CFP last date
20 December 2024
Reseach Article

A Technical Cost Effective Network-Domain Hosting through Virtualization: a VMware ESXi and vSphere Client Approach

by Nomnga, P., Scott, M. S., Nyambi, B. P
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 10
Year of Publication: 2014
Authors: Nomnga, P., Scott, M. S., Nyambi, B. P
10.5120/15920-5177

Nomnga, P., Scott, M. S., Nyambi, B. P . A Technical Cost Effective Network-Domain Hosting through Virtualization: a VMware ESXi and vSphere Client Approach. International Journal of Computer Applications. 91, 10 ( April 2014), 39-47. DOI=10.5120/15920-5177

@article{ 10.5120/15920-5177,
author = { Nomnga, P., Scott, M. S., Nyambi, B. P },
title = { A Technical Cost Effective Network-Domain Hosting through Virtualization: a VMware ESXi and vSphere Client Approach },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 10 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 39-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number10/15920-5177/ },
doi = { 10.5120/15920-5177 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:24.948289+05:30
%A Nomnga
%A P.
%A Scott
%A M. S.
%A Nyambi
%A B. P
%T A Technical Cost Effective Network-Domain Hosting through Virtualization: a VMware ESXi and vSphere Client Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 10
%P 39-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's fast advancing technology, virtualization has presented the possibility of consolidating unused/underutilized resources into one physical component. This comes with benefits such as saving costs, hardware independence and improving security by isolation; it is no wonder virtualization is gradually being implemented in every aspect of the technology world. A virtualized system is able to run several separate Operating Systems (OSs) in parallel and in one Central Processing Unit (CPU) without the need to reboot. Unlike in a dual boot system, where only a single OS can run at a time requiring rebooting in order to switch to the other OS. Server virtualization is a term used to describe the abstraction of a physical server resource i. e. server consolidation. The VMware integrated Elastic Sky X (ESXi) is a bare metal hypervisor which provides the illusion of a real hardware to the guest (OS). This in turn simplifies underlying hardware by abstraction and therefore promoting better utilization of needed resources. Prior virtualization, server sprawl never presented itself to organizations as a shock, an event where one physical server performs only one function such as printer server, email server to mention but just a few which required a lot of money to maintain in the form of cooling devices and space. This study focuses on server virtualization using the cost effective VMware ESXi and its manager, vSphere client to host a network domain, a case of the Department of Computer Science (CSC), University of Fort Hare. The rationale behind this research project was to consolidate all physical servers into one physical machine without immense consumption of hard disk space since resources are only allocated when needed in a virtualized environment.

