US20130067469A1 - Load Balancing By Endpoints - Google Patents

Load Balancing By Endpoints Download PDF

Info

Publication number
US20130067469A1
US20130067469A1 US13/232,894 US201113232894A US2013067469A1 US 20130067469 A1 US20130067469 A1 US 20130067469A1 US 201113232894 A US201113232894 A US 201113232894A US 2013067469 A1 US2013067469 A1 US 2013067469A1
Authority
US
United States
Prior art keywords
user
remote desktop
computing
sessions
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/232,894
Inventor
Manuvir Das
Sudarshan Yadav
Arvind Kandhare
Sanjay Malpani
Ranjana Rathinam
Jayaraman Thiagarajan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US13/232,894 priority Critical patent/US20130067469A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MALPANI, SANJAY, RATHINAM, RANJANA, DAS, MANUVIR, KANDHARE, ARVIND, THIAGARAJAN, JAY, YADAV, SUDARSHAN
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION CORRECTIVE ASSIGNMENT TO CORRECT THE MISSPELLING OF INVENTOR, JAYARAMAN THIAGARAJAN'S LAST NAME, PREVIOUSLY RECORDED ON REEL 026905 FRAME 0967. ASSIIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF THE ENTIRE AND EXCLUSIVE RIGHTS, TITLE AND INTEREST. Assignors: THIAGARAJAN, JAYARAMAN
Priority to CN201210338804.3A priority patent/CN102917018B/en
Publication of US20130067469A1 publication Critical patent/US20130067469A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Priority to US15/862,177 priority patent/US20180143866A1/en
Priority to US16/270,195 priority patent/US10838775B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/4557Distribution of virtual machine instances; Migration and load balancing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Definitions

