Upload
trinhnhu
View
217
Download
3
Embed Size (px)
Citation preview
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 19
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
Abstract— Intense advancement of cloud computing during
the last years, convinced the experts to consider it as a proper and
favorable substitution for traditional computing methods.
Nowadays, many companies have moved their IT physical
architecture to cloud computing platform for ease in managing
and provisioning of different resources. In this paper a Cloud
Computing environment is created using a product suite of
VMware vSphere, which is based on two main parts: VMware
ESXi hypervisor for virtualization technology and both VMware
vSphere Client and Virtual Center (vCenter) for environment
management. The aim is to provide efficient solution for designing
and implementing an architecture of cloud computing.
Index Term— cloud computing, virtualization, hypervisor,
VMware vSphere.
I. INTRODUCTION
CLOUD computing is a modern technology that utilizes the
internet and central remote physical servers to use applications
and maintains data [1].
The exact definition of cloud computing that encompasses
all key aspects of cloud has been defined by NIST: “Cloud
computing is a model for enabling convenient, on-demand
network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with
minimal management effort or service provider
interaction.”[2].
Cloud computing allows users and enterprise to store and
use data, resources and applications without installation and
access their own files from any device that has network access
[1]. It minimizes the number of organization’s servers and
improves the exploitation of computing resources as it is based
on virtualization technology. Thus, 80% of resources
utilization can be reach up compared to 10-15% in traditional
IT through sharing the resources among multiple users.
Consequently, the cost of purchasing, maintaining the
resources, and managing servers and applications are reduced
significantly [3]. Other main services that are delivered to the
user are storage, processing, networking, and management
with easy setup and a rapid provision and release of computing
resources [4]. Therefore, users can access and use this system
with full scalability, high performance, consistency, and
relatively minimal expenditure solution compared to the
Zaid Sh. Bakr is currently pursuing master’s degree program in network
engineering at Al-Nahrain University, Iraq, E-mail:
M.F. Al-Gailani is a PhD Computer Engineer from Newcastle University,
UK, E-mail: [email protected].
devoted architecture [1].
In addition, the system increases the revenues of
organization by hosting user’s data. Noting that it can be used
either for a specific organization as a private cloud, or for
general users as a public cloud.
In general, the architecture of cloud computting consists of
four layers as shown in Fig. 1. These layers are categorized
according to the user access to the cloud environment. Cloud
Architecture describes the working mechanism, model
functions, and gives hierarchal view of cloud computing
technology. These layers are: [5]
1) Layer 1 (User/Client Layer): This is the front end and
lowest layer in the architecture. In this layer user/client
can establish a connection to the cloud environment from
any device through the web application.
2) Layer 2 (Network Layer): This layer permits the users to
start a connection to the cloud. The entire cloud
infrastructure is based on this layer where all services are
provided to the users through this layers. In the state of
public cloud this layer essentially is the internet, while in a
private cloud it may be provisioned by a LAN.
3) Layer 3 (Cloud Management Layer): This layer
constitutes collection of softwares that are used to
establish the cloud and manage the underlying resources.
In other words, these softwares can behave in two sides,
one as an interface between the underlying physical
resources and the user via network, and the other as a
resource management.
4) Layer 4 (Hardware Resource Layer): It represents the
back end that constitutes of providing the actual physical
resources. In public cloud, data center and hardware
resources are utilized in the back end side. While in a
private cloud, data center and hardware resources are
presented in a specific place or special configuration
system.
This layering architecture is firm, and for any application in
the cloud environment, it should be followed. However, there
is a small baggy isolation between the third and fourth layers
based on the model the cloud is published.
One of the prime functionalities of cloud computing is the
abstraction of the physical hardware implementation by hiding
the technical details from user. This feature is achieved by
virtualization technology [3].
Virtualization plays a substantial role in cloud computing, it
permits suitable level of isolation, security, customization and
manageability which are essential for on-demand services.
Virtualization technologies are mainly utilized to provide a
Establishing and Managing Cloud Computing
using VMware vSphere
Zaid Sh. Bakr and M.F. Al-Gailani
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 20
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
configurable cloud computing environment, in addition to
storage, and network [6].
Fig. 1. Cloud Architecture
Virtualization is an elementary mechanism for delivering
services. Without virtualization, cloud computing management
could be very difficult to achieve [7]. Cloud computing works
on a virtualized environment which is enabled by the
virtualization technologies. Cloud employs virtualization for
better exploitation of hardware resources [5].
