The Managed Desktop Factory: Sun™ Virtual Desktop Infrastructure Software As A Service
The Managed Desktop Factory: Sun™ Virtual Desktop Infrastructure Software As A Service
The Managed Desktop Factory: Sun™ Virtual Desktop Infrastructure Software As A Service
Michael Rosenthal
Stefan Schmitz-Homberg
Part No 820-5065-10
Revision 1.0, 5/13/08
Sun Microsystems, Inc.
Table of Contents
Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Sun™ Virtual Desktop Infrastructure Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
The Managed Desktop Factory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Appendix A. Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
1 Introduction Sun Microsystems, Inc.
Chapter 1
Introduction
Sun Virtual Desktop Infrastructure Software shifts compute power and disk space, as
well as operational workloads and skills, from distributed office environments into the
datacenter. As a result, most technical and administrative tasks take place in the
datacenter, with logistical work (parts replacement) remaining in user offices. This
paradigm shifting approach fosters improved service quality, greater flexibility, and
more security at a significantly lower cost per user. The business case for this approach
is evident and impressive.
This Sun BluePrints™ article suggests an operational model for a desktop environment
that is based on the Sun Virtual Desktop Infrastructure Software. Using ITIL as a
foundation, the concept presented illustrates opportunities for optimizing operations
and describe the next steps toward industrializing IT services—the managed desktop
factory.
3 Introduction Sun Microsystems, Inc.
Chapter 2
An Overview of the Sun Virtual Desktop
Infrastructure Software
This chapter discusses the motivations and market characteristics that are driving
desktop virtualization, and provides an overview of the Sun Virtual Desktop
Infrastructure Software architecture.
“It’s a completely different trend. • Security—As more companies take advantage of the Internet and networked
While server virtualization is about environments, and more laptops connect to corporate local area networks (LANs),
saving money and consolidation, on security concerns rise. In addition, employees that work from home often connect
the desktop it’s much more about to corporate networks with virtual private network (VPN) connections that give
isolation, about being able to do stay at home workers full network access to corporate intranets. While IT
different things on the same organizations can set security policies and install virus scanners for remote
machine.” systems, enforcing their use is often difficult.
Quote by Tom Bittman, a vice president • Management—Desktop PC environments are filled with multiple generations of
and distinguished analyst at Gartner, Inc.,
from “Moving beyond server virtualization”, operating systems and many applications. Keeping administrative efforts in the
Network World, January 9, 2006, realm of operating staff, and strictly limiting user rights in desktop environments,
http://networkworld.com/news/2006/
010906-virtualization.html is the primary way to keep management efforts under control. Doing so is difficult
when users have physical access to systems and are granted rights to handle self-
support in an effort to lower maintenance costs. Desktop virtualization makes it
possible to reduce the dependence on specific hardware and operating system
configurations and to gain the possibility of centralized manageability. The workplace
can be used for different user roles, such as power users or knowledge workers. With
virtualization techniques, it is relatively easy to provide different environments for
different roles.
• Cost—Companies look for ways to spend the least amount of money possible
while still fulfilling business demands—they also try to use available budget to
create as much business value as possible. In this context, business value not only
means value that can be measured in monetary terms, but also flexibility,
usability, functionality, and agility, as well as the technical values of availability,
reliability, performance, and security.
1.Desktop Virtualization Is The Future Of The Corporate PC, David Friedlander and Simon Yates,
Forrester Research, January 5, 2006, http://www.sun.com/software/vmware/forrester_rr.pdf
5 An Overview of the Sun Virtual Desktop Infrastructure Software Sun Microsystems, Inc.
Market Evaluation
Companies strive to deliver desktop workplaces to employees that are fast, secure, and
personalized with the applications needed to perform work. Traditional fat client
desktops, consisting of a personal computer running an operating system and locally
hosted applications, have several disadvantages:
• Complex client management
• Security only as good as the weakest client system
• One inflexible, dedicated PC assigned to each dedicated worker
...
...
...
...
...
...
...
...
Figure 2-1. In a traditional fat client architecture, each desktop runs its own
copies of environments and applications, increasing management complexity as
the number of systems grows
Centralization
In a centralized environment, distributed operating systems and applications move into
the datacenter. Typically, datacenter-class servers are used to host applications and
services, with thin clients residing at the desktop for user access. Because datacenter
hardware tends to be more expensive than traditional PC desktops, organizations must
often find ways to finance the move to a centralized approach.
