SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
DOI:10.5121/ijitcs.2013.3302 13
Highly Available XenApp Cloud
Isha1
and Chander Kant2
1,2
Deptt. of Computer Science & Applications, Kurukshetra University,
Kurukshetra-136119
1
reply2ishain@gmail.com
2
ckverma@rediffmail.com
ABSTRACT
In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced
application and desktop computing costs and provided greater IT and user flexibility compared to
traditional application and desktop management models. Among the various SaaS technologies, XenApp
that allow numerous end users to connect to their corporate applications from any device. XenApp enables
organizations to improve application management by centralizing applications in the datacenter to reduce
costs, controlling and encrypting access to data and applications to improve security and delivering
applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we
were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for
this we have to pay for database especially because we are not using it for any other purpose. And as we
know windows is GUI based so running database over it consumes much more resources. So, it can lead to
single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA
failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP
(Virtual IP).
KEYWORDS
Clustering, High-availability, Virtual IP
1. INTRODUCTION
Cloud can be viewed as a new frontier of the IT services based on its abilities to deliver cost
effective, enterprise class virtual desktop and application solutions as provided by Citrix
XenDesktop. Increased challenges and changing business needs has presented a challenge for IT
staff to satisfy their users with services that incorporate the fundamentals of access at anytime
from anywhere, with any device and ensuring secure access to business-critical applications and
information. XenApp gives the ability to centrally manage heterogeneous applications and deliver
Software as a Service (SaaS) to any workforce.
In classical computer architecture, applications are installed, managed and upgraded individually
on every desktop. By the introduction of virtualization, an application need not to be managed
individually as is done in centralized manner. With the increase in usage of variety of applications
by an increased no. of users, has led to increase in no. of physical servers, need of high
availability, load balancing, management of large amount of data and its reliability. Citrix
XenApp server architecture has been succeeded to achieve this up to much extent. But there also
complexity and cost are hinders the growth of organizations implementing this architecture.
Citrix XenApp server hosts applications which are installed on servers in the data center and then
accessed via any client device. And the shared desktop capability in XenApp gives IT the ability
to provide a standardized, server OS desktop with installed applications to users, providing a
consistent workspace from anywhere on demand[1].Earlier XenApp was used to be installed on
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
14
physical servers, then to accomplish present scenario needs like need to scale quickly to handle
rapid growth employee numbers, to reproduce issues without adding new hardware and to reduce
physical server counts etc. , it is installed now on Virtual machines.[2] Its centralized application
management and session virtualization management makes it most secure technique for
delivering and streaming applications to any client device as data remains in the data center
whereas the input which are in form of keystrokes and mouse clicks and the output screenshots
are transit through the network at fast speed in an encrypted manner. At all XenApp provides the
ability for application deployment, remote office connectivity, workforce mobility, business
continuity [3].
2.THE STANDARD XENAPP ARCHITECTURE
XenApp is an enhanced form of Windows terminal services and an application hosting
technology that utilizes Citrix Systems' proprietary presentation layer protocol or thin
client protocol called Independent Computing Architecture (ICA)as shown in fig.1[4].
Figure 1: XenApp Server Architecture
The protocol lays down a specification for passing data between server and clients. A group of
servers running XenApp shares common data store, known to be as Server farm. Servers are
grouped into Zones which share common data store where applications can be load balanced
across servers in farm. There can be multiple farms, where farms do not share data store and load
balancing is done in individual farms [5]. Each Server farm consists of Farm servers, popularly
known as Citrix XenApp servers, IMA database, the web interface and the access management
console.
A The core components of citrix server include Multiwin, ICA and IMA. Multiwin is a kernel
module that enables multiple concurrent users’ login and access applications in separate secure
session on a single server. This XenApp presentation server is hosted over Microsoft’s Windows
server which enables it to create multiple sessions on single instance of the operating system and
by the help of its terminal services that makes it possible to connect to a session from any location
and many devices. ICA works to separate the application’s logic from the user interface then
transports it to the client over standard network protocols- TCP/IP, PPP, etc. At the client side,
users see and work with the application’s interface, but the whole application logic is executed on
the server [6]. It can be used with slowest as 14.4kbps to fastest up to Gbps speedy connections.
This protocol allows up to 32-bit applications run over multi platform clients and establishes
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
15
communication through 32 virtual channels. It is the only protocol used for client to server
session secure communication run over basic network layer protocols. At the client side, a file
