Sunteți pe pagina 1din 16

White Paper

Citrix Consulting

Virtual Applications and Virtual Desktops


Decision criteria helping to identify the most appropriate solution for each user
Table of contents
Decision Criteria between VDI and TS ........................................................ 1
Overview..................................................................................................... 1
Assess the User Base................................................................................. 2
Structured Users .............................................................................................................................. 2
Unstructured Users .......................................................................................................................... 2

Assess the Device Inventory ....................................................................... 4


Replaced .......................................................................................................................................... 4
Repurposed ...................................................................................................................................... 4
Reused ............................................................................................................................................. 5
BYOC ............................................................................................................................................... 6

Assess the Application Portfolio .................................................................. 8


Delivery Options ............................................................................................................................... 8
Application Characteristics ............................................................................................................... 8
Application-Desktop Integration ....................................................................................................... 9

Conclusion ................................................................................................ 11
Revision History ........................................................................................ 13
Overview
As more organizations investigate the benefits of virtual desktops the question always arises as to
whether a virtual desktop solution, like Citrix XenDesktop, or a server-hosted solution, like Microsoft
Terminal Services or Citrix XenApp, is a better option. Unfortunately, it is not an either-or discussion.
Even users who only require a single application still require a “desktop” that is capable of presenting the
application to the user. The “desktop” could be any number of devices including laptops, desktops, thin
clients, mobile devices, etc. For example, every “desktop” is broken down into the following layers:
 Device
 Operating System
 Applications
 Personalization
Regardless of the device, a user’s operating environment must contain an operating system and
applications. Virtualized desktops and virtualized applications are responsible for the delivery of these
two disparate layers of a user’s desktop.
 Virtualized Desktops: Used to deliver the desktop operating environment to the user across a
wide array of end point devices.
 Virtualized Applications: Used to deliver the applications to the user’s desktop operating
environment, like Microsoft Terminal Services or Citrix XenApp.
Based on the core understanding that all users require a desktop operating environment of some fashion,
this document will explain how to look at an environment and identify the best solution for each user.
There are essentially five potential desktop environments for each user:
 Traditional PC: A traditional PC is what “typically” constituted a desktop environment: physical
device with a locally installed operating system.
 Hosted, server-based desktop: A hosted, server-based desktop is a desktop where the user
interacts through a delivery protocol. With hosted, server-based desktops, a single installed
instance of a server operating system, such as Microsoft Windows Server 2008, is shared by
multiple users simultaneously. Each user receives a desktop "session" and works in an isolated
memory space. Changes made by one user could impact the other users.
 Hosted Virtual Desktop: A hosted virtual desktop is a virtual desktop running either on
virtualization layer (XenServer, Hyper-V or ESX) or on bare metal hardware. The user does not
work with and sit in front of the desktop, but instead the user interacts through a delivery
protocol.
 Streamed Desktop: A streamed desktop is a desktop running entirely on the user’s local client
device. The user interacts with the desktop directly but is only available while they are connected
to the network.
 Local Virtual Desktop: A local virtual desktop is a desktop running entirely on the user’s local
device and continues to operate when disconnected from the network
The best solution comes down to providing the right computing environment for the users that is cost
effective and maintainable. Creating the optimal solution requires an analysis of the environment focusing
on three primary aspects:
 Users
 Devices
 Applications

1
Assess the User Base
When assessing users, the core focus is around which users are structured users or unstructured users.
These two categories of users helps identify what type of an operating environment the user needs in
order to perform their job.
Structured Users
Structured users require a tightly controlled environment that is optimized for the task at hand. In the
simplest terms, structured users commonly are expected to focus on data entry. The data entered can
be anything from sales data, patient information, scheduling data or support tickets. Common
examples of structured users are as follows:
 Call center agent
 Order entry
 Bank clerk
 Nurse
 Receptionist
Each one of the aforementioned users typically works with a small number of applications, following a
repetitive “script” for working with the system. Structured users achieve greater success by entering
data into the system faster, thus increasing their productivity.
Delivering an optimized environment for data entry provides the users with the tools needed to achieve
success, which is focused squarely on the applications. Because of the workflows a structured user
follows, they only require a desktop device that allows them to gain access to their application(s). Any
type of desktop is viable as long as it allows them to use an application efficiently, however certain
options are cost adverse and are not recommended for the structured user. Based on weighing
benefits and costs, the following are the potential desktops solutions for a structured user:

Traditional Shared Hosted Streamed Local


Desktop Desktop Desktop Desktop Virtual
Desktop
Structured
Users

Although any type of desktop is viable for structured users, the local virtual desktop is not
recommended as it assumes the user is still productive when disconnected from the network.
However, the structured user’s productivity is based on the speed of entering data into the system.
Without a network connection, the structured user is not able to complete their task, resulting in the
local virtual desktop being irrelevant. Also, even though the traditional desktop is valid, it does not
solve the underlying challenge of desktop management.
Unstructured Users
Unstructured users require an environment that can be personalized and customized for a particular
project. The unstructured user community is typically responsible for generating knowledge or creating
content taking the form of documents, presentations, videos, graphics, diagrams or programs.
Common examples of unstructured users are as follows:
 Developers
 Consultants
 Executives
 Marketing

2
 Lawyers
 Teachers
 Scientists
 Sales
 Doctors
 Supervisors
Each unstructured user can work with any number of applications, often changing based on the
currently engaged project. In order to be successful, unstructured users are oftentimes evaluated on
the quality of the materials created. If a user believes a certain configuration will help them achieve
success, they need to have the ability to make those changes. One user’s environment is oftentimes
not optimal for anther user, requiring unstructured users to have the ability to modify the system as
needed without impacting others. Depending on the user, there are also special circumstances where
they require specialized hardware in order to perform their job, which can include enhanced
audio/graphics processing peripherals. Granting unstructured users the ability to personalize and
customize their operating environment allows them to have a multitude of options in order to be
successful.
Because users are customizing the desktop, these customizations can have a profound impact to the
operations of the desktop, potentially causing issues. The optimal desktop for an unstructured user
must be capable of delivering performance, applications, personalization while simplifying support.
The potential desktop options for an unstructured user are as follows:

Traditional Shared Hosted Streamed Local


Desktop Desktop Desktop Desktop Virtual
Desktop
Structured
Users
Unstructured
Users

The unstructured user is slightly limited in the type of desktop that is optimal for their needs.
Traditional and shared desktops are not likely candidates for the unstructured users because of the
following reasons:
 Shared Desktop: The unstructured user requires a desktop operating environment that can be
customized to fit their needs. Using a shared desktop runs the risk of a single user’s
configuration impacting other users’ environment.
 Traditional Desktop: Even though the unstructured user would be able to have a productive
computing experience on a traditional desktop, this model does not solve the underlying
desktop challenges of supportability. When an unstructured user encounters issues with the
traditional desktop, extensive time is required to assess, troubleshoot and fix the faulting
device.

3
Assess the Device Inventory
Once the different types of users have been identified, the second biggest impact on the type of resource
(application or desktop) they will receive is based on their hardware device. It is critical to remember that
users receiving only virtualized applications still require a device/desktop in order to view the applications.
The device’s capability plays a significant role in where and how the application or desktop is delivered.
For example, when organizations look at a VDI solution, they are left with the choice of four different
device types:
 Replaced
 Repurposed
 Reused
 BYOC (Bring Your Own Computer)
Replaced
For many organizations, the move to a VDI-based solution stems from the fact that many of the
current desktop devices are outdated and unable to maintain acceptable levels of performance. In
addition, older devices incur greater operating expenses due to frequent hardware failures and lack of
power saving features. Devices falling into this category can be replaced with desktop appliances.
The selection of desktop appliances provides an interface into a virtualized environment hosted within
the data center. In most cases, the selection of a desktop appliance results in the user either receiving
a hosted desktop or a shared desktop, which could take the form of a single published application. In
most instances, the use of a desktop appliance constitutes an embedded device delivery approach, in
that the underlying operating system of the appliance is incorporated directly into the appliance. The
recommended desktop environment for replaced desktops is:

Device Device Delivery Desktop Delivery


Type Installed Streamed Embedded Shared Hosted Streamed Local
Virtual
User: Structured
Device:
Replaced
User: Unstructured
Device:
Replaced
Taking into account the needs of the user, an organization should typically opt for the following:
 Structured users with a replaced desktop should use a desktop appliance to help control
costs. The desktop appliances are embedded devices from which the structured user will be
able to launch applications from the shared environment.
 Unstructured users with desktop appliances as replaced devices will need to utilize a hosted
desktop because the desktop appliance does not provide the user with a local desktop, but
instead allows the user to make a connection to a virtualized desktop.
Repurposed
Although many desktop devices within an organization are not capable of running the latest operating
system or applications, the desktop device can still be utilized as a repurposed device. In essence, a
repurposed device can simply be booted from a USB stick or a CD-ROM. This process boots the
device in a read-only format, the user can only make a connection to a hosted or shared desktop.

