Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer

a client computer and virtual machine technology, applied in the field of transfer of virtual machines from remote server computers to local execution by clients, can solve the problems of increasing complexity and cost of network management, and the inability of client computer systems to join the server computer system's network, so as to increase the security of information in virtual machines

Inactive Publication Date: 2008-08-21
CITRIX SYST INC
View PDF24 Cites 304 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]To overcome this problem, in some embodiments of the system, the server computer system may provide access to the virtual machine image file through common communication protocols such as HTTP, HTTPS, or FTP in order to allow the client computer system to retrieve the virtual machine image file over a network. The use of these common communication protocols may enable the client computer system to obtain the virtual image file without joining the server computer system's network through a virtual private network (VPN), and may enable the file transfer to traverse firewalls that exist between the server computer system and the client computer system. Once the virtual machine has been obtained, the client computer system can execute it locally, e.g., under control of a hypervisor or virtual machine host software.
[0014]In some embodiments the client software on the client computer system may include a feature that enables the user to select whether to execute a virtual machine locally on the client computer system or remotely on the server computer system and manages the virtual machine session and execution. For example, this feature may be exposed to the user as a simple button.
[0017]In some embodiments a virtual machine image file that has been transferred from the server computer system to the client computer may be encrypted. Encrypting the virtual machine image file may increase the security of the information in the virtual machine.
[0018]In some embodiments the client software may allow the user to specify various options affecting storage of a virtual machine image file that has been downloaded to the client computer. For example, the user may be able to specify that the virtual machine image file should be completely deleted from the client computer after the user's session with the virtual machine is finished. As another example, the user may be able to specify that the virtual machine image file should continue to be stored locally on the client computer, which may enable the amount of time required to synchronize with the most recent copy of the virtual machine to be reduced upon subsequent usage, as described above.

Problems solved by technology

As the number of networked computer systems utilized in an enterprise increases, the management of resources in the network may become increasingly complex and expensive.
Some of the manageability issues involved in maintaining a large number of networked computer systems may include ease of installation and deployment, the topology and physical logistics of the network, asset management, scalability (the cost and effort involved in increasing the number of units), troubleshooting network or unit problems, support costs, software tracking and management, as well as the simple issue of physical space, be it floor space or room on the desktop, as well as security issues regarding physical assets, information protection, software control, and computer virus issues.
However, the virtual machine image file may be stored on the server computer system such that the client computer system does not have file-level access to the virtual machine image file.
The client computer system may not be able to join the server computer system's network in a way that provides the client computer system with direct access to files stored on the server computer system.
Even if the client software is not able to contact the server computer system, the client software may still use the previously configured expiry dates for all locally stored virtual machines and still purge the virtual machines if they have expired.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
  • Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
  • Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044]Various embodiments of a distributed computer system and associated methods are described herein. A plurality of users located at different physical locations may connect through a network to a server computer system including one or more server computers. In some embodiments, upon connecting to the server computer system, each user may be assigned to a virtual machine executing on a server computer in the system. Various methods for assigning users to virtual machines and managing the virtual machines executing on the various server computers are described herein.

FIGS. 1-4—Blade Computer Systems

[0045]In some embodiments the server computer system may include a blade server computer system, also referred to herein as a blade computer system. In a blade server computer system, multiple physical server computers, e.g., PC's, may be installed into a central frame or cabinet (e.g., physical chassis). Different sets of human interface hardware (e.g., keyboard, display device, mouse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Various embodiments of a system and method for transferring a virtual machine stored on a server computer system to a client computer system in order to execute the virtual machine locally on the client computer system are disclosed. The system and method may also be operable to transfer the virtual machine back from the client computer system to the server computer system. File differencing techniques may be used in both directions so that only changed data in the virtual machine image file is transferred across the network. The client computer system may be operable to download the virtual machine image file from the server computer system using common communication protocols such as HTTP, HTTPS, or FTP so that the virtual machine can be transferred to the client computer system without needing to be able to access files on the server computer system through a VPN.

Description

PRIORITY CLAIM[0001]The present application claims priority to U.S. provisional patent application Ser. No. 60 / 889,994 titled, “Virtualization Methods for a Blade Computing System,” which was filed on Feb. 15, 2007, whose inventor was Syed Mohammad Amir Husain.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates generally to a system and method for transferring a virtual machine stored on a server computer system to a client computer system in order to execute the virtual machine locally on the client computer system.[0004]2. Description of the Related Art[0005]Many commercial businesses and enterprises make extensive use of personal computers (PCs) in their daily operations. Typically, each user of a PC in the enterprise has a networked PC at his / her desk or work area. As the number of networked computer systems utilized in an enterprise increases, the management of resources in the network may become increasingly complex and expensive. Some...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F15/16
CPCH04L67/34G06F9/445G06F9/45504G06F11/301G06F11/1484G06F9/45558G06F9/5077G06F2009/4557G06F2009/45575G06F2009/45595H04L65/1069
Inventor AMIR HUSAIN, SYED M.UMAIR, MUHAMMAD
Owner CITRIX SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products