Stateless desktops: looking beyond the VDI hype
Tuesday, 09 September 2008 | Dr Kevin McIsaac, IBRSB r d n o t e o t a l o s r e v r u l s t o , V w r 's i t a D s t p n t a i e ( D ) h s e o e v r h t o i I o g n s t o s. h s s a g l d e o r a i a i n ' c n e n a d i s t s a t o w t t e r x s i g u l e k o e v r n e t , i , h g c s , c m l x a a e e t, l w r v s o i g, e u i y, n l x b e, t . S m v n o s r h v b e p o o i g i t a d s t p a a o p e e e k o r p a e e t h t a e i i a e h s i s e .
R s l i g h s d s t p o c r s e u r s u h o e h n i p y i r t n t e x s i g e k o i a e t t e a a e t e n r n i g h m n v r u l s d n i o m n . I s e d, h d s t p m g m s b t a s o m d n o s a e e s r h t c u e h c c n e a i y e l y d n m n g d. o e e , o c t i t a s o m t o i a h e e t e d i i n l e e i f o v r u l s n t e e k o i s a l, n i m s c s s e k o v r u l s t o t e b c m s o n e p o u t v .
A s o n n r o r s a c , v r u l e k o s a e i h r a i a c s s h n h f l d s t p . U l s t e e k o i a e s r n f r e i t a t t l s m d l h m n g m n p o l m a e a g l u c a g d, u t o e t a i f r n l c t o . T e p r t o a c s s r u c a g d. n h s a e h n t e u t f i t a i i g h d s t p s m r e p n i e n i o m n w t m s o t e a e s u s s h e i t n d s t p.
r a i a i n t a t a s o m h d s t p m g a p r o a e k o v r u l s t o p o e t i l i c v r h t h a i i y n T O e e i s o e r m h s c a g s n n t i t a i a i n. h c a g s h t r n c s a y o a e h d s t p a a e b e n v r u l s d n i o m n a e u t s a i y p l e t a u l e k o t d l v r a e e e i s. o, n t a o f c s n o d s t p i t a i a i n, r a i a i n s o l f c s n h b s p a t c s h t i p i y a a e e t n d p o m n , a d o s d r i t a d s t p o t r i a s r i e a a o t o a a d- n o s e i i n c e a e , e B O, e o e c e s r m l b a c o f c s.
Stateless Desktops
h l d s t p i t a i a i n r a s h t g t o p i g e w e t e a d a e n t e o k o d, t o s o h n t a d e s h m r s g i i a t r b e s r s n f o t e i h c u l n o t e p r t n s s e (O/ ) t t e p l c t o s o h u e 's a a n p o i e - h h g c s , c m l x a a e e t, l w r v s o i g, e u i y, n l x b e t . T a d e s h s i s e o g n s t o s h u d o e o n r h t c u e h r t e s r' s a e s t r d n h n t o k, a i g h d s t p m g s a e e s.
h k y t p a e:
-
- Decouple the user applications from the O/S and the PC hardware using Application Virtualisation. In a Windows environment the key technologies are Microsoft App-V, VMware ThinApp and Group Policy Objects.
-
- Decouple the user's data from the O/S and the PC hardware by moving it to a centrally managed network storage device, e.g., a NAS or a file server. In a Windows environment the key technologies are Folder Redirection and Group Policy Objects.
-
- Decouple the user's profile, i.e., desktop icons, start menu, wallpaper, printers etc, from the O/S and the PC hardware. In a Windows environment the key technologies are Roaming User Profiles, Folder Redirection and Group Policy Objects.
-
- Simplify deployment and configuration management of the O/S by using a standard operating environment (SOE), locking down the O/S and using rapid O/S deployment tools. In a Windows environment the key technologies are Microsoft RIS/WDS/SMS or Citrix Provisioning Server.
-
- Most of the technologies for implementing a stateless desktop image are mature and widely deployed, with the exception of application virtualisation, which is relatively new. The use of Active Directory is essential to manage and enforce the stateless desktop configuration, however since Active Directory is commonly deployed in all non-trivial desktop environments this is unlikely to be the barrier.
