4 th October 2012 Optimising network delivery of virtual desktops Jason Poole Business Development Manager, EMEA (Cloud Networking) Michael Aldridge Senior.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Computer networks Fundamentals of Information Technology Session 6.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Module 14: Implementing an Active Directory Infrastructure.
The future of Desktops Transform Your Desktop with Virtualization.
PCIT201. XenApp 6.5 and earlier IMA = Independent Management Architecture XenApp 7.x and XenDesktop 5+ FMA = FlexCast Management Architecture.
Module 5: Configuring Access for Remote Clients and Networks.
Optimizing the User Experience Throughout the Infrastructure Consolidation Process Dan Smith, Enterprise Solutions Manager, GTSI Chris Theon, Practice.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Ask a question via #uktechdays or text Microsoft to What is the Optimised Desktop? Does one size fit all? Some vendors would lead you to think.
Citrix Partner Update The Citrix Delivery Centre.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Deliver Citrix Desktop Virtualization Confidently with Microsoft SCOM
Customer needs EnterpriseGrade HyperScale Hybrid.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Virtual Desktop Infrastructure Omaha InfoTech 2012 Conference 8/15/20151.
Branch Repeater 6.0 A Technical Introduction Oded Nahum – Branch Repeater Product Specialist September 2011.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Windows Server 2003 Terminal Server. Windows Terminal Server Rapid access to data and applications from anywhere LAN Data Wireless LAN VPN Applications.
Virtual Desktops and Flex CSU-Pueblo Joseph Campbell.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: November 2011.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
QuickBooks, hosted by Reckon Online Catie Cotcher.
Basic Concepts Of CITRIX XENAPP.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Enabling Technologies (Chapter 1)  Understand the technology and importance of:  Virtualization  Cloud Computing  WAN Acceleration  Deep Packet Inspection.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Daniel Mar, Principal Consultant Microsoft Azure RemoteApp Deployment, Management and Administration ARC44 2.
Michael Kleef Senior Technical Product Manager Microsoft Corporation SESSION CODE: WSV205.
Virtualization Vitalis Konopelec Technology Solution Professional Microsoft Slovakia s.r.o.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
XenApp & XenDesktop 7 Espen Berger & Owe Kvisler Senior Consultants Oslo, Wedel Lunch & Learn, Why upgrade?
Configuring Print Services Lesson 7. Print Sharing Print device sharing is another one of the most basic applications for which local area networks were.
Planning Application Services Lesson 4. Deploying Application Servers Organizations supply their employees with computers so that they can get work done,
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Understanding Citrix HDX Graphics
Virtual Desktop Infrastructure
1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions
Configuring and Troubleshooting Routing and Remote Access
Data Networking Fundamentals
Network+ Guide to Networks 6th Edition
Introduction to Dell SonicWALL WAN Acceleration
Cisco Prime NAM for WAN Optimization Deployment
Presentation transcript:

4 th October 2012 Optimising network delivery of virtual desktops Jason Poole Business Development Manager, EMEA (Cloud Networking) Michael Aldridge Senior System Engineer, EMEA (Cloud Networking) Important – Webinar Audio The audio for this webinar is available over VoIP. Just select the ‘Use Mic & Speakers’ option to listen to the webinar through your computers speakers. To listen using your telephone select the ‘Use Telephone’ option. For local numbers click the ‘additional numbers’ link. You will need to use the Access Code and Audio PIN. The webinar will start at 3:00pm (BST)

Industry trends and IT resources Centralisation of ResourcesMultiple devicesDistributed workforce Work and play from any device, anywhere

Change everything… but wait, consideration? Cost reduction Business Agility Improved security Improved compliance Ease of management Why Implement a Desktop Virtualisation Solution?

Centralisation is a single point of failure Benefits of Desktop Virtualisation are realised through centralisation Branch office workers might experience poor experience 80% of employees are located away from the HQ and the data centre How to provide the access to the virtual desktop More and more users are bringing their own devices Requirement for remote access and maintaining security Considerations for a successful Desktop Virtualisation

Remote Access

Anywhere Access Allows users to securely access desktops and applications using any device in any location, including home computers and mobile devices. HDX SmartAccess Delivers simple and seamless secure access

Network and device roaming Enables users’ sessions to transparently and securely move between networks and devices by dynamically adapting access. HDX SmartAccess Delivers simple and seamless secure access Anywhere Access

Single sign-on Improves the user’s experience by reducing unnecessary authentication prompts and the number of passwords users need to remember. HDX SmartAccess Delivers simple and seamless secure access Anywhere Access Network and device roaming

