5.2
Table Of Contents
- VMware Horizon View Architecture Planning
- Contents
- VMware Horizon View Architecture Planning
- Introduction to Horizon View
- Planning a Rich User Experience
- Feature Support Matrix
- Choosing a Display Protocol
- Using View Persona Management to Retain User Data and Settings
- Benefits of Using View Desktops in Local Mode
- Accessing USB Devices Connected to a Local Computer
- Printing from a View Desktop
- Streaming Multimedia to a View Desktop
- Using Single Sign-On for Logging In to a View Desktop
- Using Multiple Monitors with a View Desktop
- Managing Desktop Pools from a Central Location
- Architecture Design Elements and Planning Guidelines
- Virtual Machine Requirements
- Horizon View ESX/ESXi Node
- Desktop Pools for Specific Types of Workers
- Desktop Virtual Machine Configuration
- vCenter Server and View Composer Virtual Machine Configuration
- View Connection Server Maximums and Virtual Machine Configuration
- View Transfer Server Virtual Machine Configuration and Storage
- vSphere Clusters
- Storage and Bandwidth Requirements
- Horizon View Building Blocks
- Horizon View Pods
- Advantages of Using Multiple vCenter Servers in a Pod
- Planning for Security Features
- Understanding Client Connections
- Choosing a User Authentication Method
- Restricting View Desktop Access
- Using Group Policy Settings to Secure View Desktops
- Implementing Best Practices to Secure Client Systems
- Assigning Administrator Roles
- Preparing to Use a Security Server
- Understanding Horizon View Communications Protocols
- Overview of Steps to Setting Up a Horizon View Environment
- Index
n
Estimating Memory Requirements for Virtual Desktops on page 35
RAM costs more for servers than it does for PCs. Because the cost of RAM is a high percentage of overall
server hardware costs and total storage capacity needed, determining the correct memory allocation is
crucial to planning your desktop deployment.
n
Estimating CPU Requirements for Virtual Desktops on page 37
When estimating CPU, you must gather information about the average CPU utilization for various types
of workers in your enterprise.
n
Choosing the Appropriate System Disk Size on page 38
When allocating disk space, provide only enough space for the operating system, applications, and
additional content that users might install or generate. Usually this amount is smaller than the size of
the disk that is included on a physical PC.
Planning Based on Types of Workers
For many configuration elements, including RAM, CPU, and storage sizing, requirements depend largely on
the type of worker who uses the virtual desktop and on the applications that must be installed.
For architecture planning, workers can be categorized into several types.
Task workers
Task workers and administrative workers perform repetitive tasks within a
small set of applications, usually at a stationary computer. The applications are
usually not as CPU- and memory-intensive as the applications used by
knowledge workers. Task workers who work specific shifts might all log in to
their virtual desktops at the same time. Task workers include call center
analysts, retail employees, warehouse workers, and so on.
Knowledge workers
Knowledge workers' daily tasks include accessing the Internet, using email,
and creating complex documents, presentations, and spreadsheets. Knowledge
workers include accountants, sales managers, marketing research analysts, and
so on.
Power users
Power users include application developers and people who use graphics-
intensive applications.
Employees who use
desktops in local mode
only
These users download and run their View desktops only on their local systems,
which reduces datacenter costs associated with bandwidth, memory, and CPU
resources. Scheduled replications ensure that systems and data are backed up.
Administrators configure how often end users' systems must contact
View Manager to avoid being locked out.
Kiosk users
These users need to share a desktop that is placed in a public place. Examples
of kiosk users include students using a shared computer in a classroom, nurses
at nursing stations, and computers used for job placement and recruiting. These
desktops require automatic login. Authentication can be done through certain
applications if necessary.
VMware Horizon View Architecture Planning
34 VMware, Inc.