Desktop Virtualization

14
2015 Desktop Virtualization Planning Guide A compilation of our best educational content from editors and experts, and industry statistics to prepare you for your WAN optimization planning

description

Desktop Virtualization Planning Guide

Transcript of Desktop Virtualization

Page 1: Desktop Virtualization

2015 Desktop Virtualization Planning Guide A compilation of our best educational content from editors and experts, and industry statistics to prepare you for your WAN optimization planning

Page 2: Desktop Virtualization

Page 1 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

The package of information you just downloaded was written and assembled as an excellent guide for IT professionals, like yourself, who are looking to address WAN optimization planning. In a recent survey, we asked qualified IT professionals in Asia Pacific on their desktop virtualization purchases and plans for the coming months. 54% of respondents said they are purchasing new technology to help with their WAN optimization.

In this e-guide you will find related articles, including best practices and technical tips to help your organization with everything you need to know for WAN optimization.

We hope you enjoy this package of information and find it useful when developing your new desktop virtualization plan and strategies in your organization.

Contents

Which challenges is your organization looking to address with your new technology

purchase?

……………………………………………………………………………………………………………………………………. Page 2

Enhance service delivery model with WAN, application optimization

……………………………………………………………………………………………….………………..……………….… Page 2

Basic wide area network optimization techniques

…………………………………………………………………………………………………………..….……………….…… Page 4

What are the most important factors for your organization when evaluating and purchasing

desktop virtualization technologies?

……………………………………………………………………………………………………..….................…..…… Page 8

What is a hybrid WAN service?

……………………………………………………………………………………………………..……….……………….… Page 8

What you need to know about the hybrid WAN

……………………………………………………………………………………………………..…………………………… Page 10

Page 3: Desktop Virtualization

Page 2 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

Which challenges is your organization looking to address with your new technology purchase?

54% of our respondents are purchasing new technology to address their apprehension about performance over the WAN --------------------------------------------------------------------------------- Enhance service delivery model with WAN, application optimization Finding new ways to optimize and accelerate your WAN is a critical necessity as traffic and the number of mobile devices increase across the enterprise. In today's enterprise, finding ways to improve application performance to

enhance your service delivery model and associated network capabilities is a

necessity. Combine this with the increased capabilities of mobile devices and

tablets, and the demand for network application optimization is at an all-time

high. In order for businesses to function efficiently, the WAN must be secure,

reliable and accessible. This guide discusses some of the steps enterprises

can take to boost application performance over the WAN today, and provides a

glimpse into the innovations that will underpin WAN infrastructure tomorrow.

Since all network configurations are unique, so are the techniques required to

manage WAN optimization.

Page 4: Desktop Virtualization

Page 3 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

1. APPLICATION OPTIMIZATION

Beefing up your service delivery model and application performance

Application delivery controllers plus performance management technology

equals a new approach to application optimization. This section discusses

ways that application optimization can help boost WAN performance and thus

boost company productivity. Find out which questions to ask vendors when

you're considering application delivery optimization. Read how businesses are

using service management tools to achieve optimization. Ultimately, the

success of application optimization is measured by how well a company is able

to meet its service-level agreements.

2. REINVENTING THE WAN

Reinventing the wide area network delivery

Work is no longer a physical place where everyone goes to get things done.

Instead, work happens in multiple locations, 24 hours a day, seven days a

week. To that end, the traditional service delivery model, including the WAN,

must evolve to meet the changing needs of the enterprise. The advent of

public cloud services is just one example of changing WAN functionality, and

virtual tools are becoming an alternative to hardware for WAN optimization.

Read about how you can take advantage of new optimization technologies and

find out how to make sure your mobile employees can work more productively.

3. WAN MANAGEMENT

Managing the WAN: New frontiers in service delivery models

Wide area network delivery becomes more complex with the introduction of the

cloud, mobile device capabilities and the increase in security threats. Read

about ways to keep mobile data from clogging up your network and why the

mode of protocol spoofing is a benefit when optimizing WAN traffic. Learn why

the data center can no longer be the gateway to the Internet.

Page 5: Desktop Virtualization

Page 4 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

Basic wide area network optimization techniques Adding bandwidth to your network does not always fix slow applications problems. Consider these WAN optimization techniques first. Centralization and server consolidation continue to be key initiatives for IT

organizations everywhere. The benefits are clear: simplified IT management,

increased data compliance and control, and reduced hardware, software and

management costs.