  • Cloud computing refers to a computing environment for enabling on-demand network access to a shared pool of computing resources.
  • Many cloud computing services involve virtualized resources such as those described above and may take the form of web-based tools or applications that run on a server in the cloud but that users can access and use through a web browser as if the web-based tools or applications were programs installed locally on their own computers.
  • the virtualized resources are typically hosted in computing systems located in a computing data center.
  • the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions.
  • the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines.
  • new user sessions are assigned according to a minimum performance standard.
  • FIG. 1 depicts an example computing environment wherein aspects of the present disclosure can be implemented.
  • FIG. 2 depicts an example computing environment wherein aspects of the present disclosure can be implemented.
  • FIG. 3 depicts an example computing environment including data centers.
  • FIG. 4 depicts an operational environment of a data center.
  • FIG. 5 depicts an operational environment for practicing aspects of the present disclosure.
  • FIG. 6 illustrates an example architecture for practicing some of the methods disclosed herein.
  • FIG. 7 illustrates an example block diagram depicting some of the methods disclosed herein.
  • FIG. 8 illustrates an example block diagram depicting the compute component of a cloud data service.
  • FIG. 9 illustrates an example block diagram depicting the storage component of a cloud data service.
  • FIG. 10 illustrates an example block diagram depicting the fabric controller component of a cloud data service.
  • FIG. 11 illustrates an example block diagram depicting the CDN component of a cloud data service.
  • FIG. 12 illustrates an example block diagram depicting the connect component of a cloud data service.
  • FIG. 13 illustrates an example embodiment of the methods disclosed herein.
  • FIG. 14 illustrates an example embodiment of the methods disclosed herein.
  • FIG. 15 illustrates an example of an operational procedure for practicing aspects of the present disclosure.
  • FIG. 16 illustrates an example system for practicing aspects of the present disclosure.
  • FIG. 17 illustrates an example embodiment of a user data mounting scenario.
  • FIG. 18 illustrates an example embodiment of a load balancing scenario.
  • the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both.
  • the methods and apparatus of the disclosure may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the disclosure.
  • the computing device In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device.
  • One or more programs that may implement or utilize the processes described in connection with the disclosure, e.g., through the use of an application programming interface (API), reusable controls, or the like.
  • API application programming interface
  • Such programs are preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system.
  • the program(s) can be implemented in assembly or machine language, if desired.
  • the language may be a compiled or interpreted language, and combined with hardware implementations.
  • a remote desktop system is a computer system that maintains applications that can be remotely executed by client computer systems.
  • Input is entered at a client computer system and transferred over a network (e.g., using protocols based on the International Telecommunications Union (ITU) T.120 family of protocols such as Remote Desktop Protocol (RDP)) to an application on a terminal server.
  • the application processes the input as if the input were entered at the terminal server.
  • the application generates output in response to the received input and the output is transferred over the network to the client
  • Embodiments may execute on one or more computers.
  • FIG. 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the disclosure may be implemented.
  • computer systems 200 , 300 can have some or all of the components described with respect to computer 100 of FIG. 1 .
  • circuitry used throughout the disclosure can include hardware components such as hardware interrupt controllers, hard drives, network adaptors, graphics processors, hardware based video/audio codecs, and the firmware/software used to operate such hardware.
  • the term circuitry can also include microprocessors configured to perform function(s) by firmware or by switches set in a certain way or one or more logical processors, e.g., one or more cores of a multi-core general processing unit.
  • the logical processor(s) in this example can be configured by software instructions embodying logic operable to perform function(s) that are loaded from memory, e.g., RAM, ROM, firmware, and/or virtual memory.
  • circuitry includes a combination of hardware and software
  • an implementer may write source code embodying logic that is subsequently compiled into machine readable code that can be executed by a logical processor. Since one skilled in the art can appreciate that the state of the art has evolved to a point where there is little difference between hardware, software, or a combination of hardware/software, the selection of hardware versus software to effectuate functions is merely a design choice. Thus, since one of skill in the art can appreciate that a software process can be transformed into an equivalent hardware structure, and a hardware structure can itself be transformed into an equivalent software process, the selection of a hardware implementation versus a software implementation is trivial and left to an implementer.
  • FIG. 1 depicts an example of a computing system which is configured with aspects of the disclosure.
  • the computing system can include a computer 20 or the like, including a processing unit 21 , a system memory 22 , and a system bus 23 that couples various system components including the system memory to the processing unit 21 .
  • the system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the system memory includes read only memory (ROM) 24 and random access memory (RAM) 25 .
  • ROM read only memory
  • RAM random access memory
  • a basic input/output system 26 (BIOS) containing the basic routines that help to transfer information between elements within the computer 20 , such as during start up, is stored in ROM 24 .
  • the computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29 , and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media.
  • computer executable instructions embodying aspects of the disclosure may be stored in ROM 24 , hard disk (not shown), RAM 25 , removable magnetic disk 29 , optical disk 31 , and/or a cache of processing unit 21 .
  • the hard disk drive 27 , magnetic disk drive 28 , and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32 , a magnetic disk drive interface 33 , and an optical drive interface 34 , respectively.
  • the drives and their associated computer readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computer 20 .
  • the environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31 , it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read only memories (ROMs) and the like may also be used in the operating environment.
  • a number of program modules may be stored on the hard disk, magnetic disk 29 , optical disk 31 , ROM 24 or RAM 25 , including an operating system 35 , one or more application programs 36 , other program modules 37 and program data 38 .
  • a user may enter commands and information into the computer 20 through input devices such as a keyboard 40 and pointing device 42 .
  • Other input devices may include a microphone, joystick, game pad, satellite disk, scanner or the like.
  • serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB).
  • a display 47 or other type of display device can also be connected to the system bus 23 via an interface, such as a video adapter 48 .
  • computers typically include other peripheral output devices (not shown), such as speakers and printers.
  • the system of FIG. 1 also includes a host adapter 55 , Small Computer System Interface (SCSI) bus 56 , and an external storage device 62 connected to the SCSI bus 56 .
  • SCSI Small Computer System Interface
  • the computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49 .
  • the remote computer 49 may be another computer, a server, a router, a network PC, a peer device or other common network node, a virtual machine, and typically can include many or all of the elements described above relative to the computer 20 , although only a memory storage device 50 has been illustrated in FIG. 1 .
  • the logical connections depicted in FIG. 1 can include a local area network (LAN) 51 and a wide area network (WAN) 52 .
  • LAN local area network
  • WAN wide area network
  • Such networking environments are commonplace in offices, enterprise wide computer networks, intranets and the Internet.
  • the computer 20 When used in a LAN networking environment, the computer 20 can be connected to the LAN 51 through a network interface or adapter 53 . When used in a WAN networking environment, the computer 20 can typically include a modem 54 or other means for establishing communications over the wide area network 52 , such as the Internet.
  • the modem 54 which may be internal or external, can be connected to the system bus 23 via the serial port interface 46 .
  • program modules depicted relative to the computer 20 may be stored in the remote memory storage device. It will be appreciated that the network connections shown are examples and other means of establishing a communications link between the computers may be used.
  • numerous embodiments of the disclosure are particularly well-suited for computer systems, nothing in this document is intended to limit the disclosure to such embodiments.
  • FIG. 2 depicted is a high level block diagram of a computer system configured to effectuate virtual machines.
  • computer system 100 can include elements described in FIGS. 1 and 2 and components operable to effectuate virtual machines.
  • One such component is a hypervisor 202 that may also be referred to in the art as a virtual machine monitor.
  • the hypervisor 202 in the depicted embodiment can be configured to control and arbitrate access to the hardware of computer system 100 .
  • the hypervisor 202 can generate execution environments called partitions such as child partition 1 through child partition N (where N is an integer greater than or equal to 1).
  • a child partition can be considered the basic unit of isolation supported by the hypervisor 202 , that is, each child partition can be mapped to a set of hardware resources, e.g., memory, devices, logical processor cycles, etc., that is under control of the hypervisor 202 and/or the parent partition and hypervisor 202 can isolate one partition from accessing another partition's resources.
  • the hypervisor 202 can be a stand-alone software product, a part of an operating system, embedded within firmware of the motherboard, specialized integrated circuits, or a combination thereof
  • computer system 100 includes a parent partition 204 that can also be thought of as domain 0 in the open source community.
  • Parent partition 204 can be configured to provide resources to guest operating systems executing in child partitions 1 -N by using virtualization service.
  • Each child partition can include one or more virtual processors such as virtual processors 230 through 232 that guest operating systems 220 through 222 can manage and schedule threads to execute thereon.
  • the virtual processors 230 through 232 are executable instructions and associated state information that provide a representation of a physical processor with a specific architecture. For example, one virtual machine may have a virtual processor having characteristics of an Intel x86 processor, whereas another virtual processor may have the characteristics of a PowerPC processor.
  • the virtual processors in this example can be mapped to logical processors of the computer system such that the instructions that effectuate the virtual processors will be backed by logical processors.
  • multiple virtual processors can be simultaneously executing while, for example, another logical processor is executing hypervisor instructions.
  • the combination of virtual processors and memory in a partition can be considered a virtual machine such as virtual machine 240 or 242 .
  • guest operating systems 220 through 222 can include any operating system such as, for example, operating systems from Microsoft®, Apple®, the open source community, etc.
  • the guest operating systems can include user/kernel modes of operation and can have kernels that can include schedulers, memory managers, etc.
  • a kernel mode can include an execution mode in a logical processor that grants access to at least privileged processor instructions.
  • Each guest operating system 220 through 222 can have associated file systems that can have applications stored thereon such as terminal servers, e-commerce servers, email servers, etc., and the guest operating systems themselves.
  • the guest operating systems 220 - 222 can schedule threads to execute on the virtual processors 230 - 232 and instances of such applications can be effectuated.
  • FIG. 3 and the following description are intended to provide a brief, general description of an example computing environment in which the embodiments described herein may be implemented.
  • FIG. 3 depicts an illustrative operating environment 300 that includes data centers 308 for providing computing resources.
  • Data centers 308 can provide computing resources for executing applications and providing data services on a continuous or an as-needed basis.
  • the computing resources provided by the data centers 308 may include various types of resources, such as data processing resources, data storage resources, data communication resources, and the like. Each type of computing resource may be general-purpose or may be available in a number of specific configurations.
  • data processing resources may be available as virtual machine instances.
  • the virtual machine instances may be configured to execute applications, including Web servers, application servers, media servers, database servers, and the like.
  • Data storage resources may include file storage devices, block storage devices, and the like.
  • the data center includes more than virtual machine computing resources, including a number of physical computing devices that can be configured to run one or more virtual machines that can be migrated across the physical resources to
  • the computing resources provided by the data centers 308 may be enabled by one or more individual data centers.
  • the data centers 308 are facilities utilized to house and operate computer systems and associated components.
  • the data centers 308 typically include redundant and backup power, communications, cooling, and security systems.
  • the data centers 302 might also be located in geographically disparate locations.
  • One illustrative configuration for a data center 308 that implements the concepts and technologies disclosed herein for scalably deploying a virtualized computing infrastructure will be described below with regard to FIG. 3 .
  • the customers and other consumers of the data centers 308 may access the computing resources provided by the data centers 302 over a network 306 .
  • a network 306 may be utilized.
  • LAN local-area network
  • the Internet or any other networking topology known in the art that connects the data centers 308 to remote consumers may be utilized. It should also be appreciated that combinations of such networks might also be utilized.
  • the user computer 304 may be a computer utilized by a customer or other consumer of the data centers 308 .
  • the user computer 304 may be a server computer, a desktop or laptop personal computer, a thin client, a tablet computer, a wireless telephone, a personal digital assistant (“PDA”), an e-reader, a game console, a set-top box, or any other computing device capable of accessing the data centers 308 .
  • PDA personal digital assistant
  • the user computer 304 may be utilized to configure aspects of the computing resources provided by the data centers 308 .
  • the data centers 308 may provide a Web interface through which aspects of its operation may be configured through the use of a Web browser application program executing on the customer computing system 304 .
  • a stand-alone application program executing on the customer computing system 304 might access an application programming interface (“API”) exposed by the data centers 308 for performing the configuration operations.
  • API application programming interface
  • Other mechanisms for configuring the operation of the data centers 308 including deploying updates to an application, might also be utilized.
  • FIG. 4 depicts a computing system diagram that illustrates one configuration for a data center 308 , including the concepts and technologies disclosed herein for scalably deploying a virtualized computing infrastructure.
  • FIG. 2 includes server computers 402 for providing computing resources for executing an application.
  • the server computers 402 may be standard server computers configured appropriately for providing the computing resources described above. For instance, in one implementation the server computers 402 are configured to provide the processes 406 .
  • the processes 406 may be virtual machine instances.
  • a virtual machine instance may be an instance of a software implementation of a machine (i.e., a computer) that executes programs much like a physical machine executes programs.
  • each of the servers 402 may be configured to execute an instance manager capable of executing the instances.
  • the instance manager might be a hypervisor or another type of program configured to enable the execution of multiple processes 406 on a single server 402 , for example.
  • a LAN 401 is utilized to interconnect the server computers 402 .
  • the LAN 401 may also connected to the WAN 306 illustrated in FIG. 3 .
  • FIGS. 3 and 4 the network topology illustrated in FIGS. 3 and 4 has been greatly simplified and that many more networks and networking devices may be utilized to interconnect the various computing systems disclosed herein.
  • Appropriate load balancing devices or software modules might also be utilized for balancing a load between data centers, between each of the server computers 402 in each data center, and between instances 406 purchased by each customer of the data centers.
  • Cloud computing generally refers to a computing environment for enabling on-demand network access to a shared pool of computing resources (e.g., applications, servers, and storage) such as those described above. Such a computing environment may be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing services typically do not require end-user knowledge of the physical location and configuration of the system that delivers the services. The services may be consumption-based and delivered via the Internet. Many cloud computing services involve virtualized resources such as those described above and may take the form of web-based tools or applications that users can access and use through a web browser as if they were programs installed locally on their own computers.
  • computing resources e.g., applications, servers, and storage
  • Such a computing environment may be rapidly provisioned and released with minimal management effort or service provider interaction.
  • Cloud computing services typically do not require end-user knowledge of the physical location and configuration of the system that delivers the services.
  • the services may be consumption-based and delivered via the Internet.
  • Many cloud computing services involve virtualized resources such as those described above and may take
  • Cloud computing services are typically built on some type of platform.
  • this platform may include an operating system and a data storage service configured to store data.
  • Applications running in the cloud may utilize a similar foundation.
  • FIG. 5 provides further detail to the example environment shown in FIG. 3 .
  • An administrator at user computer 304 can set up desktop configuration 501 including identifying an operating system, applications, policies and storage settings. Such preferences can be changed by the administrator and the provider of the services can charge a fee to the administrator for providing the requested configuration.
  • a cloud service can implement an architecture comprising a stack of four layers as follows:
  • a stamp may be implemented and used to define a unit of isolation and may be configured to define a traditional remote desktop deployment.
  • a remote desktop controller component can be provided that maintains customer artifacts and credentials, manages loads across stamps, and provisions and resizes stamps.
  • a remote desktop controller can also create and manage applications and desktops. Whereas a particular end point provides the virtual equivalent of a user's desktop, the stamp (or multiple stamps) provides the virtual equivalent of an companies computing infrastructure.
  • the layers described above may involve a number of components. Such components may include the following which are further described below.
  • an application may be implemented as one or more roles 800 801 802 as described above.
  • the cloud service may run multiple instances of each role, using load balancing to spread requests across the roles.
  • a portal may be provided to allow a developer to submit an application to the cloud service.
  • the portal may be configured to receive configuration information that informs the cloud platform of how many instances of each role to run.
  • the fabric controller component may create a virtual machine (VM) for each instance and run the code for the appropriate role in that VM.
  • Requests from the application's users can be made using protocols such as HTTP, HTTPS, and TCP. The requests can be load balanced across all instances of a role.
  • the cloud platform may provide data storage using a number of data structures and formats.
  • data storage can be provided as an unstructured blob of binary data 900 .
  • Metadata can be used to provide information as to content.
  • cloud storage services may provide storage as groups of entities that are associated with properties. Applications may also be provided a means to query data such, as, for example, an API that includes search parameters.
  • cloud storage can provide a way for web role instances to communicate asynchronously with worker role instances. For example, a user might submit a request to perform some compute-intensive task via a web interface implemented by a web role. The web role instance that receives this request can write a message into a queue 902 describing the work to be done. A worker role instance that is waiting on this queue can then read the message and carry out the specified task. Results can be returned via another queue.
  • the cloud storage service may replicate data in order to provide fault tolerance. Furthermore, data can be backed up copy in another data center in a different physical location for redundancy and enhanced availability.
  • a fabric controller component 1000 may be a distributed application replicated across a group of machines.
  • the fabric controller component can be configured to own all of the resources in its environment such as computers, switches, and load balancers.
  • the fabric controller component 1000 can also monitor running applications, determine where new applications should run, and select physical servers to optimize hardware utilization.
  • the fabric controller component can also be configured to start, monitor, and terminate virtual machines.
  • the cloud service can store copies of data at sites closer to the clients 1100 that use the data. For example, the first time a particular piece of data is accessed by a user, the content delivery network component can store a copy of that data (i.e., cache) at a location that is geographically close to that user. The next time the data is accessed, the contents can be delivered from the cache rather than from the more remote original.
  • a copy of that data i.e., cache
  • on-premises environments may be connected with the cloud service.
  • this type of combination can be effectuated by providing IP-level connectivity between a cloud application and machines running outside of the cloud.
  • An endpoint agent 1201 can be installed on each on-premises computer 1202 that connects to a cloud application.
  • the cloud application may also be configured to work with the cloud connect component 1200 .
  • the agent can use protocols such as IPsec to interact with a particular role in that application. By using such an agent, the potential complexity of configuring protocols such as IPsec 1203 can be transparent to the user, while providing a much simpler connection than methods such as virtual private networks (VPNs).
  • VPNs virtual private networks
  • a cloud application can access an on-premises database directly.
  • a cloud application can also be domain-joined to the on-premises environment, allowing a single sign-on to the cloud application by on-premises users, and the use of existing active directory accounts and groups for access control.
  • a remote desktop computing experience can be provided in which a desktop provider can provide an elastic pool of desktops from which an administrator can easily provision and manage numerous user desktops, much in the same manner as provisioning and managing a single user desktop.
  • the remote desktop user can thus be provided with a desktop experience that is always available, free of administrative procedures, and billed based on consumption.
  • a service can enable the application providers, with minimal effort, to provide traditional desktop applications to users in the form of web applications.
  • a platform that can provide a plurality of remote or virtual desktops can provide scalable and homogenous computing environments at low cost.
  • IT administrators can be provided an environment that can significantly lower cost as compared to traditional “Desktop as a Service” alternatives.
  • a cloud computing platform can be configured to operate with and provide benefits to multiple users and providers.
  • a cloud computing platform may be configured to provision and sell traditional desktop applications in a scalable cloud model.
  • the application provider may be enabled to create an application provider account with payout account information, upload application packages, test uploaded applications on a selected operation system, publish the application on an application marketplace on the cloud, monitor application usage and set user charges per user.
