You are previewing VMware View 5 Desktop Virtualization Solutions.
O'Reilly logo
VMware View 5 Desktop Virtualization Solutions

Book Description


A complete guide to planning and designing solutions based on VMware View 5 with this book and ebook.

  • Written by VMware experts Jason Langone and Andre Leibovici, this book is a complete guide to planning and designing a solution based on VMware View 5

  • Secure your Visual Desktop Infrastructure (VDI) by having firewalls, antivirus, virtual enclaves, USB redirection and filtering and smart card authentication

  • Analyze the strategies and techniques used to migrate a user population from a physical desktop environment to a virtual desktop solution

  • A learn-by-example based approach that focuses on key concepts to provide the foundation to solve real world problems

  • In Detail

    VMware View is a desktop virtualization solution that helps organizations automate desktop and application management, reduce costs, and increase data security through centralization of the desktop environment.

    Written by VMware experts Jason Langone and Andre Leibovici, this book is meant as a guide for architects, solution providers, consultants, engineers and anyone planning to design and implement a solution based on VMware View 5. This book will pull information and expertise from real world scenarios so as to maximize practical learning. It will explain the settings and configurations needed to have a successful desktop virtualization solution as well as the ‘why’ behind the decisions.

    This book is not meant to replace the official Administration or Installation Guides for VMware View or ThinApp published by the great people at VMware. The material in this book should be used during the design phase, which is before an implementation is underway. All components of a VMware View solution will be covered.

    This book uses case studies from the real world including:

    Hotel Kiosk

    VDI solution used in a hotel lobby to provide basic connectivity to its guests

    Federal agency with classified and unclassified information

    VDI used to allow analysts to securely connect to both a classified and unclassified network from the same device

    Remote Office

    VDI used to provide connectivity to offshore developers

    Out-of-band Scientist

    VDI used to provide a secure desktop environment to scientists fighting disease in remote locales