The key operator for enabling virtualization in a cloud
environment is a hypervisor. Type-1 hypervisors (dubbed
native or bare metal hypervisor) are utilized in servers which
deal with intense load and need high level of security. This
type provides better efficiency than Type-2 hypervisors
(dubbed hosted or embedded hypervisor). While the main con
of Type-2 is whether the host OS defeats or crashes, which
leads VMs to crash. Thus, Type-2 is used only on user or
client systems in which efficiency is less important [5].
VMware provides a type-1 hypervisor called vSphere.
VMware vSphere is vastly used within companies to offer a
virtualized infrastructure [8]. VMware vSphere technology is
based on the notion of full virtualization, in which the
underlying physical hardware is simulated and provisioned to
the guest OS. Thus the guest OS can operate unaware of this
abstraction layers [6].
VMware vSphere is based on two main parts: VMware
ESXi server that represents a hypervisor which implements a
virtualization and permits many guest OS to make a single
physical hardware host shared among them, and VMware
vCenter server that represents the centralized management and
administration of the virtualized infrastructure [6].
There are problems in transferring service rapidly from
physical host to another, restarting the service, and failure to
update data in real time. To solve these problems, a hypervisor
such as VMware ESXi server is adopted because the VMware
vSphere offers a highest performance in comparison to other
virtualization technology [9].
VMware ESXi is a type-1 VMM, likes Xen but it operates
without based on the OS, thus providing enhanced security,
amplified reliability, and facilitated management. This is due
to its consolidate architecture which is designed to incorporate
directly into the host, as well as an ease and quick achieved for
deployment, installation, and configuration. In general,
VMware ESXi is a trust solution for cloud infrastructure [2].
The overall performance, which is provided by ESXi from
the factors of VM performance, memory management, high
availability, live migration, networking, storage, security, and
management features, is better than Xen and KVM hypervisors
[10].
II. RELATED WORK
Milos Pavlik et al., 2012 [11]: proposed a solution to
reduce the server outage by implementing Supervisory Control
and Data Acquisition/Human Machine Interface
(SCADA/HMI) systems over virtual infrastructure. The virtual
infrastructure achieved by VMware vSphere 5.0 platform that
required installation of ESXi, vCenter, High Availability
cluster and other requirements, which offers reliable, stabile,
and secure architecture to the accomplished systems.
Imran Ijaz et al., 2014 [12]: presented an idea to secure the
Cloud storage. The infrastructure of Cloud Computing that
used to provide storage and share data in an efficient way
among users in VM form, achieved by using VMware ESXi
Type-1 Hypervisor.
P. Nomnga et al., 2014 [13]: focused on Server
virtualization that implemented using VMware ESXi as a
hypervisor and vSphere client as a management node which
lead to host a domain. Also, consolidated the physical servers
of Computer Science Department \ Fort Hare University into
one physical server and provisioned virtual resources on
demand.
Ahmed and Prof. Dr. Ghassan, 2015 [14]: proposed a
Hospital Management Information System (HMIS) that was
built over a proposed Private Cloud model. Private Cloud
designed and implemented using two hosts and VMware ESXi
hypervisor. User can use HMIS in VM (IaaS) form via
vSphere client or vSphere web client.
III. CLOUD COMPUTING STRUCTURE
Cloud structure is not the same as cloud architecture. Cloud
architecture appears as a hierarchical structural that defines
and explains the technology which is based on it. Thus, cloud
structure is a portion of cloud architecture. Fig. 2 illustrates
the standard structure that represents the base for the cloud.
Cloud structure consists of five basic components [5]:
1) Application: This is the upper layer and over which any
applications are implemented via user or client.
2) Platform: This component is in charge of the execution of
the application.
3) Infrastructure: This layer comprises of resources that
make the other components operate. This offers
computational ability to the client.
4) Virtualization: It is the technique of creating logical
components of resources from the offered physical
resources to build the infrastructure. The logical
components can be isolated and independent.
5) Physical hardware: This is the underlying physical
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 21
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
resources that are provided by the server and storage
units.
Generally, to implement infrastructure, type-1 hypervisor
such as VMware ESXi server is chosen instead of type-2
hypervisor such as KVM, because type-1 can directly access to
the underlying physical hardwares such as server, storage, and
datacenter in order to provide virtual resources in form of
VMs, which are abstracted from the underlying physical
resources [5].
