SlideShare a Scribd company logo
Remote PCs: the
what, why and
when




© 2007 Pride Technologies and Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice
Definitions
•   Server Based Computing (SBC)
    − AKA Terminal Server Environment
      • Citrix XenApp (formerly Presentation Server or MetaFrame)
      • Microsoft Terminal Server
•   Virtual Desktop Infrastructure (VDI)
    − Virtual Machines running a desktop OS
      • VMware View
      • Citrix XenDesktop
      • Microsoft Hyper-V
•   Consolidated Client Infrastructure
    − Bladed PCs that reside in the Data Center
      • HP CCI
      • Blade-based Professional Workstations
The need for Remote PCs
Heterogeneity                           High Management Costs                 Admin Inefficiencies
                                    > 70% of TCO ($6,800* / user/ year)       Too tactically focused
                                    )               *Gartner




                                                                 -IDC                                  -IDC

                Security Threats                               Low Resource Utilization
            Need for preventive/
            proactive measures




                 Data Theft    Virus / Malware


                                                                          The desktop is the least
                                                                          utilized resource on the
                Phishing      Hacking                                     network!
Remote PC Benefits
Close to IT Operations
− Desktops are centralized in the Data Center
   − For VDI: Can reduce the amount of images to manage
− Management tools access the “desktops” over local networks for
  patching/maintenance

Increases flexibility
−   Enables pooling and sharing of desktop infrastructure
−   Improves disaster recovery plans
−   Roaming profiles allow users to access from any device
−   Can pair technologies such as VDI and SBC in a single solution

Security
− Remote users only ‘view’ data
− For VDI: All data resides on RAID storage behind the firewall
Building Blocks
  •Compute Nodes
      •Servers
      •PC or Workstation Blades
  •Storage
      •iSCSI
      •DAS
      •SAS SAN
      •FC SAN
  •Software
      •VDI Software
      •Connection Brokers
  •Management
      •HP ICE
  •Access Devices
      •Thin Clients/”Zero” Client
      •Reuse desktops/laptops
  •Services
Distributed vs. Remote PCs
What is the difference?

                                                                   Apps          Apps

                                                                  Win OS     Win OS
                                                                   Virtual       Virtual
                                         Applications             Machine       Machine          Application

                                         Windows OS                  Hypervisor                  Windows OS


                                          PC Blade                     Server                      Server

          Applications
                                        HP Session                                                Citrix or
                                       Allocation Mgr            Connection Broker            Terminal Services
         Windows OS
                                                RDP/RGS                      RDP                       RDP/ICA

      Personal Computer                 Thin Client                  Thin Client                Thin Clients


                                                                   Remote PC
       Distributed PC
                                      HP CCI                        HP VDI                 Terminal Server/Citrix
 •   Single user per Desktop
               PC                                             Multiple users accessing     Multiple users accessing
                               Single user per Blade PC
                                                               virtual PC’s per server      applications per server

     Current Paradigm                                      Security and Data Backup
       Performance                                             Lower Total Costs
        Standard                                      Remote Access and Disaster Recovery
       Most Flexible                                       Improved Environmentals
“Static” or “Dynamic” Implementation
Two Basic             “Static” Model                     “Dynamic” Model
Implementation’s
Static
1:1 Every user
assigned a VM
connects by it’s IP
Address or Name                                               Connection
                                                              Broker
Dynamic
                                       Proliant/Blades
Connection broker
                                       Running
connects user to a
                                       Windows VMs
VM in a pool and
                                       Or CCI HW
returns VM to pool
when the user
disconnects
Step 1: Access Device for Client
         Virtualization
            - Access device can be a thin client, a notebook or a
            desktop PC


            - Thin Client benefits
                 - Eliminates end-user “break-fix”
                 - Highly secure
                 - Minimal management/updates (small image)


            - Reuse desktop/laptop
                 - Users gets Windows XP or Vista
                 -Standard PC applications work
                 -Must still manage large images
            -Zero Client
                 -No image at device
                 -Only need to update a VM
Step 2: Broker / Allocation Server




