Вы находитесь на странице: 1из 46

Summer Internship Project REMOTE DESKTOP VIRTUALIZATION

Krishna Vijaywargiy B.Tech IT (2009-1 ! $-IT-1 %2 0& 090'$

Faculty Guide"s. #hetna #haudhary

ACKNO
I w(uld li)e t( than)*

LED!EMENT

Mr" Vij#$ Sh#rm#% wh( heads the #(ltene +haledent India ,-t. .td. /e had the )indness t( acce0t 1e in his gr(u0 and let 1e w(r) with aut(n(1y. Mr" S#ntosh S#&#'u(e2 ass(ciate ad1in-e3ecuti-e2 at #(ltene +haledent. /e hel0ed 1e when I started the internshi0 and 1ade sure I w(r) sa4ely with all the data regarding the c(10any5s sales and 4uture initiati-es. /e als( e30lained 1e the 0rinci0les (n which the new centrali6ed data7ase had t( 7e 7uild 7y 1e. /e was 7usy 7ut ne-er re4used t( answer 1y 8uesti(ns. Mr" M#njeet Sin)h% 1ar)eting 1anager2 (4 the c(10any. /is e30erience in 1anaging the statistical data was -ery use4ul t( 1e. I c(uld a-(id s(1e catches than)s t( hi1. 9iscussing with hi1 t( 4igure (ut the 4ew 0resentati(ns I had t( 1a)e and the 4eed7ac) 4(r1 I had t( design 4(r 1y w(r) was really hel04ul t((. Mr" Ron#* R" A))#r+#(2 1ar)eting re0resentati-e at the c(10any wh( hel0ed 1e t( carry (ut 1y 0r(gra1 0ractically 7y sharing his wee)ly re0(rts (n regular 7asis with 1e and als( gi-ing in0uts (n h(w t( 1a)e the 0r(gra1 1(re idealistic. Besides 1y 0r(ject2 I really enj(yed 1y stay at the #(ltene +haledent ,-t. .td.2 a00reciated all the 0e(0le I w(r)ed with and s0ent g((d 1(1ents with the1. That:s why I sincerely than) all the sta44 (4 the c(10any 4(r their war1 gestures al(ng with the 0r(4essi(nal attitude t(wards the w(r). I e30ress 1y gratitude t(wards 1y Instituti(n2 %1ity ;ch((l (4 <ngineering and Techn(l(gy2 %1ity =ni-ersity2 >?I9%2 /?I2 "s. >atasha /asteer (/?9 IT 9e0tt.!2 "s. ;a0na ;inha (,r(gra1 .eader! and "s. #hetna #haudhary (Faculty Guide! with(ut wh(1 this 0r(ject w(uld ha-e 7een a distant reality.

Krishn# Vij#$+#r)i$

A,STRACT
T(day5s c(10uting needs re8uire IT de0art1ents t( address 1(re ,# 1anage1ent challenges than they did just a 4ew years ag(. =sers increasingly de1and access t( their a00licati(ns and data at any l(cati(n and 4r(1 any de-ice. The 4ast gr(wth (4 c(10uter users wh( r(a1 4r(1 (ne ,# t( an(ther has led c(10anies t( 0r(-ide access t( the user5s des)t(0 4r(1 any c(10uter in the w(r)0lace2 detaching the user 4r(1 the 0hysical ,#. =sers are als( increasing their use (4 0ers(nal techn(l(gy at h(1e. This increase leads the1 t( e30ect si1ilar 0ers(nal c(n4igurati(ns and techn(l(gical 4reed(1s in the w(r)0lace. %dditi(nally2 users are n(w 1(re li)ely t( use their (wn de-ices t( access c(r0(rate a00licati(ns2 such as c(r0(rate e1ail2 4r(1 their 0ers(nal 1(7ile 0h(nes. In4rastructure -irtuali6ati(n is a 0(wer4ul trend in the industry t(day2 7ut the c(nce0t (4 -irtuali6ati(n has 7een ar(und 4(r 1any years. Virtuali6ati(n techn(l(gy has 7een 0ursued 7y -end(rs as a 4ra1ew(r) t( di-ide the res(urces (4 a c(10uter int( 1ulti0le e3ecuti(n en-ir(n1ents using a -ariety (4 hardware and s(4tware a7stracti(n techni8ues2 resulting in the se0arati(n (4 the l(gical inter4ace 4r(1 the 0hysical 1achine. Virtuali6ati(n (riginated in the 19@0s as a techni8ue t( (0ti1i6e the use (4 -ery e30ensi-e and relati-ely scarce c(10uting res(urces. 9es)t(0 -irtuali6ati(n (44ers a way t( e3tend the 7ene4its (4 -irtuali6ati(n A 7etter 0er4(r1ance2 l(wer T#?2 higher security and greater 4le3i7ility A t( the 4ull des)t(0. <ach des)t(0 is su00(rted 7y a 0hysical ,# that creates nu1er(us challenges including data securityB u0date and re4resh cyclesB 0(wer2 heat and s0ace c(nsu10ti(nB and the 1anage1ent (4 l(cal 0ac)aged a00licati(ns li)e 0r(ducti-ity suites and 7r(wsers2 as well as h(1e-gr(wn a00licati(ns. "uch li)e ser-er -irtuali6ati(n2 -irtuali6ati(n des)t(0s in-(l-es se0arating the 0hysical l(cati(n (4 a client de-ice 4r(1 its l(gical inter4ace. In 0ractical ter1s2 des)t(0 -irtuali6ati(n all(ws end users t( access all (4 their data and a00licati(ns with(ut 7eing tied d(wn t( a s0eci4ic hardware de-ice. It als( all(ws IT de0art1ents t( reduce 1anage1ent and su00(rt c(sts2 al(ng with ca0ital e30enses 4(r des)t(0 hardware. %d-ances in 1(7ile hardware architectures and tre1end(us gr(wth (4 high-s0eed wide-area cellular syste1s deli-er anyti1e and any0lace a-aila7ility (4 netw(r)3

7ased in4(r1ati(n ser-ices t( the (wners (4 1(7ile c(10uting de-ices. <-er-gr(wing 0(0ularity (4 1(7ile de-ices2 such as s1art 0h(nes and net7(()s2 dri-es the de1and 4(r the de-el(01ent (4 inn(-ati-e s(4tware and hardware architectures2 a00licati(ns2 and netw(r) ser-ices ai1ed at these de-ices. %s a result2 we are witnessing a 0aradig1 shi4t in the way 0e(0le use c(10uting techn(l(gy in their e-eryday li-es. Ce1(te 9es)t(0 Virtualisati(n all(ws users t( re1(tely c(nnect t( their des)t(0s and ser-ers thr(ugh any Ce1(te 9es)t(0 ,r(t(c(l (C9,! and all(ws a (ne t( (ne c(nnecti(n t( hardware 4(r re1(te access (r ad1inistrati(n 0ur0(ses while securely encry0ting data. It ai1s t( s(l-e a -ariety (4 0r(7le1s. It is the 0er4ect s(luti(n 4(r hel0 des) de0art1ents2 re1(te su00(rt needs2 and e-en e-eryday users wh( are l(()ing t( access their des)t(0s re1(tely thr(ugh a secure c(nnecti(n.

#?>T<>T;

INTRODUCTION..................................................................................................................... 7 MATERIALS AND METHODOLGY......................................................................................10 RESULTS AND DISCUSSION.............................................................................................. 13 REMOTE DESKTOP VIRTUALIZATION...........................................................................13 TYPES OF DESKTOP VIRTUALIZATION.....................................................................15 HOW TO ACHIEVE DESKTOP VIRTUALIZATION?.....................................................15 DEFINING DATA COMMUNICATIONS.............................................................................16 CDPD TECHNOLOGY: THE HOT COOKIE......................................................................18 CDPD NETWORK RELIABILITY...................................................................................22 APPLICATIONS OF MOBILE COMPUTING ....................................................................24 PROTOCOLS FOR DESKTOP VIRTUALIZATION............................................................28 REMOTE DESKTOP PROTOCOL (RDP).....................................................................28 PC IP............................................................................................................................ !1 APPLICATION VIRTUALIZATION.....................................................................................34 APPLICATION DELIVERY............................................................................................ !5 THE BENEFITS OF APPLICATION VIRTUALIZATION................................................!" ISSUES WITH APPLICATION VIRTUALIZATION........................................................!" VDI VIRTUAL DESKTOP INFRASTRUCTURE!..............................................................38 VDI BENEFITS.............................................................................................................. !8 BENEFITS OF VIRTUAL DESKTOP COMPUTING..........................................................41 LIMITATIONS OF DESKTOP VIRTUALIZATION..............................................................42 COMPLEXITY AND SHIGH COSTS OF VDI DEPLOYMENT AND MANAGEMENT...........42 CONCLUSION....................................................................................................................... 43 REFRENCES......................................................................................................................... 45 APPENDIX............................................................................................................................ 46

"

T%B.< ?F FIG=C<;
BRIEF HISTORY..................................................................................................................... 7 FIGURE 1 MOBILE S!ITCHING CENTRE..........................................................................." FIGURE 2 MATERIALS IN DES#TOP VIRTUALI$ATION.................................................10 FIGURE 3 MOBILE COMMUNICATIONS OVERVIE!......................................................16 FIGURE 4 CIRCUIT S!ITCHED CDPD.............................................................................1% FIGURE 5 CDPD OVERVIE!............................................................................................... 20 FIGURE 6 CDPD NET!OR#.............................................................................................. 22 FIGURE 7 POLICE INCIDENT INFORMATION SCREEN...................................................25 FIGURE " TAXI DISPATCH NET!OR#.............................................................................27 FIGURE % APPLICATION VIRTUALI$ATION.....................................................................34 FIGURE 10 VIRTUAL DES#TOP INFRASTRUCTURE......................................................3" FIGURE 12 USE CASES FOR VDI.....................................................................................40 FIGURE 14 MA&OR TRENDS IN COMPUTING.................................................................43