-
- In some organisations roaming user profiles have a poor reputation for being complex to implement and for slowing down login times. The use of Folder Redirection can greatly reduce the long login times by reducing the size of the user profile that needs to be copied to the PC. With Folder Redirection folders such as "My Documents" and "Application Data" are stored on the network and accessed over the network.
-
h b n f t o a t t l s d s t p r h t c u e r :
- Mobility - Users can access their desktop, i.e., profile, data and application, from any full or thin desktop that is configured in the organisations environment.
-
- Information management - User data can be managed and secured in ways that are appropriate to the value of the data, e.g., backup, disaster recovery, security, archive.
-
- Disaster recovery - if a user's PC is lost, or inoperative, the user is able to access their desktop from any other PC to continue working. If a whole site is lost, providing the user's state is still available or recoverable, the user can continue working at an alternative site.
-
- Serviceability - a user's PC can be easily replaced by quickly imaging the new hardware with the SOE. When the user logs in for the first time, the state is simply accessed from the network.
-
- Remote Access - a user can remotely access their desktop using a terminal services or virtual desktop solution since the stateless architecture can be used with these deployment approaches.
-
- Lower TCO - decoupling the user's state from the O/S and the PC hardware simplifies many desktop management functions reducing the TCO.
Next Steps
O g n s t o s o k n t l w r h d s t p C o i p o e e k o f e i i i y y d p i g D , o s m o h r h n e k o a p o c , s o l f r t r n f r t e r x s i g e k o i a e n o s a e e s r h t c u e y:
-
- Assessing the use of the technologies described above in the existing desktop deployment to determine the organisations readiness to deploy these technologies and evaluating the current state of the desktop environment.
- Estimating the TCO or flexibility benefits from decoupling the user's data, profile and applications from the desktop image.
- Creating a plan that breaks the transformation into the stateless desktop image into several smaller, incremental projects, with each delivering measurable benefits.
- Once the transformation to a stateless architecture is complete, assess which desktop use cases, if any, will benefit by using a thin desktop deployment method and then define a business case for transforming those desktops to a thin desktop architecture.
Conclusion: h l v r u l e k o s r o e f h h t e t n r s r c u e o i s f 0 8, i p y i t a i i g t p c l e k o e v r n e t n m g a i g h t o h d t c n r w l p o e o e v r c s l m s a e. n t a o g n s t o s h u d o k e o d h v r u l e k o h p a d o u o i p e e t n a t t l s d s t p r h t c u e h t n r a e d s t p g l t a d o e s h t t l o t f w e s i . O c a o t d h s a e e s e k o i a e a b u e w t a y y e f e k o d p o m n m t o , i , f l d s t p, i t a d s t p r e m n l e v c s, n i t e o n a i n o r d c n d s t p o t n i c e s n d s t p l x b l t .
Dr Kevin McIsaac i t e B S d i o f r i t a i a i n, e k o d p o m n , m b l d v c s & e w r s, e v r & s o a e n d t c n r i f a t u t r .
y i i g n h c a t i s f e v r i t a i a i n, M a e' V r u l e k o I i i t v (V I) a b c m a e y o t p c T r a i a i n . T i i l r e y u t o g n s t o s' o c r s n d s a i f c i n i h h i e i t n f l d s t p n i o m n s, e, i h o t, o p e m n g m n , s o p o i i n n , s c r t , i f e i l , e c. o e e d r a e a e e n r m t n v r u l e k o s s c m l t d s t p e l c m n t a c n l m n t t e e s u s.
e o v n t e e e k o c n e n r q i e m c m r t a s m l m g a i g h e i t n d s t p m g s o h d t c n r a d u n n t e i a i t a i e e v r n e t. n t a , t e e k o i a e u t e r n f r e i t a t t l s a c i e t r w i h a b e s l d p o e a d a a e . H w v r, n e h s r n f r a i n s c i v d h a d t o a b n f t r m i t a i i g h d s t p s m l , a d n o t a e d s t p i t a i a i n h n e o e c u t r r d c i e.
s h w i p i r e e r h, i t a d s t p h v h g e c p t l o t t a t e u l e k o s. n e s h d s t p m g i t a s o m d n o s a e e s o e t e a a e e t r b e s r l r e y n h n e , j s m v d o d f e e t o a i n. h o e a i n l o t a e n h n e . I t i c s t e e r s l o v r u l s n t e e k o i a o e x e s v e v r n e t i h o t f h s m i s e a t e x s i g e k o .
