X Window System Network Performance

Total Page:16

File Type:pdf, Size:1020Kb

X Window System Network Performance X Window System Network Performance Keith Packard Cambridge Research Laboratory, HP Labs, HP [email protected] James Gettys Cambridge Research Laboratory, HP Labs, HP [email protected] Abstract havior (or on a local machine, context switches between the application and the X server). Performance was an important issue in the develop- One of the authors used the network visualization tool ment of X from the initial protocol design and contin- when analyzing the design of HTTP/1.1 [NGBS 97]. ues to be important in modern application and extension The methodology and tools used in that analysis in- development. That X is network transparent allows us volved passive packet level monitoring of traffic which to analyze the behavior of X from a perspective seldom allowed precise real-world measurements and compar- possible in most systems. We passively monitor network isons. The work described in this paper combines this packet flow to measure X application and server perfor- passive packet capture methodology with additional X mance. The network simulation environment, the data protocol specific analysis and visualization. Our experi- capture tool and data analysis tools will be presented. ence with this combination of the general technique with Data from this analysis are used to show the performance X specific additions was very positive and we believe impact of the Render extension, the limitations of the provides a powerful tool that could be used in the analy- LBX extension and help identify specific application and sis of other widely used protocols. toolkit performance problems. We believe this analysis With measurement tools in hand, we set about char- technique can be usefully applied to other network pro- acterizing the performance of a significant selection of tocols. X applications based on a range of toolkits and using 1 Introduction a variety of different implementation techniques. We are specifically interested in the effects of the Render The X Window System [SG92] was designed to of- extension’s [Pac01] approach to text, and whether the fer good performance over campus area networks for optimizations offered by the Low Bandwidth X (LBX) machines and applications in common use in the late extension [FK93] [Pac94] were of any use. Specific ap- 1980’s. A major part of the version 11 protocol design plication performance issues were also discovered and was to reduce the effect of network latency and band- forwarded to the relevant open source projects. width on application performance and correctness ob- served in analysis of X10 programs. Resource ID al- 2 Measuring X Performance location was moved to the client applications to elim- inate synchronous resource creation. Synchronous de- The measurements taken span a range of applications, vice grabs were added to provide correct operation of network characteristics and protocol compression tech- user interfaces when the user could manipulate input de- niques. vices faster than the applications could respond. The 2.1 Selecting Test Applications selection mechanism was added to provide a uniform cut&paste model while delaying and optimizing the un- An attempt was made to select applications representa- derlying bulk data transfer. Experience over the last 15 tive of modern X usage. Reasonably current versions of years has shown that further work in this area is possible each application were selected from the Debian Linux and desirable. distribution. One advantage of the passive monitoring There has previously never been packet level research technique is the ability to monitor several applications capturing and analyzing the actual network characteris- simultaneously and measure the performance of the col- tics of X applications. The best tools available have been lection as they interact on the network. This permits the dumps of proxy servers showing requests and responses, analysis of session startup sequences where many appli- with no direct correlation with the actual packet level re- cations are competing for resources. quests/responses and timing that determine network be- The following applications were measured in this ini- tial work LBX was an effort to improve performance over low- Mozilla (version 1.3); Web browser with client-side speed/high-latency links. A significant amount of that fonts, imaging the microscape synthetic web page work was focused on reducing latency effects of slow developed for the HTTP/1.1 performance work links without modifying applications. Another major Mozilla (version 1.3); Web browser with server- part of the work was in creating custom encodings of side fonts, imaging the microscape synthetic web X data to reduce the bandwidth required. The latency page developed for the HTTP/1.1 performance efforts focused on problems seen when LBX was being work designed. How well those efforts carry forward to mod- Kedit (Version 1.3) simple text editor based on the ern applications is explored in this paper. Qt toolkit More recently, network proxy support has been Nautilus (Version 2.2.2) file browser based on the added to the SSH [BS01] protocol enabling X con- GTK+ toolkit nections to be forwarded through a secure and option- KDE Session (Version 3.1) full KDE session ally compressed connection. SSH has no X-specific re- startup. encoding or compression techniques, it simply uses the Gzip [Gai93] compression technique on the datastream 2.1.1 Mozilla and Fonts when compression is enabled. Because of the rapid uptake of client-side fonts in appli- Measurements using raw X protocol as well as X run cation development, Mozilla was the only current appli- through both of these proxies show their effectiveness in cation available that supports both core and client-side improving performance. fonts in the same version. The current Debian Mozilla package provides an alternate version of the key drawing 3 Passive Network Analysis library that controls access to fonts; the only change in In the past, ethernet data monitoring required very little the Mozilla configuration required to select which style equipment; any host could trivially monitor traffic on the of fonts to use is to replace this library with the appropri- wire from any other host by placing the ethernet hard- ate version. This limits the changes as much as possible ware in promiscuous mode. Such is not the case today; which should make the resulting measurements an ac- twisted pair ethernet performance depends on switched curate representation of the difference between the two connections to provide a collision free link between the techniques. two endpoints. The easiest way to monitor the network is to capture packets on