SlideShare a Scribd company logo
1 of 39
Download to read offline
Citrix WAN Optimisation
with Citrix Repeater 5.0 and ICA Acceleration




Fabian Kienle
Business Development Manager CE-E
Six Keys to Successful Application Delivery


                                                                        Citrix® NetScaler®
                                                                    Deliver Web Applications


                                                                           Citrix
                                                                          XenApp
                                                                          Server™
                                                                    Deliver Windows
         Citrix EdgeSight™    Citrix Repeater™      Citrix Access     Applications
Users   Monitor End User     Accelerate Apps           Gateway™                                Apps
          Experience         to Branch Users     Enable Secure
                                                                    Citrix XenDesktop™
                                                    Application
                                                        Access      Deliver Desktops
Citrix Repeater helps with “the last mile”

WANScaler areas of operation

  – TCP Flow Control

  – Multi-Level Compression

  – Protocol Optimization
Protocol Optimization
What is CIFS?
• Common Internet File System
  – Running on top of SMB “Server Message Blocks”
• CIFS is used for
  –   Directory Browsing
  –   File Transfer
  –   UNC paths
  –   Open/Read/Write/Close operations
• Common trait
  – Many roundtrips per transaction
  – Lots of meta data in relation to desired files
How Does WANScaler Accelerate CIFS?
• Anticipate requests based on learned behavior


• Read ahead in anticipation of the next data block


• Avoid compressing meta data

  – CIFS engine communicates with compression module
Multi-Level Compression
How Does WANScaler Compression Work?
• Compression
  – Replace a large data chunk with a small token. Send token instead –
    acts as pointer
  – WANScaler Methods:
     – Disk Based Compression
     – Memory Based Compression
• Unlike a web cache, WANScaler is not object or file aware. It is only bit stream
  aware for TCP connections.
• The memory overwrites automatically when the history is full (FIFO).
WANScaler Compression Advantages
• Compression is configurable per service class though not
  required
• WANScaler compression is application independent
• Requires zero configuration:
  – Automatically chooses the best compression method dynamically:
    – Disk-based compression (DBC)
    – Memory-based compression
Multi-Level Compression
     • Nested compression engines
       – Disk-based compression: delivers up to 3500:1 compression for
         disk matches.
       – Memory-based compression: delivers 300:1 compression for
         memory matches .
       – Zlib
       – LZS

     • Automatic – nothing to configure. WANScaler algorithms use the best available
       based on the situation
Flow Control
Typical TCP Flow Control

             • Flow Control
                   – TCP does not know what the bandwidth of the link is!
         Ethernet LAN, 10Mb/s, low latency and loss
            x      x   x              x
                           x    x          x    x     x   x   x
   1                                                                                1
                                                                  TCP Slow Start - packet sending rate
                                                                   is increased after each round trip.
 Slow
 Start                                                                             2
                                                                    TCP Congestion Control -Packet
                                                                   Loss penalty = sending rate cut by
                                                                                 50%.
                                    Congestion Control
                           2            Algorithm



 X = packet loss
TCP On the WAN

                T3, 45Mb/s, high latency and loss
            x
                                                    x                     1
   1
                                     x
                                              2         High latency means a slower recovery
                                                          period during congestion control.
  Slow
  Start                                                                   2
                                                        Feedback (packet loss) is too infrequent
                                                            and ambiguous to be accurate.
                              Congestion Control




  X = packet loss
TCP On the WAN




            Performance (Mbps)
                                      1.   x   x   x    x   x   x   x   x   x   x   x   Short Distance

                                   Slow
                                   Start



                                                                                Long Distance
                                                                                                  X = packet loss
                                                   Time (Milliseconds)
                                                       1. TCP Distance Bias
                                 – Short distance sessions may have packet loss but recover quickly
            – Long distance sessions are impacted by packet loss but recover slowly

          2. The Result is Low Throughput and Random Application Delays
Typical WAN Communication


                                  120 ms

            Switch   WAN Router            WAN Router   Switch
                                  WAN
   Client                                                        Server
Typical WAN Communication


                                        120 ms

            Switch   WAN Router                  WAN Router   Switch
                                        WAN
   Client                                                              Server
                                  SYN
Typical WAN Communication


                                           120 ms

            Switch   WAN Router                     WAN Router   Switch
                                           WAN
   Client                                                                 Server
                                     SYN

                                  SYN + ACK

                                     ACK
Typical WAN Communication


                                           120 ms

            Switch   WAN Router                     WAN Router   Switch
                                           WAN
   Client                                                                 Server
                                     SYN

                                  SYN + ACK

                                     ACK

                                  HTTP GET
Typical WAN Communication


                                           120 ms

            Switch   WAN Router                     WAN Router   Switch
                                           WAN
   Client                                                                 Server
                                     SYN

                                  SYN + ACK

                                     ACK

                                  HTTP GET

                                     ACK+Data
Typical WAN Communication


                                           120 ms

            Switch   WAN Router                     WAN Router   Switch
                                           WAN
   Client                                                                 Server
                                     SYN

                                  SYN + ACK

                                     ACK

                                  HTTP GET

                                     ACK+Data
                                     ACK
TCP Flow Control with WANScaler

                              120 ms
            Switch    WAN               WAN     Switch
                     Router            Router
                              WAN                        Server
   Client
TCP Flow Control with WANScaler

                                          120 ms
            Switch   WANScaler    WAN               WAN     WANScaler   Switch
                                 Router            Router
                                          WAN                                    Server
   Client
TCP Flow Control with WANScaler

               Fast Side          Slow Side               Slow Side         Fast Side
                                                 120 ms
                 Switch     WANScaler    WAN               WAN      WANScaler   Switch
                                        Router            Router
                                                 WAN                                      Server
   Client


    SYN
                                                                                         SYN+ACK
    ACK


    HTTP GET

                          ACK
                                                                   ACK

                                                                                           ACK
WANScaler Flow Control

                                          120 ms
            Switch   WANScaler    WAN               WAN     WANScaler   Switch
                                 Router            Router
                                          WAN                                    Server
 Client




Each Segment has its own flow control:
– Commonly deployed TCP Windows are 64kB max.
– On the WAN side, WANScaler increases the Window to 8MB (RFC
  1323)
– WANScaler acknowledges packets on the LAN side, so server keeps
  sending

Use rate-based sender on the WAN segment. Never send
faster than the configured link speed
What’s new with version 5.0 ?
ICA Acceleration
Location based ICA Optimisation
 Branch Office/Regional Site




                                                                        Citrix Repeater


                                                                          Corporate LAN/Data Center


  Based on the well known optimisation technologies, already known from the ICA Client
  Caching function taken away from the client, and taken into the data center (Citrix Repeater).
  So it can be used by ANY user at the data center location !
Optimisation of GUI-, print- and data transfer

 Branch Office/Regional Site




                                         Corporate LAN/Data Center
System requirements for ICA Acceleration
For the first release:            • Supported Appliances
• XenApp Client                      • Branch Repeater (Windows Server)
                                         Version 1.5
  • 32-bit Windows PC*                 • Branch Repeater (Linux) on Version 5.0
  • 11.0                               • WANScaler 8000 Series with version 5.0
                                       • WANScaler Client offers ONLY TCP
• XenApp Server                          Acceleration**
   • ONLY 32-bit Windows Server 2003
   • XA Server Version 4.5 or 5.0
   • HRP03 with post Acceleration HF
Scenario # 1:
• ICA user uses the same Citrix Repeater Box:

  1. Different users, by using the same ICA window size and resolution, that
    access the same texts, numbers etc. (z.B. Word or Excel)




         Example: Two users open the same document, but data will only be transferred once.
Scenario # 2:
• ICA user uses the same Citrix Repeater Box:
  2. Different users, that use the same ICA window size and resolution, scrolling
    within the same document.




    Example: Different users are using form or browser based appplications with identical background
                             objects. Redundant data will not be transferred.
Support of mixed environments
                                                                             HQ/Data Center


               Branch Office


                                                    Internet/WAN
                                Branch Repeater                     Citrix Repeater
                                 or WANScaler



                Branch Office




For users WITHOUT WanScaler /Branch Repeater Box or with an older ICA Client it all stays the same!
Case Study #1
Example of a non optimised environment


                                      WAN                   XenApp Server 4.5
      50 ICA users                    MPLS
   15% ICA data traffic           10 - 45 Mbps              Mainly usage of the
                                    > 180 ms                 Internet Explorer
 85% non ICA data traffic
  40% line utilisation ng

Environment:
• Slow applications through a slow network (high latency)
• But nearly no usage of same/redundant ICA data
• No repeatable application scenario (Usage of same data/documents)
Case Study #2
Company with branch offices and a centralised serverfarm

                                                WAN                        XenApp Server 4.5
     20 ICA users            DSL or fractional T1 (256 kbps – 768 kbps)
 >95% ICA data traffic                          50 ms                           MS Office

