requested by a java application.