A Systematic Quality Analysis of Virtual Desktop Infrastructure Technologies

  • Arman Sheikholeslami
  • Kalman GraffiEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9523)


The Virtual Desktop Infrastructure is a promising technology hosted by powerful servers or within the cloud that allows remote and potentially weak devices to run their virtualized desktop environment on a powerful machine. Mainly used in commercial environments, i.e. enterprises, also private users might be interested in this functionality. The benefits are given through customizable (virtual) hardware resources on the fly while maintaining a long lasting desktop environment. Hardware failures, resource limitations and risks due to damages to the physical hardware are omitted with desktops running upon a Virtual Desktop Infrastructure. Currently, many Virtual Desktop Infrastructure solutions are available, most important of which are XenDesktop by Citrix, Horizon View by VMware, and VDI by Microsoft. In this article, we deploy and systematically evaluate the quality of these solutions in terms of streaming quality under the workload of popular application types and under the influence of various network conditions. We conclude that XenDesktop by Citrix is performing best, Horizon View by VMware is close, but provides less features, while VDI by Microsoft is both limited in its quality and its functionality.


Virtual Machine Frame Rate Network Quality Network Factor Horizon View 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
  2. 2.
    Recession Is Good For Cloud Computing Microsoft Agrees.
  3. 3.
    Gong, C., Liu, J., Zhang, Q., Chen, H., Gong, Z.: The characteristics of cloud computing. In: International Conference on Parallel Processing Workshops (ICPPW) (2010)Google Scholar
  4. 4.
    Graffi, K., Groß, C., Stingl, D., Nguyen, H., Kovacevic, A., Steinmetz, R.: Towards a P2P cloud: reliable resource reservations in unreliable P2P systems. In: International Conference on Parallel and Distributed Systems (ICPADS) (2010)Google Scholar
  5. 5.
    Kaufman, L.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)CrossRefGoogle Scholar
  6. 6.
    Kovacevic, A., Graffi, K., Kaune, S., Leng, C., Steinmetz, R.: Towards benchmarking of structured peer-to-peer overlays for network virtual environments. In: IEEE International Conference on Parallel and Distributed Systems (ICPADS) (2008)Google Scholar
  7. 7.
    Liebau, N., Pussep, K., Graffi, K., Kaune, S., Jahn, E., Beyer, A., Steinmetz, R.: The impact of the P2P paradigm on the new media industries. In: Americas Conference on Information Systems (AMCIS) (2007)Google Scholar
  8. 8.
    Oestreich, K.: Converged infrastructure. In: CTO Forum, vol. 15, November 2010Google Scholar
  9. 9.
    Sierra, S.: The Three Types of Computer User. Digital Digressions (2006).
  10. 10.
    Simmhan, Y., Kumbhare, A.G., Cao, B., Prasanna, V.K.: An analysis of security and privacy issues in smart grid software architectures on clouds. In: IEEE International Conference on Cloud Computing, CLOUD, pp. 582–589 (2011)Google Scholar
  11. 11.
    Ventresco, J.: Implementing VMware Horizon View 5.2. Packt Publishing, Birmingham (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.University of PaderbornPaderbornGermany
  2. 2.Technology of Social Networks LabUniversity of DüsseldorfDüsseldorfGermany

Personalised recommendations