Isolation
Isolation techniques move an application into a dedicated environment with clear
control points for transferring data. Such an approach offers improved security and
reduced complexity than typical deployment architectures. Security checks and security
policy enforcement are easier to perform in an isolated and controlled environment in
6 An Overview of the Sun Virtual Desktop Infrastructure Software Sun Microsystems, Inc.
which all systems run the same desktop and applications. Because only the dedicated
environment must be checked and maintained in the event of changes or incidents,
management complexity is reduced.
Virtualization
1. The Rise Of The Virtual Machine And The Virtualization is defined in many ways. The Rise of the Virtual Machine and the Real
Real Impact It Will Have , Tim Klasell, Impact It Will Have defines virtualization as “a loose definition that applies to
Jeffrey Peck, Thomas Weisel Partners.
technologies that allow software applications to view computing resources, typically
server hardware or storage systems, as either many smaller units (partitioning) or
multiple units grouped together to appear as one larger system (clustering).
Virtualization essentially allows software to decouple from the physical hardware. The
end result is that IT departments are able to optimize their operations by flexibly
adding, subtracting, mixing, and matching hardware and software resources to
enhance efficiency and reliability.”1
2, 3. Desktop Virtualization is the Future of Building on that general definition, Forrester Research defines desktop virtualization as
the Corporate PC, David Friedlander and “a PC environment where some or all components of the system, including operating
Simon Yates, Forrester Research, January 5,
systems and applications, execute in a protected environment, isolated from the
2006, http://www.sun.com/software/
vmware/forrester_rr.pdf. underlying hardware and software platform. The virtualization layer controls
interactions between the virtual environment and the rest of the system.”2
Sun Virtual Desktop Infrastructure Software consists of the Sun Ray Software and the
Sun Secure Global Desktop Software for providing access to virtualized desktops via
ultra-thin Sun Ray devices, PCs, or other client devices running a Java™ technology-
based browser (Figure 2-2).
user session management. Fully stateless connectivity to Sun Ray clients means users
can move from one device to another and resume a desktop session—instantly picking
up where right they left off.
Users connect to the system via the access layer using a device connected to the
Internet. Sun Virtual Desktop Infrastructure Connector software associates all users
directly to the assigned (static or dynamic) virtual machines. If users move to a new
location or switch to a Sun Ray client from a Web browser, the same assigned virtual
machines can be accessed.
9 An Overview of the Sun Virtual Desktop Infrastructure Software Sun Microsystems, Inc.
SVDC Agent
Virtualization Layer
VMware Virtual Center
Figure 2-3. Sun Virtual Desktop Connector gives users access to Microsoft Windows
desktop environments that are running in virtual machines
• Ultra-thin clients
Sun Ray 2 Virtual Display Clients and Sun Ray 270 Virtual Display Clients with an
integrated display provide sophisticated desktop front-ends to users. A variety of
third-party products based on Sun technology, such as portable laptops with
wireless LAN (WLAN) technology, can be used to handle different user
requirements.
VDA Kit
Operating
VMware Hypervisor System
Hardware
Network
Desktop
Ultra Thin
Client
Figure 2-4. Sun Virtual Desktop Infrastructure Software building block architecture
Application Migration
When enterprises use a server-based computing model, all users access a single
instance of an application. To make this work, the application must be able to handle
multiple users. Because some applications do not offer multiuser support,
organizations must test applications with load conditions that simulate expected
workloads. These issues are eliminated when Sun Virtual Desktop Infrastructure
Software is deployed. In the Sun environment, a dedicated operating system instance is
available to each user. Dedicated application instances run on these operating system
11 An Overview of the Sun Virtual Desktop Infrastructure Software Sun Microsystems, Inc.
Client Migration
When deploying Sun Virtual Desktop Infrastructure Software, enterprises can replace
fat clients with Sun Ray clients to reduce maintenance and operational costs. Sun Ray
clients are stateless devices that require little or no administration, and typically
consume only 4 Watts of electricity when operating—approximately five percent of the
power consumed by a typical PC system.
Enterprises with existing installations of fat clients can utilize Sun Secure Global
Desktop Software to give these clients access to applications and services. The software
delivers a graphical session from a UNIX or Microsoft Windows server to local fat clients
over the network. As a result, PCs can be used until a failure or end of lease term
occurs, and replaced with a thin client. Best practices suggest developing a standard,
restricted operating system installation for recycled PCs. The operating system
installation must only run the Sun Secure Global Desktop Software client or a Web
browser. Other applications are not needed—all functionality is delivered to clients by
the software over the network.