- User inputs standard credentials (Name, Password, Smartcard, etc)
- Broker determines correct resource for user (Blade PC, Virtual PC, etc)
- Examples include: HP Session Allocation Manager, VMware View Manager, Pano Manager
Step 3: Computing Resource
Step 3: Resource Assigned                                            Option #1: VDI




                                                    - Virtual Windows Vista or XP loaded onto server
                                                    - Multiple users per server (~8-10 per CPU core)




- User is connected via remote protocol (RGS, RDP, ICA, Console Direct) to their “virtualized” client PC
- Remote protocol transmits only keystrokes, mouse clicks and screenshots
- No corporate / end user data is transmitted to the access device
Step 3: Computing Resource
Step 3: Resource Assigned                                Option #2: Blade PC or Workstation




                                                    - Windows Vista or XP loaded onto local hard drive
                                                    - User data folder-redirected to other storage
                                                    - Dedicated performance to user while logged in




- User is connected via remote protocol (RGS, RDP, ICA) to their “virtualized” client PC
- Remote protocol transmits only keystrokes, mouse clicks and screenshots
- No corporate / end user data is transmitted to the access device
Protocol Overview
Microsoft Remote     − Standard Windows Remote Viewing Protocol
Desktop Protocol
                     − Good performance, supports audio output
(RDP)
                     − Supported by VMware

Citrix Independent   − Highly secure, encrypted traffic
Computing            − Bi-directional audio support
Architecture (ICA)
                     − High performance over WAN

HP Remote            − Superior graphics performance
Graphics Software    − Per-node Licensing required from Hewlett-Packard
(RGS)
                     − Supported by VMware

                     − Superior graphics and USB performance
Pano Console
Direct               − Optimized video with synchronized audio
                     − VMware support only (requires Pano Zero Client device)
                     − To be incorporated into VMware
PC over IP (PCoIP)
                     − High Performance; more forgiving for high latency
VDI Benefits – Economies of scale
VM management
− One base image can be used for many different VMs
  • driver management is greatly simplified because all VMs use the same
    virtual hw
− Templates can be created for rapid deployment of new VMs

Utilize existing virtual infrastructure
− Virtualized server and desktop spaces can leverage the same
  hardware, architecture, and infrastructure.
− Automatic load-balancing and high availability including instant VM
  migration from host-to-host features.

Desktop infrastructure
− Underutilized desktop assets
− 5w vs 20w vs 120w (Zero Client vs Thin Client vs PC)
Sample Virtual Desktop Infrastructure
on HP BladeSystem c-Class

                                    VMware: up to 20 XP users/core
                                    Citrix Xen: No CPU limits
                                    •   Solution Sample for VDI:
                                         −   8 BL490c’s and 8 SB40’s
                                         −   4GB RAM per core
                                         −   8 NICs per Host
                                         −   80 VMs per blade
                                         −   640 users per 10U
  • Pair a BL490c with an SB40      •   Solution will be 30% to 35% less costly
  • Each SB40 offers 1.5TB of           than using DL380’s with MSA50’s
    RAID 5 storage                  •   Solution will use ~30% less watts than
  • Virtualization Layer on Blade       equivalent DL380’s & MSA50’s
    Hard Drives or with an          •   Less cables & networking costs
    Integrated Hypervisor           •   Equivalent response times to DL380
                                        based solution.
Identifying VDI Candidates

No Guessing Allowed

  − Objective tests are critical
  − However: work with the user: User Acceptance is
    KEY! Make them feel that their opinions are
    important
    • Many companies are offering incentives to employees
    • Allowing them to select their own client device
    • Providing dual-monitors
    • Other creative examples
The Basic Methodology for VDI
                               Assess

                          Categorize users and
                          applications, identify use
                          cases, measure usage,
                          determine environment
                          limitations and needs


            Monitor and adjust               Identify target users
            resource allocations,            and use cases,
   Manage   provide software                 select technologies,    Design
            upgrades and patches,            model architecture
            support end users                and capacity needs



                          Virtualize applications,
                          virtualize target desktops,
                          migrate user settings and
                          documents, deploy to
                          desktops and terminals



