Cisco VXI Technology
Paulo Jorge N. Correia – [email protected] Technical Solutions Architect
July 26th, 2011
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 I spend a lot of time on desktop support calls. But I really need to focus on strategic IT initiatives that really add value.
How do I provide agility, flexibility and business continuity when What Keeps I’m required to do more with less?
Windows 7 is here, Us Awake At I need to prepare for it! Information and data is our most important Night? asset―what is the best method to comply with stringent privacy requirements? We spend too much time recovering lost data from stolen laptops.
How do I manage distributed IT environment? Employees are mobile and scattered across the world.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Broker Keyboard, Video, Mouse Thin Client Compute Storage Network
• Personal Computer is disaggregated
• Keyboard, Video, and Mouse stay with user • Compute and storage move to the data center
• Network availability is required for all application access • Network performance is critical to user experience
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 • Refers to the separation of the physical endpoint from the logical desktop • Endpoints may be variety of devices; applications are hosted where ever the best user experience is offered (locally at endpoint or data center) • Access from the endpoint to the logical desktop is delivered through the network
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 . Secure, flexible multi-monitor computing . Eliminate heat and noise in trading rooms, free up desk space . Simplify regulatory compliance Finance . Assist disaster recovery and business continuity
. Quick provisioning to college dorms . Multiple students share same computing resources Education . No need to carry Laptops
. Secure access to sensitive information on remote desktops. . User authentication and peripheral (USB) authorization management. Government
. Remove PCs from harsh environmental hazards . Mobile flexibility Manufacturing
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Quality of user experience • Display protocol not designed for Rich media streaming, voice/video, remote access often less than optimal Performance: Voice/Video cannot be prioritized by QoS Jitter: Voice traffic must go round trip • Bandwidth: Each “new” copy streamed for each additional DV client = branch WAN bandwidth overruns
Display Protocol Virtualized Virtualization Aware Virtualized Collaboration Workplace Network Data Center
Current display protocols are opaque to network services The key to applying services is to separate the flows
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 The Hair pinning Problem Video processed on HVD causing bandwidth and Video Source server compute overload
Branch Office End-users see pixelization as media is rendered from the data center
T1 Branch Router
Increasing bandwidth Data Center might not help
Campus
End-users experience no pixelization on LAN
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 • "The worldwide hosted virtual desktop (HVD) market will accelerate through 2013 to reach 49 million units, up from more than 500,000 units in 2009, according to Gartner Inc. • Worldwide HVD revenue will grow from about $1.3 billion to $1.5 billion in 2009, which is less than 1 percent of the worldwide professional PC market, to $65.7 billion in 2013, which will be equal to more than 40 percent of the worldwide professional PC market." - Gartner, Inc. http://www.gartner.com/it/page.jsp?id=920814
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 90% Plan Implementation within 12-24 months
Source: CDW Jan 2011
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Media Rich Experience
Data Center Security Cisco Virtualization VXI Virtual Workspace TCO / ROI Collaboration Borderless Networks
System Integration
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Desktop Virtualization Suite of Technologies End-to-End Architecture • Desktop Streaming • Application Streaming Rich Media and Collaboration • Terminal Services Cisco Industry Terms for Desktop Security Virtualization Virtualization: Experience •VDI Application Infrastructure Acceleration •Gartner: “Hosted Virtual Desktop” POE / Energy •IDC: “Centralized Virtual Wise Desktop”