O g n s t o s h t r n f r t e e k o i a e s a t f d s t p i t a i a i n r j c w l d s o e t a t e g l t a d C b n f t c m f o t e e h n e a d o v r u l s t o . T e h n e t a a e e e s r t m k t e e k o m n g a l i a i t a i e e v r n e t r j s a e s l a p i d o f l d s t p o e i e s m b n f t . S , i s e d f o u i g n e k o v r u l s t o , o g n s t o s h u d o u o t e e t r c i e t a s m l f m n g m n a d e l y e t, n c n i e v r u l e k o s r e m n l e v c s s n p i n l d -o f r p c f c i h c s s, g P , r m t a c s o s a l r n h f i e .
Stateless Desktops
W i e e k o v r u l s t o b e k t e i h c u l n b t e n h h r w r a d h w r l a , i d e n t i g o d r s t e o e i n f c n p o l m a i i g r m h t g t o p i g f h o e a i g y t m ( /S) o h a p i a i n t t e s r' d t a d r f l - t e i h o t, o p e m n g m n , s o p o i i n n , s c r t , i f e i l e c. o d r s t e e s u s r a i a i n s o l m v t a a c i e t r w e e h u e 's t t i s o e i t e e w r , m k n t e e k o i a e t t l s .
T e e s e s r :
-
- Decouple the user applications from the O/S and the PC hardware using Application Virtualisation. In a Windows environment the key technologies are Microsoft App-V, VMware ThinApp and Group Policy Objects.
-
- Decouple the user's data from the O/S and the PC hardware by moving it to a centrally managed network storage device, e.g., a NAS or a file server. In a Windows environment the key technologies are Folder Redirection and Group Policy Objects.
-
- Decouple the user's profile, i.e., desktop icons, start menu, wallpaper, printers etc, from the O/S and the PC hardware. In a Windows environment the key technologies are Roaming User Profiles, Folder Redirection and Group Policy Objects.
-
- Simplify deployment and configuration management of the O/S by using a standard operating environment (SOE), locking down the O/S and using rapid O/S deployment tools. In a Windows environment the key technologies are Microsoft RIS/WDS/SMS or Citrix Provisioning Server.
-
- Most of the technologies for implementing a stateless desktop image are mature and widely deployed, with the exception of application virtualisation, which is relatively new. The use of Active Directory is essential to manage and enforce the stateless desktop configuration, however since Active Directory is commonly deployed in all non-trivial desktop environments this is unlikely to be the barrier.
-
- In some organisations roaming user profiles have a poor reputation for being complex to implement and for slowing down login times. The use of Folder Redirection can greatly reduce the long login times by reducing the size of the user profile that needs to be copied to the PC. With Folder Redirection folders such as "My Documents" and "Application Data" are stored on the network and accessed over the network.
-
T e e e i s f s a e e s e k o a c i e t r a e:
- Mobility - Users can access their desktop, i.e., profile, data and application, from any full or thin desktop that is configured in the organisations environment.
-
- Information management - User data can be managed and secured in ways that are appropriate to the value of the data, e.g., backup, disaster recovery, security, archive.
-
- Disaster recovery - if a user's PC is lost, or inoperative, the user is able to access their desktop from any other PC to continue working. If a whole site is lost, providing the user's state is still available or recoverable, the user can continue working at an alternative site.
-
- Serviceability - a user's PC can be easily replaced by quickly imaging the new hardware with the SOE. When the user logs in for the first time, the state is simply accessed from the network.
-
- Remote Access - a user can remotely access their desktop using a terminal services or virtual desktop solution since the stateless architecture can be used with these deployment approaches.
-
- Lower TCO - decoupling the user's state from the O/S and the PC hardware simplifies many desktop management functions reducing the TCO.
Next Steps
r a i a i n l o i g o o e t e e k o T O r m r v d s t p l x b l t b a o t n V I, r o e t e t i d s t p p r a h, h u d i s t a s o m h i e i t n d s t p m g i t a t t l s a c i e t r b :
-
- Assessing the use of the technologies described above in the existing desktop deployment to determine the organisations readiness to deploy these technologies and evaluating the current state of the desktop environment.
