Cisco VXI Technology

Paulo Jorge N. Correia – [email protected] Technical Solutions Architect

July 26th, 2011

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 I spend a lot of time on desktop support calls. But I really need to focus on strategic IT initiatives that really add value.

How do I provide agility, flexibility and business continuity when What Keeps I’m required to do more with less?

Windows 7 is here, Us Awake At I need to prepare for it! Information and data is our most important Night? asset―what is the best method to comply with stringent privacy requirements? We spend too much time recovering lost data from stolen laptops.

How do I manage distributed IT environment? Employees are mobile and scattered across the world.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Broker Keyboard, Video, Mouse Thin Client Compute Storage Network

• Personal Computer is disaggregated

• Keyboard, Video, and Mouse stay with user • Compute and storage move to the data center

• Network availability is required for all application access • Network performance is critical to user experience

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 • Refers to the separation of the physical endpoint from the logical desktop • Endpoints may be variety of devices; applications are hosted where ever the best user experience is offered (locally at endpoint or data center) • Access from the endpoint to the logical desktop is delivered through the network

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 . Secure, flexible multi-monitor computing . Eliminate heat and noise in trading rooms, free up desk space . Simplify regulatory compliance Finance . Assist disaster recovery and business continuity

. Quick provisioning to college dorms . Multiple students share same computing resources Education . No need to carry Laptops

. Secure access to sensitive information on remote desktops. . User authentication and peripheral (USB) authorization management. Government

. Remove PCs from harsh environmental hazards . Mobile flexibility Manufacturing

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Quality of user experience • Display protocol not designed for Rich media streaming, voice/video, remote access often less than optimal Performance: Voice/Video cannot be prioritized by QoS Jitter: Voice traffic must go round trip • Bandwidth: Each “new” copy streamed for each additional DV client = branch WAN bandwidth overruns

Display Protocol Virtualized Virtualization Aware Virtualized Collaboration Workplace Network Data Center

Current display protocols are opaque to network services The key to applying services is to separate the flows

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 The Hair pinning Problem Video processed on HVD causing bandwidth and Video Source server compute overload

Branch Office End-users see pixelization as media is rendered from the data center

T1 Branch Router

Increasing bandwidth Data Center might not help

Campus

End-users experience no pixelization on LAN

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 • "The worldwide hosted virtual desktop (HVD) market will accelerate through 2013 to reach 49 million units, up from more than 500,000 units in 2009, according to Gartner Inc. • Worldwide HVD revenue will grow from about $1.3 billion to $1.5 billion in 2009, which is less than 1 percent of the worldwide professional PC market, to $65.7 billion in 2013, which will be equal to more than 40 percent of the worldwide professional PC market." - Gartner, Inc. http://www.gartner.com/it/page.jsp?id=920814

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 90% Plan Implementation within 12-24 months

Source: CDW Jan 2011

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Media Rich Experience

Data Center Security Cisco Virtualization VXI Virtual Workspace TCO / ROI Collaboration Borderless Networks

System Integration

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Desktop Virtualization Suite of Technologies End-to-End Architecture • Desktop Streaming • Application Streaming Rich Media and Collaboration • Terminal Services Cisco Industry Terms for Desktop Security Virtualization Virtualization: Experience •VDI Application Infrastructure Acceleration •Gartner: “Hosted Virtual Desktop” POE / Energy •IDC: “Centralized Virtual Wise Desktop”

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Virtualized Data Center Virtualization-Aware Virtualized Cisco Borderless Network Collaborative Workspace Collaboration MS Office Applications Branch Cisco CDN Microsoft OS Clients Desktop Virtualization Software

Cius Business Tablets Hypervisor ISR Si WAAS Virtual Access Unified CM Switching Cisco Virtualization w/PoE Experience Clients Nexus WAAS

Virtual Thin Client Ecosystem Quad

ACE

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 End-to-End Virtual Desktop System

Virtualized Data Center Virtualization-Aware Virtualized Borderless Network Collaborative Workspace Cisco Collaboration Branch Cisco CDN Applications Clients