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Virtualized Data Center Virtualization-Aware Virtualized Cisco Borderless Network Collaborative Workspace Collaboration MS Office Applications Branch Cisco CDN Microsoft OS Clients Desktop Virtualization Software
Cius Business Tablets Hypervisor ISR Si WAAS Virtual Access Unified CM Switching Cisco Virtualization w/PoE Experience Clients Nexus WAAS
Virtual Thin Client Ecosystem Quad
ACE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 End-to-End Virtual Desktop System
Virtualized Data Center Virtualization-Aware Virtualized Borderless Network Collaborative Workspace Cisco Collaboration Branch Cisco CDN Applications Clients
Cius Business Tablets ISR Si WAAS Virtual Access Unified CM Switching Cisco Virtualization w/PoE Experience Clients Nexus WAAS
Virtual Quad
ACE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Virtualized Virtualization-Aware Virtualized Data Center Collaborative Workspace Borderless Network Campus
Campus Datacenter Endpoints Branch Office Security
Optimization Branch Endpoints Display protocol Mobile Teleworker over the Network Availability VPN Bandwidth Requirements and Scale Mobile Teleworker • Local Area Network High Available Endpoint Fixed Teleworker • Wide Area Network – Nat/No-Nat • Compute • VPN Tunnel/GRE • Provisioning and automation • MPLS – EIGRP Fixed Teleworker Endpoint • Survivability
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Virtualized Data Center and Cisco VXI Purpose-built for virtualization Virtualized Data Center . Cisco UCS Cisco Collaboration MS Office Applications . Storage Partnerships Microsoft OS . EMC and NetApp Desktop Virtualization Software . VDI Software Partnerships
Hypervisor . VMware, Citrix, and Microsoft WAAS . Integration into the Hypervisor for Virtual Unified CM . Nexus 1000V Nexus . Enhanced Security (Cisco VSG) Virtual Quad . Application Acceleration (Cisco WAAS)
ACE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 BUSINESS VALUE SYSTEMS SOLUTION SYSTEMS EXCELLENCE DIFFERENTIATION EXCELLENCE TECHNOLOGY INNOVATION Rapid Deployment TECHNOLOGY Workload Mobility INNOVATION
Optimized Scaling Unified Fabric Unified Management Simplified Operations Service Profile Unified IT Workflows HW Abstraction
Lower TCO Virtual Interfaces
Extended Memory
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Classic
12 DIMMs 18 DIMMs Max 96GB Or Max 144GB Higher Performance Lower Performance
Cisco UCS With Extended Memory
Xeon 5600 Xeon 5600
48 DIMMs Max 384GB Higher Performance © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
• XenDesktop (Citrix) + UCS + XenServer + NetApp Storage • XenDesktop (Citrix) + UCS + ESXi+ NetApp Storage • XenDesktop (Citrix) + UCS + Hyper-V+ NetApp Storage
• View 4.5 on NetApp • View 4.5 on EMC CLARiiON
http://www.cisco.com/go/cvd http://www.cisco.com/go/vxi
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Fabric Interconnects
slot 1 slot 1 slot 1 slot 1 slot 2 slot 2 slot 2 slot 2 slot 3 slot 3 slot 3 slot 3 slot 4 slot 4 slot 4 slot 4 slot 5 slot 5 slot 5 slot 5 slot 6 slot 6 slot 6 slot 6 slot 7 slot 7 slot 7 slot 7 slot 8 slot 8 slot 8 slot 8
Unified Compute Chassis Fabric Extenders
Blade Server Server Desktop Per Per Per CPU Memory Configuration Blade Chassis Domain B200-M1 Xeon5570 2.93 GHz 48 GB WinXP 512 MB 128 1,024 40,960 B200-M1 Xeon5570 2.93 GHz 96 GB WinXP 512 MB 160 1,280 51,200 B200-M1 Xeon5570 2.93 GHz 96 GB WinXP 1024 MB 150 1,200 48,000 B250-M1 Xeon5570 2.93 GHz 192 GB WinXP 1024 MB 332 1,328 53,120 B250-M2 Xeon5600 3.33 GHz 192 GB Win7-32 1.5 GB 110 440 17,600
©B230 2010 Cisco and/or-M1 its affiliates. Xeon6500/7500 All rights reserved. 128 GB Win7-32 1.0 GB 80 640 Cisco25,600 Confidential 19 Bundle Positioned For Contains
Distributed Compute . 100-300 VM desktops VDI for C-series . Rack-mount server . Leverage the Smart Play bundle UCS-SP-C250P . Hosted Shared desktops Hosted Shared for C-series . Leverage the Smart Play bundle UCS-SP-C200E
100 users - VDI C250 M2 . Problem . Existing bundles start at the 300 + VMs . There is a need for solution that covers 100-300 VM for smaller customers and 120 users – Hosted Shared distributed compute. . Solution . Introduce the Distributed Compute Bundle which addresses the 100-300 desktop C200 M2 user market.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Key Network Services for VXI: . Wired/Wireless integration . PoE/PoE+ scalability and policing
. Remote access and virtual machine policy . Unified network location services . ACE – Connection Broker load balancing . WAAS – Optimize, compress, accelerate
Network
Awareness of VDI
Accelerate VXI access and response Save WAN bandwidth
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Wall Circuit
UPS Backup
• OPEX High efficiency bulk power supplies are more efficient than power cubes Power regulation using EnergyWise Increase business productivity through reduced downtime • CAPEX Lower cost devices without power bricks Building construction savings Minimal power routing Lower maintenance for power cables
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 • Data Redundancy Elimination (DRE) eliminates redundancy within or between flows • LZ compression eliminates redundancy within flows • TCP Flow Optimization (TFO) fills the pipe over high latency links • Transport Data De-duplication – No byte pattern crosses the network twice
Origin Connection Origin Connection
WAN
Optimized Connection
DRE CACHE DRE CACHE
LZ LZ
Window Scaling Large Initial Windows Decode Congestion Mgmt Encode Improved Retransmit © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Packet Aggregation • Cisco VSG (Virtual Security Gateway) protects the virtual environment within the data center • Cisco ASA 5500 Appliances (ASA) secure the data center to defend against threats and unauthorized access • Cisco AnyConnect Secure Mobility Solution (AnyConnect) establishes trusted access between the client and the data center • Cisco ScanSafe offers Cloud Security (SaaS) with Secure Split tunneling • Cisco N1000v preventing DHCP Snooping, Dynamic ARP Inspection (DAI) and IP Source Guard (IPSG) • Cisco switching providing Radius authentication using 802.1x
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Context Server Zones aware VM context aware rules
Zone based Healthcare Portal Records Database Application Controls Establish zones of trust Dynamic, Policies follow vMotion VSG Agile Best-in-class Efficient, Fast, Scale-out Architecture SW Virtual Security Gateway (VSG) HVD Zones
IT Admin Assistant Doctor Guest
Non- Security team manages Disruptive Operations security
Central mgmt, scalable Policy Based deployment, multi-tenancy ASA
VNMC XML API, security Designed for Network Automation profiles
iT Admin Cisco AnyConnect
Doctor Guest
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 • Data security and compliance • Video and voice • Business continuity / agility • Interactivity • Reduced TCO • Mobility • Standardized IT experience, • Real time, high quality experience customizable user experience • Range of devices
IT Standardization Rich Media Experience
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 VOIP, ICM CUCM 3.x/4.x Cisco UC 5.0+ Cisco UC 8.x SAF 1990s ~2000 2005 2010 Future Legacy Voice Server Appliance Virtualization Network Services Enhancement (Special-purpose)
Increasing Architectural Flexibility while Decreasing Barriers to Rapidly Deploy/Tailor Business Agility
Footprint, Increasing “Miniaturization”, Consolidation & Avoidance while Increasing Efficiency space, Energy, Cabling No Forklifts Network Convergence Commodity Servers/Storage Virtualization Investment Leverage
Increasing Security, Resiliency and options for High Availability / Disaster Recovery Business Continuity
Increasing Familiarity, Centralization, Scale and Efficiency Management Simplification Virtualized Collaborative • New Cisco VXC Zero Clients Workspace • Cisco Cius Cisco Clients • Partnerships with VDI Endpoints • Wyse, DevonIT, IGEL
Cius Business • Enhanced rich media and UC end user Tablets experience • Energy Efficiency
Cisco Virtualization • POE and Energy Wise Experience Clients • Flexibility Thin Client Ecosystem • Security and remote access
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Zero Clients
• Zero clients are the simplest devices • They have embedded operating systems that are not exposed to the user • Zero clients have reduced local capabilities and depend heavily on the resources available within the virtual desktop • This class of devices is typically slated toward the task worker since it provides no enhancements for media streaming • Because there is no exposed OS, there is no virus infection, making them a very secure endpoint
