of 9 /9
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 19 160205-8383-IJECS-IJENS © October 2016 IJENS I J E N S AbstractIntense advancement of cloud computing during the last years, convinced the experts to consider it as a proper and favorable substitution for traditional computing methods. Nowadays, many companies have moved their IT physical architecture to cloud computing platform for ease in managing and provisioning of different resources. In this paper a Cloud Computing environment is created using a product suite of VMware vSphere, which is based on two main parts: VMware ESXi hypervisor for virtualization technology and both VMware vSphere Client and Virtual Center (vCenter) for environment management. The aim is to provide efficient solution for designing and implementing an architecture of cloud computing. Index Termcloud computing, virtualization, hypervisor, VMware vSphere. I. INTRODUCTION CLOUD computing is a modern technology that utilizes the internet and central remote physical servers to use applications and maintains data [1]. The exact definition of cloud computing that encompasses all key aspects of cloud has been defined by NIST: “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”[2]. Cloud computing allows users and enterprise to store and use data, resources and applications without installation and access their own files from any device that has network access [1]. It minimizes the number of organization’s servers and improves the exploitation of computing resources as it is based on virtualization technology. Thus, 80% of resources utilization can be reach up compared to 10-15% in traditional IT through sharing the resources among multiple users. Consequently, the cost of purchasing, maintaining the resources, and managing servers and applications are reduced significantly [3]. Other main services that are delivered to the user are storage, processing, networking, and management with easy setup and a rapid provision and release of computing resources [4]. Therefore, users can access and use this system with full scalability, high performance, consistency, and relatively minimal expenditure solution compared to the Zaid Sh. Bakr is currently pursuing master’s degree program in network engineering at Al-Nahrain University, Iraq, E-mail: [email protected] M.F. Al-Gailani is a PhD Computer Engineer from Newcastle University, UK, E-mail: [email protected] devoted architecture [1]. In addition, the system increases the revenues of organization by hosting user’s data. Noting that it can be used either for a specific organization as a private cloud, or for general users as a public cloud. In general, the architecture of cloud computting consists of four layers as shown in Fig. 1. These layers are categorized according to the user access to the cloud environment. Cloud Architecture describes the working mechanism, model functions, and gives hierarchal view of cloud computing technology. These layers are: [5] 1) Layer 1 (User/Client Layer): This is the front end and lowest layer in the architecture. In this layer user/client can establish a connection to the cloud environment from any device through the web application. 2) Layer 2 (Network Layer): This layer permits the users to start a connection to the cloud. The entire cloud infrastructure is based on this layer where all services are provided to the users through this layers. In the state of public cloud this layer essentially is the internet, while in a private cloud it may be provisioned by a LAN. 3) Layer 3 (Cloud Management Layer): This layer constitutes collection of softwares that are used to establish the cloud and manage the underlying resources. In other words, these softwares can behave in two sides, one as an interface between the underlying physical resources and the user via network, and the other as a resource management. 4) Layer 4 (Hardware Resource Layer): It represents the back end that constitutes of providing the actual physical resources. In public cloud, data center and hardware resources are utilized in the back end side. While in a private cloud, data center and hardware resources are presented in a specific place or special configuration system. This layering architecture is firm, and for any application in the cloud environment, it should be followed. However, there is a small baggy isolation between the third and fourth layers based on the model the cloud is published. One of the prime functionalities of cloud computing is the abstraction of the physical hardware implementation by hiding the technical details from user. This feature is achieved by virtualization technology [3]. Virtualization plays a substantial role in cloud computing, it permits suitable level of isolation, security, customization and manageability which are essential for on-demand services. Virtualization technologies are mainly utilized to provide a Establishing and Managing Cloud Computing using VMware vSphere Zaid Sh. Bakr and M.F. Al-Gailani

Establishing and Managing Cloud Computing using VMware …ijens.org/Vol_16_I_05/160205-8383-IJECS-IJENS.pdf ·  · 2016-10-27The aim is to provide efficient solution for designing

Embed Size (px)

Text of Establishing and Managing Cloud Computing using VMware...

