Welcome!

Microservices Expo Authors: Pat Romanski, Liz McMillan, Mamoon Yunus, Stackify Blog, Elizabeth White

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, Microsoft Cloud, Open Source Cloud, @CloudExpo

Containers Expo Blog: Article

VDI: Balancing the Efficiencies and Challenges of the New Network

The factors enterprise IT departments must consider when evaluating if and when to bring on a VDI solution

Enterprise IT has experienced a rapid evolution over the past few years. Cloud has revolutionized storage and brought with it a host of new and emerging information security challenges. Consumer adoption of mobile technology has forced enterprise networks to operate in a multi-platform environment in which the technology is largely selected, procured, and controlled without the advice or consent of IT. Of the many lessons learned in recent years, perhaps the most crucial is that IT must take a proactive approach to adopting emerging technologies, rather than being forced to react to and mitigate the inevitable fire drills. Of the transformative technologies now gaining traction in the enterprise, Virtual Desktop Infrastructure (VDI) has stayed relatively under the radar, but is nonetheless poised to play an integral role in the ongoing IT evolution. This article will discuss the benefits of integrating VDI into the new data center, and the factors enterprise IT departments must consider when evaluating if and when to bring on a VDI solution.

While the origins of virtualization reside in the drive for server consolidation, VDI is fast becoming a staple in the new data center. Today's evolving network takes virtualization well beyond servers to a means of centralizing IT, beginning with desktop PCs and expanding to encompass the wireless computing devices proliferating throughout the enterprise, including smartphones and tablets. The expansive adoption is evident in the numbers. According to a report published in September 2012 by VisionGain titled "The Cloud-Based Virtual Desktop Infrastructure Market 2012-2017,"the VDI market was expected to grow to $11.2 billion by the end of 2012.

The advantages of VDI, particularly for large enterprises, are clear. For one, VDI solutions reduce desktop support and management costs by bringing a wide array of devices and operating systems into a single control solution. For another, they also enable energy saving and green initiatives by lower overall energy requirements of virtual desktops. Moreover, VDI offers business continuity and disaster recovery capabilities as well as a means to secure data in the data center, which is paramount when meeting compliance and security regulations.

Progressive IT departments at colleges, law firms and retail establishments have quickly caught on to the potential of VDI to radically streamline enterprise networking. The business and technical efficiencies involved with VDI are relatively simple and straightforward in exchange for the significant improvements VDI can deliver to network manageability, security and energy efficiency.

Before an enterprise undertakes the transformation to VDI, however, data center managers must understand the potential network impact from a performance standpoint, while maintaining key criteria such as cost savings, delivery of multiple converged services, and power efficiency.

VDI Deployments and Network Security
Network security is of paramount importance in today's business environment, and the emergence of VDI in the network has enhanced today's security, namely network identity, by simplifying, centralizing and driving security within the network rather than the PC OS. Security for yesterday's network meant complex "application layer" elements of sign-on security such as LDAP directories, strong authentication, and Single Sign-On (SSO) systems. With the VDI network, traditional operating systems are eliminated, but IT must still require and implement user log on, secure policies, visibility and monitoring in order to ensure security across the network.

The Energy Efficient Network
The amount of energy consumed by data centers is enormous, and growing in tandem with the burgeoning amounts of electronic data being created and stored by enterprises the world over. At the same time, enterprises are increasingly called to task to demonstrate their Corporate Social Responsibility (CSR), one aspect of which is reducing their carbon footprint. The efficiency of the networking equipment deployed therefore directly impacts a data center's ‘green' credentials. As energy costs rise and CSR gains public and government mindshare, reducing energy consumption has become a focal point for many enterprises, and VDI plays an integral role in this process. By centralizing resources and bringing in much higher speeds at the port level, VDI significantly improves the energy efficiency of the network. Rather than deploying multiple tiers and distributed Gigabit Ethernet LANs, suddenly the horsepower is consolidated into a single core layer providing the bandwidth necessary for all VDI connections. This allows much higher density 10 Gigabit Ethernet port modules on chassis type switches to easily collapse all traffic into just a few network switches. VDI implementations also contribute to energy savings at the device level. By enabling IT to easily manage smartphones and tablets operating on multiple platforms, energy-gobbling desktops can be replaced with these smaller, more energy efficient mobile devices. In the end, VDI is highly efficient, more powerful and easier for IT to manage.

Converging Voice and Video for VDI Deployments
Once the considerations for bandwidth and system centralization have been addressed, the issue of carrying converged media (mixed voice, video and data) comes to the fore. Just like traditional networks, the VDI network backbone still must handle convergence flawlessly so that all users have a consistent, predictable experience. Critical activities such as IP phone calls and collaboration, e-learning activities using IP video, customer call centers, to name but a few, all depend on the network for a seamless, quality experience, and when implementing a VDI solution, IT must ensure that this remains and priority. In order to ensure this consistency and predictability, the network has to not only be equipped with 10 Gigabit and Gigabit to the edge, it also needs the intelligence, Quality of Service (QoS) and ultra-low latency switching, to seamlessly deliver voice and video traffic to users based on predetermined priorities.