Cius Business Tablets ISR Si WAAS Virtual Access Unified CM Switching Cisco Virtualization w/PoE Experience Clients Nexus WAAS

Virtual Quad

ACE

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Virtualized Virtualization-Aware Virtualized Data Center Collaborative Workspace Borderless Network Campus

Campus Datacenter Endpoints Branch Office Security

Optimization Branch Endpoints Display protocol Mobile Teleworker over the Network Availability VPN Bandwidth Requirements and Scale Mobile Teleworker • Local Area Network High Available Endpoint Fixed Teleworker • Wide Area Network – Nat/No-Nat • Compute • VPN Tunnel/GRE • Provisioning and automation • MPLS – EIGRP Fixed Teleworker Endpoint • Survivability

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Virtualized Data Center and Cisco VXI Purpose-built for virtualization Virtualized Data Center . Cisco UCS Cisco Collaboration MS Office Applications . Storage Partnerships Microsoft OS . EMC and NetApp Desktop Virtualization Software . VDI Software Partnerships

Hypervisor . VMware, Citrix, and Microsoft WAAS . Integration into the Hypervisor for Virtual Unified CM . Nexus 1000V Nexus . Enhanced Security (Cisco VSG) Virtual Quad . Application Acceleration (Cisco WAAS)

ACE

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 BUSINESS VALUE SYSTEMS SOLUTION SYSTEMS EXCELLENCE DIFFERENTIATION EXCELLENCE TECHNOLOGY INNOVATION Rapid Deployment TECHNOLOGY Workload Mobility INNOVATION

Optimized Scaling Unified Fabric Unified Management Simplified Operations Service Profile Unified IT Workflows HW Abstraction

Lower TCO Virtual Interfaces

Extended Memory

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Classic

12 DIMMs 18 DIMMs Max 96GB Or Max 144GB Higher Performance Lower Performance

Cisco UCS With Extended Memory

Xeon 5600 Xeon 5600

48 DIMMs Max 384GB Higher Performance © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

• XenDesktop (Citrix) + UCS + XenServer + NetApp Storage • XenDesktop (Citrix) + UCS + ESXi+ NetApp Storage • XenDesktop (Citrix) + UCS + Hyper-V+ NetApp Storage

• View 4.5 on NetApp • View 4.5 on EMC CLARiiON

http://www.cisco.com/go/cvd http://www.cisco.com/go/vxi

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

Fabric Interconnects

slot 1 slot 1 slot 1 slot 1 slot 2 slot 2 slot 2 slot 2 slot 3 slot 3 slot 3 slot 3 slot 4 slot 4 slot 4 slot 4 slot 5 slot 5 slot 5 slot 5 slot 6 slot 6 slot 6 slot 6 slot 7 slot 7 slot 7 slot 7 slot 8 slot 8 slot 8 slot 8

Unified Compute Chassis Fabric Extenders

Blade Server Server Desktop Per Per Per CPU Memory Configuration Blade Chassis Domain B200-M1 Xeon5570 2.93 GHz 48 GB WinXP 512 MB 128 1,024 40,960 B200-M1 Xeon5570 2.93 GHz 96 GB WinXP 512 MB 160 1,280 51,200 B200-M1 Xeon5570 2.93 GHz 96 GB WinXP 1024 MB 150 1,200 48,000 B250-M1 Xeon5570 2.93 GHz 192 GB WinXP 1024 MB 332 1,328 53,120 B250-M2 Xeon5600 3.33 GHz 192 GB Win7-32 1.5 GB 110 440 17,600

©B230 2010 Cisco and/or-M1 its affiliates. Xeon6500/7500 All rights reserved. 128 GB Win7-32 1.0 GB 80 640 Cisco25,600 Confidential 19 Bundle Positioned For Contains

Distributed Compute . 100-300 VM desktops VDI for -series . Rack-mount server . Leverage the Smart Play bundle UCS-SP-C250P . Hosted Shared desktops Hosted Shared for C-series . Leverage the Smart Play bundle UCS-SP-C200E

