Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium,...
-
Upload
rachel-mccall -
Category
Documents
-
view
224 -
download
4
Transcript of Revision - 01 Intel Confidential Copyright © 2009 Intel Corporation Intel, Xeon, Centrino, Itanium,...
Revision - 01
Intel Confidential
Copyright © 2009 Intel Corporation
Intel, Xeon, Centrino, Itanium, vPro, Core, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
*Other names and brands may be claimed as the property of others.
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL ® PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS.
Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.
No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses.
Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance.
All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Legal Disclaimers
Intel Confidential
Evaluating Thin Clients & Alternative Compute Models
Chee Pung LoyIntel Americas
Channel Solutions Account ManagerOctober 2009
Revision - 01
Intel Confidential
Members Only Members Only WebsiteWebsite
Subscribe today. It’s FREE!
Stay Connected Intel Premier IT Professional (IPIP) Program
Exclusive Exclusive MagazineMagazine
Events Events & Networking& Networking
• 14 events in US & Canada
• Analyst presentations & whitepapers
• Intel technology roadmap
• Intel IT best practices
• ISV presentations
• Participate in online social media
• Download up-to-date technical resources
Monthly Monthly NewsletterNewsletter
Revision - 01
Intel Confidential
Evaluating Thin Clients & Alternative Compute Models
• IT Business Perspective
•Different compute models
•Future Perspective
•Ecosystem & Intel
Revision - 01
Intel Confidential
Executive Challenges
IT Business Challenges
Improve Security and Simplify Management
Minimize risk, streamline operations
Business Continuity
High availability and accessibility of applications,
data, collaboration
Growing Complexity and TCO
Budgetary pressure to cut operating expenses
Business Responsiveness
Flexibility and agility to deliver applications depending on
location and device
Revision - 01
Intel Confidential
IT Under Pressure: Response
Growing complexity and TCO
• Budgetary pressure to cut costs
Business Continuity
• Highly availability and accessibility of applications, data, collaboration
Improve Security and Simplify Manageability
• Minimize risk and streamline operations
Business Responsiveness
• Flexibility and agility to deliver applications and data
Improved Client Management and Security
Capabilities
New Software and Data Delivery Models
Pain Points
Response
Drive for Centralized
Control Via…
+
The Dynamic Virtual Client
Revision - 01
Intel Confidential
Lets look at what Gartner has found
“The total cost of ownership of server-based computing is from 12 percent to 48 percent less
than for comparable PCs.”
- Gartner, June 2006
Revision - 01
Intel Confidential
Gartner’s Path to 48% TCO Reduction from an Unmanaged Desktop
-15%
-25%
-7%
-1%
Total: 48% TCO Reduction
Reduction from better mgmt:
40%
Reduction from server-based model: 8%
StartUnmanaged Windows* XP
Desktop
Typically Managed Windows XP Desktop
Well-Managed Windows XP Desktop
Windows-Based Terminal (32-Bit)
Windows-Based Terminal (64-Bit)
Unmanaged Windows* XP Desktop
Typically Managed Windows XP Desktop
Well-Managed Windows XP Desktop
Windows-Based Terminal (32-Bit)
Windows-Based Terminal (64-Bit)
*Other names and brands may be claimed as the property of others.*Other names and brands may be claimed as the property of others.
Revision - 01
Intel Confidential
Adoption of Virtualization and Streaming
“A NEW information technology discipline is emerging around application delivery to control
desktop management costs and security… the next generation of
delivery is application streaming.”
--Martin Gilliland, Gartner
“In the future, IDC believes that application virtualization and streaming technology will become an increasingly common way for many IT organizations to deploy and manage applications.“
--Mike Rose, IDC
Enterprises are Seeking New Application Delivery Methods
Source: IDC, 2008
Revision - 01
Intel Confidential
Spectrum of Compute Models
Mobile Capable
Off-Network Option
Network Connected Only
OS+App Streaming
App Streaming
Local, Rich Client
1:1 Blade PC
Virtual Container
Web-Based Apps
Terminal Services
Virtual Hosted Desktop
1:Many Blade PC
Client-Side Compute & Centralized or Local
Data Storage
OS+App Streaming
App Streaming/
Virtualizaton
Distributed, Rich Client
1:1
Blade PC
Virtual Containers (Emerging)
Web-Based Apps
Terminal Services
Virtual Hosted Desktop
1:Many Blade PC
Client-Side Compute,
Centralized Data Storage
Server-Side Compute & Centralized Data Storage
Revision - 01
Intel Confidential
Virtual Container Video
Revision - 01
Intel Confidential
What is the Right Solution for My Business ?
