Got it

What are the differences between VDI and IDV?

Created: Jul 27, 2022 09:24:36Latest reply: Jul 27, 2022 09:34:35 77 1 1 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hello, everyone!

What are the differences between VDI and IDV?

Thanks in advance!

  • x
  • convention:

Featured Answers
olive.zhao
Admin Created Jul 27, 2022 09:34:35

Hello, friend!

1. Technology comparison

IDV is a slight improvement over the traditional PCs plus management software architecture. IDV architecture consists of image servers, management software, and local virtual desktop terminals (fat clients). In contrast, VDI is a radical technological innovation. It uses TCs and cloud-based virtual desktops for fixed OA. VDI can be expanded to any terminals. 

No data is stored on terminals. This completely solves the problems of high management and maintenance costs, low efficiency, and low security in traditional solutions.

The IDV solution introduces local virtual desktops, which increases the complexity of terminals and makes management and maintenance more difficult than it would be for either traditional PCs or VDI. When managing a large number of terminals, IDV requires complex servers to centrally manage terminal images and synchronize data distributed on terminals. Therefore, the IDV solution is a pseudo-simplified management solution.

In certain scenarios, IDV allows users to work offline. However, with the popularization of the Internet and the networking of various applications, the role of offline services in a typical workday is shrinking. In addition, continuous investment in network infrastructure will soon make the network disconnection a thing of the past.

2. Industry trends

Mainstream desktop cloud vendors such as Huawei, Citrix, and VMware promote VDI. Now, only a few vendors in China, such as Ruijie Networks promote IDV.

Cloud-based architecture is one of the main trends of IT transformation. As a cloud-based solution, VDI is a technology whose moment has arrived. IDV fails to fully exploit the advantages of the cloud for desktop virtualization.

ItemVDIIDVRemarks
Data security

High. 

Data is stored on the cloud, preventing data leakage due to terminal access.

Low. 

Data is downloaded to terminals, increasing the risk of data leakage.

As long as data is stored on terminals, data leakage may occur, no matter what security measures are taken.
Terminal maintenance

Easy.

Terminals are responsible only for service access. They do not perform any computing. No maintenance is required.

Faulty terminals can be replaced at any time. 

Difficult. 

Terminals perform computing and store data. They are difficult to maintain. In addition, they cannot be maintained in a centralized manner, therefore maintaining themis labor-consuming.

If IDV terminals are faulty and cannot synchronize data with the cloud, engineers must maintain them on site.

System reliability

High. 

Cloud-based resources can bedynamically allocated and reused by different VMs at different time periods.

Services will not be affected in the case of a single hardware fault.

Low. 

As with a traditional PC setup, manual intervention is required to recover services in the event of a terminal fault.

If IDV data is not synchronized to the server in a timely manner, data may be lost or become inconsistent.

Requirements on terminal hardwareNo special requirements on terminal hardware.

The CPU on a terminal must support virtualization technology.

In addition, two operating systems must be installed on the terminal. TCs arenot suppoited.

CPUs that support virtualization technology are expensive andpower-consuming.

Mobile terminalsSupportedNot supported

IDV requires special terminals. Mobile terminals do not support IDV.

Mobile officeSupportedNot supported

If clients are replaced, IDV requires that the new clients download images again.


Hope this helps!

View more
  • x
  • convention:

All Answers
olive.zhao
olive.zhao Admin Created Jul 27, 2022 09:34:35

Hello, friend!

1. Technology comparison

IDV is a slight improvement over the traditional PCs plus management software architecture. IDV architecture consists of image servers, management software, and local virtual desktop terminals (fat clients). In contrast, VDI is a radical technological innovation. It uses TCs and cloud-based virtual desktops for fixed OA. VDI can be expanded to any terminals. 

No data is stored on terminals. This completely solves the problems of high management and maintenance costs, low efficiency, and low security in traditional solutions.

The IDV solution introduces local virtual desktops, which increases the complexity of terminals and makes management and maintenance more difficult than it would be for either traditional PCs or VDI. When managing a large number of terminals, IDV requires complex servers to centrally manage terminal images and synchronize data distributed on terminals. Therefore, the IDV solution is a pseudo-simplified management solution.

In certain scenarios, IDV allows users to work offline. However, with the popularization of the Internet and the networking of various applications, the role of offline services in a typical workday is shrinking. In addition, continuous investment in network infrastructure will soon make the network disconnection a thing of the past.

2. Industry trends

Mainstream desktop cloud vendors such as Huawei, Citrix, and VMware promote VDI. Now, only a few vendors in China, such as Ruijie Networks promote IDV.

Cloud-based architecture is one of the main trends of IT transformation. As a cloud-based solution, VDI is a technology whose moment has arrived. IDV fails to fully exploit the advantages of the cloud for desktop virtualization.

ItemVDIIDVRemarks
Data security

High. 

Data is stored on the cloud, preventing data leakage due to terminal access.

Low. 

Data is downloaded to terminals, increasing the risk of data leakage.

As long as data is stored on terminals, data leakage may occur, no matter what security measures are taken.
Terminal maintenance

Easy.

Terminals are responsible only for service access. They do not perform any computing. No maintenance is required.

Faulty terminals can be replaced at any time. 

Difficult. 

Terminals perform computing and store data. They are difficult to maintain. In addition, they cannot be maintained in a centralized manner, therefore maintaining themis labor-consuming.

If IDV terminals are faulty and cannot synchronize data with the cloud, engineers must maintain them on site.

System reliability

High. 

Cloud-based resources can bedynamically allocated and reused by different VMs at different time periods.

Services will not be affected in the case of a single hardware fault.

Low. 

As with a traditional PC setup, manual intervention is required to recover services in the event of a terminal fault.

If IDV data is not synchronized to the server in a timely manner, data may be lost or become inconsistent.

Requirements on terminal hardwareNo special requirements on terminal hardware.

The CPU on a terminal must support virtualization technology.

In addition, two operating systems must be installed on the terminal. TCs arenot suppoited.

CPUs that support virtualization technology are expensive andpower-consuming.

Mobile terminalsSupportedNot supported

IDV requires special terminals. Mobile terminals do not support IDV.

Mobile officeSupportedNot supported

If clients are replaced, IDV requires that the new clients download images again.


Hope this helps!

View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.
Information Protection Guide
Thanks for using Huawei Enterprise Support Community! We will help you learn how we collect, use, store and share your personal information and the rights you have in accordance with Privacy Policy and User Agreement.