- Estimating the TCO or flexibility benefits from decoupling the user's data, profile and applications from the desktop image.
- Creating a plan that breaks the transformation into the stateless desktop image into several smaller, incremental projects, with each delivering measurable benefits.
- Once the transformation to a stateless architecture is complete, assess which desktop use cases, if any, will benefit by using a thin desktop deployment method and then define a business case for transforming those desktops to a thin desktop architecture.
Conclusion: W i e i t a d s t p a e n o t e o t s i f a t u t r t p c o 2 0 , s m l v r u l s n a y i a d s t p n i o m n a d i r t n t a t t e a a e t e i l r v t b a e y o t y i t k . I s e d r a i a i n s o l l o b y n t e i t a d s t p y e n f c s n m l m n i g s a e e s e k o a c i e t r t a i c e s s e k o a i i y n l w r t e o a c s o o n r h p. n e d p e t e t t l s d s t p m g c n e s d i h n t p o d s t p e l y e t e h d, e, u l e k o , v r u l e k o o t r i a s r i e , a d s h f u d t o f r e u i g e k o c s a d n r a i g e k o f e i i i y.
Dr Kevin McIsaac s h I R a v s r o v r u l s t o , d s t p e l y e t, o i e e i e & n t o k , s r e s & t r g a d a a e t e n r s r c u e.
B r d n o t e o t a l o s r e v r u l s t o , V w r 's i t a D s t p n t a i e ( D ) h s e o e v r h t o i I o g n s t o s. h s s a g l d e o r a i a i n ' c n e n a d i s t s a t o w t t e r x s i g u l e k o e v r n e t , i , h g c s , c m l x a a e e t, l w r v s o i g, e u i y, n l x b e, t . S m v n o s r h v b e p o o i g i t a d s t p a a o p e e e k o r p a e e t h t a e i i a e h s i s e .
R s l i g h s d s t p o c r s e u r s u h o e h n i p y i r t n t e x s i g e k o i a e t t e a a e t e n r n i g h m n v r u l s d n i o m n . I s e d, h d s t p m g m s b t a s o m d n o s a e e s r h t c u e h c c n e a i y e l y d n m n g d. o e e , o c t i t a s o m t o i a h e e t e d i i n l e e i f o v r u l s n t e e k o i s a l, n i m s c s s e k o v r u l s t o t e b c m s o n e p o u t v .
A s o n n r o r s a c , v r u l e k o s a e i h r a i a c s s h n h f l d s t p . U l s t e e k o i a e s r n f r e i t a t t l s m d l h m n g m n p o l m a e a g l u c a g d, u t o e t a i f r n l c t o . T e p r t o a c s s r u c a g d. n h s a e h n t e u t f i t a i i g h d s t p s m r e p n i e n i o m n w t m s o t e a e s u s s h e i t n d s t p.
r a i a i n t a t a s o m h d s t p m g a p r o a e k o v r u l s t o p o e t i l i c v r h t h a i i y n T O e e i s o e r m h s c a g s n n t i t a i a i n. h c a g s h t r n c s a y o a e h d s t p a a e b e n v r u l s d n i o m n a e u t s a i y p l e t a u l e k o t d l v r a e e e i s. o, n t a o f c s n o d s t p i t a i a i n, r a i a i n s o l f c s n h b s p a t c s h t i p i y a a e e t n d p o m n , a d o s d r i t a d s t p o t r i a s r i e a a o t o a a d- n o s e i i n c e a e , e B O, e o e c e s r m l b a c o f c s.
Stateless Desktops
h l d s t p i t a i a i n r a s h t g t o p i g e w e t e a d a e n t e o k o d, t o s o h n t a d e s h m r s g i i a t r b e s r s n f o t e i h c u l n o t e p r t n s s e (O/ ) t t e p l c t o s o h u e 's a a n p o i e - h h g c s , c m l x a a e e t, l w r v s o i g, e u i y, n l x b e t . T a d e s h s i s e o g n s t o s h u d o e o n r h t c u e h r t e s r' s a e s t r d n h n t o k, a i g h d s t p m g s a e e s.
h k y t p a e:
-
- Decouple the user applications from the O/S and the PC hardware using Application Virtualisation. In a Windows environment the key technologies are Microsoft App-V, VMware ThinApp and Group Policy Objects.