  • a cloud platform may be configured to provision desktops which may include bundles of applications to groups of users with similar requirements. For example, a group of users may all be employees of the same enterprise customer.
  • the desktop provider may be enabled to be able to create an enterprise desktop provider account and provide credit information, e.g., by way of a credit card or other credit facility.
  • the desktop provider may further be enabled to a create desktops by selecting, for example, an OS version and compatible applications from the cloud marketplace, upload additional applications as needed, and choose a delivery mode, i.e., a full desktop experience or remote application delivery.
  • the desktop provider may also be enabled to provide credentials to enable access from desktops to the customers' on-premise active directory, add users to enable access to desktops, set policies to control user access to applications on the desktop, set up a URL for a web page for desktop users, and access connection activity and disable/enable access for users.
  • a desktop reseller may be an entity who creates and/or manages desktops for sale as a service to users.
  • a desktop reseller may be enabled to perform capabilities similar to an enterprise desktop provider, such as creating a desktop reseller account, creating signup and connection scenarios for remote users, creating one or more desktops by selecting an OS version and compatible applications from the cloud marketplace, and uploading additional applications and choosing a delivery mode.
  • a desktop reseller may also be enabled to set policies to manage user access to applications on the desktop, and provide OS and application updates either automatically or manually.
  • a desktop reseller may also be enabled to view connection activity and disable/enable access, monitor desktop usage, and receive payments from users.
  • a user may be an identifiable entity who accesses a desktop provisioned by an enterprise desktop provider or a desktop reseller.
  • the user may, via the cloud platform, access desktops from any location, browse to a URL for desktop service, and sign in and access the provisioned services.
  • the user may be provided a list of desktop environments that the user can log into.
  • FIG. 13 illustrated is an example block diagram depicting a process for providing remote desktop services in a cloud computing framework.
  • a user may access via a browser a web page that provides an entry point to the remote desktop services accessible to the user and configured in accordance with the user's IT departments requirements.
  • the user may log onto the system using credentials provided to the user.
  • the credentials may be a persistent ID such as a Windows Live ID or OpenID.
  • a user will then be redirected to an authentication server which may require entry of a username and password over a secured connection.
  • the user may be issued a password that is persisted for that user, the password being provided to other services so that additional authorization is not required.
  • the password may be persisted for that user even if the desktop session ends, unless the user explicitly logs off from the session.
  • a mechanism may be provided for automatically logging into a cloud based system in which a single user authentication and authorization process permits a user to access the resources in the cloud based system where the user has access permission, without the need to enter multiple passwords.
  • Providing single sign-on allows users to log in once and access multiple applications without the need to enter more passwords.
  • Single sign on is desirable for enterprises by increasing security and efficiency by reducing the number of passwords that must be maintained.
  • single sign on provide a better user experience by allowing users greater access without additional authentication effort.
  • a cloud based service may not accept token log-on credentials generated by a single sign-on service.
  • a web-ID provider or single sign on service may prompt a user for sign on credentials, and the service may generate a ticket or tokens that can be used for connecting to other services.
  • Examples of such systems may include Windows, Linux, and iOS. It is desirable to give users in an on-premises enterprise domain, for example, single sign-on access to applications running in the cloud service.
  • a one-time password when a user logs into a cloud based desktop and provides authentication credentials, a one-time password may be automatically generated and persisted.
  • the generated one-time password may be used to log in automatically to additional processes in the cloud based system.
  • the generated one-time password can be persisted until the user explicitly logs off. Thus, even when the desktop session is unexpectedly terminated, the password can be persisted.
  • a user may have an account with a service that provides integrated on line services such as Windows Live or Yahoo.
  • a service may provide a set of services and software products such as email and multimedia services that are accessible using a single user ID and password.
  • a user of such an integrated service may also be provided an option to access cloud based computing services as described above.
  • cloud based computing services as part of such an integrated service, once the user has logged on to the service the user may be presented an option to accessed the cloud based computing service and request a remote desktop session.
  • the cloud based service may not accept the credentials from the integrated service
  • the cloud based service may generate an account with a one time password that allows the user to access the desktop session.
  • the details of the one time password need not be provided to the user since the password only exists for the duration of the session or until the user logs off.
  • the one time password may be persisted so that the user may return to the desktop if the desktop is inadvertently disconnected without having to restart the logon process.
  • client 1404 may enter a URL for his company's cloud based service home page 1400 .
  • the user may enter a URL for an integrated online service.
  • the user may be directed to an online authentication service 1401 which prompts the user for authentication credentials.
  • the online authentication service 1401 may be a service used by the administrator for the user and the user's credential information may be provided by the administrator to the cloud service, authorizing the service to create a user profile and allowing the user to launch and access desktops.
  • the online authentication service 1401 may be provided by the integrated online service.
  • the user is directed to a homepage 1402 , the user can access the cloud service 1410 with the credentials provided by the online authentication service.
  • the cloud service 1410 generates a one time password 1405 and/or a temporary user account, and the user's one time password is sent 140 to an endpoint 1407 .
  • the endpoint 1407 can be a user desktop session.
  • the one-time password may be generated based on the credentials received by the online authentication service.
  • the password can be stored in a local credentials store in the virtual machine hosting the user session.
  • the password is not persisted with the user in the user's profile, thus allowing for enhanced security and avoiding the need for the cloud service to maintain permanent passwords for each user.
  • the user can be presented with a number of desktops, e.g., an engineering desktop, a finance desktop, etc. that can be selected and logged into.
  • each desktop can be tailored to a specific functionality.
  • the user may be presented with the specific desktops based on predefined authorization.
  • a new desktop instance may be instantiated for that user. If a previous desktop instance is selected the session associated with the previous desktop instance may be resumed.
  • the session for this user and session for other users can be launched as endpoints within a virtual machine that hosts a number of such sessions.
  • a saved profile may be associated with each endpoint that is created or resumed that includes the user's preference and state information from a previous session and other information needed to maintain the user's state so the user's session can be persisted, paused, and resumed.
  • a desktop may consist of an operating system, applications, and settings.
  • a desktop instance generally refers to a desktop plus a specific user profile. In some cases a desktop instance and a desktop session may be used interchangeably.
  • multiple sessions can be launched for additional users.
  • multiple sessions corresponding to multiple endpoints may be instantiated as additional users log into the system.
  • the users may comprise multiple user types as defined by the administrator for the group of users.
  • multiples users of both Type 1 and Type 2 may log into the system and begin sessions.
  • Type 1 may be a finance type desktop
  • Type 2 may be an engineering type desktop.
  • a virtual machine may be configured to host a number of sessions of one or more types. In one embodiment, the numbers of sessions may be independent of the underlying virtual machine configuration that is hosting the various user sessions. As additional user sessions are instantiated on the virtual machine, additional virtual machines may be launched.
  • a set number of remote desktop sessions can be configured to execute on a virtual machine. As more remote desktop sessions are needed, another virtual machine can be launched.
  • An elastic pool of virtual machines may be provided so that sessions can be dynamically added at any time without the need for an end user or administrator to understand the underlying details for the structures providing the services.
  • the user may be assigned a virtual machine (VM) endpoint from a pool of available VM endpoints, the next time that a user logs in, the user may be connected to any one of the VM endpoints in the pool.
  • the user's preferences and state data may be saved.
  • the user's preference and state data may be saved to a set of data that may be associated with the user so that any time that the user logs on and is assigned a desktop, the user preference and state data may be obtained so that the user's previous desktop state can be resumed. So for example, if the users is associated with a session (i.e.
  • the user's desktop state from the first virtual machine would generally not be available to the session on the second virtual machine.
  • the user's state is saved independently of the session and the particular VM endpoint.
  • a set of user data may be referred to as a virtual profile.
  • the virtual profile may be implemented and referred to as a virtual hard drive or virtual hard disk (VHD).
  • VHD virtual hard disk
  • the previous user's state can be migrated to the new session.
  • This feature allows a single master desktop that is designed to serve a particular Type to have a custom feel for each particular user. The result is that a user of an otherwise generic session environment is perceived by the user as having a personal desktop look and feel.
  • a client may open and close remote access connections to the cloud service, and during any given connection, the client may change settings and preferences in the session.
  • a mechanism is described herein for provisioning remote desktops in a cloud based infrastructure while maintaining user personalization.
  • a user may not always reconnect to the same virtual desktop.
  • the virtual profile assigned to a user may be mounted to the endpoint assigned to the user.
  • the virtual profile may include information such as the user's personal data and personalization information (e.g., settings, profiles, files, application data, etc.).
  • the virtual profile When the user disconnects or logs off from the remote desktop, the virtual profile is demounted from the endpoint and saved for subsequent user sessions.
  • the virtual profile thus saves information regarding the user's state when the user is disconnected and provides the information as needed for launching the next user session.
  • a user may be assigned a VM endpoint from a pool of available VM endpoints, the next time that a user logs in, the user may be connected to any one of the VM endpoints in the pool.
  • the user's saved preference and state data may be used to provide the customized desktop experience regardless of the particular VM endpoint to which the user is connected.
  • a virtual profile or VHD may be a virtual hard disk file format that is configured as data that is typically found on a physical data disk drive.
  • a virtual profile or a VHD may be populated with data operable to configure a user's desktop in accordance with the standard desktop configuration as defined by, for example, a company IT administrator.
  • a virtual profile or a VHD may include data defining the “gold image” of the desktop (i.e., the standard desktop configuration for a user role).
  • the virtual profile or a VHD may be populated with the data from the virtual profile or a VHD to provide the look and feel of a custom user experience.
  • cloud service boundary 1410 may define a single service boundary as defined and configured for a set of services provided to a particular company and accessible using a predetermined URL which, when entered via a browser, may provide a web interface for logging on to the service and accessing the desktops configured for service.
  • a connection to a connection broker may initially be requested.
  • the connection broker may determine the stamp associated with the requested user session and select a virtual machine that is hosting user sessions within the identified stamp. For example, if the request indicates that a user session is desired, the connection broker may search a database that includes IP address port number combinations or network identifiers to find a suitable virtual machine being hosted on a cloud server.
  • the connection broker can generate a redirection request that causes the user session to be associated with the identified virtual machine.
  • an endpoint may be notified 1600 that a user has logged into the system.
  • the system searches for a virtual profile 1601 and determines whether a virtual profile already exists for the user 1602 . If there is no virtual profile for the user, then a virtual profile is created 1603 . If a virtual profile already exists for the user or if a virtual profile was created, then the user virtual profile is moved to the endpoint 1604 .
  • the user desktop session may be launched 1605 . When it is determined that the user has logged out 1606 , then the virtual profile is dismounted 1607 from the endpoint and saved for subsequent use.
  • a mechanism for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed.
  • the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions.
  • the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines.
  • new user sessions are assigned according to a minimum performance standard.
  • load balancing may be performed in accordance with a predetermined load balancing metric.
  • a load balancing metric may be determined so that the computing resources are allocated to effectuate the hosted services are substantially optimized with respect to power, CPU usage, and other factors.
  • Many data centers allocate computing resources so as to evenly balance out the processes that are hosted among the resources to ensure that none of the resources are overloaded.
  • allocation policies result in a larger number of resources being powered on and not being fully utilized.
  • the load balancing metric may be determined so as to balance loads among computing resources so that new user sessions are hosted on computing resources to substantially minimize the total number of hosting computing devices. For example, if a first computing resource is moderately utilized and a second computing resource has a low utilization, then new user sessions may be loaded on the first computing resource so that as existing user sessions are terminated, the computing resource with low utilization can be shut down, resulting in greater power utilization efficiencies at the data center.
  • computing resources can refer to hardware resources such as servers and storage units as well as virtual resources such as virtual machines.
  • a number of cloud user sessions may be allocated to one or more virtual machines.
  • one data center may implement a policy in which each virtual machine hosts sixteen cloud user sessions.
  • a load balancing metric may allocate user sessions to moderately and highly loaded virtual machines in order to maximally utilize the loaded virtual machines and reduce the total number of virtual machines that are executing.
  • new user sessions may be allocated to an available computing resource with the highest number of sessions being hosted.
  • each computing resource may be classified as having one of a low, medium, and high load utilization levels, and new user sessions may be assigned to the computing resources in the following order: medium, high, and low.
  • Other classification schemes may be used, with the objective being the allocation of sessions so that the smallest number of resources are utilized at any given time.
  • user sessions and their associated data and applications can be migrated to another computing resource in accordance with the predetermined load balancing metric.
  • existing user sessions may be reallocated so as to reduce the overall number of computing resources that are in operation. For example, user sessions hosted on a computing resource classified as low utilization may be migrated to a computing resource classified as high to allow for a shutdown of the computing resource classified as low.
  • the load balancing metric may be determined according to factors other than power consumption.
  • the load balancing metric may be determined in accordance with a minimum performance standard. Such a standard may consider session loading schemes that provide for greater overall performance. For example, system costs such as power may be balanced against session load distributions that provide higher network performance and thus provide a better user experience.
  • FIG. 18 illustrates one embodiment in accordance with the present disclosure.
  • a user may log 1800 to a cloud based service.
  • the cloud based service may determine if a user session already exists at an endpoint 1802 . If so then the user is assigned 1804 to the endpoint that is hosting the user session. If the user does not already have a session available at an endpoint, then the cloud service may determine an endpoint in a load balanced manner in accordance with one embodiment.
  • the system may retrieve usage threshold information for all endpoints 1806 .
  • the usage threshold information may comprise a categorization indicating the relative amount of the total session capacity for each endpoint.
  • the threshold may be one of low, medium, and high, each indicating the relative usage of the maximum session capacity for the endpoint. If there is at least one endpoint with a medium threshold 1808 , then one of the medium threshold endpoints is selected 1814 . If there are no medium threshold endpoints, then if there is at least one endpoint with a high threshold 1810 , then one of the high threshold endpoints is selected 1816 . Finally, if there are no high threshold endpoints, then if there is at least one endpoint with a low threshold 1812 , then one of the high threshold endpoints is selected 1818 .
  • endpoints may be performed using a variety of methods.
  • endpoints are selected using a random or pseudorandom selection process.
  • a round robin selection method may be used.
  • endpoints are selected in round robin fashion. For example, a list of addresses of available endpoints may be stored in a sorted order according to one or more criteria such as, for example, in order of endpoints most recently updated.
  • a global lock is acquired, the first endpoint is obtained from the sorted list and assigned to the user, and the list is then updated. The end user is then redirected to the assigned endpoint.
  • a queuing selection method may be used.
  • the endpoint address is added to a queue as many times as the maximum number of sessions.
  • an endpoint address is selected from the queue in queued order, the endpoint address is validated to determine that the endpoint is available and accepting connections.
  • the end user is redirected to the endpoint.
  • a session caching selection method may be used.
  • load balancing when load balancing is initiated, an attempt is made to cache sessions from the endpoints that are available. The maximum number of session is twice the number of concurrent requests that an RDCM instance can process per second.
  • an endpoint address from the local cache is retrieved by acquiring a local lock. The endpoint address is assigned to the end user.
  • An attempt is made to span a thread that performs caching when the available session in the cache falls below the minimum cache length, which is the number of concurrent requests that an RDCM instance can process per second. The end user is redirected to the endpoint.
  • a stateless list selection method may be used.
  • the RDCM chooses a prime number according to the instance ID.
  • a list of all sessions e.g. [1,2,3,4,5,6,7,8,9,10]
  • a unique list based on the odd prime number assigned for the instance e.g., 3
  • the prime e.g., [3,6,9,2,7,1,8,5,10,4]
  • the endpoint address is selected from the list and an attempt is made to book the endpoint by updating the table row to booked. If the booking attempt succeeds, then the endpoint is assigned to the user.
  • a medium threshold endpoint is given priority because of tradeoffs between overall system performance and the objective of strictly minimizing the total number of endpoints.
  • High threshold endpoints may be given priority over low threshold endpoints because of the cost of running an endpoint with low utilization coupled with the likelihood that termination of user sessions in a low threshold endpoint may allow for the low threshold endpoint to be freed up and thus shut down.
  • FIG. 15 depicts an exemplary operational procedure for managing a virtualized computing infrastructure including operations 1500 , 1502 , 1504 , 1506 , and 1508 .
  • operation 1500 begins the operational procedure and operation 1502 illustrates receiving a request for a remote desktop session from one of a plurality of users.
  • Each of the remote desktop sessions may comprise an operating environment and software applications to be included in the operating environment.
  • the remote desktop sessions can each correspond to a user role.
  • an administrator can use a user interface to define two desktop environments for a medium sized company.
  • the administrator may define a first desktop environment for engineering staff and may select an operating system and version, an email and calendar application, a browser application, office applications, and a drawing application.
  • the administrator may further specify that up to fifty such desktops may be used at one time.
  • the administrator may also define a second desktop environment for finance staff and may select an operating system and version, an email and calendar application, a browser application, office applications, and a database application.
  • the administrator may further specify that up to twenty-five such desktops may be used at one time.
  • the remote desktop configurations can be accessible via the Internet using a URL. For example, after configuring the desktop environments, the desktop environments may be accessible by the individual users by entering, for example, www.company.com/tech and www.company.com/finance.”
  • Operation 1504 illustrates determining the number of remote desktop sessions hosted by each of a plurality of virtual machines.
  • Operation 1506 illustrates selecting a virtual machine to host the requested remote desktop session in order to increase the number of remote desktop sessions hosted by the virtual machines that currently host a plurality of remote desktop sessions.
  • Operation 1508 illustrates instantiating the requested remote desktop session on the selected virtual machine.
  • FIG. 16 depicts an exemplary system for managing a virtualized computing infrastructure as described above.
  • system 1600 comprises a processor 1610 and memory 1620 .
  • Memory 1620 further comprises computer instructions configured for managing a virtualized computing infrastructure.
  • Block 1622 illustrates instantiating one or more remote desktop configurations that makes available, to a plurality of users via a remote network connection, remote desktop configurations each comprising an operating environment and software applications to be included in the operating environment.
  • Block 1624 illustrates receiving a request for a remote desktop session from one of the plurality of users, the remote desktop session conforming to one of the one or more remote desktop configurations.
  • Block 1626 illustrates instantiating the requested remote desktop session and loading data and applications associated with the remote desktop session on a computing device selected in accordance with a predetermined load balancing metric.
  • a computer readable medium can store thereon computer executable instructions for managing a virtualized computing infrastructure.
  • Such media can comprise a first subset of instructions for saving, at a first computing data center, a user remote desktop configuration, the user remote desktop configuration including saved state information for an operating environment and software applications executing in the operating environment, the first computing data center configured to provide at least computation and storage services; a second subset of instructions for determining a probable location from which a user will access the user remote desktop configuration; and a third set of instructions for, based on said determining, migrating the saved user remote desktop configuration to a second computing data center and making available, via a remote network connection, the saved user remote desktop configuration to the user from the second computing data center.
  • additional sets of instructions can be used to capture the various other aspects disclosed herein, and that the three presently disclosed subsets of instructions can vary in detail per the present disclosure.