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 19

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    Abstract Intense advancement of cloud computing during the last years, convinced the experts to consider it as a proper and

    favorable substitution for traditional computing methods.

    Nowadays, many companies have moved their IT physical

    architecture to cloud computing platform for ease in managing

    and provisioning of different resources. In this paper a Cloud

    Computing environment is created using a product suite of

    VMware vSphere, which is based on two main parts: VMware

    ESXi hypervisor for virtualization technology and both VMware

    vSphere Client and Virtual Center (vCenter) for environment

    management. The aim is to provide efficient solution for designing

    and implementing an architecture of cloud computing.

    Index Term cloud computing, virtualization, hypervisor,

    VMware vSphere.

    I. INTRODUCTION

    CLOUD computing is a modern technology that utilizes the

    internet and central remote physical servers to use applications

    and maintains data [1].

    The exact definition of cloud computing that encompasses

    all key aspects of cloud has been defined by NIST: Cloud

    computing is a model for enabling convenient, on-demand

    network access to a shared pool of configurable computing

    resources (e.g., networks, servers, storage, applications, and

    services) that can be rapidly provisioned and released with

    minimal management effort or service provider

    interaction.[2].

    Cloud computing allows users and enterprise to store and

    use data, resources and applications without installation and

    access their own files from any device that has network access

    [1]. It minimizes the number of organizations servers and

    improves the exploitation of computing resources as it is based

    on virtualization technology. Thus, 80% of resources

    utilization can be reach up compared to 10-15% in traditional

    IT through sharing the resources among multiple users.

    Consequently, the cost of purchasing, maintaining the

    resources, and managing servers and applications are reduced

    significantly [3]. Other main services that are delivered to the

    user are storage, processing, networking, and management

    with easy setup and a rapid provision and release of computing

    resources [4]. Therefore, users can access and use this system

    with full scalability, high performance, consistency, and

    relatively minimal expenditure solution compared to the

    Zaid Sh. Bakr is currently pursuing masters degree program in network

    engineering at Al-Nahrain University, Iraq, E-mail:

    [email protected]

    M.F. Al-Gailani is a PhD Computer Engineer from Newcastle University,

    UK, E-mail: [email protected]

    devoted architecture [1].

    In addition, the system increases the revenues of

    organization by hosting users data. Noting that it can be used

    either for a specific organization as a private cloud, or for

    general users as a public cloud.

    In general, the architecture of cloud computting consists of

    four layers as shown in Fig. 1. These layers are categorized

    according to the user access to the cloud environment. Cloud

    Architecture describes the working mechanism, model

    functions, and gives hierarchal view of cloud computing

    technology. These layers are: [5]

    1) Layer 1 (User/Client Layer): This is the front end and

    lowest layer in the architecture. In this layer user/client

    can establish a connection to the cloud environment from

    any device through the web application.

    2) Layer 2 (Network Layer): This layer permits the users to

    start a connection to the cloud. The entire cloud

    infrastructure is based on this layer where all services are

    provided to the users through this layers. In the state of

    public cloud this layer essentially is the internet, while in a

    private cloud it may be provisioned by a LAN.

    3) Layer 3 (Cloud Management Layer): This layer

    constitutes collection of softwares that are used to

    establish the cloud and manage the underlying resources.

    In other words, these softwares can behave in two sides,

    one as an interface between the underlying physical

    resources and the user via network, and the other as a

    resource management.

    4) Layer 4 (Hardware Resource Layer): It represents the

    back end that constitutes of providing the actual physical

    resources. In public cloud, data center and hardware

    resources are utilized in the back end side. While in a

    private cloud, data center and hardware resources are

    presented in a specific place or special configuration

    system.

    This layering architecture is firm, and for any application in

    the cloud environment, it should be followed. However, there

    is a small baggy isolation between the third and fourth layers

    based on the model the cloud is published.

