siliconindia

Centralized Desktop & Presentation Virtualization

Author: Sudarshan Yadav
Sr Program Manager, Remote Desktop Virtualization, Microsoft India Development Center.
Information Technology (IT) is one of the important functions in an organization and is a key value generator. In the current economic condition, there is more pressure than ever before on IT departments to deliver business value, despite challenges such as shrinking budgets, rapidly changing technologies and increasing security issues.

Most organizations invest into single purpose hardware resources such as rich desktops and servers, resulting in a large numbers of underutilized hardware. Additionally, managing such hardware and software takes its own toll on IT departments and impacts deployment, configuration and support. A combination of these challenges can quickly exhaust the IT department’s resources, freezing innovation and proactive planning. Studies have shown that each year IT departments spend more than 70 per cent of their budgets to maintain existing systems, leaving only 30 per cent to spend on new capabilities that add business value. The key challenge for IT is to be able to strike the right balance between managing the organization’s existing infrastructure and adding business value.

Virtualization technologies make it possible to overcome these problems by decoupling various layers of IT infrastructure. By adopting virtualization technologies, IT organizations are able to visualize each layer as a set of logical resources and deploy these resources in an agile and efficient manner. A typical deployment has application, data, operating system (OS) and hardware layers. In a traditional setup each layer is tightly integrated that makes it extremely difficult to adapt to new business needs which often require many of these layers to change. For example, if an organization needs to deploy a new LOB application which does not work on existing desktops due to higher configuration requirements or OS compatibility issues, the IT department is forced to go for desktop hardware upgrade, or rewrite the application. More often than not, these solutions are very expensive from both acquisition and maintenance perspective. Virtualization has the potential to transform the IT infrastructure by optimizing server deployments, faster application deployments, reducing downtime, risks and costs and improving the overall agility of the IT organization.

Presentation virtualization, which is one of the core virtualization technologies, makes it possible to run OS or application in one location while it can be controlled from another. Adoption of this technology unbinds the OS and application layer from the hardware layer. With presentation virtualization, OS or applications are installed and run on centralized servers in the datacenter with screen images being delivered to the users’ machines. The user’s client machine sends keystrokes and mouse movements back to the server. A good implementation of the presentation virtualization technology should provide good user experience on high latency networks and support device redirections such as printers and ports.

Below are some of the key benefits of centralizing desktop & application through presentation virtualization.

Reduced cost of ownership

When OS or application is deployed on a central server and shared among users, it drastically reduces maintenance costs.

* Ability to use thin-client in place of rich client reduces acquisition & maintenance cost. Maintenance of a thin client is less then 10% of a regular desktop.

* Less IT workforce is needed at branch offices, as the application and OS are maintained at the central data centre.

Agile application and OS deployments

*Application can be made available from server to client desktops on which the application cannot run natively. Desktop hardware upgrades are not required to deploy new applications.

*Higher flexibility to upgrade and provision OS to the users.

Improved Worker Efficiency

*Remote or mobile workers can easily connect to critical resources from branch office, home computer or airport kiosks that are not installed on the local client machine.

*Instantly Web-enables native Windows applications without costly re-coding.

Securing Data and Applications

*As applications and data reside in the datacenter, risk of data theft when a laptop is lost or stolen is eliminated.

*Adherence to regulatory compliance rules becomes easier.

The rapid development of virtualization technologies have led to the emergence of multiple options for centralized desktop and application deployments, with each having its own advantages and shortcomings. Traditional Session (terminal services) based deployment option is still the most scalable and high performance solution. The session based option is based on the capability of Windows server to create multiple sessions on single instance of OS. With this option, administrator installs and manages a complete desktop on centralized servers in the datacenter and users connect to through presentation virtualization technology. The administrator can also restrict the presentation to a specific application in place of a complete desktop. This option benefits task or office workers who require access to an entire desktop that contains few simple applications or specific applications which is not suitable for the client’s machine.

However, there are limitations with this solution. Users cannot get administrative rights to the machine as that can impact users working on other sessions on the same machines. There are also application compatibility issues due to OS compatibility with the applications and application concurrent execution.

Client VM (Virtual machine) based centralized desktop deployment is another leading option for centralized desktop deployments and is also known as VDI (virtual desktop infrastructure). In this option, client OS is hosted on servers in the datacenter and the user connects to it remotely using presentation virtualization. The user can be assigned a dedicated VM, so that all user data (such as My Documents) and profile information (personalization) are retained on the VM image. This deployment is suitable for knowledge workers (eg. software developers or testers) who require administrator rights to have full control over their virtual desktop to deploy their own applications and to customize environment.

Another deploying option is through pooled VMs that are identically configured. Pooled Virtual Desktops are best suited for office or task workers who need to work on some standard applications and do not require personalized desktop configuration or customization. In this configuration, when a user’s session ends the data is not stored on the virtual machine. A typical configuration uses folder redirection to save data to another server so it is available when the user logs in next time but no configuration data is saved between sessions. The VM based option overcomes the limitations of session based deployments of administrative rights and application compatibility but it is less efficient in terms of the number of users that can be accommodated on the server hardware. For example, session based infrastructure can accommodate almost ten times the number of users than a VM would on the same server hardware for the information worker scenario.

New developments are taking place in VDI technology, which will make the client VM image move along with the user when the user does not have access to the datacenter. This will help an IT organization to have a client VM image as per prescribed standards, while allowing employees to use their personal laptops at work and when offline. Broader hypervisor support on laptop hardware and enhancements to the VM differential disk technologies are needed for these initiatives to be successful. Similarly, in the recent times cloud based computing is also becoming popular but the current focus is on the web applications & services. At some stage desktops as a service from cloud will be a reality, but it will take several years to be viable option for centralized desktop deployment.

The multiple centralized desktop options available today make it possible for organizations to utilize their IT resources more efficiently. However, organization must evaluate the options and then decide what works best for their business needs. Centralized desktop is not suitable in all circumstances. For example, if the desktop is primarily used for high-end multimedia applications, rich desktop is still the best choice. Don’t forget, it is not “all or nothing” proposition, you can use a mix of rich and centralized desktop and bring in the benefits of both options.
Previous  article
Next article
 
Write your comment now

Email    Password: 
Don't have SiliconIndia account? Sign up    Forgot your password? Reset
  Cancel
Reader's comments(3)
1: From: Mrs. Mary David

This mail may be a surprise to you because you did not give me the permission to do so and neither do you know me but before I tell you about myself I want you to please forgive me for sending this mail without your permission. I am writing this letter in confidence believing that if it is the will of God for you to help me and my family, God almighty will bless and reward you abundantly. I need an honest and trust worthy person like you to entrust this huge transfer project unto.

My name is Mrs. Mary David, The Branch Manager of a Financial Institution. I am a Ghanaian married with 3 kids. I am writing to solicit your assistance in the transfer of US$7,500,000.00 Dollars. This fund is the excess of what my branch in which I am the manager made as profit last year (i.e. 2010 financial year). I have already submitted an annual report for that year to my head office in Accra-Ghana as I have watched with keen interest as they will never know of this excess. I have since, placed this amount of US$7,500,000.00 Dollars on an Escrow Coded account without a beneficiary (Anonymous) to avoid trace.

As an officer of the bank, I cannot be directly connected to this money thus I am impelled to request for your assistance to receive this money into your bank account on my behalf. I agree that 40% of this money will be for you as a foreign partner, in respect to the provision of a foreign account, and 60% would be for me. I do need to stress that there are practically no risk involved in this. It's going to be a bank-to-bank transfer. All I need from you is to stand as the original depositor of this fund so that the fund can be transferred to your account.

If you accept this offer, I will appreciate your timely response to me. This is why and only reason why I contacted you, I am willing to go into partnership investment with you owing to your wealth of experience, So please if you are interested to assist on this venture kindly contact me back for a brief discussion on how to proceed.

All correspondence must be via my private E-mail (dmary4love1@yahoo.fr) for obvious security reasons.

Best regards,
Mrs. Mary David.
Posted by: mary lovely david - Monday 26th, September 2011
2: itz tym to virtualize
Posted by: sajin k hentry - Monday 11th, April 2011
3: Wow Good .
Posted by: MOHAMMAD MOTIUR RAHMAN - Tuesday 18th, August 2009
More articles
by Kaushal Mehta - Founder & CEO, Motif Inc..
The retail industry is witnessing an increased migration of customers from traditional brick and mortar retail to E-commerce (online retail)...more>>
by Samir Shah - CEO, Zephyr .
You probably do because you are on the phone with them! For all of you working in some technical management capacity here in Silicon Valley,...more>>
by Raj Karamchedu - Chief Operating Officer, Legend Silicon .
These days are a mixed bag for me. Of late I have been considering "doing something bigger and better," in my life, perhaps seriously though...more>>
by Madhavi Vuppalapati - CEO of Prithvi Information Solutions .
IT Services Rise of Tier II companies The Indian IT outsourcing industry is going through very exciting phase in its business life...more>>
by Bhaskar Bakthavatsalu- Country Manager, India and SAARC of Check Point Software Technologies.
Data loss occurs every day through corporate email. In fact, given the sheer number of emails an organization sends every day, data loss inc...more>>