Abstract

A mechanism is provided for In a cloud computing infrastructure, a mechanism is provided for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions. In one embodiment, the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines. In another embodiment, new user sessions are assigned according to a minimum performance standard.

Description

    BACKGROUND
  • One increasingly popular form of networking may generally be referred to as remote presentation systems, which can use protocols such as Remote Desktop Protocol (RDP) and Independent Computing Architecture (ICA) to share a desktop and other applications executing on a server with a remote client. Cloud computing refers to a computing environment for enabling on-demand network access to a shared pool of computing resources. Many cloud computing services involve virtualized resources such as those described above and may take the form of web-based tools or applications that run on a server in the cloud but that users can access and use through a web browser as if the web-based tools or applications were programs installed locally on their own computers. The virtualized resources are typically hosted in computing systems located in a computing data center.
  • SUMMARY
  • Disclosed are methods and systems for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions. In one embodiment, the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines. In another embodiment, new user sessions are assigned according to a minimum performance standard.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The systems, methods, and computer readable media for managing a virtualized computing infrastructure in accordance with this specification are further described with reference to the accompanying drawings in which:
  • FIG. 1 depicts an example computing environment wherein aspects of the present disclosure can be implemented.
  • FIG. 2 depicts an example computing environment wherein aspects of the present disclosure can be implemented.
  • FIG. 3 depicts an example computing environment including data centers.
  • FIG. 4 depicts an operational environment of a data center.
  • FIG. 5 depicts an operational environment for practicing aspects of the present disclosure.
  • FIG. 6 illustrates an example architecture for practicing some of the methods disclosed herein.
  • FIG. 7 illustrates an example block diagram depicting some of the methods disclosed herein.
  • FIG. 8 illustrates an example block diagram depicting the compute component of a cloud data service.
  • FIG. 9 illustrates an example block diagram depicting the storage component of a cloud data service.
  • FIG. 10 illustrates an example block diagram depicting the fabric controller component of a cloud data service.
  • FIG. 11 illustrates an example block diagram depicting the CDN component of a cloud data service.
  • FIG. 12 illustrates an example block diagram depicting the connect component of a cloud data service.
  • FIG. 13 illustrates an example embodiment of the methods disclosed herein.
  • FIG. 14 illustrates an example embodiment of the methods disclosed herein.
  • FIG. 15 illustrates an example of an operational procedure for practicing aspects of the present disclosure.
  • FIG. 16 illustrates an example system for practicing aspects of the present disclosure.
  • FIG. 17 illustrates an example embodiment of a user data mounting scenario.
  • FIG. 18 illustrates an example embodiment of a load balancing scenario.
  • DETAILED DESCRIPTION
  • Certain specific details are set forth in the following description and figures to provide a thorough understanding of various embodiments of the disclosure. Certain well-known details often associated with computing and software technology are not set forth in the following disclosure to avoid unnecessarily obscuring the various embodiments of the disclosure. Further, those of ordinary skill in the relevant art will understand that they can practice other embodiments of the disclosure without one or more of the details described below. Finally, while various methods are described with reference to steps and sequences in the following disclosure, the description as such is for providing a clear implementation of embodiments of the disclosure, and the steps and sequences of steps should not be taken as required to practice this disclosure.
  • It should be understood that the various techniques described herein may be implemented in connection with hardware or software or, where appropriate, with a combination of both. Thus, the methods and apparatus of the disclosure, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the disclosure. In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device. One or more programs that may implement or utilize the processes described in connection with the disclosure, e.g., through the use of an application programming interface (API), reusable controls, or the like. Such programs are preferably implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language, and combined with hardware implementations.
  • A remote desktop system is a computer system that maintains applications that can be remotely executed by client computer systems. Input is entered at a client computer system and transferred over a network (e.g., using protocols based on the International Telecommunications Union (ITU) T.120 family of protocols such as Remote Desktop Protocol (RDP)) to an application on a terminal server. The application processes the input as if the input were entered at the terminal server. The application generates output in response to the received input and the output is transferred over the network to the client
  • Embodiments may execute on one or more computers. FIG. 1 and the following discussion are intended to provide a brief general description of a suitable computing environment in which the disclosure may be implemented. One skilled in the art can appreciate that computer systems 200, 300 can have some or all of the components described with respect to computer 100 of FIG. 1.
  • The term circuitry used throughout the disclosure can include hardware components such as hardware interrupt controllers, hard drives, network adaptors, graphics processors, hardware based video/audio codecs, and the firmware/software used to operate such hardware. The term circuitry can also include microprocessors configured to perform function(s) by firmware or by switches set in a certain way or one or more logical processors, e.g., one or more cores of a multi-core general processing unit. The logical processor(s) in this example can be configured by software instructions embodying logic operable to perform function(s) that are loaded from memory, e.g., RAM, ROM, firmware, and/or virtual memory. In example embodiments where circuitry includes a combination of hardware and software an implementer may write source code embodying logic that is subsequently compiled into machine readable code that can be executed by a logical processor. Since one skilled in the art can appreciate that the state of the art has evolved to a point where there is little difference between hardware, software, or a combination of hardware/software, the selection of hardware versus software to effectuate functions is merely a design choice. Thus, since one of skill in the art can appreciate that a software process can be transformed into an equivalent hardware structure, and a hardware structure can itself be transformed into an equivalent software process, the selection of a hardware implementation versus a software implementation is trivial and left to an implementer.
  • FIG. 1 depicts an example of a computing system which is configured with aspects of the disclosure. The computing system can include a computer 20 or the like, including a processing unit 21, a system memory 22, and a system bus 23 that couples various system components including the system memory to the processing unit 21. The system bus 23 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read only memory (ROM) 24 and random access memory (RAM) 25. A basic input/output system 26 (BIOS), containing the basic routines that help to transfer information between elements within the computer 20, such as during start up, is stored in ROM 24. The computer 20 may further include a hard disk drive 27 for reading from and writing to a hard disk, not shown, a magnetic disk drive 28 for reading from or writing to a removable magnetic disk 29, and an optical disk drive 30 for reading from or writing to a removable optical disk 31 such as a CD ROM or other optical media. In some example embodiments, computer executable instructions embodying aspects of the disclosure may be stored in ROM 24, hard disk (not shown), RAM 25, removable magnetic disk 29, optical disk 31, and/or a cache of processing unit 21. The hard disk drive 27, magnetic disk drive 28, and optical disk drive 30 are connected to the system bus 23 by a hard disk drive interface 32, a magnetic disk drive interface 33, and an optical drive interface 34, respectively. The drives and their associated computer readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computer 20. Although the environment described herein employs a hard disk, a removable magnetic disk 29 and a removable optical disk 31, it should be appreciated by those skilled in the art that other types of computer readable media which can store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, random access memories (RAMs), read only memories (ROMs) and the like may also be used in the operating environment.
  • A number of program modules may be stored on the hard disk, magnetic disk 29, optical disk 31, ROM 24 or RAM 25, including an operating system 35, one or more application programs 36, other program modules 37 and program data 38. A user may enter commands and information into the computer 20 through input devices such as a keyboard 40 and pointing device 42. Other input devices (not shown) may include a microphone, joystick, game pad, satellite disk, scanner or the like. These and other input devices are often connected to the processing unit 21 through a serial port interface 46 that is coupled to the system bus, but may be connected by other interfaces, such as a parallel port, game port or universal serial bus (USB). A display 47 or other type of display device can also be connected to the system bus 23 via an interface, such as a video adapter 48. In addition to the display 47, computers typically include other peripheral output devices (not shown), such as speakers and printers. The system of FIG. 1 also includes a host adapter 55, Small Computer System Interface (SCSI) bus 56, and an external storage device 62 connected to the SCSI bus 56.
  • The computer 20 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 49. The remote computer 49 may be another computer, a server, a router, a network PC, a peer device or other common network node, a virtual machine, and typically can include many or all of the elements described above relative to the computer 20, although only a memory storage device 50 has been illustrated in FIG. 1. The logical connections depicted in FIG. 1 can include a local area network (LAN) 51 and a wide area network (WAN) 52. Such networking environments are commonplace in offices, enterprise wide computer networks, intranets and the Internet.
  • When used in a LAN networking environment, the computer 20 can be connected to the LAN 51 through a network interface or adapter 53. When used in a WAN networking environment, the computer 20 can typically include a modem 54 or other means for establishing communications over the wide area network 52, such as the Internet. The modem 54, which may be internal or external, can be connected to the system bus 23 via the serial port interface 46. In a networked environment, program modules depicted relative to the computer 20, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are examples and other means of establishing a communications link between the computers may be used. Moreover, while it is envisioned that numerous embodiments of the disclosure are particularly well-suited for computer systems, nothing in this document is intended to limit the disclosure to such embodiments.
  • Referring now to FIG. 2, depicted is a high level block diagram of a computer system configured to effectuate virtual machines. As shown in the figures, computer system 100 can include elements described in FIGS. 1 and 2 and components operable to effectuate virtual machines. One such component is a hypervisor 202 that may also be referred to in the art as a virtual machine monitor. The hypervisor 202 in the depicted embodiment can be configured to control and arbitrate access to the hardware of computer system 100. Broadly stated, the hypervisor 202 can generate execution environments called partitions such as child partition 1 through child partition N (where N is an integer greater than or equal to 1). In embodiments a child partition can be considered the basic unit of isolation supported by the hypervisor 202, that is, each child partition can be mapped to a set of hardware resources, e.g., memory, devices, logical processor cycles, etc., that is under control of the hypervisor 202 and/or the parent partition and hypervisor 202 can isolate one partition from accessing another partition's resources. In embodiments the hypervisor 202 can be a stand-alone software product, a part of an operating system, embedded within firmware of the motherboard, specialized integrated circuits, or a combination thereof
  • In the above example, computer system 100 includes a parent partition 204 that can also be thought of as domain 0 in the open source community. Parent partition 204 can be configured to provide resources to guest operating systems executing in child partitions 1-N by using virtualization service. Each child partition can include one or more virtual processors such as virtual processors 230 through 232 that guest operating systems 220 through 222 can manage and schedule threads to execute thereon. Generally, the virtual processors 230 through 232 are executable instructions and associated state information that provide a representation of a physical processor with a specific architecture. For example, one virtual machine may have a virtual processor having characteristics of an Intel x86 processor, whereas another virtual processor may have the characteristics of a PowerPC processor. The virtual processors in this example can be mapped to logical processors of the computer system such that the instructions that effectuate the virtual processors will be backed by logical processors. Thus, in these example embodiments, multiple virtual processors can be simultaneously executing while, for example, another logical processor is executing hypervisor instructions. Generally speaking, and as illustrated by the figures, the combination of virtual processors and memory in a partition can be considered a virtual machine such as virtual machine 240 or 242.
  • Generally, guest operating systems 220 through 222 can include any operating system such as, for example, operating systems from Microsoft®, Apple®, the open source community, etc. The guest operating systems can include user/kernel modes of operation and can have kernels that can include schedulers, memory managers, etc. A kernel mode can include an execution mode in a logical processor that grants access to at least privileged processor instructions. Each guest operating system 220 through 222 can have associated file systems that can have applications stored thereon such as terminal servers, e-commerce servers, email servers, etc., and the guest operating systems themselves. The guest operating systems 220-222 can schedule threads to execute on the virtual processors 230-232 and instances of such applications can be effectuated.
  • FIG. 3 and the following description are intended to provide a brief, general description of an example computing environment in which the embodiments described herein may be implemented. In particular, FIG. 3 depicts an illustrative operating environment 300 that includes data centers 308 for providing computing resources. Data centers 308 can provide computing resources for executing applications and providing data services on a continuous or an as-needed basis. The computing resources provided by the data centers 308 may include various types of resources, such as data processing resources, data storage resources, data communication resources, and the like. Each type of computing resource may be general-purpose or may be available in a number of specific configurations. For example, data processing resources may be available as virtual machine instances. The virtual machine instances may be configured to execute applications, including Web servers, application servers, media servers, database servers, and the like. Data storage resources may include file storage devices, block storage devices, and the like. The data center includes more than virtual machine computing resources, including a number of physical computing devices that can be configured to run one or more virtual machines that can be migrated across the physical resources to load balance.
  • The computing resources provided by the data centers 308 may be enabled by one or more individual data centers. The data centers 308 are facilities utilized to house and operate computer systems and associated components. The data centers 308 typically include redundant and backup power, communications, cooling, and security systems. The data centers 302 might also be located in geographically disparate locations. One illustrative configuration for a data center 308 that implements the concepts and technologies disclosed herein for scalably deploying a virtualized computing infrastructure will be described below with regard to FIG. 3.
  • The customers and other consumers of the data centers 308 may access the computing resources provided by the data centers 302 over a network 306. It should be appreciated that a local-area network (“LAN”), the Internet, or any other networking topology known in the art that connects the data centers 308 to remote consumers may be utilized. It should also be appreciated that combinations of such networks might also be utilized.
  • The user computer 304 may be a computer utilized by a customer or other consumer of the data centers 308. For instance, the user computer 304 may be a server computer, a desktop or laptop personal computer, a thin client, a tablet computer, a wireless telephone, a personal digital assistant (“PDA”), an e-reader, a game console, a set-top box, or any other computing device capable of accessing the data centers 308.
  • The user computer 304 may be utilized to configure aspects of the computing resources provided by the data centers 308. In this regard, the data centers 308 may provide a Web interface through which aspects of its operation may be configured through the use of a Web browser application program executing on the customer computing system 304. Alternatively, a stand-alone application program executing on the customer computing system 304 might access an application programming interface (“API”) exposed by the data centers 308 for performing the configuration operations. Other mechanisms for configuring the operation of the data centers 308, including deploying updates to an application, might also be utilized.
  • FIG. 4 depicts a computing system diagram that illustrates one configuration for a data center 308, including the concepts and technologies disclosed herein for scalably deploying a virtualized computing infrastructure. FIG. 2 includes server computers 402 for providing computing resources for executing an application. The server computers 402 may be standard server computers configured appropriately for providing the computing resources described above. For instance, in one implementation the server computers 402 are configured to provide the processes 406.
  • In one embodiment, the processes 406 may be virtual machine instances. A virtual machine instance may be an instance of a software implementation of a machine (i.e., a computer) that executes programs much like a physical machine executes programs. In the example of virtual machine instances, each of the servers 402 may be configured to execute an instance manager capable of executing the instances. The instance manager might be a hypervisor or another type of program configured to enable the execution of multiple processes 406 on a single server 402, for example.
