101 cd 1445-1515
-
Upload
chiou-nan-chen -
Category
Technology
-
view
349 -
download
0
Transcript of 101 cd 1445-1515
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1
Cisco Desktop Virtualization Solution
Sept, 2012
Robert Feng
TSA
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
2
•Desktop Virtualization Market Trend and Business Driver
•What is Desktop Virtualization?
- Desktop Virtualization Models
- Desktop Virtualization Users Classification
- Desktop Virtualization Architecture – VMware View
•Cisco VXI Vision
•Desktop Virtualization Challenges
•Cisco UCS Desktop Virtualization Advantage
•Conclusion
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
3
Rising Desktop
Management Costs
Windows 7, 8
and PC Refresh
Users Want Access
Anywhere, Anytime
Success of Server
Virtualization
Data Security
and Compliance
Explosion of
New Devices
3
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
4
30%
16%
6%
HVDs % of Enterprise Desktops
Current
In 24 Months
18%
45%
37%
Already deployed some
HVDs
Deployed
Plan to Deploy
No Plan
0
10
20
30
40
50
2010 2011 2012 2013
Gartner HVD Forecast
Source: Gartner HVD Forecast 2010-
2014, Dec. 2010 Source: Morgan Stanley, ―Hard Data on Virtual Desktop ROI & Adoption, May 2011
In 12 Months
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
5
• Personal Computer is disaggregated
• Keyboard, Video, and Mouse stay with user
• Compute and storage move to the data center
• Network availability is required for all application access
• Network performance is critical to user experience
Broker
Compute Storage
Keyboard, Video, Mouse
Network
Thin Client
• Large OS
• Many local
applications
• Vulnerable
• Constant patching
• Data backup
• Complex management
• Software distribution
delivery challenges
• Skilled local support
staff required
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
6
Remote Workers
Call Centers
Administrative &
Clerical
Schools
Task Worker
Professionals
Researchers
Knowledge Worker
Design
Professionals
Mobile Workers
Power User
Custom Programs
Install Requirements
Office Applications
“Administrator Intended Applications”
Candidates for Thin
and Rich Clients Rich Clients Needed – Dynamic Virtual Clients
Devices End Users Need
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
7
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
8
WAAS
Virtualization-Aware
Borderless Network
Routing PoE
Switching
CDN
Cisco®
Identity
Services
Engine
End-to-End Management and Optimization
Hypervisor
Virtualized Data Center
ACE Unified
CM
Quad
ASA Nexus
1000v
Virtual Security Gateway
WAAS
Compute
UCS
AnyConnect
Desktop Virtualization Software
Storage
Applications/Desktop OS
Virtualized
Collaborative Workspace
Cisco VXC 6215
Thin Client
Cisco Virtualization Experience Clients
Cius Business
Tablet
Cisco VXC 4000 PC
Client
Cisco VXC
22xx & 21xx
Zero Client
AnyConnect
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
9
Virtualization-Aware
Borderless Network
End-to-End Management and Optimization
Hypervisor
Virtualized Data Center
Compute
UCS
Desktop Virtualization Software
Storage
Applications/Desktop OS
Virtualized
Collaborative Workspace
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
10
• Desktop Virtualization Density and Scalability
ROI calculation
• Simple and efficient Desktop Management
Rapid provisioning of new virtual desktop infrastructure
• Desktop Virtualization Security
User desktops now sit amidst other applications and assets in the Data Center
Enterprise assets could present larger ―attack surface‖ for compromised user desktops
• Delivery of various Virtual Desktop Pools needs to be prioritized
Co-resident workloads can compete for resources, impacting user experience
• Virtual Desktop performance especially for application virtualization
Need consistent and predictable performance as user population grows
• poses unique challenges on Data Center and networking infrastructure
• User behaviors, login storms, AV scans
• Shared storage I/O patterns (IOPS)
• CPU / Memory demands
• Requires hypervisor–aware security and networking architectures
• A Desktop-Optimized Infrastructure delivers:
• Visibility, Security and QoS administration at the virtual desktop level
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
11
• A single system that unifies
–Compute: Industry standard x86
–Network: Unified fabric/Wire once
–Storage Access: Unified fabric/ Wire once
• Embedded management
–Increase scalability
–Dynamic resource provisioning
–Ability to integrate with broad partner ecosystem
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