Granular Action Control Allows the administrators to define capabilities within application to which users have access. HDX SmartAccess Delivers simple and seamless secure access Anywhere Access Network and device roaming Single sign-on

Availability

Goal: Network Infrastructure Fault tolerance Roadblocks: Virtual desktop hosting platform Operating system delivery Application and desktop delivery Desktop controllers Application controllers High Availability

Datacenter – High Availability

Remote User Branch Office Home Office Tablet NetScaler Desktop Delivery Controller HQ Office XenDesktop FarmXenServer Resource Pool Active Directory Data Store License Server DHCP Infrastructure Virtual Desktop 1 Personalization: User A Apps: Office OS: Vista Virtual Desktop 2 Personalization: User B Apps: Office OS: XP Virtual Desktop 3 Personalization: Apps: OS: F i r e w a l l Personalization Applications OS Provisioning Server XenApp Controller File Share Desktop Delivery Controller Data Collector VistaWindows XP Windows 7 User A User B User C User D User E Web Interface Strong SLAs Secure Access

Remote User Branch Office Home Office Tablet NetScaler Desktop Delivery Controlle r HQ Office XenDesktop FarmXenServer Resource Pool Active Directory Data Store License Server DHC P Infrastructure Virtual Desktop 1 Personalization: User A Apps: Office OS: Vista Virtual Desktop 2 Personalization: User B Apps: Office OS: XP Virtual Desktop 3 Personalization: Apps: OS: F i r e w a l l Personalization Applications OS Provisioning Server XenApp Controller File Share Desktop Delivery Controlle r Data Collector VistaWindows XP Windows 7 User A User B User C User D User E Web Interface Strong SLAs Secure Access Remote User Branch Office Home Office Tablet NetScaler Desktop Delivery Controller HQ Office XenDesktop Farm XenServer Resource Pool Active Directory Data Store License Server DHCP Infrastructu re Virtual Desktop 1 Personalization: User A Apps: Office OS: Vista Virtual Desktop 2 Personalization: User B Apps: Office OS: XP Virtual Desktop 3 Personalization: Apps: OS: F i r e w a l l Personalization Applications OS Provision ing Server XenApp Controller File Share Desktop Delivery Controller Data Collector VistaWindows XP Windows 7 User A User B User C User D User E Web Interf ace Global Availability Remote User Branch Office Home Office Tablet NetScaler Desktop Delivery Controller HQ Office XenDesktop Farm XenServer Resource Pool Active Directory Data Store License Server DHCP Infrastructu re Virtual Desktop 1 Personalization: User A Apps: Office OS: Vista Virtual Desktop 2 Personalization: User B Apps: Office OS: XP Virtual Desktop 3 Personalization: Apps: OS: F i r e w a l l Personalization Applications OS Provision ing Server XenApp Controller File Share Desktop Delivery Controller Data Collector VistaWindows XP Windows 7 User A User B User C User D User E Web Interf ace

Data may not be replicated to all sites Data Proximity WAN North America EMEA

Ensure that only ICA traverses the WAN GSLB with Site Roaming WAN North America EMEA

User Experience Deployment across a WAN

Sexy interface – graphic intensive Chatty protocols Testing labs Gigabit connectivity 0 ms Latency Citrix Confidential - Do Not Distribute Applications are designed for the LAN Deployed across a WAN? Slow? = “that’s a network issue. You fix it.”

HDX ICA protocol is an underlying technology for HDX (High-Definition User Experience)

How much bandwidth is enough? It depends on: Other network traffic Application bandwidth requirements Number of users User behavior And more! Bandwidth Allocation for ICA vs.

ICA sessions to drop Users experience choppy typing or screen paints Session Reliability to be invoked (if enabled) User sees application but can’t use it Insufficient Bandwidth Causes... Dear Mr. Templeton, I love Citrix XenApp! How can I purchase more licenses?

