[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


Thick Client Application VS Citrix server

Posted on 2006-04-17
Medium Priority
Last Modified: 2010-04-26
Hi all,

Can any one tell me the configuration for a Thick client deployment in a Citrix environment?

Minimum memory utilization for my Client application is 80MB.

Also suggest me with how many users can be runned in a single citrix box with the following configuration,

Pentium 4, 3.6 ghz

Thanks in Advance,

Badri Narayanan R.
Question by:r_badris

Accepted Solution

mav7469 earned 500 total points
ID: 16469532
  What do you mean by Thick Client?  Is this a Client/Server application running in a citrix environment?  Citrix environment in itself is considered a thin client.  The only items that get passed back and forth from the citrix server are keyboard and mouse commands and the screen shots.  Your "thick" client application would run within the citrix "thin" client environment.
   As far as your specs.  Add 16MB plus whatever applications you are running (in your case 80MB) per user and you will get your citrix box max users.  The CPU should be plenty.  The other consideration is Network Bandwidth.  To keep the session stable, you need to figure about 56Kb per session.
These figures are based on my own testing as a Citrix Engineer for 3 years and doing my own testing.  These are NOT the figures that citrix will quote.  In fact, they rarly quote any figures unless pushed into a corner.

Good Luck


Assisted Solution

shankshank earned 500 total points
ID: 16489884
It all depends on what software application you will be running. Right now I am testing Citrix Presentation server 4, on a virtual server enviornment with a total of 5GB (physical )of ram and a p4 3 gigahertz. Now since it is a virtual server, the virtual server itself is only given 2 gb of ram. We run mostly office 2003 applications , project and visio inclided. 6 users at once, no problem, and I am sure it will be able to house alot more, that should give you an idea.

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article shows how to use a free utility called 'Parkdale' to easily test the performance and benchmark any Hard Drive(s) installed in your computer. We also look at RAM Disks and their speed comparisons.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question