1.0 Intelligent Campus Network Solution
2.0 IDC Data Center Network Solution
3.0 Enterprise Cloud Solutions
4.0 Overall Information Security Solution
- 4.1 Exit Security Application Solutions
- 4.2 Branch and Mobile Internet Application Solutions
- 4.3 Data Center Security Solutions
- 4.4 Level Protection Comprehensive Solution
- 4.5 Disaster Recovery and Backup Integrated Solution
- 4.0 Overall Information Security Solution
- 4.6 CDP Local Disaster Recovery Solution
- 4.7 Dual-System Disaster Recovery Shared Storage Hot Standby Solution
- 4.8 Mirrored Hot Standby Solution for Dual-machine Disaster Recovery
- 4.9 Desktop Access Scheme
- 4.10 Anti-disclosure security management system for electronic documents
- 4.11 Email Security Overall Solution
5.0 Smart Wireless Total Solution
- 5.1 Cloud wireless solution
- 5.2 Application authentication access solution
- 5.0 Smart Wireless Total Solution
- 5.3 Smart Business Circle Solution
- 5.4 Wireless bridging solution
- 5.5 Elevator Wireless Coverage Solution
- 5.6 Hotel wireless coverage solution
- 5.7 Smart Campus Wireless Solution
- 5.8 Hospital Wireless Solution
- 5.9 Wireless retail solutions for malls
6.0 HD Video Conference Solution
7.0 IDC Computer Room Construction Solution
8.0 Intelligent Weak Current Solution
9.0 Intelligent Building Solution
10.0 Intelligent Management Center Overall Solution
Chapter 1 Project construction goals
With the continuous increase of business systems, the challenges facing enterprises:
Client application deployment and maintenance require significant time and labor.
As a large amount of data is transmitted on the network, data security faces challenges.
Limited by bandwidth factors, remotely connected users cannot flexibly and efficiently access enterprise applications.
IT 环境，使员工能够 方便，安全，快速的使用业务系统。 Therefore, enterprises urgently need to build a system that saves a lot of manpower and financial resources in the management and delivery of business systems, to help users build a more secure and standardized IT environment, and to enable employees to use business systems conveniently, safely, and quickly.
Enhance security with centralized control and secure access to data.
All R & D environment and desk-generated data are strictly controlled, and data flow is controlled by policies to ensure the core data security of the enterprise
R & D personnel and office machines all provide standard operating system images from the background. Maintenance and update work need only be easily implemented in the background.
USB 设备，打印机的使用权限等 Permission control according to different positions of employees, different people can access different applications, including data upload and download, local hard disk, USB device, printer use permissions, etc.
After the system deployment is completed, we will provide comprehensive after-sales support to provide customers with long-term technical support services to ensure the stable operation of the cloud computing platform. In terms of goals, high-quality after-sales service can ensure that the system's own value is fully exerted, and that it can be smoothly upgraded and transformed after the end of the system cycle.
IT 基础设施，帮助企业获得更大的投资回报率，让企业真正理解 IT 基础架构的核心价值，让 IT 系统服务于员工，扩展总体生产力。 Therefore, whether it is a system goal or a business goal, our goal is to help enterprises optimize the IT infrastructure of their security system , help enterprises to obtain a greater return on investment, let enterprises truly understand the core value of IT infrastructure, and let IT systems Serve employees and expand overall productivity.
1 Desktop Cloud Platform
Since this solution is based on the functions provided by the cloud desktop itself, this section lists the corresponding functions of each cloud desktop.
1.1 Centralized management
The enterprise desktop in the centralized deployment mode will be deployed in the data center. Because the client and server are located in the same local area network, application performance and security are improved, and users can access the data center through any terminal and any network, which is very convenient;
The enterprise only needs to manage the data center in the LAN, which simplifies the management and maintenance. Desktop installation and configuration changes can be centralized on the server side, greatly simplifying the configuration and deployment of the office environment.
1.2 Desktop Delivery Technology
Through desktop delivery technology, you can meet all the needs of different types of users, while meeting the performance, security and flexibility requirements, so as to provide the best desktop to each user at a time.
1.3 Storage isolation
Cloud Desktop chooses NTFS file system and Windows Server user profile mechanism, each user can have its own storage space. Utilizing NTFS's file permission management mechanism, the user's private storage space, working directory, and temporary files on the server can be safely managed and restricted. You can restrict users' cross-access to other user data. It can also give specific administrators access to and access to user data.