Already highly compressed and optimized Automatically tunes itself to further compress when less bandwidth available Single session bandwidth testing not valid! ICA Compression ICA Session

WAN Optimisation for Desktop Virtualisation

What is ICA Optimization? Enhancements to Repeater compression engine ICA Encryption/Decryption The ICA Parser ICA Intra-Session Compression enhancements ICA Cross-Session Compression Adaptive TCP Flow Control Adaptive TCP Flow Control Adaptive Compression Adaptive Protocol Acceleration Traffic Prioritization Branch Staging of Streamed Apps Branch Caching of Hosted Apps

ICA Parser Acts as an intermediate for decryption/encryption Can decrypt all ICA encryption except for SSL. No cert installed on the acceleration pair Supports Basic, RC-40, RC-56 and RC-128 encryption levels Re-encrypts on WAN, transparently to the client. Branch Repeater Repeater or Branch Repeater XenApp Farm Branch Client LAN Client is relieved of ICA decompression tasks ICA Connection initialization WS/CBR Compressed Traffic Decrypt, ICA Parser looks for ICA/CGP Signature, Re-encrypt. De-crypt, then either disk based or memory based compression histories are used, then re- encrypt. WANLAN

ICA Parser ICA compression requests Server/Client are disabled Parsing only occurs on accelerated connections. When a connection is established the ICA handshake is detected. At that point it is determined if it is ICA or CGP (detected in the connection payload). Branch Repeater Repeater or Branch Repeater XenApp Farm Branch Client LAN Client is relieved of ICA decompression tasks ICA Connection initialization WS/CBR Compressed Traffic Decrypt, ICA Parser looks for ICA/CGP Signature, Re-encrypt. De-crypt, then either disk based or memory based compression histories are used, then re- encrypt. WANLAN

ICA Parser Separates headers from payload and bulk from interactive Print/File/Multimedia Bulk traffic goes to disk (DBC) ThinWire graphics commands Interactive goes to memory (MBC) Header data goes to the small matcher (Nano) Branch Repeater Repeater or Branch Repeater XenApp Farm Branch Client LAN Client is relieved of ICA decompression tasks ICA Connection initialization WS/CBR Compressed Traffic Decrypt, ICA Parser looks for ICA/CGP Signature, Re-encrypt. De-crypt, then either disk based or memory based compression histories are used, then re- encrypt. WANLAN

ICA Compression - Cross session Compression Branch Repeater Repeater or Branch Repeater XenApp Farm LAN Client is relieved of ICA decompression tasks Native ICA Compression enabled by default WS/CBR Compressed Traffic WS/CBR turns off XA compression and enables WS compression during negociation. Either disk based or memory based compression histories are used. WANLAN Subsequent packets are compared to the compression history on the sending side. Payload matches are substituted with a token in lieu of the whole packet. The server still sends, and the client still received what they expect to.

ICA Compression - Cross session Compression Branch Repeater Repeater or Branch Repeater XenApp Farm LAN Client is relieved of ICA decompression tasks Native ICA Compression enabled by default WS/CBR Compressed Traffic WS/CBR turns off XA compression and enables WS compression during negociation. Either disk based or memory based compression histories are used. WANLAN After the histories are populated, if a second client requests the same data in his/her ICA session, a second match can occur. Tokens are sent and the payload is pulled from the client side compression history. The more users of the same application, the better.

Use Case – ICA Compression of Display Traffic Repeatable data bitmaps can be reused for subsequent requests Cross-session compression enhanced Repeatable vs. Unique Data Unique data Repeatable data

Use Case - ICA Optimization of Print Traffic Repeater compresses using disk (disk-based compression) ᵒMinus the headers ᵒSecond pass of the same print job ~70:1 compression ᵒSmall modifications followed by a print-job resend Compresses well (35-40:1)

What is an ICA Virtual Channel?  A Citrix Independent Computing Architecture (ICA) virtual channel is a bidirectional connection for the exchange of generalized packet data between a Citrix XenApp/XenDesktop Server and a ICA compliant client.  Virtual channels correspond to virtual drivers; each providing a specific function. Some are required for normal operation, and others are optional.  Virtual drivers operate at the presentation layer protocol level. There can be a number of these protocols active at any given time by multiplexing channels.  There are a total of 64 virtual channels in the ICA protocol. However for most user sessions, between are usually utilized. ICA Review – Virtual Channels

ICA QoS Single Stream ICA Priority Packet Tagging allows prioritization of ICA sessions based on the virtual channel data being transmitted. (what the user is doing within the app/session) This is done by associating each virtual channel’s two-bit priority to a packet priority. The two priority bits combine to form four priority values:  00 (0) - High Priority  01 (1) - Medium Priority  10 (2) - Low Priority  11 (3) - Background Priority These priority bits can then be assigned to Branch Repeater Quality of Service queues to allow dynamic QoS.

