skip to main content
10.1145/1867651.1867665acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Using VMware VCenter lab manager in undergraduate education for system administration and network security

Authors Info & Claims
Published:07 October 2010Publication History

ABSTRACT

We have developed and managed a virtual laboratory environment by deploying the VMware vCenter Lab Manager and the VMware vSphere vCenter on a load-balanced cluster of eight ESX 3.5 servers and a storage area network of 10.8 Tera bytes. This system has been in use to conduct hands-on laboratory experiments in undergraduate education for computer security and system administration. Lab Manager provides remote access through the Internet using a common Web browser, such as Internet Explorer and Mozilla Firefox. The way in which the Lab Manager manages and controls virtual machines and networking components provides additional convenience for instructors to implement laboratory exercises and for students to finish their experiments. In this article, we present the design of the system, introduce some of the features of the virtual environment, and discuss the experiences we have gained from developing and using this system. Compared with other existing virtualization platforms, Lab Manager provides more useful features and additional flexibility for the use in the education for information technology (IT), although there is still room to improve.

References

  1. }}R. Abler, D. Contis, J. Grizzard, and H. Owen. Georgia Tech information security center hands-on network security laboratory. IEEE Transactions on Education, 49(1):82--87, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In ASPLOS-XII: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems, pages 2--13, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}P. B. Albee, L. A. Campbell, M. A. Murray, C. M. Tongen, and J. L. Wolfe. A student-managed networking laboratory. In SIGITE '07: Proceedings of the 8th ACM SIGITE conference on Information technology education, pages 67--74, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}Amazon. Amazon Elastic Compute Cloud (Amazon EC2). Online, May 2010. http://aws.amazon.com/ec2/. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  5. }}B. R. Anderson, A. K. Joines, and T. E. Daniels. Xen worlds: leveraging virtualization in distance education. In ITiCSE '09: Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, pages 293--297, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}P. Bala. Intensification of educational cloud computing and crisis of data security in public clouds. International Journal on Computer Science and Engineering, 2(3):741--745, 2010.Google ScholarGoogle Scholar
  7. }}K. Begnum, K. Koymans, A. Krap, and J. Sechrest. Using virtual machines in system administration education. In Proceedings of 4th International System Administration and Network Engineering Conference (SANE'04), 2004. http://www.iu.hio.no/~kyrre/vmined.pdf. Retrieved February 5, 2010.Google ScholarGoogle Scholar
  8. }}C. Border. The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes. ACM SIGCSE Bulletin, 39(1):576--580, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}W. I. Bullers, Jr., S. Burd, and A. F. Seazzu. Virtual machines - an idea whose time has returned: application to network, security, and database courses. In SIGCSE '06: Proceedings of the 37th SIGCSE technical symposium on Computer science education, pages 102--106, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599--616, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}T. Chen, W. Hu, and Q. Shi. Teaching reform of information security curriculum of distance learning. In Proceedings of the First International Workshop on Education Technology and Computer Science, volume 1, pages 185--189, Los Alamitos, CA, USA, 2009. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. }}CNSA. Computer Network and System Administration. Online, February 2010. https://cnsa-web.tech.mtu.edu/cnsa/. Retrieved February 28, 2010.Google ScholarGoogle Scholar
  13. }}R. J. Creasy. The origin of the vm/370 time-sharing system. IBM Journal of Research and Development, 25(5):483--490, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. }}D. Dobrilovic and Z. Stojanov. Using virtualization software in operating systems course. In Proceedings of International Conference on Information Technology: Research and Education, 2006. ITRE '06, pages 222--226. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  15. }}W. Du and R. Wang. SEED: A suite of instructional laboratories for computer security education. Journal on Educational Resources in Computing (JERIC), 8(1):1--24, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}S. Duignan and T. Hall. Using platform virtualization to teach system architectures in undergraduate computer science -- An evaluation of student learning experiences. In M. Iskander, editor, Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, pages 479--484. Springer, Netherlands, 2008.Google ScholarGoogle Scholar