with extension “.ica” is send by servers for application delivery services during a session. IMA
known as Independent management architecture framework designed for server to server
communication over data layer.
B The non-core components included in architecture are License Server, Web Interface, Data
Collector, data store. [12] License Server is associated with license management console. It stores
the license file and vital information about the product edition and the number of concurrent users
viable and the expiry dates etc. The license management console manages license server and
maintains license files for XenApp servers. The licenses are not associated with particular clients
but a particular client-server combination is viable for reservation of license. It is returned to
license pool after a user logoff its session for other users’ usage purpose. Web Interface provides
users with access to content via internet explorer to XenApp applications and XenDesktop virtual
desktops through a graphical presentation. The Web Interface interacts with a XenApp Server to
deliver its resources to the client device by installing online plug-in and other necessary
configurations to the client device [7]. Web interface also performs user authentication checks
using RSA Secure ID and by other means. Data Store is the most important database that holds
configurations data, persistent information about farm servers, farm management security,
published applications and server administrators and printers. Each zone contains a data collector
to keep dynamic data for servers in Zone. These data collectors also act as communication
gateways between Zones [8]. Data store used can be MySql Server Database over XenApp server.
C Application Delivery Process: The following figure shows how the XenApp architecture
provides the ability to configure, manage, and enable application access from one centralized
location, reducing the cost of provisioning offices individually and facilitating secured access
from anywhere by any device.[9]
Figure 2: Steps in Application delivery process
This Application delivery process starts with the request from ICA client to XENAPP server for
application access through Web interface by an ICA connection in 1st
step. Then the user is
authenticated and verified if it is authorized to access the application and any concurrent user
license is free for use or not by license server and domain controller[10] [11]. In the 3rd
step,
request is forwarded to data controller to check which server has the application requested and
which server can now serve the application. Then the data store is checked for configuration data
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
16
and access management console is accessed to deliver the application according to user profile
and its privileges. Then the client is redirected to idle server or least loaded server. Then the client
requests for IMA service to establish an application delivery session in step 6.Now session is
established over ICA connection and all inputs and outputs are communicated over ICA virtual
channel. It also gives option for streaming of application at client device to work in offline
manner[12].
D Database servers: Each farm requires a dedicated database. XenApp mostly uses Microsoft
Sql Server and Oracle for managing Databases. However, multiple databases can be running on a
single server running Microsoft SQL Server. The farm doesn’t use a database that is shared with
any other client/server applications. Here distributed databases are used. When there are too many
requests for access the data store, it creates bottleneck. Microsoft SQL Server uses replication to
create the distributed database environment. XenApp requires data coherency across multiple
databases [13]. Therefore, a two-phase commit algorithm is required for storing data in the
database. In existing architecture database server is installed on same machine on which XenApp
is running as
Figure 3: A XenApp farm shows running both servers over same machine
shown in figure 3.
There are two protocols used to connect to a database are TCP/IP sockets and named pipes.
TCP/IP sockets do not depend on Windows authentication to establish a connection, but it
provides username and password for the authentication to the database after the connection is
established. Windows authentication reduces the possibility of an error occurring when the server
hosting SQL Server and the XenApp server do not have the correct domain or Active Directory
trust relationship. Named pipes is an authenticated communication protocol, so any time for an
attempt to open a connection to the SQL Server database using this protocol, the Windows
authentication process occurs[14]. Most database maintenance requires running
the dsmaint and dscheck server utilities on XenApp farm servers. If the data store fails, each farm
server can access the data in its Local Host Cache indefinitely, provided it can contact the license
server. However, it cannot make any modifications to the farm. A back up copy is always
maintained of data store, else user need to create all the farm policies, account, settings and data
in the data store again and again. Migration is also needed sometimes for load balancing, it is
done by the help of dsmaint migrate utility. There are also other utilities for checking the integrity
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
17
of the server farm data store, to generate log reports to view information about server farms,
processes, ICA sessions, users [15].
3. PROPOSED XENAPP CLOUD ARCHITECTURE
As per old architecture we were using the oracle or MS-SQL in the backend of XenApp on
Windows Server itself. But as we know for this an organization has to pay for database especially
because we are not using it for any other purpose. And as we know windows is GUI based so
running database over it consumes much more resources. So, it can lead to single point of failure.
Generally lead to service hang-ups on application publishing & other changes. So, we are
