No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

FusionAccess Desktop Solution V100R006C20 Application Virtualization User Guide 08 (FusionSphere V100R006C10 or Earlier)

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Application Scenarios

Application Scenarios

Application virtualization applies to the following scenarios:

  • Common office

    In this scenario, computers are used for routine work and installing common OA software. If common virtual desktops or PCs are deployed in this scenario, users use only some capabilities of virtual desktops and PCs, causing resource waste and increasing costs. Deployment of shared desktops or remote applications can greatly reduce hardware and OS investment of customers.

    Application virtualization applies to the following common office scenarios:

    • Remote application
      • Task-based scenario: Users use centrally deployed OA, Notes, and other service systems through the Intranet or Internet without installing related software on their terminals.
      • Dual-network isolation: When users need to access the extranet from the intranet, browsers are published on the application virtualization platform, and all access operations to the extranet are performed on the application virtualization platform. Users do not have permission to access the extranet from their terminals, ensuring user data security.
    • Shared desktop
      • Branch office: Users use OA, Notes, and other service systems deployed at the headquarters through the Intranet or Internet without installing related software on their terminals.
      • Centralized O&M: O&M personnel use centrally deployed client software, such as Web and PL SQL, through the intranet.
  • Mobile office

    With the development of wireless networks and wide use of intelligent mobile terminals, the method of bring your own device (BYOD) helps employees to improve work efficiency. Employees can use mobile terminals to process anything related to services anytime and anywhere. In this way, employees can work without restrictions of time and space, which facilitates work and improves work efficiency.

Figure 1-2 shows the typical networking for mobile office.

Figure 1-2 Typical networking for mobile office
Two solutions are provided for mobile office scenarios:
  • Traditional mobile office solution

    The traditional mobile office solution adapts the existing application systems of customers to mobile terminals through middleware, to ensure that the mobile terminals provide the same functions as the existing application systems.

  • Desktop cloud-based mobile office solution

    Users can access the desktop cloud using mobile terminals through the 3G, Long Term Evolution (LTE), or WiFi network outside the office. Users can log in to VMs remotely. Users can also directly use published applications, such as, Microsoft Word and PowerPoint, without logging in to the VMs.

    Huawei desktop cloud can be accessed from a variety of mobile devices, including laptops, tablets, and mobile phones. This solution enables seamless access anytime and anywhere to improve work efficiency. Portable terminals support the following OSs: Android and iOS

Table 1-2 provides comparisons between the two mobile office solutions.
Table 1-2 Comparisons between two mobile office solutions

Item

Traditional Mobile Office Solution

Desktop Cloud-based Mobile Office Solution

Information security

Poor information security: Key data disclosure easily occurs. The information is transmitted over public networks and easy to be intercepted. Besides, user behavior is difficult to be monitored.

High information security: This solution ensures network security and data security by centrally managing applications.

Costs

High costs: Terminals are diversified, which costs a lot to migrate applications to mobile terminals.

Low costs: This solution has no adverse impact on the existing OA systems, and secondary development or adaptation is not required. Fixed and mobile offices share an OA system to reduce resources.

User experience

  • Diversified terminals: The office system is developed based on the Windows OS of PCs.
  • Weak processing capability of mobile terminals: Mobile terminals are portable and powered by batteries, but the mobile terminals are weak in processing data.
  • High bandwidth usage: A large amount of data are required during search in the information system especially in the 3G environment.

Optimal user experience: This solution supports quick application response, which does not rely on the processing capability of terminals. The processing capability of the desktop cloud center is used to improve processing efficiency and user experience.

Management capability

Inefficient management: This solution does not support centralized management.

Efficient management: This solution supports centralized desktop and application deployment, authorization, delivery, and monitoring.

Download
Updated: 2019-04-25

Document ID: EDOC1000182383

Views: 13149

Downloads: 56

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next