12 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Chapter 3
Operating a Managed Desktop Factory
This chapter describes the work to be done to operate a managed desktop factory.
Doing so is a major shift from traditional desktop management concepts, using new
technology and moving most operational tasks into the datacenter. While transitioning
to a managed desktop factory that uses ITIL best practices often requires an investment
in time and money, changes tend to occur infrequently once the architecture and
operational processes are put in place. In short, setting up a new production line is
complex. But once it is up and running, it continues to run and provide a state-of-the-
art way to build modern devices and services.
Note – User help desk and project office are not ITIL terms. These terms are used for brevity
and to provide a clear view of the different responsibilities of first and second level support.
Traditional ITIL deployments include a service that operates the desktop environment, and
another that operates the datacenter service. With a managed desktop factory, desktop
services are delivered by the datacenter. Because users can consume a great deal of support
time, giving users access to datacenter staff is not ideal. Establishing a first level of support
for user requests, such as a help desk, can mitigate cost and productivity concerns.
13 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Process Design
Few organizations have all ITIL processes implemented. In fact, many enterprises have
partially implemented process stacks in the field, with the focus on service operation
processes. While the full stack of ITIL processes—service design, service strategy,
service transition, and service operation—are important, this document highlights
release and capacity management efforts and related special tasks for managed
desktops.
Release Management
In a managed desktop environment, release management focuses on the release of
golden images and the virtualization software stack. A new release of a golden image
can include additional applications, new versions of applications, new or patched
versions of guest operating systems, security updates, and more. When a golden image
is changed, the working desktop environment for all users is changed automatically. As
a result, a release management policy is recommended to help ensure quality and
reduce the likelihood of problems. Expensive test systems are not required. A standard
desktop can be used, with special images assigned only to developers.
The virtualization stack includes the software needed to deploy running application
images to clients, such as VMware ESX, Sun Ray Software, and Sun Secure Global
Desktop Software. While new releases of the virtualization stack tend to be rare, test
environments must be in place to perform quality checks before deployment.
Capacity Management
System performance is key to user satisfaction, and capacity characteristics must be
watched in order to fulfill expectations. Performance analysis looks at how fast an
application runs, determines why it runs the way it does, and finds ways to improve
performance. In a managed desktop environment, the major factor affecting capacity is
the number of desktop workplaces to be supported.
More effort is needed to make a correlation between CW and the VMware software and
Sun Ray Software infrastructure. Application performance depends on several hardware
and software factors. Considering system and application views of performance can
help. System performance can be measured using system monitoring tools, such as Sun
Management Center, or Solaris Operating System tools, such as vmstat, mpstat, iostat,
lockstat, netstat, and sar, or third-party analysis tools. Application performance can be
measured using the VMware VirtualCenter tools supplied with the VMware software.
14 Operating a Managed Desktop Factory Sun Microsystems, Inc.
System management tools provide the ability to look at different scopes or areas of
interest, including:
• Host operating system—Because the solution presented in this document is built
on Sun servers running the Solaris Operating System, Sun Management Center is
a preferred tool for performing in-depth monitoring and management of
enterprise servers and operating systems.
• Guest operating systems—Selecting the right tool for monitoring and managing
guest operating systems depends on the environment in use. Enterprises running
Linux or the Solaris Operating System can use Sun Management Center software.
Other tools must be used for Microsoft Windows environments. Leaving the guest
operating system unmanaged is not unrealistic, and can free staff and budget
resources. For example, monitoring all guest operating system instances requires
a license for the management tool for each workplace in use. Administrators must
parameterize agents and handle a large number of events. Since traditional
desktops typically are not managed, it is not unreasonable to leave guest
operating systems alone unless cost-effective solutions can be found.
• Virtualization software stack—In a managed desktop environment running the
Sun Virtual Desktop Infrastructure Software, it can be important to monitor the
VMware ESX, Sun Ray Software, and Oracle Database software. Sun Ray Software
and Oracle Database software monitoring can be performed using Sun
Management Center software. VMware ESX can be monitored using VMware
supplied tools.
