Solved

Guideline for Citrix capacity sizing? bandwidth? CPU, Ram?

Posted on 2009-07-13
4
847 Views
Last Modified: 2013-12-27
We are looking at allowing remote access / work from home arrangement for file server, email, database/biz apps.

Can anyone shore their experience with sizing Citrix capacity? i.e.
- average WAN bandwidth per user,
- Server memory per user
- CPU requirements per user?

Any other key issues to consider? thanks.
Joo
0
Comment
Question by:artradis
  • 2
4 Comments
 

Author Comment

by:artradis
ID: 24846805
FYI the users are typically running Excel, Outlook and Web based database/bisness applications. Their current PC config is Win XP Pro, Intel Core2 2GHz CPU, 4GB ram.
0
 
LVL 14

Assisted Solution

by:amichaell
amichaell earned 200 total points
ID: 24848451
On a 32bit dual core server with 4GB RAM you'll likely get anywhere from 25-50 users depending upon your applications and whether you are offering full desktops or just published applications.  We get 25-30 users on our 32bit XenApp servers due to our EMR and EPM applications, and handing out full desktops.  Running less intensive applications will permit more connections.
0
 
LVL 14

Assisted Solution

by:amichaell
amichaell earned 200 total points
ID: 24848874
I apologize.  I did not realize this pertains to running under Solaris, for which I've no experience.  Please disregard my previous post.
0
 
LVL 18

Accepted Solution

by:
chuckyh earned 300 total points
ID: 24850035
We have 2 socket Xeon dual cores with 4GB RAM and we can get more than 35 users comfortably on a server.  We don't publish desktops, just Outlook, Custom Access applications, Excel, Acrobat reader.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question