Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

VDI Contents

• Introduction
• Features
• Deployment solution
• Functions
• Maintenance
VDI vs. Shared
Desktops
Shared Desktop
Desktop sharing is a common name for technologies and products that
allow remote access and remote collaboration on a person's computer 
desktop through a graphical terminal emulator.
The most common two scenarios for desktop sharing are:
Remote login
Real-time collaboration
Common Applications or Tools
Team Viewer
Zoom
Skype
WebEX
Desktop Virtualization
• Desktop virtualization is a software technology that separates the 
desktop environment and associated application software from the
physical client device that is used to access it.
• Desktop virtualization implementations are classified based on
whether the virtual desktop runs remotely or locally, on whether the
access is required to be constant or is designed to be intermittent,
and on whether or not the virtual desktop persists between sessions. 
Fusion Access
• FusionAccess is a desktop management system of the Huawei
FusionCloud Desktop Solution. The computing and storage resources
of computers are centrally deployed in the cloud computing center.
Physical resources are converted into virtual resources through
virtualization technology. Telecom carriers or enterprises integrate the
virtual resources into virtual machines (VMs) of different
specifications based on user demands, and supplies the virtual
desktop service to users.
• FusionAccess provides a portal graphical user interface (GUI) for
administrators to quickly provision, maintain, and reclaim virtual
desktops
• servers centrally store user data to enhance the application and data
security.
• 
Features

• Rich User Experience

• Access from various terminals


• Peripheral resource usage
• VMs running various operating systems (OSs)
• Video playback
 
Features
• Minimum Maintenance Costs
• Quick VM provisioning
• Improves resource utilization:
• Minimizes downtime and improves reliability.
• Key VM management components such as the ITA, HDC, and WI can
work in active/
• standby mode or load sharing mode to minimize downtime and
improve reliability.
Features
• High Security  
• VMs are located in a data center, which is not subject to malicious attacks like
PCs.
• Secure Sockets Layer (SSL) and certificate authentication are used to ensure that
only secure clients can access VMs.
• Active Directory (AD) domain authentication is performed to ensure that only
authorized users can log in to VMs.
• Each VM has independent virtual CPU (vCPU), memory, disk, and network
resources.
Contd
• VMs are separated from each other like PCs. Users can access only
allowed VMs.
• Information between clients and servers and between internal
components of the desktop cloud system is transmitted over SSL. This
ensures information transmission security.
• All user data is deleted when VMs are safely deleted in FusionAccess.
This prevents user data from being stolen or misused.
Hardware
Requirements
Contd
• Management and service plane
• management plane IP addresses in the same VLAN:
• Management IP addresses of all hosts, that is, IP addresses of the
management network ports on hosts
• IP addresses of the VMs onwhich FusionCompute VRMand
FusionManager are deployed IP addresses of storage device
controllers IP address of the management plane of infrastructure VMs
User VM Classification
Access Management
• Users can log in to VMs by using the Huawei Desktop Protocol (HDP)
or Remote Desktop Protocol (RDP).
• HDP is used for users to log in to VMs from thin clients (TCs) or
software clients (SCs).
• Users can use a PC to connect to their VMs using the RDP when the
VM IP addresses are available.
Template Management
• Create an ISO VM, install an OS, OS-dependent software, and custom
software on the VM, and convert the VM into a VM template.
• Copy data on the disks of a VM that has been stopped, and convert
the VM into a VM template.
• Import a VM template.
VM Creation and Deletion
• Administrators can create VMs by using one of the following methods
to meet service requirements:
• Create VMs by using a VM template.
• Create a single VM or create VMs in batches.
• Configure a scheduled task for creating one or more VMs at a time.
Administrators can delete VMs as follows:

• If VMs are assigned to users, administrators need to unassign the VMs


from the users and then delete the VMs.
• If VMs are unassigned from users, administrators can delete VMs.
VM Assignment
• Administrators need to create desktop groups to assign VMs.
• The following VM assignment modes are available:
• If the desktop group type is Private, VMs of the Full copy type can be
provisioned.There are fixed assignment relationships between users and
VMs.
• Assign VM to single user
• Assign VM to multiple user
• The Assign a VM to multiple users mode applies to scenarios in which
users do not require high data security, such as customer service centers
and call centers.
VM Assigmnet Cont
• If the desktop group type is Dynamic pool
• A user can have only one VM randomly. VMs are assigned to users,
and users log in to different VMs each time.
• If the desktop group type is Static pool
• A user can have only one fixed VM. After a VM is assigned to a user,
the fixed assignment relationship is formed once the user logs in to
the VM. The user can logs in to only this VM each time.
VM Maintenance
• Adjust VM specifications.
• Administrators can adjust CPU and memory specifications and service
types for VMs.
• Adjust VM status.
• Administrators can start, wake up, restart, hibernate, and shut down
VMs.
• Perform other management operations.
• Administrators can manage VM disks and query VM status.
System Maintenance
• Time Management
• Time management includes time zone settings and clock synchronization settings.
• If the FusionAccess, FusionCompute, and FusionManager use the same clock
source, the system still runs properly after they simultaneously switch to the DST.
• Clock synchronization is a prerequisite for stable running of FusionAccess. If clocks
are not synchronized, desktop cloud system management will be in chaos.
• Initial Configuration
• Initial configuration involves the configuration items of virtualization
environment, domain/OU, desktop and alarm components.
Contd
• Rights Management
• The rights management provides related FusionAccess user rights setting
functions, including user management, role management, area
management, and password policy settings.
• Other Configurations
• Session timeout interval:
• Operation Log
• The log management function enables administrators to query system
operation logs and filter logs based on preset conditions on the
FusionAccess management system.
Administrator Experience Improvement
• Batch automatic desktop management
• Unified management system upgrade
• Unified Access Agent software upgrade
• Unified Access Client software upgrade
• Resource statistics
• Resource monitoring
• VM rights- and domain-based management
• Unified user interface (UI) management
• Message notification
User Experience Improvement
• Self-service UI settings (Language and Background)
• Self-service maintenance channel
• Self-service power management
• Login upon startup
• Login information display
• After a user logs in to a VM, the VM page displays the information
about the last VM login, including login client IP address and login
time.
Resource Overcommitment
• Memory Overcommitment
• The memory overcommitment allows idle resources to be allocated to
VMs without affecting user experience, improving memory utilization.
• Thin Provisioning
• Thin provisioning enables physical memory to be allocated to users
who really need it.
• Thick Provisioning
• Thick provisioning enables physical memory to be allocated to user
fully.
Supported OSs
Client Resource Redirection
• Device redirection
• Port redirection
• The FusionAccess provides the following client resource redirection
functions:
• USB port redirection
• Camera redirection
• COM port redirection
• Printer redirection
HD User Experience
• Playing Videos on TCs
• The TC supports video playing, coding, and decoding.
• The player supports media stream redirection.
• Playing Flash Files on TCs (install flash player)
Playing Videos on VMs
• If the VM has Graphic Processing Unit (GPU) hardware resources,
• the local GPU is used to accelerate hardware, thereby consuming less
central processing units
• (CPUs) and Random Access Memories (RAM)s while playing videos
more smoothly.

You might also like