Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Introduction of citrix5 Desktop Catalog

2025-01-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

First, pool computers:

Pool computers are allocated to user desktops on a first-come-first-served basis on a first-come-first-served basis. The pool random computer can be randomly assigned to the user each time the user logs in, and then returns to the pool when the user logs out (log off the virtual desktop computer). The computers in the returned pool can be connected by other users. Although ProfileManagement can be used to apply a user's personal configuration to their desktops and applications, pooled desktops are newly created through the main VM when the user logs in. Any changes that users make to their desktops are saved during the session, but are discarded when the user logs out.

Pool computers are divided into static and random. For pool static computers, you can also assign specific computers to users from the pool when they log in to XenDesktop for the first time. The user connects to the same computer in all subsequent sessions. In this way, users of pooled static computers can be associated with a specific VM address, which some applications require when licensing (note: the user's personal data is still not retained in the static pool). Maintaining a single primary VM in the data center can greatly reduce the time and effort required to update and upgrade user desktops.

Pool computer characteristics:

Optimize the use of hardware by providing only the required number of desktops at any time, rather than assigning specific desktops to each user

Improve security by keeping control of the desktop by preventing users from making permanent changes

Minimize desktop management costs by providing users with a locked and standardized environment

Applicable users:

Are task executors who need standardized desktops, such as call center operators and retail store employees

Use shared workstations, such as students and teachers in educational institutions

Applications are not required or allowed to be installed on their desktop

Second, special-purpose computers:

Dedicated computers provide desktops assigned to individual users. The computer can be manually or automatically assigned to the first user to establish a connection. Whenever users request desktops, they are always connected to the same computer so that users can personalize their desktops as needed. The dedicated desktop is created based on the primary VM when the user logs in for the first time, but all subsequent changes to the desktop are permanent. Like traditional local desktops, changes and updates are permanent and must be managed separately or uniformly using third-party electronic software distribution (ESD) tools. Changes made to the desktop are stored on differential disks that can be expanded as needed, so storage space is taken up only when needed.

Special computer features:

Standardize some aspects of user desktops through public templates

Deliver user desktops to any device, regardless of hardware capabilities

Reduce desktop management costs while providing users with a personalized desktop experience

Applicable users:

Standardize some aspects of user desktops through public templates

Deliver user desktops to any device, regardless of hardware capabilities

Reduce desktop management costs while providing users with a personalized desktop experience

Third, existing computers

Existing computer types allow you to use XenDesktop to manage and deliver user desktops (virtual machines that already exist in XenServer, VmwareESX, and MictrosoftHyper-V) that have been migrated to VM in the data center. Like traditional local desktops, changes and updates are permanent and must be managed separately or uniformly using third-party electronic software distribution (ESD) tools. You can better control the power status of existing VM-based desktops when managing existing VM-based desktops through XenDesktop; for example, XenDesktop can be configured to turn off VM when users log out to minimize unnecessary energy consumption in the data center. (XenDesktop can only manage existing computer types. Users who log on to existing computer type desktops must still log in in the same way, not through XenDesktop server web pages. )

Existing computer features:

Use XenDesktop to manage and deliver existing desktops hosted on VM within the data center

Deliver individually customized desktops for small but heterogeneous user groups

Reduce support costs by centrally managing user desktops in the data center without moving to virtual desktop solutions

Applicable users:

Already have a desktop hosted by VM

There are so many different and conflicting requirements for desktops that it is more efficient to prepare customized desktops for each user than to create generic templates that meet all user requirements

Need to install their own applications on their desktops

Fourth, physical computer

The physical computer type allows the use of XenDesktop to manage user desktops hosted on dedicated blade PC in the data center. Like traditional local desktops, changes and updates are permanent and must be managed separately or uniformly using third-party ESD tools. When using blade PC, you can support a small number of users who are particularly demanding on performance. This approach has all the advantages of centralization, but ensures that dedicated processing resources are provided for each user by hosting only one desktop per server.

Physical computer features:

Use XenDesktop to manage and deliver user environments that require dedicated hardware

Deploy dedicated hardware for advanced users so that they do not have to share server resources with other users

Reduce support costs by centrally managing complex professional systems in the data center

Applicable users:

Technical worker or super user

Use applications that consume a lot of processor resources, such as financial modeling software

High performance expectations for line-of-business applications

Fifth, stream computer

The streaming computer type allows desktops to be delivered to VM and blade PC configured to load the operating system over the network from ProvisioningServices. The target device is managed as a collection of devices in the ProvisioningServices and delivered to the desktop by the ProvisioningServicesvDisk that establishes the image from the master target device. When delivering desktops with ProvisioningServices, you can make full use of the processing power of existing hardware and realize all the advantages of centralized desktop management. This method makes use of existing resources and reduces the requirement of additional storage capacity in the data center, thus providing a starting point for the realization of desktop virtualization.

Stream computer features:

Hand in the desktop

Pay for a hybrid set of devices that contain different types of PC hardware

Maximize data security by delivering desktops to diskless target devices

Virtualize desktops with existing hardware without adding more storage devices in the data center

Applicable users:

Are task executors or knowledge workers who need standardized desktops or personal desktops with their own ownership

Use shared workstations, such as students and teachers in educational institutions

Use locked workgroups to access secure data, such as government employees

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report