  • It should be appreciated that although some of the embodiments disclosed herein are discussed in the context of virtual machine instances, other types of instances can be utilized with the concepts and technologies disclosed herein. For example, the technologies disclosed herein might be utilized with instances of storage resources, processing resources, data communications resources, and with other types of resources. The embodiments disclosed herein might also be utilized with computing systems that do not utilize virtual machine instances, i.e. that use a combination of physical machines and virtual machines.
  • In the example data center shown in FIG. 4, a LAN 401 is utilized to interconnect the server computers 402. The LAN 401 may also connected to the WAN 306 illustrated in FIG. 3. It should be appreciated that the network topology illustrated in FIGS. 3 and 4 has been greatly simplified and that many more networks and networking devices may be utilized to interconnect the various computing systems disclosed herein. Appropriate load balancing devices or software modules might also be utilized for balancing a load between data centers, between each of the server computers 402 in each data center, and between instances 406 purchased by each customer of the data centers. These network topologies and devices should be apparent to those skilled in the art.
  • Cloud computing generally refers to a computing environment for enabling on-demand network access to a shared pool of computing resources (e.g., applications, servers, and storage) such as those described above. Such a computing environment may be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing services typically do not require end-user knowledge of the physical location and configuration of the system that delivers the services. The services may be consumption-based and delivered via the Internet. Many cloud computing services involve virtualized resources such as those described above and may take the form of web-based tools or applications that users can access and use through a web browser as if they were programs installed locally on their own computers.
  • Cloud computing services are typically built on some type of platform. For some applications, such as those running inside an organization's data center, this platform may include an operating system and a data storage service configured to store data. Applications running in the cloud may utilize a similar foundation.
  • FIG. 5 provides further detail to the example environment shown in FIG. 3. An administrator at user computer 304 can set up desktop configuration 501 including identifying an operating system, applications, policies and storage settings. Such preferences can be changed by the administrator and the provider of the services can charge a fee to the administrator for providing the requested configuration.
  • In one embodiment and as further described in FIG. 6, a cloud service can implement an architecture comprising a stack of four layers as follows:
      • a cloud computing platform 601 configured to provide the resources to support the cloud services
      • a desktop provisioning and management layer 602 for creating and managing the cloud computing assets that enable application providers to provide applications, enterprise desktop providers and desktop resellers to create and manage desktops, users to connect to their desktops, etc. This layer can translate the logical view of applications and desktops to the physical assets of the cloud computing platform.
      • an application provider/enterprise desktop provider/desktop reseller/user experiences layer 603 that provides distinct end-to-end experiences for each of the four types of entities described above.
      • a vertical layer 604 that provides a set of customized experiences for particular groups of users and provided by desktop resellers.
  • In one embodiment of a cloud computing platform, a stamp may be implemented and used to define a unit of isolation and may be configured to define a traditional remote desktop deployment. A remote desktop controller component can be provided that maintains customer artifacts and credentials, manages loads across stamps, and provisions and resizes stamps. A remote desktop controller can also create and manage applications and desktops. Whereas a particular end point provides the virtual equivalent of a user's desktop, the stamp (or multiple stamps) provides the virtual equivalent of an companies computing infrastructure.
  • The layers described above may involve a number of components. Such components may include the following which are further described below.
      • a compute component (e.g., FIG. 8) that runs applications in the cloud.
      • a storage component (e.g., FIG. 9) that stores binary and structured data in the cloud
      • a fabric controller component (e.g., FIG. 10) that deploys, manages, and monitors applications. The fabric controller may also handle updates to system software throughout the platform
      • a content delivery network component (e.g., FIG. 11) that increases the speed for global access to data in the cloud storage by maintaining cached copies of that data around the world
      • a connect component (e.g., FIG. 12) that allows creating IP-level connections between on-premises computers and cloud applications.
  • Referring to FIG. 8 depicting a compute component 810, an application may be implemented as one or more roles 800 801 802 as described above. The cloud service may run multiple instances of each role, using load balancing to spread requests across the roles.
  • A portal may be provided to allow a developer to submit an application to the cloud service. The portal may be configured to receive configuration information that informs the cloud platform of how many instances of each role to run. The fabric controller component may create a virtual machine (VM) for each instance and run the code for the appropriate role in that VM. Requests from the application's users can be made using protocols such as HTTP, HTTPS, and TCP. The requests can be load balanced across all instances of a role.
  • Referring to FIG. 9 depicting a storage component 910, the cloud platform may provide data storage using a number of data structures and formats. For example, data storage can be provided as an unstructured blob of binary data 900. Metadata can be used to provide information as to content. In order to allow applications to work with data in a more structured fashion, cloud storage services may provide storage as groups of entities that are associated with properties. Applications may also be provided a means to query data such, as, for example, an API that includes search parameters. Additionally, cloud storage can provide a way for web role instances to communicate asynchronously with worker role instances. For example, a user might submit a request to perform some compute-intensive task via a web interface implemented by a web role. The web role instance that receives this request can write a message into a queue 902 describing the work to be done. A worker role instance that is waiting on this queue can then read the message and carry out the specified task. Results can be returned via another queue.
  • The cloud storage service may replicate data in order to provide fault tolerance. Furthermore, data can be backed up copy in another data center in a different physical location for redundancy and enhanced availability.
  • Referring to FIG. 10, a fabric controller component 1000 may be a distributed application replicated across a group of machines. The fabric controller component can be configured to own all of the resources in its environment such as computers, switches, and load balancers. The fabric controller component 1000 can also monitor running applications, determine where new applications should run, and select physical servers to optimize hardware utilization. The fabric controller component can also be configured to start, monitor, and terminate virtual machines.
  • In an embodiment and referring to FIG. 11, the cloud service can store copies of data at sites closer to the clients 1100 that use the data. For example, the first time a particular piece of data is accessed by a user, the content delivery network component can store a copy of that data (i.e., cache) at a location that is geographically close to that user. The next time the data is accessed, the contents can be delivered from the cache rather than from the more remote original.
  • In an embodiment and referring to FIG. 11, in order to support the applications and data used within an organization, on-premises environments may be connected with the cloud service. In an embodiment, this type of combination can be effectuated by providing IP-level connectivity between a cloud application and machines running outside of the cloud. An endpoint agent 1201 can be installed on each on-premises computer 1202 that connects to a cloud application. The cloud application may also be configured to work with the cloud connect component 1200. The agent can use protocols such as IPsec to interact with a particular role in that application. By using such an agent, the potential complexity of configuring protocols such as IPsec 1203 can be transparent to the user, while providing a much simpler connection than methods such as virtual private networks (VPNs). Once the connection is established, roles in a cloud application can appear to be on the same IP network as the on-premises machine.
  • By establishing such connections, a cloud application can access an on-premises database directly. A cloud application can also be domain-joined to the on-premises environment, allowing a single sign-on to the cloud application by on-premises users, and the use of existing active directory accounts and groups for access control.
  • In various embodiments, a remote desktop computing experience can be provided in which a desktop provider can provide an elastic pool of desktops from which an administrator can easily provision and manage numerous user desktops, much in the same manner as provisioning and managing a single user desktop. The remote desktop user can thus be provided with a desktop experience that is always available, free of administrative procedures, and billed based on consumption. For application providers, such a service can enable the application providers, with minimal effort, to provide traditional desktop applications to users in the form of web applications.
  • As businesses move to adopt remote or virtual desktops as a means to centralize the administration of secure and compliant employee desktops, it would be advantageous for IT administrators to be able to provide a homogenous desktop environment in order to control and minimize costs. Thus a platform that can provide a plurality of remote or virtual desktops can provide scalable and homogenous computing environments at low cost. By architecting a hosted desktop solution on a cloud platform in a manner similar to that of a homogenous computing model, IT administrators can be provided an environment that can significantly lower cost as compared to traditional “Desktop as a Service” alternatives.
  • A cloud computing platform can be configured to operate with and provide benefits to multiple users and providers. For example, for an application provider that provides applications to an enterprise desktop provider or a desktop reseller, a cloud computing platform may be configured to provision and sell traditional desktop applications in a scalable cloud model. The application provider may be enabled to create an application provider account with payout account information, upload application packages, test uploaded applications on a selected operation system, publish the application on an application marketplace on the cloud, monitor application usage and set user charges per user.
  • For an enterprise desktop provider who creates and/or manages desktops, a cloud platform may be configured to provision desktops which may include bundles of applications to groups of users with similar requirements. For example, a group of users may all be employees of the same enterprise customer. The desktop provider may be enabled to be able to create an enterprise desktop provider account and provide credit information, e.g., by way of a credit card or other credit facility. The desktop provider may further be enabled to a create desktops by selecting, for example, an OS version and compatible applications from the cloud marketplace, upload additional applications as needed, and choose a delivery mode, i.e., a full desktop experience or remote application delivery. The desktop provider may also be enabled to provide credentials to enable access from desktops to the customers' on-premise active directory, add users to enable access to desktops, set policies to control user access to applications on the desktop, set up a URL for a web page for desktop users, and access connection activity and disable/enable access for users.
  • A desktop reseller may be an entity who creates and/or manages desktops for sale as a service to users. A desktop reseller may be enabled to perform capabilities similar to an enterprise desktop provider, such as creating a desktop reseller account, creating signup and connection scenarios for remote users, creating one or more desktops by selecting an OS version and compatible applications from the cloud marketplace, and uploading additional applications and choosing a delivery mode. A desktop reseller may also be enabled to set policies to manage user access to applications on the desktop, and provide OS and application updates either automatically or manually. A desktop reseller may also be enabled to view connection activity and disable/enable access, monitor desktop usage, and receive payments from users.
  • A user may be an identifiable entity who accesses a desktop provisioned by an enterprise desktop provider or a desktop reseller. The user may, via the cloud platform, access desktops from any location, browse to a URL for desktop service, and sign in and access the provisioned services. In some embodiments, the user may be provided a list of desktop environments that the user can log into.
  • Referring to FIG. 13, illustrated is an example block diagram depicting a process for providing remote desktop services in a cloud computing framework. A user may access via a browser a web page that provides an entry point to the remote desktop services accessible to the user and configured in accordance with the user's IT departments requirements. The user may log onto the system using credentials provided to the user. The credentials may be a persistent ID such as a Windows Live ID or OpenID. A user will then be redirected to an authentication server which may require entry of a username and password over a secured connection. Once authenticated, the user may be issued a password that is persisted for that user, the password being provided to other services so that additional authorization is not required. In an embodiment, the password may be persisted for that user even if the desktop session ends, unless the user explicitly logs off from the session.
  • A mechanism may be provided for automatically logging into a cloud based system in which a single user authentication and authorization process permits a user to access the resources in the cloud based system where the user has access permission, without the need to enter multiple passwords. Providing single sign-on allows users to log in once and access multiple applications without the need to enter more passwords. Single sign on is desirable for enterprises by increasing security and efficiency by reducing the number of passwords that must be maintained. For cloud service providers, single sign on provide a better user experience by allowing users greater access without additional authentication effort.
  • A cloud based service may not accept token log-on credentials generated by a single sign-on service. For example, a web-ID provider or single sign on service may prompt a user for sign on credentials, and the service may generate a ticket or tokens that can be used for connecting to other services. Examples of such systems may include Windows, Linux, and iOS. It is desirable to give users in an on-premises enterprise domain, for example, single sign-on access to applications running in the cloud service.
  • In an embodiment, when a user logs into a cloud based desktop and provides authentication credentials, a one-time password may be automatically generated and persisted. The generated one-time password may be used to log in automatically to additional processes in the cloud based system. In one embodiment, the generated one-time password can be persisted until the user explicitly logs off. Thus, even when the desktop session is unexpectedly terminated, the password can be persisted.
  • In another embodiment, a user may have an account with a service that provides integrated on line services such as Windows Live or Yahoo. Such a service may provide a set of services and software products such as email and multimedia services that are accessible using a single user ID and password. In an embodiment a user of such an integrated service may also be provided an option to access cloud based computing services as described above. Thus when a user has opted for cloud based computing services as part of such an integrated service, once the user has logged on to the service the user may be presented an option to accessed the cloud based computing service and request a remote desktop session. Because the cloud based service, e.g., the remote desktop, may not accept the credentials from the integrated service, the cloud based service may generate an account with a one time password that allows the user to access the desktop session. The details of the one time password need not be provided to the user since the password only exists for the duration of the session or until the user logs off. In an embodiment the one time password may be persisted so that the user may return to the desktop if the desktop is inadvertently disconnected without having to restart the logon process.
  • In an embodiment illustrated in FIG. 14, client 1404 may enter a URL for his company's cloud based service home page 1400. Alternatively, the user may enter a URL for an integrated online service. The user may be directed to an online authentication service 1401 which prompts the user for authentication credentials. The online authentication service 1401 may be a service used by the administrator for the user and the user's credential information may be provided by the administrator to the cloud service, authorizing the service to create a user profile and allowing the user to launch and access desktops. Alternatively, the online authentication service 1401 may be provided by the integrated online service. Once the user is authenticated, the user is directed to a homepage 1402, the user can access the cloud service 1410 with the credentials provided by the online authentication service. The cloud service 1410 generates a one time password 1405 and/or a temporary user account, and the user's one time password is sent 140 to an endpoint 1407. As described above, the endpoint 1407 can be a user desktop session.
  • The one-time password may be generated based on the credentials received by the online authentication service. In an embodiment, the password can be stored in a local credentials store in the virtual machine hosting the user session. Thus the password is not persisted with the user in the user's profile, thus allowing for enhanced security and avoiding the need for the cloud service to maintain permanent passwords for each user.
  • The user can be presented with a number of desktops, e.g., an engineering desktop, a finance desktop, etc. that can be selected and logged into. For example, each desktop can be tailored to a specific functionality. The user may be presented with the specific desktops based on predefined authorization. Once the users selects a desktop, a new desktop instance may be instantiated for that user. If a previous desktop instance is selected the session associated with the previous desktop instance may be resumed. The session for this user and session for other users can be launched as endpoints within a virtual machine that hosts a number of such sessions. A saved profile may be associated with each endpoint that is created or resumed that includes the user's preference and state information from a previous session and other information needed to maintain the user's state so the user's session can be persisted, paused, and resumed. Generally a desktop may consist of an operating system, applications, and settings. A desktop instance generally refers to a desktop plus a specific user profile. In some cases a desktop instance and a desktop session may be used interchangeably.