IT Requirements
SecurityImage Management
License ManagementSupport StructureDisaster Recovery
User ExperienceMobility
ResponsivenessCustomizationConnectivity
Ownership and Privacy
Available Infrastructure
ServersStorage
Space, Power, CoolingNetwork Bandwidth
Budget Priorities
Application WorkloadsCompute LoadGraphics Load
Delay Sensitivity (i.e., Video, VOIP)Headroom
Evaluate for Each User Segment
Appropriate Solution is a Balance of Many Interrelated Factors
Revision - 01
Intel Confidential
Mixed Delivery Models Often Required to Meet All User and IT Requirements
Construction Estimator
University Student
Marketing Staffer
Call Center Representativ
e
Terminal Services
Scheduling database
Purchasing database
Order database
Virtual Hosted Desktop
Remote access to standard dept image
Streaming Technology
CAD packageCourse-specific
applicationsPhoto & video
editing packages
Local InstallOffice apps,
Browser
Office apps, Browser, Media
players
Office apps, Browser, Media
players
Appropriate Device
Laptop PC Laptop PCLaptop or
Desktop PCDesktop PC or Thin terminal
Revision - 01
Intel Confidential
Real World Solutions May Mix Models
•Diverse user and IT needs will likely result in hybrid models– Same user accesses software through multiple models
•100% single-model deployments may be rare– Single model may make sense when security, management and
workload requirements are unlikely to change over time
•Selected client devices should accommodate the most demanding requirements of target users– Desktop & laptop PCs provide most flexibility for all models
– Thin terminals appropriate for 100% server-side deployments
Revision - 01
Intel Confidential
Compute Model Taxonomy
Terminal Services
(aka Session Virtualization)
Virtual Hosted Desktops(aka Virtual
Desktop Infrastructure)
OS and Application Streaming
Application Streaming
(aka Application Virtualization)
Virtual Containers
Rich, Distributed Computing
(aka Rich Client, Fat Client)
Execution Server-based Server-based Client-based Client-based Client-based Client-based
Application Executable Storage
Server Server ServerServer
(Client caching option)
Server (Client caching option)
Client
Application Data Storage
Server, NAS or SAN
Server, NAS or SAN
Server, NAS or SAN
Server, NAS or SAN (Client
caching option)
Client, Server, NAS or SAN
Client, Server, NAS or SAN
Mobility / Off-Network Operation
No No No Yes Yes Yes
Local Device Synchronization (bar code reader, PDA, phone, etc.)
No Limited Yes Yes Yes Yes
Acceptable ClientsTerminal, Desktop
PC, Laptop PC
Terminal, Desktop PC, Laptop PC
Desktop PC, Laptop PC
Desktop PC, Laptop PC
Desktop PC, Laptop PC
Desktop PC, Laptop PC
Major Providers Citrix*, Microsoft* VMware*, Citrix CitrixMicrosoft, Citrix,
LANDesk*, Altiris*, AppStream*
VMWare vClient*Microsoft Med-V*
Traditional PC software providers
NAS = Network Attached StorageSAN = Storage Area Network *Other names and brands may be claimed as the property of others.*Other names and brands may be claimed as the property of others.