one end of the connection. While 2.1.2 KDE Session and LBX this may consume some CPU resources, the overhead is The XFree86 4.3 releases of the LBX extension and minimal given modern machine performance. Alterna- proxy are faulty, causing the KDE session to hang about tively, a “man in the middle” machine can be used to halfway through the startup process. Some modest at- capture packet traces between client and server. There tempts to discover the problem did not yield any results are also network switches which can mirror traffic from and so those values don’t appear in the resulting graphs. one port to another, but a single connection cannot reli- ably hold traffic from a full-duplex link and so packets 2.2 Network Performance Characteristics might be lost or packet ordering scrambled. For either For this study, one goal was to measure the performance host-based technique, systems are now fast enough that impact of latency vs. bandwidth, and so a set of la- it is possible to capture all packets in most applications tency and bandwidth values were used and each test without drops. We chose to capture packets on the X run with every pair of latency and bandwidth. The five client end of the network approach as the network sim- bandwidths used were 100Mb, 10Mb, 1Mb, 100Kb and ulator caused problems with capture at the router. The 10Kb. The four latencies used were 0.1ms, 1ms, 10ms passive capture configuration can be see in Figure 1. and 100ms. These latencies represent the time for a packet to traverse through the router in one direction, 3.1 Network Data Capture and so a round trip time would be at least twice that To minimize the impact of disk activity on the network value. monitoring process, the packet capture tool provides minimal information about each network event that is 2.3 X Protocol Encoding seen in the protocol trace. Each trace record is times- The X protocol was originally designed to run effi- tamped with that captured by the kernel packet logging ciently over the campus area networks available in the facility which provides kernel-level timestamping accu- late 1980’s, which ran at 10Mb/second. As modem per- rate to well under a millisecond. The capture application formance improved in the early 1990’s it became almost is run at nice -20 which has proven sufficient to avoid feasible to run X applications over dial-up links. packet loss. 3.2 Simulating Network Conditions X client X client X client The NISTNet package [Gro00] converts a Linux ma- chine into a network emulator capable of simulating a wide variety of network conditions. NIST Net is de- signed to emulate end-to-end performance characteris- Packet tics imposed by various wide area network topologies, Capture such as restricted bandwidth, increased latency or even Application packet loss. While this package provides the ability to model in- consistent networks, we chose to simplify the data anal- ysis in this work by modeling networks with constant bandwidth and latency. For the 100Mb test, NISTNet was disabled and the SSH LBX middle machine configured to act as a simple router. Proxy Proxy 4 Network Performance Analysis With data captured to disk files, a pair of tools were used NIST Network Simulator to visualize the data and compute quantitative perfor- mance results from them.
Recommended publications
  • R&S®BBA100 Broadband Amplifier Open
    R&S®BBA100 Broadband Amplifier Open Source Acknowledgment 5353.8300.00 – 01 /RL/1/EN 01.00 / Broadcasting 3575.4620.02 M: - T - PAD Open Source Acknowledgment R&S BBA100 Introduction Contents 1 Introduction ......................................................................................... 3 1.1 Disclaimer ..................................................................................................................... 3 1.2 How to obtain the source code .................................................................................. 3 2 Software packages ............................................................................. 4 3 Verbatim license texts ........................................................................ 7 3.1 Apache License 2.0 ..................................................................................................... 7 3.2 GNU Library General Public License, Version 2.0 (LGPL 2.0) ..............................10 3.3 Boost Software License ............................................................................................18 3.4 GNU General Public License, Version 2.0 (GPL 2.0) ..............................................18 3.5 GNU Lesser General Public License, Version 2.1 (LGPL 2.1) ...............................24 3.6 Mozilla Public License, Version 1.1 (MPL 1.1) ........................................................32 3.7 MIT ...............................................................................................................................40 3.8 JDOM License
    [Show full text]
  • Release Notes for X11R6.8.2 the X.Orgfoundation the Xfree86 Project, Inc
    Release Notes for X11R6.8.2 The X.OrgFoundation The XFree86 Project, Inc. 9February 2005 Abstract These release notes contains information about features and their status in the X.Org Foundation X11R6.8.2 release. It is based on the XFree86 4.4RC2 RELNOTES docu- ment published by The XFree86™ Project, Inc. Thereare significant updates and dif- ferences in the X.Orgrelease as noted below. 1. Introduction to the X11R6.8.2 Release The release numbering is based on the original MIT X numbering system. X11refers to the ver- sion of the network protocol that the X Window system is based on: Version 11was first released in 1988 and has been stable for 15 years, with only upwardcompatible additions to the coreX protocol, a recordofstability envied in computing. Formal releases of X started with X version 9 from MIT;the first commercial X products werebased on X version 10. The MIT X Consortium and its successors, the X Consortium, the Open Group X Project Team, and the X.OrgGroup released versions X11R3 through X11R6.6, beforethe founding of the X.OrgFoundation. Therewill be futuremaintenance releases in the X11R6.8.x series. However,efforts arewell underway to split the X distribution into its modular components to allow for easier maintenance and independent updates. We expect a transitional period while both X11R6.8 releases arebeing fielded and the modular release completed and deployed while both will be available as different consumers of X technology have different constraints on deployment. Wehave not yet decided how the modular X releases will be numbered. We encourage you to submit bug fixes and enhancements to bugzilla.freedesktop.orgusing the xorgproduct, and discussions on this server take place on <[email protected]>.
