14. 第一代VDI桌面虚拟化的优劣
专用传输协议
刀片 刀片 刀片 刀片
PC PC PC PC
刀片 刀片 刀片 刀片
传统硬件厂商的刀片PC(Blade PC)解决方案 PC PC PC PC
优势:把操作系统、应用、用户数据
集中到数据中心统一管理,解决安全问题
缺点:
•硬件消耗过大:例如500个用户就有500片刀片
•管理复杂:与传统方式相比没有改进
•增加网络压力:专用协议消耗带宽资源很大
•增加成本
15. 第二代虚拟桌面解决方案
Virtual Desktop
User
Settings
高性能传输协议:ICA
Apps
OS 数据中心
用户
On-demand Assembly
动态拼装的用户 打破操作系统、应用程序和
最佳用户体验 桌面 用户数据的紧密耦合,独立
管理
16. 真正意义上的桌面虚拟化解决方案
没有之一
USER PROFILE
with
APPS
1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 1011011010 SSL 101101110 11
DATA
OS
17. Citrix 虚拟桌面组件
Support Brokering Monitoring
User
Settings
User Profiles
Apps
App Delivery
client server
OS
Users
Access Devices Secure Remote WAN Virtual Desktop Desktop
Access Optimization Provisioning
Virtual Desktop
Hosting Infrastructure
22. HDX: 高清体验
HDX MediaStream HDX Plug-n-Play
Video and audio playback Access to local resources and
peripherals, including USB devices
HDX RealTime HDX RichGraphics
Voice and video for real-time High performance 2D and 3D
collaboration graphics
(incl. RemoteFX and HDX 3D Pro)
HDX Broadcast HDX WAN Optimization
ICA and RDP protocol support for Performance and bandwidth
access from any device, anywhere optimizations for branch offices
HDX SmartAccess HDX Adaptive Orchestration
Simplified secure access Best user experience based on
server, network connection and user
device
26. Time to Fully Spool on WAN
XenApp 6 w/printing optimization pack vs ThinPrint 8.0
--- 53% Reduction
JPG Image
--- 44% Reduction
Bitmap
--- 40% Reduction
TXT Document
--- 6% Reduction
Powerpoint Mostly Text
---------------- 52% Reduction ---------------------------
Powerpoint
------------92% Reduction -------------------------
MS Word Mostly Text
------ 26% Reduction
MS Word Mixed Text/Graphics
--- 22% Reduction
MS Word Text Only
------------------50% Reduction ---------------------------------------------
Acrobat Mixed Text Graphics
Acrobat Text Only
--------- 81% Increase
0 20 40 60 80 100 120 140 160 180
Time to Fully Spool on Client (s)
Citrix Confidential - Do Not Distribute
XenApp 6 w/Printing Optimization Pack Defaults Thinprint 8.0 Defaults
29. 为什么能提升访问速度?
SQL command and 10-20 kb
data
100 kb-1 Mb
100 Mb, 1 Gb
WAN
Client
Application
Database
Client/Server Server
screenshot , mousec
licks & keystrokes
SQL command and
data
WAN LAN
Client Citrix
Presentation Database
Servers with Server
Server-Based Computing Client Application
61. A Better SolutionRequires a “network
for Mobile Security
Data
connect” VPN tunnel.
Center
SSL 0010101 SSL 001000111010101 SSL 001000111010101 SSL 001000111010101 SSL 001000111010101
SSL or IPSEC VPN
Uses proprietary ICA over
SSL proxy.
010101 SSL 001000111010101
10101 SSL 00
010101 SSL 001000111010101
10101 SSL 00
Citrix ICA Proxy
62. Branch Repeater 与XenDesktop的捆绑销售
ICA Thinwire MAPI CIFS ICA print
AutoOptimizer Engine Data
TCP Flow Compression Protocol Smart Center
Control De-duplication Acceleration Acceleration
63. Branch Repeater = Breakthrough WAN Performance
Support more users & desktops on existing WAN, Cut WAN Op costs
Print File
Speed 50X 30X 2X 2.5X 6X
Bandwidth
WAN Optimization 99% 99% 89% 97% 97%
Savings
64. B & Data
Watch Over Your Data
www.bdata.com.cn www.bdata.com.hk
65. 要点
为什么做虚拟化?桌面虚拟化WorkPlace 虚拟化 Win7 ,BYOD Base Line Online
虚拟好处15点
XenApp与XenDesktop架构比较
FlexCast如何选择合适的Citrix推荐给用户,对了Xenserver拥有直通模式的GPU加速了。
微软和Citrix,合作/微软和Citrix,成本/微软和Citrix,竞争
VDI-in-a-Box FlexCost 如何省钱?让我们从微软口袋里挤出钱来,Former Citrix XenApp客户,Trade
VMware View 协议的竞争,让我们来看看,ICA到底是什么?噢,原来他有一个新名字了HDX
有人说升腾在和Vmware合作,来看看Citrix Ready吧。
真不错,我们开始干吧,从哪下手?Citrix XA/XD解决方案矩阵(综合,本地,FlexCast,VDI,3个流言,1。节约
License,2。省电,3。非常安全)
One More Thing --别忘了还有Netscaler,WI in System + Access Gateway,每一个Citrix桌面项目都需要一个Netscaler
Editor's Notes
Intro: Well there has actually been a fair amount of innovation in this arena. Key Points: Many companies have attempted to embrace BYOD, Workshifting, Micro-Apps, Mobility, and Enterprise App Stores. Companies want to do something about consumerization because they know its inevitable.As an example, Citrix itself now embraces all of these. We have a robust BYOD program in place, empowering employees to use the device of their choice. We employ people globally, many of whom work in far-flung remote locations, some in their homes, and others in carefully designed, collaborative workspaces – in short, wherever work can be done swiftly and cost effectively. Transition: But it hasn’t been easy….