  • In an embodiment, multiple sessions can be launched for additional users. Referring to the example embodiment illustrated in FIG. 14, multiple sessions corresponding to multiple endpoints may be instantiated as additional users log into the system. Furthermore, the users may comprise multiple user types as defined by the administrator for the group of users. For example, as shown in the figure, multiples users of both Type 1 and Type 2 may log into the system and begin sessions. For example, Type 1 may be a finance type desktop and Type 2 may be an engineering type desktop. Of course, other examples are also possible. A virtual machine may be configured to host a number of sessions of one or more types. In one embodiment, the numbers of sessions may be independent of the underlying virtual machine configuration that is hosting the various user sessions. As additional user sessions are instantiated on the virtual machine, additional virtual machines may be launched. In one embodiment, a set number of remote desktop sessions can be configured to execute on a virtual machine. As more remote desktop sessions are needed, another virtual machine can be launched. An elastic pool of virtual machines may be provided so that sessions can be dynamically added at any time without the need for an end user or administrator to understand the underlying details for the structures providing the services.
  • Since the user may be assigned a virtual machine (VM) endpoint from a pool of available VM endpoints, the next time that a user logs in, the user may be connected to any one of the VM endpoints in the pool. In order to create a custom desktop experience for the user, the user's preferences and state data may be saved. In one embodiment, the user's preference and state data may be saved to a set of data that may be associated with the user so that any time that the user logs on and is assigned a desktop, the user preference and state data may be obtained so that the user's previous desktop state can be resumed. So for example, if the users is associated with a session (i.e. end point) on a first virtual machine and later is assigned to a different session on a different virtual machine, the user's desktop state from the first virtual machine would generally not be available to the session on the second virtual machine. However, according to an aspect of the disclosure, the user's state is saved independently of the session and the particular VM endpoint. As described in the present disclosure, such a set of user data may be referred to as a virtual profile. In various embodiments the virtual profile may be implemented and referred to as a virtual hard drive or virtual hard disk (VHD). As such, when the user is connected with a session on a different virtual machine, the previous user's state can be migrated to the new session. This feature allows a single master desktop that is designed to serve a particular Type to have a custom feel for each particular user. The result is that a user of an otherwise generic session environment is perceived by the user as having a personal desktop look and feel.
  • As discussed above, during the course of a user session, a client may open and close remote access connections to the cloud service, and during any given connection, the client may change settings and preferences in the session. A mechanism is described herein for provisioning remote desktops in a cloud based infrastructure while maintaining user personalization. In cloud based systems, a user may not always reconnect to the same virtual desktop. In one embodiment, the virtual profile assigned to a user may be mounted to the endpoint assigned to the user. The virtual profile may include information such as the user's personal data and personalization information (e.g., settings, profiles, files, application data, etc.).
  • When the user disconnects or logs off from the remote desktop, the virtual profile is demounted from the endpoint and saved for subsequent user sessions. The virtual profile thus saves information regarding the user's state when the user is disconnected and provides the information as needed for launching the next user session.
  • Since a user may be assigned a VM endpoint from a pool of available VM endpoints, the next time that a user logs in, the user may be connected to any one of the VM endpoints in the pool. In order to create a custom desktop experience for the user, the user's saved preference and state data may be used to provide the customized desktop experience regardless of the particular VM endpoint to which the user is connected.
  • While the terms virtual profile and VHD are used to describe a data structure for saving a user's preference and state information, it should be understood that the present disclosure is not intended to be limited to any particular file or data format. In one embodiment a virtual profile or a VHD may be a virtual hard disk file format that is configured as data that is typically found on a physical data disk drive.
  • Initially, a virtual profile or a VHD may be populated with data operable to configure a user's desktop in accordance with the standard desktop configuration as defined by, for example, a company IT administrator. Thus a virtual profile or a VHD may include data defining the “gold image” of the desktop (i.e., the standard desktop configuration for a user role). Nevertheless, as a user uses a particular remote desktop and begins to customize the desktop by for example, changing the wallpaper, adding music, saving local documents, etc., that information is stored to the virtual profile or a VHD and an each time thereafter that a user is connected to a standard remote desktop, it is populated with the data from the virtual profile or a VHD to provide the look and feel of a custom user experience.
  • Any combination of user types (i.e., desktop types) may be defined within the boundaries of a single cloud service boundary. For example cloud service boundary 1410 may define a single service boundary as defined and configured for a set of services provided to a particular company and accessible using a predetermined URL which, when entered via a browser, may provide a web interface for logging on to the service and accessing the desktops configured for service.
  • In an embodiment, when a user session is requested, a connection to a connection broker may initially be requested. The connection broker may determine the stamp associated with the requested user session and select a virtual machine that is hosting user sessions within the identified stamp. For example, if the request indicates that a user session is desired, the connection broker may search a database that includes IP address port number combinations or network identifiers to find a suitable virtual machine being hosted on a cloud server. The connection broker can generate a redirection request that causes the user session to be associated with the identified virtual machine.
  • Referring to the embodiment described in FIG. 16, an endpoint may be notified 1600 that a user has logged into the system. The system searches for a virtual profile 1601 and determines whether a virtual profile already exists for the user 1602. If there is no virtual profile for the user, then a virtual profile is created 1603. If a virtual profile already exists for the user or if a virtual profile was created, then the user virtual profile is moved to the endpoint 1604. The user desktop session may be launched 1605. When it is determined that the user has logged out 1606, then the virtual profile is dismounted 1607 from the endpoint and saved for subsequent use.
  • Load Balancing By Endpoints
  • In an embodiment, a mechanism is provided for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions. In one embodiment, the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines. In another embodiment, new user sessions are assigned according to a minimum performance standard.
  • Such load balancing may be performed in accordance with a predetermined load balancing metric. A load balancing metric may be determined so that the computing resources are allocated to effectuate the hosted services are substantially optimized with respect to power, CPU usage, and other factors. Many data centers allocate computing resources so as to evenly balance out the processes that are hosted among the resources to ensure that none of the resources are overloaded. However, such allocation policies result in a larger number of resources being powered on and not being fully utilized.
  • In an embodiment, the load balancing metric may be determined so as to balance loads among computing resources so that new user sessions are hosted on computing resources to substantially minimize the total number of hosting computing devices. For example, if a first computing resource is moderately utilized and a second computing resource has a low utilization, then new user sessions may be loaded on the first computing resource so that as existing user sessions are terminated, the computing resource with low utilization can be shut down, resulting in greater power utilization efficiencies at the data center.
  • It should be noted that computing resources can refer to hardware resources such as servers and storage units as well as virtual resources such as virtual machines. For example, as discussed above, a number of cloud user sessions may be allocated to one or more virtual machines. For example, one data center may implement a policy in which each virtual machine hosts sixteen cloud user sessions. A load balancing metric may allocate user sessions to moderately and highly loaded virtual machines in order to maximally utilize the loaded virtual machines and reduce the total number of virtual machines that are executing.
  • Thus in one embodiment, new user sessions may be allocated to an available computing resource with the highest number of sessions being hosted. In another embodiment, each computing resource may be classified as having one of a low, medium, and high load utilization levels, and new user sessions may be assigned to the computing resources in the following order: medium, high, and low. Other classification schemes may be used, with the objective being the allocation of sessions so that the smallest number of resources are utilized at any given time.
  • In an embodiment, user sessions and their associated data and applications can be migrated to another computing resource in accordance with the predetermined load balancing metric. As users log off and user sessions are terminated, existing user sessions may be reallocated so as to reduce the overall number of computing resources that are in operation. For example, user sessions hosted on a computing resource classified as low utilization may be migrated to a computing resource classified as high to allow for a shutdown of the computing resource classified as low.
  • The load balancing metric may be determined according to factors other than power consumption. For example, the load balancing metric may be determined in accordance with a minimum performance standard. Such a standard may consider session loading schemes that provide for greater overall performance. For example, system costs such as power may be balanced against session load distributions that provide higher network performance and thus provide a better user experience.
  • FIG. 18 illustrates one embodiment in accordance with the present disclosure. A user may log 1800 to a cloud based service. The cloud based service may determine if a user session already exists at an endpoint 1802. If so then the user is assigned 1804 to the endpoint that is hosting the user session. If the user does not already have a session available at an endpoint, then the cloud service may determine an endpoint in a load balanced manner in accordance with one embodiment.
  • The system may retrieve usage threshold information for all endpoints 1806. In one embodiment the usage threshold information may comprise a categorization indicating the relative amount of the total session capacity for each endpoint. For example, the threshold may be one of low, medium, and high, each indicating the relative usage of the maximum session capacity for the endpoint. If there is at least one endpoint with a medium threshold 1808, then one of the medium threshold endpoints is selected 1814. If there are no medium threshold endpoints, then if there is at least one endpoint with a high threshold 1810, then one of the high threshold endpoints is selected 1816. Finally, if there are no high threshold endpoints, then if there is at least one endpoint with a low threshold 1812, then one of the high threshold endpoints is selected 1818.
  • The selection of endpoints may be performed using a variety of methods. In one embodiment, endpoints are selected using a random or pseudorandom selection process.
  • In another embodiment, a round robin selection method may be used. In this embodiment, endpoints are selected in round robin fashion. For example, a list of addresses of available endpoints may be stored in a sorted order according to one or more criteria such as, for example, in order of endpoints most recently updated. Upon receiving a connection request, a global lock is acquired, the first endpoint is obtained from the sorted list and assigned to the user, and the list is then updated. The end user is then redirected to the assigned endpoint.
  • In another embodiment, a queuing selection method may be used. In this embodiment, whenever an endpoint is added to the stamp, the endpoint address is added to a queue as many times as the maximum number of sessions. Upon receiving a connection request, an endpoint address is selected from the queue in queued order, the endpoint address is validated to determine that the endpoint is available and accepting connections. Upon verification, the end user is redirected to the endpoint.
  • In another embodiment, a session caching selection method may be used. In this embodiment, when load balancing is initiated, an attempt is made to cache sessions from the endpoints that are available. The maximum number of session is twice the number of concurrent requests that an RDCM instance can process per second. Upon receiving a connection request, an endpoint address from the local cache is retrieved by acquiring a local lock. The endpoint address is assigned to the end user. An attempt is made to span a thread that performs caching when the available session in the cache falls below the minimum cache length, which is the number of concurrent requests that an RDCM instance can process per second. The end user is redirected to the endpoint.
  • In another embodiment, a stateless list selection method may be used. In this embodiment, when an RDCM instance starts, the RDCM chooses a prime number according to the instance ID. A list of all sessions (e.g. [1,2,3,4,5,6,7,8,9,10]) is created. A unique list based on the odd prime number assigned for the instance (e.g., 3) is created by counting with the prime (e.g., [3,6,9,2,7,1,8,5,10,4]). Upon receiving a connection request, the endpoint address is selected from the list and an attempt is made to book the endpoint by updating the table row to booked. If the booking attempt succeeds, then the endpoint is assigned to the user.
  • In various embodiments, a medium threshold endpoint is given priority because of tradeoffs between overall system performance and the objective of strictly minimizing the total number of endpoints. When considering an overall balance between performance and economic factors, it may be preferable to select medium threshold endpoints before selecting high threshold endpoints. High threshold endpoints may be given priority over low threshold endpoints because of the cost of running an endpoint with low utilization coupled with the likelihood that termination of user sessions in a low threshold endpoint may allow for the low threshold endpoint to be freed up and thus shut down.
  • FIG. 15 depicts an exemplary operational procedure for managing a virtualized computing infrastructure including operations 1500, 1502, 1504, 1506, and 1508. Referring to FIG. 15, operation 1500 begins the operational procedure and operation 1502 illustrates receiving a request for a remote desktop session from one of a plurality of users. Each of the remote desktop sessions may comprise an operating environment and software applications to be included in the operating environment. The remote desktop sessions can each correspond to a user role. For example, an administrator can use a user interface to define two desktop environments for a medium sized company. The administrator may define a first desktop environment for engineering staff and may select an operating system and version, an email and calendar application, a browser application, office applications, and a drawing application. The administrator may further specify that up to fifty such desktops may be used at one time. The administrator may also define a second desktop environment for finance staff and may select an operating system and version, an email and calendar application, a browser application, office applications, and a database application. The administrator may further specify that up to twenty-five such desktops may be used at one time. The remote desktop configurations can be accessible via the Internet using a URL. For example, after configuring the desktop environments, the desktop environments may be accessible by the individual users by entering, for example, www.company.com/tech and www.company.com/finance.”
  • Operation 1504 illustrates determining the number of remote desktop sessions hosted by each of a plurality of virtual machines.
  • Operation 1506 illustrates selecting a virtual machine to host the requested remote desktop session in order to increase the number of remote desktop sessions hosted by the virtual machines that currently host a plurality of remote desktop sessions.
  • Operation 1508 illustrates instantiating the requested remote desktop session on the selected virtual machine.
  • FIG. 16 depicts an exemplary system for managing a virtualized computing infrastructure as described above. Referring to FIG. 16, system 1600 comprises a processor 1610 and memory 1620. Memory 1620 further comprises computer instructions configured for managing a virtualized computing infrastructure. Block 1622 illustrates instantiating one or more remote desktop configurations that makes available, to a plurality of users via a remote network connection, remote desktop configurations each comprising an operating environment and software applications to be included in the operating environment. Block 1624 illustrates receiving a request for a remote desktop session from one of the plurality of users, the remote desktop session conforming to one of the one or more remote desktop configurations. Block 1626 illustrates instantiating the requested remote desktop session and loading data and applications associated with the remote desktop session on a computing device selected in accordance with a predetermined load balancing metric.
  • Any of the above mentioned aspects can be implemented in methods, systems, computer readable media, or any type of manufacture. For example, a computer readable medium can store thereon computer executable instructions for managing a virtualized computing infrastructure. Such media can comprise a first subset of instructions for saving, at a first computing data center, a user remote desktop configuration, the user remote desktop configuration including saved state information for an operating environment and software applications executing in the operating environment, the first computing data center configured to provide at least computation and storage services; a second subset of instructions for determining a probable location from which a user will access the user remote desktop configuration; and a third set of instructions for, based on said determining, migrating the saved user remote desktop configuration to a second computing data center and making available, via a remote network connection, the saved user remote desktop configuration to the user from the second computing data center. It will be appreciated by those skilled in the art that additional sets of instructions can be used to capture the various other aspects disclosed herein, and that the three presently disclosed subsets of instructions can vary in detail per the present disclosure.