    One of the prime functionalities of cloud computing is the

    abstraction of the physical hardware implementation by hiding

    the technical details from user. This feature is achieved by

    virtualization technology [3].

    Virtualization plays a substantial role in cloud computing, it

    permits suitable level of isolation, security, customization and

    manageability which are essential for on-demand services.

    Virtualization technologies are mainly utilized to provide a

    Establishing and Managing Cloud Computing

    using VMware vSphere

    Zaid Sh. Bakr and M.F. Al-Gailani

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 20

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    configurable cloud computing environment, in addition to

    storage, and network [6].

    Fig. 1. Cloud Architecture

    Virtualization is an elementary mechanism for delivering

    services. Without virtualization, cloud computing management

    could be very difficult to achieve [7]. Cloud computing works

    on a virtualized environment which is enabled by the

    virtualization technologies. Cloud employs virtualization for

    better exploitation of hardware resources [5].

    The key operator for enabling virtualization in a cloud

    environment is a hypervisor. Type-1 hypervisors (dubbed

    native or bare metal hypervisor) are utilized in servers which

    deal with intense load and need high level of security. This

    type provides better efficiency than Type-2 hypervisors

    (dubbed hosted or embedded hypervisor). While the main con

    of Type-2 is whether the host OS defeats or crashes, which

    leads VMs to crash. Thus, Type-2 is used only on user or

    client systems in which efficiency is less important [5].

    VMware provides a type-1 hypervisor called vSphere.

    VMware vSphere is vastly used within companies to offer a

    virtualized infrastructure [8]. VMware vSphere technology is

    based on the notion of full virtualization, in which the

    underlying physical hardware is simulated and provisioned to

    the guest OS. Thus the guest OS can operate unaware of this

    abstraction layers [6].

    VMware vSphere is based on two main parts: VMware

    ESXi server that represents a hypervisor which implements a

    virtualization and permits many guest OS to make a single

    physical hardware host shared among them, and VMware

    vCenter server that represents the centralized management and

    administration of the virtualized infrastructure [6].

    There are problems in transferring service rapidly from

    physical host to another, restarting the service, and failure to

    update data in real time. To solve these problems, a hypervisor

    such as VMware ESXi server is adopted because the VMware

    vSphere offers a highest performance in comparison to other

    virtualization technology [9].

    VMware ESXi is a type-1 VMM, likes Xen but it operates

    without based on the OS, thus providing enhanced security,

    amplified reliability, and facilitated management. This is due

    to its consolidate architecture which is designed to incorporate

    directly into the host, as well as an ease and quick achieved for

    deployment, installation, and configuration. In general,

    VMware ESXi is a trust solution for cloud infrastructure [2].

    The overall performance, which is provided by ESXi from

    the factors of VM performance, memory management, high

    availability, live migration, networking, storage, security, and

    management features, is better than Xen and KVM hypervisors

    [10].

    II. RELATED WORK

    Milos Pavlik et al., 2012 [11]: proposed a solution to

    reduce the server outage by implementing Supervisory Control

    and Data Acquisition/Human Machine Interface

    (SCADA/HMI) systems over virtual infrastructure. The virtual

    infrastructure achieved by VMware vSphere 5.0 platform that

    required installation of ESXi, vCenter, High Availability

    cluster and other requirements, which offers reliable, stabile,

    and secure architecture to the accomplished systems.

    Imran Ijaz et al., 2014 [12]: presented an idea to secure the

    Cloud storage. The infrastructure of Cloud Computing that

    used to provide storage and share data in an efficient way

    among users in VM form, achieved by using VMware ESXi

    Type-1 Hypervisor.

    P. Nomnga et al., 2014 [13]: focused on Server

    virtualization that implemented using VMware ESXi as a

    hypervisor and vSphere client as a management node which

    lead to host a domain. Also, consolidated the physical servers

    of Computer Science Department \ Fort Hare University into

    one physical server and provisioned virtual resources on

    demand.

