Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

Virtualization Environment for Computer Labs to Maintain Security, Stability and Availability

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Abdalla Alameen

Abdalla Alameen. Virtualization Environment for Computer Labs to Maintain Security, Stability and Availability. International Journal of Computer Applications 167(4):13-18, June 2017. BibTeX

	author = {Abdalla Alameen},
	title = {Virtualization Environment for Computer Labs to Maintain Security, Stability and Availability},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {167},
	number = {4},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {13-18},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2017914240},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Academic organizations are supposed to seek certain balance between the concerns of security, stability and availability of shared computer labs to achieve the course learning objectives. Some academic activities in computer science courses require students to control and configure some laboratory devices. Students in advanced courses may use some risky applications for some learning activities. It may affect the stability, availability and security of the working nature in the shared lab and networks. Virtualization Platform has the ability to overcome these concerns to achieve learning objectives. Virtualization technologies allow students to access and control the computer settings as well as the working environment in advanced applications without affecting the operational availability of computer labs throughout the college day. Virtualization enables computer security teachers to train their students on many hands-on activities without exposing or causing damages to computer labs.

This paper presents the usage of virtualization technology in such environment, the opportunities and benefits of using this technology in computer security oriented courses. The paper also discusses the use of the VMware workstation pro as a sandbox for risky lab activities in computer security courses. Here the Desktop Virtualization offers great opportunities to teach advanced skills in computer security courses. Also, this paper outlines the challenges and limitations of virtualization along with some recommendations to address these limitations.


  1. Abdalla Alameen, "Cloud Computing Data Breach". International Journal of Computer Trends and Technology (IJCTT) V47(1):42-49, May 2017.
  2. Düpmeier, C., Stucky, K.U., Mikut, R. and Hagenmeyer, V., 2015, November. A concept for the control, monitoring and visualization center in Energy Lab 2.0. In DA-CH Conference on Energy Informatics (pp. 83-94). Springer International Publishing.
  3. Fernandes, S., 2017. Principles of Performance Evaluation of Computer Networks. In Performance Evaluation for Network Services, Systems and Protocols (pp. 1-43). Springer International Publishing.
  4. Knodel, O., Genssler, P.R. and Spallek, R.G., 2017. Migration of long-running Tasks between Reconfigurable Resources using Virtualization. ACM SIGARCH Computer Architecture News, 44(4), pp.56-61.
  5. Klement, M., 2017. Models of integration of virtualization in education: Virtualization technology and possibilities of its use in education. Computers & Education, 105, pp.31-43.
  6. Batalla, J.M., Mastorakis, G., 2016. On cohabitating networking technologies with common wireless access for home automation system purposes. IEEE Wireless Communications, 23(5), pp.76-83.
  7. Xu, M., Tian, W. and Buyya, R., 2016. A Survey on Load Balancing Algorithms for VM Placement in Cloud Computing. arXiv preprint arXiv:1607.06269.
  8. Jararweh, Y., Al-Ayyoub, M., 2016. Software defined cloud: Survey, system and evaluation. Future Generation Computer Systems, 58, pp.56-74.
  9. Hawilo, H., Shami, A., Mirahmadi, M. and Asal, R., 2014. NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC). IEEE Network, 28(6), pp.18-26.
  10. Liang, W.E. and Shen, C.A., 2017, January. A high performance media server and QoS routing for SVC streaming based on Software-Defined Networking. In Computing, Networking and Communications (ICNC), 2017 International Conference on (pp. 556-560). IEEE.
  11. Bugnion, E., Nieh, J. and Tsafrir, D., 2017. Hardware and Software Support for Virtualization. Synthesis Lectures on Computer Architecture, 12(1), pp.1-206.
  12. Tuminauskas, R., Ambraziene, D., Miseviciene, R. and Pazereckas, N., 2012. Educational infrastructure using virtualization technologies: Experience at kaunas university of technology. Informatics in Education-An International Journal, (Vol11_2), pp.227-240.
  13. Prasad, S.K., Banicescu, I., 2017. Keeping up with technology: Teaching parallel, Distributed and High-Performance Computing.
  14. Pankowska, M.B., 2017. MOOCs as Supplement of Informal Education. International Journal of E-Adoption (IJEA), 9(1), pp.10-25.
  15. Bell, S., Lane, A., Collins, K., Berardi, A. and Slater, R., 2017. Teaching Environmental Management Competencies Online: Towards" Authentic" Collaboration? European Journal of Open, Distance and E-learning, 20(1).
  16. Nasereddin, M., Clark, T.K. and Konak, A., 2014, March. Using virtual machines in a K-12 Outreach program to increase interest in information security fields. In Integrated STEM Education Conference (ISEC), 2014 IEEE (pp. 1-5). IEEE.
  17. Lunsford, D.L., 2009. Virtualization technologies in information systems education. Journal of Information Systems Education, 20(3), p.339.
  18. Rajeshwari, B.S. and Dakshayini, M., 2014. Comprehensive Study on Load Balancing Techniques in Cloud. Compusoft, 3(6), p.900.
  19. García-Valls, M. and Basanta-Val, P., 2017. Analyzing point-to-point DDS communication over desktop virtualization software. Computer Standards & Interfaces, 49, pp.11-21.


Virtualization, virtual machine, Desktop virtualization, hypervisor, hands-on activities, computer security.