4
Repurposing older devices allows an organization to extend the life of certain workstations, helping to
reduce the cost of a VDI solution. Although the repurposed model allows endpoint hardware cost
savings, additional costs must be taken into account:
 Licenses: The repurposed desktop might consume a license and the hosted desktop
consumes another license. There are alternatives for the repurposed operating system to
overcome the initial license charge.
 Data Center Hardware: Additional hardware must be allocated within the data center to run
the hosted desktop.
Delivering the repurposed device can be accomplished with either of the following methods:
 Installed: The repurposed device can be configured with a locally installed/configured
operating system. This approach provides simplicity, but the end point still must be configured
and maintained in a distributed manner.
 Streamed: The repurposed device could receive a pre-configured system as a stream from
Provisioning services. This method helps overcome the challenges of maintaining endpoints,
but at the expense of great infrastructure costs and in the fact that the repurposed devices
might not have the computing resources to execute from a Provisioning services stream.
Adding repurposed devices to the desktop type table would provide the following options:

Device Device Delivery Desktop Delivery


Type Installed Streamed Embedded Shared Hosted Streamed Local
Virtual
User: Structured
Device:
Replaced
Device:
Repurposed
User: Unstructured
Device:
Replaced
Device:
Repurposed

Desktop delivery for repurposed devices is as follows:


 Structured User: The repurposed device is installed for the structured user, but user simply
utilizes the repurposed device in the same manner as a desktop appliance.
 Unstructured User: The unstructured user requires a desktop operating environment. Although
the repurposed device is a desktop, it is a locked down desktop resembling a desktop
appliance. Unstructured users working on a repurposed device require a hosted desktop in
order to perform their job.
Reused
Many organizations have already completed, or are in the midst of completing, a desktop refresh
cycle, resulting in many devices performing optimally for the users. However, the new devices still
require a distributed support and maintenance model for the locally installed components. Reused
devices are capable of benefiting from the centralization provided by VDI while still utilizing the new
hardware devices. For example, instead of locally installing and configuring the operating system and
required add-ons, the device could receive the configuration as a Provisioning services stream.
Utilizing a streamed device delivery allows the reused device to be managed and maintained centrally.

5
By expanding the model to include reused devices, the following is observed.
Device Device Delivery Desktop Delivery
Type Installed Streamed Embedded Shared Hosted Streamed Local
Virtual
User: Structured
Device:
Replaced
Device:
Repurposed
Device:
Reused
User: Unstructured
Device:
Replaced
Device:
Repurposed
Device:
Reused
In a reused device model, users experience the following:
 Structured Users: Structured users utilizing new hardware receive the desktop image as a
streamed desktop. Although this is the most preferred method for structured users on reused
devices, it still wastes the resources of the desktop device as structured users typically do not
stress the underlying hardware. Instead, a better option would be to reallocate the reused
desktop for an unstructured user and replace the desktop with an appliance or repurposed
desktop.
 Unstructured Users: The unstructured user receives the desktop as a streamed desktop and
utilizes the local hardware for application execution, helping to offset the resources required
within the data center. Additionally, depending on the device being reused, unstructured users
also have the option to work on the reused device in an offline fashion, with the proper
delivery of an local virtual desktop and offline applications.
BYOC
The final category of devices is BYOC (Bring Your Own PC). This model allows the user to work on
their personal workstation instead of a corporate owned device. The challenge with the BYOC model
is to protect and segregate the corporate environment from the personal environment. The most
appropriate environment for the user with a BYOC is as follows:
Device Device Delivery Desktop Delivery
Type Installed Streamed Embedded Shared Hosted Streamed Local
Virtual
User: Structured
Device:
Replaced
Device:
Repurposed
Device:
Reused
Device: Not Applicable – Managed by User
BYOC
User: Unstructured
Device:
Replaced