    [Show full text]
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • A Font Family Sampler
    A Font Family Sampler Nelson H. F. Beebe Department of Mathematics University of Utah Salt Lake City, UT 84112-0090, USA 11 February 2021 Version 1.6 To assist in producing greater font face variation in university disser- tations and theses, this document illustrates font family selection with a LATEX document preamble command \usepackage{FAMILY} where FAMILY is given in the subsection titles below. The body font in this document is from the TEX Gyre Bonum family, selected by a \usepackage{tgbonum} command in the document preamble, but the samples illustrate scores other font families. Like Computer Modern, Latin Modern, and the commercial Lucida and MathTime families, the TEX Gyre families oer extensive collections of mathematical characters that are designed to resemble their companion text characters, making them good choices for scientic and mathemati- cal typesetting. The TEX Gyre families also contain many additional spe- cially designed single glyphs for accented letters needed by several Euro- pean languages, such as Ð, ð, Ą, ą, Ę, ę, Ł, ł, Ö, ö, Ő, ő, Ü, ü, Ű, ű, Ş, ş, T,˚ t,˚ Ţ, ţ, U,˚ and u.˚ Comparison of text fonts Some of the families illustrated in this section include distinct mathemat- ics faces, but for brevity, we show only prose. When a font family is not chosen, the LATEX and Plain TEX default is the traditional Computer Mod- ern family used to typeset the Art of Computer Programming books, and shown in the rst subsection. 1 A Font Family Sampler 2 NB: The LuxiMono font has rather large characters: it is used here in 15% reduced size via these preamble commands: \usepackage[T1]{fontenc} % only encoding available for LuxiMono \usepackage[scaled=0.85]{luximono} \usepackage{} % cmr Lorem ipsum dolor sit amet, aenean nulla tellus metus odio non maecenas, pariatur vitae congue laoreet semper, nulla adipiscing cursus neque dolor dui, faucibus aliquam quis.
    [Show full text]
  • An Introduction to the X Window System Introduction to X's Anatomy
    An Introduction to the X Window System Robert Lupton This is a limited and partisan introduction to ‘The X Window System’, which is widely but improperly known as X-windows, specifically to version 11 (‘X11’). The intention of the X-project has been to provide ‘tools not rules’, which allows their basic system to appear in a very large number of confusing guises. This document assumes that you are using the configuration that I set up at Peyton Hall † There are helpful manual entries under X and Xserver, as well as for individual utilities such as xterm. You may need to add /usr/princeton/X11/man to your MANPATH to read the X manpages. This is the first draft of this document, so I’d be very grateful for any comments or criticisms. Introduction to X’s Anatomy X consists of three parts: The server The part that knows about the hardware and how to draw lines and write characters. The Clients Such things as terminal emulators, dvi previewers, and clocks and The Window Manager A programme which handles negotiations between the different clients as they fight for screen space, colours, and sunlight. Another fundamental X-concept is that of resources, which is how X describes any- thing that a client might want to specify; common examples would be fonts, colours (both foreground and background), and position on the screen. Keys X can, and usually does, use a number of special keys. You are familiar with the way that <shift>a and <ctrl>a are different from a; in X this sensitivity extends to things like mouse buttons that you might not normally think of as case-sensitive.