Intro: The first is mobile workstyles. Key Points:Mobile workstyles are all about making people more productive, regardless of where they are, what device they’re using or what applications and data they need to get their job done. Transition: The second solution area is just as critical…
Intro: Whether it is a financial crisis, a labor strike, geo-political unrest, or simply the forces of nature – the world that businesses and IT were being asked to operate in was increasingly volatile and ever-changing.Proof Points/Anecdotes: Weave in an example of VUCA here that is relevant to the customer’s industry or location. Transition: As if that weren’t enough, there was a new generation entering the workforce.
Intro: Here’s why it’s hard based on the way IT is structured today: Key Points:The IT function has been squarely at the center of managing structured systems, apps and data. People are the users and extensions of IT systems, and devices have been standardized to make it simpler for IT to support. It is a complex set of responsibilities, and most businesses say their IT functions can get stretched.Transition: But we know from experience there is a better way for those businesses that choose to act. So imagine how your organization could benefit if things were different…
Intro: Tomorrow’s IT leadership won’t be at the center of all tactical activities to the same degree as in the past. Here’s what tomorrow’s norms will look like instead: Key Points:IT will play a critical role in governance and self-service enablement, but they will no longer be the center of the equationPeople will be at the center of the process, selecting the devices for their needs and on their own terms.IT will be organic & unstructured, driven by tasks & relationshipsData will be created, stored, shared and accessed based on tasks and relationships, not apps or devicesApps will be on-demand, self-service, task-specific toolsThe OS that defines our view of a “desktop” today will be far less relevant and focused more narrowly on session management. People will use multiple devices each day without thinking about it.Devices and locations will be determined by end users.Mobile will be a dominant use case, not an occasional one. Transition: And many companies are moving in this direction.
IT has a tough job…opposing forces…and accelerating…The forces of our dynamic world are creating more and more distance between users and IT across technical, physical, and organizational dimensions. No matter how fast computing evolves, it struggles to keep up with the even more dynamic pace of business change in the 21st century: The Challenge: Users want more flexibility and IT wants more controlTo meet user demands, businesses are forced to compromise information security, live with unacceptable application performance, and endure high operating costs.
Intro: This generation couldn’t possibly conceive of why their workplace computing experience wasn’t just as simple, elegant and easy as their home experience. Key Points: This was a generation bringing iPhones and iPads into the workplace because they loved them. To make matters worse, the executives were on the same bandwagon…actually, they are often driving this change as well.That’s why we believe, as does Gartner, that consumerization will be the single most impactful trend to impact IT over the next decade. Anecdotes/Proof Points: Bring in a personal anecdote here – make a comparison between what you were offered from a computing perspective when you joined the workforce versus what people expect now. It is one device and there was one device type. Now its multiple devices and people want a choice of which device that is.Transition: So what have businesses done to embrace consumerization and think of a new way to provide IT services.
Intro: This is where follow-me data becomes essential. Show that with the Ctrix workshifting solution:Key Points:People can easily share files with anyone inside or outside their organization and sync files across all of their devices so people have the information they need no matter where they’re working. Transition: Explain that the next essential component is one of the most underestimated benefits of workshifting done right.
Intro: That’s where desktop and app virtualization come into play. With the Citrix BYOD solution, this means:Key Points:IT can transform any corporate application—including Windows, web and SaaS apps—as well as complete desktops into an on-demand service available on any device. The solution lets you use any combination of desktop and application delivery approaches to support every type of worker through a single point of control.Illustration/Anecdotes/Proof: Insert stats from studies showing that orgs that have desktop and app virtualization feel more confident about BYOD and security)Transition: But it also needs to be easy for the user…as easy, if not easier, than what they have today.