15 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Table 3-1. Operational tasks for managed desktop factory building block components
The following sections discuss the tasks and estimated operational efforts for each
component. In many cases, the tasks do not differ from standard operation. Differences
that exist are highlighted. Key notes include:
• A fundamental difference from standard operation is that many components can
be regarded as largely static, including operating systems, storage area networks,
networks, and databases. As a result, fewer changes to these components are
likely to be required compared to a standard environment.
• Software patching is a significant proactive task.
• The number of reactive administration tasks depends on the quality of the
products in use and chosen maintenance service levels.
• A second level support function for incident isolation is recommended. Incident
isolation is intended to isolate the area of the managed desktop factory that is
causing the issue. A broad knowledge of the components and their interaction is
required.
16 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Asset Overview
Table 3-2 lists the assets that typically comprise the foundation of a managed desktop
factory.
x86 or x64 servers with AMD Run VMware ESX and VMware
Opteron™ or Intel® VirtualCenter software
processors
Servers
x86, x64, or SPARC® Run Sun Ray Software
processor-based servers
IP Networks
Network management consists of several tasks. Depending on the services included,
these tasks can be handled by users (user office network) or third-parties (network
service providers). All network components are standard network elements and are
considered static. Changes are necessary only when factory capacity is increased. Tasks
include:
• Monitoring and management of internal networks of the managed desktop factory
• Monitoring and management of the network to users and user offices
• Service management of the wide area network (WAN) service provider, if a WAN
connection to user offices is required
18 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Depending on the details of the implemented architecture, the SAN provides a number
of logical unit numbers (LUNs) that contain a directory for every user. Each directory
contains configuration files, a swap file, and a file for each user drive (C:) in use. Files
for users in each user profile type are expected to be similar.
• The static nature of the SAN means that monitoring tasks can be reduced to
checking for SNMP traps.
• Major reactive and proactive tasks consist of incident management, the initiation
and control of maintenance services, performance checks, redistribution of
images for optimal load balancing, and firmware updates.
Databases
VMware VirtualCenter software utilizes databases, such as Oracle Database, for
operation. Databases can be considered static. Because the database is critical for the
operation of the managed desktop factory, it is recommended that the database be
clustered at the database or operating system level. All database instances are identical
in terms of structure and administration. Typically, database administration is not
needed during standard operation, and standard database monitoring and
management concepts apply.
VMware ESX
VMware ESX is a software component that builds the virtualization layer, offers a
console operating system, and provides the platform for user operating system images.
One instance of VMware ESX is installed per machine, with all servers configured
identically.
• Monitoring is performed on two levels. Hardware monitoring is handled by an
SNMP agent in the VMware ESX environment. VMware ESX monitoring is achieved
using the VMware VirtualCenter software.
• Administration tasks consist of patching the VMware ESX software as needed. It is
recommended that patching be performed using scripts or patch management
tools.
19 Operating a Managed Desktop Factory Sun Microsystems, Inc.
The VMware VirtualCenter software runs on the Microsoft Windows 2003 Server
environment. It can be helpful to run the Microsoft Windows operating system instance
on a VMware ESX server. Doing so enables VMware VirtualCenter software to be
restarted easily on a spare machine, and lets more Solaris Operating System or
Microsoft Windows administration servers run on one physical server. In addition to
standard VMware software installation processes, the Sun Virtual Desktop Connector
component of the Sun Virtual Desktop Infrastructure software must be configured for
interaction with Sun Ray Software.
The Sun Secure Global Desktop software employs the same back-end infrastructure as
the Sun Ray Software, and requires similar monitoring and management tasks.
• Monitoring of UNIX processes, but not user sessions
• Application clustering
• No user management required
• Near static environment once the implementation phase is complete
21 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Impact of Failures
Table 3-3 provides an overview of the impact of failures on managed desktop factory
components. Information in the table can aid discussions regarding reaction times for
service contracts and administrators, and hardware architecture. Because Sun Virtual
Desktop Infrastructure Software is a datacenter-class application, companies can use
established techniques, including clustering, separate fire compartments, and Solaris
JumpStart™ software, to build a robust environment without a single point of failure.
