VDI

Report
Sébastien Pittet & Lionel Zufferey
Desktop Location
Independence
Hot-desking between Desktop
PCs
Flexibly work from home and
offsite contractor locations
Data Security &
Compliance
Keeps data safe in the
datacenter
Centralized tracking helps
simplify the burden of
regulatory compliance
10
Business Continuity
Centralized
Management
Microsoft Confidential
Quicker recovery from
device malfunctions
Centralized data storage and
backup
reduces losses from stolen
devices
Small and large scale deployments: Microsoft + 3rd Party Connection Broker
(CITRIX XenDesktop)
Remote App
3rd Party Connection Broker
Centralized
Desktop
(VECD)
XenDesktop
Citrix XenDesktop
Administrator’s
Console
Interface
XenDesktop
Setup Tool
Citrix License
Server
Web
Citrix Desktop
Delivery Controller
Windows
PowerShell ™
Citrix Provisioning Server
Citrix XenDesktop
Agent
Virtual Machine
Citrix XenDesktop
Agent
Virtual Machine
Citrix XenDesktop
Agent
Virtual Machine
Vista Enterprise Centralized Desktop (VECD)
Thin clients, client PCs without Software Assurance, & 3rd party
owned devices
Client PCs with Software Assurance
Annual subscription in addition to Windows Software Assurance
Annual subscription which includes Windows Software Assurance
Option to purchase MDOP
Option to purchase MDOP
Re-assignment rights after 90 days to any SA covered PC
Re-assignment after 90 days
Listed at $23/year/ device (Retail ERP)
Listed at $110/year/device (Retail ERP)
Count Total Number of
Devices
Establish rich and Thin
client Numbers for VECD
User Licensing
Calculator for other
licensing components
Should I be using TS?
Image management & Storage
Roaming Profiles
Patching
Application Deployment
Network
Sysprep
Provide unique environment for each and
every user ?
Customize every environment with different
apps and settings ?
Grant users more control to allow them
install and modify applciations ?
Run apps that are not multi-user friendly?
Terminal Services
(Sessions)
VDI (VMs)
Technology Maturity
Proven
Emerging
Scalability
Higher ratio of users/server
Lower ratio users/server
Isolation/Security
Session-based isolation
Shared OS across users
Must run as standard user
VM-based isolation
Dedicated OS per user
Can run as admin
Remote User Experience
Protocol-dependent
Protocol-dependent
User Flexibility
User is running as a user
User can have full rights
Application Compatibility
Windows Server OS
Windows Client desktop
Availability of Skilled IT Staff
High (TS experts)
Low (VM experts)
2 Primary Models:
Personal VM’s – 1 VHD per user, VHD state full
Temporary Pooled VMs – VHDs shared between users, state reset
at logoff
Personal VMs: Day 1
Day 2
Day n
• How Important are these 2 scenarios?
User 1
Day 2
Day n
• What % of your VDI user population
will use each scenario?
User n
Day 2
Golden
Image
Clone
Temporary
Pooled VMs:
Pool
1
Golden
Image
Day 1
User 1
Day n
Day 2
Day 3
• In the pooled VMs how do you plan to
handle user state?
• In pooled VMs how often do you hope
to ‘refresh’ the pool with new images?
User 1
Clone
n
• What type of users will use each
scenario?
User 1
• What features do you need to help
place and mange these VMs?
• What type of load management?
• Support for VM libraries?
User state can bloat VHD
DO:
Use roaming or mandatory profiles.
Use folder redirection
Place profile servers close to VDI hosts
Don’t:
allow folder synchronization if using pooled vm
Place OSTs / PSTs in redirected folders or
profile
User pro-quota to stop users abusing their
desktop
DO:
Have planned patching cycles
Understand how pathing will affect re-creation
of master images
Understand how patching will affect VHD size
over time
Use automated patching services
Use App-V to reduce patching of apps in image
DON’T:
Allow patching to dictate use of pooled vs
personal
More apps in image = more disk
More apps in image = hard to patch
More apps in image = more ‘golden images’
Consider deploying ubiquitous applications in image
Consider using App-V ability to redirect user state to
network location (not into profile)
Suite applications that need to run together
Network bandwidth planning is key:
Plan for use of profiles and redirection
Plan for per user bandwidth required for RDP /
ICA etc
Ensure the host VM server has adequate NIC
bandwidth to other server infrastructure
(applications, file, print etc)
Make sure the user of SAN to host the VHDs is
factored if SAN will run over an IP network
Microsoft Confidential
VDI with Windows Server 2008 R2 and
Windows 7
Large scale, complex deployments: Microsoft + CITRIX technology
Small scale, simpler deployments: Microsoft only technology
Remote App
R2
VECD
for
Connection Broker Options
Large
scale
XenDesktop
OR
R2
Small
scale
R2
28
Connection Brokering Architecture
Active
Directory
3. Query Personal Desktop for User
Connection Broker
2.Get Target
Machine
4.Query/
Start VM
5.Return
Target Machine
RD Redirector
1.Connect to
MyPersonalDesktop
Client
6.Redirect
To Machine
RDV Host Agent
Hyper-V
VM
TSV
TSV
TSV
VM
Consolidation Rate
Client devices :
5-7 VMs
by
Hosts’Core
Some Pros
Best of both world
Virtualization benefits
A PC for each user
Data Security
Instant provisioning of new
desktops
Mobility
Multiple Desktops
Some Cons
Network dependency
Availability
Latency impacts
Can be complex
VDI Make Sense! (download link)
Desktop Virtualization Strategy (link)
BLOG (Deployment Guys), article VDI (link)
Step by step guide (link)
Formations LANexpert
Workshop VDI
Microsoft
Citrix
http://www.lanexpert.ch/training
Programme détaillé disponible
Sécurisation par GPO
Portail Web
DataCenter
LAN Users
External Users
27 Janvier 2009
C Beaugrand - LANExpert
14 – 15 avril 2010, CICG
Premium Sponsoring Partners
Classic Sponsoring Partners

similar documents