  17. }}A. Gaspar, S. Langevin, W. Armitage, and M. Rideout. Enabling new pedagogies in operating systems and networking courses with state of the art open source kernel and virtualization technologies. Journal of Computing Sciences in Colleges, 23(5):189--198, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}A. Gaspar, S. Langevin, W. Armitage, R. Sekar, and T. Daniels. The role of virtualization in computing education. In SIGCSE '08: Proceedings of the 39th SIGCSE technical symposium on Computer science education, pages 131--132, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}A. Gaspar, S. Langevin, and W. D. Armitage. Virtualization technologies in the undergraduate it curriculum. IT Professional, 9(4):10--17, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. }}A. Gaspar, S. Langevin, W. D. Armitage, and M. Rideout. March of the (virtual) machines: past, present, and future milestones in the adoption of virtualization in computing education. Journal of Computing Sciences in Colleges, 23(5):123--132, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. }}Google. Google App Engine. Online, May 2010. http://code.google.com/appengine/. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  22. }}B. Hayes. Cloud computing. Communications of the ACM, 51(7):9--11, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. }}J. M. D. Hill, C. A. Carver, Jr., J. W. Humphries, and U. W. Pooch. Using an isolated network laboratory to teach advanced networks and security. ACM SIGCSE Bulletin, 33(1):36--40, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. }}K. Lei and P. T. Rawles. Strategic decisions on technology selections for facilitating a network/systems laboratory using real options & total cost of ownership theories. In CITC4 '03: Proceedings of the 4th conference on Information technology curriculum, pages 76--92, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. }}P. Li. Exploring virtual environments in a decentralized lab. ACM SIGITE Newsletter, 6(1):4--10, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. }}P. Li. Selecting and using virtualization solutions: our experiences with VMware and VirtualBox. Journal of Computing Sciences in Colleges, 25(3):11--17, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. }}P. Li and T. Mohammed. Integration of virtualization technology into network security laboratory. In Proceedings of the 38th Annual Frontiers in Education Conference (FIE 2008), pages 55--59, New York, NY, USA, 2008. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  28. }}P. Li, L. W. Toderick, and P. J. Lunsford. Experiencing virtual computing lab in information technology education. In SIGITE '09: Proceedings of the 10th ACM conference on SIG-information technology education, pages 55--59, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. }}S. Liu, W. Marti, and W. Zhao. Virtual networking lab (VNL): its concepts and implementation. In Proceedings of the 2001 American Society for Engineering Education Annual Conference & Exposition. American Society for Engineering Education, 2001. http://citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.64.5923&rep=rep1&type=pdf. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  30. }}P. Mateti. A laboratory-based course on Internet security. ACM SIGCSE Bulletin, 35(1):252--256, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. }}J. Mayo and P. Kearns. A secure unrestricted advanced systems laboratory. In SIGCSE '99: The proceedings of the thirtieth SIGCSE technical symposium on Computer science education, pages 165--169, New York, NY, USA, 1999. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. }}Microsoft. Windows Azure Platform. Online, May 2010. http://www.microsoft.com/windowsazure/. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  33. }}Y. Nakagawa, H. Suda, M. Ukigai, and Y. Miida. An innovative hands-on laboratory for teaching a networking course. In Proceedings of the 33rd Annual ASEE/IEEE Frontiers in Education (FIE 2003), pages T2C--14--20. IEEE, November 2003.Google ScholarGoogle ScholarCross RefCross Ref
  34. }}OpenBSD. Openbsd home page. Online, March 2010. http://www.openbsd.org/, Retrieved March 28, 2010.Google ScholarGoogle Scholar