Unfortunately, these initiatives are usually accompanied by new and complex

application performance challenges. If these challenges are not met, they can

and usually do result in project delays or outright failures, additional costs, and

dissatisfied end users and business leaders. This is because, when

applications and services are centralized, the distance between end users and

services increases. When this happens, networks experience additional

latency and packet loss increases while the connections between end users

and services are constrained by the limited bandwidth of a wide area network

(WAN) connection. The best solution is not to buy more bandwidth or increase

server processing power.

Instead, the ideal solution is to implement wide area network optimization

techniques and to do so at the start -- not toward the end of your centralization

project. Below, I will discuss the most common techniques used in wide area

network optimization and how each works to optimize traffic.

1. Compression: Reduce the amount of data sent over the network

The role of compression is to reduce the size of a file prior to transmission or

storage. One factor influencing the effectiveness of compression is the amount

of redundancy in the traffic. Applications that transfer highly-redundant data,

such as text and HTML on Web pages, will benefit significantly from advanced

compression. Applications that transfer data that has already been

compressed, such as VoIP or JPG images, will see little improvement in

performance from compression.

Page 6: Desktop Virtualization

Page 5 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

2. Caching: Store downloaded network data locally for subsequent

retrieval and reuse

A copy of information is kept locally, on the WAN optimizer, with the goal of

either avoiding or minimizing the number of times that information must be

accessed from a remote site. Caching can take the form of either byte caching

or object caching. With byte caching, the sender and the receiver maintain

large disk-based caches of byte strings previously sent and received over the

WAN link. As data is queued for the WAN, it is scanned for byte strings already

in the local cache. Any strings resulting in cache hits are replaced with a short

token that refers to its cache location, allowing the receiver to reconstruct the

file from its copy of the cache.

Object caching stores copies of remote application objects in a local cache

server that is generally on the same LAN as the requesting system. If the

cache contains a current version of the object, the request can be satisfied

locally at LAN speed and latency. Most of the latency involved in a cache hit

results from the cache querying the remote source server to ensure that the

cached object is up to date.

3. Buffer tuning: Ensure the network is never idle if data is queued

pending transmission

Tuning the flow control buffers for TCP sets them to the optimal size to match

a given network's bandwidth. TCP achieves flow control by using the sliding

window algorithm that takes two important parameters into consideration: The

first one is the receiver advertised window size, which informs the sender of

the current buffer size of the TCP receiver; the second parameter is a

congestion window that controls the number of bytes a TCP flow may have in

the network at any given time. Tuning these buffers sets them to the optimal

size to match a given network's bandwidth. More advanced TCP tuning sets

timer values for retransmissions in a more aggressive manner than the default

values.

Page 7: Desktop Virtualization

Page 6 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

4. Protocol spoofing: Reduce the number of round trips necessary for a

transaction

This refers to a network optimization technique in which a client makes a

request of a distant server, but the request is responded to locally by the WAN

optimizer. Common Internet File System (CIFS) and Server Message Block

(SMB) are the core protocols used to transfer files and browse remote

directory structures. Both are examples of chatty protocols.

For example, CIFS makes zero assumptions about the resiliency or reliability

of the underlying transport protocol and therefore incorporates its own end-to-

end acknowledgement of data transfers. CIFS allows a maximum of 60

kilobytes of data to be read or written at one time even if the underlying

transport protocol uses a sliding window that may be able to accommodate

much larger segments of data. These two attributes of CIFS cause the

response time for large file transfers to increase drastically as the latency

between the client and the server increases. Protocol spoofing algorithms

address the chattiness of these protocols at its source by reducing the number

of round trips required by employing predictive algorithms that are able to

identify files and subdirectories that may be accessed by the client.

5. QoS: Overcome common packet delivery problems inherent in over-

subscribed networks

Quality of Service (QoS) is a tool that provides better service to selected

packets that belong to a pre-specified class of service (CoS). This assumes

that applications have been classified for specific levels of service and that

their data traffic can be identified to belong to that class. CoS is done by either

raising the priority of a packet or limiting the priority of another packet.

Congestion management tools raise the priority of a packet by providing a

unique queue in routers and/or switches for each class separately and

servicing the queue for each class in different ways. The queue management

tool used for congestion avoidance raises priority by dropping lower-priority

packets before higher-priority ones. Policy shaping provides priority to packets

by limiting the throughput of other queues. Congestion management, queue

Page 8: Desktop Virtualization

Page 7 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

management, link efficiency and shaping/policy tools provide QoS within a

single network element.

