1 / 23

High Availability of Virtualized Desktop Applications

Overview. Why High Availability?Why Virtualized?Why Desktop Applications?Implementation SketchDiscussionFuture Work. Why High Availability? . Malware (viruses, worms, spyware, etc.) are still a problemPatches and software bugs can cause problemsFixing or reinstalling is time consuming and difficult for most computer usersApplication downtime means decreased user productivity.

Audrey
Download Presentation

High Availability of Virtualized Desktop Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. High Availability of Virtualized Desktop Applications Todd Deshane CS Seminar Fall 2006 Advisor: Jeanna Matthews

    2. Overview Why High Availability? Why Virtualized? Why Desktop Applications? Implementation Sketch Discussion Future Work

    3. Why High Availability? Malware (viruses, worms, spyware, etc.) are still a problem Patches and software bugs can cause problems Fixing or reinstalling is time consuming and difficult for most computer users Application downtime means decreased user productivity

    4. Virtualization Level of abstraction Which types of virtualization are of interest to us? Architecture Virtualization (Virtualization of underlying hardware i.e. x86) OS Virtualization (virtualization of underlying kernel)

    5. Architecture Virtualization

    6. OS Virtualization

    7. Why Virtualized? More effective use of hardware Desktop utilization less than 10% Isolation of guests Guests run different applications Recovery of compromised guests Restarting or rolling back a guest is easier than restarting or rolling back a physical computer

    8. Why Desktop Applications? Desktop users’ increased reliance on power of computers Increased sophistication of attacks Distributed botnets Criminal attacks on data and resources Virtualization and HA cluster research traditionally focused on servers

    9. Implementation Sketch Rapid Recovery System Isolated virtual machine appliances Intrusion detection and restoration High Availability Cluster Redundancy of applications Heartbeat monitoring Application Service Provider Central application server On-demand software

    10. Rapid Recovery System

    11. Rapid Recovery System Key Features Network Intrusion Detection Data Protection Fast Restoration File System Intrusion Detection Read and write limiting To be added: Contract-based data access

    12. High Availability (HA) Cluster

    13. High Availability (HA) Cluster

    14. High Availability (HA) Cluster Key Features Heartbeat Monitoring System or Data Fail-over Reliability Resource Management Data redundancy System redundancy Configurable Policies

    15. Application Service Provider (ASP)

    16. Application Service Provider (ASP) Key Features Central Application Server Single backend storage connection point Stateless Configuration Possible

    17. Implementation Integration ASPs are put into virtual machine appliances Rapid recovery system protects user data and settings and restores ASPs High availability cluster provides redundancy of application servers and heartbeat monitoring

    18. Discussion Users increasingly rely on desktop applications Attack sophistication is increasing Combine virtualization, HA cluster, and rapid recovery technologies High availability of virtualized desktop applications Attack resistant desktop experience Rapid application and data recovery

    19. Discussion Application deployment model ASPs can be local or remote User chooses which ASP version to use Software Redundancy Most faults occur in software System will also support hardware redundancy (if available)

    20. Future Work Deployment and testing of HA cluster technology Virtualization performance and usage testing on the desktop Enhance and test the implementation of the rapid recovery system System integration of these existing technologies

    21. Questions?

    22. Backup Slides

    23. Implementation Details Virtual Environment: Xen (VMM) OpenVZ (OS virtualization) High Availability Cluster Linux-HA File Server: Openfiler

    24. References Matthews et al. Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances www.linux-ha.org/ http://www.openfiler.com/ http://en.wikipedia.org/wiki/Application_service_provider

More Related