                              Deploy
Gather Key Usage Metrics
Dissolvable agent
measures usage:
• Per user, per app
• Time in use
• CPU
• Memory
• Disk
• Network
• Latency
• Graphics intensity
• Login duration
• App load times
Determine VDI Fitness Rating
See how well specific
machines, users and
applications fit in VDI:
• Analyze by group
• Workload statistics
      •   System CPU
      •   User CPU
      •   Memory Use                       Best Fit
      •   Paging
      •   Disk I/O
      •   Network I/O
• Advanced metrics             Worst Fit
      •   User logons
      •   App loading
      •   Network latency
      •   Graphics intensity
• Categorize workloads
• Customizable ratings
Performance characteristics
•   Near linear processor                                       Scatterplot of %CPU for 70 VMs, 80 VMs, 90 VMs, 100 VMs
                                                            110
    scalability                                             100
                                                                                                                                                                                             Variable
                                                                                                                                                                                             70 VMs
                                                                                                                                                                                             80 VMs
                                                             90                                                                                                                              90 VMs




                                       %CPU Utilization
                                                                                                                                                                                             100 VMs
                                                             80
•   Better than expected                                     70
                                                             60
    memory management                                        50
                                                             40

•   Storage controllers are                                  30
                                                             20

    extremely important                                           06
                                                                       15
                                                                         :0
                                                                           0

                                                                                       06
                                                                                            18
                                                                                              :0
                                                                                                0

                                                                                                            06
                                                                                                                 21
                                                                                                                   :0
                                                                                                                     0

                                                                                                                                00
                                                                                                                                  6
                                                                                                                                      0:
                                                                                                                                         00

                                                                                                                                                        00
                                                                                                                                                          6
                                                                                                                                                              3:
                                                                                                                                                                00
                                                                                                                                                                               00
                                                                                                                                                                                 6
                                                                                                                                                                                     6:
                                                                                                                                                                                        00

                                                                20                   20                   20                  /2                      /2                     /2
                                                              9/                  9/                    9/                   0                      10                     10
    − More cache for direct attached                      10
                                                            /
                                                                               10
                                                                                 /
                                                                                                    10
                                                                                                      /
                                                                                                                         10
                                                                                                                           /1

                                                                                                                          Time
                                                                                                                                              10
                                                                                                                                                /
                                                                                                                                                                     10
                                                                                                                                                                       /




•   User experience is
    outstanding
TCO savings by category: hard costs
Category                                Savings                            Rationale
Install/replace/ update/move (“IMAC”)     90%      Thin Client (TC) at user desk; simple upgrades, rarely
                                                   breaks, little need to move
Break/fix support                         90%      Desk side: TCs rarely break
                                                   Blades in data center: maintenance by fast and easy
                                                   “rip and replace”
Systems management                        70%      Radical image standardization and greatly simplified
                                                   software (SW) deployment methodology
Power Consumption                         70%      TC has minimal power draw; bladepc uses ultra low
                                                   power CPUs
Help desk                                 50%      Radical image standardization with minimal opportunity
                                                   to change SW image, minimizes Help Desk calls
Training                                  40%      Significant reduction due to simplified and radically
                                                   standardized hardware and software
How-to support                            40%      Significant reduction due to simplified and radically
                                                   standardized hardware and software
General operations                        10%      Due to ease of procuring and managing the centralized
                                                   assets (i.e., blades).
TOTAL                                     70%      Total % based on %s weighted by actual dollar amounts

 Source: Meta Group, Gartner and HP Internal Analysis
In Summary…
                           • Address risks in delivering        •   Data secured in the
                             technology to users                    datacenter, not vulnerable at
 Reduce and                • Minimize security and
                                                                    the access device
 Avoid Risk                  compliance risk associated         •   Manage and secure desk-
                             with traditional distributed           based corporate IP via
                             clients                                datacenter best practices
                                                                • Manage client computing
                                                                  more efficiently with
                           •   Reduce costs by centralizing       automated tools and best
Reduce Cost                    desk-based management in           practices
                               the datacenter
                                                                • Fewer desk-side support
                                                                  calls
                                                                •   Reduce end-user disruptions
       Service             •   Deliver improved SLAs with
                                                                    while delivering full desktop
       Levels                  your population
                                                                    experience
                                                                • 3rd-generation HP Blade PCs
                           •   Blade PC/Wkstn technology        • 2nd-gen HP Blade
      Technical                                                   Workstation
                               at stage of maturity to deploy
     Innovation                on enterprise-wide basis
21     29 September 2009
                                                                • True desktop experience
http://www.hp.com/go/vdi
              http://www.hp.com/go/cci
Questions
and Answers