INTRODUCTION
#(10anies are increasingly turning t( -irtuali6ati(n as the answer t( these new challenges. 9es)t(0 -irtuali6ati(n is the act (4 se0arating the di44erent c(10uting layers and st(ring s(1e (r all (4 the1 in a data center. Thr(ugh -irtuali6ati(n2 e10l(yees can access their a00licati(ns and data sa4ely (-er a netw(r) and the ris) (4 data l(ss is 1ini1i6ed. ?n the IT side2 -irtuali6ati(n accelerates de0l(y1ent (4 new ca0a7ilities with(ut needing t( ac8uire new hardware and c(n4igure c(10(nents. It als( reduces a00licati(n testing re8uire1ents and c(10ati7ility issues while si10li4ying disaster rec(-ery and c(10liance. Further2 (-er the 0ast 4ew years2 7usinesses ha-e si10li4ied their data center 1anage1ent -ia ser-er -irtuali6ati(n techn(l(gies and achie-ed en(r1(us c(st 7ene4its in the 0r(cess. >(w2 new ad-ances in -irtuali6ati(n and 1(re a-aila7ility (4 7r(ad7and access ena7le c(10anies t( d( the sa1e with enter0rise des)t(0s 7y 0r(-iding the t((ls necessary t( rearrange h(w ,# c(10(nents interact and t( ch((se where th(se c(10(nents reside. Mobile Computing: A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. "(7ile -(ice c(11unicati(n is widely esta7lished thr(ugh(ut the w(rld and has had a -ery ra0id increase in the nu17er (4 su7scri7ers t( the -ari(us cellular netw(r)s (-er the last 4ew years. %n e3tensi(n (4 this techn(l(gy is the a7ility t( send and recei-e data acr(ss these cellular netw(r)s. This is the 0rinci0le (4 1(7ile c(10uting. In this re0(rt we gi-e descri0ti(n (4 Ce1(te 9es)t(0 Virtualisati(n and e3isting cellular netw(r)s and descri7e in detail the #9,9 techn(l(gy which all(ws data c(11unicati(ns acr(ss these netw(r)s. Finally2 we l(() at the a00licati(ns (4 "(7ile #(10uting in the real w(rld.
BRIEF HISTORY

"(7ile tele0h(ny t(() (44 with the intr(ducti(n (4 cellular techn(l(gy which all(wed the e44icient utilisati(n (4 4re8uencies ena7ling the c(nnecti(n (4 a large nu17er (4 users and n(t just sca1s. 9uring the 19D0:s anal(g techn(l(gy was used.
#

%1(ng the 1(st well )n(wn syste1s were the >"T900 and '&0 (>(rdic "(7ile Tele0h(ne! and the %",; (%d-anced "(7ile ,h(ne ;er-ice!. In the 1990:s the digital cellular techn(l(gy was intr(duced with G;" (Gl(7al ;yste1 "(7ile! 7eing the 1(st widely acce0ted syste1 ar(und the w(rld. ?ther such syste1s are the 9#;1D00 (9igital #(11unicati(n ;yste1! and the ,#;1900 (,ers(nal #(11unicati(n ;yste1!. % cellular netw(r) c(nsists (4 1(7ile units lin)ed t(gether t( switching e8ui01ent2 which interc(nnect the di44erent 0arts (4 the netw(r) and all(w access t( the 4i3ed ,u7lic ;witched Tele0h(ne >etw(r) (,;T>!. The techn(l(gy is hidden 4r(1 -iewB it:s inc(r0(rated in a nu17er (4 transcei-ers called Base ;tati(ns (B;!. <-ery B; is l(cated at a strategically selected 0lace and c(-ers a gi-en area (r cell hence the na1e cellular c(11unicati(ns. % nu17er (4 adjacent cells gr(u0ed t(gether 4(r1 an area and the c(rres0(nding B;s c(11unicating thr(ugh a s( called "(7ile ;witching #entre (";#!. The ";# is the heart (4 a cellular radi( syste1. It is res0(nsi7le 4(r r(uting2 (r switching2 calls 4r(1 the (riginat(r t( the recei-er. It can 7e th(ught (4 1anaging the cell2 7eing res0(nsi7le 4(r set-u02 r(uting c(ntr(l and ter1inati(n (4 the call2 4(r 1anage1ent (4 inter-";# hand (-er and su00le1entary ser-ices2 and 4(r c(llecting charging and acc(unting in4(r1ati(n. The ";# 1ay 7e c(nnected t( (ther ";#s (n the sa1e netw(r) (r t( the ,;T>.
Figure : Mobile !witching Centre

The 4re8uencies used -ary acc(rding t( the cellular netw(r) techn(l(gy i10le1ented. F(r G;"2 D90 - 91& "/6 range is used 4(r trans1issi(n and 9 & -9@0 "/6 4(r rece0ti(n. The 9#; (9istri7uted #(11unicati(n ;yste1! techn(l(gy uses 4re8uencies in the 1D00"/6 range while ,#; (,ers(nal #(11unicati(n ;yste1! in the 1900"/6 range. <ach cell has a nu17er (4 channels ass(ciated with it. These are assigned t( su7scri7ers (n de1and. +hen a "(7ile ;tati(n (";! 7ec(1es :acti-e: it registers

with the nearest B;. The c(rres0(nding "; #entre st(res the in4(r1ati(n a7(ut that "; and its 0(siti(n. This in4(r1ati(n is used t( direct inc(1ing calls t( the ";. I4 during a call the "; 1(-es t( an adjacent cell then a change (4 4re8uency will necessarily (ccur - since adjacent cells ne-er use the sa1e channels. This 0r(cedure is called hand (-er and is the )ey t( "(7ile c(11unicati(ns. %s the "; is a00r(aching the edge (4 a cell2 the B; 1(nit(rs the decrease in signal 0(wer. The strength (4 the signal is c(10ared with adjacent cells and the call is handed (-er t( the cell with the str(ngest signal. 9uring the switch2 the line is l(st 4(r a7(ut '001s. +hen the "; is g(ing 4r(1 (ne area t( an(ther it registers itsel4 t( the new ";#. Its l(cati(n in4(r1ati(n is u0dated2 thus all(wing ";s t( 7e used (utside their :h(1e: areas.

MATERIALS AND MET-ODOL!.


Traditi(nal des)t(0 1(dels are generally called 4at clients as c(10ared t( the thin clients in des)t(0 -irtuali6ati(n 1(del. Thin clients 7asically ha-e (nly a dis0lay screen2 )ey7(ard and c(nnecti(n t( the data center2 4r(1 where ?;2 a00licati(ns2 user settings and c(n4igurati(ns can 7e strea1ed as needed. The 7asic c(10(nents (4 a ty0ical des)t(0 -irtuali6ati(n en-ir(n1ent are*
Figure " : materials in desktop virtuali#ation

1. A&ministr#tor/&e'ine& 0irtu#( m#chine E <nca0sulates a 4ull des)t(0 en-ir(n1ent2 including an (0erating syste12 a00licati(ns and (0ti(nal 1anage1ent and security t((ls. 2. Im#)e repositor$E;t(res all -irtual i1ages (n a central ser-er and ena7les -irtual i1ages -ersi(n 1anage1ent2 client-authenticated i1age retrie-al2 and e44icient d(wnl(ad (4 a new i1age (r u0dates. . M#n#)ement ser0erE%ss(ciates -irtual i1ages 4r(1 the i1age re0(sit(ry al(ng with ad1inistrat(r usage 0(licies t( %cti-e 9irect(ry users (r gr(u0s. The

1%

"anage1ent ;er-er als( aggregates clients: e-ents2 and st(res the1 in an e3ternal data7ase 4(r 1(nit(ring and re0(rting 0ur0(ses. '. M#n#)ement conso(eE<na7les ad1inistrat(rs t( c(ntr(l the 1anage1ent ser-er and the i1age re0(sit(ry. &. En&/user c(ient ///The -irtual des)t(0 end de-ice c(nsists (4 4ewest c(10(nents and c(uld 7e (ne (4 the 4(ll(wing* a. 7. Thin clients Fer( #lients

The "eth(d(l(gy 4(r des)t(0 -irtuali6ati(n enc(10asses the 4(ll(wing*

Virtu#( im#)es repositor$ #n& &e(i0er$ E4(r si10li4ying the 0r(cess (4 creating2 testing2 deli-ering2 and 1aintaining -irtual i1ages 4r(1 a central l(cati(n* %d1inistrat(r c(ns(le 4(r -irtual i1age creati(n and testing. #entrali6ed -irtual i1ages re0(sit(ry 4(r i1age st(rage2 -ersi(ning2 and deli-ery 7ased (n "icr(s(4t II; we7 ser-ers. % client c(10(nent that aut(1atically retrie-es -irtual i1ages 4r(1 the centrali6ed re0(sit(ry. %ut(-installati(n 0ac)age 4(r sel4-de0l(y1ent (4 the client c(10(nent and the -irtual i1ages -ia re1(-a7le 1edia (such as 9V9! (r 4r(1 a we7site. ;u00(rt 4(r i1age deli-ery thr(ugh c(ntent distri7uti(n syste1s.