    Ahmed and Prof. Dr. Ghassan, 2015 [14]: proposed a

    Hospital Management Information System (HMIS) that was

    built over a proposed Private Cloud model. Private Cloud

    designed and implemented using two hosts and VMware ESXi

    hypervisor. User can use HMIS in VM (IaaS) form via

    vSphere client or vSphere web client.

    III. CLOUD COMPUTING STRUCTURE

    Cloud structure is not the same as cloud architecture. Cloud

    architecture appears as a hierarchical structural that defines

    and explains the technology which is based on it. Thus, cloud

    structure is a portion of cloud architecture. Fig. 2 illustrates

    the standard structure that represents the base for the cloud.

    Cloud structure consists of five basic components [5]:

    1) Application: This is the upper layer and over which any

    applications are implemented via user or client.

    2) Platform: This component is in charge of the execution of

    the application.

    3) Infrastructure: This layer comprises of resources that

    make the other components operate. This offers

    computational ability to the client.

    4) Virtualization: It is the technique of creating logical

    components of resources from the offered physical

    resources to build the infrastructure. The logical

    components can be isolated and independent.

    5) Physical hardware: This is the underlying physical

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 21

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    resources that are provided by the server and storage

    units.

    Generally, to implement infrastructure, type-1 hypervisor

    such as VMware ESXi server is chosen instead of type-2

    hypervisor such as KVM, because type-1 can directly access to

    the underlying physical hardwares such as server, storage, and

    datacenter in order to provide virtual resources in form of

    VMs, which are abstracted from the underlying physical

    resources [5].

    Fig. 2. Cloud Structure

    IV. VIRTUALIZATION AND HYPERVISORS

    Virtualization moves thinking from physical to logical, it

    enhances IT physical resource consumption through

    addressing organizations hardware resources as pools from

    which virtual hardware can be allocated and released.

    Virtualization can consolidate physical resources like storage,

    network, and processor into a virtualized environment. System

    virtualization can produce many virtual machines stand on a

    single physical hardware system. Virtual systems are

    autonomous running environments that make use of virtual

    resources. The benefits of virtualization are [15]:

    Consolidation scenario to reduce the cost of physical

    hardware.

    Load Balancing to optimize the workloads.

    IT elasticity and responsiveness.

    The virtualized environment consists of three main

    components as illustrated in Fig. 3: [6]

    Guest (dubbed virtual machine (VM), virtual guest, and

    guest system): represents the system (with a group of files,

    storage, memory, operating system and configurable

    components) that acts directly with the virtualization layer

    instead of the Host

    Host: represents physical hardware that abstracts by the

    virtualization layer.

    Virtualization layer (dubbed virtual machine monitor

    (VMM) or Hypervisor): is in charge of creating the virtual

    physical resources through software program to enable the

    Guest to operate.

    Two fundamental approaches of hardware virtualization as

    illustrated in Fig. 4 [16]:

    Full virtualization: each VM operates on an accurate copy

    of the actual physical hardware. This approach needs a

    virtualizable architecture, thus the physical hardware is fully

    offered to the guest OS by Hypervisor, which works

    unchanged, and guarantees an efficient direct execution

    process.

    Fig. 3. Reference Model of Virtualization

    Paravirtualization, each VM operates on a partially

    changed copy of the actual physical hardware. The purpose of

    this changed is (i) some features of the hardware are not

    possible to be virtualized; (ii) to enhance performance; and

    (iii) to provide the simplest of interface.

    System virtualization is universally achieved by hypervisor

    technology; where hypervisors are firmware components

    capable of virtualize hardware resources [15].

    Diverse hypervisors need a set of software components to be

    installed on the host server to present virtualization. Moreover,

    different hypervisors at the same time afford different

    functionalities for VM operating systems. Hypervisors are

    generally classified into two types: [8]

    Fig. 4. (a) Full virtualization. (b) Paravirtualization

    Type-1 hypervisors commonly stand directly above the

    barebones physical resource. Type-1 hypervisors behave as

    operating systems (OS). This lets them to produce more

    efficient consume of hardware system resources. Thus, cloud

    environments are widely built using Type-1 hypervisors.