Fig. 2. Cloud Structure
IV. VIRTUALIZATION AND HYPERVISORS
Virtualization moves thinking from physical to logical, it
enhances IT physical resource consumption through
addressing organization’s hardware resources as pools from
which virtual hardware can be allocated and released.
Virtualization can consolidate physical resources like storage,
network, and processor into a virtualized environment. System
virtualization can produce many virtual machines stand on a
single physical hardware system. Virtual systems are
autonomous running environments that make use of virtual
resources. The benefits of virtualization are [15]:
• Consolidation scenario to reduce the cost of physical
hardware.
• Load Balancing to optimize the workloads.
• IT elasticity and responsiveness.
The virtualized environment consists of three main
components as illustrated in Fig. 3: [6]
• Guest (dubbed virtual machine (VM), virtual guest, and
guest system): represents the system (with a group of files,
storage, memory, operating system and configurable
components) that acts directly with the virtualization layer
instead of the Host
• Host: represents physical hardware that abstracts by the
virtualization layer.
• Virtualization layer (dubbed virtual machine monitor
(VMM) or Hypervisor): is in charge of creating the virtual
physical resources through software program to enable the
Guest to operate.
Two fundamental approaches of hardware virtualization as
illustrated in Fig. 4 [16]:
• Full virtualization: each VM operates on an accurate copy
of the actual physical hardware. This approach needs a
virtualizable architecture, thus the physical hardware is fully
offered to the guest OS by Hypervisor, which works
unchanged, and guarantees an efficient direct execution
process.
Fig. 3. Reference Model of Virtualization
• Paravirtualization, each VM operates on a partially
changed copy of the actual physical hardware. The purpose of
this changed is (i) some features of the hardware are not
possible to be virtualized; (ii) to enhance performance; and
(iii) to provide the simplest of interface.
System virtualization is universally achieved by hypervisor
technology; where hypervisors are firmware components
capable of virtualize hardware resources [15].
Diverse hypervisors need a set of software components to be
installed on the host server to present virtualization. Moreover,
different hypervisors at the same time afford different
functionalities for VM operating systems. Hypervisors are
generally classified into two types: [8]
Fig. 4. (a) Full virtualization. (b) Paravirtualization
Type-1 hypervisors commonly stand directly above the
barebones physical resource. Type-1 hypervisors behave as
operating systems (OS). This lets them to produce more
efficient consume of hardware system resources. Thus, cloud
environments are widely built using Type-1 hypervisors.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 22
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
Type-2 hypervisors commonly stand above operating
system. The operating system takes control access to the
underlying physical resources. The hypervisor behaves as a
control firmware between the host OS and the guest OS.
Type-1 (such as VMware ESXi and Xen) and Type-2 such
as KVM are illustrated in Fig. 5[17].
Fig. 5. Hypervisor types
V. COMPONENTS TO BUILD CLOUD
INFRASTRUCTURE
Three main components are utilized to establish and manage
a Cloud Computing. These components are VMware ESXi,
VMware vCenter, and VMware vSphere client/web client,
which are combined in VMware vSphere as illustrated in Fig.
6.
Fig. 6. VMware vSphere Components Functionality
A. VMware ESXi
VMware ESXi is a Virtual Machine Monitor (VMM) or
Type-1 Hypervisor that is constructed directly upon physical
hardware (Host). It offers the underlying physical hardware
and permits various virtual machines to utilize the same
resources [18].
B. VMware vCenter
vCenter Server is a controlling and managing software that
offers; ESXi host management, VM deployment and
management, tasks scheduling, managing for logging, alarms,
statistics, and events. [19]
VMware vCenter consists of four major components [17]:
1) Single sign-on: Called also SSO, manages the identity of
administrators and applications that work together with
the vSphere middleware.
2) vSphere web client: Offers web-based Interface for users
and administrators, which interacts with the vCenter and
objects that managed by it. From Figure 6, administrator
uses vSphere web client to access the hosts via the
vCenter server, where access cannot be done directly.
3) vCenter inventory service: This component caches the
managed objects for the vCenter when accessed through
the web client to enhance performance and reduces
searches for vCenter database.
4) vCenter server: This is the heart service of vCenter, which
is needed by the three other components. From Fig. 6,
administrator that access vCenter server via either
vSphere client or vSphere web client, can manage
multiple hosts at the same time in conflict to vSphere
client that manage only one host at a time.