Centr#(i1e& m#n#)ement #n& monitorin)Ehel0s ad1inistrat(rs 1anage the entire li4e-cycle (4 -irtual 1achines de0l(yed (n des)t(0s. The centrali6ed 1anage1ent and 1(nit(ring ca0a7ilities include* % central 1anage1ent ser-er that c(ntr(ls all de0l(yed -irtual 1achines.

11

Integrati(n with %cti-e 9irect(ry t( ena7le 0r(-isi(ning (4 -irtual i1ages 7ased (n gr(u0 1e17ershi0 (r user identity.

=ser authenticati(n 0ri(r t( accessing the -irtual i1age (whether the h(st is (nline (r (44line!. ;u00(rt 4(r de0l(y1ent thr(ugh(ut a heter(gene(us en-ir(n1ent2 adjusting 1e1(ry all(cati(n 4(r the -irtual ,# acc(rding t( the a-aila7le C%" (4 the end0(int2 and changing netw(r) settings acc(rding t( the l(cal netw(r).

% central data7ase (4 client acti-ity and e-ents 4acilitating 1(nit(ring and re1(te tr(u7lesh((ting.

Us#)e po(ic$ #n& &#t# tr#ns'er contro( E9es)t(0 Virtuali6ati(n en-ir(n1ent en4(rces the 4(ll(wing user (r gr(u0 usage 0(licies2 access 0er1issi(ns t( -irtual i1ages2 and data trans4er 0er1issi(ns* Virtual i1age 0r(tecti(n that 0re-ents unauth(ri6ed e3ecuti(n. % c(n4igura7le e30irati(n 4(r the -irtual i1age (r a ti1e li1it 4(r (44line use (t( 4(rce the user t( re-auth(ri6e 7e4(re c(ntinuing t( w(r) (44line!. The a7ility t( all(w (r 7l(c) data trans4er 7etween the -irtual 1achine and the end0(int2 -ia c(0y and 0aste2 4ile trans4er2 (r 0rinting. Se#m(ess en&/user e2perience E The 4(ll(wing can 7e c(n4igured t( 0r(-ide a sea1less e30erience2 1a)ing users unaware (4 the -irtual 1achines running in the 7ac)gr(und. It reduces the training re8uired 4(r de0l(ying -irtuali6ati(n t( n(ntechnical users*

,u7lished a00licati(nsE%00licati(ns installed (n the -irtual 1achine are a-aila7le thr(ugh the standard des)t(0 ;tart 1enu. These a00licati(ns run in Virtual ,#2 7ut are sea1lessly integrated int( the user des)t(0 and a00ear side-7y-side with nati-e a00licati(ns.

12

,(wer user 1(deETechnical users and ad1inistrat(rs can -iew the -irtual 1achine l(ading 0r(cesses and des)t(0 i4 re8uired.

RESULTS AND DISCUSSION


REMOTE DESKTOP VIRTUALIZATION
G9es)t(0 -irtuali6ati(nH is a ter1 used 4(r a new a00r(ach t( the 0r(-isi(ning2 deli-ery2 and 1anage1ent (4 user des)t(0s in the enter0rise. The 1ain 0rinci0le 7ehind this new a00r(ach is le-eraging e3isting and well-0r(-en -irtuali6ati(n techn(l(gies t( -irtuali6e n(t (nly ser-ers 7ut als( user des)t(0s (the w(r)stati(ns!. 9es)t(0 -irtuali6ati(n re0laces the traditi(nal w(r)stati(nIla0t(0 1(del where users run all their a00licati(ns and st(re data (n their des)t(0 de-ices. Instead2 the entire des)t(0 e30erience will 7e e3ecuted in datacenter ser-ers. %lth(ugh2 in the(ry2 the user e30erience re1ains nearly 7e the sa1e. The resulting J-irtuali6edJ des)t(0 is st(red (n a re1(te central ser-er2 instead (4 (n the l(cal st(rage (4 re1(te clientB thus2 when users w(r) 4r(1 their re1(te des)t(0 client2 all (4 the 0r(gra1s2 a00licati(ns2 0r(cesses2 and data used are )e0t and run centrally2 all(wing users t( access their des)t(0s (n any ca0a7le de-ice2 such as a traditi(nal 0ers(nal c(10uter2 n(te7(() c(10uter2 s1art 0h(ne2 (r thin client. The des)t(0 -irtuali6ati(n 1(del all(ws the use (4 -irtual 1achines t( let 1ulti0le netw(r) su7scri7ers 1aintain indi-iduali6ed des)t(0s (n a single2 centrally l(cated c(10uter (r ser-er. The central 1achine 1ay 7e at a residence2 7usiness2 (r data center. =sers 1ay 7e ge(gra0hically scattered2 7ut all 1ay 7e c(nnected t( the central 1achine 7y a l(cal area netw(r)2 wide area netw(r)2 (r -ia the 0u7lic Internet. 9es)t(0 -irtuali6ati(n (44ers ad-antages (-er the traditi(nal 1(del2 in which e-ery c(10uter (0erates as a c(10letely sel4- c(ntained unit with its (wn (0erating syste12 0eri0herals and a00licati(n 0r(gra1s. ?-erall e30enses are reduced 7ecause res(urces can 7e shared and all(cated t( users (n an as-needed 7asis. The integrity (4 user in4(r1ati(n is i10r(-ed 7ecause all data is 1aintained and 7ac)ed u0 in the data center. #(n4licts in s(4tware are 1ini1i6ed 7y reducing the t(tal nu17er (4 0r(gra1s st(red (n any gi-en 1achine. 9es0ite the sharing (4 res(urces2 all users can
13

cust(1i6e and 1(di4y their des)t(0s t( 1eet their s0eci4ic needs. In this way2 des)t(0 -irtuali6ati(n (44ers i10r(-ed 4le3i7ility c(10ared with the si10ler clientIser-er 0aradig1.

14

T.PES O3 DESKTOP VIRTUALIZATION


There are tw( 1ain -ariants (4 des)t(0 -irtuali6ati(n* -oste& &es*top 0irtu#(i1#tion4 This is when a ser-er l(cated in a data center h(sts -irtual 1achines. =sers c(nnect t( the ser-er -ia c(nnecti(n 7r()ers and recei-e their user inter4ace -ia standard 0r(t(c(ls2 such as Ce1(te 9es)t(0 ,r(t(c(l. V"ware Inc. is a1(ng the leaders in this 1ar)et. C(ient 0irtu#(i1#tion4 In this 1(del2 Ghy0er -is(rH s(4tware installed (n the client de-ice all(ws (ne des)t(0 t( run 1ulti0le (0erating syste1s. T(0 -end(rs in this 1ar)et include V"ware Inc.2 "icr(s(4t #(r0.2 ;entilli(n Inc.2 and ,arallels Inc.

-O

TO AC-IEVE DESKTOP VIRTUALIZATION5

Virtual 9es)t(0 In4rastructure KV9IL is an integrated s(luti(n (4 hardware2 s(4tware and 1anage1ent t((ls t( 0r(-ide a re0lace1ent 4(r standard des)t(0 de0l(y1ents. In the si10lest ter1s2 V9I 0laces user des)t(0s (n a centrali6ed ser-er.

1"

DE3ININ! DATA COMMUNICATIONS


9ata #(11unicati(ns is the e3change (4 data using e3isting c(11unicati(n netw(r)s. The ter1 data c(-ers a wide range (4 a00licati(ns including File Trans4er (FT!2 interc(nnecti(n 7etween +ide-%rea->etw(r)s (+%>!2 4acsi1ile (4a3!2 electr(nic 1ail2 access t( the internet and the +(rld +ide +e7 (+++!.

Figure $ : Mobile Communications %verview

9ata #(11unicati(ns ha-e 7een achie-ed using a -ariety (4 netw(r)s such as ,;T>2 leased-lines and 1(re recently I;9> (Integrated ;er-ices 9ata >etw(r)! and %T" (%synchr(n(us Trans4er "(de!IFra1e Celay. These netw(r)s are 0artly (r t(tally anal(g (r digital using techn(l(gies such as circuit-switching2 0ac)etswitching etc.
16

Circuit s+itchin) i10lies that data 4r(1 (ne user (sender! t( an(ther (recei-er! has t( 4(ll(w a 0re-s0eci4ied 0ath. I4 a lin) t( 7e used is 7usy2 the 1essage cann(t 7e redirected2 a 0r(0erty which causes 1any delays. P#c*et s+itchin) is an atte10t t( 1a)e 7etter utili6ati(n (4 the e3isting netw(r) 7y s0litting the 1essage t( 7e sent int( 0ac)ets. <ach 0ac)et c(ntains in4(r1ati(n a7(ut the sender2 the recei-er2 the 0(siti(n (4 the 0ac)et in the 1essage as well as 0art (4 the actual 1essage. There are 1any 0r(t(c(ls de4ining the way 0ac)ets can 7e send 4r(1 the sender t( the recei-er. The 1(st widely used are the Virtual #ircuit;witching syste12 which i10lies that 0ac)ets ha-e t( 7e sent thr(ugh the sa1e 0ath2 and the 9atagra1 syste1 which all(ws 0ac)ets t( 7e sent at -ari(us 0aths de0ending (n the netw(r) a-aila7ility. ,ac)et switching re8uires 1(re e8ui01ent at the recei-er2 where rec(nstructi(n (4 the 1essage will ha-e t( 7e d(ne. The intr(ducti(n (4 1(7ility in data c(11unicati(ns re8uired a 1(-e 4r(1 the ,u7lic ;witched 9ata >etw(r) (,;9>! t( (ther netw(r)s li)e the (nes used 7y 1(7ile 0h(nes. ,#;I has c(1e u0 with an idea called #9,9 (#ellular 9igital ,ac)et 9ata! techn(l(gy which uses the e3isting 1(7ile netw(r) (4re8uencies used 4(r 1(7ile tele0h(ny!. "(7ility i10le1ented in data c(11unicati(ns has a signi4icant di44erence c(10ared t( -(ice c(11unicati(ns. "(7ile 0h(nes all(w the user t( 1(-e ar(und and tal) at the sa1e ti1eB the l(ss (4 the c(nnecti(n 4(r '001s during the hand (-er is undetecta7le 7y the user. +hen it c(1es t( data2 '001s is n(t (nly detecta7le 7ut causes huge dist(rti(n t( the 1essage. There4(re data can 7e trans1itted 4r(1 a 1(7ile stati(n under the assu10ti(n that it re1ains sta7le (r within the sa1e cell.