Intro: At Citrix, we believe in a world where people can work or play from anywhere. Key Points: We added the word play a few year’s back because we knew that something profound was taking place. Employees were taking control of their own IT. People were beginning to bring their personal devices into the workplace – and you know what – these brave, young digital natives expected them all to work on day one. At Citrix, we couldn’t agree more - Everyone should be able to work whenever and wherever they want on whatever device they choose. Anecdotes/Proof Points: At this point, weave in a personal story about your experience with digital natives – whether your kids, someone at work, etc and how the expectations have influenced business.Transition: Unfortunately, we live in a crazy world.
Intro: Follow-Me Data is the way. With the Citrix BYOD solution: Key Points:People can securely share files with anyone inside or outside their organizationThey can also sync files across all of their devices. And IT can deploy comprehensive usage policies and remotely wipe data from devices so that confidential business information is secured, even if a device is lost or stolen, regardless of whether that device was a corporate or personal asset. Access control, auditing and reporting help control unauthorized or inappropriate file access.Illustration/Anecdotes/Proof: Imagine what could happen if you didn’t have secure follow-me data…If one of those BYOD devices were lost and it had sensitive data, how much risk could your organization face?Transition: But security needs to be much broader than that…
Intro: I hope this helped you learn a bit more about Citrix and our belief that IT services can be delivered with greater security and agilityTransition: Not only creating more business value..
What we need is a solution that enables an entire organization to “go virtual” – that means increased flexibility of device, location, network, and more, all optimized for different roles within the organization. All these different roles, from a task based retail worker to an on-the-go executive, have different requirements. In order to “go virtual,” the solution must be flexible enough to meet these different needs.
From a hosted perspective, FlexCast enables XD4 to take advantage of shared desktops (terminal services based) for the best possible server utilization, VM-based desktops on any hypervisor for personalized Win7/Vista/XP experience, or Blade-based PCs for 3D graphics and heavy compute load.
Intro: And that’s cloud services. Key Points:Cloud services solutions are all about enabling IT transformations in the broader sense.Transition: Let’s dig a bit deeper into those concepts.
Intro: There are four critical cloud services solutions:Key Points:These include a unified storefront that creates a single point of access & control for all apps and data—SaaS, web, mobile, and Windows. Our market leading desktop virtualization solution enables IT to transform Windows desktops and apps into Windows-as-a-Service clouds. Our enterprise cloud networking solution enables the delivery of all apps and services with high performance, security, and availability. And finally, our cloud convergence solution enables any enterprise or service provider to leverage infinite scale and flexibility across both private and public clouds. Transition: Now one of the cool things about all 7 of these solutions is that each are comprised of industry-leading products and services from both Citrix and our global network of business partners.
For users with new endpoints, a need for local PC performance, or situations where budget does not allow for Data Center server investments, FlexCast can deliver an entire desktop via Desktop Streaming. This allows IT to manage a single OS image while having run locally on a more powerful endpoint. Apps are delivered to any endpoint using app virtualization. The apps can run as a hosted model, allowing access when online or can be streamed to the endpoint, enabling the app to run on the machine when it is offline WITHOUT the need to ever install the app.
In 2010, XenClient will become available from Citrix. This solution will allow PCs to support both a personal desktop environment and a corporate desktop environment at the same time. This means a user can mix personal apps and desktop experience with access to corporate apps in a totally secure fashion. Both personal and office desktops can be made available while offline, with the corporate desktop under full control of IT. For example, if preferred, office desktop may expire if user doesn’t connect into corporate network for more than a few days without impacting the personal desktop.Features:Bare metal performanceMultiple concurrent VMsSecure partitionedOnline & Offline access
From a virtual desktop infrastructure perspective, we wanted to have the ability to support multiple different desktop hosting infrastructures. So, customers will find that we are agnostic as related to where you put your desktop stack. We want to allow the brokering mechanism to control desktops whether those desktops are running on a VM infrastructure or not and interact with them.In XenDesktop 4, we have full integration for management of desktops running on virtual machines from XenServer, MS Hyper-V and VMware VI3 (From a hosting infrastructure perspective, HP Integrated XenServer is obviously the VM infrastructure of choice).We also have support for desktop blades out of the gate, but we don’t yet provide for integration to blade management infrastructure (for things like power management), but that will come over time.Integration that we have to the various vm infrastructures will support start, suspend, resume, shutdown…all the things you’d expect.There is an SDK coming that will enable you to customize the interaction between the broker and the hosting infrastructure more extensively.We do support traditional PCs…for us there is no difference between traditional PCs and a blade.