More Related Content

PPSX
Docker Kubernetes Istio
PDF
12 Things You Must Know About VDI
PDF
Vdi how-it-works618
PPTX
Virtual desktop infrastructure
PPTX
VMware Advance Troubleshooting Workshop - Day 5
PDF
What’s New in VMware vSphere 7?
PDF
Microsoft Windows Server 2022 Overview
PPTX
VDI/ VMware Horizon View
Docker Kubernetes Istio
12 Things You Must Know About VDI
Vdi how-it-works618
Virtual desktop infrastructure
VMware Advance Troubleshooting Workshop - Day 5
What’s New in VMware vSphere 7?
Microsoft Windows Server 2022 Overview
VDI/ VMware Horizon View

What's hot (20)

PPTX
SDN Architecture & Ecosystem
PDF
DevNetCreate - ACI and Kubernetes Integration
PDF
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
ODP
Kubernetes Architecture
PDF
VLAN vs VXLAN
PDF
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
PDF
how to install VMware
PDF
The Best Storage Solution For CloudStack: LINSTOR
PPTX
virtualization and hypervisors
PDF
Red Hat OpenShift Container Platform Overview
PDF
What's Coming in CloudStack 4.19
PDF
OpenStack Architecture
PDF
Kubernetes 101
PDF
Istio : Service Mesh
PDF
Istio service mesh introduction
PDF
Virtual Machines and Docker
POTX
IBM Domino / IBM Notes Performance Tuning
PPTX
VMware Vsphere Graduation Project Presentation
PDF
OpenShift 4, the smarter Kubernetes platform
SDN Architecture & Ecosystem
DevNetCreate - ACI and Kubernetes Integration
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
Kubernetes Architecture
VLAN vs VXLAN
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
how to install VMware
The Best Storage Solution For CloudStack: LINSTOR
virtualization and hypervisors
Red Hat OpenShift Container Platform Overview
What's Coming in CloudStack 4.19
OpenStack Architecture
Kubernetes 101
Istio : Service Mesh
Istio service mesh introduction
Virtual Machines and Docker
IBM Domino / IBM Notes Performance Tuning
VMware Vsphere Graduation Project Presentation
OpenShift 4, the smarter Kubernetes platform
Ad

Viewers also liked (20)

PPTX
Desktop virtualization customer presentation
PPT
Virtual desktop infrastructure
PPTX
Présentation VDI - Virtual Desktop Infrastucture
PPTX
VDI Design Guide
PPTX
Business Case Of Desktop Virtualization
PDF
Vmware View VDI 2012
PDF
Throughwave Day 2015 - VDI Solutions
PPTX
Présentation VDI - Virtual Desktop Infrastructure - Computerland
PPTX
Virtual Desktop for Education
PPTX
Hypothetical Psychokinetic Potential PowerPoint
PPTX
Parlons-en du Cloud Event - Cloud definition and use cases
PPTX
Presentation Neocoretech
PDF
Virtuelbureau, bureau virtuel hébergé ou DaaS (Desktop as a Service)
PDF
Vmavvt formation-gestion-de-la-virtualisation-d-applications-avec-vmware-thinapp
PPTX
Poste de Travail : Consumérisation et virtualisation
PPT
The Virtual Desktop Revolution
PPTX
Windows Azure Pack Enabling Virtual Machines - IaaS & Virtual Machine Role - ...
PDF
e-Infrastructures for Science and Industry
PPT
Spotlight on the petroleum and energy vertical
PDF
VMM Networking Poster
Desktop virtualization customer presentation
Virtual desktop infrastructure
Présentation VDI - Virtual Desktop Infrastucture
VDI Design Guide
Business Case Of Desktop Virtualization
Vmware View VDI 2012
Throughwave Day 2015 - VDI Solutions
Présentation VDI - Virtual Desktop Infrastructure - Computerland
Virtual Desktop for Education
Hypothetical Psychokinetic Potential PowerPoint
Parlons-en du Cloud Event - Cloud definition and use cases
Presentation Neocoretech
Virtuelbureau, bureau virtuel hébergé ou DaaS (Desktop as a Service)
Vmavvt formation-gestion-de-la-virtualisation-d-applications-avec-vmware-thinapp
Poste de Travail : Consumérisation et virtualisation
The Virtual Desktop Revolution
Windows Azure Pack Enabling Virtual Machines - IaaS & Virtual Machine Role - ...
e-Infrastructures for Science and Industry
Spotlight on the petroleum and energy vertical
VMM Networking Poster
Ad