1#

CDPD TEC-NOLO!.4 T-E -OT COOKIE


T(day2 the 1(7ile data c(11unicati(ns 1ar)et is 7ec(1ing d(1inated 7y a techn(l(gy called #ellular 9igital ,ac)et 9ata. There are (ther alternati-es t( this techn(l(gy na1ely #ircuit ;witched #ellular2 s0eciali6ed "(7ile Cadi( and +ireless 9ata >etw(r)s. %s can 7e seen 4r(1 the ta7le 7el(w the #9,9 techn(l(gy is 1uch 1(re ad-antage(us than the (thers. #ellular 9igital ,ac)et 9ata (#9,9! ;0eed ;ecurity =7i8uity #(st (4 ;er-ice #(st (4 9e0l(y1ent "(7ility Inter(0era7ility Best Best Best Best Best Best Best #ircuit ;witched #ellular Best Better Best Better Best G((d g((d ;0eciali6ed "(7ile Cadi( (<3tended! g((d g((d g((d 7etter 7etter 7etter g((d ,r(0rietary +ireless 9ata >etw(r)s g((d 7etter 7etter g((d g((d g((d 7etter

Overview #9,9:s 0rinci0le lies in the usage (4 the idle ti1e in 7etween e3isting -(ice signals that are 7eing sent acr(ss the cellular netw(r)s. The 1aj(r ad-antage (4 this syste1 is the 4act that the idle ti1e is n(t chargea7le and s( the c(st (4 data trans1issi(n is -ery l(w. This 1ay 7e regarded as the 1(st i10(rtant c(nsiderati(n 7y 7usiness indi-iduals. #9,9 netw(r)s all(w 4i3ed (r 1(7ile users t( c(nnect t( the netw(r) acr(ss a 4i3ed lin) and a 0ac)et switched syste1 res0ecti-ely. Fi3ed users ha-e a 4i3ed 0hysical lin) t( the #9,9 netw(r). In the case (4 a 1(7ile end user2 the user can2 i4
18

#9,9 netw(r) 4acilities are n(n-e3istent2 c(nnect t( e3isting circuit switched netw(r)s and trans1it data -ia these netw(r)s. This is )n(wn as #ircuit ;witched #9,9 (#;-#9,9!.

Figure & : Circuit !witched C'('

;er-ice c(-erage is a 4unda1ental ele1ent (4 0r(-iding e44ecti-e wireless s(luti(ns t( users and using this 1eth(d achie-es this (7jecti-e. +here #9,9 is a-aila7le data is s0lit int( 0ac)ets and a 0ac)et switched netw(r) 0r(t(c(l is used t( trans0(rt the 0ac)ets acr(ss the netw(r). This 1ay 7e (4 either 9atagra1 (r Virtual #ircuit ;witching 4(r1. The data 0ac)ets are inserted (n 1(1entarily un(ccu0ied -(ice 4re8uencies during the idle ti1e (n the -(ice signals. #9,9 netw(r)s ha-e a netw(r) hierarchy with each le-el (4 the hierarchy d(ing its (wn s0eci4ied tas)s.

1$

Figure ):C'(' %verview

The hierarchy consists of the following levels:

"(7ile <nd =ser Inter4ace. =sing a single de-ice such as a ,ers(nal 9igital %ssistant (r 0ers(nal c(10uter which has 7een c(nnected t( a Cadi( Fre8uency (CF! "(de1 which is s0ecially ada0ted with the antennae re8uired t( trans1it data (n the cellular netw(r)2 the 1(7ile end user can trans1it 7(th data and -(ice signals. V(ice signals are trans1itted -ia a 1(7ile 0h(ne c(nnected t( the CF "(de1 =nit. CF "(de1s trans4er data in 7(th 4(rward and re-erse channels using Gaussian "ini1u1 ;hi4t Keying (";K! 1(dulati(n 2 a 1(di4ied 4(r1 (4 Fre8uency ;hi4t Keying (F;K!.

"(7ile 9ata Base ;tati(n ("9B;!. In each cell (4 the cellular rece0ti(n area2 there is a "(7ile 9ata Base ;tati(n ("9B;! which is res0(nsi7le 4(r detecti(n (4 idle ti1e in -(ice channels2 4(r relaying data 7etween the 1(7ile units and the "(7ile 9ata Inter1ediate
2%

;yste1s ("9I;!2 sending (4 0ac)ets (4 data (nt( the a00r(0riate un(ccu0ied 4re8uencies as well as recei-ing data 0ac)ets and 0assing the1 t( the a00r(0riate "(7ile end user within its d(1ain.
o

9etecti(n (4 idle ti1e. This is achie-ed using a scanning recei-er (als( )n(wn as sni44er! h(used in the "9B;. The sni44er detects -(ice tra44ic 7y 1easuring the signal strength (n a s0eci4ic 4re8uency2 hence detecting an idle channel. Celaying data 0ac)ets 7etween 1(7ile units and netw(r)s. I4 the sni44er detects tw( idle channels then the "9B; esta7lishes tw( CF air-lin)s 7etween the end user unit and itsel4.

"(7ile 9ata Inter1ediate ;yste1s ("9I;! Gr(u0s (4 "9B; that c(ntr(l each cell in the cellular netw(r) rece0ti(n area are c(nnected t( a higher le-el entity in the netw(r) hierarchy2 the "(7ile 9ata Inter1ediate ;yste1s. #(nnecti(n is 1ade -ia a wide7and trun) ca7le. 9ata 0ac)ets are then relayed 7y "9B; t( and 4r(1 1(7ile end users and "9I;.

Inter1ediate ;yste1s (I;! "9I; are interc(nnected t( these I; which 4(r1 the 7ac)7(ne (4 the #9,9 syste1. These syste1s are unaware (4 1(7ility (4 end-users2 as this is hidden 7y l(wer le-els (4 the netw(r) hierarchy. The I;s are the syste1s that 0r(-ide the #9,9 inter4ace t( the -ari(us c(10uter and 0h(ne netw(r)s.

21

Figure * :C'(' +etwork

CDPD NET ORK RELIA,ILIT.


There are s(1e acti(ns that are necessary in (rder t( (7tain relia7ility (-er a netw(r).

=ser %uthenticati(n The 0r(cedure which chec)s i4 the identity (4 the su7scri7er trans4erred (-er the radi( 0ath c(rres0(nds with the details held in the netw(r).

=ser %n(ny1ity Instead (4 the actual direct(ry tele0h(ne nu17er 2 the Internati(nal "(7ile ;u7scri7er Identity (I";I! nu17er is used within the netw(r) t( uni8uely identi4y a 1(7ile su7scri7er.

Fraud ,re-enti(n ,r(tecti(n against i10ers(nati(n (4 auth(ri6ed users and 4raudulent use (4 the netw(r) is re8uired.

,r(tecti(n (4 user data* %ll the signals within the netw(r) are encry0ted and the identi4icati(n )ey is ne-er trans1itted thr(ugh the air. This ensures 1a3i1u1 netw(r) and data security.

The data 0ac)ets are trans1itted at s0eeds (4 ty0ically 19.2 Kil(7itsIsec(nd t( the "9B;2 7ut actual thr(ugh0ut 1ay 7e as l(w as 9.@ Kil(7itsIsec(nd due t( the e3tra redundant data that is added t( trans1itted 0ac)ets. This in4(r1ati(n includes sender address2 recei-er address and in the case (4 9atagra1 ;witching2 a 0ac)et (rdering nu17er. #hec) data is als( added t( all(w err(r c(rrecti(n i4 7its are inc(rrectly recei-ed. <ach data 0ac)et is enc(ded with the chec) data using a Ceed-;(l(1(n
22

4(rward err(r c(rrecti(n c(de. The enc(ded se8uence is then l(gically ?C:ed with a 0seud(-rand(1 se8uence2 t( assist the "9B; and 1(7ile units in synchr(ni6ati(n (4 7its. The trans1itted data is als( encry0ted t( 1aintain syste1 security. #9,9 4(ll(ws the ?;I standard 1(del 4(r 0ac)et switched data c(11unicati(ns. The #9,9 architecture e3tends acr(ss layers (ne2 tw( and three (4 the ?;I layer 1(del. The 1(7ile end users handle the layer ' 4uncti(ns (trans0(rt! and higher layers (4 the ?;I 1(del such as user inter4ace.