Fig. 7 sounds the steps that occur once a user logs onto the
cloud using the vSphere Web Client [19]:
1) The vSphere Web Client offers a secure web page
interface to the user to log via web browser.
2) The username and password which are previously created
in AD server are sent to the SSO server as a SAML 2.0
token.
3) The SSO server sends a request to the Domain AD server
for authentication mechanism.
4) If authentication succeeds, SSO passes a SAML 2.0 token
to the vSphere Web Client.
5) This token is used to authenticate directly with the
vCenter.
Fig. 7. Authentication scenario
C. VMware vSphere Client
vSphere Client, nowadays frequently denoted as the legacy
client or C#, is a primary management software tool as a
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 23
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
window form (i.e. windows-based application) used to connect
directly and manage ESXi host with its local default account.
It does not need to access vCenter, so this is more convenient
once first time configuring host. Noting that host
troubleshooting, or problems are found in vCenter. However,
with windows-based vSphere Client, Single Sign On
authentication cannot be used. [20]
The vSphere Client offers a wealthy graphical user interface
(GUI) and can connect to vCenter Server through the
authentication of windows user. So, this leads to full
management capabilities such as vMotion that available only
with vCenter server. [19]
VI. METHOD AND PROCEDURE
A. Installing and Configuring VMware ESXi Interactively
--First, the minimum hardware requirements to install ESXi
server are: CPU; two cores, 64-bit, LAHF and SAHF
instructions, BIOS; NX/XD bit enabled, RAM; 4GB, NIC; one
Giga-bit, Boot Device; 1GB
--Second, installing ESXi via Interactive Mode
--Third, configuring ESXi via Interactive Mode
From Set Static IP address in ESXi host, the IPv4 address
and Default Gateway are set as shown in Fig. 8, then the
network configuration is tested and ensured, and the result is
appeared as shown in Fig. 9 and Fig. 10.
Fig. 8 IP Configuration
Fig. 9 Testing: Ping Menu
Fig. 10. Test Management Network
B. Installing and Configuring VMware vCenter.
vCenter Server is a software package that operates as a
central management node for the ESXi hosts and their own
VMs. The VMware vCenter with its four main components are
illustrated in Fig. 11.
Fig. 11. VMware vCenter Server (simple Install)
--First, the essential requirements for installing vCenter
server are:
Hardware; CPU: two cores 2GH, 64-bit, RAM: 4GB, Hard
Disk: 100GB, and 40GB–60GB free after install, NIC: one
Gigabit.
Software; OS: Microsoft Windows Server 2008 r2 64-bit,
Database (DB) Server (such as oracle 10g R2, 11g R1 or 11g
R2, Microsoft SQL Server 2005, 2008, 2008 Express or 2008
R2), Microsoft .NET 3.5 and later, and Microsoft .NET
Framework 3.5 Language Pack.
Server provides Active Directory (AD) and Domain Name
System (DNS).
--Second, Installing and configuring AD and DNS
After AD Domain Services are installed, a new Domain
Controller (DC) is created as shown in Fig. 12.
Fig. 12. Domain Name
--Third, installing vCenter server components one by one as
shown above via Interactive Mode.
VMware vCenter 5.5 is installed after making vCenter
server a member of "sec-cloud.com" as shown in Fig. 13 and
Fig. 14.
Fig. 13. Domain Menu
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 24
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
Fig. 14. Prerequisites Check
During the installation, SSO authentication information is
set (password: Zaid@2015 for administrator account
([email protected]) as shown in Fig. 15, and
installed as shown Fig. 16.
Fig. 15. vCenter SSO Information
Fig. 16. Configure SSO Authentication
C. Installing vSphere client Interactively
vSphere client windows application is installed as shown in
Fig. 17 to make both users able to access and use their VM,
and administrator to manage and monitor cloud infrastructure.
Fig. 17. VMware vSphere Client
D. Network configuration
The network that represents the cloud is configured as
shown in Figure 18, and the specifications of each component
are described in Table I. Windows firewall must be turned off
to allow connection occurs among them, this achieves through:
Control Panel→ System and Security→ Windows Firewall→
Turn Windows Firewall on or off.