Similar to Virtual Desktop Infrastructure Overview (20)

PDF
Dataplex Event 251109
PDF
TechNet Live spor 2 sesjon 3 - vdi overview
PDF
Microsoft the power of choice
PDF
Microsoft desktop virtualization_offerings - chris_estonina
PPTX
Get ready for tomorrow, today!
PDF
Sun/Oracle Desktop Virtualization
PPTX
Windows 8 Virtualization
PPTX
Client Virtualization
PPTX
What is new in xd 5.6 and fp1 061212
PPT
Virtual Desktop Battle Of The Giants
PDF
Citrix XenDesktop 5.5 seminar
PPTX
Virtualization get ready for tomorrow, today! - cr
PDF
Citrix virtual computing
PPTX
Desktop virtualization scott calvet
PPTX
Getting the most out of RDS (Terminal Services)
PPTX
Cloud infrastructure, IaaS
PPSX
Cvc2009 Moscow Xd3 Fabian Kienle Final
PDF
Walter hofstetter xen client enterprise digicomp
PPTX
Lecture Virutal Destop Infrastructure.pptx
Dataplex Event 251109
TechNet Live spor 2 sesjon 3 - vdi overview
Microsoft the power of choice
Microsoft desktop virtualization_offerings - chris_estonina
Get ready for tomorrow, today!
Sun/Oracle Desktop Virtualization
Windows 8 Virtualization
Client Virtualization
What is new in xd 5.6 and fp1 061212
Virtual Desktop Battle Of The Giants
Citrix XenDesktop 5.5 seminar
Virtualization get ready for tomorrow, today! - cr
Citrix virtual computing
Desktop virtualization scott calvet
Getting the most out of RDS (Terminal Services)
Cloud infrastructure, IaaS
Cvc2009 Moscow Xd3 Fabian Kienle Final
Walter hofstetter xen client enterprise digicomp
Lecture Virutal Destop Infrastructure.pptx

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Monthly Chronicles - July 2025
Electronic commerce courselecture one. Pdf