6. Application delivery: Offload computationally intensive

communications tasks from servers and clients to application delivery

controllers

These solutions are typically referred to as being asymmetric because an

appliance is only required in the data center and not in the branch offices.

Application delivery controllers (ADCs) perform computationally intensive

tasks, such as the processing of Secure Sockets Layer (SSL) traffic, which

frees up server resources. ADCs act as server load balancers (SLBs) that

balance traffic over multiple servers. Another common network offload

technology is TCP Offload Engine. This is a special network interface card that

performs TCP and IP protocol stack processing on the card, thus minimizing

the workload of the machine's CPU.

When used effectively, each of these wide area network optimization

techniques can overcome the challenges introduced by increased latency and

bandwidth constraints created by consolidation and centralization efforts.

About the author:

Henry Svendblad has over 15 years of IT management experience in the

software development, healthcare, professional services, education, and

hospitality market verticals.

---------------------------------------------------------------------------------

Page 9: Desktop Virtualization

Page 8 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

37% of our respondents said that working well over a WAN was their most important consideration --------------------------------------------------------------------------------- What is a hybrid WAN service? When considering hybrid WAN architecture, organizations must focus on the end-user experience and security. The overall landscape for business is changing fast. Users today are

connecting to the corporate network with new, feature-rich applications via a

myriad of devices from various global locations. This evolution creates a

network architecture that must meet needs across a wide set of requirements.

The truth is, there is not one single wide area network (WAN) platform that

exists to meet every requirement across users and offices.

In almost every design we create, the outcome revolves around hybrid WAN

connectivity -- an approach that leverages the public Internet VPN with

traditional WAN services. For example, our designs would normally include the

following:

A core network created using Layer 3 virtual private routed networks,

or VPRns

Page 10: Desktop Virtualization

Page 9 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

A metropolitan area network connected via dedicated fiber

Data center connectivity within different geographic regions connected

via a virtual private LAN Service (VPLS)

Remote users secured via clients anchored by IPsec over the Internet

Remote offices and difficult-to-connect sites connected via IPsec over

the Internet using a dedicated VPN device

Fast-start 3G and 4G connectivity

When you're considering hybrid WAN connectivity, one of the areas it's

important to understand is how to engineer the way users will be supported

versus how to engineer the method used to transport traffic back into the

network. With a multiprotocol label switching network playbook and a VPLS,

predictable performance of traffic is realized by using service-level indicators

together with features such as quality of service, or QoS, to prioritize

applications. When IT teams deploy hybrid WAN connectivity, which features

IPsec and Secure Sockets Layer, or SSL, over the Internet, the user

experience is sometimes hit or miss.

With this in mind, teams must carefully consider the performance of the

applications users will expect to access across each connectivity type. For

example, a user expecting to videoconference from a hotel room in a far-flung

exotic location would most probably be disappointed with the overall quality.

With this said, applications are becoming more aware of the underlying

network bandwidth. In scenarios where conditions are less than optimal, the

application will notify the user that a particular feature may not be available.

In addition to user performance, security is a concern when you're considering

the prospect of connecting a global user base back into the network across the

Internet. The address boundaries of the secure VPN within the overall hybrid

WAN must be extremely clear. There are multiple ways to secure user

connectivity back into the network, but in order to understand which features

are required for your organization, a thorough capability statement must be

created.

Within this statement, decide which resources are key to users and define the

type, location and profile within each subset. A smaller organization will find

Page 11: Desktop Virtualization

Page 10 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

this task much easier than will a global enterprise with thousands of

employees, but by aligning requirements to profiles, the task is less onerous. If

robust policies exist to restrict access where required, using the Internet as

leverage to complete the overall connectivity requirement is a must in today's

highly connected business.

About the author:

Robert Sturt heads up The Network Union, an authorized MPLS BT global

and UK business partner.

What you need to know about the hybrid WAN The ballooning amount of data generated by users and applications is fueling the development of hybrid WANs. Here's what you need to know.

The days of the wide area network (WAN) supporting straightforward data

requirements are over. Today's hyper-connected world is generating and

consuming data at significant rates across multiple types of virtual private

network (VPN) connectivity, ranging from Ethernet and Multiprotocol Label

Switching (MPLS) to Internet Protocol Security (IPSec) over 3G, 4G and

leased-line Internet.

Indeed, the growth of IP traffic is expected to increase significantly due to the

capability and processing power of ubiquitous and feature-rich applications that

run across laptops, PCs, tablets and phones. At the same time, IT budgets

remain under pressure, even as enterprises are required to provide seamless

access to resources -- regardless of location and access type.