Claims (20)

1. A method for managing a virtualized computing infrastructure, the method comprising:
receiving a request for a remote desktop session from one of a plurality of users;
determining the number of remote desktop sessions hosted by each of a plurality of virtual machines;
selecting a virtual machine to host the requested remote desktop session in order to increase the number of remote desktop sessions hosted by the virtual machines that currently host a plurality of remote desktop sessions;
instantiating the requested remote desktop session on the selected virtual machine.
2. The method of claim 1, wherein the selected virtual machine is determined by balancing loads among virtual machines such that new user sessions are hosted on computing devices to substantially minimize the total number of virtual machines.
3. The method of claim 2, wherein the selected virtual machine is the virtual machine with the highest number of hosted remote desktop sessions.
4. The method of claim 2, wherein the selected virtual machine is the virtual machine with fewer than the highest number of hosted remote desktop sessions and more than the lowest number of hosted remote desktop sessions.
5. The method of claim 4, further comprising classifying each virtual machine as having one of a low, medium, and high load level, and assigning new user sessions to the computing devices in the order of medium, high, and low.
6. The method of claim 1, wherein said selecting further comprises assigning the remote desktop session to an endpoint according to a random selection method.
7. The method of claim 1, wherein said selecting further comprises assigning the remote desktop session to an endpoint according to one of a round robin, queuing, and session caching selection method.
8. The method of claim 1, wherein the predetermined load balancing metric is determined according to a minimum performance standard.
9. A computing system comprising:
a computing device comprising at least one processor;
a memory communicatively coupled to said processor when said system is operational; said memory having stored therein computer instructions that upon execution by the at least one processor cause:
instantiating one or more remote desktop configurations that makes available, to a plurality of users via a remote network connection, remote desktop configurations each comprising an operating environment and software applications to be included in the operating environment;
receiving a request for a remote desktop session from one of the plurality of users, the remote desktop session conforming to one of the one or more remote desktop configurations; and
instantiating the requested remote desktop session and loading data and applications associated with the remote desktop session on a computing device selected in accordance with a predetermined load balancing metric.
10. The computing system of claim 9, further comprising migrating the data and applications to another computing device in accordance with the predetermined load balancing metric.
11. The computing system of claim 9, wherein the one or more remote desktop configurations each conform to a user configuration template for scalably propagating the one or more remote desktop configurations in a virtualized computing environment.
12. The computing system of claim 9, wherein the metric is determined by balancing loads among computing devices such that new user sessions are hosted on computing devices to substantially minimize the total number of hosting computing devices.
13. The computing system of claim 12, wherein the new user sessions are hosted on an available computing device with the highest number of hosted sessions.
14. The computing system of claim 12, further comprising classifying each computing device as having one of a low, medium, and high load level, and assigning new user sessions to the computing devices in the following order: medium, high, and low.
15. The computing system of claim 14, wherein user sessions hosted on a computing device classified as low are migrated to a computing device classified as high to allow for a shutdown of the computing device classified as low.
16. The computing system of claim 9, wherein said selecting further comprises assigning the remote desktop session to an endpoint according to one of a random, round robin, queuing, and session caching selection method.
17. A computer readable storage medium storing thereon computer executable instructions for providing access to a remote user session in a computing environment, the computer readable storage medium comprising:
instructions for saving, at a first computing data center, a user remote desktop configuration, the user remote desktop configuration including saved state information for an operating environment and software applications executing in the operating environment, the first computing data center configured to provide at least computation and storage services;
instructions for determining a probable location from which a user will access the user remote desktop configuration; and
instructions for based on said determining, migrating the saved user remote desktop configuration to a second computing data center and making available, via a remote network connection, the saved user remote desktop configuration to the user from the second computing data center.
18. The computer readable storage medium of claim 17, wherein the metric is determined by balancing loads among computing devices such that new user sessions are hosted on computing devices to substantially minimize the total number of hosting computing devices.
19. The computer readable storage medium of claim 18, wherein the new user sessions are hosted on an available computing device with the highest number of hosted sessions.
20. The computer readable storage medium of claim 18, further comprising instructions for classifying each computing device as having one of a low, medium, and high load level, and instructions for assigning new user sessions to the computing devices in the following order: medium, high, and low.
US13/232,894 2011-09-14 2011-09-14 Load Balancing By Endpoints Abandoned US20130067469A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US13/232,894 US20130067469A1 (en) 2011-09-14 2011-09-14 Load Balancing By Endpoints
CN201210338804.3A CN102917018B (en) 2011-09-14 2012-09-13 The load balance of end points
US15/862,177 US20180143866A1 (en) 2011-09-14 2018-01-04 Load balancing by endpoints
US16/270,195 US10838775B2 (en) 2011-09-14 2019-02-07 Load balancing by endpoints

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/232,894 US20130067469A1 (en) 2011-09-14 2011-09-14 Load Balancing By Endpoints

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/862,177 Continuation US20180143866A1 (en) 2011-09-14 2018-01-04 Load balancing by endpoints

Publications (1)

Publication Number Publication Date
US20130067469A1 true US20130067469A1 (en) 2013-03-14

Family

ID=47615248

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/232,894 Abandoned US20130067469A1 (en) 2011-09-14 2011-09-14 Load Balancing By Endpoints
US15/862,177 Abandoned US20180143866A1 (en) 2011-09-14 2018-01-04 Load balancing by endpoints
US16/270,195 Active 2031-12-30 US10838775B2 (en) 2011-09-14 2019-02-07 Load balancing by endpoints

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/862,177 Abandoned US20180143866A1 (en) 2011-09-14 2018-01-04 Load balancing by endpoints
US16/270,195 Active 2031-12-30 US10838775B2 (en) 2011-09-14 2019-02-07 Load balancing by endpoints

Country Status (2)

Country Link
US (3) US20130067469A1 (en)
CN (1) CN102917018B (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130239204A1 (en) * 2011-09-15 2013-09-12 Microsoft Corporation Single sign-on for remote desktops
US20140189707A1 (en) * 2012-12-31 2014-07-03 Alcatel-Lucent Usa Inc. Virtual Machine Placement in a Cloud-Based Network
WO2014166603A1 (en) * 2013-04-12 2014-10-16 Alcatel Lucent Flow migration between virtual network appliances in a cloud computing network
US20150007295A1 (en) * 2012-03-19 2015-01-01 Tencent Technology (Shenzhen) Company Limited Biometric-based authentication method, apparatus and system
WO2015023607A1 (en) * 2013-08-12 2015-02-19 Amazon Technologies, Inc. Request processing techniques
US20150089114A1 (en) * 2013-09-24 2015-03-26 Seiko Epson Corporation Communication device
EP2854370A1 (en) * 2013-09-30 2015-04-01 Fujitsu Limited Computing device, method, and program for distributing computational load
CN104601367A (en) * 2014-12-05 2015-05-06 国云科技股份有限公司 AD domain based virtual desktop management method
US9232000B1 (en) 2012-12-21 2016-01-05 Emc Corporation Method and system for balancing load across target endpoints on a server and initiator endpoints accessing the server
US9237057B1 (en) 2012-12-21 2016-01-12 Emc Corporation Reassignment of a virtual connection from a busiest virtual connection or locality domain to a least busy virtual connection or locality domain
US9270786B1 (en) 2012-12-21 2016-02-23 Emc Corporation System and method for proxying TCP connections over a SCSI-based transport
EP3014440A1 (en) * 2013-06-27 2016-05-04 Microsoft Technology Licensing, LLC Endpoint data centers of different tenancy sets
US9348634B2 (en) 2013-08-12 2016-05-24 Amazon Technologies, Inc. Fast-booting application image using variation points in application source code
US9354940B2 (en) * 2012-01-19 2016-05-31 Microsoft Technology Licensing, Llc Provisioning tenants to multi-tenant capable services
US20160173636A1 (en) * 2014-12-16 2016-06-16 Cisco Technology, Inc. Networking based redirect for cdn scale-down
US9407601B1 (en) 2012-12-21 2016-08-02 Emc Corporation Reliable client transport over fibre channel using a block device access model
US9473590B1 (en) 2012-12-21 2016-10-18 Emc Corporation Client connection establishment over fibre channel using a block device access model
US9473591B1 (en) 2012-12-21 2016-10-18 Emc Corporation Reliable server transport over fibre channel using a block device access model
US9473589B1 (en) 2012-12-21 2016-10-18 Emc Corporation Server communication over fibre channel using a block device access model
US9509797B1 (en) 2012-12-21 2016-11-29 Emc Corporation Client communication over fibre channel using a block device access model
US9514151B1 (en) 2012-12-21 2016-12-06 Emc Corporation System and method for simultaneous shared access to data buffers by two threads, in a connection-oriented data proxy service
US9531765B1 (en) 2012-12-21 2016-12-27 Emc Corporation System and method for maximizing system data cache efficiency in a connection-oriented data proxy service
US9563423B1 (en) 2012-12-21 2017-02-07 EMC IP Holding Company LLC System and method for simultaneous shared access to data buffers by two threads, in a connection-oriented data proxy service
EP3014434A4 (en) * 2013-06-26 2017-02-22 Amazon Technologies Inc. Management of computing sessions
US9591099B1 (en) 2012-12-21 2017-03-07 EMC IP Holding Company LLC Server connection establishment over fibre channel using a block device access model
US9647905B1 (en) 2012-12-21 2017-05-09 EMC IP Holding Company LLC System and method for optimized management of statistics counters, supporting lock-free updates, and queries for any to-the-present time interval
US20170155672A1 (en) * 2015-11-30 2017-06-01 International Business Machines Corporation User state tracking and anomaly detection in software-as-a-service environments
US9705755B1 (en) 2013-08-14 2017-07-11 Amazon Technologies, Inc. Application definition deployment with request filters employing base groups
US9712427B1 (en) * 2012-12-21 2017-07-18 EMC IP Holding Company LLC Dynamic server-driven path management for a connection-oriented transport using the SCSI block device model
EP3069263A4 (en) * 2013-11-11 2017-07-26 Amazon Technologies Inc. Session idle optimization for streaming server
US20180217850A1 (en) * 2017-01-30 2018-08-02 Citrix Systems, Inc. Computer system providing cloud-based session prelaunch features and related methods
US10097596B2 (en) 2013-11-11 2018-10-09 Amazon Technologies, Inc. Multiple stream content presentation
WO2018164919A3 (en) * 2017-03-08 2018-10-18 Microsoft Technology Licensing, Llc Replicating storage tables used to manage cloud-based resources to withstand storage account outage
CN108809935A (en) * 2018-04-20 2018-11-13 国网江西省电力有限公司信息通信分公司 A kind of cloud environment or the safety access control method under virtual environment and device
US10142406B2 (en) 2013-03-11 2018-11-27 Amazon Technologies, Inc. Automated data center selection
US10257266B2 (en) 2013-11-11 2019-04-09 Amazon Technologies, Inc. Location of actor resources
CN109643249A (en) * 2016-08-09 2019-04-16 阿尔卡特朗讯 The method of network is electrically accessed and for the method for calibration software component for managing virtual radio
US10313345B2 (en) 2013-03-11 2019-06-04 Amazon Technologies, Inc. Application marketplace for virtual desktops
US10315110B2 (en) 2013-11-11 2019-06-11 Amazon Technologies, Inc. Service for generating graphics object data
US10346148B2 (en) 2013-08-12 2019-07-09 Amazon Technologies, Inc. Per request computer system instances
US10374928B1 (en) 2013-11-11 2019-08-06 Amazon Technologies, Inc. Efficient bandwidth estimation
US10476773B2 (en) 2015-10-21 2019-11-12 Microsoft Technology Licensing, Llc Substituting window endpoints using a health monitor
US10554653B2 (en) * 2014-08-11 2020-02-04 Vivint, Inc. One-time access to an automation system
US10601885B2 (en) 2013-11-11 2020-03-24 Amazon Technologies, Inc. Adaptive scene complexity based on service quality
US10616129B2 (en) 2013-03-11 2020-04-07 Amazon Technologies, Inc. Automated desktop placement
US10623243B2 (en) 2013-06-26 2020-04-14 Amazon Technologies, Inc. Management of computing sessions
US10831466B2 (en) 2017-03-29 2020-11-10 International Business Machines Corporation Automatic patch management
US10904350B1 (en) * 2017-07-13 2021-01-26 Parallels International Gmbh High availability virtual desktop infrastructure
US20210097158A1 (en) * 2018-01-17 2021-04-01 Samsung Electronics Co., Ltd. Method and electronic device for authenticating user by using voice command
US11089088B2 (en) 2011-09-14 2021-08-10 Microsoft Technology Licensing, Llc Multi tenancy for single tenancy applications
US11579830B2 (en) * 2018-10-31 2023-02-14 International Business Machines Corporation Displaying a window of a remote desktop computer on a mobile device with a native layout
US11621994B2 (en) * 2018-01-08 2023-04-04 Hewlett-Packard Development Company, L.P. Brokering servers based on remote access performance

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853616B (en) * 2014-02-20 2016-10-26 福建升腾资讯有限公司 A kind of realize the method that cloud computing virtual desktop is automatically switched off and discharges hardware resource
US9928093B2 (en) * 2015-02-24 2018-03-27 Red Hat Israel, Ltd. Methods and systems for establishing connections associated with virtual machine migrations
US11500685B2 (en) * 2018-07-24 2022-11-15 Citrix Systems, Inc. Mixed instance catalogs
US11782881B2 (en) * 2018-12-05 2023-10-10 Vmware, Inc. Recommending remotely executed applications for opening files
CN110365684B (en) * 2019-07-17 2022-02-22 中国工商银行股份有限公司 Access control method and device for application cluster and electronic equipment
CN111092944B (en) * 2019-12-13 2022-08-05 浪潮(北京)电子信息产业有限公司 Connection session number control method, device, equipment and storage medium
US20210255884A1 (en) * 2020-02-19 2021-08-19 Citrix Systems, Inc. Migration of a desktop workload
US11924089B2 (en) * 2022-01-31 2024-03-05 Microsoft Technology Licensing, Llc Convergence for time sensitive cloud applications
US11799971B2 (en) 2022-02-17 2023-10-24 Bank Of America Corporation Systems and methods for session migration between devices

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020198991A1 (en) * 2001-06-21 2002-12-26 International Business Machines Corporation Intelligent caching and network management based on location and resource anticipation
US20080104608A1 (en) * 2006-10-27 2008-05-01 Hyser Chris D Starting up at least one virtual machine in a physical machine by a load balancer
US20090282132A1 (en) * 2008-05-06 2009-11-12 Vasileios Pappas Method and system for self-organizing computer systems
US20100325284A1 (en) * 2009-06-22 2010-12-23 Red Hat Israel, Ltd. Method for automatically providing a client with access to an associated virtual machine
US20110022812A1 (en) * 2009-05-01 2011-01-27 Van Der Linden Rob Systems and methods for establishing a cloud bridge between virtual storage resources
US20110161957A1 (en) * 2009-12-31 2011-06-30 Microsoft Corporation Virtualized Eco-Friendly Remote Presentation Session Role
US20120089980A1 (en) * 2010-10-12 2012-04-12 Richard Sharp Allocating virtual machines according to user-specific virtual machine metrics
US20120117563A1 (en) * 2010-11-04 2012-05-10 Yuh-Jye Chang Overload control in a cloud computing environment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101739282B (en) * 2008-11-18 2013-06-12 华为技术有限公司 Method, device and system for managing virtual machine
US20120005675A1 (en) 2010-01-22 2012-01-05 Brutesoft, Inc. Applying peer-to-peer networking protocols to virtual machine (vm) image management
US9130912B2 (en) * 2010-03-05 2015-09-08 International Business Machines Corporation System and method for assisting virtual machine instantiation and migration
CN102096461B (en) * 2011-01-13 2013-06-19 浙江大学 Energy-saving method of cloud data center based on virtual machine migration and load perception integration
CN102096601A (en) * 2011-02-11 2011-06-15 浪潮(北京)电子信息产业有限公司 Virtual machine migration management method and system
CN102110014A (en) * 2011-03-15 2011-06-29 合肥华云通信技术有限公司 Method for balancing loads of virtual machine (VM)