Virtual Desktop Infrastructure Overview

  • 1. Remote PCs: the what, why and when © 2007 Pride Technologies and Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 2. Definitions • Server Based Computing (SBC) − AKA Terminal Server Environment • Citrix XenApp (formerly Presentation Server or MetaFrame) • Microsoft Terminal Server • Virtual Desktop Infrastructure (VDI) − Virtual Machines running a desktop OS • VMware View • Citrix XenDesktop • Microsoft Hyper-V • Consolidated Client Infrastructure − Bladed PCs that reside in the Data Center • HP CCI • Blade-based Professional Workstations
  • 3. The need for Remote PCs Heterogeneity High Management Costs Admin Inefficiencies > 70% of TCO ($6,800* / user/ year) Too tactically focused ) *Gartner -IDC -IDC Security Threats Low Resource Utilization Need for preventive/ proactive measures Data Theft Virus / Malware The desktop is the least utilized resource on the Phishing Hacking network!
  • 4. Remote PC Benefits Close to IT Operations − Desktops are centralized in the Data Center − For VDI: Can reduce the amount of images to manage − Management tools access the “desktops” over local networks for patching/maintenance Increases flexibility − Enables pooling and sharing of desktop infrastructure − Improves disaster recovery plans − Roaming profiles allow users to access from any device − Can pair technologies such as VDI and SBC in a single solution Security − Remote users only ‘view’ data − For VDI: All data resides on RAID storage behind the firewall
  • 5. Building Blocks •Compute Nodes •Servers •PC or Workstation Blades •Storage •iSCSI •DAS •SAS SAN •FC SAN •Software •VDI Software •Connection Brokers •Management •HP ICE •Access Devices •Thin Clients/”Zero” Client •Reuse desktops/laptops •Services
  • 6. Distributed vs. Remote PCs What is the difference? Apps Apps Win OS Win OS Virtual Virtual Applications Machine Machine Application Windows OS Hypervisor Windows OS PC Blade Server Server Applications HP Session Citrix or Allocation Mgr Connection Broker Terminal Services Windows OS RDP/RGS RDP RDP/ICA Personal Computer Thin Client Thin Client Thin Clients Remote PC Distributed PC HP CCI HP VDI Terminal Server/Citrix • Single user per Desktop PC Multiple users accessing Multiple users accessing Single user per Blade PC virtual PC’s per server applications per server Current Paradigm Security and Data Backup Performance Lower Total Costs Standard Remote Access and Disaster Recovery Most Flexible Improved Environmentals
  • 7. “Static” or “Dynamic” Implementation Two Basic “Static” Model “Dynamic” Model Implementation’s Static 1:1 Every user assigned a VM connects by it’s IP Address or Name Connection Broker Dynamic Proliant/Blades Connection broker Running connects user to a Windows VMs VM in a pool and Or CCI HW returns VM to pool when the user disconnects
  • 8. Step 1: Access Device for Client Virtualization - Access device can be a thin client, a notebook or a desktop PC - Thin Client benefits - Eliminates end-user “break-fix” - Highly secure - Minimal management/updates (small image) - Reuse desktop/laptop - Users gets Windows XP or Vista -Standard PC applications work -Must still manage large images -Zero Client -No image at device -Only need to update a VM
  • 9. Step 2: Broker / Allocation Server - User inputs standard credentials (Name, Password, Smartcard, etc) - Broker determines correct resource for user (Blade PC, Virtual PC, etc) - Examples include: HP Session Allocation Manager, VMware View Manager, Pano Manager
  • 10. Step 3: Computing Resource Step 3: Resource Assigned Option #1: VDI - Virtual Windows Vista or XP loaded onto server - Multiple users per server (~8-10 per CPU core) - User is connected via remote protocol (RGS, RDP, ICA, Console Direct) to their “virtualized” client PC - Remote protocol transmits only keystrokes, mouse clicks and screenshots - No corporate / end user data is transmitted to the access device
  • 11. Step 3: Computing Resource Step 3: Resource Assigned Option #2: Blade PC or Workstation - Windows Vista or XP loaded onto local hard drive - User data folder-redirected to other storage - Dedicated performance to user while logged in - User is connected via remote protocol (RGS, RDP, ICA) to their “virtualized” client PC - Remote protocol transmits only keystrokes, mouse clicks and screenshots - No corporate / end user data is transmitted to the access device
  • 12. Protocol Overview Microsoft Remote − Standard Windows Remote Viewing Protocol Desktop Protocol − Good performance, supports audio output (RDP) − Supported by VMware Citrix Independent − Highly secure, encrypted traffic Computing − Bi-directional audio support Architecture (ICA) − High performance over WAN HP Remote − Superior graphics performance Graphics Software − Per-node Licensing required from Hewlett-Packard (RGS) − Supported by VMware − Superior graphics and USB performance Pano Console Direct − Optimized video with synchronized audio − VMware support only (requires Pano Zero Client device) − To be incorporated into VMware PC over IP (PCoIP) − High Performance; more forgiving for high latency