IP Switch • Used for user sessions and administration • Solution 1: Keep a cold standby/spare part for every rack for manual
access replacement; inexpensive solution with nontrivial downtime
• If a switch fails, users cannot work • Solution 2: Maintain a redundant network; more expensive solution
• Remote administration no longer possible with less downtime
DHCP Server, • Failure leads to a complete blackout • Operate DHCP and DNS in failsafe mode
DNS Server • Does not add to administration efforts
SAN Switch • User workplaces that use the disks fail • Solution 1: Keep a cold standby as suggested for IP switches
• Solution 2: Define privileged users; manually shift users and restart on
remaining SAN components
• Solution 3: Use redundant switches
SAN Disk • Impact depends on RAID level in use • Use an appropriate RAID level on storage devices
• Suitable RAID levels result in no impact
Full SAN System • Sessions abort • Solution 1: Implement appropriate backup and restore functions
• Unsaved data is lost • Solution 2: Deploy a redundant SAN
Database • System states freeze • Solution 1: Cluster at the operating system level
• Existing sessions work • Solution 2: Cluster at the database level (recommended)
• New sessions cannot be initiated • Proper cluster function mitigates the impact of failures
Sun Ray • Sessions abort • Use provided Sun Ray application clustering
Software • Microsoft Windows instances remain active • No extra effort necessary
but are eventually disconnected
• After a short while, users get a new login
screen from another Sun Ray server within
the same availability group
VMware ESX • Failure of one VMware ESX server results in • Behavior is typically acceptable
session termination and display of a blue • VMware VirtualCenter software controls VMware ESX servers and the
screen for users on the system virtual machines
• When restarted, fsck is run • If a server fails, the virtual machines are restarted automatically on a
• Unsaved data is lost remaining VMware ESX server (if configured)
VMware • System states freeze • It is recommended to run VMware VirtualCenter software in a private
VirtualCenter • Existing sessions work VMware ESX server environment
Software • New sessions cannot be initiated • Restart of VMware VirtualCenter software on a different machine is
easy
• Failures typically are not noticed by all users
• Existing sessions are not affected
• It is recommended to have at least one hot standby machine per rack
• Alternatively, use Microsoft Windows clustering
22 Operating a Managed Desktop Factory Sun Microsystems, Inc.
Because these two domains are so different, the logical conclusion is to have different
IT teams handle them. Internal teams or outsourced services, like SunSM Managed
Services, can be employed. It is recommended to build an organizational structure that
includes a user help desk for first level user support, and a service desk for second level
support for Sun Virtual Desktop Infrastructure Software operations.
Several jobs and services are required for managing the user space in both domains.
Because the Sun Virtual Desktop Infrastructure Software domain provides indirect
services, it is recommended that users not be able to make requests of the service
desk and use the help desk instead.
Potential tasks and services for managing the user space in the Sun Virtual Desktop
Infrastructure Software domain include backup, data restoration, and the restoration of
a personalized image from a golden image. Potential tasks and services for managing
the user space in the image domain include:
• Handling of service requests and the user help desk
• User and identity management
• Application support
• Image creation and maintenance
clean state and is returned to an available pool. The key is for administrators to create
user roles based on duties performed, and map these roles to pools of dynamic or static
images. Doing so provides a flexible way to supply user environments with different
configurations to various job functions within the enterprise. Because thin clients are
stateless, users can move from place to place, or role to role, and automatically and
transparently access an adjusted desktop. More information on this topic can be found
in the Sun Virtual Desktop Access Kit for VMware Sun BluePrints article located at
http://sun.com/blueprints/0307/820-1325.html
Chapter 4
The Managed Desktop Factory as a Service
This chapter focuses on how a managed desktop factory can be operated from a
business perspective. When looking at the parameters to be considered, it is clear that
one size does not fit all. However, creating the right solution for a specific set of needs
is not complex—and operating a managed desktop factory and establishing a business
model is not more difficult than older approaches. In the end, complexity can be
condensed into a clear and easy to understand pricing model.
Service Management
1. See http://en.wikipedia.org/wiki/ Wikipedia defines IT Service Management (ITSM) as “a discipline for managing
IT_Service Management information technology (IT) systems, philosophically centered on the customer’s
2. See http://www.ogc.gov.uk/ perspective of IT’s contribution to the business. ITSM stands in deliberate contrast to
delivery_lifecycle_co-
technology-centered approaches to IT management and business interaction1.
ordinating_service_management.asp
Similarly, the OGC states that “Service management aims to achieve common
understanding between the customer and provider through managing service level
expectations and delivering and supporting desired results.”2
The idea is to abstract technology, software, and assets and take the viewpoint of
customers. Organizations wonder what delivers IT, and the value of IT to their
enterprise. The benefit for IT providers that use this technique is improved
communications with customers. In addition, a service view supports different pricing
models, such as pay for resources, pay for service usage, and more. The following
sections examine the ITSM concepts relevant to managed desktop environments.