  >90% line utilisation                                                           Printing
                                                                                File sharing
  Environment:
  • Users use same Word and Excel files
  • Printing is an important, and frequently used function
  • Users very often copy files (via ICA) from or to centralised file servers
Case Study #3
Central server farm, big amount if print data


                                           WAN                        XenApp Server 4.5
      30 ICA users                         MPLS
  >75% ICA data traffic                  1.5 Mbps                        ERM Software
                                          ~ 50 ms                         Web Portal
   >90% line utilisation
                                                                      Printing of PDF files
   Environment:
   • Slow Response times (applications) by large, and frequently used PDF-Print files
   • Usage of WEB based Portals and ERM software. Access on same Datensätze.
   • No usage of MS Office applications and Client Drive Mapping
ICA Acceleration - facts
  Ideal for print data, CDM file transfer and MS Office as well as applications with many
 identical window contents
 NOT ideal for Adobe/CAD applications as there are only few opportunities for
 compression and nearly no redundant data
 ICA screen resolution makes the difference. Same resolution is optimal. Differentiating
 resolution means more (per resolution) data traffic and a larger amount of data within
 the Citrix Repeater Cache.
ICA Acceleration - facts
• Optimal, when many ICA users utilise the same Citrix Repeater Box:

    Different users are accessing under usage of the same ICA window size and resolution
    based on identical data (example: Word or Excel)

    Same or different users are blättern within the same file under usage of the same ICA
    window size and resolution

    Different or identical users are printing the same files via ICA

    Duplication of same files under usage of ICA Client Drive Mapping.
        Example: local storage of mail attachments from a published Outlook
Six Keys to Successful Application Delivery


                                                                        Citrix® NetScaler®
                                                                    Deliver Web Applications


                                                                           Citrix
                                                                          XenApp
                                                                          Server™
                                                                    Deliver Windows
         Citrix EdgeSight™    Citrix Repeater™      Citrix Access     Applications
Users   Monitor End User     Accelerate Apps           Gateway™                                Apps
          Experience         to Branch Users     Enable Secure
                                                                    Citrix XenDesktop™
                                                    Application
                                                        Access      Deliver Desktops
Transform your datacenter
   into a delivery center
Cvc2009 Moscow Repeater+Ica  Fabian Kienle Final

More Related Content

What's hot

Nic teaming and converged fabric
Nic teaming and converged fabricNic teaming and converged fabric
Nic teaming and converged fabrichypervnu
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalSai Malleswar
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Tungsten University: Setup and Operate Tungsten Replicators
Tungsten University: Setup and Operate Tungsten ReplicatorsTungsten University: Setup and Operate Tungsten Replicators
Tungsten University: Setup and Operate Tungsten ReplicatorsContinuent
 
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...scarisbrick
 
Video Streaming Ali Saman Tosun
Video Streaming Ali Saman TosunVideo Streaming Ali Saman Tosun
Video Streaming Ali Saman TosunVideoguy
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and QuantizationMuhamamd Awaissaleem
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulationstk_gpg
 
Digital communication systems
Digital communication systemsDigital communication systems
Digital communication systemsNisreen Bashar
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite CommunicationZunAib Ali
 
Basic distributed systems principles
Basic distributed systems principlesBasic distributed systems principles
Basic distributed systems principlesRuben Tan
 
Toward a practical “HPC Cloud”: Performance tuning of a virtualized HPC cluster
Toward a practical “HPC Cloud”: Performance tuning of a virtualized HPC clusterToward a practical “HPC Cloud”: Performance tuning of a virtualized HPC cluster
Toward a practical “HPC Cloud”: Performance tuning of a virtualized HPC clusterRyousei Takano
 
Tungsten University: Set Up And Manage Advanced Replication Topologies
Tungsten University: Set Up And Manage Advanced Replication TopologiesTungsten University: Set Up And Manage Advanced Replication Topologies
Tungsten University: Set Up And Manage Advanced Replication TopologiesContinuent
 
Considerations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfhik_lhz
 
Consensus in distributed computing
Consensus in distributed computingConsensus in distributed computing
Consensus in distributed computingRuben Tan
 

What's hot (20)

Cloud quiz question answer
Cloud quiz question answerCloud quiz question answer
Cloud quiz question answer
 
Nic teaming and converged fabric
Nic teaming and converged fabricNic teaming and converged fabric
Nic teaming and converged fabric
 
Adaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signalAdaptive delta modulation of Speech signal
Adaptive delta modulation of Speech signal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Analog to-digital conversion
Analog to-digital conversionAnalog to-digital conversion
Analog to-digital conversion
 
Tungsten University: Setup and Operate Tungsten Replicators
Tungsten University: Setup and Operate Tungsten ReplicatorsTungsten University: Setup and Operate Tungsten Replicators
Tungsten University: Setup and Operate Tungsten Replicators
 
Slide05 Message Passing Architecture
Slide05 Message Passing ArchitectureSlide05 Message Passing Architecture
Slide05 Message Passing Architecture
 
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
The Network\'s IN the (virtualised) Server: Virtualized Io In Heterogeneous M...
 
Video Streaming Ali Saman Tosun
Video Streaming Ali Saman TosunVideo Streaming Ali Saman Tosun
Video Streaming Ali Saman Tosun
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Pulse code modulation and Quantization
Pulse code modulation and QuantizationPulse code modulation and Quantization
Pulse code modulation and Quantization
 
Pulse modulation
Pulse modulationPulse modulation
Pulse modulation
 
Digital communication systems
Digital communication systemsDigital communication systems
Digital communication systems
 
Multipl access and satellite Communication
Multipl access and satellite CommunicationMultipl access and satellite Communication
Multipl access and satellite Communication
 
Basic distributed systems principles
Basic distributed systems principlesBasic distributed systems principles
Basic distributed systems principles
 
Toward a practical “HPC Cloud”: Performance tuning of a virtualized HPC cluster
Toward a practical “HPC Cloud”: Performance tuning of a virtualized HPC clusterToward a practical “HPC Cloud”: Performance tuning of a virtualized HPC cluster
Toward a practical “HPC Cloud”: Performance tuning of a virtualized HPC cluster
 
Tungsten University: Set Up And Manage Advanced Replication Topologies
Tungsten University: Set Up And Manage Advanced Replication TopologiesTungsten University: Set Up And Manage Advanced Replication Topologies
Tungsten University: Set Up And Manage Advanced Replication Topologies
 
Considerations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmf
 
2008 EBU Training BBC Scotland Infrastructure
2008 EBU Training BBC Scotland Infrastructure2008 EBU Training BBC Scotland Infrastructure
2008 EBU Training BBC Scotland Infrastructure
 
Consensus in distributed computing
Consensus in distributed computingConsensus in distributed computing
Consensus in distributed computing
 

Viewers also liked

A university school collaboration, N Harre and C Blythe
A university school collaboration, N Harre and C BlytheA university school collaboration, N Harre and C Blythe
A university school collaboration, N Harre and C BlytheNZ Psychological Society
 
платформа Microsoft Windows Embedded
платформа Microsoft Windows Embeddedплатформа Microsoft Windows Embedded
платформа Microsoft Windows EmbeddedLiudmila Li
 
The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...
The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...
The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...Herb Whitehouse
 
05 чэс описание решения V3
05  чэс описание решения V305  чэс описание решения V3
05 чэс описание решения V3Liudmila Li
 
Asterroid презентация
Asterroid презентацияAsterroid презентация
Asterroid презентацияLiudmila Li
 
Facebook's Platform Evolution (April 2010 Hebrew)
Facebook's Platform Evolution (April 2010 Hebrew)Facebook's Platform Evolution (April 2010 Hebrew)
Facebook's Platform Evolution (April 2010 Hebrew)Omer Kaplan
 
Expatriate; local remuneration differences across six countries,Ishbel McWha
Expatriate; local remuneration differences across six countries,Ishbel McWhaExpatriate; local remuneration differences across six countries,Ishbel McWha
Expatriate; local remuneration differences across six countries,Ishbel McWhaNZ Psychological Society
 

Viewers also liked (8)

A university school collaboration, N Harre and C Blythe
A university school collaboration, N Harre and C BlytheA university school collaboration, N Harre and C Blythe
A university school collaboration, N Harre and C Blythe
 
платформа Microsoft Windows Embedded
платформа Microsoft Windows Embeddedплатформа Microsoft Windows Embedded
платформа Microsoft Windows Embedded
 
The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...
The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...
The Bogdahn Group Report to Orange County Commissioners laying out a "fiducia...
 
05 чэс описание решения V3
05  чэс описание решения V305  чэс описание решения V3
05 чэс описание решения V3
 
Asterroid презентация
Asterroid презентацияAsterroid презентация
Asterroid презентация
 
Facebook's Platform Evolution (April 2010 Hebrew)
Facebook's Platform Evolution (April 2010 Hebrew)Facebook's Platform Evolution (April 2010 Hebrew)
Facebook's Platform Evolution (April 2010 Hebrew)
 
Expatriate; local remuneration differences across six countries,Ishbel McWha
Expatriate; local remuneration differences across six countries,Ishbel McWhaExpatriate; local remuneration differences across six countries,Ishbel McWha
Expatriate; local remuneration differences across six countries,Ishbel McWha
 
Putting the kids first, Jan Pryor
Putting the kids first, Jan PryorPutting the kids first, Jan Pryor
Putting the kids first, Jan Pryor
 

Similar to Cvc2009 Moscow Repeater+Ica Fabian Kienle Final

Investigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion ControlInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion ControlMichele Weigle
 
Somerdata AROW Data Diode
Somerdata AROW Data DiodeSomerdata AROW Data Diode
Somerdata AROW Data DiodeSomerdata
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
WAN Optimierung mit Citrix Branch Repeater
WAN Optimierung mit Citrix Branch RepeaterWAN Optimierung mit Citrix Branch Repeater
WAN Optimierung mit Citrix Branch RepeaterDigicomp Academy AG
 
Networking is NOT Free: Lessons in Network Design
Networking is NOT Free: Lessons in Network DesignNetworking is NOT Free: Lessons in Network Design
Networking is NOT Free: Lessons in Network DesignRandy Bias
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionDigicomp Academy AG
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Cisco Canada
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
DIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMDIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMJohn Loughney
 
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...The Linux Foundation
 
Hungary Usergroup - Midonet overlay programming
Hungary Usergroup - Midonet overlay programmingHungary Usergroup - Midonet overlay programming
Hungary Usergroup - Midonet overlay programmingMarton Kiss
 
connection establishment flowand congestion.pptx
connection establishment flowand congestion.pptxconnection establishment flowand congestion.pptx
connection establishment flowand congestion.pptxImXaib
 
What every Java developer should know about network?
What every Java developer should know about network?What every Java developer should know about network?
What every Java developer should know about network?aragozin
 

Similar to Cvc2009 Moscow Repeater+Ica Fabian Kienle Final (20)

Daniel künzli branch repeater
Daniel künzli branch repeaterDaniel künzli branch repeater
Daniel künzli branch repeater
 
Part9-congestion.pptx
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptx
 
Investigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion ControlInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control
 
Somerdata AROW Data Diode
Somerdata AROW Data DiodeSomerdata AROW Data Diode
Somerdata AROW Data Diode
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
DCTcp
DCTcpDCTcp
DCTcp
 
Virtual net performance
Virtual net performanceVirtual net performance
Virtual net performance
 
WAN Optimierung mit Citrix Branch Repeater
WAN Optimierung mit Citrix Branch RepeaterWAN Optimierung mit Citrix Branch Repeater
WAN Optimierung mit Citrix Branch Repeater
 
Networking is NOT Free: Lessons in Network Design
Networking is NOT Free: Lessons in Network DesignNetworking is NOT Free: Lessons in Network Design
Networking is NOT Free: Lessons in Network Design
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introduction
 
Cubic
CubicCubic
Cubic
 
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
Introduction to Network Performance Measurement with Cisco IOS IP Service Lev...
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
DIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATMDIANA: Scenarios for QoS based integration of IP and ATM
DIANA: Scenarios for QoS based integration of IP and ATM
 
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
XPDS13: On Paravirualizing TCP - Congestion Control on Xen VMs - Luwei Cheng,...
 
Hungary Usergroup - Midonet overlay programming
Hungary Usergroup - Midonet overlay programmingHungary Usergroup - Midonet overlay programming
Hungary Usergroup - Midonet overlay programming
 
connection establishment flowand congestion.pptx
connection establishment flowand congestion.pptxconnection establishment flowand congestion.pptx
connection establishment flowand congestion.pptx
 
Tcp traffic control and red ecn
Tcp traffic control and red ecnTcp traffic control and red ecn
Tcp traffic control and red ecn
 
What every Java developer should know about network?
What every Java developer should know about network?What every Java developer should know about network?
What every Java developer should know about network?
 