purposing to use cluster based sql servers in backend of XenApp. Which are typically based on
NLB (Network Load Balancers) on windows. But again resource utilization & license become the
most important concern. For this we can remove this problem by using the HA failover cluster
based SQL server(mysql or Oracle) which will run over Linux box having concept of VIP(Virtual
Internet Protocol address).Since the Microsoft clustering is not reliable ,so we build cluster over
Linux. That will be connected to windows xenapp server via “Ora Client” Application. A failover
cluster is a combination of one or more physical disks in a cluster group that are participating
group nodes of a cluster. The network is configured as a failover clustered instance that hosts an
instance of SQL Server. A SQL Server failover clustered instance appears on the network as if it
were a single computer, but has functionality that provides failover from one node to another if
one node becomes unavailable. Before the cluster has time to fail over, the loss of the principal
server is detected by the mirror server, with the help of the witness. The mirror server rolls
forward its database and brings it online as the new principal database as quickly as possible. The
principle server is the one serving the end user. And mirror server is replication of principal
server and witness server keep monitoring the principal server so as to handover the access to
mirror server. Now the problem is which IP should be provided to XenApp to allow the access to
database. This IP will be called as Virtual IP since it is not the real IP of the database. This is
done by the help of virtual IP. This “ora client” is an interface for accessing oracle database.
This mysql or Oracle can be used for other purposes too like storing other data. This will remove
the exception of single point of failure as this will use SNMP or heartbeat. It will continuously
monitor the service. We can typically setup any number of nodes typically 2 nodes for a small
setup & 5-7 for medium based, 10-15 for Enterprise based. But ORACLE charges according to
number of nodes. So either use mysql or use ORACLE for other purposes too which is running on
Linux. So, for this setup we have to install SQL on Linux server nodes, configure HA failover on
those nodes, and install XenApp & Ora Client on windows Servers. We have to specify VIP
(virtual IP) of SQL in Ora client so that it will create an environment like sql is directly installed
on the Microsoft Server. In this way backend database & XenApp performance can be increased.
This performance factor really does matter on production Servers (Generally where the enterprise
can’t afford downtime like on e-commerce servers).Following figure shows the new proposed
architecture that implements HA failover clustering over Linux servers.
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
18
Figure4: Proposed Architecture preventing single point of failure
4. Conclusion
For midsize to large enterprises with simple presentation virtualization needs, Terminal Services
with XenApp over it fits well. But organizations that must scale to thousands of users will need
the compression, acceleration, load balancing, and management options that only XenApp
provides has to suffer from single point failure. This new proposed architecture prevents this by
introducing an interface and clustering of database servers which dynamically switches at the
time of need. Failover clusters provide high-availability support in contrast to database mirroring,
which provides high-availability support for a single database. This increases stability and
improves performance as the problem of frequently hanging and lack of resource utilization will
be solved.
REFERENCES
[1] “XenApp_on_ESX_Case_Study_June_2010” white paper (Jun. 2010)
http://www.vmware.com/files/pdf/techpaper/XenApp_on_ESX_Case_Study_June_2010.pdf
[2] “What’s New in VMware vSphere 4: Performance Enhancements” white paper
http://www.vmware.com/files/pdf/VMware-vSphere-Performance-WP-EN.pdf
[3] “Design and Scalability Considerations for Enterprise XenApp Deployments” white paper:
http://support.citrix.com/servlet/KbServlet/download/28911-102-671619
[4] Wikipedia – Citrix XenApp (Mar. 22, 2013) http://en.wikipedia.org/wiki/Citrix_XenApp
[5] “Citrix XenApp amp XenDesktop” presentation (Mar.12, 2013)
http://www.slideworld.com/slideshow.aspx/Citrix-XenApp-amp-XenDesktop-ppt-2176421
[6] “Citrix XenApp by Syed” (Dec. 9, 2012) http://www.authorstream.com/Presentation/syedsameer-
1549058-citrix-XenApp-syed/
[7] “Understanding-the-Citrix-Product- Portfolio”(Feb.21st,2011)
http://vknowledge.wordpress.com/2011/02/21/understanding-the-citrix-product-portfolio/
[8] “How to Choose a Hybrid Cloud Approach” (Second Edition) E-publication(Apr.2012)
www.techtarget.com
International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
19
[9] “Application virtualization comparison: XenApp vs. ThinApp vs. App-V” (Jan. 2013)
http://searchvirtualdesktop.techtarget.com/feature/Application-virtualization-comparison-XenApp -
vs-ThinApp-vs-App-V
[10] Wikipedia-Independent_Computing_Architecture(May,2010))
http://en.wikipedia.org/wiki/Independent_Computing_Architecture
[11] "XenApp Introduction” Wizz (Apr. 08, 2011) http://vnewbie.com/?page_id=104
[12] “ Product Documentation” Citrix(Dec. 2011) http://support.citrix.com/proddocs/topic/XenApp65-
w2k8/ps-system-requirements-w2k8-xa65.html
[13] “Citrix - Terminal Server” (Jun. 12, 2012) http://www.tau.ac.il/cc/software/citrix-eng.html
[14] “XenApp 6.0 in the cloud” (Apr 5, 2011) http://blogs.citrix.com/2011/04/05/xenapp-6-0-in-the-cloud/
[15] “XenApp 5 Feature Pack 3 for Windows Server 2003” (Dec. 12, 2012)
http://support.citrix.com/proddocs/topic/xenapp/xenapp5fp3-w2k3-wrapper.html
[16] Isha, Chander Kant “An Improved XenApp Architecture” International Journal for advance Research
in Engineering and Technology ISSN: 2320-6802” Vol. 1, Issue IV, May 2013, pp 6-9