    [Show full text]
  • Virtualgl / Turbovnc Survey Results Version 1, 3/17/2008 -- the Virtualgl Project
    VirtualGL / TurboVNC Survey Results Version 1, 3/17/2008 -- The VirtualGL Project This report and all associated illustrations are licensed under the Creative Commons Attribution 3.0 License. Any works which contain material derived from this document must cite The VirtualGL Project as the source of the material and list the current URL for the VirtualGL web site. Between December, 2007 and March, 2008, a survey of the VirtualGL community was conducted to ascertain which features and platforms were of interest to current and future users of VirtualGL and TurboVNC. The larger purpose of this survey was to steer the future development of VirtualGL and TurboVNC based on user input. 1 Statistics 49 users responded to the survey, with 32 complete responses. When listing percentage breakdowns for each response to a question, this report computes the percentages relative to the total number of complete responses for that question. 2 Responses 2.1 Server Platform “Please select the server platform(s) that you currently use or plan to use with VirtualGL/TurboVNC” Platform Number of Respondees (%) Linux/x86 25 / 46 (54%) ● Enterprise Linux 3 (x86) 2 / 46 (4.3%) ● Enterprise Linux 4 (x86) 5 / 46 (11%) ● Enterprise Linux 5 (x86) 6 / 46 (13%) ● Fedora Core 4 (x86) 1 / 46 (2.2%) ● Fedora Core 7 (x86) 1 / 46 (2.2%) ● Fedora Core 8 (x86) 4 / 46 (8.7%) ● SuSE Linux Enterprise 9 (x86) 1 / 46 (2.2%) 1 Platform Number of Respondees (%) ● SuSE Linux Enterprise 10 (x86) 2 / 46 (4.3%) ● Ubuntu (x86) 7 / 46 (15%) ● Debian (x86) 5 / 46 (11%) ● Gentoo (x86) 1 /
    [Show full text]
  • Oracle® Secure Global Desktop Platform Support and Release Notes for Release 4.7
    Oracle® Secure Global Desktop Platform Support and Release Notes for Release 4.7 E26357-02 November 2012 Oracle® Secure Global Desktop: Platform Support and Release Notes for Release 4.7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S.
    [Show full text]
  • Security at Extreme Scales
    SECURITY AT EXTREME SCALES Recommended Citation Eric Grosse, "SECURITY AT EXTREME SCALES", NAPSNet Special Reports, May 30, 2019, https://nautilus.org/napsnet/napsnet-special-reports/security-at-extreme-scales/ ERIC GROSSE MAY 30, 2019 I. INTRODUCTION 1 In this paper, Eric Grosse argues: “Much of the security progress over the past decade has been at large-scale, finding and patching vulnerabilities in widely used applications or defending networks of millions of machines containing high-value data. The lessons there may help military systems, but for the very highest security needs such as NC3, we ought to return to basics and harden small-scale systems. And we ought to do it as a joint effort, even between adversaries.” Eric Grosse was Google's VP Security & Privacy Engineering. Before Google, Eric was a Research Director and Fellow at Bell Labs. He has a Ph.D. in Computer Science from Stanford. Acknowledgments: The workshop was funded by the John D. and Catherine T. MacArthur Foundation. This report is published simultaneously here by Technology for Global Security and here by Nautilus Institute and is published under a 4.0 International Creative Commons License the terms of which are found here. The views expressed in this report do not necessarily reflect the official policy or position of the Nautilus Institute. Readers should note that Nautilus seeks a diversity of views and opinions on significant topics in order to identify common ground. A podcast with Eric Grosse, Peter Hayes, and Philip Reiner on NC3 and security at extreme scales is found here. The views expressed in this report do not necessarily reflect the official policy or position of the Nautilus Institute.
    [Show full text]
  • MC-1200 Series Linux Software User's Manual
    MC-1200 Series Linux Software User’s Manual Version 1.0, November 2020 www.moxa.com/product © 2020 Moxa Inc. All rights reserved. MC-1200 Series Linux Software User’s Manual The software described in this manual is furnished under a license agreement and may be used only in accordance with the terms of that agreement. Copyright Notice © 2020 Moxa Inc. All rights reserved. Trademarks The MOXA logo is a registered trademark of Moxa Inc. All other trademarks or registered marks in this manual belong to their respective manufacturers. Disclaimer Information in this document is subject to change without notice and does not represent a commitment on the part of Moxa. Moxa provides this document as is, without warranty of any kind, either expressed or implied, including, but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or changes to this manual, or to the products and/or the programs described in this manual, at any time. Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no responsibility for its use, or for any infringements on the rights of third parties that may result from its use. This product might include unintentional technical or typographical errors. Changes are periodically made to the information herein to correct such errors, and these changes are incorporated into new editions of the publication. Technical Support Contact Information www.moxa.com/support Moxa Americas Moxa China (Shanghai office) Toll-free: 1-888-669-2872 Toll-free: 800-820-5036 Tel: +1-714-528-6777 Tel: +86-21-5258-9955 Fax: +1-714-528-6778 Fax: +86-21-5258-5505 Moxa Europe Moxa Asia-Pacific Tel: +49-89-3 70 03 99-0 Tel: +886-2-8919-1230 Fax: +49-89-3 70 03 99-99 Fax: +886-2-8919-1231 Moxa India Tel: +91-80-4172-9088 Fax: +91-80-4132-1045 Table of Contents 1.