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020198991A1 (en) * 2001-06-21 2002-12-26 International Business Machines Corporation Intelligent caching and network management based on location and resource anticipation
US20080104608A1 (en) * 2006-10-27 2008-05-01 Hyser Chris D Starting up at least one virtual machine in a physical machine by a load balancer
US20090282132A1 (en) * 2008-05-06 2009-11-12 Vasileios Pappas Method and system for self-organizing computer systems
US20110022812A1 (en) * 2009-05-01 2011-01-27 Van Der Linden Rob Systems and methods for establishing a cloud bridge between virtual storage resources
US20100325284A1 (en) * 2009-06-22 2010-12-23 Red Hat Israel, Ltd. Method for automatically providing a client with access to an associated virtual machine
US20110161957A1 (en) * 2009-12-31 2011-06-30 Microsoft Corporation Virtualized Eco-Friendly Remote Presentation Session Role
US20120089980A1 (en) * 2010-10-12 2012-04-12 Richard Sharp Allocating virtual machines according to user-specific virtual machine metrics
US20120117563A1 (en) * 2010-11-04 2012-05-10 Yuh-Jye Chang Overload control in a cloud computing environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Posey; How to deploy personal virtual desktop, searchvirtualdesktop.techtarget.com, April 2010 *

Cited By (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11089088B2 (en) 2011-09-14 2021-08-10 Microsoft Technology Licensing, Llc Multi tenancy for single tenancy applications
US8856917B2 (en) * 2011-09-15 2014-10-07 Microsoft Corporation Single sign-on for remote desktops
US20130239204A1 (en) * 2011-09-15 2013-09-12 Microsoft Corporation Single sign-on for remote desktops
US9354940B2 (en) * 2012-01-19 2016-05-31 Microsoft Technology Licensing, Llc Provisioning tenants to multi-tenant capable services
US20190012450A1 (en) * 2012-03-19 2019-01-10 Tencent Technology (Shenzhen) Company Limited Biometric-based authentication method, apparatus and system
US10108792B2 (en) * 2012-03-19 2018-10-23 Tencent Technology (Shenzhen) Company Limited Biometric-based authentication method, apparatus and system
US20150007295A1 (en) * 2012-03-19 2015-01-01 Tencent Technology (Shenzhen) Company Limited Biometric-based authentication method, apparatus and system
US10664581B2 (en) * 2012-03-19 2020-05-26 Tencent Technology (Shenzhen) Company Limited Biometric-based authentication method, apparatus and system
US9270786B1 (en) 2012-12-21 2016-02-23 Emc Corporation System and method for proxying TCP connections over a SCSI-based transport
US9473589B1 (en) 2012-12-21 2016-10-18 Emc Corporation Server communication over fibre channel using a block device access model
US9237057B1 (en) 2012-12-21 2016-01-12 Emc Corporation Reassignment of a virtual connection from a busiest virtual connection or locality domain to a least busy virtual connection or locality domain
US9563423B1 (en) 2012-12-21 2017-02-07 EMC IP Holding Company LLC System and method for simultaneous shared access to data buffers by two threads, in a connection-oriented data proxy service
US9531765B1 (en) 2012-12-21 2016-12-27 Emc Corporation System and method for maximizing system data cache efficiency in a connection-oriented data proxy service
US9647905B1 (en) 2012-12-21 2017-05-09 EMC IP Holding Company LLC System and method for optimized management of statistics counters, supporting lock-free updates, and queries for any to-the-present time interval
US9514151B1 (en) 2012-12-21 2016-12-06 Emc Corporation System and method for simultaneous shared access to data buffers by two threads, in a connection-oriented data proxy service
US9509797B1 (en) 2012-12-21 2016-11-29 Emc Corporation Client communication over fibre channel using a block device access model
US9232000B1 (en) 2012-12-21 2016-01-05 Emc Corporation Method and system for balancing load across target endpoints on a server and initiator endpoints accessing the server
US9712427B1 (en) * 2012-12-21 2017-07-18 EMC IP Holding Company LLC Dynamic server-driven path management for a connection-oriented transport using the SCSI block device model
US9407601B1 (en) 2012-12-21 2016-08-02 Emc Corporation Reliable client transport over fibre channel using a block device access model
US9473590B1 (en) 2012-12-21 2016-10-18 Emc Corporation Client connection establishment over fibre channel using a block device access model
US9473591B1 (en) 2012-12-21 2016-10-18 Emc Corporation Reliable server transport over fibre channel using a block device access model
US9591099B1 (en) 2012-12-21 2017-03-07 EMC IP Holding Company LLC Server connection establishment over fibre channel using a block device access model
US9286134B2 (en) * 2012-12-31 2016-03-15 Alcatel Lucent Virtual machine placement in a cloud-based network
US20140189707A1 (en) * 2012-12-31 2014-07-03 Alcatel-Lucent Usa Inc. Virtual Machine Placement in a Cloud-Based Network
US10616129B2 (en) 2013-03-11 2020-04-07 Amazon Technologies, Inc. Automated desktop placement
US10142406B2 (en) 2013-03-11 2018-11-27 Amazon Technologies, Inc. Automated data center selection
US10313345B2 (en) 2013-03-11 2019-06-04 Amazon Technologies, Inc. Application marketplace for virtual desktops
US9934059B2 (en) 2013-04-12 2018-04-03 Wsou Investments, Llc Flow migration between virtual network appliances in a cloud computing network
WO2014166603A1 (en) * 2013-04-12 2014-10-16 Alcatel Lucent Flow migration between virtual network appliances in a cloud computing network
EP3014434A4 (en) * 2013-06-26 2017-02-22 Amazon Technologies Inc. Management of computing sessions
KR20180135124A (en) * 2013-06-26 2018-12-19 아마존 테크놀로지스, 인크. Management of computing sessions
KR102027929B1 (en) * 2013-06-26 2019-10-02 아마존 테크놀로지스, 인크. Management of computing sessions
US10623243B2 (en) 2013-06-26 2020-04-14 Amazon Technologies, Inc. Management of computing sessions
EP3014440A1 (en) * 2013-06-27 2016-05-04 Microsoft Technology Licensing, LLC Endpoint data centers of different tenancy sets
US11093270B2 (en) 2013-08-12 2021-08-17 Amazon Technologies, Inc. Fast-booting application image
WO2015023607A1 (en) * 2013-08-12 2015-02-19 Amazon Technologies, Inc. Request processing techniques
US9766921B2 (en) 2013-08-12 2017-09-19 Amazon Technologies, Inc. Fast-booting application image using variation points in application source code
US9348634B2 (en) 2013-08-12 2016-05-24 Amazon Technologies, Inc. Fast-booting application image using variation points in application source code
US10509665B2 (en) 2013-08-12 2019-12-17 Amazon Technologies, Inc. Fast-booting application image
US11068309B2 (en) 2013-08-12 2021-07-20 Amazon Technologies, Inc. Per request computer system instances
US9280372B2 (en) 2013-08-12 2016-03-08 Amazon Technologies, Inc. Request processing techniques
US10353725B2 (en) 2013-08-12 2019-07-16 Amazon Technologies, Inc. Request processing techniques
US10346148B2 (en) 2013-08-12 2019-07-09 Amazon Technologies, Inc. Per request computer system instances
US9705755B1 (en) 2013-08-14 2017-07-11 Amazon Technologies, Inc. Application definition deployment with request filters employing base groups
US20150089114A1 (en) * 2013-09-24 2015-03-26 Seiko Epson Corporation Communication device
EP2854370A1 (en) * 2013-09-30 2015-04-01 Fujitsu Limited Computing device, method, and program for distributing computational load
US9521191B2 (en) 2013-09-30 2016-12-13 Fujitsu Limited Computing device, method, and program for distributing computational load
US9805479B2 (en) 2013-11-11 2017-10-31 Amazon Technologies, Inc. Session idle optimization for streaming server
EP3069263A4 (en) * 2013-11-11 2017-07-26 Amazon Technologies Inc. Session idle optimization for streaming server
US10315110B2 (en) 2013-11-11 2019-06-11 Amazon Technologies, Inc. Service for generating graphics object data
US10257266B2 (en) 2013-11-11 2019-04-09 Amazon Technologies, Inc. Location of actor resources
US10347013B2 (en) 2013-11-11 2019-07-09 Amazon Technologies, Inc. Session idle optimization for streaming server
US10778756B2 (en) 2013-11-11 2020-09-15 Amazon Technologies, Inc. Location of actor resources
US10374928B1 (en) 2013-11-11 2019-08-06 Amazon Technologies, Inc. Efficient bandwidth estimation
US10601885B2 (en) 2013-11-11 2020-03-24 Amazon Technologies, Inc. Adaptive scene complexity based on service quality
US10097596B2 (en) 2013-11-11 2018-10-09 Amazon Technologies, Inc. Multiple stream content presentation
US10554653B2 (en) * 2014-08-11 2020-02-04 Vivint, Inc. One-time access to an automation system
CN104601367A (en) * 2014-12-05 2015-05-06 国云科技股份有限公司 AD domain based virtual desktop management method
US20160173636A1 (en) * 2014-12-16 2016-06-16 Cisco Technology, Inc. Networking based redirect for cdn scale-down
US10476773B2 (en) 2015-10-21 2019-11-12 Microsoft Technology Licensing, Llc Substituting window endpoints using a health monitor
US10200387B2 (en) * 2015-11-30 2019-02-05 International Business Machines Corporation User state tracking and anomaly detection in software-as-a-service environments
US20170155672A1 (en) * 2015-11-30 2017-06-01 International Business Machines Corporation User state tracking and anomaly detection in software-as-a-service environments
CN109643249A (en) * 2016-08-09 2019-04-16 阿尔卡特朗讯 The method of network is electrically accessed and for the method for calibration software component for managing virtual radio
US20180217850A1 (en) * 2017-01-30 2018-08-02 Citrix Systems, Inc. Computer system providing cloud-based session prelaunch features and related methods
US10860342B2 (en) * 2017-01-30 2020-12-08 Citrix Systems, Inc. Computer system providing cloud-based session prelaunch features and related methods
US10936576B2 (en) 2017-03-08 2021-03-02 Microsoft Technology Licensing, Llc Replicating storage tables used to manage cloud-based resources to withstand storage account outage
WO2018164919A3 (en) * 2017-03-08 2018-10-18 Microsoft Technology Licensing, Llc Replicating storage tables used to manage cloud-based resources to withstand storage account outage
US10831466B2 (en) 2017-03-29 2020-11-10 International Business Machines Corporation Automatic patch management
US10904350B1 (en) * 2017-07-13 2021-01-26 Parallels International Gmbh High availability virtual desktop infrastructure
US11356527B1 (en) 2017-07-13 2022-06-07 Parallels International Gmbh High availability virtual desktop infrastructure
US11870866B1 (en) * 2017-07-13 2024-01-09 Parallels International Gmbh High availability virtual desktop infrastructure
US11621994B2 (en) * 2018-01-08 2023-04-04 Hewlett-Packard Development Company, L.P. Brokering servers based on remote access performance
US20210097158A1 (en) * 2018-01-17 2021-04-01 Samsung Electronics Co., Ltd. Method and electronic device for authenticating user by using voice command
CN108809935A (en) * 2018-04-20 2018-11-13 国网江西省电力有限公司信息通信分公司 A kind of cloud environment or the safety access control method under virtual environment and device
US11579830B2 (en) * 2018-10-31 2023-02-14 International Business Machines Corporation Displaying a window of a remote desktop computer on a mobile device with a native layout

Also Published As

Publication number Publication date
US20180143866A1 (en) 2018-05-24
US10838775B2 (en) 2020-11-17
CN102917018A (en) 2013-02-06
US20190171491A1 (en) 2019-06-06
CN102917018B (en) 2016-06-15

Similar Documents

Publication Publication Date Title
US10838775B2 (en) Load balancing by endpoints
US20210409483A1 (en) Multi tenancy for single tenancy applications
US9807153B2 (en) Managing user state of cloud desktops
US8856917B2 (en) Single sign-on for remote desktops
US9361080B2 (en) Multi tenant access to applications
US20130067345A1 (en) Automated Desktop Services Provisioning
US20130074064A1 (en) Automated infrastructure provisioning
US20130073670A1 (en) Geo-Migration Of User State
US9069438B2 (en) Allocating virtual machines according to user-specific virtual machine metrics
US9710297B2 (en) Dynamic allocation and assignment of virtual environment
US20150113528A1 (en) Virtual desktop service apparatus and method
US20130007737A1 (en) Method and architecture for virtual desktop service
US11442781B2 (en) Master image for deploying workloads in a heterogeneous computing environment
CN108293047B (en) System and method for accessing resources by a user across multiple distributed computing networks
US20190327310A1 (en) Efficient approach for achieving session failover for http traffic in a scale out web tier using a shared salt
US11632432B2 (en) Dynamic overflow processing in a multi-user computing environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DAS, MANUVIR;YADAV, SUDARSHAN;KANDHARE, ARVIND;AND OTHERS;SIGNING DATES FROM 20110913 TO 20110914;REEL/FRAME:026905/0967

AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE MISSPELLING OF INVENTOR, JAYARAMAN THIAGARAJAN'S LAST NAME, PREVIOUSLY RECORDED ON REEL 026905 FRAME 0967. ASSIIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT OF THE ENTIRE AND EXCLUSIVE RIGHTS, TITLE AND INTEREST;ASSIGNOR:THIAGARAJAN, JAYARAMAN;REEL/FRAME:027650/0152

Effective date: 20111129

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034544/0001

Effective date: 20141014

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE