Cisco VXI Technology

Cisco VXI Technology

Cisco VXI Technology Paulo Jorge N. Correia – [email protected] Technical Solutions Architect July 26th, 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 I spend a lot of time on desktop support calls. But I really need to focus on strategic IT initiatives that really add value. How do I provide agility, flexibility and business continuity when What Keeps I’m required to do more with less? Windows 7 is here, Us Awake At I need to prepare for it! Information and data is our most important Night? asset―what is the best method to comply with stringent privacy requirements? We spend too much time recovering lost data from stolen laptops. How do I manage distributed IT environment? Employees are mobile and scattered across the world. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Broker Keyboard, Video, Mouse Thin Client Compute Storage Network • Personal Computer is disaggregated • Keyboard, Video, and Mouse stay with user • Compute and storage move to the data center • Network availability is required for all application access • Network performance is critical to user experience © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 • Refers to the separation of the physical endpoint from the logical desktop • Endpoints may be variety of devices; applications are hosted where ever the best user experience is offered (locally at endpoint or data center) • Access from the endpoint to the logical desktop is delivered through the network © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 . Secure, flexible multi-monitor computing . Eliminate heat and noise in trading rooms, free up desk space . Simplify regulatory compliance Finance . Assist disaster recovery and business continuity . Quick provisioning to college dorms . Multiple students share same computing resources Education . No need to carry Laptops . Secure access to sensitive information on remote desktops. User authentication and peripheral (USB) authorization management. Government . Remove PCs from harsh environmental hazards . Mobile flexibility Manufacturing © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Quality of user experience • Display protocol not designed for Rich media streaming, voice/video, remote access often less than optimal Performance: Voice/Video cannot be prioritized by QoS Jitter: Voice traffic must go round trip • Bandwidth: Each “new” copy streamed for each additional DV client = branch WAN bandwidth overruns Display Protocol Virtualized Virtualization Aware Virtualized Collaboration Workplace Network Data Center Current display protocols are opaque to network services The key to applying services is to separate the flows © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 The Hair pinning Problem Video processed on HVD causing bandwidth and Video Source server compute overload Branch Office End-users see pixelization as media is rendered from the data center T1 Branch Router Increasing bandwidth Data Center might not help Campus End-users experience no pixelization on LAN © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 • "The worldwide hosted virtual desktop (HVD) market will accelerate through 2013 to reach 49 million units, up from more than 500,000 units in 2009, according to Gartner Inc. • Worldwide HVD revenue will grow from about $1.3 billion to $1.5 billion in 2009, which is less than 1 percent of the worldwide professional PC market, to $65.7 billion in 2013, which will be equal to more than 40 percent of the worldwide professional PC market." - Gartner, Inc. http://www.gartner.com/it/page.jsp?id=920814 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 90% Plan Implementation within 12-24 months Source: CDW Jan 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Media Rich Experience Data Center Security Cisco Virtualization VXI Virtual Workspace TCO / ROI Collaboration Borderless Networks System Integration © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Desktop Virtualization Suite of Technologies End-to-End Architecture • Desktop Streaming • Application Streaming Rich Media and Collaboration • Terminal Services Cisco Industry Terms for Desktop Security Virtualization Virtualization: Experience •VDI Application Infrastructure Acceleration •Gartner: “Hosted Virtual Desktop” POE / Energy •IDC: “Centralized Virtual Wise Desktop” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Virtualized Data Center Virtualization-Aware Virtualized Cisco Borderless Network Collaborative Workspace Collaboration MS Office Applications Branch Cisco CDN Microsoft OS Clients Desktop Virtualization Software Cius Business Tablets Hypervisor ISR Si WAAS Virtual Access Unified CM Switching Cisco Virtualization w/PoE Experience Clients Nexus WAAS Virtual Thin Client Ecosystem Quad ACE © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 End-to-End Virtual Desktop System Virtualized Data Center Virtualization-Aware Virtualized Borderless Network Collaborative Workspace Cisco Collaboration Branch Cisco CDN Applications Clients Cius Business Tablets ISR Si WAAS Virtual Access Unified CM Switching Cisco Virtualization w/PoE Experience Clients Nexus WAAS Virtual Quad ACE © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Virtualized Virtualization-Aware Virtualized Data Center Collaborative Workspace Borderless Network Campus Campus Datacenter Endpoints Branch Office Security Optimization Branch Endpoints Display protocol Mobile Teleworker over the Network Availability VPN Bandwidth Requirements and Scale Mobile Teleworker • Local Area Network High Available Endpoint Fixed Teleworker • Wide Area Network – Nat/No-Nat • Compute • VPN Tunnel/GRE • Provisioning and automation • MPLS – EIGRP Fixed Teleworker Endpoint • Survivability © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Virtualized Data Center and Cisco VXI Purpose-built for virtualization Virtualized Data Center . Cisco UCS Cisco Collaboration MS Office Applications . Storage Partnerships Microsoft OS . EMC and NetApp Desktop Virtualization Software . VDI Software Partnerships Hypervisor . VMware, Citrix, and Microsoft WAAS . Integration into the Hypervisor for Virtual Unified CM . Nexus 1000V Nexus . Enhanced Security (Cisco VSG) Virtual Quad . Application Acceleration (Cisco WAAS) ACE © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 BUSINESS VALUE SYSTEMS SOLUTION SYSTEMS EXCELLENCE DIFFERENTIATION EXCELLENCE TECHNOLOGY INNOVATION Rapid Deployment TECHNOLOGY Workload Mobility INNOVATION Optimized Scaling Unified Fabric Unified Management Simplified Operations Service Profile Unified IT Workflows HW Abstraction Lower TCO Virtual Interfaces Extended Memory © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Classic 12 DIMMs 18 DIMMs Max 96GB Or Max 144GB Higher Performance Lower Performance Cisco UCS With Extended Memory Xeon 5600 Xeon 5600 48 DIMMs Max 384GB Higher Performance © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 • XenDesktop (Citrix) + UCS + XenServer + NetApp Storage • XenDesktop (Citrix) + UCS + ESXi+ NetApp Storage • XenDesktop (Citrix) + UCS + Hyper-V+ NetApp Storage • View 4.5 on NetApp • View 4.5 on EMC CLARiiON http://www.cisco.com/go/cvd http://www.cisco.com/go/vxi © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Fabric Interconnects slot 1 slot 1 slot 1 slot 1 slot 2 slot 2 slot 2 slot 2 slot 3 slot 3 slot 3 slot 3 slot 4 slot 4 slot 4 slot 4 slot 5 slot 5 slot 5 slot 5 slot 6 slot 6 slot 6 slot 6 slot 7 slot 7 slot 7 slot 7 slot 8 slot 8 slot 8 slot 8 Unified Compute Chassis Fabric Extenders Blade Server Server Desktop Per Per Per CPU Memory Configuration Blade Chassis Domain B200-M1 Xeon5570 2.93 GHz 48 GB WinXP 512 MB 128 1,024 40,960 B200-M1 Xeon5570 2.93 GHz 96 GB WinXP 512 MB 160 1,280 51,200 B200-M1 Xeon5570 2.93 GHz 96 GB WinXP 1024 MB 150 1,200 48,000 B250-M1 Xeon5570 2.93 GHz 192 GB WinXP 1024 MB 332 1,328 53,120 B250-M2 Xeon5600 3.33 GHz 192 GB Win7-32 1.5 GB 110 440 17,600 ©B230 2010 Cisco and/or-M1 its affiliates. Xeon6500/7500 All rights reserved. 128 GB Win7-32 1.0 GB 80 640 Cisco25,600 Confidential 19 Bundle Positioned For Contains Distributed Compute . 100-300 VM desktops VDI for C-series . Rack-mount server . Leverage the Smart Play bundle UCS-SP-C250P . Hosted Shared desktops Hosted Shared for C-series . Leverage the Smart Play bundle UCS-SP-C200E 100 users - VDI C250 M2 . Problem . Existing bundles start at the 300 + VMs . There is a need for solution that covers 100-300 VM for smaller customers and 120 users – Hosted Shared distributed compute. Solution . Introduce the Distributed Compute Bundle which addresses the 100-300 desktop C200 M2 user market. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Key Network Services for VXI: . Wired/Wireless integration . PoE/PoE+ scalability and policing . Remote access and virtual machine policy . Unified network location services . ACE – Connection Broker load balancing . WAAS – Optimize, compress, accelerate Network Awareness of VDI Accelerate VXI access and response Save WAN bandwidth © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Wall Circuit UPS

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    39 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us