    [Show full text]
  • FLTK 1.1.8 Programming Manual Revision 8
    FLTK 1.1.8 Programming Manual Revision 8 Written by Michael Sweet, Craig P. Earls, Matthias Melcher, and Bill Spitzak Copyright 1998-2006 by Bill Spitzak and Others. FLTK 1.1.8 Programming Manual Table of Contents Preface..................................................................................................................................................................1 Organization.............................................................................................................................................1 Conventions.............................................................................................................................................2 Abbreviations...........................................................................................................................................2 Copyrights and Trademarks.....................................................................................................................2 1 - Introduction to FLTK...................................................................................................................................3 History of FLTK......................................................................................................................................3 Features....................................................................................................................................................4 Licensing..................................................................................................................................................5
    [Show full text]
  • Xlib − C Language X Interface Xwindowsystem Standard Xversion 11, Release 7 Libx11 1.3.2
    Xlib − C Language X Interface XWindowSystem Standard XVersion 11, Release 7 libX11 1.3.2 James Gettys Cambridge Research Laboratory Digital Equipment Corporation Robert W.Scheifler Laboratory for Computer Science Massachusetts Institute of Technology with contributions from Chuck Adams, Tektronix, Inc. Vania Joloboff, Open Software Foundation Hideki Hiura, Sun Microsystems, Inc. Bill McMahon, Hewlett-Packard Company Ron Newman, Massachusetts Institute of Technology Al Tabayoyon, Tektronix, Inc. Glenn Widener,Tektronix, Inc. Shigeru Yamada, Fujitsu OSSI The X WindowSystem is a trademark of The Open Group. TekHVC is a trademark of Tektronix, Inc. Copyright © 1985, 1986, 1987, 1988, 1989, 1990, 1991, 1994, 1996, 2002 The Open Group Permission is hereby granted, free of charge, to anyperson obtaining a copyofthis software and associated documenta- tion files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify,merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Soft- ware. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOTLIMITED TOTHE WARRANTIES OF MERCHANTABILITY,FITNESS FOR A PARTIC- ULAR PURPOSE AND NONINFRINGEMENT.INNOEVENT SHALL THE X CONSORTIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,WHETHER IN AN ACTION OF CONTRACT,TORTOROTH- ERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
    [Show full text]
  • Setting up Horizon 7 for Linux Desktops
    Setting Up Horizon 7 for Linux Desktops SEP 2019 VMware Horizon 7 7.10 Setting Up Horizon 7 for Linux Desktops You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to [email protected] VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2016-2019 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Setting Up Horizon 7 for Linux Desktops 6 1 Features and System Requirements 7 Features of Horizon Linux Desktops 7 Overview of Configuration Steps for Horizon 7 for Linux Desktops 13 System Requirements For Horizon 7 for Linux 14 Virtual Machine Settings for 2D Graphics 23 Configuring Session Collaboration on Linux Desktops 23 2 Preparing a Linux Virtual Machine for Desktop Deployment 26 Create a Virtual Machine and Install Linux 26 Prepare a Linux Machine for Remote Desktop Deployment 27 Install Dependency Packages for Horizon Agent 29 3 Setting Up Active Directory Integration for Linux Desktops 31 Integrating Linux with Active Directory 31 Use the OpenLDAP Server Pass-Through Authentication 32 Set Up SSSD LDAP Authentication Against the Microsoft Active Directory 32 Use the Winbind Domain Join Solution 32 Configure PowerBroker Identity Services Open (PBISO) Authentication 33 Configure the Samba Offline Domain Join 34 Use the Realmd Join Solution for RHEL 8 36 Setting Up Single Sign-On 37 Setting Up Smart Card Redirection 38 Integrate a RHEL 8 Desktop
    [Show full text]