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Thin Clients
• Thin client devices usually contain more local capabilities and often have a customizable local embedded operating system (usually Linux or Windows) • This class of endpoint provides greater flexibility • They are generally customized by the system administrators and then locked down • Thin clients are typically used by power users who need access not only to browsers, email clients and office automation tools, but also additional features such as streaming audio and video
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Thick Clients
• Thick client devices refer to standard PC or Laptops running a standard OS, but have similar software as the thin client, installed as an application
• Thick client devices allow users to work offline and are often the choice of the “Road Warrior” user
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Mobile Clients
• Mobile devices like iPad, CIUS, Galaxy, etc. can have software that will allow them to connect to a Virtual desktop
• This class of endpoint provides greater mobility • This way the user will gain the capability to have their own desktop environments on the road, using whatever data network that they have available. • This devices will establish a VPN to their enterprise network.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 • Integrated form factor for Cisco Unified IP Phone 8900/9900 Series • Power via Phone – Leverages existing Power over Ethernet (PoE) • Supports 2 monitors, USB keyboard & mouse, 4 USB ports, Audio Mic in / Speaker out • VXC 2111 – Supports PCoIP • VXC 2112 – Supports ICA and RDP
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 . VXC 2211 . Power over Ethernet (POE) . Supports VMware View . Supports 2 monitors PCoIP . Key board and Mouse . Audio Mic and Speaker . VXC 2212 . 4 USB ports . Supports Citrix XenDesktop ICA
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 • Supports external USB mouse & keyboard
• Supports external display in “mirror mode” 1024 x 600 scaled up to display size • Base supports POE
1024 x 600
Display Port
Dedicated chip to improve external display quality
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Hairpin Effect – causing undesirable results
Data Center • Monolithic data flows . Voice/Video in the display Virtual Desktop Display Protocol protocol Media flow goes all the Media Flow Thin/Zero Client way back to data center and back . Heavy processing on virtual Signalling desktop in data center (SIP) . Bandwidth explosion CUCM WAN . Display protocol and possible endpoint become unstable Signalling (SIP)
Thin/Zero Client Media Flow Display Protocol Virtual Desktop CUPC over VDI Demo - © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Supported setup for Cisco VXI Phase One
Data Center • Unified Communications Zero Client using desk phone control Virtual Desktop which allows Display Protocol . RTP (UC media “voice/video”) to flow outside the display protocol UC Signalling Signalling . Signaling of CUPC back to (CTI) CUCM is still inside the display protocol CUCM WAN Media Flow . QoS can be used on media Zero Signalling Client . Path is optimized (CTI) . Location Awareness –
UC Signalling Emergency calling, Codex selection, call admission Display Protocol control, SRST Reference, Virtual Desktop Time Zone, Dial-Plan
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 • Avoiding the Hairpinning Problem TheFuture Hairpinning Solution Problem Data Center •. MediaUser interacts flow goes with all “softthe way client” Desktop VM-User 1 backon virtual to data desktop center in and data back Virtualization Protocol center Media Flow • Heavy processing on virtual Thin . desktopVDI communicator in data center provides Client local client-to-client streaming VXC • Latencyof video / voice Communicator Signalling Signalling •BenefitsJitter (SIP) (SIP)
Media . Bandwidth reduction Flow CUCM VXI Cloud . Reduced processing in data center, increase in VM blade Signalling Signalling density (SIP) (SIP) . High quality voice and video
Network handling real-time data Media Flow (QOS, CAC) Thin Desktop Client Eliminates hairpinning of media Virtualization Protocol VM-User 2 VXC through data center Communicator
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Thank you.