Intro:At Citrix, we know first-hand the benefits that come from embracing BYOD—not only because of our clients’ experience but also because we’ve done it for ourselves. As was reported in the January 4, 2012 edition of Financial Times online, Citrix launched a limited BYOD initiative three years ago and we’ve already achieved the long-term goals that were set out at the time. Key Points:We were looking to lower our IT and business costs And, like other growing businesses, we also need to attract the right employees and help them work with efficiency and flexibility. It is working for us. We have already hit our targeted cost savings of 20%, even while our company has been growing at an exponential rate. A few years ago it would have been unthinkable to grow in locations and employees while cutting IT costs. Today it’s possible. And we’ve done this while offering complete choice, which we’ve found to drive productivity. Within Citrix, 46% of people taking part in the program have selected Macs.And now, we’re seeing the soft benefits as well, with Citrix named among “Top 50 Best Places to Work” in 2011.Illustration/Anecdotes/Proof: (Weave in some personal stories about how the Citrix BYOD initiative has impacted you.)Transition: But it’s not just Citrix using our own solutions, customers around the world are doing so as well.
We have been in this business a long time:Winframe 1995MetaFrame 1999Presentation Server 200?XenApp 200720 years of history…could feel like Back to the Future to some of us..but fundamentally the inherent value of on demand apps hasn’t changed, centralizing the apps and delivering them on demand increases your security and stability while decreasing the cost to deliver and manage, making your customers more profitable and giving them a competitive edge. All this raises your trusted advisor status with the customer.
Intro: The challenge is to swim with the tide of consumerization, yet still protect and enable the business. Key Points:That is why 94% of organizations plan to put some form of a real BYO policy in place by mid-2013. They know they must adapt and come up with a strategy, because employees are doing it now, whether they like it or not.Illustration/Anecdotes/Proof: (Use examples of other customers you are working with that are developing BYOD strategies. Ex: “And we at Citrix are at the leading edge of this transition. I have 5 other customers in the finance industry in the Northeast that have BYOD initiatives underway….”)Transition: Considering the different starting points and business priorities we see with our clients, it’s clear there are multiple ways of tailoring the best BYOD solution.
Intro: Starting with our mobile workstye solutions:Key Points: Our mobile workstyles solutions include a solution for some of IT’s most challenging customers, executives. Our executive mobility solution enables executives to work with people, data & apps from the coolest devices – anywhere. Our BYOD solutions enables IT to embrace consumerization, empower employees and simplify ITAnd finally our workshifting solution enables the business to move work, cut costs and, amazingly, delight employees in the process. Transition: So let’s go into the cloud services solutions as well.
Intro: But you know who could? The folks at Korea Telecom. Key Points:You see, the talented team at KT had a big challenge. They wanted to reduce their carbon footprint, secure corporate information access, save some money, and oh by the way arm their whole team with brand new iPads! Citrix engaged to help craft a solution and with the help of our solutions for mobile workstyles and cloud servicesAs a result, KT has now enabled 32,000 iPad users to securely access their network from anywhere, they’ve drastically lowered their costs and even launched their own external cloud, called the uCloud that beat the competition to the market with a solution that costs 40% less than the current market leader. Incredible.Transition: OK, let’s wrap-up.
Intro: Take KLA Tencor, a Citrix innovation award winner. KLA Tencor supplies process-control and yield management solutions to the semiconductor industry and other microelectronics companies. Key Points:They set out to increase field engineer productivity, protect their intellectual property and increase their speed-to-market to build their competitive position.By providing users seamless access to desktops and apps with a secure-by design solution, they were able to achieve these goals and more from their BYOD initiative.They were able to reduce time to recovery for their field workers – from days to minutes, increasing client service and business response.They also improved product time to market while protecting IP, which as you might imagine is incredibly important in their business.All of this resulted in faster customer response and ultimately competitive advantage for their business.Transition: These are a few examples of BYOD initiatives in action, but there are many forms of BYOD.
Intro: But also making your people happier and more productive. And we know how important this is for businesses in today’s world.Wrap-up: Thanks very much for your attention.
On the mobile security side, when you integrate Citrix Receiver, XenDesktop and Access Gateway’s ICA Proxy capabilities you get the strongest datacenter protection available when users leverage ‘any mobile device anywhere’ to access their virtual desktops and apps. This slide illustrates what I’m talking about.Other virtual desktop and VPN solutions:Key Features:Full network tunnel to the data centerAccess to all but simple Web Apps requires a full VPN tunnelAccess to Windows or client server apps requires RDP or ICA over VPNMobile device storage typically available for saving data Issues:VPN tunnel can be hijacked by malwareRequires extensive Mobile Device Management software to control the deviceData leakage becomes and issueCitrix XenDesktop, Receiver and Access Gateway solution:Key Features:Proxy connection – never a direct connection to the data centerSSL-based strong encryptionMobile device memory is sandboxed from other appsLocal device storage is disabledBenefitsWindows and complex Web apps enabled day 1ICA tunnel cannot be hijacked by malwareData leak prevention is inherent in the architecture