6
Device:
Repurposed
Device:
Reused
Device: Not Applicable – Managed by User
BYOC

Based on the protection required between the personal and corporate entities, the following are the
recommendations for BYOC devices:
 Structured Users: Because structured users only utilize a few applications with minimal
resource impact, they do not require a personalized desktop operating environment. Instead,
they can simply utilize their own BYOC install as their desktop.
 Unstructured Users: Although the BYOC is a desktop itself, the unstructured user needs to
work on a desktop that allows them to work with the entire application set and work with their
required data. The two approaches for BYOC users are
o Hosted Desktop: The hosted desktop simply uses the BYOC as a connection device
to the user’s desktop. All execution occurs on the hosted desktop within the data
center. This secure solution has one drawback in that it requires the user to have a
network connection, which does not work for all users.
o Local Virtual Desktop: The local virtual desktop model allows users to utilize their own
workstation and be able to continue working in an offline mode. All processing occurs
on the local device, which helps offset the hardware requirements for a VDI solution.
However, in order to successfully achieve this level of delivery, processes must be put
into place that allows the corporate environment from being completely separated
from the personal environment.

7
Assess the Application Portfolio
The final area of analysis in order to determine the best type of desktop operating environment for the
user is focused on the applications. Certain applications perform better as a XenApp-hosted application
while other applications perform better running locally on a desktop as a XenApp-streamed application or
a locally installed application. In order to select the most appropriate solution, the following must be
understood:
 Delivery Options
 Application Characteristics
 Application-Desktop Integration
Delivery Options
The following table explains the different approaches for delivering applications to a user:

Installed on Installed on Virtualized on Virtualized on


Desktop Server Desktop Server
Description Application is located Application is located Application located on Application is located
and installed onto the and installed on a the desktop, but and executes on a
base operating system. XenApp server. delivered via XenApp remote XenApp server.
Installed applications Application streaming. Desktop only receives
allow users to work Allow users to work screen updates.
disconnected from the disconnected from the
network. network as long as the
desktop itself is
capable of running
disconnected.
User Access Any user connecting to Users can connect to any desktop and only see the applications they have
the desktop with an been specifically granted access.
installed application will
see and be able to
launch the application.
Maintenance Changes made to the Changes made to the Changes made to the If streamed to the
application must application must application happen server, changes made
happen on every happen on every once. Changes are to the application
desktop (if physical) or server. then automatically happen once and
to the base desktop distributed to all users delivered everywhere.
image (if of the application,
virtual/streamed). regardless of device.
Performance As the application The application The application still The application
executes locally on the executes remotely on a executes on the executes remotely on a
desktop, the desktop’s XenApp server, desktop, resulting in XenApp server,
resources resulting in server desktop resources resulting in server
(CPU/Memory) are resources being being consumed. resources being
consumed. consumed instead of Utilization is higher consumed instead of
desktop resources. than installed desktop resources.
applications due to the Utilization is higher
application than installed
virtualization applications due to the
processes. application
virtualization process.

Based on user access, maintenance and performance reasons, the resulting solution will be based on
a mix of the three.
Application Characteristics
Determining the most appropriate method for delivery is based on the application. The following table
explains the four common categories of applications, while providing guidelines for application
delivery.

8
Base Anomalous Resource Technically
Intensive Challenging
Description Common applications Unique, custom built, Heavy system usage Large, complex
all users require proprietary applications requirements applications
Typically accessed Uncertified Terminal Many specific
daily Services support dependencies
Frequent updates
Example Microsoft Office CAD/CAM SAP
Adobe Acrobat Graphical manipulation Epic
Internet Explorer Video manipulation Cerner
Instant Messenger
Primary Installed on Desktop Virtualized on Server Virtualized on Desktop Virtualized on Server
Delivery  Provides speed of  Provides user  Control resource  Common for
Method execution access control usage based on structured
 Overcomes multi- VM allocation workflow
user capabilities applications
 Optimized and
controlled
environment
Secondary Virtualized on Desktop Installed on Server Virtualized on Server
Delivery  Provides local  Provides  Potentially save
Method access and centralized control resources with
centralized  Does not require shared executing
management Application environment
streaming