100 users - VDI C250 M2 . Problem . Existing bundles start at the 300 + VMs . There is a need for solution that covers 100-300 VM for smaller customers and 120 users – Hosted Shared distributed compute. . Solution . Introduce the Distributed Compute Bundle which addresses the 100-300 desktop C200 M2 user market.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Key Network Services for VXI: . Wired/Wireless integration . PoE/PoE+ scalability and policing

. Remote access and virtual machine policy . Unified network location services . ACE – Connection Broker load balancing . WAAS – Optimize, compress, accelerate

Network

Awareness of VDI

Accelerate VXI access and response Save WAN bandwidth

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Wall Circuit

UPS Backup

• OPEX High efficiency bulk power supplies are more efficient than power cubes Power regulation using EnergyWise Increase business productivity through reduced downtime • CAPEX Lower cost devices without power bricks Building construction savings Minimal power routing Lower maintenance for power cables

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 • Data Redundancy Elimination (DRE) eliminates redundancy within or between flows • LZ compression eliminates redundancy within flows • TCP Flow Optimization (TFO) fills the pipe over high latency links • Transport Data De-duplication – No byte pattern crosses the network twice

Origin Connection Origin Connection

WAN

Optimized Connection

DRE CACHE DRE CACHE

LZ LZ

Window Scaling Large Initial Windows Decode Congestion Mgmt Encode Improved Retransmit © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Packet Aggregation • Cisco VSG (Virtual Security Gateway) protects the virtual environment within the data center • Cisco ASA 5500 Appliances (ASA) secure the data center to defend against threats and unauthorized access • Cisco AnyConnect Secure Mobility Solution (AnyConnect) establishes trusted access between the client and the data center • Cisco ScanSafe offers Cloud Security (SaaS) with Secure Split tunneling • Cisco N1000v preventing DHCP Snooping, Dynamic ARP Inspection (DAI) and IP Source Guard (IPSG) • Cisco switching providing Radius authentication using 802.1x

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Context Server Zones aware VM context aware rules

Zone based Healthcare Portal Records Application Controls Establish zones of trust Dynamic, Policies follow vMotion VSG Agile Best-in-class Efficient, Fast, Scale-out Architecture SW Virtual Security Gateway (VSG) HVD Zones

IT Admin Assistant Doctor Guest

Non- Security team manages Disruptive Operations security

Central mgmt, scalable Policy Based deployment, multi-tenancy ASA

VNMC XML API, security Designed for Network Automation profiles

iT Admin Cisco AnyConnect

Doctor Guest

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 • Data security and compliance • Video and voice • Business continuity / agility • Interactivity • Reduced TCO • Mobility • Standardized IT experience, • Real time, high quality experience customizable user experience • Range of devices

IT Standardization Rich Media Experience

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 VOIP, ICM CUCM 3.x/4.x Cisco UC 5.0+ Cisco UC 8.x SAF 1990s ~2000 2005 2010 Future Legacy Voice Server Appliance Virtualization Network Services Enhancement (Special-purpose)

Increasing Architectural Flexibility while Decreasing Barriers to Rapidly Deploy/Tailor Business Agility

Footprint, Increasing “Miniaturization”, Consolidation & Avoidance while Increasing Efficiency space, Energy, Cabling No Forklifts  Network Convergence  Commodity Servers/Storage  Virtualization Investment Leverage

Increasing Security, Resiliency and options for High Availability / Disaster Recovery Business Continuity

Increasing Familiarity, Centralization, Scale and Efficiency Management Simplification Virtualized Collaborative • New Cisco VXC Zero Clients Workspace • Cisco Cius Cisco Clients • Partnerships with VDI Endpoints • Wyse, DevonIT, IGEL

Cius Business • Enhanced rich media and UC end user Tablets experience • Energy Efficiency

Cisco Virtualization • POE and Energy Wise Experience Clients • Flexibility Thin Client Ecosystem • Security and remote access