-
- Decouple the user's data from the O/S and the PC hardware by moving it to a centrally managed network storage device, e.g., a NAS or a file server. In a Windows environment the key technologies are Folder Redirection and Group Policy Objects.
-
- Decouple the user's profile, i.e., desktop icons, start menu, wallpaper, printers etc, from the O/S and the PC hardware. In a Windows environment the key technologies are Roaming User Profiles, Folder Redirection and Group Policy Objects.
-
- Simplify deployment and configuration management of the O/S by using a standard operating environment (SOE), locking down the O/S and using rapid O/S deployment tools. In a Windows environment the key technologies are Microsoft RIS/WDS/SMS or Citrix Provisioning Server.
-
- Most of the technologies for implementing a stateless desktop image are mature and widely deployed, with the exception of application virtualisation, which is relatively new. The use of Active Directory is essential to manage and enforce the stateless desktop configuration, however since Active Directory is commonly deployed in all non-trivial desktop environments this is unlikely to be the barrier.
-
- In some organisations roaming user profiles have a poor reputation for being complex to implement and for slowing down login times. The use of Folder Redirection can greatly reduce the long login times by reducing the size of the user profile that needs to be copied to the PC. With Folder Redirection folders such as "My Documents" and "Application Data" are stored on the network and accessed over the network.
-
h b n f t o a t t l s d s t p r h t c u e r :
- Mobility - Users can access their desktop, i.e., profile, data and application, from any full or thin desktop that is configured in the organisations environment.
-
- Information management - User data can be managed and secured in ways that are appropriate to the value of the data, e.g., backup, disaster recovery, security, archive.
-
- Disaster recovery - if a user's PC is lost, or inoperative, the user is able to access their desktop from any other PC to continue working. If a whole site is lost, providing the user's state is still available or recoverable, the user can continue working at an alternative site.
-
- Serviceability - a user's PC can be easily replaced by quickly imaging the new hardware with the SOE. When the user logs in for the first time, the state is simply accessed from the network.
-
- Remote Access - a user can remotely access their desktop using a terminal services or virtual desktop solution since the stateless architecture can be used with these deployment approaches.
-
- Lower TCO - decoupling the user's state from the O/S and the PC hardware simplifies many desktop management functions reducing the TCO.
Next Steps
O g n s t o s o k n t l w r h d s t p C o i p o e e k o f e i i i y y d p i g D , o s m o h r h n e k o a p o c , s o l f r t r n f r t e r x s i g e k o i a e n o s a e e s r h t c u e y:
-
- Assessing the use of the technologies described above in the existing desktop deployment to determine the organisations readiness to deploy these technologies and evaluating the current state of the desktop environment.
- Estimating the TCO or flexibility benefits from decoupling the user's data, profile and applications from the desktop image.
- Creating a plan that breaks the transformation into the stateless desktop image into several smaller, incremental projects, with each delivering measurable benefits.
- Once the transformation to a stateless architecture is complete, assess which desktop use cases, if any, will benefit by using a thin desktop deployment method and then define a business case for transforming those desktops to a thin desktop architecture.
Conclusion: h l v r u l e k o s r o e f h h t e t n r s r c u e o i s f 0 8, i p y i t a i i g t p c l e k o e v r n e t n m g a i g h t o h d t c n r w l p o e o e v r c s l m s a e. n t a o g n s t o s h u d o k e o d h v r u l e k o h p a d o u o i p e e t n a t t l s d s t p r h t c u e h t n r a e d s t p g l t a d o e s h t t l o t f w e s i . O c a o t d h s a e e s e k o i a e a b u e w t a y y e f e k o d p o m n m t o , i , f l d s t p, i t a d s t p r e m n l e v c s, n i t e o n a i n o r d c n d s t p o t n i c e s n d s t p l x b l t .
Dr Kevin McIsaac i t e B S d i o f r i t a i a i n, e k o d p o m n , m b l d v c s & e w r s, e v r & s o a e n d t c n r i f a t u t r .
sponsored links
sponsored links

multimedia
You need Adobe Flash plugin version 8 or
higher to view the videos on this site.