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 22

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    Type-2 hypervisors commonly stand above operating

    system. The operating system takes control access to the

    underlying physical resources. The hypervisor behaves as a

    control firmware between the host OS and the guest OS.

    Type-1 (such as VMware ESXi and Xen) and Type-2 such

    as KVM are illustrated in Fig. 5[17].

    Fig. 5. Hypervisor types

    V. COMPONENTS TO BUILD CLOUD

    INFRASTRUCTURE

    Three main components are utilized to establish and manage

    a Cloud Computing. These components are VMware ESXi,

    VMware vCenter, and VMware vSphere client/web client,

    which are combined in VMware vSphere as illustrated in Fig.

    6.

    Fig. 6. VMware vSphere Components Functionality

    A. VMware ESXi

    VMware ESXi is a Virtual Machine Monitor (VMM) or

    Type-1 Hypervisor that is constructed directly upon physical

    hardware (Host). It offers the underlying physical hardware

    and permits various virtual machines to utilize the same

    resources [18].

    B. VMware vCenter

    vCenter Server is a controlling and managing software that

    offers; ESXi host management, VM deployment and

    management, tasks scheduling, managing for logging, alarms,

    statistics, and events. [19]

    VMware vCenter consists of four major components [17]:

    1) Single sign-on: Called also SSO, manages the identity of

    administrators and applications that work together with

    the vSphere middleware.

    2) vSphere web client: Offers web-based Interface for users

    and administrators, which interacts with the vCenter and

    objects that managed by it. From Figure 6, administrator

    uses vSphere web client to access the hosts via the

    vCenter server, where access cannot be done directly.

    3) vCenter inventory service: This component caches the

    managed objects for the vCenter when accessed through

    the web client to enhance performance and reduces

    searches for vCenter database.

    4) vCenter server: This is the heart service of vCenter, which

    is needed by the three other components. From Fig. 6,

    administrator that access vCenter server via either

    vSphere client or vSphere web client, can manage

    multiple hosts at the same time in conflict to vSphere

    client that manage only one host at a time.

    Fig. 7 sounds the steps that occur once a user logs onto the

    cloud using the vSphere Web Client [19]:

    1) The vSphere Web Client offers a secure web page

    interface to the user to log via web browser.

    2) The username and password which are previously created

    in AD server are sent to the SSO server as a SAML 2.0

    token.

    3) The SSO server sends a request to the Domain AD server

    for authentication mechanism.

    4) If authentication succeeds, SSO passes a SAML 2.0 token

    to the vSphere Web Client.

    5) This token is used to authenticate directly with the

    vCenter.

    Fig. 7. Authentication scenario

    C. VMware vSphere Client

    vSphere Client, nowadays frequently denoted as the legacy

    client or C#, is a primary management software tool as a

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 23

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    window form (i.e. windows-based application) used to connect

    directly and manage ESXi host with its local default account.

    It does not need to access vCenter, so this is more convenient

    once first time configuring host. Noting that host

    troubleshooting, or problems are found in vCenter. However,

    with windows-based vSphere Client, Single Sign On

    authentication cannot be used. [20]

    The vSphere Client offers a wealthy graphical user interface

    (GUI) and can connect to vCenter Server through the

    authentication of windows user. So, this leads to full

    management capabilities such as vMotion that available only

    with vCenter server. [19]

    VI. METHOD AND PROCEDURE

    A. Installing and Configuring VMware ESXi Interactively

    --First, the minimum hardware requirements to install ESXi

    server are: CPU; two cores, 64-bit, LAHF and SAHF

    instructions, BIOS; NX/XD bit enabled, RAM; 4GB, NIC; one

    Giga-bit, Boot Device; 1GB

    --Second, installing ESXi via Interactive Mode

    --Third, configuring ESXi via Interactive Mode

    From Set Static IP address in ESXi host, the IPv4 address

    and Default Gateway are set as shown in Fig. 8, then the

    network configuration is tested and ensured, and the result is

    appeared as shown in Fig. 9 and Fig. 10.