Revision - 01
Intel Confidential
Processor Chipset Network
Intel® Core™2 Duo
Intel® Core™2 Quad
Intel®Express Chipset
Intel® Gigabit Network
Intel® Anti-Theft
Technology
Intel® Active Management Technology
Intel® Virtualization Technology
Intel® Trusted Execution
Technology
Intel® vPro™ Technology
Intel vPro Technology: Virtualization, Security, and Management
Revision - 01
Intel Confidential
Intel® vPro™ Technology
Intel® Anti-Theft
Technology
Intel® Virtualization Technology
Intel® Trusted Execution
Technology
Intel® Active Management Technology
Secured Virtualization for New Compute Models
Virtual Containers
Clients
Local OS
Virtual Container
Virtualization
Hardware
Partition Manager
Partition 1 Partition n
Guest OS
App App
Guest OS
App App
Protection from within
Protection between partitions
Physical hardware protection
System Protection
Protection from outside
Trusted Platform Protection Areas
Streaming Server
Master OS
image
Master Apps
image
Revision - 01
Intel Confidential
Intel® vPro™ Technology
Intel® Anti-Theft
Technology
Intel® Virtualization Technology
Intel® Trusted Execution
Technology
Intel® Active Management Technology
Enhanced Security and Manageability for New Compute Models
OS Streaming
or Remote OS Boot
Application streaming & virtualization
Virtual Containers
OS Streaming
Clients
Virtualization
Virtual Application
Local OS
Virtual Container
Virtualization
Revision - 01
Intel Confidential
Summary
•Software delivery models have evolved and IT has more choices than ever
•The appropriate compute model for a user segment is a balance of many factors
•Optimization of IT and User needs will likely result in a mix of delivery models, even within a single user segment
•PCs with Intel® vPro™ and Centrino® Pro processor technology are the most manageable, secure PCs on which to deliver all compute models
Revision - 01
Intel Confidential
Thank you.
Revision - 01
Intel Confidential
Backup
Revision - 01
Intel Confidential
Thin ClientTerminal
Mobile CapableOff-Network
Option
Network Connected
Only
Server Compute
Centralized Management
Centralized Data Storage
Client Compute Centralized and
Local Data Storage
Options
Client Compute
Centralized Management
Centralized and Local
Data Storage Options
Managed Rich Client
DT & NB clients
DynamicDynamicVirtual ClientVirtual Client
Centralized apps and data
Rich or Thin? It’s No Longer a Binary Decision
Revision - 01
Intel Confidential
Intel’s Dynamic Virtual Client (DVC)
Streaming Server
Master OS
image
Master Apps
image
A Family of Compute Models Based On Streaming and Virtualization
• Simplified centralized workplace management (applications and data)
• Improved security
• Rich client performance and experience with mobile capabilities
Application Streaming & Virtualization
Virtual Containers
OS Streaming
Clients Network Server
On-Demand Delivery
Data SynchronizationOS
Streaming
or
Remote OS Boot
Virtualization
Virtual Applicatio
n
Local OS
Virtual Container
Virtualization
Revision - 01
Intel Confidential
DVC Solutions and Intel® vPro™ Technology Enabling
Solution Compute Model Intel® vPro™ Technology Link Status
Microsoft SCCM R2* + App-V 4.5
App virtualization App-V now enabled to use Intel® vPro™ technology secure managementt link to push an update to a locally-cached, virtualized app regardless of OS state along with license management using TPDS
Shipping
Symantec Workspace Virtualization* v6.1 SP1
App streaming/ virtualization
SWS can write app licensing and usage information into vPro technology’s non-volatile memory. Info can be read OOB and used to make optimal license purchasing decisions. Mobility SDK support provided
Q2’09
Lenovo Secure Managed Client* (SMC)
Remote OS boot SMC uses a thin, Intel® Virtualization Technology-enabled VMM to redirect storage from the local disk to a SAN. SMC clients are Lenovo M-Series* vPro technology desktops
v1.2 (US release May’09)Global GA –Q3/09
Dell On-Demand* Desktop Streaming(ODDS)
OS Streaming Dell has bundled Citrix PVS* (OS streaming) with diskless vPro technology desktops for a turnkey solution
Shipping
Citrix Provisioning Server* for Desktops v5.0 also integrated into Citrix Xen Desktop* V3
OS streaming On an 802.1x, NAC or NAP network, vPro technology systems with the Intel® Embedded Trust Agent can present network security credentials prior to receiving a streamed OS, providing assurance that only authorized systems access the network
Shipping
Citrix -Project Independence*
Virtual containers A joint development project between Citrix and Intel; uses an Intel® VT-d, VT-x and TXT-aware VMM
In development. Expected 2H’09
VMware - Client Virtualization Platform*
Virtual containers Optimized for Intel vPro technology. In development. Expected 2H’09
*Other brands and names may be claimed as property of others.
All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Revision - 01
Intel Confidential
Key Compute Model ISVs
Model ISV & Product Intel® vPro™ Technology Optimization?