TABLE I
CLOUD COMPONENTS SPECIFICATION
Server name
Host1 Host2 vCenter AD
OS ESXI 5.5 ESXI 5.5 Windows
server 2008 R2
Windows server 2008
R2
CPU Intel Core
i7 Intel Core
i3 Intel Core
i5 Intel Core
i3
Storage 500G 500G 500G 100G
RAM 6G 6G 8G 4G
NIC Intel
Gigabit Atheros PCIe FE
Realtek PCIe FE
Realtek PCIe FE
IP address
192.168.1.102
192.168.1.103
192.168.1.101
192.168.1.100
Gateway 192.168.1.1 192.168.1.1 192.168.1.1 192.168.1.1
DNS 192.168.1.1
00 192.168.1.1
00 192.168.1.1
00 127.0.0.1
Controller Node
vCenter Server
192.168.1.101
AD & DNS server
sec-cloud.com
192.168.1.100
Cisco SW
Host2
ESXi server
192.168.1.103
Host1
ESXi Server
192.168.1.102
MikroTik
Router
VM- user1
VM-user2
VM-user3
eth2
192.168.1.1eth4
192.168.2.1
client
Admin / user
vSphere Client
Fig. 18. Network Configuration
E. Managing the Cloud
Creating Virtual Infrastructure
Administrator either opens VMware vSphere client as
shown in Fig. 19 and enters the IP address: 192.168.1.101,
User name: [email protected], password:
Zaid@2015, or opens VMware vSphere Web client through
https:// 192.168.1.101: 9443/vsphere-client/, as shown in Fig.
20 and enters the User name: [email protected],
password: Zaid@2015. After that Datacenter is created as
shown in Fig. 21, Host1 and Host2 are added as shown in Fig.
22, and VM (IaaS) with its specification and OS are applied as
shown in Fig. 23.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 25
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
Fig. 19. VMware vSphere client Administrator Log in
Fig. 20 VMware vSphere Web client Administrator Log in
Fig. 21. Create Datacenter
Fig. 22. Add Host Wizard
Fig. 23. Crate VM
Adding the users to cloud via AD server
To satisfy the SSO authentication, users’ accounts are
created in AD server as shown in Fig. 24.
Fig. 24. User logon info Menu
Assigning the permissions for users via vCenter server
To achieve authorization, administrator selects user from
Domain (SEC-CLOUD) as shown in Fig. 25, and chooses the
role and privileges that specify the permission as shown in Fig.
26. As a result, permission is appeared as shown in Fig. 27.
Fig. 25. Domain and Users Menu
Fig. 26. Assigned Role Menu
Fig. 27. Permissions Window
User logging in the Cloud
User accesses cloud either via vSphere client as shown in
Fig. 28, or vSphere Web client as shown in Fig. 29. As a
result, user can use VM as shown in Fig. 30.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 26
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
Fig. 28. VMware vSphere client User Login
Fig. 29. VMware vSphere Web Client User Login
Fig. 30. User Window
VII. DISCUSSION
Cloud is designed and implemented using many types of
technologies that vary in the required components and the way
of configuring, implementing, and secure infrastructure.
VMware vSphere optimizes, monitors and manages IT
environments from VMs to the data center. The task of
designing and implementing of vSphere components are
daunting. However, establishing and managing virtual
infrastructure such as datacenter and VM are easier.
VMware vSphere 5.5 components such as vCenter and
ESXi need high resources to manage VMs efficiently. In
addition, when the number of running VMs are increased, the
resources (such as RAM and CPU) of vCenter and ESXi are
increased as well. In addition, different types of security built
in vSphere are configured such as SSO authentication using
AD to avoid insecure APIs and Cloud Abuse, and
authorization to assign roles and isolate cloud users.
VIII. CONCLUSION
This paper discusses and presents the cloud architecture,
cloud structure, and the notion of both hypervisor and
virtualization technology and their roles to build cloud
computing environment.
In addition, the research provides an efficient solution for
designing and implementing an architecture of cloud
computing environment in detail using VMware vSphere tools,
with its main parts: VMware ESXi hypervisor and VMware
vSphere Client with vCenter.
The VMware vSphere provides; enhanced security,
amplified reliability, facilitated management, and high
performance framework, as well as an on-demand utilization
of VMs (i.e. IaaS) to decrease the cost of having or renting
computers and servers. It is also used to supply storage,
networks, processing, and other computing resources. This is
due to its consolidate architecture which is designed to
incorporate directly into host, in addition to its ease and quick
achieved for deployment, installation, and configuration.