• 175 Desktops on B230 M2
Knowledge Worker Profile (no Flash)
384 G memory, Dual E7-2870 / 10 Core CPU
EMC VNX 5500 Storage
• 186 Desktops on B200 M3 • Knowledge Worker Profile
• 384 G memory, Dual E5-2690 / 8 Core CPU
• EMC VNX 5500 Storage
Industry-leading
Density on
2-socket servers
Source: Principled Technologies White Paper
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Me
mo
ry
CPU
Unified Fabric (FCoE)
• Lower cost for compute + network infrastructure
• Greater virtual desktop density without performance impact
• Simple Operation—start in minutes, scale in seconds
• Massive Scalability—scales easily to 1000’s of desktops per UCS system
• Extended memory and I/O to avoid desktop virtualization bottlenecks
Cisco UCS
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
LAN SAN A
SAN B
Mgmt
Infrastructure
Management Domain
(~20K desktops)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Reduced Points of Management
Single-click configuration of LAN, SAN and firmware parameters
Service Profile: HR-App1
Network: HR-VLAN
Network QoS: High
MAC: 08:00:69:02:01:FC
WWN: 20:65:32:25:B5:00:A4:28
BIOS: Version 1.03
Boot Order: SAN, LAN
• Unified Management Domain
Automatic discovery
Dynamic Provisioning
• Building Blocks of Resources for rapid provisioning
• Simplify infrastructure management for datacenters
Tightly Coupled Partner Mgmt. Tools
XML API
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• Client LAN Features
Port Security prevents CAM attacks, DHCP Starvation attacks
DHCP Snooping prevents Rogue DHCP Server attacks
Dynamic ARP Inspection prevents current ARP attacks
IP Source Guard prevents IP/MAC Spoofing and a wide variety of TCP/UDP splicing and DoS attacks
• Virtual Ethernet Module (VEM)
Networking capabilities at the hypervisor level
L2 switching, CDP, Netflow, ACLs, QoS, SNMP, SPAN, etc
Local Switching
Port Profile to simplify Network Policy
• Virtual Supervisor Module (VSM)
Mgmt, monitoring and config of VEM instances
Sees each VEM as a virtual chassis module
Configuration done through port-profiles
Tight integration with Virtual Center
Runs on dedicated appliance or virtual machine
• Virtual Chassis Concept
Redundant Supervisors (VSMs)
Currently up to 128 VEM instances (128 ESX hosts)
Presents a network view of the virtual access layer
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG and VM-FEX providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG and VM-FEX providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• Options:
Application Virtualization - Citrix XenApp, VMware ThinApp, Microsoft App-V
Hosted Shared Desktops – Citrix XenApp, Microsoft Remote Desktop Services
• UCS Application Virtualization Optimizations with VM-FEX
Deterministic latency behavior for applications
Reduction in latency
Improved performance (reduction in hypervisor code path)
• Application Traffic Monitoring and Diagnostic capability
App level networking visibility
Statistics, events and faults on per app basis to fine tune performance
VLAN based SPAN on application basis to diagnose advanced issues
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Hypervisor Hypervisor
UCS 6100
VM VM VM VM VM VM VM VM VNIC
UCS Server UCS Server
VM-FEX Basics
Fabric Extender for VMs
Hypervisor vSwitch removed
Each VM assigned a PCIe device
Each VM gets a virtual port on physical switch
VM-FEX: One Network
Collapses virtual and physical switching layers
Dramatically reduces network management points by eliminating per host vSwitch
Virtual and Physical traffic treated the same
Host CPU Cycles Relief
Host CPU cycles relieved from VM switching
I/O Throughput improvements
UC
S V
IC
UC
S V
IC
VETH
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Up to 50% increase in
Application performance
Up to 67% reduction in
Application latency
Near linear deterministic
Application delivery with
scale
Performance Low Latency Deterministic Delivery
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Application Performance Optimizations VM-FEX delivering deterministic performance
Prioritization of Desktop Pools / Workloads UCS QoS and bandwidth controls deliver prioritization to desktop pools
Rapid Provisioning of Desktops Service profile templates for rapid provisioning of desktop pools
Networking Visibility and Security to the Desktops Nexus 1000V with VSG providing VM level controls
Desktop Virtualization Ecosystem Partners and Validated Design Desktop virtualization partners and validated performance optimizations
Desktop Density and Scalability Great virtual desktop density with linear performance scalability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 29
Integrated Support
Roadmap / Solutions
Performance / SLA
Time to Market
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
• Storage - one of the most critical aspect of implementing VDI
• Capacity
Linked vs Full Clones vs Provisioned
Personalized desktops
User capacity
• IOPS
Boot storms, login storms, AV updates/scans
IntelliCache, VMware’s CBRC, Write Cache
• Protocol/Connectivity
NFS/block (for XS, ESX), CIFS/block (for Hyper-V)
• Storage/DC Services
DR/HA, Application Mobility, backup
Infrastructure
VBLOCK FLEXPOD Standard Configurations
www.cisco.com/go/vdi
www.cisco.com/go/designzone
Validated Designs
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
• CVDs
Citrix XenDesktop 5.6 on FlexPod based on Microsoft Private Cloud B230 M2 blades, UCS 2.0 software, FC SAN connectivity
Citrix Provisioning Services 6.1
Microsoft Hyper-V 2008 R2 SP1
http://www.cisco.com/en/US/docs/unified_computing/ucs/UCS_CVDs/ucs_xd56_flexpod.html
Citrix XenDesktop 5.6 with EMC VNX 5500 on vSphere 5 (2000-seat)
Initial launch with EMC VSPEX program
(Other reference architectures for 500-seat, 1000-seat VDI environments)
• Whitepapers
NexentaStor on Cisco UCS C-Series Rack Mount Servers: Storage Platform for Desktop Virtualization
PT: Cisco UCS B230 Blade Server: Uncompromised virtual desktop performance
PT: Virtual desktop management with Cisco UCS and VMware vSphere
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Data Center Content:
• SAVTG VDI Solutions Page (link)
• VXI Data Center IWE (link)
• www.cisco.com/go/vdi
• www.cisco.com/go/vdidesigns
• ResComp Sizing Tool
• Principled Technologies Reports
VMware Performance (link)
Citrix Scale/Perf. (link)
Citrix TCO (link)
HP Competitive (link)
VMware B200 M3
VMware Manageability/QoS
Citrix B200 M3
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
• Cisco understands Desktop Virtualization and its challenges
• Cisco UCS is the ideal platform for Desktop Virtualization (key strengths/advantage described earlier)
• Cisco has a complete end-to-end vision on Desktop Virtualization
• Cisco, together with strong ecosystem partners, can successfully deliver optimized desktop virtualization solutions
• Cisco’s validated virtual desktop design collaterals are available
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
38
Connect to Connection Broker
1
Thin Client
Thick Client
Smartphone/iPad
Query for
user
policy
2 Start
target
VM
4 Identify
target VM 3
Display Protocol
Authentication
Connection Broker
Active Directory
Virtual
Infrastructure
Management
5 Return
VM to
endpoint
Virtual Infrastructure
Connect
VM to
endpoint
6 7 Successful
connection
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
39
Shared Hosted Desktops Application Streaming
Stream to Physical Desktop Hosted Virtual Desktop
Server Hosted Computing Client Hosted Computing
O/S
De
sk
top
A
pp
lic
ati
on
Terminal Server
Display Data
OS
App App
Server
App
OS
App
Main OS
Guest OS
Guest App
Hypervisor
Apps
OS
Apps
OS
Apps
OS App
Server
Synchronized
Desktop
OS
OS
Apps
OS Apps
OS Apps
OS Apps
OS
Display Data
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
• Non-Persistent or Pooled
Generic virtual desktop assigned to users on a per session first come first server basis and then returned to the pool (possibly with profile removed) or destroyed
• Personalized
Thin Provisioned Desktops with Persistence/Personalization
• Persistent or Assigned
Permanently assigned to a user statically or by first to connect
Users and
Groups
Desktops Pool of Virtual
Machines Entitle Group
to Desktop Assign
Pool
Entitle User to
Desktop Assign
Individual
Personalized
Pooled
Desktop
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
• One bad application can kill Virtual Desktop deployment
• Anti-Virus Storms can seriously impact performance
• Anti-Virus Offloading
• McAfee MOVE (Management Optimized for Virtualized Environment)
• TrendMicro Deep Security Agentless Anti-Virus
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
• MOVE-AV (McAfee Management for Optimized Virtual Environments) is validated
• MOVE-AV on a UCS B250 M2 with XenDesktop 5 and ESXi 4.1 with Windows 7/32 bit desktops and NetApp for storage are provided below.
• The impact of adding MOVE-AV with a default scan policy to a Knowledge Worker workload running on a UCS B250 M2 is a ~10-15% impact to VM density. Source:
http://www.2mul.com/en/US/docs/solutions/Enterprise/Data_Center/VXI/CVD/VXI_C
VD_Citrix.pdf