References
  1. Luo Y. ,( 2010). Network I/O for virtualization in cloud computing for plastics. IT professional 12, 536-541.
  2. Sportack, M. A. (1998). Networking Essentials. Indianapolis, IN: Sams Publishing.
  3. Hammersley, E. (2007). Professional VMware Server. Indianapolis, Indiana: Wiley Publishing, Inc.
  4. Desai A. , (2007). Weblog. Available online: http://wordaligned. org/articles/virtualization. Tell me about virtualization.
  5. Wells P. M. , (2008). Adapting to Dynamic Heterogeneity: Virtualization for the Multicore Era. Thesis (PhD). University of Wisconsin- Madison.
  6. Adams K. , Agesen O. , (2006). A comparison of software and hardware techniques for x86 virtualization. Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems. San Jose, CA, pp. 21–25.
  7. VMware (2010). "Configuration Maximums VMware Vsphere 5". Available online: http://www. vmware. com/products/vsphere/esxi-and-esx/index. html. Accessed on: 12 May 2012.
  8. Hoopes J. , (2008). Virtualization for Security including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis and Honey potting. "An Introduction to Virtualization. Ch. 1 p. 2. Syngress.
  9. Goodchild, J. (2006). Virtualization software or blade servers: Which is right for server consolidation? Server Virtualization News, June 09. Available online: http://www. searchservervirtualization. com.
  10. Definition of Domain. Webopedia. Available at: http://en. wikipedia. org/wiki/Windows_domain.
  11. Voughan-Nichols S. J. , (2008). "Virtualization Sparks Security Concerns". Technology News. Computer, vol. 41, no. 8, pp. 13–15.
  12. Steinder, Malgorzata, et al. "Server virtualization in autonomic management of heterogeneous workloads. " Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International Symposium on. IEEE, 2007.
  13. Chen W. , Chan J. , Mueller O. , Singh M. , Väättänen T. , (2009). DB2 Virtualization. What is Virtualization. IBM Redbooks. ISBN-13: 978-0-7384-3343-1.
  14. Mouton J. , Marais H. C. , (1988). Basic concepts in the Methodology of the Social Sciences. Pretoria: HSRC.
  15. Davis D. , (2010). Understanding the VMware ESXi Direct Console User Interface (DCUI). What You Need to Know About Direct Console User Interface (DCUI) And How To Configure It. Available online: http:/www. virtualizationadmin. com/articles-tutorials/understanding-the-vmware-esxi-direct-console-user-interface-dcui. html.
  16. Gold, S. , (2007). Time to face virtualized realities, Infosecurity. pp. 35-38.
  17. Scheffy C. , (2007). Virtualization for Dummies: AMD Special Edition. Understanding Three Approaches to Virtualization, CH3. Wiley Publishing, Inc. Indiana.
  18. Strickland J. "How Server Virtualization Works". How staff works. Weblog. Available online: http://computer. howstuffworks. com/server-virtualization4. htm.
  19. Rist, O. , (2010). Windows 2000 end-of-support solution center. Available online: http://blogs. technet. com/b/windowsserver/archive/2010/01/14/windows-2000-server-approaching-end-of-life. aspx
  20. Peters S. Virtualization: Security enabler or security threat? Has anyone stopped to ask?. Computer Security alert. Computer Security Institute, Califonia. Available online: http://www. firenetltd. it/materiale/SampleVirtualizationCSIALERT. pdf.
  21. Khasnabish B. , Lui B. , Wang F. , (2012). Requirements for Mobility and Interconnection of Virtual Machine and Virtual Network Elements. Network Working Group. Internet-Draft. Available online: http://rsync. tools. ietf. org/html/draft-khasnabish-vmmi-problems-01.
  22. Silwa, C. (2008,). Marriott Goes Underground With Disaster Recovery, Virtualization Effort. Retrieved from: http://www. cio. com/article/433665/Marriott_Goes_Underground_With_Disaster_Recovery_Virtualization_Effort.
  23. Kroeker K. L. , (2009). Communication of the ACM. The Evolution of Virtualization. Vol. 52. DOI:10. 1145/1467247. 1467253.
  24. Yunis M. M. , Hughes J. , Roge J. , (2008). Issues in Information Systems. Real Security in Virtual Systems: A Proposed Model For A Comprehensive Approach To Securing Virtualized Environments. VOL IX, No. 2.
  25. Bratus S. , Locasto M. , Ramaswamy A. , Smith S. , (2008). "Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security," in VMSec '08: Proceedings of the 1st ACM workshop on Virtual machine security. New York, NY, USA: ACM, 2008, pp. 49–58.
  26. Carroll, M. , Kotze, P. & Van Der Merwe, A. (2010). GOING VIRTUAL - Popular Trend or Real Prospect for Enterprise information
  27. VMware (2012). Virtual Machine File System (VMFS). VMware vSphere Features Overview. Available online: http://www. vmware. com/products/datacenters/virtualization/vsphere/vmfs. html. Accessed: 12 September 2012.
  28. VMware. "Meet the Next Generation of Virtual Infrastructure Technology". Available online: http://www. vmware. com/products/vsphere/esxi-and-esx/index. html. Accessed on: 02 June 2012.
  29. VMware (2011). Technical White Paper. Vmware Esxi 5. 0 Operations Guide. California. Available online: http://www. vmware. com/files/pdf/techpaper/vSphere-5-ESXi-Operations-Guide. pdf. Accessesed: 11 May 2012.
  30. Davis D. , (2011). Transition to VMware ESXi. Weblog. Available at: http://www. virtualizationadmin. com/articles-tutorials/vmware-esx-and-vsphere-articles/general/transition-vmware-esxi. html
  31. Babbie E. , Mouton J. , (2001). The Practice of Social Research. Oxford, South Africa.
  32. Simic, B. cloud and virtualization management. Weblog. Available online: http://apmdigest. com/managing-the-performance-of-virtual-desktops-begins-and-ends-with-the-end-user.
  33. Scarfone, K. , Jansen, W. , & Tracy, M. , (2008). Guide to General Server Security. Recommendations of the National Institute of Standards and Technology. Available online: http://csrc. nist. gov/publications/nistpubs/800-123/SP800-123. pdf.
  34. Donalson G. , (2009). What is the point of creating a computer object in Active Directory when you still have to join the PC? Server faults, Weblog. Available online: http://serverfault. com/questions/41224/what-is-the-point-of-creating-a-computer-object-in-active-directory-when-you-sti. Accessed: 25 September 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cost-effective Virtualization VMware ESXi vSphere-Client and Hypervisor.