    Fig. 8 IP Configuration

    Fig. 9 Testing: Ping Menu

    Fig. 10. Test Management Network

    B. Installing and Configuring VMware vCenter.

    vCenter Server is a software package that operates as a

    central management node for the ESXi hosts and their own

    VMs. The VMware vCenter with its four main components are

    illustrated in Fig. 11.

    Fig. 11. VMware vCenter Server (simple Install)

    --First, the essential requirements for installing vCenter

    server are:

    Hardware; CPU: two cores 2GH, 64-bit, RAM: 4GB, Hard

    Disk: 100GB, and 40GB60GB free after install, NIC: one

    Gigabit.

    Software; OS: Microsoft Windows Server 2008 r2 64-bit,

    Database (DB) Server (such as oracle 10g R2, 11g R1 or 11g

    R2, Microsoft SQL Server 2005, 2008, 2008 Express or 2008

    R2), Microsoft .NET 3.5 and later, and Microsoft .NET

    Framework 3.5 Language Pack.

    Server provides Active Directory (AD) and Domain Name

    System (DNS).

    --Second, Installing and configuring AD and DNS

    After AD Domain Services are installed, a new Domain

    Controller (DC) is created as shown in Fig. 12.

    Fig. 12. Domain Name

    --Third, installing vCenter server components one by one as

    shown above via Interactive Mode.

    VMware vCenter 5.5 is installed after making vCenter

    server a member of "sec-cloud.com" as shown in Fig. 13 and

    Fig. 14.

    Fig. 13. Domain Menu

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 24

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    Fig. 14. Prerequisites Check

    During the installation, SSO authentication information is

    set (password: [email protected] for administrator account

    ([email protected]) as shown in Fig. 15, and

    installed as shown Fig. 16.

    Fig. 15. vCenter SSO Information

    Fig. 16. Configure SSO Authentication

    C. Installing vSphere client Interactively

    vSphere client windows application is installed as shown in

    Fig. 17 to make both users able to access and use their VM,

    and administrator to manage and monitor cloud infrastructure.

    Fig. 17. VMware vSphere Client

    D. Network configuration

    The network that represents the cloud is configured as

    shown in Figure 18, and the specifications of each component

    are described in Table I. Windows firewall must be turned off

    to allow connection occurs among them, this achieves through:

    Control Panel System and Security Windows Firewall

    Turn Windows Firewall on or off.

    TABLE I

    CLOUD COMPONENTS SPECIFICATION

    Server name

    Host1 Host2 vCenter AD

    OS ESXI 5.5 ESXI 5.5 Windows

    server 2008 R2

    Windows server 2008

    R2

    CPU Intel Core

    i7 Intel Core

    i3 Intel Core

    i5 Intel Core

    i3

    Storage 500G 500G 500G 100G

    RAM 6G 6G 8G 4G

    NIC Intel

    Gigabit Atheros PCIe FE

    Realtek PCIe FE

    Realtek PCIe FE

    IP address

    192.168.1.102

    192.168.1.103

    192.168.1.101

    192.168.1.100

    Gateway 192.168.1.1 192.168.1.1 192.168.1.1 192.168.1.1

    DNS 192.168.1.1

    00 192.168.1.1

    00 192.168.1.1

    00 127.0.0.1

    Controller Node

    vCenter Server

    192.168.1.101

    AD & DNS server

    sec-cloud.com

    192.168.1.100

    Cisco SW

    Host2

    ESXi server

    192.168.1.103

    Host1

    ESXi Server

    192.168.1.102

    MikroTik

    Router

    VM- user1

    VM-user2

    VM-user3

    eth2

    192.168.1.1eth4

    192.168.2.1

    client

    Admin / user

    vSphere Client

    Fig. 18. Network Configuration

    E. Managing the Cloud

    Creating Virtual Infrastructure

    Administrator either opens VMware vSphere client as

    shown in Fig. 19 and enters the IP address: 192.168.1.101,

    User name: [email protected], password:

    [email protected], or opens VMware vSphere Web client through

    https:// 192.168.1.101: 9443/vsphere-client/, as shown in Fig.