OS Streaming Citrix Provisioning Server for Desktops* v4.5 and greaterCitrix XenDesktop* V3Dell On-Demand Streaming Solution
Intel® Embedded Trust AgentIntel® Embedded Trust Agent
Intel® AMT, Intel® ETA
Remote OS Boot Lenovo Secure Managed Client* Intel® AMT, Intel® VT
App Streaming/ Virtualization
Citrix XenApp* (supports both terminal services and application streaming)Microsoft SCCM/R2* Symantec SWV 6.1*VMware View 3(with Thinapp)*Others
-Intel® AMTIntel® AMT
Intel Mobile SDK -Symantec-
Virtual Containers Citrix – Intel collaboration (Q1’10, codenamed Project Independence)Microsoft Enterprise Desktop Virtualization*VMware ACE*, VMware Player*VMware future Client Virtualization Platform (2H’09)
Intel® AMT, Intel® VT---
Intel® AMT, Intel® VT
Enhanced Network Display Protocols
Citrix ICA*HP Remote Graphics Software*Microsoft RDP replacement in Windows* 7 (formerly Calista*)Teradici PC-over-IP*Others
----
* Other brands and names may be claimed as property of others.
Revision - 01
Intel Confidential
Presentation Virtualization: Terminal Services
Presentation VirtualizationIT Benefits
• Centralized image and security
• Proven technology
• Less infrastructure than virtual hosted desktop approach
• Access from any connected client
• Stateless client
Limitations• No mobility
• Responsiveness varies (workload and latency)
• Poor motion graphics, streamed audio, and peripheral synch
• User satisfaction issues
Local OS
Terminal Software
Server OS
Terminal Server
Application
Session A
Session B
RDP Remote Display
Protocol
Revision - 01
Intel Confidential
Virtual Hosted Desktop
Virtual Hosted Desktop
Local OS
Terminal sw
VMM
APP
OS
APP
OS
RDP Remote Display
Protocol
APP
OS
APP
OS
IT Benefits• Centralized image and security
• User customization
• Access from any connected client
• Stateless client
Limitations• No mobility
• Lower users/processor ratio than terminal services
• Costly data center build-out
• Responsiveness varies (workload and latency)
• Poor motion graphics, streamed audio, and peripheral synch
• Immature deployment and management tools
Revision - 01
Intel Confidential
Operating System and Application Streaming
Operating System and Application Streaming
Streamed OS
Virtual App Mgr
Streaming Server
OS, Virtual App Mgr and Application streamed over
Network
Streamed App
OS
App Mgr
App
IT Benefits• Centralized image, data, and security
• Single image serves many clients (less storage)
• Responsive compute and graphics
• User customization
• Increased security and compatibility with application virtualization
• Less infrastructure than server-side models
• “Stateless” client
Limitations• Limited mobility; no local caching
• Network boot storms
• Some application incompatibilities
• Validation can be labor-intensive
Revision - 01
Intel Confidential
Application Streaming and Virtualization
Application Streaming
Local OS & Apps
Virtual App Mgr
Streaming Server
Application streamed over
Network
App
IT Benefits• Centralized application, data, and
security
• Single application image serves many clients (less storage)
• Responsive compute and graphics
• User customization
• Increased security, compatibility with application virtualization
• Less infrastructure than server-side models
• Off-network mobility
Limitations• Centralizes applications and data
only, not whole image
• Some application incompatibilities
• Validation can be labor-intensive
App App
App App App
Revision - 01
Intel Confidential
Virtual Containers
Virtual Containers
Local OS & Apps
VMM
Streaming Server
Streamed, DVD, or USB Drive
IT Benefits• Image-level delivery
• Off-network mobility
• Application performance
• Multiple images/client (e.g., corporate/private, contractor)
• Low data center cost
Limitations• Technology and tool
immaturity
• Complexity of current solutions
App
OS
App
OS
App
OS
App
OS
Revision - 01
Intel Confidential
Intel® vPro™ Technology Capabilities & Alternative Compute Models
Compute modelvPro capability
Terminal Services
Virtual Hosted Desktop
OS + App Streaming
App Streaming (Local OS)
Rich Client or Mixed Model
Accurate count of clients (regardless of power or OS state)
X X X X X
Accurate HW inventory (regardless of power or OS state)
X X X X X
Accurate SW inventory (regardless of power or OS state)
X(inventory & update
terminal SW)
X(inventory & update
terminal SW)X X
Secure wake-&-update
X X
Isolate an infected client
X X X
Monitor agent presence
X X X
Encrypt data on hard drive (Danbury Tech ’08)
X X