Service Catalog
The Service catalog lists the services provided to customers. Each service listed in the
catalog includes at least a service description, a service-level agreement, and
associated costs. A properly conceived and constructed service catalog is paramount to
ITSM success. It must be aligned with business priorities and customer expectations.
Several best practices can be used to create an effective service catalog for managed
desktop environments.
• Find the right granularity of service.
• Consider user profiles and cost. While all inclusive services sounds like a smart
idea, and look simple to implement, service details often are overlooked. Different
user profiles, such as sales, developers, and call center agents, require access to
different resources, service levels, and resolution time frames in order to be
effective. For example, sales staff often require printers as standard equipment,
while call center agents can work without them. Organizations must decide if a
single printer service, including hardware, device drivers, toner, paper, technical
support, and incident resolution is required, or if customized printer services are
26 The Managed Desktop Factory as a Service Sun Microsystems, Inc.
Table 4-1. Suggested Key Performance Indicators for a managed desktop environment
KPI Description
%AVA Service availability
#CW Number of concurrent workplaces in use (average)
#TW Total number of workplaces
%HDU Hard disk space used by an image (average)
#TTR Time to repair a failed component (in minutes)
#CUHD Total number of user help desk calls
#CSD Total number of service desk calls
#RT Resolution time (average)
Service-Level Agreements
A service-level agreement (SLA) formally defines the level of service provided. It is an
agreement between the consumer and the provider of a service. It records the common
understanding about the level of service to be achieved, such as priorities,
responsibilities, guaranteed values, coverage times, availability, and more. It is
recommended that each SLA specify a metric for measuring fulfillment, and that the
27 The Managed Desktop Factory as a Service Sun Microsystems, Inc.
metric consist of one or more KPIs. With SLAs, organizations can turn to reports and
determine quality of service rather than relying on subjective evaluations.
Disk Space Service—Assigns disk space to a personalized image for arbitrary use
Thin Client Replacement and Provisioning Service—Provides break and fix services for
thin client devices
Managed desktop factories can be used by a wide range of companies, including those
that want to:
• Offer standardized desktop environments to other companies (business-to-business)
• Provide standardized desktop environments to end users (business-to-enterprise)
• Find a replacement for office IT and build a managed desktop factory
Major Advantages
A managed desktop factory provides several advantages to users that make business
justification straightforward, including:
• Significant cost savings in terms of people, energy consumption, software licenses,
and more
• Ability to simply use technology without understanding the underlying details
• An easy to use environment that eliminates the need for IT experts in the office
• Flexibility that lets users access systems and services from any location with WAN
access, and focus on individual job functions and core competencies
• Security measures, including central datacenter storage, ID cards, and more
• Ability to share high quality components with other users
• Easy maintenance and simple replacement of Sun Ray client devices
• Improved service quality and datacenter service levels
• Comfort and compatibility of a native Microsoft Windows environment
29 The Managed Desktop Factory as a Service Sun Microsystems, Inc.
Table 4-3. Major cost factors for creating a managed desktop environment
In addition, provisioning and maintaining golden images with user management, user
help desk functions, and the management of applications, licenses, and services create
further one-time and ongoing costs. If particular security mechanisms must be
established for the factory, additional setup, asset, and operational costs are to be
expected.
30 The Managed Desktop Factory as a Service Sun Microsystems, Inc.
Numerous options can be part of a managed desktop service, and each contributes to
cost calculations.
• Provisioning of printers, scanners, and special devices
• Web services, such as mail, calendar, and instant messaging
• Identity and user management
The amount and type of professional and project-based services that are needed
depend on how the factory is used and how often changes and enhancements are
implemented. Work effort and costs must be calculated separately for these tasks.
• Addition or replacement of systems
• Changes to the basic configuration
• Major updates to the operating system or services
• Movement of systems
• Disaster recovery (server restarts and standard maintenance services must be
included in everyday tasks)
• Changes to user profiles (Sun Ray clients)
Chapter 5
For More Information
Michael Rosenthal is Global Product Manager for Sun Managed Services. He works on
the ongoing development of new and in-market Sun Managed Services offerings, such
as Remote Management, Interim Operations Management, and Utility Computing.