At the same time, you can configure folder redirection for Windows Server to redirect directories such as My Documents to a centralized file server, thereby ensuring that users can access their user data consistently regardless of which server they log in to.
1.4 Horizontal expansion
Cloud desktops usually support the cluster function. After the cluster meets the current use in the server configuration, when the size of the office system is expanded in the future, you can easily expand horizontally by adding new servers to the desktop cluster.
1.5 Open architecture
Supports any server virtualization architecture, any storage platform, any terminal device, and integration with Microsoft infrastructure.
chapter 2 Solution design and architecture planning
1 Realize the vision
企业 建立一套合理、完善、高效，安全的应用程序虚拟化解决方案 , 除了以上介绍的建设目标之外，我们还希望能够帮助 企业 逐步了解应用虚拟化的核心价值，优化并完善企业 IT 基础架构，确保客户能够在日益激烈的商业竞争中获得进步。 Our goal is to help enterprises build a reasonable, complete, efficient, and secure application virtualization solution . In addition to the construction goals introduced above, we also hope to help companies gradually understand the core value of application virtualization, optimize and Improve enterprise IT infrastructure to ensure that customers can make progress in increasingly fierce business competition.
所示： Based on the enterprise's existing architecture, our recommended deployment architecture is shown below:
In this solution architecture, a desktop cloud platform is set up to publish virtual desktops, and work by logging into the virtual desktops. All operations are performed in the virtual desktops. User files are saved on the file server through redirection.
With such a deployment structure, the performance of end users accessing applications depends on the server computing capacity and the internal network of the data center, and no longer depends on the WAN and terminal equipment. Therefore, by configuring a high-performance central server, remote users can be made as if they were in a local area network Use the application system.
3 Solution Revenue Analysis
3.1 Enhanced security
面的操作系统是置 于数据中心，相对于传统的 PC ，不易遭受恶意攻击。 The operating system of the virtual desktop is placed in the data center, which is less vulnerable to malicious attacks than traditional PCs .
Windows 映像进行安装。 Security patches can be installed in data centers with only standard Windows images.
“ 瘦设备 ” 代替时，它可以通过禁止使用如 USB 等可移动存储设备，降低使用者偷取信息和导入计算机病毒的可能。 When desktop hardware is replaced by other " thin devices " , it can reduce the possibility of users stealing information and introducing computer viruses by banning the use of removable storage devices such as USB .
Information is stored in the data center to ensure the security of the data;
3.2 Reduce total cost of ownership
IT 相关的主要成本项集中在如下几个方面： At present , the major IT- related cost items are concentrated in the following areas:
Personal computer (including hardware, operating system, software licensing and support)
Application maintenance (maintenance of personal computers and applications)
Network and secure access
Loss of productivity (due to server, personal computer and network failures)
25% ，而生产力损失和培训一般称为软成本，企业可能不计算在 IT 成本里，但数据显示企业在部署应用时，同样应考虑软成本上的节省： The cloud desktop centralized deployment model brings users greater savings in application maintenance and investment in personal computers. In the first year after the implementation of centralized deployment, it can save 25% on hardware investment. Training is generally referred to as soft costs. Enterprises may not count IT costs, but the data shows that when deploying applications, companies should also consider savings in soft costs:
25% Simplified deployment and support by 25%
21% Centralized management capability 21%
15% Reduced costs by 15%
Detailed description of cost items
Human resource cost
Employee wages, working days of the year
Number, type and cost of personal computers, laptops and terminals in use
Number and types of applications in use
Cross-platform application access
Number of users requiring cross-platform access
Network and remote secure access
Remote users secure access including partners
Technical Support Services
Manpower and time required to support users
Operating system upgrades and maintenance
Takes time for application inspection and testing
Server hardware costs and maintenance
Backup and tools
Software and hardware and tools required for backup
Cost of server, network and client downtime
Required training for administrators and end users
From third party statistics, the regular conclusions that can be drawn are as follows:
Users usually realize investment savings in the first year after implementation, and subsequent savings will be significantly improved. The investment in hardware and licensing can be recovered in the second or third year.
21% 到 32% Three-year user savings of 21% to 32%
40% 到 52% Users save 40% to 52% on hard investment over three years