23

APPLICATIONS O3 MO,ILE COMPUTIN!


The 8uesti(n that always arises when a 7usiness is thin)ing (4 7uying a 1(7ile c(10uter is J+ill it 7e w(rth itMJ In 1any 4ields (4 w(r)2 the a7ility t( )ee0 (n the 1(-e is -ital in (rder t( utili6e ti1e e44iciently. <44icient utili6ati(n (4 res(urces (i.e.* sta44! can 1ean su7stantial sa-ings in trans0(rtati(n c(sts and (ther n(n-8uanti4ia7le c(sts such as increased cust(1er attenti(n2 i10act (4 (n site 1aintenance and i10r(-ed interc(11unicati(n within the 7usiness. The i10(rtance (4 "(7ile #(10uters has 7een highlighted in 1any 4ields (4 which a 4ew are descri7ed 7el(w*

F(r <state %gents <state agents can w(r) either at h(1e (r (ut in the 4ield. +ith 1(7ile c(10uters they can 7e 1(re 0r(ducti-e. They can (7tain current real estate in4(r1ati(n 7y accessing 1ulti0le listing ser-ices2 which they can d( 4r(1 h(1e2 (44ice (r car when (ut with clients. They can 0r(-ide clients with i11ediate 4eed7ac) regarding s0eci4ic h(1es (r neigh7(rh((ds2 and with 4aster l(an a00r(-als2 since a00licati(ns can 7e su71itted (n the s0(t. There4(re2 1(7ile c(10uters all(w the1 t( de-(te 1(re ti1e t( clients.

<1ergency ;er-ices %7ility t( recei-e in4(r1ati(n (n the 1(-e is -ital where the e1ergency ser-ices are in-(l-ed. In4(r1ati(n regarding the address2 ty0e and (ther details (4 an incident can 7e dis0atched 8uic)ly2 -ia a #9,9 syste1 using 1(7ile c(10uters2 t( (ne (r se-eral a00r(0riate 1(7ile units which are in the -icinity (4 the incident. /ere2 the relia7ility and security i10le1ented in the #9,9 syste1 w(uld 7e (4 great ad-antage.

24

Figure , :(olice -ncident -nformation !creen

In c(urts 9e4ense c(unsels can ta)e 1(7ile c(10uters in c(urt. +hen the (00(sing c(unsel re4erences a case which they are n(t 4a1iliar2 they can use the c(10uter t( get direct2 real-ti1e access t( (n-line legal data7ase ser-ices2 where they can gather in4(r1ati(n (n the case and related 0recedents. There4(re 1(7ile c(10uters all(w i11ediate access t( a wealth (4 in4(r1ati(n2 1a)ing 0e(0le 7etter in4(r1ed and 0re0ared.

In c(10anies "anagers can use 1(7ile c(10uters in2 say2 critical 0resentati(ns t( 1aj(r cust(1ers. They can access the latest 1ar)et share in4(r1ati(n. %t a s1all recess2 they can re-ise the 0resentati(n t( ta)e ad-antage (4 this in4(r1ati(n. They can c(11unicate with the (44ice a7(ut 0(ssi7le new (44ers and call
2"

1eetings 4(r discussing res0(nds t( the new 0r(0(sals. There4(re2 1(7ile c(10uters can le-erage c(10etiti-e ad-antages.

;t(c) In4(r1ati(n #(llati(nI#(ntr(l In en-ir(n1ents where access t( st(c) is -ery li1ited i.e.* 4act(ry wareh(uses. The use (4 s1all 0(rta7le electr(nic data7ases accessed -ia a 1(7ile c(10uter w(uld 7e ideal. 9ata c(llated c(uld 7e directly written t( a central data7ase2 -ia a #9,9 netw(r)2 which h(lds all st(c) in4(r1ati(n hence the need 4(r trans4er (4 data t( the central c(10uter at a later date is n(t necessary. This ensures that 4r(1 the ti1e that a st(c) c(unt is c(10leted2 there is n( inc(nsistency 7etween the data in0ut (n the 0(rta7le c(10uters and the central data7ase.

#redit #ard Veri4icati(n %t ,(int (4 ;ale (,?;! ter1inals in sh(0s and su0er1ar)ets2 when cust(1ers use credit cards 4(r transacti(ns2 the interc(11unicati(n re8uired 7etween the 7an) central c(10uter and the ,?; ter1inal2 in (rder t( e44ect -eri4icati(n (4 the card usage2 can ta)e 0lace 8uic)ly and securely (-er cellular channels using a 1(7ile c(10uter unit. This can s0eed u0 the transacti(n 0r(cess and relie-e c(ngesti(n at the ,?; ter1inals.

Ta3iITruc) 9is0atch =sing the idea (4 a centrally c(ntr(lled dis0atcher with se-eral 1(7ile units (ta3is!2 1(7ile c(10uting all(ws the ta3is t( 7e gi-en 4ull details (4 the dis0atched j(7 as well as all(wing the ta3is t( c(11unicate in4(r1ati(n a7(ut their wherea7(uts 7ac) t( the central dis0atch (44ice. This syste1 is als( e3tre1ely use4ul in secure deli-eries i.e.* ;ecuric(r. This all(ws a central c(10uter t( 7e a7le t( trac) and recei-e status in4(r1ati(n 4r(1 all (4 its 1(7ile secure deli-ery -ans. %gain2 the security and relia7ility 0r(0erties (4 the #9,9 syste1 shine thr(ugh.

26

Figure . :/axi 'ispatch +etwork

<lectr(nic "ailI,aging =sage (4 a 1(7ile unit t( send and read e1ails is a -ery use4ul asset 4(r any 7usiness indi-idual2 as it all(ws hi1Iher t( )ee0 in t(uch with any c(lleagues as well as any urgent de-el(01ents that 1ay a44ect their w(r). %ccess t( the Internet2 using 1(7ile c(10uting techn(l(gy2 all(ws the indi-idual t( ha-e -ast arrays (4 )n(wledge at hisIher 4ingerti0s. ,aging is als( achie-a7le here2 gi-ing e-en 1(re interc(11unicati(n ca0a7ility 7etween indi-iduals2 using a single 1(7ile c(10uter de-ice

2#

PROTOCOLS 3OR DESKTOP VIRTUALIZATION


REMOTE DESKTOP PROTOCOL 6RDP7
C9, is a 0r(0rietary 0r(t(c(l de-el(0ed 4(r accessi7ility and 1anage1ent (4 re1(te ser-ers. It 0r(-ides user with the gra0hical inter4ace t( an(ther c(10uter and securely channels the c(11unicati(n 7etween re1(te clients and ser-ers. By de4ault C9, uses T#, 0(rt D9. IT relies (n the #itri3 "ultiwin techn(l(gy. This "ultichannel 0r(t(c(l als( all(ws c(nnecti(n t( a -irtual 1achine (-er a netw(r). "utlichannel ca0a7ility ena7les the use (4 se0arate channels2 called -irtual channels2 t( carry di44erent ty0es (4 data including gra0hics data2 )ey7(ard and 1(use user in0ut2 de-ice c(11unicati(n2 4ile syste12 audi( and -ide( and licensing in4(. C9, was de-el(0ed inde0endent (4 the underlying trans0(rt stac) (such as T#,II,!. This all(ws 4(r additi(n (4 (ther trans0(rt dri-ers 4(r new netw(r) 0r(t(c(ls. C9, '.02 the 4irst -ersi(n (4 C9, was intr(duced with +ind(ws >T '.0 ser-er2 the ter1inal ser-er editi(n. The latest -ersi(n (4 C9,2 C9, $.0 is e-en 1(re 4eature-rich than its 0redecess(rsEena7ling new re1(te 4uncti(nality such as accelerated 7it1a0 rendering2 1ulti-1edia redirecti(n strea1ing2 and netw(r) t(0(l(gy awareness. In sh(rt2 C9, $.0 is 7etter a7le t( su00(rt t(day5s e-er increasingly c(10le3 and rich 1ulti-1edia en-ir(n1ent. ,ASIC ARC-ITECTURE C9, has its (wn -ide( dri-er (n the ser-er t( render dis0lay (ut0ut. The rendering in4(r1ati(n is 7uilt int( netw(r) 0ac)ets 7e4(re sending it (-er t( the client. The rendering in4(r1ati(n at the client is read 7y c(rres0(nding gra0hics de-ice inter4ace (G9I! %,I calls. "(use and )ey7(ard 0resses are r(uted 7ac) t( the ser-er. 9ata sending and recei-ing thr(ugh the C9, stac) is sa1e as in the ?;I 1(del. 9ata 4r(1 an a00licati(n is 0assed d(wn t( the l(wer layers getting encry0ted2 wra00ed2 4ra1ed and 0ac)aged 7y netw(r) 0r(t(c(ls and 4inally sent t( the client. The re-erse 0r(cess (ccurs when data is recei-ed at the (ther end.
28

F(ur c(10(nents within the C9, stac) instance are the "ulti0(int #(11unicati(n ;er-ice ("#;"=N!2 the Generic #(n4erence #(ntr(l (G##!2 +dtshare.sys2 and Tdtc0.sys.

"#;"u3 c(ntr(ls channel assign1ent2 0ri(rity le-els2 and seg1entati(n (4 data 7eing sent. It essentially a7stracts the 1ulti0le C9, stac)s int( a single entity.