    20 and enters the User name: [email protected], password: [email protected] After that Datacenter is created as

    shown in Fig. 21, Host1 and Host2 are added as shown in Fig.

    22, and VM (IaaS) with its specification and OS are applied as

    shown in Fig. 23.

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 25

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    Fig. 19. VMware vSphere client Administrator Log in

    Fig. 20 VMware vSphere Web client Administrator Log in

    Fig. 21. Create Datacenter

    Fig. 22. Add Host Wizard

    Fig. 23. Crate VM

    Adding the users to cloud via AD server

    To satisfy the SSO authentication, users accounts are

    created in AD server as shown in Fig. 24.

    Fig. 24. User logon info Menu

    Assigning the permissions for users via vCenter server

    To achieve authorization, administrator selects user from

    Domain (SEC-CLOUD) as shown in Fig. 25, and chooses the

    role and privileges that specify the permission as shown in Fig.

    26. As a result, permission is appeared as shown in Fig. 27.

    Fig. 25. Domain and Users Menu

    Fig. 26. Assigned Role Menu

    Fig. 27. Permissions Window

    User logging in the Cloud

    User accesses cloud either via vSphere client as shown in

    Fig. 28, or vSphere Web client as shown in Fig. 29. As a

    result, user can use VM as shown in Fig. 30.

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 26

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    Fig. 28. VMware vSphere client User Login

    Fig. 29. VMware vSphere Web Client User Login

    Fig. 30. User Window

    VII. DISCUSSION

    Cloud is designed and implemented using many types of

    technologies that vary in the required components and the way

    of configuring, implementing, and secure infrastructure.

    VMware vSphere optimizes, monitors and manages IT

    environments from VMs to the data center. The task of

    designing and implementing of vSphere components are

    daunting. However, establishing and managing virtual

    infrastructure such as datacenter and VM are easier.

    VMware vSphere 5.5 components such as vCenter and

    ESXi need high resources to manage VMs efficiently. In

    addition, when the number of running VMs are increased, the

    resources (such as RAM and CPU) of vCenter and ESXi are

    increased as well. In addition, different types of security built

    in vSphere are configured such as SSO authentication using

    AD to avoid insecure APIs and Cloud Abuse, and

    authorization to assign roles and isolate cloud users.

    VIII. CONCLUSION

    This paper discusses and presents the cloud architecture,

    cloud structure, and the notion of both hypervisor and

    virtualization technology and their roles to build cloud

    computing environment.

    In addition, the research provides an efficient solution for

    designing and implementing an architecture of cloud

    computing environment in detail using VMware vSphere tools,

    with its main parts: VMware ESXi hypervisor and VMware

    vSphere Client with vCenter.

    The VMware vSphere provides; enhanced security,

    amplified reliability, facilitated management, and high

    performance framework, as well as an on-demand utilization

    of VMs (i.e. IaaS) to decrease the cost of having or renting

    computers and servers. It is also used to supply storage,

    networks, processing, and other computing resources. This is

    due to its consolidate architecture which is designed to

    incorporate directly into host, in addition to its ease and quick

    achieved for deployment, installation, and configuration.

    Accordingly, VMware vSphere can be considered as an

    appropriate and a trust solution for establishing and managing

    Cloud Computing.

    IX. REFERENCES

    [1] Apurva Shitoot, Sanjay Sahu, and Rahul Chawda1, "Security Aspects

    in Cloud Computing," International Journal of Engineering Trends

    and Technology (IJETT), vol. 6, no. 3, pp. 118-120, 2013.

    [2] Reza Bakhshayeshi, Mohammad Kazem, and Morteza Sargolzaei,

    "Performance Analysis of Virtualized Environments using HPC

    Challenge Benchmark Suite and Analytic Hierarchy Process," in

    Intelligent Systems (ICIS), IEEE Iranian Conference on, Bam, 2014.