Application-Desktop Integration
By understanding the application delivery options and application characteristics, it is possible to
determine the most appropriate desktop device users require, as shown in the following figure:
Device Device Delivery Desktop Delivery
Type Installed Streamed Embedded Shared Hosted Streamed Local
Virtual
User: Structured
Applications: Hosted
Device:
Replaced
Device:
Repurposed
Device:
Reused
Device: Not Applicable – Managed by User
BYOC
User: Unstructured
Applications: Hosted, Installed and Streamed
Device:
Replaced
Device:
Repurposed
Device:
Reused
Device:
BYOC

9
Take the following as examples:
 An unstructured user who has the device replaced with a desktop appliance uses a hosted
desktop that integrates streamed and hosted applications.
 A structured user with a repurposed device uses a locally installed desktop operating system
and connects to a hosted application.
 An unstructured user who uses a reused device receives a streamed desktop and has
applications integrated as streamed and hosted from XenApp.

10
Conclusion
The debate between desktop virtualization, like XenDesktop, and a server-hosted solution, like Terminal
Services (TS) or XenApp is not as important as the decision about selecting the most appropriate solution
for the users. In many environments, if done correctly, organizations will quickly realize that the decision
is not one way or the other, but instead an integrated solution is the best. Desktop virtualization requires a
desktop delivery and application delivery component as each focuses on aspects of a complete user
environment.
 Desktop Delivery (XenDesktop): Used to deliver the desktop operating environment to the user
across a wide array of end point devices.
 Application Delivery (XenApp): Used to deliver the applications to the user’s desktop operating
environment.
Once this core understanding is accepted, organizations can start assessing their environment to
determine where and how to implement and integrate the two solutions into a single, cohesive desktop
virtualization model. Taking all of the options and nuances into account, the most preferred solution for an
environment is as follows:
 Structured Users:
o Desktop Delivery: Repurposed desktop or replaced desktops (desktop appliance) as they
are the lowest cost solution for providing a few applications to the user
o Application Delivery: Hosted applications as they provide application consistency and
application performance.
 Unstructured Users:
o Desktop Delivery: Reused desktops as they offset the hardware costs of desktop delivery
but still overcomes desktop management challenges.
o Application Delivery: Mix of hosted, streamed and installed applications based on the
application characteristics and user needs.

11
12
Revision History
Revision Change Description Updated By Date
1.0 Document released Daniel Feller – Lead Architect August 25, 2009

13
Citrix Worldwide
Worldwide headquarters

Citrix Systems, Inc.


851 West Cypress Creek Road
Fort Lauderdale, FL 33309
USA
T +1 800 393 1888
T +1 954 267 3000

Regional headquarters

Americas
Citrix Silicon Valley
4988 Great America Parkway
Santa Clara, CA 95054
USA
T +1 408 790 8000

Europe
Citrix Systems International GmbH
Rheinweg 9
8200 Schaffhausen
Switzerland
T +41 52 635 7700

Asia Pacific
Citrix Systems Hong Kong Ltd.
Suite 3201, 32nd Floor
One International Finance Centre
1 Harbour View Street
Central Hong Kong
T +852 2100 5000

Citrix Online division


6500 Hollister Avenue
Goleta, CA 93117
USA
T +1 805 690 6400

www.citrix.com

About Citrix

Citrix Systems, Inc. (Nasdaq:CTXS) is the global leader and the most trusted name in application delivery
infrastructure. More than 215,000 organizations worldwide rely on Citrix to deliver any application to users anywhere
with the best performance, highest security and lowest cost. Citrix customers include 100% of the Fortune 100
companies and 99% of the Fortune Global 500, as well as hundreds of thousands of small businesses and
prosumers. Citrix has approximately 8,000 channel and alliance partners in more than 100 countries. Annual
revenue in 2008 was 1.6 billion.

©2009 Citrix Systems, Inc. All rights reserved. Citrix®, Citrix XenApp™, Citrix XenServer™ are trademarks of Citrix Systems, Inc. and/or one or
more of Its subsidiaries, and may be registered in the United States Patent and Trademark Office and In other countries. Microsoft® and Windows®
are registered trademarks of Microsoft Corporation in the United States and/or other countries. UNIX® is a registered trademark of The Open Group
in the United States and other countries. All other trademarks and registered trademarks are property of their respective owners.

PDF-code Date

14

S-ar putea să vă placă și