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Zero Clients

• Zero clients are the simplest devices • They have embedded operating systems that are not exposed to the user • Zero clients have reduced local capabilities and depend heavily on the resources available within the virtual desktop • This class of devices is typically slated toward the task worker since it provides no enhancements for media streaming • Because there is no exposed OS, there is no virus infection, making them a very secure endpoint

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Thin Clients

• Thin client devices usually contain more local capabilities and often have a customizable local embedded operating system (usually Linux or Windows) • This class of endpoint provides greater flexibility • They are generally customized by the system administrators and then locked down • Thin clients are typically used by power users who need access not only to browsers, email clients and office automation tools, but also additional features such as streaming audio and video

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Thick Clients

• Thick client devices refer to standard PC or Laptops running a standard OS, but have similar software as the thin client, installed as an application

• Thick client devices allow users to work offline and are often the choice of the “Road Warrior” user

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Mobile Clients

• Mobile devices like iPad, CIUS, Galaxy, etc. can have software that will allow them to connect to a Virtual desktop

• This class of endpoint provides greater mobility • This way the user will gain the capability to have their own desktop environments on the road, using whatever data network that they have available. • This devices will establish a VPN to their enterprise network.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 • Integrated form factor for Cisco Unified IP Phone 8900/9900 Series • Power via Phone – Leverages existing Power over Ethernet (PoE) • Supports 2 monitors, USB keyboard & mouse, 4 USB ports, Audio Mic in / Speaker out • VXC 2111 – Supports PCoIP • VXC 2112 – Supports ICA and RDP

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 . VXC 2211 . Power over Ethernet (POE) . Supports VMware View . Supports 2 monitors PCoIP . Key board and Mouse . Audio Mic and Speaker . VXC 2212 . 4 USB ports . Supports Citrix XenDesktop ICA

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 • Supports external USB mouse & keyboard

• Supports external display in “mirror mode” 1024 x 600 scaled up to display size • Base supports POE

1024 x 600

Display Port

Dedicated chip to improve external display quality

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Hairpin Effect – causing undesirable results

Data Center • Monolithic data flows . Voice/Video in the display Virtual Desktop Display Protocol protocol Media flow goes all the Media Flow Thin/Zero Client way back to data center and back . Heavy processing on virtual Signalling desktop in data center (SIP) . Bandwidth explosion CUCM WAN . Display protocol and possible endpoint become unstable Signalling (SIP)

Thin/Zero Client Media Flow Display Protocol Virtual Desktop CUPC over VDI Demo - © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Supported setup for Cisco VXI Phase One

Data Center • Unified Communications Zero Client using desk phone control Virtual Desktop which allows Display Protocol . RTP (UC media “voice/video”) to flow outside the display protocol UC Signalling Signalling . Signaling of CUPC back to (CTI) CUCM is still inside the display protocol CUCM WAN Media Flow . QoS can be used on media Zero Signalling Client . Path is optimized (CTI) . Location Awareness –

UC Signalling Emergency calling, Codex selection, call admission Display Protocol control, SRST Reference, Virtual Desktop Time Zone, Dial-Plan

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 • Avoiding the Hairpinning Problem TheFuture Hairpinning Solution Problem Data Center •. MediaUser interacts flow goes with all “softthe way client” Desktop VM-User 1 backon virtual to data desktop center in and data back Virtualization Protocol center Media Flow • Heavy processing on virtual Thin . desktopVDI communicator in data center provides Client local client-to-client streaming VXC • Latencyof video / voice Communicator Signalling Signalling •BenefitsJitter (SIP) (SIP)

Media . Bandwidth reduction Flow CUCM VXI Cloud . Reduced processing in data center, increase in VM blade Signalling Signalling density (SIP) (SIP) . High quality voice and video

Network handling real-time data Media Flow (QOS, CAC) Thin Desktop Client Eliminates hairpinning of media Virtualization Protocol VM-User 2 VXC through data center Communicator

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Thank you.