[Hamid Salehian]
Software that manipulates hardware.
Hardware
Hardware
VMM (Hypervisor)
VMM (Hypervisor)
Host
OS
Guest OS
Guest OS
Guest OS
Guest OS
Guest OS
Application
Application
Application
Application
Application
Bare metal architecture
XenServer, VMware ESX server, Hyper-V
Mostly for server, but not limited
OS-independent VMM
Hosted architecture
VMware Workstation, VirtualBox, Parallels
Mostly for client devices, but not limited
OS-dependent VMM
bin/libs
bin/libs
bin/libs
bin/libs
bin/libs
| - Desktop refresh is complicated and slow - One-off fixes are costly - Data security and compliance are at risk - Application conflict and impact performance |
- Rapidly update PCs or OS - Centrally fix and deliver patches globally at a lower cost - Centrally control track and secure date - Isolate application to improve performance and speed |
Physical World
Virtual World
also known as DaaS (Desktop as a Service)
End users connect to a remote desktop, but have a local experience
In a virtual desktop model the programs, applications, processes, and data are stored and run in a centralized server environment.
This allows users to access their desktops on any capable device, such as a traditional personal computer, notebook computer, smartphone, iPad, or thin client.
Every desktop user can utilize the same image
Dominant Products to build VDI: Citrix [XenDesktop, XenApp] VMware [View, ThinApp]
Desktop Location Independence
Hot-desking between Desktop PCs
Flexibly work from home and offsite contractor locations
Data Security & Compliance
Keeps data safe in the datacenter
Centralized tracking helps
Business Continuity
Quicker recovery from device malfunctions
Centralized data storage and backup reduces losses from stolen devices
Centralized Management
Reduced IT travel to user workstations for support
Improved desktop lifecycle management through quick access to centralized desktops.
VDI Server
Virtual Machines
Virtual Desktop Agent
VDI Client
VDI Protocol
Virtualization Management Platform
Session Broker
Virtual Desktop Client (VDC)
The converged end user device
Virtual Desktop Agent (VDA)
The control software reside in a virtual machine hosted in datacenter
VDI Protocol
Transport the necessary control commands and I/O data
VDI Server
Virualmachin Hypervsior to provide VMs
Session Broker
Distribute session from clients to VM
Redirect disconnected session of users back to their original VMs
Vritual Management Platform
Manage the servers
Provision VMs quickly
Use template and libraries of disk image to provision client OS in VM
Ensure there is always a pool of VM available for new session
Decision about a protocol depends on the device end users
| Microsoft Remote Desktop Protocol (RDP) |
− Standard Windows Remote Viewing Protocol − Good performance, supports audio output − Supported by VMware, Windows Hyper-V − Use UDP |
|---|---|
| Citrix Independent Computing Architecture (ICA) | − Highly secure, encrypted traffic − Bi-directional audio support − High performance over WAN − Use TCP |
| VMware PC over IP (PCoIP) | − To be incorporated into VMware − High Performance; more forgiving for high latency − Reducing bandwidth consumption over the LAN − Use UDP |
| Citrix High Definition End User (HDX) | − Multimedia redirection − Browser acceleration − Bandwidth control − Better Flash redirection and a new end-to-end flow control and frame-dropping capability. − better performance on WAN − based on ICA with massive improvement |
You Judge It
Hardware
VMM (Hypervisor)
Host OS
Application
Application
Application
Hardware
VMM (Hypervisor)
Host OS
Guest OS
Guest OS
Application
Application
bin/libs
bin/libs
Guest OS
Application
bin/libs
bin/libs
• From the inside it looks like a VM
• From the outside, it looks like normal processes
Hardware
Linux Kernel
Containers
Containers
Containers
Containers
Containers
SELinux
cgroups
namespaces
Drivers
Management Interface
Isolate processes from one another
1
2
3
4
5
6
7,1
8
8,2
9,3
10,4
namespace
(control group)
Control resource allocation to processes
Security-Enhanced Linux (SELinux) provides
secure separation of containers by applying
SELinux policy and labels.
2
Remember... (old Desktops)
Benefits
Special Benefits
Hardware
Pros
Cons
Application
Pros
Cons
Administration
Pros
Cons
powered by: slides.com
see more: https://slides.com/hsarena