  35. }}Oracle. Sun Utility Computing. Online, May 2010. http://www.sun.com/service/sungrid/. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  36. }}D. Schweitzer and J. Boleng. Designing web labs for teaching security concepts. Journal of Computing Sciences in Colleges, 25(2):39--45, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. }}D. Schweitzer and W. Brown. Using visualization to teach security. Journal of Computing Sciences in Colleges, 24(5):143--150, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. }}J. K. Smith, J. P. Buerck, L. L. McDurmont, Jr., and P. G. Bagsby. Multidisciplinary informatics: a primer for course development. Journal of Computing Sciences in Colleges, 24(5):198--203, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. }}SmoothWall. Smoothwall home page. Online, March 2010. http://www.smoothwall.org/, Retrieved March 28, 2010.Google ScholarGoogle Scholar
  40. }}SNORT. Snort home page. Online, March 2010. http://www.snort.org/, Retrieved March 28, 2010.Google ScholarGoogle Scholar
  41. }}B. Stackpole. The evolution of a virtualized laboratory environment. In SIGITE '08: Proceedings of the 9th ACM SIGITE conference on Information technology education, pages 243--248, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. }}B. Stackpole, J. Koppe, T. Haskell, L. Guay, and Y. Pan. Decentralized virtualization in systems administration education. In SIGITE '08: Proceedings of the 9th ACM SIGITE conference on Information technology education, pages 249--254, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. }}G. D. Ste.en and H. I. Abu-Mulweh. Teaching local area networking in a secure virtual environment. Computer Applications in Engineering Education, pages 1--10, March 2009. http://www3.interscience. wiley.com/journal/122296084/abstract. Retrieved June 2, 2010.Google ScholarGoogle Scholar
  44. }}K. E. Stewart, J. W. Humphries, and T. R. Andel. Developing a virtualization platform for courses in networking, systems administration and cyber security education. In SpringSim '09: Proceedings of the 2009 Spring Simulation Multiconference, pages 1--7, San Diego, CA, USA, 2009. Society for Computer Simulation International. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. }}M. Stockman. Creating remotely accessible "virtual networks" on a single pc to teach computer networking and operating systems. In CITC4 '03: Proceedings of the 4th conference on Information technology curriculum, pages 67--71, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. }}M. Stockman, J. Nyland, and W. Weed. Centrally-stored and delivered virtual machines in the networking/system administration lab. ACM SIGITE Newsletter, 2(2):4--6, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. }}VMware. Lab Manager Installation and Upgrade Guide: vCenter Lab Manager 4.0. Online, January 2010. http://www.vmware.com/support/pubs/labmanager_pubs.html. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  48. }}VMware. Lab Manager SOAP API Reference: vCenter Lab Manager 4.0. Online, January 2010. http://www.vmware.com/support/pubs/labmanager_ pubs.html. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  49. }}VMware. Lab Manager User's Guide: vCenter Lab Manager 4.0. Online, January 2010. http://www. vmware.com/support/pubs/labmanager_pubs.html. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  50. }}VMware. VMware home page. Online, March 2010. http://www.vmware.com/. Retrieved March 2, 2010.Google ScholarGoogle Scholar
  51. }}VMware. VMware vCenter Lab Manager. Online, January 2010. http://www.vmware.com/products/labmanager/. Retrieved May 28, 2010.Google ScholarGoogle Scholar
  52. }}A. Vollrath and S. Jenkins. Using virtual machines for teaching system administration. Journal of Computing Sciences in Colleges, 20(2):287--292, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. }}P. J. Wagner and J. M. Wudi. Designing and implementing a cyberwar laboratory exercise for a computer security course. In SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on Computer science education, pages 402--406, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. }}Xen. What is Xen? Online, March 2010. http://www.xen.org/. Retrieved March 2, 2010.Google ScholarGoogle Scholar
  55. }}L. Yang. Teaching system and network administration using virtual pc. Journal of Computing Sciences in Colleges, 23(2):137--142, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using VMware VCenter lab manager in undergraduate education for system administration and network security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '10: Proceedings of the 2010 ACM conference on Information technology education
        October 2010
        180 pages
        ISBN:9781450303439
        DOI:10.1145/1867651

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate176of429submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader