ra2 studio - Fotolia
There are two main components that make VDI software work. The first is the connection broker, and the other is...
The connection broker's job is to assign inbound user sessions to a virtual desktop, and the hypervisor is what actually runs the virtual desktops. With virtual desktop infrastructure (VDI), hypervisors work in much the same way as they do with server virtualization.
VDI software usually defines pools of virtual desktops. When a user establishes a session with a connection broker, it assigns the session to an available virtual desktop from the appropriate pool. Virtual desktop pools are usually for groups of users who share the same needs, such as a sales team whose members all need access to the same applications and utilities on their desktops.
Virtual desktops can be non-persistent -- meaning they are reset to a pristine state after each use -- or they can be persistent. A persistent virtual desktop is one that "belongs" to a specific user who is free to make changes, such as assigning custom wallpaper. It does not delete those changes at logoff.
Every vendor uses its own approach to VDI software. There are often similarities between providers, but there can also be major differences from one vendor to the next. Depending on which VDI provider you go with, there may be other components involved -- such as tools for profile management, application virtualization, license tracking and more -- but the broker and hypervisor are standard in all VDI software.
It is important to realize that a failure within a VDI environment can lead to a major outage where no users are able to access their desktops. To that end, VDI strategies almost always incorporate redundant hardware and software in an effort to isolate and minimize the effects of any singular malfunction.
Breaking down VDI software from Citrix, VMware
Crafting criteria for selecting VDI software
Citrix VDI-in-a-Box vs. XenDesktop: Which is better for SMBs?
Dig Deeper on Virtual desktop software and vendors
Related Q&A from Brien Posey
Microsoft 365 is a widely used service, but its many different applications make backup complicated. Watch out for these common roadblocks. Continue Reading
A ransomware attack on cloud storage can have catastrophic effects. Cloud storage is still online, which means it is susceptible to some cyberattacks... Continue Reading
Like other major SaaS applications, Microsoft 365 requires proper data backup. Use these four elements to develop a formal Microsoft 365 backup ... Continue Reading