Weitere ähnliche Inhalte

Was ist angesagt?

Towards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingTowards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingRahid Abdul Kalam
 
Ijaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruIjaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruijaprr_editor
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)rosu555
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Journals
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computingeSAT Publishing House
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware BasicsVarun Arora
 
Xenapp deployment-blueprint
Xenapp deployment-blueprintXenapp deployment-blueprint
Xenapp deployment-blueprintKunKun Ng
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyijcseit
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Introducing Windows Azure
Introducing Windows Azure Introducing Windows Azure
Introducing Windows Azure Mohamed Samy
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingHaseeb Rehman
 
Microsoft India - Windows Server 2008 R2 Remote Desktop Services Whitepaper
Microsoft India - Windows Server 2008 R2 Remote Desktop Services WhitepaperMicrosoft India - Windows Server 2008 R2 Remote Desktop Services Whitepaper
Microsoft India - Windows Server 2008 R2 Remote Desktop Services WhitepaperMicrosoft Private Cloud
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stackSatish Chavan
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 

Was ist angesagt? (18)

Towards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computingTowards secure & dependable storage services in cloud computing
Towards secure & dependable storage services in cloud computing
 
Cloud Management Mechanisms
Cloud Management MechanismsCloud Management Mechanisms
Cloud Management Mechanisms
 
Ijaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguruIjaprr vol1-3-10-14prajguru
Ijaprr vol1-3-10-14prajguru
 
Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)Building Intranet Assignment 2009 03 14 roshan basnet (1)
Building Intranet Assignment 2009 03 14 roshan basnet (1)
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Software as a service for efficient cloud computing
Software as a service for efficient cloud computingSoftware as a service for efficient cloud computing
Software as a service for efficient cloud computing
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
 
Xenapp deployment-blueprint
Xenapp deployment-blueprintXenapp deployment-blueprint
Xenapp deployment-blueprint
 
Configuration inerpsaas multi tenancy
Configuration inerpsaas multi tenancyConfiguration inerpsaas multi tenancy
Configuration inerpsaas multi tenancy
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Introducing Windows Azure
Introducing Windows Azure Introducing Windows Azure
Introducing Windows Azure
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
 
DDS Enabling Open Architecture
DDS Enabling Open ArchitectureDDS Enabling Open Architecture
DDS Enabling Open Architecture
 
Dce rpc
Dce rpcDce rpc
Dce rpc
 
Microsoft India - Windows Server 2008 R2 Remote Desktop Services Whitepaper
Microsoft India - Windows Server 2008 R2 Remote Desktop Services WhitepaperMicrosoft India - Windows Server 2008 R2 Remote Desktop Services Whitepaper
Microsoft India - Windows Server 2008 R2 Remote Desktop Services Whitepaper
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 

Andere mochten auch

AUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIRAUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIRijitcs
 
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING BI SYSTEMS
ASSESSING THE ORGANIZATIONAL READINESS FOR  IMPLEMENTING BI SYSTEMSASSESSING THE ORGANIZATIONAL READINESS FOR  IMPLEMENTING BI SYSTEMS
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING BI SYSTEMSijitcs
 
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...ijitcs
 
A novel secure handover mechanism in
A novel secure handover mechanism inA novel secure handover mechanism in
A novel secure handover mechanism inijitcs
 
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...ijitcs
 
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...ijitcs
 
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSA SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSijitcs
 
Making isp business profitable using data mining
Making isp business profitable using data miningMaking isp business profitable using data mining
Making isp business profitable using data miningijitcs
 
