Solved

Guideline for Citrix capacity sizing? bandwidth? CPU, Ram?

Posted on 2009-07-13
4
850 Views
Last Modified: 2013-12-27
We are looking at allowing remote access / work from home arrangement for file server, email, database/biz apps.

Can anyone shore their experience with sizing Citrix capacity? i.e.
- average WAN bandwidth per user,
- Server memory per user
- CPU requirements per user?

Any other key issues to consider? thanks.
Joo
0
Comment
Question by:artradis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Author Comment

by:artradis
ID: 24846805
FYI the users are typically running Excel, Outlook and Web based database/bisness applications. Their current PC config is Win XP Pro, Intel Core2 2GHz CPU, 4GB ram.
0
 
LVL 14

Assisted Solution

by:amichaell
amichaell earned 200 total points
ID: 24848451
On a 32bit dual core server with 4GB RAM you'll likely get anywhere from 25-50 users depending upon your applications and whether you are offering full desktops or just published applications.  We get 25-30 users on our 32bit XenApp servers due to our EMR and EPM applications, and handing out full desktops.  Running less intensive applications will permit more connections.
0
 
LVL 14

Assisted Solution

by:amichaell
amichaell earned 200 total points
ID: 24848874
I apologize.  I did not realize this pertains to running under Solaris, for which I've no experience.  Please disregard my previous post.
0
 
LVL 18

Accepted Solution

by:
chuckyh earned 300 total points
ID: 24850035
We have 2 socket Xeon dual cores with 4GB RAM and we can get more than 35 users comfortably on a server.  We don't publish desktops, just Outlook, Custom Access applications, Excel, Acrobat reader.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question