?
Solved

Windows RDP

Posted on 2011-02-22
4
Medium Priority
?
365 Views
Last Modified: 2012-05-11
We are setting up a RDP server so users can login and run an application called Traverse. It will have windows 2003 Enterprise 32 bit with 12 GB of RAM and an Intel Xeon X3450 2.66 GHZ Turbo HT processor. It will have about 20 remote users logging in. Initially they would only run the 1 application, but now they will run Access DB apps also. What do you guys think about this and what recommendations do you have.
0
Comment
Question by:timgreen7077
  • 2
  • 2
4 Comments
 
LVL 20

Expert Comment

by:woolnoir
ID: 34952237
The specification in terms of the memory and CPU seems acceptable, the only issue i could forsee with that many users is the DISK IO - you need to check (depending what disks the server has - single / raid SW / Hard HW ) how the applications you are running use DISK IO and how the disk subsystem can handle it.

Either way it looks good for your requirements (n.b from the information i have!)
0
 
LVL 1

Author Comment

by:timgreen7077
ID: 34953033
what would you suggest in regards to Hard drives what configuration.
0
 
LVL 20

Accepted Solution

by:
woolnoir earned 2000 total points
ID: 34953267
For 20 remote users and assuming it will be business important -> critical i'd suggest maybe 3 disks in raid 5. As long as the server has a hardware raid card, or something build onto the MB (not so ideal) then you should be fine. The only thing to keep in mind is that if the usage expands to many more users or something with high DISK IO then you need to be a little more careful.

Also consider the disk usage, i guess in your case this will be minimal but its something to keep in mind.

As i said you should be fine with what you have, just monitor the system initially and keep an eye on the total system and per session resource (CPU / MEMORY and DISK ) and plan ahead for any growth.
0
 
LVL 1

Author Closing Comment

by:timgreen7077
ID: 34953364
Thanks
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question