Congestion control
Congestion controlCongestion control
Congestion control
 

More from Liudmila Li

11 Ban Net Scaler Xa
11 Ban Net Scaler Xa11 Ban Net Scaler Xa
11 Ban Net Scaler XaLiudmila Li
 
09 Ban Branch Repeater1
09 Ban Branch Repeater109 Ban Branch Repeater1
09 Ban Branch Repeater1Liudmila Li
 
07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)
07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)
07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)Liudmila Li
 
04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh
04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh
04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey KhLiudmila Li
 
01 Ap еKaterinburg
01 Ap еKaterinburg01 Ap еKaterinburg
01 Ap еKaterinburgLiudmila Li
 
11 Net Scaler Xa1
11 Net Scaler Xa111 Net Scaler Xa1
11 Net Scaler Xa1Liudmila Li
 
09 Branch Repeater1
09 Branch Repeater109 Branch Repeater1
09 Branch Repeater1Liudmila Li
 
06 03 Gazprombank Success Story
06 03 Gazprombank Success Story06 03 Gazprombank Success Story
06 03 Gazprombank Success StoryLiudmila Li
 
06 02 C I S Citrix Final
06 02 C I S Citrix Final06 02 C I S Citrix Final
06 02 C I S Citrix FinalLiudmila Li
 
06 01 сертифицированные продукты
06 01 сертифицированные продукты06 01 сертифицированные продукты
06 01 сертифицированные продуктыLiudmila Li
 
05 Bykov Citrix Last
05 Bykov Citrix Last05 Bykov Citrix Last
05 Bykov Citrix LastLiudmila Li
 
04 Xa5 Fp1 Sergey Kh
04 Xa5 Fp1 Sergey Kh04 Xa5 Fp1 Sergey Kh
04 Xa5 Fp1 Sergey KhLiudmila Li
 

More from Liudmila Li (20)

11 Ban Net Scaler Xa
11 Ban Net Scaler Xa11 Ban Net Scaler Xa
11 Ban Net Scaler Xa
 
10 Dg Xd
10 Dg Xd10 Dg Xd
10 Dg Xd
 
09 Ban Branch Repeater1
09 Ban Branch Repeater109 Ban Branch Repeater1
09 Ban Branch Repeater1
 
08 Xenserver Dg
08 Xenserver Dg08 Xenserver Dg
08 Xenserver Dg
 
07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)
07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)
07 Ibm System X And Blade Center For Citrix Forum(Ekatirenburg)
 
04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh
04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh
04 Cvc2009 Yekaterinburg Xa5 Fp1 Sergey Kh
 
06 [хост]
06 [хост]06 [хост]
06 [хост]
 
03 Bcc суэк
03 Bcc суэк03 Bcc суэк
03 Bcc суэк
 
01 Ap еKaterinburg
01 Ap еKaterinburg01 Ap еKaterinburg
01 Ap еKaterinburg
 
11 Net Scaler Xa1
11 Net Scaler Xa111 Net Scaler Xa1
11 Net Scaler Xa1
 
09 Branch Repeater1
09 Branch Repeater109 Branch Repeater1
09 Branch Repeater1
 
10 Xs Dg
10 Xs Dg10 Xs Dg
10 Xs Dg
 
08 Dg Xd
08 Dg Xd08 Dg Xd
08 Dg Xd
 
07 Ws08 R2 Virt
07 Ws08 R2 Virt07 Ws08 R2 Virt
07 Ws08 R2 Virt
 
06 03 Gazprombank Success Story
06 03 Gazprombank Success Story06 03 Gazprombank Success Story
06 03 Gazprombank Success Story
 
06 02 C I S Citrix Final
06 02 C I S Citrix Final06 02 C I S Citrix Final
06 02 C I S Citrix Final
 
06 01 сертифицированные продукты
06 01 сертифицированные продукты06 01 сертифицированные продукты
06 01 сертифицированные продукты
 
05 Bykov Citrix Last
05 Bykov Citrix Last05 Bykov Citrix Last
05 Bykov Citrix Last
 
04 Xa5 Fp1 Sergey Kh
04 Xa5 Fp1 Sergey Kh04 Xa5 Fp1 Sergey Kh
04 Xa5 Fp1 Sergey Kh
 
03 Bcc снг
03 Bcc снг03 Bcc снг
03 Bcc снг
 

Recently uploaded

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 

Recently uploaded (20)

Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 

Cvc2009 Moscow Repeater+Ica Fabian Kienle Final

  • 1. Citrix WAN Optimisation with Citrix Repeater 5.0 and ICA Acceleration Fabian Kienle Business Development Manager CE-E
  • 2. Six Keys to Successful Application Delivery Citrix® NetScaler® Deliver Web Applications Citrix XenApp Server™ Deliver Windows Citrix EdgeSight™ Citrix Repeater™ Citrix Access Applications Users Monitor End User Accelerate Apps Gateway™ Apps Experience to Branch Users Enable Secure Citrix XenDesktop™ Application Access Deliver Desktops
  • 3. Citrix Repeater helps with “the last mile” WANScaler areas of operation – TCP Flow Control – Multi-Level Compression – Protocol Optimization
  • 5. What is CIFS? • Common Internet File System – Running on top of SMB “Server Message Blocks” • CIFS is used for – Directory Browsing – File Transfer – UNC paths – Open/Read/Write/Close operations • Common trait – Many roundtrips per transaction – Lots of meta data in relation to desired files
  • 6. How Does WANScaler Accelerate CIFS? • Anticipate requests based on learned behavior • Read ahead in anticipation of the next data block • Avoid compressing meta data – CIFS engine communicates with compression module
  • 8. How Does WANScaler Compression Work? • Compression – Replace a large data chunk with a small token. Send token instead – acts as pointer – WANScaler Methods: – Disk Based Compression – Memory Based Compression • Unlike a web cache, WANScaler is not object or file aware. It is only bit stream aware for TCP connections. • The memory overwrites automatically when the history is full (FIFO).
  • 9. WANScaler Compression Advantages • Compression is configurable per service class though not required • WANScaler compression is application independent • Requires zero configuration: – Automatically chooses the best compression method dynamically: – Disk-based compression (DBC) – Memory-based compression
  • 10. Multi-Level Compression • Nested compression engines – Disk-based compression: delivers up to 3500:1 compression for disk matches. – Memory-based compression: delivers 300:1 compression for memory matches . – Zlib – LZS • Automatic – nothing to configure. WANScaler algorithms use the best available based on the situation
  • 12. Typical TCP Flow Control • Flow Control – TCP does not know what the bandwidth of the link is! Ethernet LAN, 10Mb/s, low latency and loss x x x x x x x x x x x 1 1 TCP Slow Start - packet sending rate is increased after each round trip. Slow Start 2 TCP Congestion Control -Packet Loss penalty = sending rate cut by 50%. Congestion Control 2 Algorithm X = packet loss
  • 13. TCP On the WAN T3, 45Mb/s, high latency and loss x x 1 1 x 2 High latency means a slower recovery period during congestion control. Slow Start 2 Feedback (packet loss) is too infrequent and ambiguous to be accurate. Congestion Control X = packet loss
  • 14. TCP On the WAN Performance (Mbps) 1. x x x x x x x x x x x Short Distance Slow Start Long Distance X = packet loss Time (Milliseconds) 1. TCP Distance Bias – Short distance sessions may have packet loss but recover quickly – Long distance sessions are impacted by packet loss but recover slowly 2. The Result is Low Throughput and Random Application Delays
  • 15. Typical WAN Communication 120 ms Switch WAN Router WAN Router Switch WAN Client Server
  • 16. Typical WAN Communication 120 ms Switch WAN Router WAN Router Switch WAN Client Server SYN
  • 17. Typical WAN Communication 120 ms Switch WAN Router WAN Router Switch WAN Client Server SYN SYN + ACK ACK
  • 18. Typical WAN Communication 120 ms Switch WAN Router WAN Router Switch WAN Client Server SYN SYN + ACK ACK HTTP GET
  • 19. Typical WAN Communication 120 ms Switch WAN Router WAN Router Switch WAN Client Server SYN SYN + ACK ACK HTTP GET ACK+Data
  • 20. Typical WAN Communication 120 ms Switch WAN Router WAN Router Switch WAN Client Server SYN SYN + ACK ACK HTTP GET ACK+Data ACK
  • 21. TCP Flow Control with WANScaler 120 ms Switch WAN WAN Switch Router Router WAN Server Client
  • 22. TCP Flow Control with WANScaler 120 ms Switch WANScaler WAN WAN WANScaler Switch Router Router WAN Server Client
  • 23. TCP Flow Control with WANScaler Fast Side Slow Side Slow Side Fast Side 120 ms Switch WANScaler WAN WAN WANScaler Switch Router Router WAN Server Client SYN SYN+ACK ACK HTTP GET ACK ACK ACK
  • 24. WANScaler Flow Control 120 ms Switch WANScaler WAN WAN WANScaler Switch Router Router WAN Server Client Each Segment has its own flow control: – Commonly deployed TCP Windows are 64kB max. – On the WAN side, WANScaler increases the Window to 8MB (RFC 1323) – WANScaler acknowledges packets on the LAN side, so server keeps sending Use rate-based sender on the WAN segment. Never send faster than the configured link speed
  • 25. What’s new with version 5.0 ? ICA Acceleration
  • 26. Location based ICA Optimisation Branch Office/Regional Site Citrix Repeater Corporate LAN/Data Center Based on the well known optimisation technologies, already known from the ICA Client Caching function taken away from the client, and taken into the data center (Citrix Repeater). So it can be used by ANY user at the data center location !
  • 27. Optimisation of GUI-, print- and data transfer Branch Office/Regional Site Corporate LAN/Data Center
  • 28. System requirements for ICA Acceleration For the first release: • Supported Appliances • XenApp Client • Branch Repeater (Windows Server) Version 1.5 • 32-bit Windows PC* • Branch Repeater (Linux) on Version 5.0 • 11.0 • WANScaler 8000 Series with version 5.0 • WANScaler Client offers ONLY TCP • XenApp Server Acceleration** • ONLY 32-bit Windows Server 2003 • XA Server Version 4.5 or 5.0 • HRP03 with post Acceleration HF
  • 29. Scenario # 1: • ICA user uses the same Citrix Repeater Box: 1. Different users, by using the same ICA window size and resolution, that access the same texts, numbers etc. (z.B. Word or Excel) Example: Two users open the same document, but data will only be transferred once.
  • 30. Scenario # 2: • ICA user uses the same Citrix Repeater Box: 2. Different users, that use the same ICA window size and resolution, scrolling within the same document. Example: Different users are using form or browser based appplications with identical background objects. Redundant data will not be transferred.
  • 31. Support of mixed environments HQ/Data Center Branch Office Internet/WAN Branch Repeater Citrix Repeater or WANScaler Branch Office For users WITHOUT WanScaler /Branch Repeater Box or with an older ICA Client it all stays the same!
  • 32. Case Study #1 Example of a non optimised environment WAN XenApp Server 4.5 50 ICA users MPLS 15% ICA data traffic 10 - 45 Mbps Mainly usage of the > 180 ms Internet Explorer 85% non ICA data traffic 40% line utilisation ng Environment: • Slow applications through a slow network (high latency) • But nearly no usage of same/redundant ICA data • No repeatable application scenario (Usage of same data/documents)
  • 33. Case Study #2 Company with branch offices and a centralised serverfarm WAN XenApp Server 4.5 20 ICA users DSL or fractional T1 (256 kbps – 768 kbps) >95% ICA data traffic 50 ms MS Office >90% line utilisation Printing File sharing Environment: • Users use same Word and Excel files • Printing is an important, and frequently used function • Users very often copy files (via ICA) from or to centralised file servers
  • 34. Case Study #3 Central server farm, big amount if print data WAN XenApp Server 4.5 30 ICA users MPLS >75% ICA data traffic 1.5 Mbps ERM Software ~ 50 ms Web Portal >90% line utilisation Printing of PDF files Environment: • Slow Response times (applications) by large, and frequently used PDF-Print files • Usage of WEB based Portals and ERM software. Access on same Datensätze. • No usage of MS Office applications and Client Drive Mapping
  • 35. ICA Acceleration - facts Ideal for print data, CDM file transfer and MS Office as well as applications with many identical window contents NOT ideal for Adobe/CAD applications as there are only few opportunities for compression and nearly no redundant data ICA screen resolution makes the difference. Same resolution is optimal. Differentiating resolution means more (per resolution) data traffic and a larger amount of data within the Citrix Repeater Cache.
  • 36. ICA Acceleration - facts • Optimal, when many ICA users utilise the same Citrix Repeater Box: Different users are accessing under usage of the same ICA window size and resolution based on identical data (example: Word or Excel) Same or different users are blättern within the same file under usage of the same ICA window size and resolution Different or identical users are printing the same files via ICA Duplication of same files under usage of ICA Client Drive Mapping. Example: local storage of mail attachments from a published Outlook
  • 37. Six Keys to Successful Application Delivery Citrix® NetScaler® Deliver Web Applications Citrix XenApp Server™ Deliver Windows Citrix EdgeSight™ Citrix Repeater™ Citrix Access Applications Users Monitor End User Accelerate Apps Gateway™ Apps Experience to Branch Users Enable Secure Citrix XenDesktop™ Application Access Deliver Desktops
  • 38. Transform your datacenter into a delivery center