Prior to this role, Michael worked as Solution Architect for Sun Managed Services in
Germany. He holds a masters degree in computer science from the University of
Hamburg and the University of Erlangen, and is an ITIL certified Service Manager.
Acknowledgements
The authors would like to recognize the following individuals for their contributions to
this article:
• Dirk Grobler
• Birgit Kreuz
• Jorgen Skogstad
• Rolf-Per Thulin
References
Sun Desktop Infrastructure:
http://sun.com/software/sdis
Grobler, Dirk and Warren Ponder. “Sun Virtual Desktop Access Kit for VMware,” Sun
BluePrints OnLine, March 2007. To access this article online, go to
http://sun.com/blueprints/0307/820-1325.html
Ponder, Warren. “Sun Desktop Virtualization Solution,” White Paper, April 2006.
http://sun.com/software/sdis/wp_desktop_virtualization_
blueprint.pdf
Related References
“Co-ordinating service management”, Office of Government Commerce (OCG),
http://www.ogc.gov.uk/delivery_lifecycle_co-ordinating_service_
management.asp
Friedlander, David and Simon Yates. “Desktop Virtualization Is The Future Of The
Corporate PC,” January 2006.
http://sun.com/software/vmware/forrester_rr.pdf
Klasell, Tim and Jeffrey Peck. “The Rise Of The Virtual Machine And The Real Impact It
Will Have,” Thomas Weisel Partners, February 2006.
http://sun.com/software/vmware/twp_wp.pdf
“Solaris Performance Monitoring & Tuning - iostat , vmstat & netstat,” Admin’s Choice,
http://www.adminschoice.com/docs/iostat_vmstat_netstat.html
To reference Sun BluePrints articles, visit the Sun BluePrints Program Web site at:
http://www.sun.com/blueprints/online.html
34 Glossary Sun Microsystems, Inc.
Appendix A
Glossary
Availability
A measure of the total time that data, applications, and services are available from a system.
Cluster
Two or more interconnected systems or domains that share a cluster file system and are
configured together to run failover, parallel, or scalable services.
DAS
Direct attached storage.
DHCP
Dynamic Host Configuration Protocol.
DNS
Domain Name Service.
Internet Protocol
A set of protocols developed by the United States Department of Defense to communicate
between dissimilar computers across networks.
IP
Internet Protocol.
IT
Information technology.
ITIL
Information Technology Infrastructure Library.
ITSM
Information Technology Service Management.
KPIs
Key performance indicators.
LAN
Local Area Network.
35 Glossary Sun Microsystems, Inc.
LDAP
Lightweight Directory Access Protocol.
Load balancing
The process of distributing application service loads across systems to increase performance.
MTBF
Mean time between failure.
NAS
Network attached storage.
RAID
Redundant array of independent (or inexpensive) disks. A technique for aggregating a set of
disk drives and making them appear to be a single logical disk drive to an application. Different
RAID levels provide different capacity, performance, availability, and cost characteristics.
RAID-5
RAID level 5, or striping with distributed parity. Both data and parity are distributed across
disks. No single disk can compromise the integrity of the data. RAID-5 optimizes performance,
reliability, and cost.
SAN
Storage area network.
Service-level agreement
A guarantee of the service level provided by a computing environment to a user or set of users.
SLA
Service-level agreement.
SNMP
Simple Network Management Protocol.
SPOF
Single point of failure.
devices, and uniform services can be received from a fixed office at the enterprise, or any
location around the globe that is accessible to the Internet or telephone network.
Switch
A networking device that isolates network traffic to the segments and devices for which the
traffic is intended.
VDI
Virtual Desktop Infrastructure.
VPN
Virtual private network.
WAN
Wide area network.
WLAN
Wireless LAN, or wireless local area network.
The Managed Desktop Factory On the Web sun.com
Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 USA Phone 1-650-960-1300 or 1-800-555-9SUN (9786) Web sun.com
© 2008 Sun Microsystems, Inc. All rights reserved. Sun, Sun Microsystems, the Sun logo, Java, Solaris, Solaris JumpStart, Sun BluePrints, Sun Fire, Sun Ray, and SunDocs, are trademarks or registered trademarks of
Sun Microsystems, Inc. in the United States and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the US and other countries.
Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. AMD and Opteron are trademarks or registered trademarks of Advanced Micro Devices. Intel is a trademark
or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open
Company, Ltd. Information subject to change without notice. Printed in USA 05/08