G## all(ws the creati(n and deleti(n (4 sessi(n c(nnecti(ns and c(ntr(ls res(urces 0r(-ided 7y "#;.

+dtshare.sys* an C9, dri-er2 4(r =I trans4er2 c(10ressi(n2 encry0ti(n2 4ra1ing.

Tdtc0.sys* a trans0(rt dri-er t( 0ac)age the 0r(t(c(l (nt( the underlying netw(r) 0r(t(c(l2 T#,II,.

3EATURES C9, includes the 4(ll(wing 4eatures and ca0a7ilities* <ncry0ti(n* C9, uses a ci0her designed t( e44iciently encry0t s1all a1(unts (4 data C(a1ing disc(nnect* % user can 1anually disc(nnect 4r(1 a re1(te des)t(0 sessi(n with(ut l(gging (44. The user is aut(1atically rec(nnected t( their disc(nnected sessi(n when he (r she l(gs 7ac) (nt( the syste12 either 4r(1 the sa1e de-ice (r a di44erent de-ice. +hen a user:s sessi(n is une30ectedly ter1inated 7y a netw(r) (r client 4ailure2 the user is disc(nnected 7ut n(t l(gged (44. #li07(ard 1a00ing* =sers can delete2 c(0y2 and 0aste te3t and gra0hics 7etween a00licati(ns running (n the l(cal c(10uter and th(se running in a re1(te des)t(0 sessi(n2 and 7etween sessi(ns. Ce1(te c(ntr(l* #(10uter su00(rt sta44 can -iew and c(ntr(l a re1(te des)t(0 sessi(n. ;haring in0ut and dis0lay gra0hics 7etween tw( re1(te des)t(0 sessi(ns gi-es a su00(rt 0ers(n the a7ility t( diagn(se and res(l-e 0r(7le1s re1(tely.
2$

In additi(n2 C9, c(ntains the 4(ll(wing 4eatures*


;u00(rt 4(r 2-7it c(l(r. I10r(-ed 0er4(r1ance (-er l(w-s0eed dial-u0 c(nnecti(ns thr(ugh reduced 7andwidth.

Key7(ard h(()ing. The a7ility t( direct s0ecial +ind(ws )ey c(17inati(ns2 in 4ull-screen 1(de2 t( the l(cal c(10uter (r t( a re1(te c(10uter.

;(und2 dri-e2 0(rt2 and netw(r) 0rinter redirecti(n. ;(unds that (ccur (n the re1(te c(10uter can 7e heard (n the client c(10uter running the C9# client2 and l(cal client dri-es will 7e -isi7le t( the re1(te des)t(0 sessi(n.

;u00(rts di44erent ty0es (4 netw(r) t(0(l(gies li)e T#,II,2 I;9>2 I,N. C9, is designed t( su00(rt di44erent ty0es (4 netw(r) t(0(l(gies and 1ulti0le .%> 0r(t(c(ls.

C9, 0r(-ides an e3tensi7le 7ase and su00(rts u0 t( @'2000 se0arate channels 4(r data trans1issi(n

DISADVANTA!ES4 /igh 7andwidth re8uire1ents and netw(r) latency 9i44iculty in 4(rwarding thr(ugh r(uters. #ann(t access all )inds (4 syste1s.

3%

PCoIP
,#(I, (,# (-er I,!2 4irst released in 200$2 is a dis0lay 0r(t(c(l that deli-ers -irtual des)t(0s t( re1(te end0(ints (-er any I, netw(r). This 0r(t(c(l has accelerated the ad(0ti(n (4 des)t(0 -irtuali6ati(n s(luti(ns. It als( (-erc(1es the li1itati(ns (4 earlier re1(te dis0lay 0r(t(c(ls li)e C9,. The netw(r) latency enc(untered in C9, is i10r(-ed 1arginally in ,#(I,. ,#(I, is a 4le3i7le de0l(y1ent 1(del and 0r(-ides single 0(int (4 1anage1ent. It is a dyna1ic 0r(t(c(l that 0r(-ides dis0lay t( te3t 7ased user (r designers with 9 re8uire1ents. ,#(I, su00(rts all des)t(0 -ide( c(des and 4(r1ats2 high res(luti(n2 4ull 4ra1e rate 9 gra0hics2 G,= w(r)stati(ns and =;B 0(rts c(nnecti-ity. 9e4ault 0(rt (4 ,#(I, is &0002. 3EATURES Three 1(st i10(rtant 4eatures (4 ,#(I, which 1a)es it r(7ust 4(r des)t(0 -irtuali6ati(n are* 1. /(st rendering* The user data and 0r(cessing are li1ited t( the ser-ers. ,#(I, 7r(adcasts encry0ted 0i3els (nly t( the user end there7y 0reser-ing the ,# en-ir(n1ent. %s the de-ice at the user end just has t( dec(de the 0i3els t( dis0lay2 it is 0(ssi7le t( ha-e ;tateless2 dec(de (nly clients called 6er( clients at user end. There are n( a00licati(n de0endencies and inc(10ati7ilities. The 4uture a00licati(n will als( w(r) and (ne way (4 deli-ery reduces netw(r) latency. 2. "ulti-c(dec i1age dec(10(siti(n* >(t all i1age ele1ents (n dis0lay are (4 the sa1e ty0e. Thus2 using sa1e c(dec 4(r all (4 the1 will (nly increase the netw(r) latency. ,#(I, rec(gni6es di44erent ty0es (4 c(ntent and then uses di44erent c(10ressi(n alg(rith1 and c(dec 7ased (n the c(ntent ty0e. This intelligent i1age dec(10(siti(n and (0ti1i6ed i1age enc(ding als( reduces trans1issi(n 7andwidth. . 9yna1ic netw(r) ada0ti(n* ,#(I, can 7e c(n4igured t( 1anage Bandwidth usage. ,#(I, aut(1atically adjusts the i1age 8uality 7ased (n the netw(r) a-aila7ility. ,#(I,5s rendering a00r(ach is a 0r(gressi-e 7uild. Fr(1 highly c(10ressed gl(ssy i1age it gradually 7uilds a 4ull l(ssless i1age. ,#(I,
31

uses =9, 0r(t(c(l 4(r (0ti1al 0er4(r1ance (4 1edia and strea1ing c(ntent while reducing 7andwidth re8uire1ents. ,ENE3ITS O3 PCOIP4 ,#(I, has 7een a 7rea)thr(ugh inn(-ati(n in dis0lay c(10ressi(n and 0r(0agati(n (-er .%> and +%> netw(r)s. Its 7ene4its are* 1. <nhanced >etw(r) Bandwidth* ,#-(-er-I, techn(l(gy trans1its 0i3els2 n(t data2 decreasing netw(r) latency and 7andwidth usage. ,#(I, als( adjusts as 0er the netw(r) c(nditi(ns t( 0r(-ide 7est user e30erience. 2. Fle3i7le 9e0l(y1ent* ,#-(-er-I, techn(l(gy is deli-ered in 7(th hardware and s(4tware i10le1entati(ns. %s s(4tware end0(ints it is integrated with third 0arty -end(rs 0r(-iding des)t(0 -irtuali6ati(n s(luti(ns. /ardware end0(ints include 6er( clients that (44er the ,#(I, 4uncti(nality. . #(st (4 (wnershi0* ,#-(-er-I, re0laces the traditi(nal ,# with 6er( client (r (rgani6ati(n s0eci4ic de-ices which reduce 1aintenance2 su00(rt and 0r(-isi(ning. This leads t( reduced T#?. '. ;ecurity and 7usiness c(ntinuity* ,#-(-er-I, techn(l(gy uses 12D 7it %<; encry0ti(n (4 0i3els t( 7e trans1itted and data ne-er lea-es the data center. %nti-irus (r anti-1alware is n( 1(re a re8uisite. =;B de-ices are authenticated2 and restricted de-ices l(c)ed d(wn. Finally2 y(ur c(r0(rate I, is 0r(tected. &. >( dri-ers re8uired* =nli1ited des)t(0 0er4(r1ance scala7ility as ,#-(-erI, techn(l(gy is inde0endent (4 h(st #,= (r gra0hics 0r(cessing. #(10lete (0erating syste1 and a00licati(n inde0endence.

ZERO CLIENTS4
Fer( clients are ,#(I, 7ased hardware end0(ints. Fer( clients ha-e the 7est 0(ssi7le 0er4(r1ance and are suited 4(r highest de1anding re8uire1ents li)e 9 designing. Its i10(rtant 4eatures are as 4(ll(ws* 1! ?; and a00licati(n inde0endence 2! .(w 0(wer re8uire1ents and 4an-less
32

! ?nly dec(des h(st rendered 0i3els '! >( c(10(nents li)e #,=2 C%"2 G,= &! .(w 1aintenance @! #(st sa-ings and green c(10uting 7ene4its. $! Cadically ;i10le

33

APPLICATION VIRTUALIZATION
Traditi(nally2 a00licati(ns re8uire t( 7e installed (n the des)t(0Iclient where they share res(urces li)e runti1e li7raries2 registry and (ther c(n4igurati(n settings. In the #pp(ic#tion 0irtu#(i1#tion 1(del2 indi-idual a00licati(ns are enca0sulated with the res(urces they need t( run. %00licati(ns aren5t installed directly (n the client c(10uter2 rather2 is(lated 4r(1 its underlying h(st (0erating syste12 as well as 4r(1 (ther a00licati(ns.

