Upload
solarisyourep
View
105
Download
0
Embed Size (px)
Citation preview
© 2011 VMware Inc. All rights reserved
Confidential
Desktops for the Cloud: The VIEW Rollout
March 2012
2 Confidential
View Environment Upgrade
� System Overview
� Architectural Overview
� Rollout Methodology
� Advantages of View
� Benefits
3 Confidential
What is View?
� View is a centralized environment where desktops are hosted.
� Rather than running one OS on a local machine, it’s now running in a virtual machine at the data center.
� In short the desktop or laptop OS has been shifted to the data center and is being accessed remotely.
Move OS to DC
4 Confidential
Tell Me More About View
� View is an enterprise-class, product-ready desktop solution
• Stands for Virtual Desktop Infrastructure Industry Standard – “VDI”
• Processing power securely located at remote back-end data center
• Offers superior solution: Agility-Performance-Transparency
• Reduced capital expenditures
• Decreased operational expense
• Lower technical support needs
• Business continuity
5 Confidential
What are the Benefits of View?
� Advantages
• Easier to maintain from a central place
• Automatic backup
• Fast log-on time
• Always up to date regarding security and patches
• Upgrades are done in the background
• Provisioning is in minutes rather than hours
• Use of fault-tolerant systems in the data center
� Business Agility and Acceleration
• Cloning
• Virtual mobility
• Flexible upgrades
• Centralized platform management
• Enterprise-wide configuration consistency
• Reliability and longevity
• Each VM (View desktop) is mapped to an individual user and client device
� User Benefits
• Ease, performance, security, access and transparency during upgrades
• Broad range of devices
6 Confidential
View Implementation Methodology at a Glance
� Socialized the technology within the department
• Determined engagement directors per business unit (BU)
� Divided user base into four sets of users
• Pilot
• C-Staff
• Managers
• Community
� Send questionnaires to pilot users
� Determine use cases per BU based on job function (create user profiles)
� Determine candidates for thin clients (such as contractors)
� Finalized list of apps. per BU
� Created pools where necessary
� Agreed to timeline
7 Confidential
7 Confidential
Setting selected to be activated is “Build to Lossless”
View Infrastructure
8 Confidential
The Two Types of VMs
Two types of VMs exist on View
� Linked clones
� Everyone uses the same OS image, and applications are centrally managed.
� No admin. rights are provided to the users.
� Stability and storage savings are the primary advantages.
� Designed for the majority of task and knowledge users.
� Individual applications can be added as Thin App packages.
� VMs are recomposed every month (all changes are wiped out, OS patched and enhanced, new apps).
� Full Virtual Machines
� Each user works on a full copy of the OS with full admin rights.
� It’s equivalent to having a regular PC.
� Advantages are having control; disadvantages are that patching, upgrading and client management is up to the user.
� Designed mainly for power users.
9 Confidential
View Architecture - Clusters
What is a Cluster?
� A cluster is a group of hosts. When you add a
host to a cluster, the host's resources become
part of the cluster's resources. The cluster
manages the resources and of all hosts within it.
� Clusters enable the VMware High Availability
(HA) and VMware Distributed Resource
Scheduler (DRS) solutions.
10 Confidential
View Architecture - Hosts
What is a Host?
� A host is a computer that uses virtualization
software, such as an ESX Server, to run virtual
machines (Win7 Desktops).
� Hosts provide the CPU and memory resources
that virtual machines use and give virtual
machines access to storage and network
connectivity.
11 Confidential
View Architecture - Pools
� There are currently eight major VM pools in production
� Pools can have the following options:
• Automated, manual, individual
• Dedicated, floating
• Linked clone, full clone
12 Confidential
View Architecture – Virtual Machines
• Windows XP SP3 (32 Bit)
• 1 vCPU
• 1GB RAM *
• 20GB OS Drive
• 10GB User Data Disk
• My Documents folder redirected to user’s Home Directory (H: Drive)
• VMware Standard Apps:
• Office 2007 Pro Plus SP2
• Firefox 3.6
• Adobe Reader
• 7-Zip
• McAfee VirusScan 8.7i with Anti Spyware
The typical Virtual Machine has the following specifications:
13 Confidential
For More Information
� Guy de Meester, IT Director, Global Client Services & International - [email protected]
� Marie O’Leary, Sr. Project Manager, IT Operations: Layer 3 End-user Computing - [email protected]