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...ijitcs
 
Soegov a serviceoriented e governance
Soegov a serviceoriented e governanceSoegov a serviceoriented e governance
Soegov a serviceoriented e governanceijitcs
 
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSijitcs
 
Brain tumor detection and localization in magnetic resonance imaging
Brain tumor detection and localization in magnetic resonance imagingBrain tumor detection and localization in magnetic resonance imaging
Brain tumor detection and localization in magnetic resonance imagingijitcs
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Managementijitcs
 
Load balancing using ant colony in cloud computing
Load balancing using ant colony in cloud computingLoad balancing using ant colony in cloud computing
Load balancing using ant colony in cloud computingijitcs
 
Pdhpe – physical development, health and physical
Pdhpe – physical development, health and physicalPdhpe – physical development, health and physical
Pdhpe – physical development, health and physicalRussell Chappelow
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHijitcs
 

Andere mochten auch (16)

AUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIRAUTOMATED INNOVATIVE WHEELCHAIR
AUTOMATED INNOVATIVE WHEELCHAIR
 
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING BI SYSTEMS
ASSESSING THE ORGANIZATIONAL READINESS FOR  IMPLEMENTING BI SYSTEMSASSESSING THE ORGANIZATIONAL READINESS FOR  IMPLEMENTING BI SYSTEMS
ASSESSING THE ORGANIZATIONAL READINESS FOR IMPLEMENTING BI SYSTEMS
 
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
 
A novel secure handover mechanism in
A novel secure handover mechanism inA novel secure handover mechanism in
A novel secure handover mechanism in
 
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
An Efficient Algorithm to Calculate The Connectivity of Hyper-Rings Distribut...
 
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
 
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSA SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMS
 
Making isp business profitable using data mining
Making isp business profitable using data miningMaking isp business profitable using data mining
Making isp business profitable using data mining
 
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...
ADAPTIVESYNCHRONIZER DESIGN FOR THE HYBRID SYNCHRONIZATION OF HYPERCHAOTIC ZH...
 
Soegov a serviceoriented e governance
Soegov a serviceoriented e governanceSoegov a serviceoriented e governance
Soegov a serviceoriented e governance
 
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
 
Brain tumor detection and localization in magnetic resonance imaging
Brain tumor detection and localization in magnetic resonance imagingBrain tumor detection and localization in magnetic resonance imaging
Brain tumor detection and localization in magnetic resonance imaging
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 
Load balancing using ant colony in cloud computing
Load balancing using ant colony in cloud computingLoad balancing using ant colony in cloud computing
Load balancing using ant colony in cloud computing
 
Pdhpe – physical development, health and physical
Pdhpe – physical development, health and physicalPdhpe – physical development, health and physical
Pdhpe – physical development, health and physical
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 

Ähnlich wie Highly Available XenApp Cloud

Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Citrix
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computingAlexander Decker
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingSuzanne Simmons
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparisonlneut03
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networksjayapal385
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
 

Ähnlich wie Highly Available XenApp Cloud (20)

Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
Ensure the Secure, Reliable Delivery of Applications to Any User, Over Any Ne...
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating SystemVirtualized Web Desktop Towards A Faster Web Cloud Operating System
Virtualized Web Desktop Towards A Faster Web Cloud Operating System
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
A017620123
A017620123A017620123
A017620123
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azureCloud computing challenges with emphasis on amazon ec2 and windows azure
Cloud computing challenges with emphasis on amazon ec2 and windows azure
 
Thin Provisioning Comparison
Thin Provisioning ComparisonThin Provisioning Comparison
Thin Provisioning Comparison
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESCLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGES
 

Kürzlich hochgeladen

VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Kürzlich hochgeladen (20)

VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 

Highly Available XenApp Cloud

  • 1. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 DOI:10.5121/ijitcs.2013.3302 13 Highly Available XenApp Cloud Isha1 and Chander Kant2 1,2 Deptt. of Computer Science & Applications, Kurukshetra University, Kurukshetra-136119 1 reply2ishain@gmail.com 2 ckverma@rediffmail.com ABSTRACT In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their corporate applications from any device. XenApp enables organizations to improve application management by centralizing applications in the datacenter to reduce costs, controlling and encrypting access to data and applications to improve security and delivering applications instantly to users anywhere by remotely accessing or streaming. As per old architecture we were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for this we have to pay for database especially because we are not using it for any other purpose. And as we know windows is GUI based so running database over it consumes much more resources. So, it can lead to single point of failure. For this, this paper proposes a scheme for removing this problem by using the HA failover cluster based SQL server (mysql or Oracle) which will run over Linux box having concept of VIP (Virtual IP). KEYWORDS Clustering, High-availability, Virtual IP 1. INTRODUCTION Cloud can be viewed as a new frontier of the IT services based on its abilities to deliver cost effective, enterprise class virtual desktop and application solutions as provided by Citrix XenDesktop. Increased challenges and changing business needs has presented a challenge for IT staff to satisfy their users with services that incorporate the fundamentals of access at anytime from anywhere, with any device and ensuring secure access to business-critical applications and information. XenApp gives the ability to centrally manage heterogeneous applications and deliver Software as a Service (SaaS) to any workforce. In classical computer architecture, applications are installed, managed and upgraded individually on every desktop. By the introduction of virtualization, an application need not to be managed individually as is done in centralized manner. With the increase in usage of variety of applications by an increased no. of users, has led to increase in no. of physical servers, need of high availability, load balancing, management of large amount of data and its reliability. Citrix XenApp server architecture has been succeeded to achieve this up to much extent. But there also complexity and cost are hinders the growth of organizations implementing this architecture. Citrix XenApp server hosts applications which are installed on servers in the data center and then accessed via any client device. And the shared desktop capability in XenApp gives IT the ability to provide a standardized, server OS desktop with installed applications to users, providing a consistent workspace from anywhere on demand[1].Earlier XenApp was used to be installed on
  • 2. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 14 physical servers, then to accomplish present scenario needs like need to scale quickly to handle rapid growth employee numbers, to reproduce issues without adding new hardware and to reduce physical server counts etc. , it is installed now on Virtual machines.[2] Its centralized application management and session virtualization management makes it most secure technique for delivering and streaming applications to any client device as data remains in the data center whereas the input which are in form of keystrokes and mouse clicks and the output screenshots are transit through the network at fast speed in an encrypted manner. At all XenApp provides the ability for application deployment, remote office connectivity, workforce mobility, business continuity [3]. 2.THE STANDARD XENAPP ARCHITECTURE XenApp is an enhanced form of Windows terminal services and an application hosting technology that utilizes Citrix Systems' proprietary presentation layer protocol or thin client protocol called Independent Computing Architecture (ICA)as shown in fig.1[4]. Figure 1: XenApp Server Architecture The protocol lays down a specification for passing data between server and clients. A group of servers running XenApp shares common data store, known to be as Server farm. Servers are grouped into Zones which share common data store where applications can be load balanced across servers in farm. There can be multiple farms, where farms do not share data store and load balancing is done in individual farms [5]. Each Server farm consists of Farm servers, popularly known as Citrix XenApp servers, IMA database, the web interface and the access management console. A The core components of citrix server include Multiwin, ICA and IMA. Multiwin is a kernel module that enables multiple concurrent users’ login and access applications in separate secure session on a single server. This XenApp presentation server is hosted over Microsoft’s Windows server which enables it to create multiple sessions on single instance of the operating system and by the help of its terminal services that makes it possible to connect to a session from any location and many devices. ICA works to separate the application’s logic from the user interface then transports it to the client over standard network protocols- TCP/IP, PPP, etc. At the client side, users see and work with the application’s interface, but the whole application logic is executed on the server [6]. It can be used with slowest as 14.4kbps to fastest up to Gbps speedy connections. This protocol allows up to 32-bit applications run over multi platform clients and establishes
  • 3. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 15 communication through 32 virtual channels. It is the only protocol used for client to server session secure communication run over basic network layer protocols. At the client side, a file with extension “.ica” is send by servers for application delivery services during a session. IMA known as Independent management architecture framework designed for server to server communication over data layer. B The non-core components included in architecture are License Server, Web Interface, Data Collector, data store. [12] License Server is associated with license management console. It stores the license file and vital information about the product edition and the number of concurrent users viable and the expiry dates etc. The license management console manages license server and maintains license files for XenApp servers. The licenses are not associated with particular clients but a particular client-server combination is viable for reservation of license. It is returned to license pool after a user logoff its session for other users’ usage purpose. Web Interface provides users with access to content via internet explorer to XenApp applications and XenDesktop virtual desktops through a graphical presentation. The Web Interface interacts with a XenApp Server to deliver its resources to the client device by installing online plug-in and other necessary configurations to the client device [7]. Web interface also performs user authentication checks using RSA Secure ID and by other means. Data Store is the most important database that holds configurations data, persistent information about farm servers, farm management security, published applications and server administrators and printers. Each zone contains a data collector to keep dynamic data for servers in Zone. These data collectors also act as communication gateways between Zones [8]. Data store used can be MySql Server Database over XenApp server. C Application Delivery Process: The following figure shows how the XenApp architecture provides the ability to configure, manage, and enable application access from one centralized location, reducing the cost of provisioning offices individually and facilitating secured access from anywhere by any device.[9] Figure 2: Steps in Application delivery process This Application delivery process starts with the request from ICA client to XENAPP server for application access through Web interface by an ICA connection in 1st step. Then the user is authenticated and verified if it is authorized to access the application and any concurrent user license is free for use or not by license server and domain controller[10] [11]. In the 3rd step, request is forwarded to data controller to check which server has the application requested and which server can now serve the application. Then the data store is checked for configuration data
  • 4. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 16 and access management console is accessed to deliver the application according to user profile and its privileges. Then the client is redirected to idle server or least loaded server. Then the client requests for IMA service to establish an application delivery session in step 6.Now session is established over ICA connection and all inputs and outputs are communicated over ICA virtual channel. It also gives option for streaming of application at client device to work in offline manner[12]. D Database servers: Each farm requires a dedicated database. XenApp mostly uses Microsoft Sql Server and Oracle for managing Databases. However, multiple databases can be running on a single server running Microsoft SQL Server. The farm doesn’t use a database that is shared with any other client/server applications. Here distributed databases are used. When there are too many requests for access the data store, it creates bottleneck. Microsoft SQL Server uses replication to create the distributed database environment. XenApp requires data coherency across multiple databases [13]. Therefore, a two-phase commit algorithm is required for storing data in the database. In existing architecture database server is installed on same machine on which XenApp is running as Figure 3: A XenApp farm shows running both servers over same machine shown in figure 3. There are two protocols used to connect to a database are TCP/IP sockets and named pipes. TCP/IP sockets do not depend on Windows authentication to establish a connection, but it provides username and password for the authentication to the database after the connection is established. Windows authentication reduces the possibility of an error occurring when the server hosting SQL Server and the XenApp server do not have the correct domain or Active Directory trust relationship. Named pipes is an authenticated communication protocol, so any time for an attempt to open a connection to the SQL Server database using this protocol, the Windows authentication process occurs[14]. Most database maintenance requires running the dsmaint and dscheck server utilities on XenApp farm servers. If the data store fails, each farm server can access the data in its Local Host Cache indefinitely, provided it can contact the license server. However, it cannot make any modifications to the farm. A back up copy is always maintained of data store, else user need to create all the farm policies, account, settings and data in the data store again and again. Migration is also needed sometimes for load balancing, it is done by the help of dsmaint migrate utility. There are also other utilities for checking the integrity
  • 5. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 17 of the server farm data store, to generate log reports to view information about server farms, processes, ICA sessions, users [15]. 3. PROPOSED XENAPP CLOUD ARCHITECTURE As per old architecture we were using the oracle or MS-SQL in the backend of XenApp on Windows Server itself. But as we know for this an organization has to pay for database especially because we are not using it for any other purpose. And as we know windows is GUI based so running database over it consumes much more resources. So, it can lead to single point of failure. Generally lead to service hang-ups on application publishing & other changes. So, we are purposing to use cluster based sql servers in backend of XenApp. Which are typically based on NLB (Network Load Balancers) on windows. But again resource utilization & license become the most important concern. For this we can remove this problem by using the HA failover cluster based SQL server(mysql or Oracle) which will run over Linux box having concept of VIP(Virtual Internet Protocol address).Since the Microsoft clustering is not reliable ,so we build cluster over Linux. That will be connected to windows xenapp server via “Ora Client” Application. A failover cluster is a combination of one or more physical disks in a cluster group that are participating group nodes of a cluster. The network is configured as a failover clustered instance that hosts an instance of SQL Server. A SQL Server failover clustered instance appears on the network as if it were a single computer, but has functionality that provides failover from one node to another if one node becomes unavailable. Before the cluster has time to fail over, the loss of the principal server is detected by the mirror server, with the help of the witness. The mirror server rolls forward its database and brings it online as the new principal database as quickly as possible. The principle server is the one serving the end user. And mirror server is replication of principal server and witness server keep monitoring the principal server so as to handover the access to mirror server. Now the problem is which IP should be provided to XenApp to allow the access to database. This IP will be called as Virtual IP since it is not the real IP of the database. This is done by the help of virtual IP. This “ora client” is an interface for accessing oracle database. This mysql or Oracle can be used for other purposes too like storing other data. This will remove the exception of single point of failure as this will use SNMP or heartbeat. It will continuously monitor the service. We can typically setup any number of nodes typically 2 nodes for a small setup & 5-7 for medium based, 10-15 for Enterprise based. But ORACLE charges according to number of nodes. So either use mysql or use ORACLE for other purposes too which is running on Linux. So, for this setup we have to install SQL on Linux server nodes, configure HA failover on those nodes, and install XenApp & Ora Client on windows Servers. We have to specify VIP (virtual IP) of SQL in Ora client so that it will create an environment like sql is directly installed on the Microsoft Server. In this way backend database & XenApp performance can be increased. This performance factor really does matter on production Servers (Generally where the enterprise can’t afford downtime like on e-commerce servers).Following figure shows the new proposed architecture that implements HA failover clustering over Linux servers.
  • 6. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 18 Figure4: Proposed Architecture preventing single point of failure 4. Conclusion For midsize to large enterprises with simple presentation virtualization needs, Terminal Services with XenApp over it fits well. But organizations that must scale to thousands of users will need the compression, acceleration, load balancing, and management options that only XenApp provides has to suffer from single point failure. This new proposed architecture prevents this by introducing an interface and clustering of database servers which dynamically switches at the time of need. Failover clusters provide high-availability support in contrast to database mirroring, which provides high-availability support for a single database. This increases stability and improves performance as the problem of frequently hanging and lack of resource utilization will be solved. REFERENCES [1] “XenApp_on_ESX_Case_Study_June_2010” white paper (Jun. 2010) http://www.vmware.com/files/pdf/techpaper/XenApp_on_ESX_Case_Study_June_2010.pdf [2] “What’s New in VMware vSphere 4: Performance Enhancements” white paper http://www.vmware.com/files/pdf/VMware-vSphere-Performance-WP-EN.pdf [3] “Design and Scalability Considerations for Enterprise XenApp Deployments” white paper: http://support.citrix.com/servlet/KbServlet/download/28911-102-671619 [4] Wikipedia – Citrix XenApp (Mar. 22, 2013) http://en.wikipedia.org/wiki/Citrix_XenApp [5] “Citrix XenApp amp XenDesktop” presentation (Mar.12, 2013) http://www.slideworld.com/slideshow.aspx/Citrix-XenApp-amp-XenDesktop-ppt-2176421 [6] “Citrix XenApp by Syed” (Dec. 9, 2012) http://www.authorstream.com/Presentation/syedsameer- 1549058-citrix-XenApp-syed/ [7] “Understanding-the-Citrix-Product- Portfolio”(Feb.21st,2011) http://vknowledge.wordpress.com/2011/02/21/understanding-the-citrix-product-portfolio/ [8] “How to Choose a Hybrid Cloud Approach” (Second Edition) E-publication(Apr.2012) www.techtarget.com
  • 7. International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013 19 [9] “Application virtualization comparison: XenApp vs. ThinApp vs. App-V” (Jan. 2013) http://searchvirtualdesktop.techtarget.com/feature/Application-virtualization-comparison-XenApp - vs-ThinApp-vs-App-V [10] Wikipedia-Independent_Computing_Architecture(May,2010)) http://en.wikipedia.org/wiki/Independent_Computing_Architecture [11] "XenApp Introduction” Wizz (Apr. 08, 2011) http://vnewbie.com/?page_id=104 [12] “ Product Documentation” Citrix(Dec. 2011) http://support.citrix.com/proddocs/topic/XenApp65- w2k8/ps-system-requirements-w2k8-xa65.html [13] “Citrix - Terminal Server” (Jun. 12, 2012) http://www.tau.ac.il/cc/software/citrix-eng.html [14] “XenApp 6.0 in the cloud” (Apr 5, 2011) http://blogs.citrix.com/2011/04/05/xenapp-6-0-in-the-cloud/ [15] “XenApp 5 Feature Pack 3 for Windows Server 2003” (Dec. 12, 2012) http://support.citrix.com/proddocs/topic/xenapp/xenapp5fp3-w2k3-wrapper.html [16] Isha, Chander Kant “An Improved XenApp Architecture” International Journal for advance Research in Engineering and Technology ISSN: 2320-6802” Vol. 1, Issue IV, May 2013, pp 6-9