%00licati(n -irtuali6ati(n 1ust 0r(-ide* 1. %ll res(urces re8uired 7y the -irtual a00licati(n are included in the 0ac)age 2. The -irtual a00licati(n is c(10letely se0arated 4r(1 the (0erating syste1 and (ther a00licati(nsB . The -irtual a00licati(n cann(t 1(di4y the nati-e ?; in any way '. The -irtual a00licati(n 7eha-es as i4 installed (n the client de-ice.

Figure 0: Application 1irtuali#ation

34

APPLICATION DELIVER.
STREAMIN ;trea1ing is trans0(rting a00licati(n s0eci4ic dataIres(urces t( the client de-ice when the a00licati(n is e3ecuted. ?nly a 1ini1u1 a1(unt (4 data (c(11(nly 7etween 10- 0O (4 the t(tal a00licati(n! is deli-ered t( a client 7e4(re the a00licati(n is launched. /ence the 4irst ti1e launch (4 the a00licati(n is -ery 8uic)2 and the l(ad (n the netw(r) is reduced t((. %dditi(nal 4eatures (4 the a00licati(n are deli-ered (n de1and2 (r in the 7ac)gr(und with(ut user inter-enti(n. %00licati(n 0ac)ages are st(red (n a (centrali6ed! ser-er. ;trea1ing can (0erate at a 4ile-le-el (wh(le 4iles are c(0ied when they are needed! (r 7l(c)-le-el (4ile chun)s are c(0ied when they are needed!. ;trea1ing is suita7le in well-c(nnected en-ir(n1ents where a00licati(ns sh(uld 7e e3ecuted (nde1and 4r(1 a netw(r) res(urce and end-user i1ages sh(uld 7e )e0t stateless A e.g. V9I and C9;IT;.

EN!A"S#$ATION In <nca0sulati(n2 a00licati(ns are enc#psu(#te& (r iso(#te& 4r(1 (ther a00licati(ns and the underlying +ind(ws ?0erating ;yste1. The a00licati(n is e3ecuted inside the Virtual <n-ir(n1ent and 7eha-es as i4 it is running al(ne in the ?0erating ;yste1. ;ince the %00licati(n Virtuali6ati(n 0re-ents changes t( ;yste1 #(10(nents2 the underlying ?0erating ;yste1 is 0r(tected.

"ORTAB$E A""$I!ATIONS ,(rta7le a00licati(ns are s(4tware 0r(gra1s that can run inde0endently with(ut installing 4iles t( the client de-ice and irres0ecti-e (4 the -ersi(n (4 +ind(ws installed (n the syste1. They are c(11(nly used (n a re1(-a7le st(rage de-ice such as a #92 =;B 4lash dri-e2 4lash card2 (r 4l(00y dis). %gent-less %00licati(n Virtuali6ati(n 1ay c(n-ert e-en c(10le3 a00licati(n int( 0(rta7le a00s.
3"

T-E ,ENE3ITS O3 APPLICATION VIRTUALIZATION


The 7ene4its ass(ciated with a00licati(n -irtuali6ati(n are nu1er(us and include the 4(ll(wing* ;i10li4ied a00licati(n de0l(y1entIretire1ent4 %00licati(ns are ne-er installed int( an (0erating syste1B hence2 the de0l(y1ent (4 the a00licati(ns is greatly si10li4ied. Further1(re2 c(10lete re1(-al (4 all a00licati(n 7its 4r(1 a h(st ,# during retire1ent is assured. ;i10li4ied (0erating syste1 i1age 1anage1ent* %s a00licati(ns are n(w a c(10letely se0arate c(10(nents 4r(1 the (0erating syste12 1anaging ?; i1ages is si10ler. It hel0s create a 1(re dyna1ic des)t(0 en-ir(n1ent with an aggregati(n (4 se0arately 1anaged c(10(nents. <li1inati(n (4 res(urce c(n4licts* Because each a00licati(n is ass(ciated with its (wn -irtual (0erating syste1 res(urces2 res(urce c(ntenti(n and a00licati(n c(n4lict issues can 7e eli1inated. ;i10li4ied a00licati(n testing* Because res(urce c(n4licts can 7e eli1inated2 a00licati(n testing2 (0articularly regressi(n testing! can 7e signi4icantly di1inished. =ser 4le3i7ility* It (44ers user 4le3i7ility2 7ecause a00licati(ns can 7e lin)ed t( users rather than s0eci4ic c(10uter hardware. It als( (44ers a00licati(n sta7ility and relia7ility2 gi-en that e-ery a00licati(n has its (wn 0r(tected c(n4igurati(n.

ISSUES

IT- APPLICATION VIRTUALIZATION

In a shared en-ir(n1ent li)e h(sted V9I (r ;B#2 the (-erhead (4 a00licati(n -irtuali6ati(n needs t( 7e acc(unted 4(r. %00licati(n -irtuali6ati(n 1ight ha-e e44ect (n* #,=I"e1(ry* The -irtuali6ed a00licati(ns 1ight use 1(re #,= cycles andI(r 1e1(ry than l(cally installed a00licati(ns2 a44ecting (ther users (n the sa1e ser-er in a C9;2 (r T;2 en-ir(n1ent (r users (n the sa1e h(st in a h(sted V9I en-ir(n1ent.

36

>etw(r)* Virtuali6ed a00licati(ns are (4ten strea1ed t( the userPs des)t(0 (r sessi(n. 9e0ending (n the si6e (4 the -irtuali6ed a00licati(n and the distri7uti(n 1eth(d the a00licati(n -irtuali6ati(n s(luti(n is using2 this 1ight ha-e an i10act (n the netw(r).

9is)I;t(rage* First (4 all2 the si6e (4 the -irtuali6ed a00licati(ns can 7e i10(rtant 4(r the dis) si6ing (4 the 0hysical des)t(0 (r la0t(0s (r Virtual "achines. The a00licati(n -irtuali6ati(n s(luti(n can use a caching 1eth(d where the -irtuali6ed a00licati(n is cached (n dis). +hen h(sting a large nu17er (4 -irtual des)t(0s2 the caching (4 the -irtuali6ed a00licati(ns ta)es 0lace in these entirely -irtuali6ed des)t(0s. #u1ulati-e this can ta)e u0 a l(t (4 dis) s0ace. +hene-er 0(ssi7le2 a shared caching 1eth(d sh(uld 7e c(nsidered.

I10act (n I?5s* ?n a 0hysical des)t(0 the nu17er (4 I?,; is n(thing t( w(rry a7(ut2 7ut with shared st(rage this is (ne (4 the 7iggest challenges in a V9I 0r(ject. %00licati(n Virtuali6ati(n 1ight ha-e increase the nu17er (4 I?,; greatly2 resulting in degraded 0er4(r1ance.

3#

VDI 6VIRTUAL DESKTOP IN3RASTRUCTURE7


V9I is a ter1 generically used 4(r 9es)t(0 Virtuali6ati(n. /(we-er2 there is 1(re t( 9es)t(0 Virtuali6ati(nB user state -irtuali6ati(n2 a00licati(n -irtuali6ati(n etc. V9I is a ser-er 7ased c(10uting 1(del2 which in-(l-es h(sting user des)t(0 (n -irtual 1achines that run (n a ser-er. #lients can then access their 9es)t(0s 4r(1 l(cal c(10uters (r Thin #lients. It needs t( 7e n(ted that V9I is di44erent 4r(1 ;B#2 th(ugh they 1ay see1 identical. The 1aj(r di44erence 7eingB with ;B#2 1ulti0le users c(nnected t( the sa1e Ter1inal ;er-er access 1ulti0le sessi(ns within the sa1e ?;. In c(ntrast2 with V9I2 each user accesses distinct ?; instance running inside uni8ue Virtual "achines.

Figure 2: 1irtual 'esktop -nfrastructure

VDI ,ENE3ITS
;<#=CITQ* %ll the data is c(n4ined within the data center2 and there is n( l(cal data (n the des)t(0 de-ices. %dditi(nally2 n( data can 7e d(wnl(aded 4r(1 the

38

des)t(0 t( the =;B de-ices (with(ut 0er1issi(n!2 and this 0re-ents users 4r(1 c(0ying 4iles 4r(1 the -irtual 1achines. /ence2 greater security. I",C?V<9 9<;KT?, "%>%G<"<>T* des)t(0 1anage1ent is greatly i10r(-ed 7ecause (4 Fast 0r(-isi(ning 4(r users2 new w(r)stati(ns can 7e set u0 -ery 4ast and the de0l(y1ent (4 Virtual 9es)t(0s and the s(4tware is 4ast and si10le. Fewer hel0 des) calls and 4ewer des)t(0 related 0r(7le1s. #entrali6ed 0atching and a00licati(n installati(nIstrea1ing with(ut l(ading the netw(r). <3cellent 1anage1ent t((ls 4(r ad1inistrati(n and c(ntr(l (-er V9I. #?;T B<><FIT;* V9I thin clients are less e30ensi-e than des)t(0s2 and their re4resh cycle is l(nger than th(se (4 traditi(nal ,#s.. ?rgani6ati(ns can le-erage e3isting ;%> (r >%; de-ices 4(r s(luti(n. The c(st (4 1aintenance (4 w(r)0lace 7ased (n -irtual 1achines is l(wer and des)t(0 1anage1ent c(sts decline 7y si10li4ying ser-er hardware and client de-ices. <><CGQ ;%VI>G;* V9I thin clients use ' watts c(10ared t( the 90-1@0 4(r traditi(nal w(r)stati(nB generate less heat2 and n(ise. #ar7(n 4((t0rint is greatly used as they use less electricity and their re4resh cycles are l(nger (lesser ewaste!. "?BI.< +?CKF?C#<* the 1aj(r 7ene4it (4 V9I is that user des)t(0s are 0(rta7le. The user can rec(nnect 4r(1 any l(cati(n with a -ariety (4 de-ices. This results in n( d(wnti1e 1aintenance t((. <>/%>#<9 =;<C <N,<CI<>#<* des)t(0s can run (n 4aster ser-ers with reduced latency in a00licati(ns (as the res(urces reside in the sa1e 0lace!. ,r(7le1s can 7e 8uic)ly res(l-ed and des)t(0 res(urces can 7e 1(di4ied with

3$

little (r n( interru0ti(n t( the user5s w(r). %nd there is n( white n(ise 4r(1 s0inning 4ans and dis) dri-es. F.<NIBI.ITQ* <ach -irtual 1achine is an i1age that can 7e si10ly c(0ied (r 1(-ed. This gi-es 4le3i7ility t( users and the ad1inistrat(rs can rec(-er data (r the wh(le -irtual 1achine.

