Prepping the network for VDI

FRAMINGHAM — From the cloud to the new wireless edge, conversations in the IT department are revolving around what the network will do next. One technology that has managed to escape much of the spotlight — while still transforming IT — is Virtual Desktop Infrastructure (VDI).

Although virtualization may have started out as a technology driven by server consolidation, today’s evolving network takes virtualization well beyond servers to a means of centralizing IT itself. The evolution starts with desktop PCs and the new class of wireless computing devices proliferating throughout the enterprise, including smartphones and tablet PCs.

2012 OUTLOOK: Virtual desktops are all the rage
VDI is disruptive in that it has the potential to become the new computing norm, and is cropping up in progressive IT departments at colleges, law firms and retail establishments. The business and technical efficiencies involved with VDI are relatively simple and straightforward in exchange for the significant improvements VDI can deliver to network manageability, security and energy efficiency.
According to a June 2011 study from ABI Research, the worldwide market for hosted virtual desktops is expected to grow to nearly $5 billion in 2016. Large enterprises are drawn to VDI because of its ability to reduce desktop support and management costs, as well as the lower overall energy requirements of virtual desktops. VDI also offers business continuity and disaster recovery benefits as well as a means to secure data in the data center, which is paramount when meeting compliance and security regulations.
Before an enterprise undertakes the transformation to VDI, data center managers must understand the impact it may have on the network from a performance standpoint, while maintaining key criteria such as cost savings, delivery of multiple converged services, and power efficiency.
While VDI is partially driven by using lighter-weight devices such as smartphones and tablet devices (rather than bulky desktops), the network plays a key role in further reducing energy consumption through the centralization of resources and by bringing much higher speeds at the port level. So, instead of deploying multiple tiers and distributed Gigabit Ethernet LANs, suddenly the horsepower is consolidated into a single core layer providing the bandwidth necessary for all VDI connections. This allows much higher-density 10 Gigabit Ethernet port modules on chassis type switches to easily collapse all traffic into just a few network switches. In the end, VDI is highly efficient, more powerful and easier for IT to manage.Once considerations for bandwidth and system centralization have been addressed, the issue of carrying converged media (mixed voice, video and data) comes to the fore.

The network not only has to be equipped with 10 Gigabit and Gigabit to the edge, it also needs the intelligence, quality of service (QoS) and ultra-low latency switching to seamlessly deliver voice and video traffic to users based on predetermined priorities. Just like traditional networks, the VDI network backbone still must handle convergence flawlessly so all users have a consistent, predictable experience. Critical activities such as IP phone calls and collaboration, e-learning activities using IP video, customer call centers, to name but a few, all depend on the network for a seamless, quality experience.
How does the network support security of VDI deployments?

With the VDI network, traditional operating systems are eliminated, yet user log on, secure policies, visibility and monitoring are required more than ever. Security for yesterday’s network meant complex “application layer” elements of sign-on security such as LDAP directories, strong authentication, and single sign-on (SSO) systems. But with the emergence of VDI, today’s security, namely network identity, is more simplified, centralized and driven by the network rather than the PC OS.

Policy and identity management are important network security considerations since users can connect to the data center from any location using a variety of devices. The access management and lack of identity features with old networks won’t be up to par.More and more secure government facilities are using advanced identity management over VDI, setting the table for similar deployments in the private sector with large mobile workforces. To this end, today’s businesses looking to deploy VDI securely require a new model called identity-aware networking. Enterprise Strategy Group defines this as: “A policy-based network architecture that understands and acts upon the identity and location of users and devices.”

Identity-aware networking is an integration effort where the network gathers information from multiple existing sources then enables IT managers to use this data to build and enforce access policies. The best of breed network has the intelligence to dynamically collect and update information about users, devices, and location as the users connect to the VDI infrastructure and just as importantly, enforce policies once they are on the network. The business, regulatory compliance, and security ROI benefits available with the identity-aware network become the new norm, carrying the burden away from those that had to maintain application-layer security.

Network-based identity for VDI is associated with things like IP and MAC addresses, VLAN tags and subnets which play a role in device authentication, VPNs and IPSEC. With VDI, network layer security takes over. It is based on a number of inputs, including the user-id and role of the user, specific device characteristics and capabilities, and user/device location. Identity-aware networking wants to know if the user is logging on from a trusted or untrusted network, or whether a user is accessing the network from a wired port or over Wi-Fi. Furthermore, network access policies may need to change from one location within a facility to the next.

With most deployments, the IT department will strive to meet the needs of varying mobile users and disparate devices. At the network level, more granular network access policies based upon user roles, device types, and physical locations are required. The network then has to scale bandwidth, handle converged communications appropriately and bring network layer security policy that is not tied to any single device or application.

Ultimately, the requirements of VDI demand an identity approach and a more aware network. Only when data center managers closely examine the network’s role in meeting key criteria such as cost savings, power efficiency, user and device identity, and ease-of-use can VDI truly progress towards becoming a new norm in computing.
(From Network World)

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Empowering the hybrid workforce: how technology can build a better employee experience

Across the country, employees from organizations of all sizes expect flexibility...

What’s behind the best customer experience: How to make it real for your business

The best customer experience – the kind that builds businesses and...

Overcoming the obstacles to optimized operations

Network-driven optimization is a top priority for many Canadian business leaders...

Thriving amid Canada’s tech talent shortage

With today’s tight labour market, rising customer demands, fast-evolving cyber threats...

Staying protected and compliant in an evolving IT landscape

Canadian businesses have changed remarkably and quickly over the last few...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now