Internet and traditional WAN services play an equally significant role for

enterprise connectivity, and therefore must be served with equal importance.

The hybrid VPN enables both the public Internet and private WAN to be

deployed through its ability to terminate multiple interfaces -- each with the

capability to serve traffic differently based on source.

To that end, network designs are increasingly including a hybrid WAN-- one

underpinned by solid integration between private IP and public IP to ensure

Page 12: Desktop Virtualization

Page 11 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

performance. In the past, corporate network connectivity has often existed

within silos, with IT provisioning multiple hardware devices to deal with a

particular termination type. Today, IT teams are looking to consolidate -- not

only for cost reasons, but also to ease management. A hybrid WAN device

allows an organization to mix and match connectivity, terminating Layer 2 and

Layer 3, as well as public Internet access from broadband to 3G and 4G --

each of which adheres to specific security and traffic policies.

A hybrid WAN incorporates three approaches:

A network VPN: Uses global and national service providers, generally

MPLS and virtual private LAN-based VPN services.

CPE hardware-based VPN: Anchored by routers and firewalls capable

of running IPSec between end sites. The customer premises

equipment (CPE) resides at the customer's location.

Application VPN: Application tunnels from hosts are created

independently on a per-user or per-application basis.

The overall supportable features of a hybrid WAN include:

Transport independence: The ability to terminate all traffic sources from both

office and remote users, including MPLS, virtual private LAN service and

IPSec over the Internet. Transport independence also supports policy-based

application routing; in other words, the CPE will send traffic to the appropriate

resource based on certain parameters.

Network flow control: Includes application awareness, which is the capability

to deny or deliver applications intended for a subset of users; statistical

reporting, or the ability to report on bandwidth usage, latency, jitter and uptime

per connection; policy-based routing, permitting traffic to be routed based on

network performance requirements. In these cases, less mission-critical traffic

may be routed over a lower-priority circuit or connection. Flow control also

includes the ability to load-balance over multiple connections, providing

aggregated bandwidth.

Page 13: Desktop Virtualization

Page 12 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

Application performance optimization: This encompasses sending

applications through a specific network path to create an optimized delivery

path, based on acceleration and application optimization via caching and local

packet acknowledgment services.

Security: Is achieved through capabilities that include IPSec and Secure

Socket Layer termination with further support for token access and network

firewalling to restrict traffic types, certain users or to segregate extranet

partners.

Regardless of the capability of these hybrid services, IT managers must pay

special attention to application and security requirements. As with all designs,

your specific goals and objectives will dictate how a hybrid WAN approach may

work for you. If, for example, you need branch connectivity for only limited

times or you require fast provisioning via broadband providers, a hybrid

approach may be the answer. But enterprises must also gauge how they want

to segment users and applications, and enable overall access to their network.

About the author

Robert Sturt heads up The Network Union, an authorized MPLS BT global

and UK business partner.

If you are looking for more related tips and expert advice check out these

resource pages on WAN Optimization planning:

SearchNetworking.com

SearchEnterpriseWAN.com

Page 14: Desktop Virtualization

Page 13 of 14

2015 Desktop Virtualization Planning Guide

Contents

Which challenges is your organization looking to address with your new technology purchase?

Enhance service delivery model with WAN, application optimization

Basic wide area network optimization techniques

What are the most important factors for your organization when evaluating and purchasing desktop virtualization technologies?

What is a hybrid WAN service?

What you need to know about the hybrid WAN

Free resources for technology professionals TechTarget publishes targeted technology media that address your need for

information and resources for researching products, developing strategy and

making cost-effective purchase decisions. Our network of technology-specific

Web sites gives you access to industry experts, independent content and

analysis and the Web’s largest library of vendor-provided white papers,

webcasts, podcasts, videos, virtual trade shows, research reports and more

—drawing on the rich R&D resources of technology providers to address

market trends, challenges and solutions. Our live events and virtual seminars

give you access to vendor neutral, expert commentary and advice on the

issues and challenges you face daily. Our social community IT Knowledge

Exchange allows you to share real world information in real time with peers

and experts.

What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of

editors and network of industry experts provide the richest, most relevant

content to IT professionals and management. We leverage the immediacy of

the Web, the networking and face-to-face opportunities of events and virtual

events, and the ability to interact with peers—all to create compelling and

actionable information for enterprise IT professionals across all industries

and markets.

Related TechTarget Websites