Accordingly, VMware vSphere can be considered as an
appropriate and a trust solution for establishing and managing
Cloud Computing.
IX. REFERENCES
[1] Apurva Shitoot, Sanjay Sahu, and Rahul Chawda1, "Security Aspects
in Cloud Computing," International Journal of Engineering Trends
and Technology (IJETT), vol. 6, no. 3, pp. 118-120, 2013.
[2] Reza Bakhshayeshi, Mohammad Kazem, and Morteza Sargolzaei,
"Performance Analysis of Virtualized Environments using HPC
Challenge Benchmark Suite and Analytic Hierarchy Process," in
Intelligent Systems (ICIS), IEEE Iranian Conference on, Bam, 2014.
[3] Chaowei Yang, and Qunying Huang Spatial Cloud Computing, A
Practical Approach, Boca Raton: CRC Press, pp. 36-39, 2014.
[4] Zeeshan Javaid and Imran Ijaz, "Secure User Authentication in Cloud
Computing," in Performance Computing and Communications
Conference (IPCCC), IEEE 32nd International, San Diego, CA, 2013
[5] K. Chandrasekaran, Essentials of Coud Computing, Boca Raton: CRC
Press, pp. 28-31, 2015.
[6] Rajkumar Buyya, Christian Vecchiola, and S. Thamarai, Mastering
Cloud Computing, Foundations and Applications Programming,
Waltham: Elsevier Inc, pp. 71-77, 2013.
[7] Judith Hurwitz, and et. al, Cloud Computing For Dummies, Indiana:
Wiley Publishing Inc, pp. 197-199, 2010.
[8] Derrick Rountree, and Ileana Castrillo, The Basics of Cloud
Computing, Understanding the Fundamentals of Cloud Computing in
Theory and Practice, Waltham: Elsevier Inc, pp. 28-29, 2014.
[9] Bao Rong Chang, and et. al, "Assessment of Hypervisor and Shared
Storage for Cloud Computing Server," in Innovations in Bio-Inspired
Computing and Applications (IBICA), IEEE Third International
Conference, Kaohsiung, pp. 67-72, 2012.
[10] Varsha Aiyappa, Smita S., and Shivagupta Chandakavathe,
"Hypervisor Module for Cloud Computing Server," in International
Journal of Innovative Technology and Research (IJITR), Karnataka,
pp. 104-107, 2015.
[11] Milos Pavlik, and et. al, "Supervisory control and data acquisition
systems in virtual architecture built via VMware vSphere platform," in
WSEAS Press, Kos Island, pp. 389-393, 2012.
[12] Imran Ijaz, and et. al, "A Framework for Data Storage Cloud to Provide
Security," International Journal of Emerging Trends in Science and
Technology (IJETST), vol. 1, no. 6, pp. 932-938, 2014.
[13] P. Nomnga, M. S. Scott, and P. B. Nyambi "A Technical Cost Effective
Network-Domain Hosting through Virtualization: a VMware ESXi and
vSphere Client Approach," International Journal of Computer
Applications, vol. 91, no. 10, pp. 39-47, 2014.
[14] Ahmed F, and Prof. Ghassan H., "Design and Implementation of E-
health over Private Cloud Computing," International Journal of
Enhanced Research in Science Technology & Engineering, vol. 4, no.
1, pp. 119-129, 2015.
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 27
160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S
[15] DeCusatis, Handbook of Fiber Optic Data Communication, A
Practical Guide to Optical Networking, Waltham: Elsevier Inc., pp.
387-389, 2014.
[16] Dan C. Marinescu, Cloud Computing Theory and Practice, Waltham,:
Elsevier Inc., pp. 140-142, 2013.
[17] Christoph Fehling, and et. al, Cloud Computing Patterns,
Fundamentals to Design, Build, and Manage Cloud Applications,
New York: Springer, pp. 101-102, 2014.
[18] Mohammed Raffic, and Aravind Sivaraman, VMware ESXi Cookbook,
Birmingham: Packt Publishing Ltd., pp. 5-6, 2014.
[19] Nick Marshall, and Scott Lowe, Mastering VMware vSphere 5.5,
Indiana: Sybex, pp. 59-61, 2014.
[20] Forbes Guthrie, and Scott Lowe, VMware vSphere Design, Indiana:
Wiley, Sybex, pp. 51-52, 2013.