    [3] Chaowei Yang, and Qunying Huang Spatial Cloud Computing, A

    Practical Approach, Boca Raton: CRC Press, pp. 36-39, 2014.

    [4] Zeeshan Javaid and Imran Ijaz, "Secure User Authentication in Cloud

    Computing," in Performance Computing and Communications

    Conference (IPCCC), IEEE 32nd International, San Diego, CA, 2013

    [5] K. Chandrasekaran, Essentials of Coud Computing, Boca Raton: CRC

    Press, pp. 28-31, 2015.

    [6] Rajkumar Buyya, Christian Vecchiola, and S. Thamarai, Mastering

    Cloud Computing, Foundations and Applications Programming,

    Waltham: Elsevier Inc, pp. 71-77, 2013.

    [7] Judith Hurwitz, and et. al, Cloud Computing For Dummies, Indiana:

    Wiley Publishing Inc, pp. 197-199, 2010.

    [8] Derrick Rountree, and Ileana Castrillo, The Basics of Cloud

    Computing, Understanding the Fundamentals of Cloud Computing in

    Theory and Practice, Waltham: Elsevier Inc, pp. 28-29, 2014.

    [9] Bao Rong Chang, and et. al, "Assessment of Hypervisor and Shared

    Storage for Cloud Computing Server," in Innovations in Bio-Inspired

    Computing and Applications (IBICA), IEEE Third International

    Conference, Kaohsiung, pp. 67-72, 2012.

    [10] Varsha Aiyappa, Smita S., and Shivagupta Chandakavathe,

    "Hypervisor Module for Cloud Computing Server," in International

    Journal of Innovative Technology and Research (IJITR), Karnataka,

    pp. 104-107, 2015.

    [11] Milos Pavlik, and et. al, "Supervisory control and data acquisition

    systems in virtual architecture built via VMware vSphere platform," in

    WSEAS Press, Kos Island, pp. 389-393, 2012.

    [12] Imran Ijaz, and et. al, "A Framework for Data Storage Cloud to Provide

    Security," International Journal of Emerging Trends in Science and

    Technology (IJETST), vol. 1, no. 6, pp. 932-938, 2014.

    [13] P. Nomnga, M. S. Scott, and P. B. Nyambi "A Technical Cost Effective

    Network-Domain Hosting through Virtualization: a VMware ESXi and

    vSphere Client Approach," International Journal of Computer

    Applications, vol. 91, no. 10, pp. 39-47, 2014.

    [14] Ahmed F, and Prof. Ghassan H., "Design and Implementation of E-

    health over Private Cloud Computing," International Journal of

    Enhanced Research in Science Technology & Engineering, vol. 4, no.

    1, pp. 119-129, 2015.

  • International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:05 27

    160205-8383-IJECS-IJENS October 2016 IJENS I J E N S

    [15] DeCusatis, Handbook of Fiber Optic Data Communication, A

    Practical Guide to Optical Networking, Waltham: Elsevier Inc., pp.

    387-389, 2014.

    [16] Dan C. Marinescu, Cloud Computing Theory and Practice, Waltham,:

    Elsevier Inc., pp. 140-142, 2013.

    [17] Christoph Fehling, and et. al, Cloud Computing Patterns,

    Fundamentals to Design, Build, and Manage Cloud Applications,

    New York: Springer, pp. 101-102, 2014.

    [18] Mohammed Raffic, and Aravind Sivaraman, VMware ESXi Cookbook,

    Birmingham: Packt Publishing Ltd., pp. 5-6, 2014.

    [19] Nick Marshall, and Scott Lowe, Mastering VMware vSphere 5.5,

    Indiana: Sybex, pp. 59-61, 2014.

    [20] Forbes Guthrie, and Scott Lowe, VMware vSphere Design, Indiana:

    Wiley, Sybex, pp. 51-52, 2013.