The Single Stream ICA Problem compressed and encrypted ICA data The user creates an ICA session. User interface traffic is tagged with a priority bit of zero (thin wire). Branch Repeater identifies the priority tags in real time and applies QoS appropriately. Session Bandwidth

The Single Stream ICA Problem compressed and encrypted ICA data The user then starts a print job within the ICA session. Print traffic is tagged with a priority bit of three (real time). Branch Repeater identifies the new priority tags in real time and applies QoS appropriately. Session Bandwidth

The Single Stream ICA Problem compressed and encrypted ICA data The user then either returns to the app’s user interface or starts a second application. (thin wire) The new observed priority bits of the session cause the session to be QoS’ed as a priority zero. Prioritization of printing traffic is now lost. Session Bandwidth

ICA Stream #1(Very High) ICA Stream #2 (High) ICA Stream #3 (Medium) ICA Stream #4 (Low) Channel NameDefault PriorityDescriptionVirtual Driver CTXTW0Remote Session Screen Update (THINWIRE)vdtw30n.dll CTXTWI0Seamless Windows Screen Update (THINWIRE)vdtwin.dll CTXTWN0Winstationwfica32.exe CTXEUEM0End User Experience Monitoringvdeuemn.dll CTXZLFK0Local Text Echo and Keyboard Feedbackvdzlcn.dll CTXZLC0Speed Screen Latency Reduction - Screenvdzlcn.dll CTXZLFK0Speed Screen Latency Reduction - Fontsvdfon30n.dll CTXCTL0ICA Session Controlvdctln.dll CTXFLSH1Multimedia - Flashvdflash.dll CTXGUSB1USB Redirectionvdgusbn.dll CTXMM1Multimedia - Streamingvdmmn.dll CTXCLIP1Client Clipboard Mappingvdclipn.dll CTXCAM1Client Audio MappingvdcamN.dll CTXLIC1License Managementwfica32.exe CTXVFM1Video Server – (no longer used)n/a CTXPN1Program Neighborhoodvdpnn.dll CTXCCM2Client COM Port Mappingvdcom30N.dll CTXCDM2Client Drive Mappingvdcdm30n.dll CTXPASS2Transparent Key Pass-Throughvdkbhook.dll CTXCPM3Printer Mapping for Spooling Clientsvdcpm30N.dll CTXCM3Client Management (Auto-Update)vdcmN.dll CTXLPT13Legacy LP1 Port Mappingwfica32.exe CTXLPT23Legacy LPT2 Port Mappingwfica32.exe CTXCOM13Legacy COM1 Port Mappingwfica32.exe CTXCOM23Legacy COM2 Port Mappingwfica32.exe Virtual Channels

Multi-Stream ICA Terminology Single-port, Multi-stream ICA (MSI Default)  4 random ports at client, 1 primary port on server  Automatically enabled on ICA server by Branch Repeater 6.0. Multi-port, Multi-stream ICA  4 random ports at client, 1 primary and up to 3 secondary ports on server  Most common deployment if used without Branch Repeater Single-port, Single-stream ICA  1 random port at client, 1 primary port on server  The pre-MSI default connection type  If any Branch Repeater on the link vetos MSI, or old versions used

How Does Branch Repeater Optimize ICA? Adaptive orchestration with XenDesktop and XenApp  Unprecedented visibility into XenDesktop and XenApp traffic  Custom acceleration modes for print, video and file traffic  Minimum changes to underlying XenDesktop or XenApp infrastructure

Branch Repeater with ICA

Branch Repeater reduces the bandwidth consumed per session by up to 89% Branch Repeater can double the number of users on the same WAN connection Branch Repeater reduces session launch times by up to 40% and print spooling times by up to 60% CTX124457: Data Analysis

Santa Barbara Redmond Schaffhausen Chicago Bedford Dallas Paris Madrid Munich Copenhagen Vianen Chalfont Sydney Dublin Miami Santa Clara Cambridge Mexico City Toronto Atlanta (DR) New York City Bethesda Fort Lauderdale Hong Kong Tokyo Singapore Bangalore Stockholm Data center office Regional headquarters Regional offices Disaster recovery Citrix-on-Citrix: 56 Branch Repeaters Deployed LocationBranch Repeater Model Main data centers8820 Regional/sales offices8540

Summary Industry trends are driving desktop virtualisation as a solution The same trends mean there are considerations for successful deployments Networks must be optimised to ensure Availability and User experience Citrix has the components to ensure Enterprises can realise the benefits of Centralisation, Consumerisation and Geographical dispersion 43 Desktop virtualisation is a solution not a product

Follow us… Citrix blogDesktop Virtualisation Web Community

Work better. Live better.