    Table of Contents

    1. VMware View 5 Desktop Virtualization Solutions
      1. Table of Contents
      2. VMware View 5 Desktop Virtualization Solutions
      3. Credits
      4. Foreword
      5. About the Authors
      6. About the Reviewer
        1. Support files, eBooks, discount offers, and more
          1. Why Subscribe?
          2. Free Access for Packt account holders
          3. Instant Updates on New Packt Books
      8. Preface
        1. The driving factors of VDI
        2. What this book covers
        3. What you need for this book
        4. Who this book is for
        5. Conventions
        6. Reader feedback
        7. Customer support
          1. Errata
          2. Piracy
          3. Questions
      9. 1. Components of VMware View
        1. Core components of VMware View
          1. vCenter Server
          2. View Connection Server
            1. The types of VMware View Connection Servers
          3. View Agent
          4. View Client
        2. Optional component—VMware View Composer
          1. Introduction to View Composer
            1. Using vCenter's SQL Express Installation for View Composer
            2. Snapshots and linked clones
            3. Linked clones
            4. Templates
            5. Full provisioning versus linked clones
          2. Types of disks
            1. OS Disk
              1. Secondary OS Disk
            2. User Data Disk
            3. Temp Data Disk
          3. Many options of disk types and redirection
            1. Thin provisioning versus thick provisioning
              1. Reset, Refresh, Recompose, and Rebalance actions for linked clones
                1. Reset
                2. Refresh
                3. Recompose
                4. Rebalance
          4. Optional component—VMware View Transfer Server
            1. Checking out
            2. Checking in
            3. Replication
            4. Rollback
        3. Summary
      10. 2. Solution Methodology
        1. Assessment
          1. Questionnaire
            1. Assessment worksheet from VMware View 5 Desktop Virtualization Solutions
          2. Metric collection
            1. Processing the data
        2. Use case definition
        3. Design overview
          1. Storage
            1. Isolation at the data store level
              1. Why is this beneficial?
          2. Networking
          3. Compute
          4. VMware vSphere and View desktop pool infrastructure
            1. Pod architecture
          5. Application distribution infrastructure
          6. User persona management
            1. What is a user persona?
          7. Connection infrastructure
          8. End devices
          9. People
        4. Validation
          1. VMware View Planner tool (formerly VMware RAWC)
            1. Comparing storage platforms
        5. Summary
      11. 3. Persistent or Non-Persistent vDesktops
        1. Persistent desktops
          1. Example scenario
        2. Non-persistent desktops
          1. Example scenario
        3. Other non-persistent notes and considerations
        4. Multisite solutions
          1. Why is a non-persistent vDesktop best for a multisite?
          2. Why distance matters
          3. Profiles in the cloud
        5. Hybrid: persistent mixed with non-persistent
        6. How to choose
        7. Summary
      12. 4. End Devices
        1. Thick clients
          1. Repurposing thick clients
        2. Thin clients
        3. Teradici PCoIP-powered zero clients
        4. Other clients
        5. Choosing the proper device
          1. A one-cable zero client solution
        6. Summary
      13. 5. The PCoIP Protocol
        1. Why lossless quality is important
        2. PCoIP network fundamentals
          1. The two types of PCoIP connections
        3. Multimedia redirection
          1. The MMR perfect storm
        4. Teradici APEX offload card
          1. The offload process
          2. Defining the offload tiers
          3. Design considerations
        5. Summary
      14. 6. Sizing the VDI
        1. Network considerations
          1. Sizing the network
            1. Network connection characteristics
          2. DHCP considerations
          3. Virtual switch considerations
            1. Standard versus distributed switches
            2. Port binding
              1. Static binding
              2. Dynamic binding
              3. Ephemeral binding
            3. Port binding and VMware View Composer
        2. Compute considerations
        3. Working with VMware vSphere maximums
          1. Solution example—25,000 seats of VMware View
            1. Solution design—physical server requirements
            2. Solution design—the pod concept
              1. Linked vCenter Servers
              2. vCenter Servers
              3. VMware Update Manager Servers
                1. VMware vCenter Server Heartbeat
            3. Solution design—pools
              1. View Connection Servers
            4. Solution design—the formulae
        4. Summary
      15. 7. Redundancy
        1. Physical infrastructure
          1. VMware High Availability
            1. Do you even need VMware HA?
              1. Non-persistent example
              2. Using local storage
          2. VMware Distributed Resource Scheduling
            1. Anti-affinity
        2. VMware vCenter Server
          1. VMware vCenter Server Heartbeat
            1. Why VMware vCenter Server Heartbeat should be used
        3. VMware View
          1. Replica
          2. Load balancing
          3. VMware Fault Tolerance
            1. Design impact when using VMware FT
        4. Parent vDesktop and templates
          1. Templates
          2. Parent vDesktops with snapshots
        5. User personas
        6. Summary
      16. 8. Sizing the Storage
        1. VMware View Composer
        2. VMware vSphere files
        3. VMware View specific files
        4. Tiered storage
          1. Replica disk
          2. Internal disk
          3. Delta/differential disk
          4. Disposable disk
            1. Windows paging files
            2. Temporary internet files
          5. Persistent disk
        5. Storage overcommit
          1. Storage overcommit level options
        6. Storage protocols
        7. Maximums and limits
          1. 64 – to 140 linked clones per datastore (VMFS)
          2. 250 linked clones per datastore (NFS)
          3. 32 full – clones desktops per datastore (VMFS)
            1. 8 hosts per vSphere cluster with View Composer
            2. 1,000 clones per replica
        8. Storage I/O profile
        9. Read/write I/O ratio
        10. Storage tiering and I/O distribution
        11. Disk types
        12. Capacity sizing exercises
          1. Sizing full clones
            1. Scenario 1
              1. Parent VM
              2. Overhead
            2. Scenario 2
          2. Sizing linked clones
            1. Parent VM
            2. Replica
            3. Scenario 1
            4. Scenario 2
        13. vSphere 5.0 video swap
        14. Summary
      17. 9. Security
        1. The inherent security of VDI
        2. Firewalls, zones, and antivirus
          1. The fundamentals – firewall rules
        3. Virtual enclaves
          1. The jailbreak scenario
        4. USB redirection and filtering
          1. USB filtering at the end device
          2. USB filtering via View Connection Server
          3. USB filtering via the Windows operating system
        5. Smart card authentication
          1. Configuring smart card authentication for VMware View Connection Servers
            1. Preparing the environment for smart card authentication
          2. Configuring smart card authentication for VMware View Security Servers
          3. Configuring U.S. Department of Defense CAC Authentication
          4. Certificate revocation configuration
            1. Configure the use of a CRL
            2. Configure the use of OCSP
            3. Configure the use of both a CRL and OCSP
        6. Prohibiting the use of Copy and Paste functions
        7. View Connection Server tags
        8. Forensics
        9. Summary
      18. 10. Migrating from Physical Desktops to Virtual Desktops
        1. Migration of the user persona
          1. Separating the persona from the operating environment
            1. Folder redirection
            2. Profiles
              1. How a profile is built: first login
              2. Subsequent logins
              3. Roaming profiles
              4. Roaming profiles + folder redirection: increased performance
              5. Other third-party solutions: Liquidware Labs ProfileUnity
            3. Cutting over from physical to virtual
          2. The use of VMware View User Data Disks
          3. Operational considerations with user data
        2. Summary
      19. 11. Backing Up the VMware View Infrastructure
        1. Backing up the VMware View Connection Server environment
          1. Security server considerations
          2. Transfer server and ThinApp repository considerations
        2. Restoring the VMware View environment
        3. Backing up the gold templates
        4. Backing up the Parent VM
        5. Summary
      20. 12. VMware View 5.1
        1. Platform features
          1. Content-Based Read Cache (also known as View Storage Accelerator)
            1. CBRC storage sizing
            2. Host memory sizing
            3. Managing CBRC
          2. View Composer Array Integration
          3. Support 32 (up from 8) hosts in a cluster on NAS
          4. Standalone View Composer Server
          5. Customizable disposable disk drive letter
        2. User experience and client features
        3. Management and administration
          1. UI enhancements and localization
          2. Support of pre-created Active Directory Machine Accounts
          3. VMware vCenter and View Composer Advanced Settings
          4. Phone home
        4. Persona management
        5. Security
        6. Summary
      21. A. Additional Tools
        1. VMware RAWC
        2. VDI Fox
        3. Websites and social media
      22. Index