  • 13. VDI Benefits – Economies of scale VM management − One base image can be used for many different VMs • driver management is greatly simplified because all VMs use the same virtual hw − Templates can be created for rapid deployment of new VMs Utilize existing virtual infrastructure − Virtualized server and desktop spaces can leverage the same hardware, architecture, and infrastructure. − Automatic load-balancing and high availability including instant VM migration from host-to-host features. Desktop infrastructure − Underutilized desktop assets − 5w vs 20w vs 120w (Zero Client vs Thin Client vs PC)
  • 14. Sample Virtual Desktop Infrastructure on HP BladeSystem c-Class VMware: up to 20 XP users/core Citrix Xen: No CPU limits • Solution Sample for VDI: − 8 BL490c’s and 8 SB40’s − 4GB RAM per core − 8 NICs per Host − 80 VMs per blade − 640 users per 10U • Pair a BL490c with an SB40 • Solution will be 30% to 35% less costly • Each SB40 offers 1.5TB of than using DL380’s with MSA50’s RAID 5 storage • Solution will use ~30% less watts than • Virtualization Layer on Blade equivalent DL380’s & MSA50’s Hard Drives or with an • Less cables & networking costs Integrated Hypervisor • Equivalent response times to DL380 based solution.
  • 15. Identifying VDI Candidates No Guessing Allowed − Objective tests are critical − However: work with the user: User Acceptance is KEY! Make them feel that their opinions are important • Many companies are offering incentives to employees • Allowing them to select their own client device • Providing dual-monitors • Other creative examples
  • 16. The Basic Methodology for VDI Assess Categorize users and applications, identify use cases, measure usage, determine environment limitations and needs Monitor and adjust Identify target users resource allocations, and use cases, Manage provide software select technologies, Design upgrades and patches, model architecture support end users and capacity needs Virtualize applications, virtualize target desktops, migrate user settings and documents, deploy to desktops and terminals Deploy
  • 17. Gather Key Usage Metrics Dissolvable agent measures usage: • Per user, per app • Time in use • CPU • Memory • Disk • Network • Latency • Graphics intensity • Login duration • App load times
  • 18. Determine VDI Fitness Rating See how well specific machines, users and applications fit in VDI: • Analyze by group • Workload statistics • System CPU • User CPU • Memory Use Best Fit • Paging • Disk I/O • Network I/O • Advanced metrics Worst Fit • User logons • App loading • Network latency • Graphics intensity • Categorize workloads • Customizable ratings
  • 19. Performance characteristics • Near linear processor Scatterplot of %CPU for 70 VMs, 80 VMs, 90 VMs, 100 VMs 110 scalability 100 Variable 70 VMs 80 VMs 90 90 VMs %CPU Utilization 100 VMs 80 • Better than expected 70 60 memory management 50 40 • Storage controllers are 30 20 extremely important 06 15 :0 0 06 18 :0 0 06 21 :0 0 00 6 0: 00 00 6 3: 00 00 6 6: 00 20 20 20 /2 /2 /2 9/ 9/ 9/ 0 10 10 − More cache for direct attached 10 / 10 / 10 / 10 /1 Time 10 / 10 / • User experience is outstanding
  • 20. TCO savings by category: hard costs Category Savings Rationale Install/replace/ update/move (“IMAC”) 90% Thin Client (TC) at user desk; simple upgrades, rarely breaks, little need to move Break/fix support 90% Desk side: TCs rarely break Blades in data center: maintenance by fast and easy “rip and replace” Systems management 70% Radical image standardization and greatly simplified software (SW) deployment methodology Power Consumption 70% TC has minimal power draw; bladepc uses ultra low power CPUs Help desk 50% Radical image standardization with minimal opportunity to change SW image, minimizes Help Desk calls Training 40% Significant reduction due to simplified and radically standardized hardware and software How-to support 40% Significant reduction due to simplified and radically standardized hardware and software General operations 10% Due to ease of procuring and managing the centralized assets (i.e., blades). TOTAL 70% Total % based on %s weighted by actual dollar amounts Source: Meta Group, Gartner and HP Internal Analysis
  • 21. In Summary… • Address risks in delivering • Data secured in the technology to users datacenter, not vulnerable at Reduce and • Minimize security and the access device Avoid Risk compliance risk associated • Manage and secure desk- with traditional distributed based corporate IP via clients datacenter best practices • Manage client computing more efficiently with • Reduce costs by centralizing automated tools and best Reduce Cost desk-based management in practices the datacenter • Fewer desk-side support calls • Reduce end-user disruptions Service • Deliver improved SLAs with while delivering full desktop Levels your population experience • 3rd-generation HP Blade PCs • Blade PC/Wkstn technology • 2nd-gen HP Blade Technical Workstation at stage of maturity to deploy Innovation on enterprise-wide basis 21 29 September 2009 • True desktop experience
  • 22. http://www.hp.com/go/vdi http://www.hp.com/go/cci Questions and Answers