Maintaining and Enhancing Security for Enterprise VDI Deployments
As enterprise networks increasingly adopt virtualization technology, there is a growing demand on IT to successfully meet the networking challenges posed by a highly dynamic virtual environment. On the one hand, VDI is a superior tool enabling users to access the network via multiple mobile and computing devices operating on multiple platforms and operating systems. On the other, this diversified access creates an environment in which policy and identity management are paramount network security considerations since users can connect to the data center from any location using a variety of devices. Just as old networks were unable to handle the growing number of connecting devices, the access management and lack of identity features with old networks won't be up to par in the new virtual landscape.

Recognizing this security challenge, more and more secure government facilities are using advanced identity management to ensure compliance and security when using VDI, setting the stage for similar deployments in the private sector with large mobile workforces. Identity-aware networking, defined by Enterprise Strategy Group as "a policy-based network architecture that understands and acts upon the identity and location of users and devices," will be the solution du jour for private sector business looking to securely deploy VDI.

Identity-aware networking is an integration effort where the network gathers information from multiple existing sources then enables IT managers to use this data to build and enforce access policies. The best-of-breed network has the intelligence to dynamically collect and update information about users, devices, and location as the users connect to the VDI infrastructure and just as important, enforce policies once they are on the network. The business, regulatory compliance, and security ROI benefits available with the identity-aware network become the new norm, carrying the burden away from those that had to maintain application-layer security.

Network-based identity for VDI is associated with things like IP and MAC addresses, VLAN tags, and subnets that play a role in device authentication, VPNs, and IPSEC. With VDI, network layer security takes over. It is based on a number of inputs, including the user-id and role of the user, specific device characteristics and capabilities, and user/device location. Identity-aware networking wants to know if the user is logging on from a trusted or untrusted network, or whether a user is accessing the network from a wired port or over Wi-Fi. Furthermore, network access policies may need to change from one location within a facility to the next.

With most deployments, the IT department will strive to meet the needs of varying mobile users and disparate devices. At the network level, more granular network access policies based upon user roles, device types, and physical locations are required. The network then has to scale bandwidth, handle converged communications appropriately and bring network layer security policy that is not tied to any single device or application.

There are significant advantages to VDI, including a more centralized streamlined, and energy efficient network, but before implementing VDI, enterprise IT must ensure that the necessary protocols are in place to preserve network security in this new virtual environment. VDI demands an identity approach and a more aware network in order to satisfy security and compliance requirements. Only when data center managers closely examine the network's role in meeting key criteria such as cost savings, power efficiency, user and device identity, and ease-of-use can VDI truly progress towards becoming a new norm in computing.

More Stories By Sameer Mohile

Sameer Mohile is a senior software product manager at Extreme Networks where he leads the product direction and strategic planning for Data Center and Mobile Backhaul markets. He has over 12+ years of expertise in the networking and collaboration industry and is certified Agile Product Owner with deep experience leading cross-functional teams. Prior to his position at Extreme Networks, Sameer held positions as marketing product manager and technical marketing engineer at Cisco Systems. He holds a Masters in Computer Networking from North Carolina State University and an MBA with a specialization in product marketing from the University of North Carolina Kenan-Flagler Business School.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@MicroservicesExpo Stories
With Cloud Foundry you can easily deploy and use apps utilizing websocket technology, but not everybody realizes that scaling them out is not that trivial. In his session at 21st Cloud Expo, Roman Swoszowski, CTO and VP, Cloud Foundry Services, at Grape Up, will show you an example of how to deal with this issue. He will demonstrate a cloud-native Spring Boot app running in Cloud Foundry and communicating with clients over websocket protocol that can be easily scaled horizontally and coordinate...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
API Security has finally entered our security zeitgeist. OWASP Top 10 2017 - RC1 recognized API Security as a first class citizen by adding it as number 10, or A-10 on its list of web application vulnerabilities. We believe this is just the start. The attack surface area offered by API is orders or magnitude larger than any other attack surface area. Consider the fact the APIs expose cloud services, internal databases, application and even legacy mainframes over the internet. What could go wrong...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyer belt between the Software Factory and production stages. Artifacts are m...
Web services have taken the development world by storm, especially in recent years as they've become more and more widely adopted. There are naturally many reasons for this, but first, let's understand what exactly a web service is. The World Wide Web Consortium (W3C) defines "web of services" as "message-based design frequently found on the Web and in enterprise software". Basically, a web service is a method of sending a message between two devices through a network. In practical terms, this ...
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
We have already established the importance of APIs in today’s digital world (read about it here). With APIs playing such an important role in keeping us connected, it’s necessary to maintain the API’s performance as well as availability. There are multiple aspects to consider when monitoring APIs, from integration to performance issues, therefore a general monitoring strategy that only accounts for up-time is not ideal.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that’s no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, will explore how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He wi...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
These days, change is the only constant. In order to adapt and thrive in an ever-advancing and sometimes chaotic workforce, companies must leverage intelligent tools to streamline operations. While we're only at the dawn of machine intelligence, using a workflow manager will benefit your company in both the short and long term. Think: reduced errors, improved efficiency and more empowered employees-and that's just the start. Here are five other reasons workflow automation is leading a revolution...
As today's digital disruptions bounce and smash their way through conventional technologies and conventional wisdom alike, predicting their path is a multifaceted challenge. So many areas of technology advance on Moore's Law-like exponential curves that divining the future is fraught with danger. Such is the problem with artificial intelligence (AI), and its related concepts, including cognitive computing, machine learning, and deep learning.