Figure " : use cases for 1'-

4%

,ENE3ITS O3 VIRTUAL DESKTOP COMPUTIN!


"aintain the +ind(ws des)t(0s and 7uilds 4r(1 (ne central l(cati(n >( need t( -isit 0hysical 1achines t( install (r u0date s(4tware (r change c(n4igurati(n.

;u00(rt is i10r(-ed 7y shad(wing sessi(ns and watching the user5s ste0s =se C9, t((ls (r the V"ware ser-er c(ns(le t( 4(ll(w what the user is d(ing when gi-ing su00(rt re1(tely2 (r ta)e c(ntr(l (4 the 1achine.

<asy rec(-ery2 re0lace1ent (4 1achines. Blue screen2 dead ?;2 n( 0r(7le1R ;i10ly delete the -irtual 1achine and re0lace it in 1inutes rather than h(urs. >( need t( 0hysically c(llect a 1achine.

#entrali6ed c(ntr(l2 shutd(wn (r restart 1achines re1(tely I4 a user changes de0art1ent2 si10ly change the c(nnecti(n 0r(4ile 4(r that user2 all(wing the1 t( access the a00r(0riate de0art1ent 7uild ;hutd(wn (r restart a client 1achine re1(tely

"anage y(ur 0((l (4 1achines %dd (r re1(-e -irtual des)t(0s as needed in a 4ew 1inutes. >( need t( wait 4(r hardware t( arri-e2 when sta44 changes (ccur. .(wer c(sts ?ld ,#s and l(w c(st thin clients can 7e used2 as the 0r(cessing is d(ne 7y the ser-er n(t the client >( di44icult Ter1inal ;er-er 1anage1ent2 rd 0arty utilities needed >( Ter1inal ;er-er #%. c(sts Ceduced su00(rt and ti1e ad1inistering 0hysical des)t(0s.

41

LIMITATIONS O3 DESKTOP VIRTUALIZATION


,(tential security ris)s i4 the netw(r) is n(t 0r(0erly 1anaged ;(1e l(ss (4 user aut(n(1y and 0ri-acy #hallenges in setting u0 and 1aintaining dri-ers 4(r 0rinters and (ther 0eri0herals 9i44iculty in running certain c(10le3 a00licati(ns such as 1ulti1edia Increased d(wnti1e in the e-ent (4 netw(r) 4ailures Comp(e2it$ #n& shi)h costs o' VDI &ep(o$ment #n& m#n#)ement

42

CONCLUSION
+ith the ra0id techn(l(gical ad-ance1ents in %rti4icial Intelligence2 Integrated #ircuitry and increases in #(10uter ,r(cess(r s0eeds2 the 4uture (4 1(7ile c(10uting l(()s increasingly e3citing. +ith the e10hasis increasingly (n c(10act2 s1all 1(7ile c(10uters2 it 1ay als( 7e 0(ssi7le t( ha-e all the 0racticality (4 a 1(7ile c(10uter in the si6e (4 a hand held (rgani6er (r e-en s1aller. =se (4 %rti4icial Intelligence 1ay all(w 1(7ile units t( 7e the ulti1ate in 0ers(nal secretaries2 which can recei-e e1ails and 0aging 1essages2 understand what they are a7(ut2 and change the indi-idual 0ers(nal schedule acc(rding t( the 1essage. This can then 7e chec)ed 7y the indi-idual t( 0lan hisIher day. The w(r)ing li4estyle will change2 with the 1aj(rity (4 0e(0le w(r)ing 4r(1 h(1e2 rather than c(11uting. This 1ay 7e 7ene4icial t( the en-ir(n1ent as less trans0(rtati(n will 7e utili6ed. This scary c(nce0t (4 a w(rld 4ull (4 inani1ate 6(17ies sitting2 l(c)ed t( their 1(7ile stati(ns2 accessing e-ery s0here (4 their li-es -ia the c(10uter screen 7ec(1es e-er 1(re real as techn(l(gy2 es0ecially in the 4ield (4 1(7ile data c(11unicati(ns2 ra0idly i10r(-es and2 as sh(wn 7el(w2 trends are -ery 1uch t(wards u7i8uit(us (r 1(7ile c(10uting.

Figure & : Ma3or /rends in Computing

43

Indeed2 techn(l(gies such as Interacti-e tele-isi(n and Vide( I1age #(10ressi(n already i10ly a certain degree (4 1(7ility in the h(1e2 ie. h(1e sh(00ing etc. =sing the 1(7ile data c(11unicati(n techn(l(gies discussed2 this 1(7ility 1ay 7e 0ushed t( e3tre1e. The 4uture (4 "(7ile #(10uting is -ery 0r(1ising indeed2 alth(ugh techn(l(gy 1ay g( t(( 4ar2 causing detri1ent t( s(ciety.

44

RE3RENCES
1. #hristy ,ettey2 Gartner <sti1ates I#T Industry %cc(unts 4(r 2 ,ercent (4 Gl(7al #?2 <1issi(ns2 Gartner >ewsr((12 2@ %0ril2 200$. 2. T(1isla- ,etr(-iS2 KreTi1ir Fertalj2 'emystifying 'esktop 1irtuali#ation2 +;<%;2 2009. . >atalie .a17ert2 'emystifying Client 1irtuali#ation2 F(rrester5s2 %0ril 192 200D. '. "ichael C(se2 Fredric) +. Br(ussard2 Agent less Application virtuali#ation: 4nabling the 4volution of the 'esktop2 I9#2 "ay 200D. &. U(n Br(d)in2 1Mware 5olsters 'esktop 1irtuali#ation product2 >etw(r) +(rld2 >(-e17er 2009. @. 9enise 9u7ie2 6eighing the pros and cons of 'esktop 1irtuali#ation 2 >etw(r) +(rld2 Uune 2010. $. "ichael C(se and Candy ,erry2 7uantifying business 1alue of 1Mware 1iew 2 I9#2 ;e0te17er 2010. D. Cu7en ;0ruijt2 Application 1irtuali#ation !mackdown2 ,VC2 ;e0te17er 2010 9. Ce1(te 9es)t(0 Virtuali6ati(n* 68-/4 (A(49 'esktop 1irtuali#ation 7y G-ntelligroupH. 10. 9aniel Be-eridge21'-: A +ew 'esktop !trategy A :uide to Managing ;ser 'esktop 4nvironments with 1irtual 'esktop -nfrastructure2 V"ware F?<9=;
11. =nderstanding the Ce1(te 9es)t(0 ,r(t(c(l2 "icr(s(4t2 "arch 200$. Cetrie-ed

4r(1 htt0*IIsu00(rt.1icr(s(4t.c(1I)7I1D@@0$
12. Ce1(te 9es)t(0 ,r(t(c(l2 ";9> .i7rary2 "ay 20112 Cetrie-ed 4r(1

htt0*II1sdn.1icr(s(4t.c(1Ien-usIli7raryIaa D 01&(-WV;.D&!.as03
13. ,#(I, Techn(l(gy e30lained2 Teradici2 20112 Cetrie-ed 4r(1

htt0*IIwww.teradici.c(1I0c(i0I0c(i0-techn(l(gy.0h0 1'. V"ware View with ,#(I,* In4(r1ati(n Guide2 V"ware Inc2 2011
4"

APPENDI8
AES: Advanced !SI: !pen System Encryption Standard API: Application Program Interface CPU: Central Processing Unit FTA: File Type Associate GCC: Generic Conference Control GDI: Graphics Device Interconnection PC: Personal Comp ter PCoIP: PC over IP 'DC: 'emote Des$top

Connection 'DP: 'emote Des$top

(irt ali)ation 'DS: 'emote Des$top

Services '!I: 'et rn on Investment

Interface GPU: Processing Unit ICT: Information and Graphics

SA": "et#or$ S*C:

Storage

Area

Comm nication Technology I!PS: Inp t ! tp t per Second IP: Internet Protocol ISD": Integrated Service Digital "et#or$ ITU: International

Service

*ased

Comp ting S+(D: Server +osted

(irt al Device SS,: Sec re Soc$et ,ayer TC!: Total Cost of

o#nership TS: Terminal services US*: Universal Serial * s US(: User State

Telecomm nication Union %CS%U&: % ltipoint

Comm nication Service "AS: "et#or$ Attached Storage !S: !perating System

(irt ali)ation (DI: (irt al Des$top

Infrastr ct re (%: (irt al %achine

46

Вам также может понравиться