• Title/Summary/Keyword: Virtual desktop infrastructure

Search Result 31, Processing Time 0.032 seconds

How to Implement Successful Virtual Desktop Infrastructure (VDI) in the Manufacturing Sector

  • KIM, Tae-Hi
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.10
    • /
    • pp.15-22
    • /
    • 2022
  • Purpose: In the manufacturing sector, VDI (Virtual Desktop Infrastructure) offers advantages to the organizations, such as allowing manufacturers access to the system from any location. The most important things are understanding what the user needs, avoiding under-provisioning, network preparation. This research is to provide useful practical l implementations of VDI in manufacturing industry based on numerous prior studies. Research design, data and methodology: This research has conducted the qualitative content analysis (QCA). When conducting this research, the present author assumed that it is crucial to create the procedures and processes that will be used to acquire the text data needed to structure or solve problems. Results: According to the prior literature analysis, there are five suggestions to implement successful VDI for manufacturing sector. The five solutions are (1) Creation of the machines, (2) Direct users to an available 'Virtual Machine', (3) 'Virtual Machine Power Management', (4) Performance monitoring, and (5) Review security. Conclusions: The research clearly details how VDI can be implemented on a manufacturer platform and how it can be connected to hundreds of users. The author can conclude that connecting hundreds of users can be done using the remote connection of devices and encourage manufacturers to work from different areas.

Design and Implementation of High Performance Virtual Desktop System Managing Virtual Desktop Image in Main Memory (메인 메모리상에 가상 데스크탑 이미지를 운용하는 고속 가상 데스크탑 시스템 설계 및 구현)

  • Oh, Soo-Cheol;Kim, SeungWoon
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.363-368
    • /
    • 2016
  • A storage-based VDI (Virtual Desktop Infrastructure) system has the disadvantage of degraded performance when IOs for the VDI system are concentrated on the storage. The performance of the VDI system decreases rapidly especially, in case of the boot storm wherein all virtual desktops boot simultaneously. In this paper, we propose a main memory-based virtual desktop system managing virtual desktop images on main memory to solve the performance degradation problem including the boot storm. Performance of the main memory-based VDI system is improved by storing the virtual desktop image on the main memory. Also, the virtual desktop images with large size can be stored in the main memory using deduplication technology. Implementation of the proposed VDI system indicated that it has 4 times performance benefit than the storage-based VDI system in case of the boot storm.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

Digital Contents Control for Desktop Virtualization: A Case of Virtual Folder Based Implementation (데스크톱 가상화에 따른 디지털콘텐츠 통제방안: 가상폴더방식의 구현사례)

  • Yoon, Han Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.1-9
    • /
    • 2014
  • Recently, with the enlargement of cloud computing, virtual desktop infrastructure(VDI) can be an alternative of the existing personal computer based information environment. For the case of partially introduced VDI coexisting with personal computer environment, we suggest a virtual folder based approach to control the overall digital contents within an organization with a case of implementation. Although a centralizing device was used for storage and sharing of organization's digital contents, it was not easy to accomplish centralizing digital contents completely. It is tried to prevent users from utilizing their own storage in their personal computers or virtual machines and to use virtual folder which transfer and store digital contents to and in EDMS. The virtual folder system of this paper looks like a real folder in a personal computer, but it is another virtual device for outer storage devices including EDMS. It can be an alternative and reference of digital contents control for future applications of cloud computing.

Digital Forensic Investigation of Virtual Desktop Infrastructure (가상 데스크톱 환경에 대한 디지털 포렌식 연구)

  • Jang, Sanghee;Kim, Deunghwa;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.203-212
    • /
    • 2013
  • Recently, cloud computing is one of the parts showing the biggest growth in the IT market and is expected to continue to grow into. Especially, many companies are adopting virtual desktop infrastructure as private cloud computing to achieve in saving the cost and enhancing the efficiency of the servers. However, current digital forensic investigation methodology of cloud computing is not systematized scientifically and technically. To do this, depending on the type of each cloud computing services, digital evidence collection system for the legal enforcement should be established. In this paper, we focus on virtual desktop infrastructure as private cloud computing and introduce the most widely used around the world desktop virtualization solutions of VMware, Citrix, and Microsoft. And We propose digital forensic investigation methodology for private cloud computing that is constructed by these solutions.

VDI deployment and performance analysys for multi-core-based applications (멀티코어 기반 어플리케이션 운용을 위한 데스크탑 가상화 구성 및 성능 분석)

  • Park, Junyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1432-1440
    • /
    • 2022
  • Recently, as Virtual Desktop Infrastructure(VDI) is widely used not only in office work environments but also in workloads that use high-spec multi-core-based applications, the requirements for real-time and stability of VDI are increasing. Accordingly, the display protocol used for remote access in VDI and performance optimization of virtual machines have also become more important. In this paper, we propose two ways to configure desktop virtualization for multi-core-based application operation. First, we propose a codec configuration of a display protocol with optimal performance in a high load situation due to multi-processing. Second, we propose a virtual CPU scheduling optimization method to reduce scheduling delay in case of CPU contention between virtual machines. As a result of the test, it was confirmed that the H.264 codec of Blast Extreme showed the best and stable frame, and the scheduling performance of the virtual CPU was improved through scheduling optimization.

A Study on Construction Site of Virtual Desktop Infrastructure (VDI) System Model for Cloud Computing BIM Service

  • Lee, K.H.;Kwon, S.W.;Shin, J.H.;Choi, G.S.;Moon, D.Y.
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.665-666
    • /
    • 2015
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In construction site phase, especially the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. The purpose of this study is enable the cloud computing BIM server to provide several main function such as edit a model, 3D model viewer and checker, mark-up, snapshot in high-performance quality by proper design of VDI system. Concurrent client connection performance is a main technical index of VDI. Through test-bed server client, developed VDI system's multi-connect control will be evaluated. The performance-test result of BIM server VDI will effect to development direction of cloud computing BIM service for commercialization.

  • PDF

Trends of Virtual Desktop Infrastructure Technology (가상 데스크톱 인프라 기술 동향)

  • Park, J.S.;Kim, J.Y.;Kim, Y.C.;Kim, S.Y.;Lee, S.M.;Kim, H.Y.;Kim, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.1
    • /
    • pp.21-32
    • /
    • 2013
  • 최근 녹색 성장을 위한 에너지 효율 증대, 스마트워크 실현, 기업 보안 강화 등의 요구들과 맞물려, 기업, 공공, 의료, 교육 등 많은 분야에서 인터넷상에 가상화된 개인 PC 환경을 구축하여 다양한 단말을 통해 언제 어디서나 업무 환경을 실현하는 가상 데스크톱 인프라(Virtual Desktop Infrastructure: VDI) 시스템의 도입이 증가하고 있고, 관련 시장 또한 확대되고 있다. 가상 데스크톱 서비스 구축은 많은 장점을 갖는 동시에 높은 투자 비용, 성능 등 해결해야 할 다양한 이슈들도 존재한다. 본고에서는 VDI 시스템에 대해 기술하고, 핵심 기술들의 연구 현황에 대해 소개하고자 한다.

  • PDF

Design and Implementation of Inline Data Deduplication in Cluster File System (클러스터 파일 시스템에서 인라인 데이터 중복제거 설계 및 구현)

  • Kim, Youngchul;Kim, Cheiyol;Lee, Sangmin;Kim, Youngkyun
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.369-374
    • /
    • 2016
  • The growing demand of virtual computing and storage resources in the cloud computing environment has led to deduplication of storage system for effective reduction and utilization of storage space. In particular, large reduction in the storage space is made possible by preventing data with identical content as the virtual desktop images from being stored on the virtual desktop infrastructure. However, in order to provide reliable support of virtual desktop services, the storage system must address a variety of workloads by virtual desktop, such as performance overhead due to deduplication, periodic data I/O storms and frequent random I/O operations. In this paper, we designed and implemented a clustered file system to support virtual desktop and storage services in cloud computing environment. The proposed clustered file system provides low storage consumption by means of inline deduplication on virtual desktop images. In addition, it reduces performance overhead by deduplication process in the data server and not the virtual host on which virtual desktops are running.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.